Re: [dmarc-ietf] list history, Signaling MLMs

Scott Kitterman <sklist@kitterman.com> Sat, 15 April 2023 20:39 UTC

Return-Path: <sklist@kitterman.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C91B9C14CEFC for <dmarc@ietfa.amsl.com>; Sat, 15 Apr 2023 13:39:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.798
X-Spam-Level:
X-Spam-Status: No, score=-2.798 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=neutral reason="invalid (unsupported algorithm ed25519-sha256)" header.d=kitterman.com header.b="/e3MWqyR"; dkim=pass (2048-bit key) header.d=kitterman.com header.b="Xpptm5iA"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FGPdxDQRPbC2 for <dmarc@ietfa.amsl.com>; Sat, 15 Apr 2023 13:39:51 -0700 (PDT)
Received: from interserver.kitterman.com (interserver.kitterman.com [IPv6:2604:a00:6:1039:225:90ff:feaa:b169]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E6C53C14CE4C for <dmarc@ietf.org>; Sat, 15 Apr 2023 13:39:50 -0700 (PDT)
Received: from interserver.kitterman.com (interserver.kitterman.com [IPv6:2604:a00:6:1039:225:90ff:feaa:b169]) by interserver.kitterman.com (Postfix) with ESMTPS id F4124F8029E; Sat, 15 Apr 2023 16:39:37 -0400 (EDT)
DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/simple; d=kitterman.com; i=@kitterman.com; q=dns/txt; s=201903e; t=1681591155; h=date : from : to : subject : in-reply-to : references : message-id : mime-version : content-type : content-transfer-encoding : from; bh=tvSnT37wrqW/SZSGjC8Y8psdGKhJJ4CjPTZqVjXO3L4=; b=/e3MWqyRqOTTUFyuj8h8LEsVi01PVlAKgI4qRy4qzon4+wBmmmU/cn6liDV2781bp88QZ ZkOobTUaaXlqqoLBg==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kitterman.com; i=@kitterman.com; q=dns/txt; s=201903r; t=1681591155; h=date : from : to : subject : in-reply-to : references : message-id : mime-version : content-type : content-transfer-encoding : from; bh=tvSnT37wrqW/SZSGjC8Y8psdGKhJJ4CjPTZqVjXO3L4=; b=Xpptm5iAIlLJXg6luqpuut4mjZwtk0vjyejGTtkvS2m/AS/Qj+iaRKHVkj9GZ3cZJ+6o5 /Ew7hWJlsFtDM/fGpjd94pfAYzvLVv11fHmZ5imnY9ucor5u10SxkBVsM2g5ZBKVZRNb6Og fU8APjwteVIC9mtcAMYHbwFvNKQd3bV8/pyWwBzA7cwkCHMzxztf1ci3N2aZ5EFMldCoZoh xXuNs4hG7l9TptNjUbpb6xg7/uzE/udmr7YBxGkrprJLTISYGA3IDbOeIcqkJgoenBSIEC2 nmrLSPpEDVioA8bL9dAPjCScXmXda4qGnj+asQFAjLmmpP4F+lou8sXJuiUw==
Received: from [127.0.0.1] (static-72-81-252-22.bltmmd.fios.verizon.net [72.81.252.22]) by interserver.kitterman.com (Postfix) with ESMTPSA id AF6B2F80221; Sat, 15 Apr 2023 16:39:15 -0400 (EDT)
Date: Sat, 15 Apr 2023 20:39:11 +0000
From: Scott Kitterman <sklist@kitterman.com>
To: dmarc@ietf.org
In-Reply-To: <04cffebc-169d-dfea-e2c6-055406a74b1a@taugh.com>
References: <20230415170715.10F26BF2C124@ary.qy> <b8269f1d-6b43-4be7-b6d7-edcf79c3118f@app.fastmail.com> <04cffebc-169d-dfea-e2c6-055406a74b1a@taugh.com>
Message-ID: <D450EAD6-17F7-4F70-B4D3-1C8C283E2BE7@kitterman.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/y_-ixv_zhIuARbCJowj649VHA_8>
Subject: Re: [dmarc-ietf] list history, Signaling MLMs
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 15 Apr 2023 20:39:55 -0000


On April 15, 2023 8:17:41 PM UTC, John R Levine <johnl@taugh.com> wrote:
>> I'm assuming that the "long list of stinky possible workarounds" are the existing "whatever" mitigations, and rewriting seems to be acceptable enough as a mitigation to convince large [enterprise] mail systems to move forward with restrictive policies. ...
>
>I think you are greatly overestimating the connection between cause and effect here.  The people setting the policies have no idea what effect they have on their users, and to the degree they do, they do not care. IETFers at large organizations who support their IETF work, and that have p=reject, tell me they've told the IT departments that the policy is making it hard for them to get their work done and the response is either "duh?" or "not our problem."
>
>> I intentionally published > "p=quarantine pct=0" specifically to find the MLMs that implemented no mitigations, weighed that against what I knew about which receivers enforced non-mitigated mail, and then made a judgment call to move forward.
>
>It sure would be nice if people at other organizations were as concerned about the quality of mail service to their users.  But noooooo.
>
>> I believe Wei suggested that we need to find a better "whatever" (in the form of an alternative to SPF and DKIM that works with mailing lists) ...
>
>I would like a pony, too.  But ARC is as good as we have now and after a decade of beating our heads against the wall, I don't think we're going to find anything better.  I've suggested a bunch of things that would make lists' life better, and nobody is interested:
>

Agreed.

If someone has a great idea for a third way in email authentication, they should develop the idea, get some deployment experience, and then document the protocol.  After that would come the question of adding it to DMARC.  This is not the working group to do that work.

Scott K