Re: [spfbis] [Technical Errata Reported] RFC7208 (4081)

Andrew Sullivan <ajs@anvilwalrusden.com> Wed, 13 August 2014 23:26 UTC

Return-Path: <ajs@anvilwalrusden.com>
X-Original-To: spfbis@ietfa.amsl.com
Delivered-To: spfbis@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 740361A03E1 for <spfbis@ietfa.amsl.com>; Wed, 13 Aug 2014 16:26:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.141
X-Spam-Level:
X-Spam-Status: No, score=-0.141 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_MISMATCH_INFO=1.448, HOST_MISMATCH_NET=0.311] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ya8tD_rwY7XZ for <spfbis@ietfa.amsl.com>; Wed, 13 Aug 2014 16:26:27 -0700 (PDT)
Received: from mx1.yitter.info (ow5p.x.rootbsd.net [208.79.81.114]) (using TLSv1 with cipher ADH-CAMELLIA256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8E07E1A041B for <spfbis@ietf.org>; Wed, 13 Aug 2014 16:26:27 -0700 (PDT)
Received: from mx1.yitter.info (unknown [50.189.173.0]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.yitter.info (Postfix) with ESMTPSA id DD0848A031; Wed, 13 Aug 2014 23:26:25 +0000 (UTC)
Date: Wed, 13 Aug 2014 19:26:24 -0400
From: Andrew Sullivan <ajs@anvilwalrusden.com>
To: Scott Kitterman <scott@kitterman.com>
Message-ID: <20140813232624.GM48135@mx1.yitter.info>
References: <20140813230734.43A1F18000E@rfc-editor.org> <6ff7d3b8-be20-4407-931a-41605e129d1a@email.android.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <6ff7d3b8-be20-4407-931a-41605e129d1a@email.android.com>
User-Agent: Mutt/1.5.21 (2010-09-15)
Archived-At: http://mailarchive.ietf.org/arch/msg/spfbis/YnvG6DeowZ4Ui6cyNLZuSgVBMmM
Cc: presnick@qti.qualcomm.com, sm+ietf@elandsys.com, spfbis@ietf.org, d.stussy@yahoo.com, barryleiba@computer.org, RFC Errata System <rfc-editor@rfc-editor.org>
Subject: Re: [spfbis] [Technical Errata Reported] RFC7208 (4081)
X-BeenThere: spfbis@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: SPFbis discussion list <spfbis.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spfbis>, <mailto:spfbis-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/spfbis/>
List-Post: <mailto:spfbis@ietf.org>
List-Help: <mailto:spfbis-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spfbis>, <mailto:spfbis-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Aug 2014 23:26:33 -0000

I agree with Scott's argument, but even if I didn't it wouldn't be
correct to do this in an erratum.  It's a substantive change to the
protocol.  It should be rejected.

Best regards,

A

On Wed, Aug 13, 2014 at 07:19:48PM -0400, Scott Kitterman wrote:
> I believe this should be rejected. 
> 
> RFC7208 doesn't specify that messages should be rejected. A decision to reject is a local policy decision. 5.7.1 is the correct code.
> 
> In any case, draft-ietf-appsawg-email-auth-codes updates RFC7208 on this exact question, so the point will shortly be moot anyway. 
> 
> Scott K
> 
> On August 13, 2014 7:07:34 PM EDT, RFC Errata System <rfc-editor@rfc-editor.org> wrote:
> >The following errata report has been submitted for RFC7208,
> >"Sender Policy Framework (SPF) for Authorizing Use of Domains in Email,
> >Version 1".
> >
> >--------------------------------------
> >You may review the report below and at:
> >http://www.rfc-editor.org/errata_search.php?rfc=7208&eid=4081
> >
> >--------------------------------------
> >Type: Technical
> >Reported by: D. Stussy <d.stussy@yahoo.com>
> >
> >Section: 8.4
> >
> >Original Text
> >-------------
> >(Paragraph 2):  if supported, the 5.7.1 enhanced status code
> >...
> >
> >       550 5.7.1 SPF MAIL FROM check failed:
> >       550 5.7.1 The domain example.com explains:
> >       550 5.7.1 Please see http://www.example.com/mailpolicy.html
> >
> >
> >Corrected Text
> >--------------
> >if supported, the 5.7.7 enhanced status code
> >...
> >
> >       550 5.7.7 SPF MAIL FROM check failed:
> >       550 5.7.7 The domain example.com explains:
> >       550 5.7.7 Please see http://www.example.com/mailpolicy.html
> >
> >
> >Notes
> >-----
> >5.7.1 generally refers to messages refused due to content or LOCAL
> >policies.
> >5.7.7 refers to messages where there is an integrity problem.
> >
> >5.7.7 is a better description for rejecting an unauthorized message due
> >to the application of automatic checking criterion set by remote
> >validation.
> >
> >The author of this errata notes that the IANA is showing a pending
> >addition to the enhanced codes to add SPF-specific error code 5.7.23
> >(in lieu of 5.7.1 or 5.7.7), but currently sees no valid RFC proposing
> >it.  The draft is located at:
> >http://tools.ietf.org/html/draft-ietf-appsawg-email-auth-codes-07
> >
> >Instructions:
> >-------------
> >This erratum is currently posted as "Reported". If necessary, please
> >use "Reply All" to discuss whether it should be verified or
> >rejected. When a decision is reached, the verifying party (IESG)
> >can log in to change the status and edit the report, if necessary. 
> >
> >--------------------------------------
> >RFC7208 (draft-ietf-spfbis-4408bis-21)
> >--------------------------------------
> >Title               : Sender Policy Framework (SPF) for Authorizing Use
> >of Domains in Email, Version 1
> >Publication Date    : April 2014
> >Author(s)           : S. Kitterman
> >Category            : PROPOSED STANDARD
> >Source              : SPF Update
> >Area                : Applications
> >Stream              : IETF
> >Verifying Party     : IESG

-- 
Andrew Sullivan
ajs@anvilwalrusden.com