[dmarc-ietf] Fwd: Summary: Search for some consensus, was: Proposed text for p=reject and indirect mail flows

Scott Kitterman <sklist@kitterman.com> Fri, 07 July 2023 03:57 UTC

Return-Path: <sklist@kitterman.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7A376C15106A for <dmarc@ietfa.amsl.com>; Thu, 6 Jul 2023 20:57:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.097
X-Spam-Level:
X-Spam-Status: No, score=-7.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=neutral reason="invalid (unsupported algorithm ed25519-sha256)" header.d=kitterman.com header.b="8IKnl4IE"; dkim=pass (2048-bit key) header.d=kitterman.com header.b="TdXgWr7a"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AU8YzkEMNPNG for <dmarc@ietfa.amsl.com>; Thu, 6 Jul 2023 20:57:16 -0700 (PDT)
Received: from interserver.kitterman.com (interserver.kitterman.com [IPv6:2604:a00:6:1039:225:90ff:feaa:b169]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F3622C153CA0 for <dmarc@ietf.org>; Thu, 6 Jul 2023 20:57:15 -0700 (PDT)
Received: from interserver.kitterman.com (interserver.kitterman.com [IPv6:2604:a00:6:1039:225:90ff:feaa:b169]) by interserver.kitterman.com (Postfix) with ESMTPS id 1A7D4F80273 for <dmarc@ietf.org>; Thu, 6 Jul 2023 23:57:03 -0400 (EDT)
DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/simple; d=kitterman.com; i=@kitterman.com; q=dns/txt; s=201903e; t=1688702207; h=from : to : subject : date : message-id : mime-version : content-type : content-transfer-encoding : from; bh=f0i8x7NdMJ1v/CxbMo0BwjYvV2G+y7SuL/r90sUoaGI=; b=8IKnl4IE5ZpG7J4dxXgfWGzscL4fx4XiUbmWET5b7xzOUyqln8aUSz0dhaWsMiuY/UzXu bxyVUbFvyaVnSe2AA==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kitterman.com; i=@kitterman.com; q=dns/txt; s=201903r; t=1688702207; h=from : to : subject : date : message-id : mime-version : content-type : content-transfer-encoding : from; bh=f0i8x7NdMJ1v/CxbMo0BwjYvV2G+y7SuL/r90sUoaGI=; b=TdXgWr7a7yNRgouO8VrSnPy48l5Znho/N80S+hV5sM7teFhavSJFNEJ90aXaU8x7yKXma wunuhjX/El6h+r9zKHJ4lOOKoDhb0cambZrQmb1caq1ooMY6nB7RnhtIFpVSz+aho2f7YFb GDb2eE6KkIhqGfM01yYSCpygqRuWG6z1NHaeSkCJzKvo12b8CHVrUs0y2eNl0/W4ARrZCgY adMU6f5oPCxUVE4WDWm+AXt2yYgkHnSzSwmzomsinjLTJxj01mELWeXoVaimnWj/e0l2KVa wpdG0beS5zySwI938k6qARzFdmmHBMk5MvkjrMcZvCXK1C49tySpbeafu2Cw==
Received: from localhost.localnet (static-72-81-252-22.bltmmd.fios.verizon.net [72.81.252.22]) by interserver.kitterman.com (Postfix) with ESMTP id BD056F8016D for <dmarc@ietf.org>; Thu, 6 Jul 2023 23:56:47 -0400 (EDT)
From: Scott Kitterman <sklist@kitterman.com>
To: dmarc@ietf.org
Date: Thu, 06 Jul 2023 23:56:43 -0400
Message-ID: <3669240.gKWFr1zo23@localhost>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="nextPart5392133.LQvYE46atQ"
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/hgW7P5jcEl12b2MScnBu0AJ90Q0>
Subject: [dmarc-ietf] Fwd: Summary: Search for some consensus, was: Proposed text for p=reject and indirect mail flows
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 07 Jul 2023 03:57:20 -0000

As you prepare for the meeting, I'm reposting the attached summary from April 
when I tried to explore where there might be some consensus on the 
interoperability question.  In it, I tried out the generic formulation:

> [some appropriate description] domains MUST NOT publish restrictive DMARC
> policies due to interoperability issues

I think Barry's new suggestion is broadly aligned to this approach, although 
less concise.  Personally, I think the details need work, but I could 
generally live with it.

We also need to address the subordinate protocol data reliability question and 
I still intend to write something up on that, but not today.

Finally, we now have an Interoperability Issues section followed immediately 
by an Interoperability Considerations section.  Maybe you could workshop 
different terms for one or both of those on the hallway track.

Scott K

--- Begin Message ---
On Tuesday, April 25, 2023 2:27:18 PM EDT Scott Kitterman wrote:
> On Tuesday, March 28, 2023 4:15:04 AM EDT Barry Leiba wrote:
> > I raised this issue in the DMARC session in Vienna, and have let it
> > sit for a while so as not to derail other discussion.  As we're pretty
> > close to finished with the DMARCbis document, I'd like to raise it
> > again, this time with specific proposed text for us to discuss.
> > 
> > And so:
> > 
> > OLD
> > 
> >    5.5.6.  Decide If and When to Update DMARC Policy
> >    
> >    Once the Domain Owner is satisfied that it is properly authenticating
> >    all of its mail, then it is time to decide if it is appropriate to
> >    change the p= value in its DMARC record to p=quarantine or p=reject.
> >    Depending on its cadence for sending mail, it may take many months of
> >    consuming DMARC aggregate reports before a Domain Owner reaches the
> >    point where it is sure that it is properly authenticating all of its
> >    mail, and the decision on which p= value to use will depend on its
> >    needs.
> > 
> > NEW
> > 
> >    5.5.6.  Decide If and When to Update DMARC Policy
> >    
> >    Once the Domain Owner is satisfied that it is properly authenticating
> >    all of its mail, then it is time to decide if it is appropriate to
> >    change the p= value in its DMARC record to p=quarantine or p=reject.
> >    Depending on its cadence for sending mail, it may take many months of
> >    consuming DMARC aggregate reports before a Domain Owner reaches the
> >    point where it is sure that it is properly authenticating all of its
> >    mail, and the decision on which p= value to use will depend on its
> >    needs.
> >    
> >    It is important to understand that many domains may never use
> >    policies of “quarantine” or “reject”, and that these policies are
> >    intended not as goals, but as policies available for use when they
> >    are appropriate.  In particular, “reject” is not intended for
> >    deployment in domains with users who send routine email, and its
> >    deployment in such domains can disrupt indirect mail flows and cause
> >    damage to operation of mailing lists and other forwarding services.
> >    This is discussed in [RFC7960] and in Section 5.8, below.  The
> >    “reject” policy is best reserved for domains that send only
> >    transactional email that is not intended to be posted to mailing
> >    lists.
> >    
> >    To be explicitly clear: domains used for general-purpose email MUST
> >    NOT deploy a DMARC policy of p=reject.
> > 
> > END
> > 
> > I'm well aware that the MUST will *not* be followed by everyone, and
> > that some domain owners will feel that they need to use p=reject,
> > regardless.  I think that's fine: the standard should specify what's
> > right for interoperability, and I believe that improper use of
> > p=reject is extremely harmful to interoperability... so "MUST" is
> > correct here.  And no one will be arrested or fined for choosing not
> > to follow it.  We should still say it, nonetheless.
> > 
> > OK, have at it.
> 
> I'm going to take another stab at this, starting back at the top of the
> thread since things went off the rails.
> 
> This is an attempt to see if we can focus in on getting some agreement on a
> path forward on this question.  If I may generalize for a moment, it seemed
> to me that there are roughly two sets of perspectives on this (with
> considerable variation within each set, of course).  One set is from people
> primarily focused on the security benefits associated with use of
> restrictive DMARC policies such as p=reject.  The other set is from people
> primarily focused on the interoperability impacts associated with some
> domains using such restrictive policies.
> 
> For many, the security benefit is the primary purpose of DMARC.  Without it,
> it's relatively pointless.  On the other hand, interoperability is a
> significant reason the IETF exists.  Without interoperability, the IETF is
> relatively pointless.  I am starting from the assumption that people are
> prioritizing different things differently in good faith.  Disagreement is
> normal for something like this.
> 
> For those of you that are new or perhaps relatively new to the IETF, I would
> comment RFC 7282 to you for background, particularly paragraph 3 [1] as I
> think it is a great discussion of the IETF way to work through a path
> forward.
> 
> The TLDR version is trying to find something we can live with, not something
> we would prefer.  There's clearly no overlap between the preferences of the
> people in the two groups I described above.  If anyone doubts that, I
> encourage you to consult the list archive for the last month.  The question
> is, can we get to something that people from both groups can live with and
> adequately address any technical points that are raised.
> 
> My recollection is that a general formulation that I proposed had at least
> some traction out of both groups:
> > [some appropriate description] domains MUST NOT publish restrictive DMARC
> > policies due to interoperability issues
> 
> Leaving aside (for now) the question of what goes into [some appropriate
> description] and with the assumption that there will be some non-normative
> discussion to amplify whatever that is and probably give some indication
> about what domains might do to not be one of those domains, is there anyone
> who just can't live with that formulation of the situation?
> 
> If you can't, please also make a suggestion of an alternative that you can
> live with and why you think people in the group you are not a member of
> should be able to accept it.

Over the last 4 days there have been 34 responses to this message from seven 
different people.  I think it's been useful. The comments directly related to 
my original question seem to have died down, so I thought it might be a good 
time to try to summarize.

As a reminder, the question I posed was about objections (can't live with it) 
to using a construct like this to address the core DMARC interoperability 
issue (with the definition of "some appropriate description" deferred for later 
as well as some non-normative amplification):

> [some appropriate description] domains MUST NOT publish restrictive DMARC
> policies due to interoperability issues

There were two responses in the thread to the effect that "I can't live with 
it" (and some additional apparent support for one fo them).

The first alternative suggested was:

> Domains owners who have users who individually request 3rd parties to emit
> mail as an address within the domain MUST NOT publish a restrictive DMARC
> policy if they wish to support their users' usage of any potential 3rd
> party. Examples of 3rd parties include mailing lists and email service
> providers. These 3rd parties are not always aware of, or willing to work
> around, DMARC. Domain owners implementing DMARC as a means for governance
> by restricting the unauthorized usage of the domain MUST be aware that not
> all of the 3rd parties will make changes to work around DMARC, resulting in
> interoperability issues for their users' usage of the 3rd parties. Domain
> owners SHOULD provide an alternative address for these users within a
> cousin domain or subdomain that is not directly associated with the
> organization's brand-associated domain that is used for marketing and
> transactional email that needs the security benefits of DMARC. These users
> MUST use an address within a domain that does not have a restrictive DMARC
> policy.

My assessment is that this is a close cousin to my original suggestion.  If I 
were to attempt to distill it down to something parallel to my original 
suggestion, I think it would be along the lines of:

> Domains owners [use case] MUST NOT publish a restrictive DMARC policy
> if they wish to support [use case]. [Lots of explanation].

Distilled down like this, it doesn't seem that different to me and we could 
probably work some something like this and produce something conceptually 
similar.  I understand why this is preferable to some, although I don't 
personally prefer it because I think it's less clear.

The other alternative reverses the logic to shift the emphasis:

> Forcing authentication into Internet mail by publishing restrictive DMARC
> policies breaks some well established patterns of usage.  Publishing such
> policies is thus RECOMMENDED only for domains [in this other appropriate
> description].

I think this approach addresses a different question.  It offers only advice 
about who should publish restrictive policies.  It fails to warn against 
interoperability problems.  I RECOMMEND x for [some] is not the same thing as 
[not some] MUST NOT x.

Additionally, I think the objection isn't technical:

> Me, for one.  Because more than 98% of domains are going to fall into the
> description, however we word it, that statement makes the whole I-D
> nonsensical.  Cannot we just tell the problem without MUSTard?

I don't think burying the lede to encourage adoption is the way we should go.  
I didn't see any other support for this approach.

Ultimately, I'm not a WG chair or an AD, so I'm not in a position to make any 
kind of consensus call.  It does seem to me though that there's a solid 
consensus for some form of statement including "MUST NOT publish a restrictive 
DMARC policy".  I think there's still room for discussion about what goes on 
either end of that phrase.

Thanks to everyone who contributed.  I'll leave this here for the chairs' use 
in deciding a path forward from here.

Scott K


_______________________________________________
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc
--- End Message ---