[dmarc-ietf] Clarification about data integrity within Aggregate Reports (Ticket #40)

"Brotman, Alex" <Alex_Brotman@comcast.com> Wed, 30 December 2020 22:19 UTC

Return-Path: <Alex_Brotman@comcast.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 01D9D3A09EF for <dmarc@ietfa.amsl.com>; Wed, 30 Dec 2020 14:19:00 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level:
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=comcast.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id t9FFZYk_I6sw for <dmarc@ietfa.amsl.com>; Wed, 30 Dec 2020 14:18:58 -0800 (PST)
Received: from mx0b-00143702.pphosted.com (mx0b-00143702.pphosted.com [148.163.141.77]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 36F103A09E7 for <dmarc@ietf.org>; Wed, 30 Dec 2020 14:18:58 -0800 (PST)
Received: from pps.filterd (m0184889.ppops.net [127.0.0.1]) by mx0b-00143702.pphosted.com (8.16.0.43/8.16.0.43) with SMTP id 0BUMG7aX028517 for <dmarc@ietf.org>; Wed, 30 Dec 2020 17:18:57 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=comcast.com; h=from : to : subject : date : message-id : content-type : content-transfer-encoding : mime-version; s=20190412; bh=GK9KH40l7EBX4wdh5Elicn5NmpBpnLKe6dCNHHUx6rg=; b=100PPlp1rPIho8W1FwVQZdzEaPs2g4NWnqVJTboiFaKoermPUdyBjZstih9Zh0zJ3knf d+8L1Snc6EvWyk4xAg+0XRT2AyUv1InWOGbiSFtHHX1QAKDP1kg4MB1nk1ByxgwYj0Gt rqCcV7RsOmGs/T/B2Bxz0bp0Udup/PkrLmqwM4htinpvXVsQNri1O8KL+7MOEjvnGZEL Ea2QUVjIlubWrG9MFe3Qiy5ps7dZKc0We0kn2YCu1qmmCDBGg7SNdoE7ul8gQaxYjBzK U8apCil9j8mGh7MTPf6oCKCmxqukjj1HlfHVW8y/7QmjFLPSUDC+EYT1f7EW05aGqqmY 9A==
Received: from pacdcex49.cable.comcast.com (dlppfpt-wc-1p.slb.comcast.com [96.99.226.136]) by mx0b-00143702.pphosted.com with ESMTP id 35nywg7hm7-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT) for <dmarc@ietf.org>; Wed, 30 Dec 2020 17:18:57 -0500
Received: from PACDCEX50.cable.comcast.com (24.40.2.149) by PACDCEX49.cable.comcast.com (24.40.2.148) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Wed, 30 Dec 2020 17:18:55 -0500
Received: from PACDCEXEDGE01.cable.comcast.com (76.96.78.71) by PACDCEX50.cable.comcast.com (24.40.2.149) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Wed, 30 Dec 2020 17:18:55 -0500
Received: from NAM10-MW2-obe.outbound.protection.outlook.com (104.47.55.108) by webmail.comcast.com (76.96.78.71) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Wed, 30 Dec 2020 17:18:36 -0500
Received: from MN2PR11MB4351.namprd11.prod.outlook.com (2603:10b6:208:193::31) by MN2PR11MB4632.namprd11.prod.outlook.com (2603:10b6:208:24f::23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3700.28; Wed, 30 Dec 2020 22:18:35 +0000
Received: from MN2PR11MB4351.namprd11.prod.outlook.com ([fe80::7ca6:b482:a6b0:4d42]) by MN2PR11MB4351.namprd11.prod.outlook.com ([fe80::7ca6:b482:a6b0:4d42%7]) with mapi id 15.20.3700.031; Wed, 30 Dec 2020 22:18:35 +0000
From: "Brotman, Alex" <Alex_Brotman@comcast.com>
To: DMARC IETF <dmarc@ietf.org>
Thread-Topic: Clarification about data integrity within Aggregate Reports (Ticket #40)
Thread-Index: Adbe970H9Y1q6TEdQzWwRVOyDn0z2A==
Date: Wed, 30 Dec 2020 22:18:35 +0000
Message-ID: <MN2PR11MB435151665586B5A40D101103F7D70@MN2PR11MB4351.namprd11.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=none action=none header.from=comcast.com;
x-originating-ip: [2601:43:101:380:2423:843e:71e9:c926]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 75cb79da-0580-4d12-5264-08d8ad10d99b
x-ms-traffictypediagnostic: MN2PR11MB4632:
x-microsoft-antispam-prvs: <MN2PR11MB4632AE868D57C59180156C30F7D70@MN2PR11MB4632.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 0AF4Q54RNVPaRF6XtHeo1aHi+eOwpdsDoYqYy05vpdKD6XY2AbdlaaUXv8okhmzrzCRKhol/Maqsj1oaMsqc31AV4SxpFeh5ul/comxMjqBTNd6V6jo4BxnvESqWI305TcaWHzeVgsPTuxNpeus9HiqjZHMMitCTRhDGZT7jCMFYv/vLjgTaCY1UPKroSqJJFYGF8uSb6xttPdy7mZr/hz++3nZP5rO31n74BPsJV6UMGiYtpa7NjC02d7QXvUSeOIYFV0dpFfJ7f6vkEP3SvwZ7nJ881dMwGJAgHhLc4oY63CGI9X+OsYFUwJNTUrmmr+HYu+PsAZ63ySO7OMRmJuJZlEdc8R/FJK3+mgFS1PtfBaeZdiTh+ikUoDLUEje+IwndmfVjKefJ6OZofZneN+gloM93dIm6CJnDPFvfy3NS9VP8GpJ8jE5IRWONae6sBKp212TzGMrjMfTo0FvaKw==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MN2PR11MB4351.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(376002)(396003)(136003)(366004)(39860400002)(346002)(66946007)(478600001)(9686003)(66556008)(5660300002)(83380400001)(66446008)(33656002)(52536014)(8936002)(71200400001)(8676002)(6916009)(316002)(66476007)(86362001)(64756008)(186003)(4744005)(76116006)(55016002)(966005)(6506007)(2906002)(7696005); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=FYcKhVfi/4d78duIM3wFRGO4Nvlf8zP0k+qQm9U6nnomKjnUVvMkr7DWBdyfFoGQyaNSLjwk/hrmPsWqhM4OiIKt+ujUiFHIZ1wahv+EAtE89hcpv5dKcS5VBHKN8dT6KZtSr0r/5eMAkgOORiu9Zu0bTT9vw+2/AZ6OBEDerFvJ12Y697qP1YEEUxUfYNJXy1DSNLJZ7DcatnTNy9wtDI5Ix/V4keaProuOAs+28nm+Cz18t195/fMBsBfJSsdE0Olx3LaHkz7jMbaOUhTs/2Mf3m8L41qs5FBGHKYZuopsSFcJfA/aGeTaZymkb6YkgwiX3kRZ+ekaN+7iqGxajg==
arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=xTvJrBWLC8iYjt2ycj2Cq6w14QAjjGAzkPwPUzjlhSQ=; b=btcVlEQo+f4rBLUKnryOmozNA27nkNX7IfiiavqWUExpIYwM0UfmAewDSvsJPUFp7Mu10PNZI0Yby5mSbeo8QJnX3u2QNj+/2M1OTuVulj9G0/z2M9nhMuQZPM2LAMI6rSZaJbXNpfa5ILVY146yfCyjylchavwyoKsZDIyYqtVfVvZWSAuF5JSNTgncz9fVdjrhfrqAtIQwefEBcenz1mVIEsp0nnzQ4jhOcesig8703w5Awip0PKkDH51JOtwte45QE/E+CTriBsbv7V4fVY3y0ZM9m3SH6A2v6GkXnWANm98tHry+X/vRuJgdIfxOTAp2wriAeX9MQ12ZZJp3EQ==
arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=comcast.com; dmarc=pass action=none header.from=comcast.com; dkim=pass header.d=comcast.com; arc=none
x-ms-exchange-crosstenant-authas: Internal
x-ms-exchange-crosstenant-authsource: MN2PR11MB4351.namprd11.prod.outlook.com
x-ms-exchange-crosstenant-network-message-id: 75cb79da-0580-4d12-5264-08d8ad10d99b
x-ms-exchange-crosstenant-originalarrivaltime: 30 Dec 2020 22:18:35.3782 (UTC)
x-ms-exchange-crosstenant-fromentityheader: Hosted
x-ms-exchange-crosstenant-id: 906aefe9-76a7-4f65-b82d-5ec20775d5aa
x-ms-exchange-crosstenant-mailboxtype: HOSTED
x-ms-exchange-crosstenant-userprincipalname: brVEaM9gI0mUsfQTL4RxZvFqzRdfZYAnL8EcUo08wC+8fHSXlatS2PjNEm343l+tjsYMNxbvyxMkClF/48b4kqMhhysvnmMnNI2ktv8avFM=
x-ms-exchange-transport-crosstenantheadersstamped: MN2PR11MB4632
x-originatororg: comcast.com
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter-Loop: Forward AAETWQ
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.343, 18.0.737 definitions=2020-12-30_14:2020-12-30, 2020-12-30 signatures=0
X-Proofpoint-Spam-Reason: safe
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/yJ3WkAiSJTSJUR3WfVUS0chhjbc>
Subject: [dmarc-ietf] Clarification about data integrity within Aggregate Reports (Ticket #40)
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 Dec 2020 22:19:00 -0000

Hello folks,

There's an open ticket (https://trac.ietf.org/trac/dmarc/ticket/40) noting that we should clarify what constitutes valid data in a report. For example, the report cannot state that DMARC-DKIM was a "pass" when DKIM itself was a failure.  See the original thread here:

https://mailarchive.ietf.org/arch/msg/dmarc/Ii_dLXFzBNnRP361F922ty789I8/

It seems like the gist is that within the report it should never happen that DKIM or SPF are noted to have passed in the context of DMARC if they have not passed on their own.  It should also be properly noted by the reporter if they override with local policy.  Not by overriding the SPF/DKIM failures (and showing them as incorrectly passing), but instead by noting that local policy overrides properly (regardless of whether that override is higher or lower).

Does that seem properly summarized?

--
Alex Brotman
Sr. Engineer, Anti-Abuse & Messaging Policy
Comcast