Re: [dmarc-ietf] easier DKIM, DMARC2 & SPF Dependency Removal

Alessandro Vesely <vesely@tana.it> Mon, 26 June 2023 16:14 UTC

Return-Path: <vesely@tana.it>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 88E02C151995 for <dmarc@ietfa.amsl.com>; Mon, 26 Jun 2023 09:14:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, NICE_REPLY_A=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=neutral reason="invalid (unsupported algorithm ed25519-sha256)" header.d=tana.it header.b="ih1ZujNV"; dkim=pass (1152-bit key) header.d=tana.it header.b="Cx7CqSPF"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XhJHXTrEMrYJ for <dmarc@ietfa.amsl.com>; Mon, 26 Jun 2023 09:14:01 -0700 (PDT)
Received: from wmail.tana.it (wmail.tana.it [94.198.96.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 854D8C1516F3 for <dmarc@ietf.org>; Mon, 26 Jun 2023 09:13:57 -0700 (PDT)
DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=tana.it; s=epsilon; t=1687796034; bh=nDatzLihBPKE3lRpZgQ18M4UYzfMqsLJX33V4bftctw=; h=Author:Date:Subject:To:References:From:In-Reply-To; b=ih1ZujNVP32bQ4jlsMiK0csQ7jHo0ZQt92JVzhAJo99FSrsvr2dmgzQHzURCj78t6 wSoiGLif8jm/bwMepoGCw==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=tana.it; s=delta; t=1687796034; bh=nDatzLihBPKE3lRpZgQ18M4UYzfMqsLJX33V4bftctw=; h=Date:Subject:To:References:From:In-Reply-To; b=Cx7CqSPFwNIsk8ttMZW1iIrxFiYaYuIRDwUyz+OZemlsA8/6Letm8qkcaBlcn0PfP zSEmNcU9dNf3IiIyyY2xRQIlL3FippgRTD7PCkS2CNbotlW6aNyZ2hjMGJSvYFCOdH +MDeKZ405ehheTr+v/PE7Sd094UdZ/eBTQ7O3tZBy+6ljeq1IBbDVZcmYs5DA
Original-Subject: Re: [dmarc-ietf] easier DKIM, DMARC2 & SPF Dependency Removal
Author: Alessandro Vesely <vesely@tana.it>
Received: from [172.25.197.111] (pcale.tana [172.25.197.111]) (AUTH: CRAM-MD5 uXDGrn@SYT0/k, TLS: TLS1.3, 128bits, ECDHE_RSA_AES_128_GCM_SHA256) by wmail.tana.it with ESMTPSA id 00000000005DC028.000000006499B941.00004F32; Mon, 26 Jun 2023 18:13:53 +0200
Message-ID: <b78cb14a-d641-fabd-a67c-f099b8fae3f9@tana.it>
Date: Mon, 26 Jun 2023 18:13:53 +0200
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.11.0
Content-Language: en-US, it-IT
To: dmarc@ietf.org
References: <20230623021810.E5F8DF9B3B94@ary.qy> <6495D504.4090809@isdg.net> <839aa10b-f7fa-c7a2-76db-6441189afca2@dusatko.org> <CALaySJ+gcVvpzJcrpUbOkOvjUFAhzw=pZovpZC7BhW_x7VW7nA@mail.gmail.com>
Authentication-Results: tana.it; auth=pass (details omitted)
From: Alessandro Vesely <vesely@tana.it>
In-Reply-To: <CALaySJ+gcVvpzJcrpUbOkOvjUFAhzw=pZovpZC7BhW_x7VW7nA@mail.gmail.com>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/ZH93-rKkSzUgiUD9OdEhewp_zaU>
Subject: Re: [dmarc-ietf] easier DKIM, DMARC2 & SPF Dependency Removal
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 26 Jun 2023 16:14:09 -0000

On Mon 26/Jun/2023 14:51:34 +0200 Barry Leiba wrote:
> If we consider this sort of thing, I want to push to keep one thing
> off the table:
> 
> Saying that SPF *and* DKIM *both* have to pass is a VERY BAD approach.
> Let's please just remove that from consideration.  It has not been in
> DMARC up to this point, and it would be really bad to add it.
> Deliverability would be worse than ever because we would get the worst
> of both: fragility of SPF when messages are relayed/forwarded, *and*
> problems caused by misconfigurations in *either* SPF *or* DKIM.


I agree it'd be an extreme setting.  It could only make sense in very extreme 
cases.  However, in those cases it might make sense.

In addition, if ARC-driven forwarding setups will gain the ability to override 
DMARC, at least for established forwarding paths, the forwarding prohibition 
would then be softened.  After all, spf-all requires a comparable behavior 
(except that SPF allows intermediate results) and many domains use it 
satisfactorily.

The conundrum is protecting users from self-injury versus unleashing the full 
power of the combined mechanisms.


> I can accept some mechanism for the sender to say "SPF only", "DKIM
> only", or "either SPF or DKIM".  I cannot except a version of DMARC
> where *both* must pass.


Frankly, I cannot imagine the usefulness of auth=spf only.  People who don't 
implement DKIM or don't like it don't bother publishing a policy to explicitly 
excluding it.  It's enough not to sign.  Excluding DKIM would be useful if keys 
have been compromised, an they have a long lifetime while, by chance, DMARC 
policy is given with TTL 3600.  It doesn't seem to be realistic.

Still, I'd allow that possibility for symmetry reasons.


Best
Ale
--