Re: [dmarc-ietf] Which DKIM(s) should be reported? (Ticket #38)

Alessandro Vesely <> Tue, 26 January 2021 17:01 UTC

Return-Path: <>
Received: from localhost (localhost []) by (Postfix) with ESMTP id 120A33A0B05 for <>; Tue, 26 Jan 2021 09:01:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -0.221
X-Spam-Status: No, score=-0.221 tagged_above=-999 required=5 tests=[DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, NICE_REPLY_A=-0.001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: (amavisd-new); dkim=pass (1152-bit key)
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id OhHmJqfnGaR8 for <>; Tue, 26 Jan 2021 09:01:18 -0800 (PST)
Received: from ( []) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by (Postfix) with ESMTPS id 3EA883A0D04 for <>; Tue, 26 Jan 2021 09:01:12 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;; s=delta; t=1611680471; bh=L0adpvIS0QNhf4f2uJQ93d3OieLS4heLoj+Ch9vbER4=; l=1376; h=To:References:From:Date:In-Reply-To; b=Ad7gnuhW6MIDqVfbZw2JLPusTtes48B+6qthTNSfj1p5nM81CmLphXQl5rwW+rdNW cuEWqnmUlehh/QLhTdz3c8ivGu5DOAYEWxCuiseyc7hMmOg6SYgtSPJdxtnOfG0my4 NFO8t+3K2cGo8oFbJH/3uxGPyVr05i5pp5Lu78CngBR37503gcd7U/ZPBsNlQ
Authentication-Results:; auth=pass (details omitted)
Original-From: Alessandro Vesely <>
Received: from [] (pcale.tana []) (AUTH: CRAM-MD5 uXDGrn@SYT0/k, TLS: TLS1.3, 128bits, ECDHE_RSA_AES_128_GCM_SHA256) by with ESMTPSA id 00000000005DC07E.0000000060104AD6.00006638; Tue, 26 Jan 2021 18:01:10 +0100
References: <> <> <> <> <> <> <>
From: Alessandro Vesely <>
Message-ID: <>
Date: Tue, 26 Jan 2021 18:01:10 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.6.0
MIME-Version: 1.0
In-Reply-To: <>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 8bit
Archived-At: <>
Subject: Re: [dmarc-ietf] Which DKIM(s) should be reported? (Ticket #38)
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Tue, 26 Jan 2021 17:01:20 -0000

On Tue 26/Jan/2021 15:12:57 +0100 Douglas Foster wrote:
> At some point, an investigator will ask, "which of our systems sent these 
> messages?"

Possibly none.  In that case this is either an abuse or a forward.  Or maybe 
the report generator lies.

> I know how to search my logs for messages to domain I do not
> know how to search my logs for messages to domains hosted by
> hostingservice.tld.  That is why I would expect SMTP To domain to be
> useful.

A smart relay can put together in the same message several RCPT commands with 
different domains having the same MX.

> An rua report is not supposed to be substitute for a forensic report.  All 
> possible details are not supposed to be presented.  Source IP, SMTP MailFrom 
> domain, and SPF status should be sufficient to identify the organization 
> responsible for the last hop.  Why is additional mailflow data necessary?

In case of forwarding, the last hop is likely not to be aligned.  Previously in 
this thread you said reporting aligned identifiers only would suffice.  Aligned 
and last hop don't necessarily match.

> The best mail flow data would be to report the entire Received chain, but it 
> would cause too much disaggregation.

If every receiver generated aggregate reports, senders would get the whole 
chain, in different reports.