Re: [dmarc-ietf] auth-res vs. dmarc

Alessandro Vesely <vesely@tana.it> Wed, 30 December 2020 17:34 UTC

Return-Path: <vesely@tana.it>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B2C453A0AB8 for <dmarc@ietfa.amsl.com>; Wed, 30 Dec 2020 09:34:40 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.399
X-Spam-Level:
X-Spam-Status: No, score=-4.399 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, NICE_REPLY_A=-0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1152-bit key) header.d=tana.it
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1-dAYNkFSZI2 for <dmarc@ietfa.amsl.com>; Wed, 30 Dec 2020 09:34:39 -0800 (PST)
Received: from wmail.tana.it (wmail.tana.it [62.94.243.226]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E3EF63A0AB7 for <dmarc@ietf.org>; Wed, 30 Dec 2020 09:34:38 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=tana.it; s=delta; t=1609349677; bh=+4t6A9V50BVEizjFjyAB+QeTectBoScDAClc0AGsK28=; l=3571; h=To:References:From:Date:In-Reply-To; b=CwL13pWq2p8WgyZ4mOhODzre7h9XAA+BOu1NRsfOC47cogoBViNAc+akhTCt1K/FG pdzb40XJMg7thTgFoDsKacaLmqvuyNFaBI6XlPjOsAor2iBv1OP3f91u66WcPSkDgC ho60TXFaORhU/pGC8fBWAFAFEgJ+aubTM63jIyKwvxDuui6D8JfBXs2gn3SDa
Authentication-Results: tana.it; auth=pass (details omitted)
Original-From: Alessandro Vesely <vesely@tana.it>
Received: from [172.25.197.111] (pcale.tana [172.25.197.111]) (AUTH: CRAM-MD5 uXDGrn@SYT0/k, TLS: TLS1.3, 128bits, ECDHE_RSA_AES_128_GCM_SHA256) by wmail.tana.it with ESMTPSA id 00000000005DC0BB.000000005FECBA2D.000058CC; Wed, 30 Dec 2020 18:34:37 +0100
To: Dotzero <dotzero@gmail.com>, Michael Thomas <mike@mtcc.com>, IETF DMARC WG <dmarc@ietf.org>
References: <9f6782b1-e85b-1a9c-9151-98feff7e18ea@mtcc.com> <CAHej_8m0OWsTt+tcSgUh+Fxu=HH_57nsb2O1Q_fgA2453ceh4g@mail.gmail.com> <140485eb-020f-4406-3f2f-e2c475ea51e5@mtcc.com> <CAHej_8mApfoF2ORgL+DoYTanrdhMjvT9H27kORwLKCQc1C9sRw@mail.gmail.com> <5588dbbe-b876-ed80-c80f-792380e3718f@mtcc.com> <CAHej_8=kW_t_JkOxUud1Uz8+PrbMh5CfwfxZK=mhe0wjW8wQpw@mail.gmail.com> <54dd9978-bcd1-6757-ad27-dcef6db6e5f7@mtcc.com> <CAHej_8kCi=7oqojDH_rbjn7kRg-PTDJWLgcKTGK9z-baUnKeMw@mail.gmail.com> <ef32de1e-d47e-1d0f-3cec-5994c7fdb7ae@mtcc.com> <CAHej_8kjSsQK_XEbdjWzV5npa29YjGadzD06Fmx3QLB4p+n_Cg@mail.gmail.com> <937f1019-a028-308d-2a0f-1e720fd49dcd@mtcc.com> <d8014c2a-c1c9-9eac-e64a-5f285bab7fd3@tana.it> <CAHej_8mgYr9ERAxmup+keZT5u8L+qgCxcSLH7Z=BEuZLouttpg@mail.gmail.com> <72e20c17-e991-e82a-9120-a27097e3ac58@mtcc.com> <CAHej_8=6huc-N4ymDTOWZXHGjQQ-3RFDdomRzmGp4kOseHckMQ@mail.gmail.com> <7863d250-f56a-1fe1-44ee-fbc7486d48b4@mtcc.com> <CAJ4XoYdMdaE92UOrXvcAqm2iou+PCGg_uzHUsmBsYRe1PivBJw@mail.gmail.com>
From: Alessandro Vesely <vesely@tana.it>
Message-ID: <6b92109b-5dea-5d28-c52c-bbe33d168c7b@tana.it>
Date: Wed, 30 Dec 2020 18:34:36 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.6.0
MIME-Version: 1.0
In-Reply-To: <CAJ4XoYdMdaE92UOrXvcAqm2iou+PCGg_uzHUsmBsYRe1PivBJw@mail.gmail.com>
Content-Type: text/plain; charset="us-ascii"; format="flowed"
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/X93T3haqQNIvpHnb87w-gqfDR6g>
Subject: Re: [dmarc-ietf] auth-res vs. dmarc
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 Dec 2020 17:34:41 -0000

On Wed 30/Dec/2020 17:22:07 +0100 Dotzero wrote:
> On Wed, Dec 30, 2020 at 10:41 AM Michael Thomas <mike@mtcc.com> wrote:
>> On 12/30/20 7:35 AM, Todd Herr wrote:
>> On Wed, Dec 30, 2020 at 9:01 AM Michael Thomas <mike@mtcc.com> wrote:
>>> On 12/30/20 5:48 AM, Todd Herr wrote:
>>>
>>>>> I propose to add two new result name codes, named after the policy
>>>>> requests:
>>>>>
>>>>>     dmarc=quarantine, and
>>>>>
>>>>>     dmarc=reject (of course, you only see this if the filter didn't
>>>>>     honor the request).
>>>>
>>>> I do not support this, because quarantine, reject, and none are not
>>>> Authentication Results, but are instead both policy requests and
>>>> disposition decisions.
>>>
>>> Then we should remove DMARC from auth-res altogether because it is not an
>>> authentication mechanism. Either we fully support DMARC in auth-res or
>>> remove it. This half-assed state of unlessness serves nobody.
>>>
>> I disagree. DMARC has rules that determine whether or not a message is 
>> deemed to be authenticated - did it pass SPF or DKIM and did it do so
>> with a domain that aligns with the RFC5322.From domain. The currently
>> valid states for those rules are pass, fail, temperror, and permerror.

They are not enough to convey the information needed.  That's why I propose an 
addition.


>> Policy and disposition (none, quarantine, reject) apply to decisions made
>> based on the authentication results; they are not states for the
>> authentication checks themselves.


They become states for the authentication check in the moment that we publish 
that dmarc=quarantine means the message failed DMARC check and the DMARC record 
asked that the message be quarantined in that case.

Todd clearly said that a mailbox provider currently has to resort to temporary 
header fields in order to communicate results of authentication checks to a 
downstream, non-standard agent.  Perhaps like so:

X-Authentication-Results: dmarc=quarantine?

Mail systems are not the prerogative of large mailbox providers who roll out 
their own code.  Standards exist to allow compliant code to interoperate.


>> DMARC != Auth-res. Auth-res provides all kinds of useful information than
>> just pass/fail. For DMARC Auth-res should provide what the policy was at a
>> bare minimum. But none of this seems to have any normative language
>> anywhere which is a problem unto itself. DMARC in auth-res seems to be an
>> orphan.
> 
> You just stated the case as to why this discussion should be ruled out of
> scope.  " DMARC != Auth-res." and " DMARC in auth-res seems to be an orphan"
> 
> This is the IETF DMARC working group, not the AUTH-RES working group.


Indeed.  Auth-Res values and meaning are defined precisely in the document we 
are writing.  RFC 8601 is extensible, and it only covers methods that were 
already in use in 2009, when RFC 5451 came out.


> You gave the example of someone writing a crappy Thunderbird extension as a 
> reason for the working group to change its focus.

The code that Philippe Lieser wrote is strictly conforming to standards.  It is 
crappy only because the DMARC standard is, at least as far as specifying 
authentication methods is concerned.


> Perhaps getting the extension author to fix their extension might be a more
> fruitful effort.

By my bitty knowledge of Philippe's reasoning, I'd bet he'd ask what RFC says 
where to get a different status than what his add-on displays.  Of course he's 
not going to tentatively parse every known A-R comment.


Best
Ale
--