Re: [dmarc-ietf] p=quarantine

Dotzero <dotzero@gmail.com> Tue, 15 December 2020 06:07 UTC

Return-Path: <dotzero@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9D6293A0A9C for <dmarc@ietfa.amsl.com>; Mon, 14 Dec 2020 22:07:03 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.198
X-Spam-Level:
X-Spam-Status: No, score=-0.198 tagged_above=-999 required=5 tests=[DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1fNQ05sA4AYI for <dmarc@ietfa.amsl.com>; Mon, 14 Dec 2020 22:07:01 -0800 (PST)
Received: from mail-qk1-x72c.google.com (mail-qk1-x72c.google.com [IPv6:2607:f8b0:4864:20::72c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A471F3A0A97 for <dmarc@ietf.org>; Mon, 14 Dec 2020 22:07:01 -0800 (PST)
Received: by mail-qk1-x72c.google.com with SMTP id d14so17429959qkc.13 for <dmarc@ietf.org>; Mon, 14 Dec 2020 22:07:01 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=H52Dt0x5iAqHFLDMCKS+E7IWqUsBKu8zkKrRtjhEatQ=; b=hyXu1/FuniB7iUt/o6MLdDhfo010Boe/fn4T1nHZRh9fQJvrbb4bUZJhqq++5oTgC2 AthET3zrL6VCdI1aQSEPE1kjfRV+r3VwlJbgjKiUlFt9MZRemt9KLWFHRmDugh+zBujO 5qsn9xi8WPyxCP5d4HPPZw8+grPoNWA+5Z2OC0V4Sau6Xgk0OhyIRR+3L+/C0hWxATKI AoNGWTw4hMz+iRuDI4SDDYkTtejrl/AlVXbfpiD0h5ZMnQ5RvnNOk6S+gfmHEGUA+Zvv 1GoBMUi1V66QU6g/CVW/sP8sRiM/LrIhVfiTtLKpA+OUwIKhE15s0DlBg20PgQ0QTgf7 +d/w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=H52Dt0x5iAqHFLDMCKS+E7IWqUsBKu8zkKrRtjhEatQ=; b=dkmGCReDhMRBDMedD8UIJ4pcoGUTejmpfNdV67UPM/C1XYZwR6VNDCOFZzxcSFxLlk /1Ejz/A/EwvTiQR4IXevXlbNiey7NVfVpShpMJPNPcaRVXIF1hOtW4dhToF1ridm93G5 gokMuK87X9gF4N4t4fxRSw9HDsvVMq1gQOoDSPjXg6lwoEYl50bUN0CkXIVVlYqupM3j jFXiRYCijf4zzhmIq4FRbX/d6cJXD6NQEPWCMSNwLnlPweERE4I7nQdcofsCRz7s9fn8 4CAwpQjr8pyu5qSUiEBzg/EKle4lwoIS8GqKbTxT5sObexxu9KLh+JMWyNVtEixpy2i+ Lqag==
X-Gm-Message-State: AOAM532WhE0FSR0P6tRyTEEorVa/+a3Of4WWhGoUxMdkI4d/Dov3W3jP IhTbOumnNDcu77hyLtjppk9s/cMkGodw2WUsd6o=
X-Google-Smtp-Source: ABdhPJy7s7m13QDOzqjFGu7Zh6hW7BB/cJHA2AIqCoQG8xDzgcmPSwiyGBBBJCPm0brqPoip4fQdkyVQoOQ/FkAsbyU=
X-Received: by 2002:a05:620a:1264:: with SMTP id b4mr6582786qkl.187.1608012420596; Mon, 14 Dec 2020 22:07:00 -0800 (PST)
MIME-Version: 1.0
References: <20201211173722.6B4DF29782C7@ary.qy> <ea074aad-971b-abc6-d557-ea2f433b3cc7@gmail.com> <CAH48ZfxEjGHv99z3RGj+Z+KJaFVPvm6RG4UzkKuOoDQDVCmb3g@mail.gmail.com> <A5E108DC-2692-4927-B2C1-AE3FED6DA8AA@wordtothewise.com> <CAH48ZfwkPEgexwGvyMT_PevMM5ngBT_XRfHYi7Wy1yxMw1LP1A@mail.gmail.com> <A07FA3DE-4C51-48C4-A2E7-067987200E1F@wordtothewise.com> <CAH48ZfwykEJM9AXKrp+SS4SgM4N1W70eLqHW+PXB18a_TrV6iw@mail.gmail.com>
In-Reply-To: <CAH48ZfwykEJM9AXKrp+SS4SgM4N1W70eLqHW+PXB18a_TrV6iw@mail.gmail.com>
From: Dotzero <dotzero@gmail.com>
Date: Tue, 15 Dec 2020 01:06:49 -0500
Message-ID: <CAJ4XoYft1ax=TxehCmniPo3YfRHgcyYExxROYTOJ_mqSqA54PA@mail.gmail.com>
To: Douglas Foster <dougfoster.emailstandards@gmail.com>
Cc: IETF DMARC WG <dmarc@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000001fc69a05b67a9137"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/skOs0s5PNy7M7e6lLcgCrfo42f4>
Subject: Re: [dmarc-ietf] p=quarantine
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 Dec 2020 06:07:04 -0000

On Mon, Dec 14, 2020 at 10:26 PM Douglas Foster <
dougfoster.emailstandards@gmail.com> wrote:

> Sorry about the confusion caused by my typing failures.
> What I meant:
> First party - From address aligns with SMTP address.  Can be validated
> with SPF or DKIM.
> Third party - From address and SMTP address are in different domains.  Can
> be validated with DKIM only.
> I am open to suggestions for better nomenclature.
>
> But what I am trying to figure out is under what circumstances a DMARC
> policy can be considered actionable.   Do I conclude that "p=quarantine"
> means "domain is still collecting data, so results are unpredictable"?   Or
> do I conclude that it means "Domain is fully deployed and failure to
> validate is a highly suspicious event?"
>

You are way overthinking this.

>
> Take the case of a SMTP-aligned message which does not have a DKIM
> signature.   If it is received directly, it is DMARC compliant.   If it is
> received indirectly, it is a presumed spoof.    It cannot be both valid and
> spoofed.
>

Rather than using the word "spoofed", think of it as simply "failed to
validate" if it was forwarded. Done.


>  Whether the message gets forwarded is not under the sender's control.
>  If I receive it directly it is presumed valid, but does it signal that the
> domain is still struggling to implement DMARC, so their policy should be
> ignored on future messages?   Or if I receive it indirectly, should I try
> to reverse engineer whether it was SPF-aligned before it was forwarded?
>

You appear to be venturing into an area that involves tea leaves and
crystal balls - way beyond anything a technical standard can address. An
organization publishing a p=quarantine record is making a request that
messages purporting to be from their domain be quarantined if they fail to
validate. It doesn't matter whether it was sent direct or was handled by an
intermediary. Even a certain (very small) percentage of emails sent
directly can fail for various reasons. Why is it so difficult to take
things at face value? If, as a validating receiver you have data that you
believe justifies exercising local policy then you have a choice to make.
It really is that simple.

>
> Since all messages need to be DKIM-signed to survive a possible forward,
> should SPF even be part of the DMARC criteria?
>

Yes, SPF should be a part of DMARC because even with direct mail there can
be problems with DKIM signing/signatures for various reasons. The
combination of SPF and DKIM signing provides a small but useful increase in
the percentage of mail that validates. This statement is based on my
experience of having been responsible for systems sending several billions
of emails with a p=reject policy.

>
> I am simply wondering if a DMARC policy has enough reliable information to
> be of any value, at least for any setting other than p=reject pct=100.
> This is intertwined with the ambiguity about what the sender means for any
> policy other than p=reject pct=100.   My opening post was an attempt to
> define milestones that should be associated with specific settings.   But
> maybe the only certainty is that the domain is collecting data and
> consequently spoof-prevention must be based on evidence other than the
> DMARC policy.
>

Again, "spoofing" is a convenient but inaccurate descriptor.  DMARC is a
tool intended to prevent direct domain abuse based on the RFC 5322 From
email address, nothing more and nothing less. Even if an email message
validates for DMARC, it could be a homoglyph or cousin domain email address
in the RFC 5322 field. Attempting to overlay the meaning of a published
policy with other semantics or trying to guess the underlying intentions is
a perilous path for a standards body. Other tools and techniques can and
should be applied to messages by Receivers in order to protect their users.

Michael Hammer