Re: [dmarc-ietf] Proposing an extension to DMARC to optionally inform receivers about mailing list activity

Dave Crocker <dcrocker@gmail.com> Sat, 20 April 2013 18:03 UTC

Return-Path: <dcrocker@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6A68621F8B5F for <dmarc@ietfa.amsl.com>; Sat, 20 Apr 2013 11:03:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.223
X-Spam-Level:
X-Spam-Status: No, score=-2.223 tagged_above=-999 required=5 tests=[AWL=-1.377, BAYES_00=-2.599, FH_HOST_EQ_D_D_D_D=0.765, FH_HOST_EQ_D_D_D_DB=0.888, RDNS_DYNAMIC=0.1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xaIht23Pk6fn for <dmarc@ietfa.amsl.com>; Sat, 20 Apr 2013 11:03:15 -0700 (PDT)
Received: from mail-ob0-x22e.google.com (mail-ob0-x22e.google.com [IPv6:2607:f8b0:4003:c01::22e]) by ietfa.amsl.com (Postfix) with ESMTP id 6EACC21F859D for <dmarc@ietf.org>; Sat, 20 Apr 2013 11:03:15 -0700 (PDT)
Received: by mail-ob0-f174.google.com with SMTP id wc20so1396505obb.19 for <dmarc@ietf.org>; Sat, 20 Apr 2013 11:03:15 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=x-received:message-id:date:from:organization:user-agent :mime-version:to:cc:subject:references:in-reply-to:content-type :content-transfer-encoding; bh=Iq/p1C4fdrZyDjQ1vS1ydwaWTviKmh9lwJ10XPBeIBs=; b=DB3duHpAkYY+Wy0tT2Zcmw7qVZ3fAvVgmpTajoWnF9E+GDJfp0q39RznFgDS71Ayib z9NzmLiNCvlB8r05ATirFL3jAiYc7oVa9QFBIpSqBFgrJeCkkt8L4tAn0AEGO4hyKOaD LsJeXEgb/q+/pSebGbIB4OhBFnyllpOHZRnsqSI3guSCb0EXYqhIlKxtxVrYr27n1nYL Y2BdThy3kN3uIEFG+aiMgTT5Tv9FpCkCW1MDFX012KfOTrGPupFtZsRn9m4gWTO4qPm/ zm8MNRvIhnu3mF9LLwotVw1W47x1dtig387ZKPPtLuum9X9Ty36xVlB7HZ8Bn39GOVPp uKiQ==
X-Received: by 10.182.92.133 with SMTP id cm5mr6383312obb.73.1366480994938; Sat, 20 Apr 2013 11:03:14 -0700 (PDT)
Received: from [192.168.1.66] (76-218-9-215.lightspeed.sntcca.sbcglobal.net. [76.218.9.215]) by mx.google.com with ESMTPS id dt3sm10728511obb.12.2013.04.20.11.03.13 (version=TLSv1 cipher=RC4-SHA bits=128/128); Sat, 20 Apr 2013 11:03:14 -0700 (PDT)
Message-ID: <5172D859.1090101@gmail.com>
Date: Sat, 20 Apr 2013 11:03:05 -0700
From: Dave Crocker <dcrocker@gmail.com>
Organization: Brandenburg InternetWorking
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:17.0) Gecko/20130328 Thunderbird/17.0.5
MIME-Version: 1.0
To: Tim Draegen <tim@eudaemon.net>
References: <CA3FFAC1AF644CD8A840FCC67474F45E@fgsr.local> <CE1D9243-947F-4D44-AB91-392E6545853D@eudaemon.net>
In-Reply-To: <CE1D9243-947F-4D44-AB91-392E6545853D@eudaemon.net>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Cc: dmarc@ietf.org
Subject: Re: [dmarc-ietf] Proposing an extension to DMARC to optionally inform receivers about mailing list activity
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 20 Apr 2013 18:03:16 -0000

On 4/14/2013 7:08 PM, Tim Draegen wrote:
> On Apr 12, 2013, at 5:35 PM, J. Gomez <jgomez@seryrich.com> wrote:
>> 4. (Uselessness problem) This proposition achieves nothing.
>>
>>     --> True. It's not the intent of the "l=" tag to achieve anything nor to convey policy from Sender to Receiver. The "l=" tag merely conveys additional information from Sender to Receiver, and the Receiver is free to consume it as he wishes or to disregard it altogether.
>
>
> This here.  If the tag doesn't achieve anything and could very well be wrong ('cause there is no measurable impact to getting it right), it'll just add noise to a receiver's decision making, and therefore {all of your other counter-arguments}.
>
> To game this out, *IF* this tag existed and was accurately used, as a receiver I'd still have to figure out what sources are mailing lists in order to make the extra "l={yes,no,dunno}" tag useful.  Let's say I have perfect mailing list knowledge, what then am I supposed to do with email coming through a mailing list from a domain with the "l=no" tag?  If the answer is "nothing", then why is this tag even there for me to look at?
>
> I guess I'm left with "How does this make anything better?"
>
> IMO Michael Adkins wrote it best:
>
>> 7.  Operational Issue
>> This problem is better solved by making data about legitimate mailing
>> lists publicially available so everyone can apply local policy overrides
>> consistently.


Anything that smacks of hints, heuristics, guessing and statistics 
invites more noise into the system.  As a rule, that's not good for 
standards-based activities and are best left to outside processes.

The underlying issue here seems to be a) message handling by 
non-transparent intermediaries, and b) their not necessarily playing in 
the dmarc sandbox.

I think there is nothing useful that can be done in terms of DMARC 
standards for the latter.  If they break stuff and won't help fix it, 
the topic is done.

For the former, it sounds like a case of wanting some kind of transitive 
trust, which moves us back to having the mediator do inbound dmarc 
validation, record it into the A-R header field(?) and then ensure SPF 
and DKIM authentication and maybe dmarc publishing, too.

It might also make sense to add some sort of "I am a mediator who 
processed this message and assert the following truths..." and then 
include that field in the dkim signature hash.  That is, to define some 
additional authentication semantics for mediators, if they wish to play 
in this sandbox.  The presence of this extra header field asserts a set 
of semantics and the dkim signature validates its presence (depending 
upon the reputation of the signing mediator's domain, of course.)

This provides a kind of authenticated audit trail, but of course still 
leaves open the question of how it would be handled by receivers.

d/

-- 
  Dave Crocker
  bbiw.net