Re: [dmarc-ietf] Working Group Last Call: draft-ietf-dmarc-psd

Alessandro Vesely <vesely@tana.it> Sun, 14 July 2019 10:19 UTC

Return-Path: <vesely@tana.it>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8ED1D1200F4 for <dmarc@ietfa.amsl.com>; Sun, 14 Jul 2019 03:19:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.301
X-Spam-Level:
X-Spam-Status: No, score=-4.301 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1152-bit key) header.d=tana.it
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uA0lPpGMKvAU for <dmarc@ietfa.amsl.com>; Sun, 14 Jul 2019 03:19:55 -0700 (PDT)
Received: from wmail.tana.it (wmail.tana.it [62.94.243.226]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 30FA81200E5 for <dmarc@ietf.org>; Sun, 14 Jul 2019 03:19:55 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=tana.it; s=delta; t=1563099593; bh=ffJWAe78xm7Dw+7WkJ6fUPH/LB2J7B6jH9N3Wjjekq0=; l=2383; h=To:References:From:Date:In-Reply-To; b=DKpj3c7a7KR7yWJzAvdWYQJx/UtugbIFrDLyeJdpGs1jJSMuuxB/xY/+B09WJmfHH AEkm5T5Kso/KfMAUNC9zmfKwHt3PbnCtCx1IJjBZQG0fhrGtYLiOSGq9qb9gOFY0jI zd+ddQI7oedlJaE4rcRCVHzqqEpotryaZfKKRegS7LaM+Ny89/0w2IMzUxzJ3
Authentication-Results: tana.it; auth=pass (details omitted)
Received: from [192.168.1.100] ([5.170.9.184]) (AUTH: CRAM-MD5 uXDGrn@SYT0/k, TLS: TLSv1.2, 128bits, ECDHE-RSA-AES128-GCM-SHA256) by wmail.tana.it with ESMTPSA id 00000000005DC050.000000005D2B01C8.000046E9; Sun, 14 Jul 2019 12:19:52 +0200
To: dmarc@ietf.org
References: <CAL0qLwbbz_UhBLsURg=eXhRBC2g9OghiN==T9Uq9pFuLtd=b7w@mail.gmail.com> <1851683.DtEN5jD5Wj@l5580> <c94a1ccd-3d6f-6100-8401-90c78e8b0355@tana.it> <1834844.gVztEOuzS9@l5580>
From: Alessandro Vesely <vesely@tana.it>
Openpgp: preference=signencrypt
Message-ID: <7d6e1a79-2de1-fbdd-d4e1-295681afeeac@tana.it>
Date: Sun, 14 Jul 2019 12:19:50 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.7.2
MIME-Version: 1.0
In-Reply-To: <1834844.gVztEOuzS9@l5580>
Content-Type: text/plain; charset="utf-8"
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/mMzwm_5nOzIsEE-sBxu2XKIPuHA>
Subject: Re: [dmarc-ietf] Working Group Last Call: draft-ietf-dmarc-psd
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 14 Jul 2019 10:19:57 -0000

On Sat 13/Jul/2019 21:06:00 +0200 Scott Kitterman wrote:
> On Saturday, July 13, 2019 1:22:15 PM EDT Alessandro Vesely wrote:
>> On Fri 12/Jul/2019 19:30:35 +0200 Scott Kitterman wrote:
>>> On Thursday, July 11, 2019 6:07:50 AM EDT Alessandro Vesely wrote:
>>>>
>>>> Appendix B.1 lacks a criterion to establish enlisting.  Couldn't we
>>>> require an explicit statement about seizing DMARC reports in, say, the
>>>> delegation report?  Alternatively, that policy can be stated in a
>>>> well-known place under the delegation services URL, so that
>>>> registrants know what they do.
>>>
>>> It's in the appendix because we don't have a clear path forward.  This is
>>> part of the experiment.  We need to be careful though since different
>>> PSDs operate under different authorities and controls, so there is a
>>> point beyond which it's not the IETF that decides.
>>
>> I hypothesized that all what is needed to gran enlistment to a
>> PSO is that its policy to seize DMARC at PSD level be published, 
>> so that registrant can learn about is before registering.  Is
>> that correct?  I mean does a public statement suffice?>>
> 
> In my view the challenge around which PSDs receivers should check for a PSD 
> DMARC record needs to be external to the PSD (i.e. not a self-assertion).


Agreed.  However, even if it were written in the delegation record at
IANA, it would still have to have been initiated by the PSO.  So the
requirement is a sort of validated/ agreed upon self-assertion.


> Some options are presented in Appendix A.  If, as a result of the experiment, 
> it's concluded that self-assertion is acceptable, then all that's needed is to 
> publish the record.  I don't think we need a second place to look up to tell 
> receivers to do the record lookup.


>From an implementer's POV, having a short list to complement the PSL,
to be updated not very often, sounds convenient.  For the algorithm, a
few extra string comparisons are still quicker than one more DNS lookup.

In addition, the organization who publishes that list qualifies as an
authority for monitoring those self-assertions.  It can tell when a
PSO first published its policy, and hence which registrants could have
operated their 2nd or 3rd level domain without being aware of that.
If it's important to preserve mail site operators' rights, that is.


Best
Ale
--