Re: [dmarc-ietf] Proposed text for p=reject and indirect mail flows

Douglas Foster <dougfoster.emailstandards@gmail.com> Thu, 30 March 2023 01:32 UTC

Return-Path: <dougfoster.emailstandards@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E7C86C1522BE for <dmarc@ietfa.amsl.com>; Wed, 29 Mar 2023 18:32:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.096
X-Spam-Level:
X-Spam-Status: No, score=-2.096 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AW_DnRL9UBlr for <dmarc@ietfa.amsl.com>; Wed, 29 Mar 2023 18:32:58 -0700 (PDT)
Received: from mail-lj1-x22c.google.com (mail-lj1-x22c.google.com [IPv6:2a00:1450:4864:20::22c]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 18B4BC1522DD for <dmarc@ietf.org>; Wed, 29 Mar 2023 18:32:58 -0700 (PDT)
Received: by mail-lj1-x22c.google.com with SMTP id x20so18036418ljq.9 for <dmarc@ietf.org>; Wed, 29 Mar 2023 18:32:57 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; t=1680139976; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=gBuoiOP0Le5RX/1W/tDE6zXB5LZYawITfv7c++axmHk=; b=UNpH8qGv60dgbqN5v13QnF3RlYqeB0leTZIKcXHqfc50phB1adwfEw9osQMrfYyeOe cr6Zb6edseij80up6580nrfaMfEqGEk1jJGimCHBOZGL+wpVlH9xkVZT2P1o7XNNIpfG bGHebo3nF5Mc+O983pqkbE9n1SWLo+meXw9y+Cyp9F95ylZBKC5hPcKTJgVConyUsuAx pu8+mRl1rDYoR+cS3hi7ZEk3/0z21xEbW8lnoe7PZTZ3Az9+z3O4YZRLGVLWSvQ2P/cR XrpIgkDED8YhjIqFATlUzbfK5lpLqzW1oPIOU4W1KwsqL+DyHPVTQghiARIw4L8pJqC2 pD6Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; t=1680139976; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=gBuoiOP0Le5RX/1W/tDE6zXB5LZYawITfv7c++axmHk=; b=13kwHoOkVF7MBFNn4CEJKKRm/hJeXxuto5FDEmkFhpRN41g/ismi5lZIlI+OfxEIyS C/u+MBWe9o3CKAimlyxq90phl2ItrJo/AMDHweAVlsIakh5TI+zjIlUxE/wokOEg+6sM NaaSzXZRJXJby7YcxcD55e9bpv6dK8XCtdThe0RQYEARC06KLTkXEkf1kqXCEPiZZjX1 0jHbXyWXuqVwaWe29x2P5cw/ZNBQQ8Gj2E1mUwWaul+jEiqlqvZqadCLrKB0Jhwivgzl vupJZLBj23T+QaVKK0vS2/s+RPbZOIfTWbtMV8GWTkqFPTrtADmSF8DFFaLxRQ/quPT3 7wXg==
X-Gm-Message-State: AAQBX9dxrBHe+mZtlCbugL5LEoD1kgUb9LC8HO1JEPCsqybGkT2bfYHu 9RnS2yuyeEK5M1F3tDgxRpNxSUJSaUwnbZIlNUY=
X-Google-Smtp-Source: AKy350b+4RbpMnXYvDvWImyPeOZfdtyS5kFUZabvODLhM35MJEUw+7vfnytceWtX5gko7Y6OB/DgKU/5mY7/Hv5YYR0=
X-Received: by 2002:a05:651c:113:b0:299:a9db:95 with SMTP id a19-20020a05651c011300b00299a9db0095mr6643233ljb.1.1680139975546; Wed, 29 Mar 2023 18:32:55 -0700 (PDT)
MIME-Version: 1.0
References: <CALaySJ+NBg9vzqa0_t-sBf7EKXQ3A=DTyy-Vc7M-ZK9-vfJxmw@mail.gmail.com> <6319292.vCqnBZbX7o@localhost> <CAHej_8nd1xyAgwASLJbuJHyXEAfHbjqxNH1XtJxKFyfyOneyug@mail.gmail.com> <13145172.pEV04Z3DvM@localhost> <CAHej_8msLJQ0vbZ2jzitjxrQ1wdim5bHJkiD-QrU5F0EJvQp0g@mail.gmail.com> <FCFEB95E-63F9-46C3-A5F4-FA6B02FA8EB5@episteme.net> <CAHej_8=GbmzyXaeEkyLkv6uKc0-owuMC6UspPNq9irT7nF8b7w@mail.gmail.com> <CALaySJLmRyyBLE7ZKy88XUS_hXr9M2uwc8jOCYBrBPeC+pCdCg@mail.gmail.com> <MN2PR11MB43519A6CD95E5C80AA1EC2CFF7899@MN2PR11MB4351.namprd11.prod.outlook.com> <13603D87-4FDE-4768-9712-E6DB0818C802@kitterman.com> <CAH48ZfztW4OFm+ZMV=et7+uczj49dfbYT7i0w4LgU7pswuiEnw@mail.gmail.com> <CAL0qLwayTG_M1-fSTXiaVM5TS1Vo7X+Ehov2Bov9vCak7gn=yg@mail.gmail.com>
In-Reply-To: <CAL0qLwayTG_M1-fSTXiaVM5TS1Vo7X+Ehov2Bov9vCak7gn=yg@mail.gmail.com>
From: Douglas Foster <dougfoster.emailstandards@gmail.com>
Date: Wed, 29 Mar 2023 21:32:43 -0400
Message-ID: <CAH48ZfxejSxbsDpgBUcfMDhGcz0QLGZEH6yVRMC0xmEFLksw3w@mail.gmail.com>
To: "Murray S. Kucherawy" <superuser@gmail.com>
Cc: IETF DMARC WG <dmarc@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000006a5bbd05f81412e5"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/xYRp2p2WCmIj6SSXqTCnIDCdXGo>
Subject: Re: [dmarc-ietf] Proposed text for p=reject and indirect mail flows
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 30 Mar 2023 01:33:00 -0000

Here is a quick attempt at a definition:

Interoperability:    Two (or more) entities cooperating to achieve a mutual
objective"

Interoperability can perhaps be illustrated by design for a VPN tunnel or
other encryption mechanism:

1) You have to know the identity of the other party.  It does not matter
that you have transport security if you are sending your message to the bad
guys.  For VPN, this uses per-shared keys or digital certificates among
other options. For email, forwarding hides some of the originator's
identity, and forwarding with identity rewrite hides the rest.

2) You have to know if you have received all of the message/  If it has to
be broken into pieces for transmission, you need to find all the pieces and
reassemble them in order.   Transport protocols handle this well.

3) You have to know if the message or message component has been altered in
transit.   For VPN, "MAC" hash values demonstrate this.   For email, DKIM
verifies this.    In either system, a failed hash is supposed to indicate
loss of trustworthiness.

4) You have to have an error recovery / exception management process.   For
VPN, this is retransmission.   For email, IETF has carefully avoided any
discussion of error recovery and exception management.   I don't know why.

Of course, trust would not be a problem is all email was wanted and
trustworthy.    The forwarding problem exists because fraudulent mail
exists, and it is nearly impossible to distinguish a legitimate forwarded
message chain from a fraudulently constructed one.

Disruption

If a message is blocked inappropriately, the responsibility falls on the
entity that made the block decision, which is the recipient's evaluator.
 The sender's DMARC policy is an input to that decision, it has no power of
its own.

The previous and proposed DMARC specifications are misleading because they
communicate false certainty.   The only thing that a sender can assert is
that all of the messages originated by him will be properly signed by him.
 Even when that assertion is made, it may or may not be true.   But it
cannot say whether an unauthorized message was done for beneficial or
malicious purposes.   It cannot control whether a recipient decides to
forward the message.

In short, the damage happens because evaluators have been misled by the
specification, believing that all FAILs are malicious.   This is a
widespread and pernicious belief, which is created and sustained by IETF
documents.

The optimal handling of authentication failures is quarantine, followed by
a decision:   if the source is a malicious impersonation, block the current
and all future messages.   If the source is legitimate, create a local
policy which authenticates in place of the failed SPF or DMARC check.   In
either case, the disposition of future messages are unambiguous.

More specifically, the damage often comes from product developers who
develop to the specification, without a nuanced understanding of real world
filtering.   Without good options for handling exceptions, the system
administrators are hamstrung.

Our spec needs to fix the evaluators, and their products, not the sender
policy.

DF





--

On Wed, Mar 29, 2023 at 8:52 PM Murray S. Kucherawy <superuser@gmail.com>
wrote:

> On Thu, Mar 30, 2023 at 7:30 AM Douglas Foster <
> dougfoster.emailstandards@gmail.com> wrote:
>
>> There is no interoperability problem.
>>
>
> How are you defining interoperability?
>
> "p=reject" when used on domains that send non-transactional messages
> disrupts interoperability of the email ecosystem in ways that are well
> documented.  This collateral damage is not trivial.
>
> There's no interoperability problem at the DMARC layer, sure.  But there's
> a bigger story we need to consider.
>
> An evaluator  has an unlimited right to block any incoming message for any
>> reason.
>>
> Specifically, an evaluator has the right to block any message which he
>> determines to be insufficiently authenticated.
>>
>
> An operator has every right to block DNS queries of types they don't like
> or don't recognize.  The choice to do so by some firewalls was the source
> of the problems behind the introduction of the SPF resource record.  That's
> a pretty broad kind of disruption that I would claim also shouldn't have
> been ignored or dismissed.  (See RFC 6686, Appendix A, for this story.)
>
>
>> If a sender wants a message to be accepted, he carries the burden of
>> earning the evaluator's trust.   He has no right to have his message
>> delivered.
>>
>> [...]
>>
>> If an evaluator blocks a message that a user considers acceptable, that
>> is a management issue between the user and the administrator.  It happens
>> all the time, and it is resolved through normal support processes.
>>
>
> I don't think anyone's arguing that.  But does the receiver in your
> scenario also have a right to impact the experiences of users not under
> their control?  If we're going to argue that the receiver's rights are the
> only thing that matter, we'd better be able to explain why the collateral
> damage is justifiable.
>
> -MSK, participating
>