RE: [IETF] DMARC methods in mailman

"Christian Huitema" <> Tue, 27 December 2016 02:03 UTC

Return-Path: <>
Received: from localhost (localhost []) by (Postfix) with ESMTP id 3C700129952 for <>; Mon, 26 Dec 2016 18:03:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -2.602
X-Spam-Status: No, score=-2.602 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id aVlpRcwEh0bE for <>; Mon, 26 Dec 2016 18:03:21 -0800 (PST)
Received: from ( []) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by (Postfix) with ESMTPS id 69E7012994E for <>; Mon, 26 Dec 2016 18:03:21 -0800 (PST)
Received: from ([]) by with esmtps (TLSv1:AES256-SHA:256) (Exim 4.86) (envelope-from <>) id 1cLh6l-00080y-Uk for; Tue, 27 Dec 2016 03:03:20 +0100
Received: from [] ( by with esmtps (TLS-1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.63) (envelope-from <>) id 1cLh6k-0005CK-Ah for; Mon, 26 Dec 2016 21:03:19 -0500
Received: (qmail 23742 invoked from network); 27 Dec 2016 02:03:17 -0000
Received: from unknown (HELO icebox) ([]) (envelope-sender <>) by (qmail-ldap-1.03) with ESMTPA for <>; 27 Dec 2016 02:03:17 -0000
From: "Christian Huitema" <>
To: "'John Levine'" <>, <>
References: <> <20161227013401.11378.qmail@ary.lan>
In-Reply-To: <20161227013401.11378.qmail@ary.lan>
Date: Mon, 26 Dec 2016 18:03:07 -0800
Message-ID: <03e401d25fe5$5f32a5f0$1d97f1d0$>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQH5Ivjf6x65xaXBlA5BnUoJGPyqcKDNgd6A
Content-Language: en-us
Subject: RE: [IETF] DMARC methods in mailman
Authentication-Results:; auth=pass smtp.auth=
X-SpamExperts-Outgoing-Class: unsure
X-SpamExperts-Outgoing-Evidence: Combined (0.28)
X-Filter-ID: s0sct1PQhAABKnZB5plbIVbU93hg6Kq00BjAzYBqWlVTHAar8Je/lORhy3PZJU8LERWeKKG4PAQY Nyavp7c49L/N1imVzxQGuMdyq1ILpVFTugiLDom8V25hond3K4RsO76XSTAwtV4mg4i2ouCDa4AU hvIWAV5xUW/+gAh4vXoSPO2AuSaDIOAgQBMRa9FiRcOb18WfxGyg6Om6u4YYm0RLqmu7XH6RkBvL FpqJ2Z05hjoyEb9Oq0NWpyO3vrfYNrJwCbVSZviV1vzVlxiUlT3dKxLhoxcmaInYbR5vlqGudzLe k2TYFBStSOMccbr5Uz0sPgnpAk2KA2vJwMd1uWhCmLzOxTAcQmFWVARhgNqBNFD3an3wiMp49rVr ybSBe34TY+s3lj/RgDQoaICKQxQRCdMNhge1Unb77YyuZq5Py1EWir4TCwAJ3a/YpU2HRBdQ80wr wyng3wNtDYr6IWSdEOMftBjsWb6BDQzjSsEw7+KMtoemwN8keIAcPKMBBQ67muZNm3G2c8/Pjjqy k0k0bdVHmDm5y9NcoZdM30MpNkbYYJ8YZ7d5zi74j6F/pxvnk7PJGygctl3LC86in/6DwZpjxPTx I2S/vwoydU3rc+Iv2rc9L0aEB794CHU7QkUmTDfMv/tVj9RPDK26f1ZS3ljmeFVRIgA8pd5GE2NV TgVI3tePcP+0TP9kyYEY8TWpreAnukXR+i5LByI3DQeYUOp7A73HI6oJg7w/VodqDS3jhFVyYvjB Ar8iUjNZzB9tfY+mOJVw0e2xMRa7D2P5RYOa/miinTReZ5OdasFBlor8ikxQTKPsYxS4ne8tDiOh r4KrVZqMhXrs69DDK9BqLkXGaznuCfaQ1w/JpOE=
X-Recommended-Action: accept
Archived-At: <>
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: IETF-Discussion <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Tue, 27 Dec 2016 02:03:23 -0000

On Monday, December 26, 2016 5:34 PM, John Levine wrote:
>>By that argument, there's no excuse for the big mailer providers for
>>bouncing List mail because of DMARC.  They could just reference the
>>List-ID field, and display something like this:
>>    <From> via mailing list <list-id header contents>
> Great idea.  Because there is no possibility whatsoever that if mail
> systems did that, bad guys would put in fake List-IDs to get their
> phishes delivered.

Of course, they will. A system like that only works if the MUA is reasonably sure that the mail was in fact sent by the specified "sender", and that the sender was some reputable list forwarder that the user trusts.

But your mail and many comments on this lists point to the huge responsibility of the MUA with respect to phishing. Phishing is about duping the user by displaying misleading information. The effective defenses have to rely on proper user interface design, using all the information in the user context. Attempting to do that by just using network rules makes the network more complex, but cannot solve the problem.

-- Christian Huitema