Re: [dmarc-ietf] I-D Action: draft-ietf-dmarc-failure-reporting-04.txt

Scott Kitterman <sklist@kitterman.com> Thu, 18 August 2022 15:08 UTC

Return-Path: <sklist@kitterman.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 720E5C152716 for <dmarc@ietfa.amsl.com>; Thu, 18 Aug 2022 08:08:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.107
X-Spam-Level:
X-Spam-Status: No, score=-7.107 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=neutral reason="invalid (unsupported algorithm ed25519-sha256)" header.d=kitterman.com header.b=Mr2frEK2; dkim=pass (2048-bit key) header.d=kitterman.com header.b=AKRLbGyw
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ccXQtUomcyXQ for <dmarc@ietfa.amsl.com>; Thu, 18 Aug 2022 08:08:11 -0700 (PDT)
Received: from interserver.kitterman.com (interserver.kitterman.com [64.20.48.66]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AFB62C1522B6 for <dmarc@ietf.org>; Thu, 18 Aug 2022 08:08:11 -0700 (PDT)
Received: from interserver.kitterman.com (interserver.kitterman.com [64.20.48.66]) by interserver.kitterman.com (Postfix) with ESMTPS id 8310AF802D8 for <dmarc@ietf.org>; Thu, 18 Aug 2022 11:08:08 -0400 (EDT)
DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/simple; d=kitterman.com; i=@kitterman.com; q=dns/txt; s=201903e; t=1660835288; h=from : to : subject : date : message-id : in-reply-to : references : mime-version : content-transfer-encoding : content-type : from; bh=kiZ+5TJRclckqKRobWLiLsCVuIFvIcvFhfJEcXMNH7Q=; b=Mr2frEK2Njz+F1H7vEjrrLeNfAFEaPYko9l9o0qgfSz36DJGSwUDGUAH81AOLkEsJ4QMp JOHBVqACf1MJSKADg==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kitterman.com; i=@kitterman.com; q=dns/txt; s=201903r; t=1660835288; h=from : to : subject : date : message-id : in-reply-to : references : mime-version : content-transfer-encoding : content-type : from; bh=kiZ+5TJRclckqKRobWLiLsCVuIFvIcvFhfJEcXMNH7Q=; b=AKRLbGywuTtcRsy6zriqRtb3fYLJaq4oLYfSqC+/Qjp8FRtocjc2CXgcdskqfZ5QZHvl5 x6vDTSCfKFtXMQRAr/y9k7GWMZpJbdMekP0Ak+NHyA+DkM60jFSGsus3N2I9Ozv5qcLAOuX ZxfPF+YhLsfDmK3efwullZvnHoFkRlZcTm1kbtAm51WCfAkj8sAF9ZRECVwf9yYdpYCdrXc W6cvoanGo71IGcXkAkeXg4Gd+ieoIdhC1BQohc7WJvV7DyNE+7uCexxGkEUnxWenCCJlmXz BNKgCOneD0rdqTzCJGUIGqftTCtWAgJQQEzSFPX9cAu+LSbx8MSMSRVeJ35Q==
Received: from zini-1880.localnet (static-72-81-252-22.bltmmd.fios.verizon.net [72.81.252.22]) by interserver.kitterman.com (Postfix) with ESMTP id 6A5F0F80153 for <dmarc@ietf.org>; Thu, 18 Aug 2022 11:08:08 -0400 (EDT)
From: Scott Kitterman <sklist@kitterman.com>
To: dmarc@ietf.org
Date: Thu, 18 Aug 2022 11:08:07 -0400
Message-ID: <2865425.PqQoGlAqvt@zini-1880>
In-Reply-To: <20220817151234.7C48547E2C1D@ary.local>
References: <20220817151234.7C48547E2C1D@ary.local>
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/iBDUUCPNyaX14W6SUPuQi1sZce0>
Subject: Re: [dmarc-ietf] I-D Action: draft-ietf-dmarc-failure-reporting-04.txt
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 18 Aug 2022 15:08:16 -0000

On Wednesday, August 17, 2022 11:12:32 AM EDT John Levine wrote:
> It appears that Alessandro Vesely  <vesely@tana.it> said:
> >> There is also an HTML version available at:
> >> https://www.ietf.org/archive/id/draft-ietf-dmarc-failure-reporting-04.htm
> >> l
> >
> >This version requires some revision/ discussion by the WG.
> >
> >In particular, IANA considerations has two subsections which may neew the
> >chairs approval.
> 
> I see no need to invent new IANA registries and oppose the proposed
> registries.
> 
> It redefines the SPF-DNS report item defined in RFC 6591 in a way that is
> neither forward nor backward compatible.  I oppose this change.
> 
> >The concept of debug messages might be dropped or expanded.
> 
> I see no basis for this change either,

I have similar concerns.  Thoughts on the changes in this revision:

I think adding the reference to Section 3.2 about external destination 
verification is good.

RFC 9091 says, "PSD DMARC feedback MUST be limited to Aggregate Reports."  I 
think that should be carried forward and so the SHOULD NOT consider RUF= tags 
should be MUST NOT and the bit after the comma (unless there are ...) needs to 
be deleted.

I agree that 'aggregation techniques' should be changed since there's no 
aggregation involved.  I don't love 'pruning', but I think it's better.

I think the changes in the techniques list is problematic.  I don't see why 
sending a report to only the first recipient was dropped.  I don't think it's 
appropriate to specify only sending debugging messages when there's no 
mechanism for identifying such messages.  In any case, that's more of a 
privacy risk mitigation strategy than a denial of service mitigation.  
Generally for denial of service mitigation during normal operations, debugging 
would be one of the first things to go.

In 3.1 (1) I do not agree with the change to only require DKIM/SPF related 
fields on failure instead of when the message was signed by DKIM or has an SPF 
result.  In the case of partial failures, the information is useful.  
Additionally, the limitation to aligned failures further excludes useful 
information.  The change in 3.1 (2) is also problematic as it is predicated on 
the changes in 3.1 (1).

I think redefining SPF-DNS is a horrible idea.  I agree that, in theory, the 
txt/spf distinction is no longer needed, this would complicate receive 
processing substantially (would need to be able to distinguish between the to 
field formats and to process both) for the very negligible benefit of saving a 
few bits on the wire.

I think the 3.2 change to more fully describe the conditions for the external 
destination verification method is a good one.  

For IANA considerations, I think updating the reference for Identity-Alignment 
to this document is correct.  I don't understand the need for a new 
Authentication Failure Types registry.  To the extent it may be a good idea, I 
think this is the wrong place to do it.  This kind of issue should be 
addressed by any RFC6591bis effort that may be done at some point in the 
future.

Related to the failure reporting discussion for PSDs above, the Privacy 
Considerations section of this draft needs to document the information leakage 
potential associated with failure reporting based on PSD records (which is why 
it needs to be a MUST NOT).

Scott K