Re: [dmarc-ietf] Proposing an extension to DMARC to optionally inform receivers about mailing list activity
Dave Crocker <dcrocker@gmail.com> Sat, 20 April 2013 18:03 UTC
Return-Path: <dcrocker@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6A68621F8B5F for <dmarc@ietfa.amsl.com>; Sat, 20 Apr 2013 11:03:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.223
X-Spam-Level:
X-Spam-Status: No, score=-2.223 tagged_above=-999 required=5 tests=[AWL=-1.377, BAYES_00=-2.599, FH_HOST_EQ_D_D_D_D=0.765, FH_HOST_EQ_D_D_D_DB=0.888, RDNS_DYNAMIC=0.1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xaIht23Pk6fn for <dmarc@ietfa.amsl.com>; Sat, 20 Apr 2013 11:03:15 -0700 (PDT)
Received: from mail-ob0-x22e.google.com (mail-ob0-x22e.google.com [IPv6:2607:f8b0:4003:c01::22e]) by ietfa.amsl.com (Postfix) with ESMTP id 6EACC21F859D for <dmarc@ietf.org>; Sat, 20 Apr 2013 11:03:15 -0700 (PDT)
Received: by mail-ob0-f174.google.com with SMTP id wc20so1396505obb.19 for <dmarc@ietf.org>; Sat, 20 Apr 2013 11:03:15 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=x-received:message-id:date:from:organization:user-agent :mime-version:to:cc:subject:references:in-reply-to:content-type :content-transfer-encoding; bh=Iq/p1C4fdrZyDjQ1vS1ydwaWTviKmh9lwJ10XPBeIBs=; b=DB3duHpAkYY+Wy0tT2Zcmw7qVZ3fAvVgmpTajoWnF9E+GDJfp0q39RznFgDS71Ayib z9NzmLiNCvlB8r05ATirFL3jAiYc7oVa9QFBIpSqBFgrJeCkkt8L4tAn0AEGO4hyKOaD LsJeXEgb/q+/pSebGbIB4OhBFnyllpOHZRnsqSI3guSCb0EXYqhIlKxtxVrYr27n1nYL Y2BdThy3kN3uIEFG+aiMgTT5Tv9FpCkCW1MDFX012KfOTrGPupFtZsRn9m4gWTO4qPm/ zm8MNRvIhnu3mF9LLwotVw1W47x1dtig387ZKPPtLuum9X9Ty36xVlB7HZ8Bn39GOVPp uKiQ==
X-Received: by 10.182.92.133 with SMTP id cm5mr6383312obb.73.1366480994938; Sat, 20 Apr 2013 11:03:14 -0700 (PDT)
Received: from [192.168.1.66] (76-218-9-215.lightspeed.sntcca.sbcglobal.net. [76.218.9.215]) by mx.google.com with ESMTPS id dt3sm10728511obb.12.2013.04.20.11.03.13 (version=TLSv1 cipher=RC4-SHA bits=128/128); Sat, 20 Apr 2013 11:03:14 -0700 (PDT)
Message-ID: <5172D859.1090101@gmail.com>
Date: Sat, 20 Apr 2013 11:03:05 -0700
From: Dave Crocker <dcrocker@gmail.com>
Organization: Brandenburg InternetWorking
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:17.0) Gecko/20130328 Thunderbird/17.0.5
MIME-Version: 1.0
To: Tim Draegen <tim@eudaemon.net>
References: <CA3FFAC1AF644CD8A840FCC67474F45E@fgsr.local> <CE1D9243-947F-4D44-AB91-392E6545853D@eudaemon.net>
In-Reply-To: <CE1D9243-947F-4D44-AB91-392E6545853D@eudaemon.net>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Cc: dmarc@ietf.org
Subject: Re: [dmarc-ietf] Proposing an extension to DMARC to optionally inform receivers about mailing list activity
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 20 Apr 2013 18:03:16 -0000
On 4/14/2013 7:08 PM, Tim Draegen wrote: > On Apr 12, 2013, at 5:35 PM, J. Gomez <jgomez@seryrich.com> wrote: >> 4. (Uselessness problem) This proposition achieves nothing. >> >> --> True. It's not the intent of the "l=" tag to achieve anything nor to convey policy from Sender to Receiver. The "l=" tag merely conveys additional information from Sender to Receiver, and the Receiver is free to consume it as he wishes or to disregard it altogether. > > > This here. If the tag doesn't achieve anything and could very well be wrong ('cause there is no measurable impact to getting it right), it'll just add noise to a receiver's decision making, and therefore {all of your other counter-arguments}. > > To game this out, *IF* this tag existed and was accurately used, as a receiver I'd still have to figure out what sources are mailing lists in order to make the extra "l={yes,no,dunno}" tag useful. Let's say I have perfect mailing list knowledge, what then am I supposed to do with email coming through a mailing list from a domain with the "l=no" tag? If the answer is "nothing", then why is this tag even there for me to look at? > > I guess I'm left with "How does this make anything better?" > > IMO Michael Adkins wrote it best: > >> 7. Operational Issue >> This problem is better solved by making data about legitimate mailing >> lists publicially available so everyone can apply local policy overrides >> consistently. Anything that smacks of hints, heuristics, guessing and statistics invites more noise into the system. As a rule, that's not good for standards-based activities and are best left to outside processes. The underlying issue here seems to be a) message handling by non-transparent intermediaries, and b) their not necessarily playing in the dmarc sandbox. I think there is nothing useful that can be done in terms of DMARC standards for the latter. If they break stuff and won't help fix it, the topic is done. For the former, it sounds like a case of wanting some kind of transitive trust, which moves us back to having the mediator do inbound dmarc validation, record it into the A-R header field(?) and then ensure SPF and DKIM authentication and maybe dmarc publishing, too. It might also make sense to add some sort of "I am a mediator who processed this message and assert the following truths..." and then include that field in the dkim signature hash. That is, to define some additional authentication semantics for mediators, if they wish to play in this sandbox. The presence of this extra header field asserts a set of semantics and the dkim signature validates its presence (depending upon the reputation of the signing mediator's domain, of course.) This provides a kind of authenticated audit trail, but of course still leaves open the question of how it would be handled by receivers. d/ -- Dave Crocker bbiw.net
- [dmarc-ietf] Proposing an extension to DMARC to o… J. Gomez
- Re: [dmarc-ietf] Proposing an extension to DMARC … Michael Adkins
- Re: [dmarc-ietf] Proposing an extension to DMARC … Scott Kitterman
- Re: [dmarc-ietf] Proposing an extension to DMARC … J. Gomez
- Re: [dmarc-ietf] Proposing an extension to DMARC … Michael Adkins
- Re: [dmarc-ietf] Proposing an extension to DMARC … Scott Kitterman
- Re: [dmarc-ietf] Proposing an extension to DMARC … John Levine
- Re: [dmarc-ietf] Proposing an extension to DMARC … Scott Kitterman
- Re: [dmarc-ietf] Proposing an extension to DMARC … Alessandro Vesely
- Re: [dmarc-ietf] Proposing an extension to DMARC … Tim Draegen
- Re: [dmarc-ietf] Proposing an extension to DMARC … Murray S. Kucherawy
- Re: [dmarc-ietf] Proposing an extension to DMARC … John Levine
- Re: [dmarc-ietf] Proposing an extension to DMARC … J. Gomez
- Re: [dmarc-ietf] Proposing an extension to DMARC … J. Gomez
- Re: [dmarc-ietf] Proposing an extension to DMARC … Murray S. Kucherawy
- Re: [dmarc-ietf] Proposing an extension to DMARC … Dave Crocker