Re: [dmarc-ietf] DMARC-Compliant Mailing Lists

Scott Kitterman <sklist@kitterman.com> Fri, 08 October 2021 16:45 UTC

Return-Path: <sklist@kitterman.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0A26F3A0821 for <dmarc@ietfa.amsl.com>; Fri, 8 Oct 2021 09:45:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level:
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=neutral reason="invalid (unsupported algorithm ed25519-sha256)" header.d=kitterman.com header.b=12JLTuRx; dkim=pass (2048-bit key) header.d=kitterman.com header.b=d17HruTU
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 33sBVqx-NmGz for <dmarc@ietfa.amsl.com>; Fri, 8 Oct 2021 09:45:37 -0700 (PDT)
Received: from interserver.kitterman.com (interserver.kitterman.com [64.20.48.66]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 137F13A0827 for <dmarc@ietf.org>; Fri, 8 Oct 2021 09:45:37 -0700 (PDT)
Received: from interserver.kitterman.com (interserver.kitterman.com [IPv6:2604:a00:6:1039:225:90ff:feaa:b169]) by interserver.kitterman.com (Postfix) with ESMTPS id D8301F80246; Fri, 8 Oct 2021 12:45:35 -0400 (EDT)
DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/simple; d=kitterman.com; i=@kitterman.com; q=dns/txt; s=201903e; t=1633711535; h=date : from : to : subject : in-reply-to : references : message-id : mime-version : content-type : content-transfer-encoding : from; bh=ZOqNJ9ggELfnKCR+UpKGuhQJ66dwcQogw6AvbdEI1rA=; b=12JLTuRxe3Pv+f4WsJJA4l9RdT15h3hkN9nX+Khi304Fqkef1Vyfz145jY1ih5KY48jYx ByrxUkD+IxksR0/AA==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kitterman.com; i=@kitterman.com; q=dns/txt; s=201903r; t=1633711535; h=date : from : to : subject : in-reply-to : references : message-id : mime-version : content-type : content-transfer-encoding : from; bh=ZOqNJ9ggELfnKCR+UpKGuhQJ66dwcQogw6AvbdEI1rA=; b=d17HruTUN7ASieHtEAClNrv2o522xiWjqKnVkoS9hSu0lWSAkTvujr7roDVuga+BOyAyO dvrEW8tNPGReyLoSfeR97G7o0k9h3TOUbIsYL2WxvCIlYXpF0wyv+g8UdFpUpMqQ1aJLwyy 9nXSI1/+7iplM0meh0Ob300FGON1ihu1DZmshDBxfg79nLxhwFTyOQ6bD7nz0NFN+MG48o/ vOgjI+2siknF+ThmYt+xi9qhnIHZRaj30cOwAhlvIei42NGMu0oT7SLwkka7n7w0S3PyVAW o3noB9wzhEPIHIRKP9c0VlWHXMip8ranjZ+JIZ9JI4Ms3gMtZej4czdb5dkA==
Received: from [127.0.0.1] (static-72-81-252-22.bltmmd.fios.verizon.net [72.81.252.22]) by interserver.kitterman.com (Postfix) with ESMTPSA id 98CA1F801BF; Fri, 8 Oct 2021 12:45:35 -0400 (EDT)
Date: Fri, 08 Oct 2021 16:45:35 +0000
From: Scott Kitterman <sklist@kitterman.com>
To: dmarc@ietf.org
In-Reply-To: <41185d61-6012-678c-0947-3ab0df3d798f@gmail.com>
References: <163330644504.4498.4372063758638317614@ietfa.amsl.com> <c3cf273d-70df-ad7c-c95a-a0c7bd1afdd5@baptiste-carvello.net> <a590a774-f03b-8b48-e587-12c1f510f63f@tana.it> <1804744.4HeO0Q4e3A@zini-1880> <b2e371d7-e4e6-9248-1b4f-1b83ad790d55@gmail.com> <DB3794EB-BA89-4E52-93F4-E011D7352D8B@kitterman.com> <f3ac32d5-aaf0-3a6f-d482-b64f9b40a678@gmail.com> <C8A58AAE-A691-418C-A9FC-8E5E5DBAE4DA@kitterman.com> <41185d61-6012-678c-0947-3ab0df3d798f@gmail.com>
Message-ID: <8EAAF6F4-DA12-4E12-8C1B-D25F7FAE3D9E@kitterman.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/hnLsEAxXiT7HU8_OYc0EmLxTOEI>
Subject: Re: [dmarc-ietf] DMARC-Compliant Mailing Lists
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 08 Oct 2021 16:45:42 -0000


On October 8, 2021 4:31:03 PM UTC, Dave Crocker <dcrocker@gmail.com> wrote:
>On 10/8/2021 9:28 AM, Scott Kitterman wrote:
>> Agreed.  I was confused because it appeared to me that you were directing me there for an answer about DKIM signing and I couldn't find it.
>
> From your note I thought you didn't know about the spec.  (No, that 
>doesn't seem like a reasonable believe on my part, but I'm still working 
>on my second cup of coffee.)
>
>
>> In shorthand terms, Author is the opposite of Sender.  In the existing Sender paradigm From is constant, the mediator would add Sender, which would result in sent by Sender on behalf of From.  Under this proposal the originator includes both From and Author, the mediator mangles From and the result could be sent by From on behalf of Author.  Is that right?
>
>One of the reasons I pointed to the draft is that it discusses the 
>history and semantics of Sender vs. From and makes the case the DMARC 
>forces From to be Sender, but not really From any more. Author seeks to 
>recover a purely From semantic.

Thanks.  That matches my understanding.

My vague recollection is that the reason not to use Sender (implicit or explicit) as the key for ADSP and later DMARC was concern that some MUAs didn't display the explicit Sender (mostly Outlook Express, IIRC).  The original Yahoo! DomainKeys had some sort of a policy component that keyed off Sender.  I haven't gone back and looked anything up to be sure, so no promises.

Maybe that was the right answer all along.  Are MUAs that don't display Sender still a concern?  Do we care?  Maybe keying off Sender instead of From gets us to a similar place without requiring upgrades to every MUA in existence?

Scott K