Re: [dmarc-ietf] Ticket #55 - Clarify legal and privacy implications of failure reports

Dotzero <dotzero@gmail.com> Mon, 28 December 2020 14:12 UTC

Return-Path: <dotzero@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4E3A23A0B6B for <dmarc@ietfa.amsl.com>; Mon, 28 Dec 2020 06:12:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.096
X-Spam-Level:
X-Spam-Status: No, score=-2.096 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dab7_sCuJ058 for <dmarc@ietfa.amsl.com>; Mon, 28 Dec 2020 06:12:41 -0800 (PST)
Received: from mail-qv1-xf2f.google.com (mail-qv1-xf2f.google.com [IPv6:2607:f8b0:4864:20::f2f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 57BD03A0B68 for <dmarc@ietf.org>; Mon, 28 Dec 2020 06:12:41 -0800 (PST)
Received: by mail-qv1-xf2f.google.com with SMTP id et9so4957847qvb.10 for <dmarc@ietf.org>; Mon, 28 Dec 2020 06:12:41 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=+6V9vaxrxdupNZVcfOOycJP6vwuBt0spBLKjeQnrI3A=; b=oJBrjSpK7BqnBQDFebHtyZSSh5yOvxZ5oEH21NTc/gboL8yOuKj5tO+3+L5k9K7p0z qfTI0fHYh9HrT6hKG7T+o3pnd7Q6WgQB3xO2y5QP0n3jluKvlz1Wasg884BnrpwJ9GIP cC4BGSlHPuInLTS65+i7hXIIYW+rC2xR/ml8+xP8lD2Pk6aix13mtS3IsxhBI3KxNGWy 4cSi+WuOB84X80uUXB+qMHxD4JjQjWyfkVWjNp5nQyS1XqfKQan1f6hc5yGbywFH90O3 Am/LlkkFB5awHDb6L8gyQoe420vwUJpQHSJwUbKX8f6Q3bQ8E33bfOo9Ktjt8h1vv6vg +d4g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=+6V9vaxrxdupNZVcfOOycJP6vwuBt0spBLKjeQnrI3A=; b=j+wahKZk6vP0CIAst/Dh7RMJjJAPPUp/Ovk/bfFfrBL/wiy6tb24HQIvkz/UQnUeZc yetjnpmsZYkC+AwGdEq1nnoeJHSYtLgNoIdcJP+/IYZEx54QKxXQ5C9bySVbZ9E1PQvV BZLMzl76Q9c2Yv16X0/uPNyCgWNbXqDgTsVI1DTED2Gb+6MmZTzjqDaN2gP9hQGbEHxO FFTQRNirbNteORFNcvxIEUX5hwCsQ1eHAAlVe+/zniX0Oebnv+RE2p/BrHww6CG8AWsR Qg4ikqxY7x4cUUKTJYSbSstFbBocus7XiTsdTGJhfYgJDWB3YmWkEq0Zy7d7048qATqR 5tRA==
X-Gm-Message-State: AOAM533jAqhiCyUbijB2GWkhuptPojaKYfdamjlokgL0yo2Y+vk4jGDt y1U458HofAsxCTQRGx3tVnpYTi75Pxy7OxK9SJqQ/V7i
X-Google-Smtp-Source: ABdhPJyyMMcC4ga+33zhgtWq+JXvxdzW0PD8Uax5r+VS1YdcKXfPSL1PaYzQYU3RvaDymEK1ooaEiFjMqdI2S4Bp+wc=
X-Received: by 2002:a0c:dc13:: with SMTP id s19mr47568109qvk.26.1609164760456; Mon, 28 Dec 2020 06:12:40 -0800 (PST)
MIME-Version: 1.0
References: <20201218023900.E73B82ACBB2B@ary.qy> <a323077-9b64-555b-3561-62cdc93819fd@taugh.com> <a8281e16-9417-5189-df73-79ea0a865fbd@tana.it> <c713b9ae-a364-1ae0-e79-55f61624aa3d@taugh.com> <3034face-b6fc-0ce2-fa1b-f59210bd6f5b@tana.it> <46339b38-3b24-bcb7-5e73-8a97038ed69@taugh.com> <3997c81d-3b30-0823-a752-fb1d60a44593@tana.it> <74a5c37-19a6-6f6f-a51d-6e5cca5b29e8@taugh.com> <CAJ4XoYdXWTgADpdL1eJuYGnpSY038vj-FW_x1f2rEp1JL0r2oA@mail.gmail.com> <01RTICXKLL3E0085YQ@mauve.mrochek.com> <c5f7413e-52c1-6710-16e5-63f59d2c24b9@taugh.com> <CAL0qLwYDeV9CmFg9qCCGPse00JV30WRiSC4orC-EitK=hiahgA@mail.gmail.com> <a79dd75-4d73-d1dc-d6b1-272de866b950@taugh.com> <CAL0qLwZXu3FxH7QGBS7PGbeDwfDTGmC=rbPEQidVV4eDJNHLUA@mail.gmail.com> <CAJ4XoYeK2cJb+easc=mqCi4ap1932LmbDdfxM1dFZKrdo2a2mw@mail.gmail.com> <acfe3d9e-97eb-50ee-26a2-568fdd8359dd@taugh.com> <CADyWQ+GJ62jt=dL9Gzuw_O7USNbS=86BqAzu8Rdv9sCb5OpCdw@mail.gmail.com> <d4a00be5-bd61-0c05-3431-8d56b39a3550@tana.it> <8813331f-f5e4-faa5-c6d-11212fc25797@taugh.com> <CAHej_8kpT2ooFoJdsj1X+AV90HEA29yABJVp+EhrpJNXxWpnOA@mail.gmail.com>
In-Reply-To: <CAHej_8kpT2ooFoJdsj1X+AV90HEA29yABJVp+EhrpJNXxWpnOA@mail.gmail.com>
From: Dotzero <dotzero@gmail.com>
Date: Mon, 28 Dec 2020 09:12:28 -0500
Message-ID: <CAJ4XoYdFHZEras4JC5K04i+PAukWCTBBnwr0zw_CYwDOAe6Sng@mail.gmail.com>
To: Todd Herr <todd.herr=40valimail.com@dmarc.ietf.org>
Cc: IETF DMARC WG <dmarc@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000eea30805b786dd1f"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/p3jxD-4hofk6Ua4xgGZIkABD9OM>
Subject: Re: [dmarc-ietf] Ticket #55 - Clarify legal and privacy implications of failure reports
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Dec 2020 14:12:43 -0000

On Mon, Dec 28, 2020 at 8:30 AM Todd Herr <todd.herr=
40valimail.com@dmarc.ietf.org> wrote:

> On Thu, Dec 24, 2020 at 1:55 PM John R Levine <johnl@taugh.com> wrote:
>
>>
>> Security considerations
>>
>> Failure reports provide detailed information about the failure of a
>> single message or a group of similar messages failing for the same
>> reason. They are meant to aid domain owners to detect why failures
>> reported in aggregate form occured. It is important to note these
>> reports can contain either the header or the entire content of a
>> failed message, which in turn may contain personally identifiable
>> information, which should be considered when deciding whether to
>> generate such reports.
>>
>>
> Sorry; late to the party due to the holiday...
>
> Is it not also important to note that the recipient of the failure report
> (the domain owner) may not be the originator of the failed message, and
> that fact should also weigh into the consideration of deciding whether to
> generate such reports?
>
> If A publishes a DMARC policy record, and a bad actor sends intentionally
> fraudulent mail using A's domain as the RFC5322.From to addresses that are
> not among A's current customer base, and therefore unknown to A, sending
> failure reports to A that don't redact these email addresses reveals PII to
> A that A has no business receiving.
>
> --
>
> *Todd Herr* | Sr. Technical Program Manager
> *e:* todd.herr@valimail.com
> *p:* 703.220.4153
>
>
> This email and all data transmitted with it contains confidential and/or
> proprietary information intended solely for the use of individual(s)
> authorized to receive it. If you are not an intended and authorized
> recipient you are hereby notified of any use, disclosure, copying or
> distribution of the information included in this transmission is prohibited
> and may be unlawful. Please immediately notify the sender by replying to
> this email and then delete it from your system.
>

Todd,

Would this be akin to the proprietary and confidential information, as
indicated in the footer of your email message, which you sent to a publicly
accessible list operating under IETF's "Note Well" policy?  Some might
argue that receipt of this information in DMARC failure reports is a
feature and not a bug. Just as the ability to use WHOIS in fighting abuse
has been gutted as a result of GDPR, do we really want to go down a path of
warning people of "dangers" in such an un-nuanced manner?

I agree with John and others that a generic warning regarding security and
privacy issues is the more useful approach given that this is a technical
standard and vague hand waving is not particularly useful as an
implementation guide. For bad guys using/abusing real email addresses as
destinations, the privacy ship has sailed as someone somewhere got breached
or the addresses got scraped. The same goes for originating From and Mail
>From addresses, except the originating domain is already aware of them.
Given the choice between writing a book that few will read and even less
will understand, and writing a brief generic warning, I choose short and
generic.

Michael Hammer