Re: [dmarc-ietf] Is From spoofing an interoperability issue or not?

Laura Atkins <laura@wordtothewise.com> Mon, 17 April 2023 13:34 UTC

Return-Path: <laura@wordtothewise.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4DBE8C15155F for <dmarc@ietfa.amsl.com>; Mon, 17 Apr 2023 06:34:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.095
X-Spam-Level:
X-Spam-Status: No, score=-7.095 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=wordtothewise.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kCi6pMbHm61i for <dmarc@ietfa.amsl.com>; Mon, 17 Apr 2023 06:34:28 -0700 (PDT)
Received: from mail.wordtothewise.com (mail.wordtothewise.com [104.225.223.158]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D3917C15153D for <dmarc@ietf.org>; Mon, 17 Apr 2023 06:34:28 -0700 (PDT)
Received: from smtpclient.apple (unknown [176.61.50.187]) by mail.wordtothewise.com (Postfix) with ESMTPSA id 5156C9F21A for <dmarc@ietf.org>; Mon, 17 Apr 2023 06:34:25 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=wordtothewise.com; s=aardvark; t=1681738465; bh=Io40v2V2ZRAUh19a3NN4LvBtf4e9kKs9SMU1pOvSp8Y=; h=From:Subject:Date:References:To:In-Reply-To:From; b=TlTo5e+oU8sx8Dj1k72gvZRc56NSqjonzDxEFJK6eBPy3Z7v+3nShPD0QXFtv0owf zUluOd4wQ3VDYzSjiHGTfxq+DO6bFBJqLL+2toSsiRwi2itphE9N4mlBc0rGqKSYAC +P5lzNV32phVeS84Sa8v+0P7AF4Whi3u+5lkA9/8=
From: Laura Atkins <laura@wordtothewise.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_47876A2F-50F4-49FE-A4D1-13D3D8C746FC"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3731.500.231\))
Date: Mon, 17 Apr 2023 14:34:13 +0100
References: <4FD1C711-7A7D-40E5-88DE-95CDD248F92B@wordtothewise.com> <CAJ4XoYfQtuavs28FwNrsbD5hBGxnTyVo=E334wJ1QZ-ATfihYg@mail.gmail.com>
To: IETF DMARC WG <dmarc@ietf.org>
In-Reply-To: <CAJ4XoYfQtuavs28FwNrsbD5hBGxnTyVo=E334wJ1QZ-ATfihYg@mail.gmail.com>
Message-Id: <818D8C7B-1E50-41DD-A479-20D32692004F@wordtothewise.com>
X-Mailer: Apple Mail (2.3731.500.231)
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/hx3WGnwkjmRlkbC6CNy8o0N5SVU>
Subject: Re: [dmarc-ietf] Is From spoofing an interoperability issue or not?
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Apr 2023 13:34:33 -0000


> On 17 Apr 2023, at 14:01, Dotzero <dotzero@gmail.com> wrote:
> 
> 
> 
> On Mon, Apr 17, 2023 at 4:30 AM Laura Atkins <laura@wordtothewise.com <mailto:laura@wordtothewise.com>> wrote:
>> Reading through the various discussions about how to document the harm DMARC causes for general purpose domains, I started thinking.One way that a lot of major SaaS providers have chose to deal with DMARC is spoofing their customer’s in the 5322.from Comment string. There are numerous examples of this: Paypal, Docusign, Sage, Intuit are 4 big examples I can think of off the top of my head. 
>> 
>> All of these companies send out financial or business mail on behalf of their customers, some of whom do use p=reject on their own domains. Some of them also use restrictive DMARC policies for this mail, others don’t. 
>> 
>> Is this another issue we should document and make recommendations about? I was thinking along the line that transactional SaaS providers should fully support DMARC and should not allow companies using p=reject in their business mail to access the service? 
> 
> Let's throw the baby out with the bath water. There are ways a (transactional) domain owner can enable a vendor to generate/send email on their behalf without the vendor "spoofing" the domain. A subdomain can be delegated, private DKIM signing keys can be provided. Another approach is routing outbound email from the vendor through the customer's mail servers.  In addition, dedicated sending IPs can be required by the customer. My personal favorite is delegating a subdomain because all of the obligations can easily be specified contractually. In the past when potential vendors have said "we don't do that" or "we can't do that" and I've said "then we can't consider you in our vendor election process", it's amazing how quickly they figure out how to do things if there is enough money on the table. I speak from experience.
> 
> If enough people insist then vendors will productize these approaches into their offerings more generally. It's a competitive differentiator until enough vendors have offerings, at which time it will become the ante to play in the game. So no, suggesting that the only solution is vendors rejecting business from customers who publish p=reject is pretty much a non-starter.

That would be why the first part of my statement was that SaaS providers should fully support DMARC. As in, they should have the ability to provide both SPF and DKIM alignment for customers to implement. Many of them don’t currently do that - and many of us aren’t a billion dollar company and get told “well, sorry, that’s simply not something we find important.” 

>> 
>> I keep going back and forth that this is not an interoperability issue - the mail works fine even when the business is spoofed in the 5322.from comment string. But on a practical level it looks exactly like phishing mail because it’s financial (or contractual) docs from a particular company coming from a random domain. I keep ending up this isn’t an interoperability issue, it’s just an end run around DMARC and it’s not the IETF’s place to comment on that. 
> 
> I could see a discussion in a BCP as to why it's a bad practice. I don't see it having a place in a standard.

Do you really think the IETF has no role in saying ‘if you send mail on behalf of other companies, you should be able to allow that company to authenticate their email in a DMARC compliant way?’

laura 

-- 
The Delivery Experts

Laura Atkins
Word to the Wise
laura@wordtothewise.com		

Email Delivery Blog: http://wordtothewise.com/blog