Re: [dmarc-ietf] Signaling MLMs

Alessandro Vesely <vesely@tana.it> Sat, 15 April 2023 10:53 UTC

Return-Path: <vesely@tana.it>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B054FC151B00 for <dmarc@ietfa.amsl.com>; Sat, 15 Apr 2023 03:53:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.098
X-Spam-Level:
X-Spam-Status: No, score=-7.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, NICE_REPLY_A=-0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=neutral reason="invalid (unsupported algorithm ed25519-sha256)" header.d=tana.it header.b="UsivIBAp"; dkim=pass (1152-bit key) header.d=tana.it header.b="C/EkzZTb"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id R7xdQ0kHd46Q for <dmarc@ietfa.amsl.com>; Sat, 15 Apr 2023 03:53:21 -0700 (PDT)
Received: from wmail.tana.it (wmail.tana.it [94.198.96.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 11015C1516E2 for <dmarc@ietf.org>; Sat, 15 Apr 2023 03:53:16 -0700 (PDT)
DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=tana.it; s=epsilon; t=1681555992; bh=3FLyXMB9SkjXB+Z5WiQOKu+SPRHTx54ZOS8l+n1m4aI=; h=Author:Date:Subject:To:References:From:In-Reply-To; b=UsivIBApIFYQ6riaGDn0x9xgfXOd23c1lUzZ7n2zF4vkoqx1jfDOLRhUY1eXAq+X+ Viroj82eXg6Xqe7tPb9Ag==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=tana.it; s=delta; t=1681555992; bh=3FLyXMB9SkjXB+Z5WiQOKu+SPRHTx54ZOS8l+n1m4aI=; h=Date:Subject:To:References:From:In-Reply-To; b=C/EkzZTbrrW/UC77f56WFxaj5+IbfdX+B0CMaJboGF93khi4ajmaZuRTv3GoOWjKE 3TPWjMVWk4MlfO/dUytNNoXcdknl4Hzlgt1mcCBkx11yB7TFhSoDMlkD838e6Mg1nK rXjG7FdlOUXsjrq4iyojdm71H7BX6V4IUCI7+jdWYSdpoT4/LiMT0aX9IP5Gm
Original-Subject: Re: [dmarc-ietf] Signaling MLMs
Author: Alessandro Vesely <vesely@tana.it>
Received: from [172.25.197.111] (pcale.tana [172.25.197.111]) (AUTH: CRAM-MD5 uXDGrn@SYT0/k, TLS: TLS1.3, 128bits, ECDHE_RSA_AES_128_GCM_SHA256) by wmail.tana.it with ESMTPSA id 00000000005DC0DD.00000000643A8217.00002381; Sat, 15 Apr 2023 12:53:11 +0200
Message-ID: <4c78b83b-a122-5b7c-cbe5-9ac8d4e1a991@tana.it>
Date: Sat, 15 Apr 2023 12:53:11 +0200
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.9.0
Content-Language: en-US, it-IT
To: dmarc@ietf.org
References: <CAL0qLwZc2X7tyP+_8vvL3Yb7uJk6td3XGbsXUB68BNUEMhV4yQ@mail.gmail.com> <8d970e6b-8fa7-da85-5c47-d485abbc43be@crash.com> <CAL0qLwZJjBq0T8kODJifTT10ttJJE2Bof5kJZACRTwyauzwQ6A@mail.gmail.com> <CAJ4XoYcHeFe0kS9QHz4fP5TbOMOiW8mJaiNYx+Yk8keZYW-yDQ@mail.gmail.com> <b6a2b444-de02-9833-fe7b-fc9ad542f900@tana.it> <CAL0qLwYwcXTBzqd=3sKwtZJUsEYO5kfv9V-CZtVHz2TQ78v=0g@mail.gmail.com> <909C826B-2745-4BE8-AD16-920E6DE86D1C@kitterman.com> <329db752-fdeb-7633-ede1-06e435db1c0e@tana.it> <CAL0qLwa=cA7426zgNJQFDBBqOKA6KXyBGAE4TOy=C+c9+JUY3A@mail.gmail.com> <168596BD-B688-4AF6-87E8-B25F9D2BD663@isdg.net>
Authentication-Results: tana.it; auth=pass (details omitted)
From: Alessandro Vesely <vesely@tana.it>
In-Reply-To: <168596BD-B688-4AF6-87E8-B25F9D2BD663@isdg.net>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/xROYKiGupvxH6cfpSzXdjavKjFg>
Subject: Re: [dmarc-ietf] Signaling MLMs
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 15 Apr 2023 10:53:29 -0000

On Fri 14/Apr/2023 22:43:43 +0200 Hector Santos wrote:
> On Apr 14, 2023, at 3:20 PM, Murray S. Kucherawy <superuser@gmail.com> wrote:
>> On Fri, Apr 14, 2023 at 10:20 AM Alessandro Vesely <vesely@tana.it <mailto:vesely@tana.it>> wrote:
>>> On Fri 14/Apr/2023 15:47:12 +0200 Scott Kitterman wrote:
>>>> On April 14, 2023 1:29:58 PM UTC, "Murray S. Kucherawy" <superuser@gmail.com <mailto:superuser@gmail.com>> wrote:
>>>>> On Fri, Apr 14, 2023 at 4:31 AM Alessandro Vesely <vesely@tana.it <mailto:vesely@tana.it>> wrote:
>>>>>
>>>>>> Heck, MLMs should start rejecting messages sent from domains that publish a 
>>>>>> blocking policy *when they fail authentication on entry*!!
>>>>>
>>>>> That's not enough to avoid the damage we're talking about.
>>>
>>> Agreed.  Yet, it is a sane half-way between crazy rejecting always and 
>>> completely ignoring ABUSE.
>>
>> Both DKIM (certainly) and SPF (I'm pretty sure) advocate against rejection of messages merely because they fail authentication on ingress.
>
> And respectfully, SPF always had a strong reject, hard fail policy concept since it's LMAP R&D upbringing — immediate rejection, 55z rejection code.
>
> Why Not?  It was optimized.  It served a purpose to address spoofs. Partial, Neutral and Unknown results were possible. That was suppose to be feed to a heuristics, highly subjective Reputation Engine. After exactly 20 years of data, SPF rejection rate is 6.3% of the incoming rejection reasons. https://winserver.com/public/spamstats.wct


SPF is rather a spade than a foil.  It can block tons of flagrant spam cheaply. 
  It presumes receivers check against a list of known forwarders; Appendix D of 
RFC 7208 is rather clear on that point.  I use an SPF record which explicitly 
requires whitelisting, among the many possibilities offered by that protocol.

DKIM does precisely one thing, allowing a domain to claim some responsibility 
for a message.  It is a cryptographic tool which puts no implied semantics on 
responsibility.  Section 6.3 of RFC 6376 clearly says that rejection based on 
dkim=fail can only make sense in case of prior agreements.

DMARC is different.  It precisely allows to establish policies on the From: 
domain.  Section 8.3 of DMARCbis is clear.  We cannot be vague on what 
circumstances can cause an exception.  I figure it's the reciprocal of DKIM: 
skipping to obey a DMARC policy can only make sense in case of prior agreement 
with the sender.


>>> I agree there are better solutions, but they're not yet developed.  As ugly as 
>>> it may be, From: munging is the emerged solution.  It is a _fact_.  Now repeat 
>>> again that the IETF standardized facts, not theories...
>>
>> Let's put the challenge back on you: Where's your evidence that From munging is the emerged consensus solution that this working group should standardize?  Where is this _fact_?  If we advance that as a Proposed Standard, the community will quite reasonably ask why we think this is true, and we're going to need to be able to answer them.  If working group consensus agrees, then away we go.
>
> As much as I am an original mail engineering purest (anyone here ever work with Fidonet?) and therefore consider it to be a fundamental taboo to destroy originating copyrighted authorship of anything, the MLS/MLM needs to evolve to handle the various 1::many broadcasting distributions under a new security umbrella.
>
> Because the current DMARCbis umbrella is not providing 100% coverage, for the MLS./MLM, it needs to do one of two things;  restrict subscription/submissions or strip the security and rewrite the copyrighting authorship, perpetuating a potential harm including legal.
>
> The latter is not preferred.  The former would be normal part of a protocol complete algorithm. You would do the former always.  It’s the easiest.  No need to modify the MLS.  Just the MLM low code provisional scripts.


I only know a handful of mailing lists, and they all do From: rewriting.  Some 
took years to adapt, but eventually adapted.  Are there any who don't?

I agree lists may also refuse participation and require posters to get gmail 
addresses.

In the case of IETF lists, copyright issues are addressed by the Note Well.  I 
see no violation in From: rewriting.

Anyway, there are also other kinds of agreements.  Whereas ATP considers 
agreements between author domains and MLMs, it is also possible to consider 
agreements between MLMs and subscriber domains.  The latter seems to be more 
promising to me.

Until then, there is some disruption.  We know it.  We can document it; we're 
not ignoring it.  We thought hard about it and concluded that it necessarily 
arises.  To timidly roll back doesn't seem to be a feasible option.  Making 
laws that cannot be followed, implying that every body is implicitly guilty, is 
an oldish governmental practice which sounds just silly when enacted by someone 
who does not even have a protocol police.


Best
Ale
--