Re: [dmarc-ietf] Signaling forwarders, not just MLMs

Hector Santos <hsantos@isdg.net> Thu, 13 April 2023 20:22 UTC

Return-Path: <hsantos@isdg.net>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9ECFAC151553 for <dmarc@ietfa.amsl.com>; Thu, 13 Apr 2023 13:22:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=isdg.net header.b="LCqepUCQ"; dkim=pass (1024-bit key) header.d=beta.winserver.com header.b="teSNvhmd"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id T7ee5rjfl8FY for <dmarc@ietfa.amsl.com>; Thu, 13 Apr 2023 13:22:28 -0700 (PDT)
Received: from mail.winserver.com (mail.winserver.com [3.137.120.140]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 49DBBC152A07 for <dmarc@ietf.org>; Thu, 13 Apr 2023 13:22:28 -0700 (PDT)
DKIM-Signature: v=1; d=isdg.net; s=tms1; a=rsa-sha256; c=simple/relaxed; l=1765; t=1681417339; atps=ietf.org; atpsh=sha1; h=Received:Received:Received:Received:Subject:From:Date: Message-Id:To:Organization:List-ID; bh=X+inBjXxOCYucWzHjpYYSsCY0 +tYxfPyaDT2aQH5c50=; b=LCqepUCQy6md54GoKsqikT8+n0Mx7fWAQj2QfYp1w nCQrg6floBZ13GaKxNlguXwfJB7G2KA/moXuP/PS0dY+kUs4Z7P5tG/7Xen8SWnl dkAS5nAFpiFCXPvajHcwT4gZUFIIBKX/vWig20bg+aL5YVJKtsrteRyuq2kTTZLG js=
Received: by winserver.com (Wildcat! SMTP Router v8.0.454.13) for dmarc@ietf.org; Thu, 13 Apr 2023 16:22:19 -0400
Authentication-Results: dkim.winserver.com; dkim=pass header.d=beta.winserver.com header.s=tms1 header.i=beta.winserver.com; dmarc=pass policy=reject author.d=isdg.net signer.d=beta.winserver.com (atps signer);
Received: from beta.winserver.com ([3.132.92.116]) by winserver.com (Wildcat! SMTP v8.0.454.13) with ESMTP id 1810135723.1.6272; Thu, 13 Apr 2023 16:22:17 -0400
DKIM-Signature: v=1; d=beta.winserver.com; s=tms1; a=rsa-sha256; c=simple/relaxed; l=1765; t=1681417335; h=Received:Received: Subject:From:Date:Message-Id:To:Organization:List-ID; bh=X+inBjX xOCYucWzHjpYYSsCY0+tYxfPyaDT2aQH5c50=; b=teSNvhmdtbdFiSRWb4e4FGS 3SI7Qi9nj47ImnScBWdPdw7hcva+n5BpcUXRiBY1vhOI9hYZh37wbt9JCcCHQrVV H9DTiru8jP5vDVzO6uVGSZIITRgGsINbhm/fruO/ZRs8MxgAt7fuB44UvGibVXyg eFaidrAm1patxjeMaEq8=
Received: by beta.winserver.com (Wildcat! SMTP Router v8.0.454.12) for dmarc@ietf.org; Thu, 13 Apr 2023 16:22:15 -0400
Received: from smtpclient.apple ([99.122.210.89]) by beta.winserver.com (Wildcat! SMTP v8.0.454.12) with ESMTP id 2256171066.1.18968; Thu, 13 Apr 2023 16:22:14 -0400
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3731.400.51.1.1\))
From: Hector Santos <hsantos@isdg.net>
In-Reply-To: <64385461.3090106@isdg.net>
Date: Thu, 13 Apr 2023 16:22:02 -0400
Cc: Barry Leiba <barryleiba@computer.org>, dmarc@ietf.org, superuser@gmail.com
Content-Transfer-Encoding: quoted-printable
Message-Id: <68EAC331-7B26-4C9A-AE82-053697469317@isdg.net>
References: <CAL0qLwYbbLLq-qLg_Wnp5aFw_2my4UTZz3U3LjwbCmpMNdudfA@mail.gmail.com> <20230413151342.B96D0BF17F1F@ary.qy> <CALaySJKM5Kct0u0ekuEBS=DVQTXG_CiewpzNwVyPiAaQ9zx3VA@mail.gmail.com> <64385461.3090106@isdg.net>
To: Hector Santos <hsantos@isdg.net>
X-Mailer: Apple Mail (2.3731.400.51.1.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/dvtVlf0ZuWSXbzQS5GlAOLtc3Hg>
Subject: Re: [dmarc-ietf] Signaling forwarders, not just MLMs
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 13 Apr 2023 20:22:32 -0000

> On Apr 13, 2023, at 3:13 PM, Hector Santos <hsantos=40isdg.net@dmarc.ietf.org> wrote:
> 
> On 4/13/2023 11:21 AM, Barry Leiba wrote:
>>> Anyone who does forwarding is damaged by DMARC because there are a lot of
>>> people who do DMARC on the cheap with SPF only.
>> This brings up another issue, I think: that there should also be
>> stronger advice that using DKIM is critical to DMARC reliability, and
>> using SPF only, without DKIM, is strongly NOT RECOMMENDED.
>> 
> Keep in mind, there are implementers of SPF that act at SMTP before DATA and reject hard failures with 55z errors.  In other words, no payload is transferred.
> 


Let me expand on this:

First, SPF predated DMARC. 

DMARC as a payload protocol, like any other payload protocol have high overhead associated with it;  DKIM, ADSP, ATPS, DMARC processing.  

Nothing to worry about at low scale and nothing to worry about at high scale if optimized correctly, and that is by allowing SPF to pre-empt payload processing when there is a hard SPF failure.  That’s good. Not Bad. In 18 years of SPF,  I maybe had 1 false positive.

But even then with introduction of DMARC, I recognized the domain policy may be p=none or p=quarantine.

Therefore I propose RFC 4405 SUBMITTER protocol to pass the PRA at MAIL FROM

C: MAIL FROM:<return-path> SUBMITTER=pra

Where the PRA is the 5322.From address.

The allow SMTP to check the DMARC policy at SMTP. helping it how to handle SPF rejections.

Please let’s make this Protocol Complete.   If DMARC requires SPF to be delayed until the DATA state, then you are talking about an anti-scaling feature. Use SUBMITTER to pass the PRA.

—
HLS