Re: [dmarc-ietf] Charter improvements

Franck Martin <franck@peachymango.org> Wed, 17 July 2013 05:46 UTC

Return-Path: <franck@peachymango.org>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2672821F9DA3 for <dmarc@ietfa.amsl.com>; Tue, 16 Jul 2013 22:46:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.299
X-Spam-Level:
X-Spam-Status: No, score=-2.299 tagged_above=-999 required=5 tests=[AWL=-0.300, BAYES_00=-2.599, J_CHICKENPOX_16=0.6]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QdFHKpoInHoi for <dmarc@ietfa.amsl.com>; Tue, 16 Jul 2013 22:46:52 -0700 (PDT)
Received: from smtp-out-1.01.com (smtp.01.com [199.36.142.181]) by ietfa.amsl.com (Postfix) with ESMTP id 17A1F21F9D98 for <dmarc@ietf.org>; Tue, 16 Jul 2013 22:46:52 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by smtp-out-1.01.com (Postfix) with ESMTP id 452C1294170; Wed, 17 Jul 2013 00:46:51 -0500 (CDT)
X-Virus-Scanned: amavisd-new at smtp-out-1.01.com
Received: from smtp-out-1.01.com ([127.0.0.1]) by localhost (smtp-out-1.01.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FRqJvWUaGBiy; Wed, 17 Jul 2013 00:46:51 -0500 (CDT)
Received: from smtp-out-1.01.com (localhost [127.0.0.1]) by smtp-out-1.01.com (Postfix) with ESMTP id 1BF49294175; Wed, 17 Jul 2013 00:46:51 -0500 (CDT)
Received: from localhost (localhost [127.0.0.1]) by smtp-out-1.01.com (Postfix) with ESMTP id 05BDA294174; Wed, 17 Jul 2013 00:46:51 -0500 (CDT)
X-Virus-Scanned: amavisd-new at smtp-out-1.01.com
Received: from smtp-out-1.01.com ([127.0.0.1]) by localhost (smtp-out-1.01.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id 3EwSr1SmnrTR; Wed, 17 Jul 2013 00:46:50 -0500 (CDT)
Received: from [10.0.0.12] (c-50-148-182-52.hsd1.ca.comcast.net [50.148.182.52]) by smtp-out-1.01.com (Postfix) with ESMTPSA id 658D0294170; Wed, 17 Jul 2013 00:46:50 -0500 (CDT)
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 6.5 \(1508\))
From: Franck Martin <franck@peachymango.org>
In-Reply-To: <WM!a27235e7553618944267c1b8d1c9cb6d756f6452ae32ad4a5bddc3427867d96c54610a0c02e9683464daf1ff88decaf2!@asav-2.01.com>
Date: Tue, 16 Jul 2013 22:46:48 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <2629C20D-8467-406F-BDC8-D1B313485075@peachymango.org>
References: <20130702052746.15876.qmail@joyce.lan> <51D3464D.2060502@sonnection.nl> <0A91244B-1CAE-491A-865B-E2BA64AFB366@tnpi.net> <51E56928.4020207@gmail.com> <WM!a27235e7553618944267c1b8d1c9cb6d756f6452ae32ad4a5bddc3427867d96c54610a0c02e9683464daf1ff88decaf2!@asav-2.01.com>
To: "J. Trent Adams" <jtrentadams@gmail.com>
X-Mailer: Apple Mail (2.1508)
Cc: "dmarc@ietf.org" <dmarc@ietf.org>
Subject: Re: [dmarc-ietf] Charter improvements
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Jul 2013 05:46:58 -0000

On Jul 16, 2013, at 8:39 AM, J. Trent Adams <jtrentadams@gmail.com> wrote:

> 
> Thanks, everyone, for their input on this thread (and to John for the
> pointer how to get back to land when I blundered into the wrong stream).
> Editing the proposed charter is a lot easier with this feedback.
> 
> From what I can tell, the most important question needing to be answered
> is whether or not revising the base DMARC specification is within scope
> of the proposed work group. Following Russ's guidance, it seems that we
> should start from the assumption that it's not in scope for now given
> the fact that it's being sponsored by an AD as an Individual Submission.
> 
> Regardless of whether that's the right path, or not, let's explore it as
> an option and see how the rest of the items identified in the proposed
> charter play out. Then we can leverage the outcome of the conversation
> to potentially revisit the fate of the base specification itself.
> 
> Given that guidance, here're the most obvious (and noncontroversial?)
> items needing to be done to shore up the proposed charter:
> 
> * Correct the text regarding the current path of the specification.
> * Tone down the "marketing puffery".
> * Clarify how to address "backward compatibility" with the installed base.
> 
> I've already updated the description of the current path of the base
> specification from "Independent Submission" to "Individual Submission",
> so that's one down. I'll pull out my red pen on the other two topics and
> see if I can make them more reasonable.
> 
> Skipping ahead. . . here're the items that have previously been proposed
> as worth exploring in the setting of an IETF work group:
> 
> -----
> * a mechanism for determining the organizational domain name based on an
> arbitrary fully-qualified hostname
> -----
> 
> If I'm not mistaken, the Apps Area WG has already expressed an interest
> in this work. In that case, I believe that this WG would only need to
> track that effort and ensure that its work addresses the use cases
> required to support DMARC.
> 
> QUESTION: Given that it's an important topic, and there's no guarantee
> that the other effort will result in an applicable solution, would it
> still be reasonable to include a mention of this as worth exploration?
> If so, it'd probably make sense to reference the other work as a
> starting point to clarify we're not planning to spin up a competing
> solution.
> 
Isn't it the place where the BCP could answer that question, by giving guidance on how to do it pending a standard?


> -----
> * a mechanism for detecting abuse involving the <display-name> portion
> of the RFC5322.From field
> -----
> 
> This is an interesting item in that there have been some proposals from
> contributors to the base DMARC specification to address this. The
> proposals, as you can see, didn't make it through to a consensus and it
> was suggested that they be brought to the broader community for
> consideration. It's highly likely that through the WG process we're able
> to identify a means by which this issue can be addressed.
> 
> QUESTION: Does it make sense for this proposed WG to explore how the
> base specification can be extended to apply the same level of
> "identifier alignment" to the <display-name> as is helping defend the
> <address-spec>?
> 

why not

> -----
> * a mechanism for mitigating the effect of failures of DMARC policy when
> a message transits a mailing list
> -----
> 
> I recognize that there's definitely a counter-pressure against including
> this topic as it seems to be a potentially quixotic quest. That being
> said, even if we don't find the perfect solution, it does seem
> reasonable to believe there is a way to provide something more than
> nothing that does help in some meaningful way. I'm not presupposing a
> solution, just that there have been a few possible options discussed at
> the edges which are likely to be worth more rigorous exploration.
> 
> QUESTION: Is there value in a WG such as this exploring possible
> solutions to this issue and developing guidance that would potentially
> help improve the utility of the base DMARC specification?
> 

This is a hot topic, and it smells a lot like qmail, but people will want to protect any domain. It seems rather to me the question is once a domain has p=reject what the miscreants do? Where the next protection should be put on? I'm not saying bad stuff happen through mailing lists, I'm saying bad stuff will happen to other domains (and there is a whole bunch coming up). It seems also to me we have the problem of defining what is a mailing list, in a similar way what is an organizational domain. Everyone knows when they see one, but not can define it in a machine parseable way.


> -----
> * support for the notion of transitive trust (i.e., "host X trusted the
> sender of this message, and I trust X, so you should too")
> -----
> 
> I see this as similar to the above, but potentially more broadly
> applicable. One tweak I'd offer would be to replace ", so you should
> too" with something like ", so you could choose to as well".
> 
> QUESTION: Is there value in a WG such as this exploring possible
> solutions to this issue and developing guidance that would potentially
> help improve the utility of the base DMARC specification?
> 

is there transitive trust defined in other IETF documents?

> -----
> * more robust transport of reports
> -----
> 
> After over a year of deployment, and the rise in support services
> handling reports, many folks have suggested that it would be worth
> exploring how to offer additional optional means of transport for
> reports. The base DMARC specification provides for this, but it is an
> area that was left to be extended by a group such as this.
> 
> QUESTION: Is this an area of exploration that is of enough interest to
> include in the charter for this proposed work group?
> 
> Beyond those, the topics in the proposed "Using DMARC" document have
> already proven useful in clarifying some options that aren't typically
> included in a base specification. For example, here a few items that may
> benefit from being specifically called out in the charter as worth
> exploring:
> 
> * Identifier alignment configuration options
> * Implementation decisions regarding "pct"
> * Determining effective RUA sending frequency
> * Leveraging policy caching
> * Various options for integrating within an existing flow
> * Defining a useful, common set of RUA reporting options
> * When and how to use local policy override options

A lot of it is gained thru operational experience, common sense and level of threat. A BCP to help implementation whould answer a lot of these questions

> 
> QUESTION: Do any items on this list seem to be worth specifically adding
> to the proposed charter as examples of the type of work that would be
> useful?
> 
> Finally, this list of potential work items was developed a while ago,
> and it's likely additional possible areas of exploration have surfaced
> since then. Are there any other substantive items that would be worth
> adding to the list? Keeping in mind, of course, that our first cut will
> be to assume that the base specification isn't in scope for now.
> 
> Once the dust settles a bit around these items, I'll take another whack
> at the charter text to at least get it stable for now. Then we can
> bubble up the bigger question and see if we can tackle that given the
> input I've seen recently on other threads.
> 
I have the feeling that DMARC brings the subject of domain reputation and becoming stricter in what we receive. draft-ietf-appsawg-malformed-mail is a step in that direction, but may be we need to examine the problem more broadly of cousin domains and other forms of non direct domain spoofing. What are the tools we have today to handle them?


> Thanks again,
> Trent
>