Re: [dmarc-ietf] easier DKIM, DMARC2 & SPF Dependency Removal

Douglas Foster <dougfoster.emailstandards@gmail.com> Tue, 27 June 2023 11:58 UTC

Return-Path: <dougfoster.emailstandards@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9C74FC13AE3C for <dmarc@ietfa.amsl.com>; Tue, 27 Jun 2023 04:58:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.094
X-Spam-Level:
X-Spam-Status: No, score=-2.094 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Pmu352i56Tib for <dmarc@ietfa.amsl.com>; Tue, 27 Jun 2023 04:58:41 -0700 (PDT)
Received: from mail-lf1-x132.google.com (mail-lf1-x132.google.com [IPv6:2a00:1450:4864:20::132]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A5CE3C13AE3A for <dmarc@ietf.org>; Tue, 27 Jun 2023 04:58:41 -0700 (PDT)
Received: by mail-lf1-x132.google.com with SMTP id 2adb3069b0e04-4f8777caaa1so6146849e87.3 for <dmarc@ietf.org>; Tue, 27 Jun 2023 04:58:41 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20221208; t=1687867119; x=1690459119; h=to:subject:message-id:date:from:in-reply-to:references:mime-version :from:to:cc:subject:date:message-id:reply-to; bh=GT7aP3suNtrdcovk5BjKXp9rK5deJ/kDMKzG/uCovmI=; b=TNtILFVyYBNg+uRcwM+nycp8ukCOrKSZI5swWEC/TEk3bBKaUFDvU5/FLPHCLoZb/q FhYApRJyqXjenKAgMBGFQ3r7l+AQEMyMeAy+kF8MfefAkNpuRIuvpKGwJJnGSLnI5mNt g8eqUcsEf5y8Fqqr5TPLIDm46niXYm0bEFlO2+Avp522yaq7UgZxeqPz4qu9A75r9aCE bvSnmOgGuBV3siO9Njl1391Eaa8M3Sb8rU6Ewk2phx80wDNvTJAsbATDh9Ai7eQkP5Z7 HyxAN/JGtj7+DHGei+YL7D1dZUMKXeWGYvAStMRJM26uOstPtKzsv9VVJBhmkjQ7Hl5c K8gw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1687867119; x=1690459119; h=to:subject:message-id:date:from:in-reply-to:references:mime-version :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=GT7aP3suNtrdcovk5BjKXp9rK5deJ/kDMKzG/uCovmI=; b=ftiEl55mUGzcUBoaf8eEEpheMLcG98XOg++/Ra5aWi2S1Bq9/53fXxU2vIaNmvholf 1BPHzhAzc5IbsceKjrXOYC8qVjWp29wWSyBmKSeiiZzTMUsRo84S2VVunsh/fB+6AJUs c4j/wbogNjfviKP2GNpMq6dC3CEIlW/ZqlyGVWYQg8ZG5g5wixCY0x4a7VOPi/TlQTH2 w0ioGRoq3mAaXvBT0ndeeiiAhP1ePF5VSK0EujM7BmjWJlh3NERJ1M5EENqnW9xGxQT5 neAMv17KFHIZIWDCBsiuCGwrs8HnHK8b1Bgj9Q9GVF/ts1D4lvOI2S7NjHd741bZjVbj nD+w==
X-Gm-Message-State: AC+VfDxz3ibZ9HP2ACxKxEaFQ/1ULTxOv0D/klrqB1KusF8cvDvmeo6u u3Vmuyoh8Z6a2Y0i/gZuRjATfzztYLIC3oU9xKlDP3Ck
X-Google-Smtp-Source: ACHHUZ77crvv50E74oJTYGpKq9jAJTzEJhchQ+F4YewjiOrm5iuUGZXNnaeRZcvOffzXwJPjncIViDEoBLgr8v9TC5g=
X-Received: by 2002:a05:6512:280b:b0:4f9:5592:7450 with SMTP id cf11-20020a056512280b00b004f955927450mr4685271lfb.23.1687867119189; Tue, 27 Jun 2023 04:58:39 -0700 (PDT)
MIME-Version: 1.0
References: <20230623021810.E5F8DF9B3B94@ary.qy> <6495D504.4090809@isdg.net> <839aa10b-f7fa-c7a2-76db-6441189afca2@dusatko.org> <CALaySJ+gcVvpzJcrpUbOkOvjUFAhzw=pZovpZC7BhW_x7VW7nA@mail.gmail.com> <CAL0qLwasxzqJt7Hr7gZd86C=ivCrDUci_i6pkJJUTnqzL1pHMA@mail.gmail.com> <CALaySJ+gjR6D-OSE_07iSH2zXa7wypUQwPN1cL-1s+NC2S4L8g@mail.gmail.com> <99e1ef2d-053b-8cfe-f369-fa8475d142ae@tana.it>
In-Reply-To: <99e1ef2d-053b-8cfe-f369-fa8475d142ae@tana.it>
From: Douglas Foster <dougfoster.emailstandards@gmail.com>
Date: Tue, 27 Jun 2023 07:58:28 -0400
Message-ID: <CAH48ZfwB-U_c=8KFcvSpSp-oXo4esy=x=cSgrWE6k4aF2hfFog@mail.gmail.com>
To: IETF DMARC WG <dmarc@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000001140a305ff1b307e"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/_KJmZ-Oaa2oXdeXczR0gEoyM8Lw>
Subject: Re: [dmarc-ietf] easier DKIM, DMARC2 & SPF Dependency Removal
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 27 Jun 2023 11:58:42 -0000

Ale, here is an attempt at a formal model.   Application to the current
question is at the very end.

Any test (DKIM, SPF, ARC) has these result possibilities:

   - Pass
   - No data or uncertain result
   - Fail


The test results are imperfect, so we have to consider these probabilities

Probability that PASS is a correct result
       Probability that a false PASS will be whitelisted or not blocked in
content filtering
             Net result that a false PASS is delivered to the user

Probability that a NoData / Uncertain result is correct (presumed 100%).
      Probability that an Uncertain message is wanted or unwanted.
          Probability that an unwanted message is or is not blocked by
content filtering
               Net probability that an unauthenticated and unwanted message
is delivered to the user

Probability that FAIL is a correct result
      Probability that a FAIL result is blocked by local policy (presumed
100%)
           Probability that a false FAIL is actually wanted
                  Net probability that false FAIL blocks a wanted message

My strategy is documented in my "Best Practices" draft submission.   To
summarize my experience:
- The frequency of a true PASS is high, so the probability of a false PASS
is low
- The probability of a false PASS being detected by content filtering is
pretty good.
- The frequency of a true FAIL is low, so the probability of a false FAIL
is high.
- Uncertain messages have a high percentage of unwanted messages, but also
a non-trivial volume of wanted messages.

My conclusions:

   - FAIL messages should be submitted to content filtering to collect more
   data
   - Blocking on FAIL alone, despite content filtering PASS, has always
   caused me more harm than good.
   - Treating UNCERTAIN as equivalent to PASS is harmful.  Uncertain
   messages can be as unwanted as FAIL.
   - FAIL and UNCERTAIN messages need to be reviewed and confirmed.   When
   confirmed, the message is allowed or blocked based on local policies which
   are informed but not controlled by the sender's published policies.
   - Quarantine on FAIL or UNCERTAIN is superior to Block, because it
   allows for ambiguity to be removed and policy rules to be updated
   - When FAIL and UNCERTAIN volumes are too high, an arbitrary disposition
   can be applied immediately, but statistical sampling should be used to
   review the disposition decision after the fact, so that local policies can
   be updated.

Application to the current AUTH proposal:

   - I expect SPF AND DKIM will cause sender policies to be less
   believable, because a high rate of FAIL will occur on wanted messages, so I
   expect to treat SPF AND DKIM as SPF OR DKIM by local policy.
   - I trust DKIM more than SPF so I see no reason to honor SPF ONLY. I
   will continue to apply SPF OR DKIM .
   - I see the advantages of DKIM ONLY and will honor that policy when it
   is detected.

Doug Foster



On Tue, Jun 27, 2023 at 6:36 AM Alessandro Vesely <vesely@tana.it> wrote:

> On Mon 26/Jun/2023 20:13:53 +0200 Barry Leiba wrote:
> > I'm saying I don't want "and" to be an option, because I think it's
> > damaging to DMARC.  There is no reason anyone should ever want to say
> > that, and providing the option asks for misconfigurations because
> > people think it's somehow "more secure".  It's not more secure.  It
> > would be very bad for deliverability of legitimate mail and would
> > provide no additional security.  It would be a terrible mistake.
>
>
> I've been sporting spf-all for years, and seldom experienced bounces,
> mostly
> due to misconfigured secondary MXes.  Out of 39 domains whose posts to
> this
> list in the past year are still in my inbox, 14 have spf-all.  So, while
> I'm
> not the only one, not many published -all even though it may seem to be
> somehow
> more secure.
>
> I think it can be worth to compare SPF and DMARC.  Another sender policy a
> decade and an authentication method after.  What adoption, what hype.
>
> Both policies ask receivers to reject a domain identifier in some cases.
> RFC
> 7208 explicitly suggests to consider whitelisting (Appendix D).  DMARC
> provides
> for overrides but is less clear about how to handle exceptions.  After SPF
> broke forwarding, the reaction was split between some changing identifier
> and
> turning to ~all; after DMARC broke mailing lists, between changing
> identifier
> and not altering messages.  In my limited experience, the ratio seems to
> be
> higher for DMARC than SPF, but I may be wrong.
>
> In theory, domains that currently have a strict DMARC policy and spf-all,
> 6 of
> the above, should have their messages blocked when either method fails, up
> to
> changing identifiers.  Why would it be so bad for deliverability to
> additionally require DMARC alignment, which is the difference between that
> and
> the "and"?
>
> And, it seems to me that an ESP not having a bloated SPF record could stop
> a
> good deal of DKIM replay by resorting to auth=dkim+spf.  Besides
> collateral
> deliverability problems, why wouldn't that work?
>
> Wht would "and" damage DMARC more than -all damaged SPF?
>
> I hope we can discuss detailed criticism rather than vague ostracism.
>
>
> Best
> Ale
> --
>
>
>
>
>
> _______________________________________________
> dmarc mailing list
> dmarc@ietf.org
> https://www.ietf.org/mailman/listinfo/dmarc
>