
From vesely@tana.it  Fri May 10 06:44:04 2013
Return-Path: <vesely@tana.it>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 86C6A21F9003 for <dmarc@ietfa.amsl.com>; Fri, 10 May 2013 06:44:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.219
X-Spam-Level: 
X-Spam-Status: No, score=-5.219 tagged_above=-999 required=5 tests=[AWL=-0.500, BAYES_00=-2.599, HELO_EQ_IT=0.635, HOST_EQ_IT=1.245, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LPNfvTOwmAxb for <dmarc@ietfa.amsl.com>; Fri, 10 May 2013 06:44:00 -0700 (PDT)
Received: from wmail.tana.it (wmail.tana.it [62.94.243.226]) by ietfa.amsl.com (Postfix) with ESMTP id 308FD21F9019 for <dmarc@ietf.org>; Fri, 10 May 2013 06:43:48 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=tana.it; s=beta; t=1368193427; bh=tOE142r/TEsledUk6lnUMPxbxCE7xSdHIX5fwm1pRJM=; l=912; h=Date:From:To; b=J7ErpQPufLCJQmaI5DJTCOEjzY93f43Tdf+VIARy1Ns5f9SuioJ+8ZagdoX8dfzhl asZGXsksDOqso6oSdP+rHhfI7VFLTcNkN1LuPSfj1cwedyV4cbvuWFPp2jvIpNVg6m ysF47oWuzCMlRDCXJ7m7AWPeWtptmrRXKg4amLDc=
Authentication-Results: tana.it; auth=pass (details omitted)
Received: from [172.25.197.101] (pcale.tana [172.25.197.101]) (AUTH: CRAM-MD5 uXDGrn@SYT0/k, TLS: TLSv1/SSLv3,256bits,AES256-SHA) by wmail.tana.it with ESMTPSA; Fri, 10 May 2013 15:43:47 +0200 id 00000000005DC039.00000000518CF993.000021FA
Message-ID: <518CF993.2060900@tana.it>
Date: Fri, 10 May 2013 15:43:47 +0200
From: Alessandro Vesely <vesely@tana.it>
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:17.0) Gecko/20130328 Thunderbird/17.0.5
MIME-Version: 1.0
To: dmarc@ietf.org
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Subject: [dmarc-ietf] The "policy" value and replay attacks
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 10 May 2013 13:44:04 -0000

I consistently get this from a couple of dmarc generators (126 in this
case):

      <dkim>
        <domain>tana.it</domain>
        <result>neutral</result>
        <human_result>
          signature error:
          DKIM-Signature could not parse or has bad tags/values
        </human_result>
      </dkim>

That may refer to the fact that I don't sign some critical fields,
such as the subject and content-type, or to the fact that I use l= to
allow footers.  Shouldn't that get a "policy" result, rather than
"neutral"?

I produce such fettered signing as I found DKIM-Signatures survive
better through mailing list that way.  I'll have to strengthen my DKIM
options in case of abuse, and suppose DMARC reports will make me
notice if someone manages to add a payload without breaking the sig
and then replays the message massively.  However, I'm not clear on how
exactly replay attacks would be detected.  Was that part of DMARC
requirements?

From prvs=83596fa9f=fmartin@linkedin.com  Fri May 10 10:54:25 2013
Return-Path: <prvs=83596fa9f=fmartin@linkedin.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 706EC21F86DD for <dmarc@ietfa.amsl.com>; Fri, 10 May 2013 10:54:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.432
X-Spam-Level: 
X-Spam-Status: No, score=-6.432 tagged_above=-999 required=5 tests=[AWL=-0.167, BAYES_00=-2.599, IP_NOT_FRIENDLY=0.334, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hCQmtWh0XOrj for <dmarc@ietfa.amsl.com>; Fri, 10 May 2013 10:54:21 -0700 (PDT)
Received: from esv4-mav04.corp.linkedin.com (esv4-mav04.corp.linkedin.com [69.28.149.80]) by ietfa.amsl.com (Postfix) with ESMTP id C5E0021F86D8 for <dmarc@ietf.org>; Fri, 10 May 2013 10:54:21 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linkedin.com; i=@linkedin.com; q=dns/txt; s=proddkim1024; t=1368208461; x=1399744461; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=pboQp/BYBP4Q0PEctkFzWZx1aR619OlEI+YKuis4KOY=; b=l6YUIE1RKxKd3GIVKC9um581/9c81SLg7Oj3b5pRd7pyw4lbM+NIzvv9 YLBIi5qY65ljw26pPDrdvL5gtcvb+kl098VqPJLKnBgyUKTGTMqsrsHc2 VzgQOxtBFSYcy5t7ZtTP1SLYDkBfeMrMOISpx+p+NSwF6HDEkDJb2RnKF U=;
X-IronPort-AV: E=Sophos;i="4.87,650,1363158000"; d="scan'208";a="47030868"
Received: from ESV4-MBX01.linkedin.biz ([fe80::d029:a1fa:62c4:2641]) by esv4-cas02.linkedin.biz ([172.18.46.142]) with mapi id 14.02.0328.011; Fri, 10 May 2013 10:54:11 -0700
From: Franck Martin <fmartin@linkedin.com>
To: Alessandro Vesely <vesely@tana.it>
Thread-Topic: [dmarc-ietf] The "policy" value and replay attacks
Thread-Index: AQHOTYSJbFDVOesBRU639fbOC76Nbpj/KRgA
Date: Fri, 10 May 2013 17:54:11 +0000
Message-ID: <77426B543150464AA3F30DF1A91365DE53067C6D@ESV4-MBX01.linkedin.biz>
References: <518CF993.2060900@tana.it>
In-Reply-To: <518CF993.2060900@tana.it>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [172.18.46.250]
Content-Type: text/plain; charset="us-ascii"
Content-ID: <6782FBB99824994BAC3336E4618B0103@linkedin.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "<dmarc@ietf.org>" <dmarc@ietf.org>
Subject: Re: [dmarc-ietf] The "policy" value and replay attacks
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 10 May 2013 17:54:25 -0000

If not mistaken this is the DKIM result, not the the DMARC-DKIM result, the=
re is a whole confusion which one is which if you don't read carefully the =
spec, sometimes I get lost myself

On May 10, 2013, at 6:43 AM, Alessandro Vesely <vesely@tana.it> wrote:

> I consistently get this from a couple of dmarc generators (126 in this
> case):
>=20
>      <dkim>
>        <domain>tana.it</domain>
>        <result>neutral</result>
>        <human_result>
>          signature error:
>          DKIM-Signature could not parse or has bad tags/values
>        </human_result>
>      </dkim>
>=20
> That may refer to the fact that I don't sign some critical fields,
> such as the subject and content-type, or to the fact that I use l=3D to
> allow footers.  Shouldn't that get a "policy" result, rather than
> "neutral"?
>=20
> I produce such fettered signing as I found DKIM-Signatures survive
> better through mailing list that way.  I'll have to strengthen my DKIM
> options in case of abuse, and suppose DMARC reports will make me
> notice if someone manages to add a payload without breaking the sig
> and then replays the message massively.  However, I'm not clear on how
> exactly replay attacks would be detected.  Was that part of DMARC
> requirements?
> _______________________________________________
> dmarc mailing list
> dmarc@ietf.org
> https://www.ietf.org/mailman/listinfo/dmarc


From micahroy08@gmail.com  Fri May 10 14:42:53 2013
Return-Path: <micahroy08@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AAF9B21F9347 for <dmarc@ietfa.amsl.com>; Fri, 10 May 2013 14:42:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, NO_RELAYS=-0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 10fa-YS2gxFS for <dmarc@ietfa.amsl.com>; Fri, 10 May 2013 14:42:52 -0700 (PDT)
Received: from mail-we0-x22d.google.com (mail-we0-x22d.google.com [IPv6:2a00:1450:400c:c03::22d]) by ietfa.amsl.com (Postfix) with ESMTP id 6062421F92A5 for <dmarc@ietf.org>; Fri, 10 May 2013 14:42:52 -0700 (PDT)
Received: by mail-we0-f173.google.com with SMTP id q54so4387668wes.18 for <dmarc@ietf.org>; Fri, 10 May 2013 14:42:51 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:x-received:in-reply-to:references:date:message-id :subject:from:to:content-type; bh=QNeTtaFww1bO/v3Raj4Gs9U7YQKwvPW6oAlEFb3lC4w=; b=CTv9ndQD0EnI6CyKlyEZhrSuYnKEaiZveTWGSRi0JzCasajHYIk889mkjrLeigd42j 6+bJE6fbZAsyUSSeWa+DVJYn8QpBvhbBJqFXbcvXdFFIbjI4q9udYehJTJkYrICGkGPI 2pP9d/wKJUSFC+luv+DLDvJMkPWF5cjCFvKczqspE724qhKpGw8gxi6VzCYrsz0m6Lv6 5flENWPj7YjxdhOqtpKPpoy6k8SOduamNTpX7WvzXXvXRJq4vfOGekxPPryj5O3cmBi4 aqGePL7gcp1uNcUWzcPu+9zPOsxx+dTcfgljApe2ZqvGEYPw8807lKFE94tYvYBttp13 WHlQ==
MIME-Version: 1.0
X-Received: by 10.180.89.140 with SMTP id bo12mr6411747wib.22.1368222171511; Fri, 10 May 2013 14:42:51 -0700 (PDT)
Received: by 10.217.41.68 with HTTP; Fri, 10 May 2013 14:42:50 -0700 (PDT)
Received: by 10.217.41.68 with HTTP; Fri, 10 May 2013 14:42:50 -0700 (PDT)
In-Reply-To: <mailman.108.1368212434.19941.dmarc@ietf.org>
References: <mailman.108.1368212434.19941.dmarc@ietf.org>
Date: Fri, 10 May 2013 14:42:50 -0700
Message-ID: <CAC0dgB_p8Z25ONL5W7B7M5=sNutZaEPKVEgNWbQ1rFX=ucof1w@mail.gmail.com>
From: Micah Rasmussen <micahroy08@gmail.com>
To: dmarc@ietf.org
Content-Type: multipart/alternative; boundary=e89a8f3bab8581c50e04dc640cfd
Subject: Re: [dmarc-ietf] dmarc Digest, Vol 2, Issue 1
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 10 May 2013 21:42:53 -0000

--e89a8f3bab8581c50e04dc640cfd
Content-Type: text/plain; charset=ISO-8859-1

Wtf is going on here? This email makes no sense..
On May 10, 2013 12:01 PM, <dmarc-request@ietf.org> wrote:

> If you have received this digest without all the individual message
> attachments you will need to update your digest options in your list
> subscription.  To do so, go to
>
> https://www.ietf.org/mailman/listinfo/dmarc
>
> Click the 'Unsubscribe or edit options' button, log in, and set "Get
> MIME or Plain Text Digests?" to MIME.  You can set this option
> globally for all the list digests you receive at this point.
>
>
>
> Send dmarc mailing list submissions to
>         dmarc@ietf.org
>
> To subscribe or unsubscribe via the World Wide Web, visit
>         https://www.ietf.org/mailman/listinfo/dmarc
> or, via email, send a message with subject or body 'help' to
>         dmarc-request@ietf.org
>
> You can reach the person managing the list at
>         dmarc-owner@ietf.org
>
> When replying, please edit your Subject line so it is more specific
> than "Re: Contents of dmarc digest..."
>
> Today's Topics:
>
>    1. The "policy" value and replay attacks (Alessandro Vesely)
>    2. Re: The "policy" value and replay attacks (Franck Martin)
>
>
> ---------- Forwarded message ----------
> From: Alessandro Vesely <vesely@tana.it>
> To: dmarc@ietf.org
> Cc:
> Date: Fri, 10 May 2013 15:43:47 +0200
> Subject: [dmarc-ietf] The "policy" value and replay attacks
> I consistently get this from a couple of dmarc generators (126 in this
> case):
>
>       <dkim>
>         <domain>tana.it</domain>
>         <result>neutral</result>
>         <human_result>
>           signature error:
>           DKIM-Signature could not parse or has bad tags/values
>         </human_result>
>       </dkim>
>
> That may refer to the fact that I don't sign some critical fields,
> such as the subject and content-type, or to the fact that I use l= to
> allow footers.  Shouldn't that get a "policy" result, rather than
> "neutral"?
>
> I produce such fettered signing as I found DKIM-Signatures survive
> better through mailing list that way.  I'll have to strengthen my DKIM
> options in case of abuse, and suppose DMARC reports will make me
> notice if someone manages to add a payload without breaking the sig
> and then replays the message massively.  However, I'm not clear on how
> exactly replay attacks would be detected.  Was that part of DMARC
> requirements?
>
>
>
> ---------- Forwarded message ----------
> From: Franck Martin <fmartin@linkedin.com>
> To: Alessandro Vesely <vesely@tana.it>
> Cc: "<dmarc@ietf.org>" <dmarc@ietf.org>
> Date: Fri, 10 May 2013 17:54:11 +0000
> Subject: Re: [dmarc-ietf] The "policy" value and replay attacks
> If not mistaken this is the DKIM result, not the the DMARC-DKIM result,
> there is a whole confusion which one is which if you don't read carefully
> the spec, sometimes I get lost myself
>
> On May 10, 2013, at 6:43 AM, Alessandro Vesely <vesely@tana.it> wrote:
>
> > I consistently get this from a couple of dmarc generators (126 in this
> > case):
> >
> >      <dkim>
> >        <domain>tana.it</domain>
> >        <result>neutral</result>
> >        <human_result>
> >          signature error:
> >          DKIM-Signature could not parse or has bad tags/values
> >        </human_result>
> >      </dkim>
> >
> > That may refer to the fact that I don't sign some critical fields,
> > such as the subject and content-type, or to the fact that I use l= to
> > allow footers.  Shouldn't that get a "policy" result, rather than
> > "neutral"?
> >
> > I produce such fettered signing as I found DKIM-Signatures survive
> > better through mailing list that way.  I'll have to strengthen my DKIM
> > options in case of abuse, and suppose DMARC reports will make me
> > notice if someone manages to add a payload without breaking the sig
> > and then replays the message massively.  However, I'm not clear on how
> > exactly replay attacks would be detected.  Was that part of DMARC
> > requirements?
> > _______________________________________________
> > dmarc mailing list
> > dmarc@ietf.org
> > https://www.ietf.org/mailman/listinfo/dmarc
>
>
>
> _______________________________________________
> dmarc mailing list
> dmarc@ietf.org
> https://www.ietf.org/mailman/listinfo/dmarc
>
>

--e89a8f3bab8581c50e04dc640cfd
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<p>Wtf is going on here? This email makes no sense..</p>
<div class=3D"gmail_quote">On May 10, 2013 12:01 PM,  &lt;<a href=3D"mailto=
:dmarc-request@ietf.org">dmarc-request@ietf.org</a>&gt; wrote:<br type=3D"a=
ttribution"><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;bo=
rder-left:1px #ccc solid;padding-left:1ex">
If you have received this digest without all the individual message<br>
attachments you will need to update your digest options in your list<br>
subscription. =A0To do so, go to<br>
<br>
<a href=3D"https://www.ietf.org/mailman/listinfo/dmarc" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/dmarc</a><br>
<br>
Click the &#39;Unsubscribe or edit options&#39; button, log in, and set &qu=
ot;Get<br>
MIME or Plain Text Digests?&quot; to MIME. =A0You can set this option<br>
globally for all the list digests you receive at this point.<br>
<br>
<br>
<br>
Send dmarc mailing list submissions to<br>
=A0 =A0 =A0 =A0 <a href=3D"mailto:dmarc@ietf.org">dmarc@ietf.org</a><br>
<br>
To subscribe or unsubscribe via the World Wide Web, visit<br>
=A0 =A0 =A0 =A0 <a href=3D"https://www.ietf.org/mailman/listinfo/dmarc" tar=
get=3D"_blank">https://www.ietf.org/mailman/listinfo/dmarc</a><br>
or, via email, send a message with subject or body &#39;help&#39; to<br>
=A0 =A0 =A0 =A0 <a href=3D"mailto:dmarc-request@ietf.org">dmarc-request@iet=
f.org</a><br>
<br>
You can reach the person managing the list at<br>
=A0 =A0 =A0 =A0 <a href=3D"mailto:dmarc-owner@ietf.org">dmarc-owner@ietf.or=
g</a><br>
<br>
When replying, please edit your Subject line so it is more specific<br>
than &quot;Re: Contents of dmarc digest...&quot;<br>
<br>Today&#39;s Topics:<br>
<br>
=A0 =A01. The &quot;policy&quot; value and replay attacks (Alessandro Vesel=
y)<br>
=A0 =A02. Re: The &quot;policy&quot; value and replay attacks (Franck Marti=
n)<br>
<br><br>---------- Forwarded message ----------<br>From:=A0Alessandro Vesel=
y &lt;<a href=3D"mailto:vesely@tana.it">vesely@tana.it</a>&gt;<br>To:=A0<a =
href=3D"mailto:dmarc@ietf.org">dmarc@ietf.org</a><br>Cc:=A0<br>Date:=A0Fri,=
 10 May 2013 15:43:47 +0200<br>
Subject:=A0[dmarc-ietf] The &quot;policy&quot; value and replay attacks<br>=
I consistently get this from a couple of dmarc generators (126 in this<br>
case):<br>
<br>
=A0 =A0 =A0 &lt;dkim&gt;<br>
=A0 =A0 =A0 =A0 &lt;domain&gt;<a href=3D"http://tana.it" target=3D"_blank">=
tana.it</a>&lt;/domain&gt;<br>
=A0 =A0 =A0 =A0 &lt;result&gt;neutral&lt;/result&gt;<br>
=A0 =A0 =A0 =A0 &lt;human_result&gt;<br>
=A0 =A0 =A0 =A0 =A0 signature error:<br>
=A0 =A0 =A0 =A0 =A0 DKIM-Signature could not parse or has bad tags/values<b=
r>
=A0 =A0 =A0 =A0 &lt;/human_result&gt;<br>
=A0 =A0 =A0 &lt;/dkim&gt;<br>
<br>
That may refer to the fact that I don&#39;t sign some critical fields,<br>
such as the subject and content-type, or to the fact that I use l=3D to<br>
allow footers. =A0Shouldn&#39;t that get a &quot;policy&quot; result, rathe=
r than<br>
&quot;neutral&quot;?<br>
<br>
I produce such fettered signing as I found DKIM-Signatures survive<br>
better through mailing list that way. =A0I&#39;ll have to strengthen my DKI=
M<br>
options in case of abuse, and suppose DMARC reports will make me<br>
notice if someone manages to add a payload without breaking the sig<br>
and then replays the message massively. =A0However, I&#39;m not clear on ho=
w<br>
exactly replay attacks would be detected. =A0Was that part of DMARC<br>
requirements?<br>
<br>
<br><br>---------- Forwarded message ----------<br>From:=A0Franck Martin &l=
t;<a href=3D"mailto:fmartin@linkedin.com">fmartin@linkedin.com</a>&gt;<br>T=
o:=A0Alessandro Vesely &lt;<a href=3D"mailto:vesely@tana.it">vesely@tana.it=
</a>&gt;<br>
Cc:=A0&quot;&lt;<a href=3D"mailto:dmarc@ietf.org">dmarc@ietf.org</a>&gt;&qu=
ot; &lt;<a href=3D"mailto:dmarc@ietf.org">dmarc@ietf.org</a>&gt;<br>Date:=
=A0Fri, 10 May 2013 17:54:11 +0000<br>Subject:=A0Re: [dmarc-ietf] The &quot=
;policy&quot; value and replay attacks<br>
If not mistaken this is the DKIM result, not the the DMARC-DKIM result, the=
re is a whole confusion which one is which if you don&#39;t read carefully =
the spec, sometimes I get lost myself<br>
<br>
On May 10, 2013, at 6:43 AM, Alessandro Vesely &lt;<a href=3D"mailto:vesely=
@tana.it">vesely@tana.it</a>&gt; wrote:<br>
<br>
&gt; I consistently get this from a couple of dmarc generators (126 in this=
<br>
&gt; case):<br>
&gt;<br>
&gt; =A0 =A0 =A0&lt;dkim&gt;<br>
&gt; =A0 =A0 =A0 =A0&lt;domain&gt;<a href=3D"http://tana.it" target=3D"_bla=
nk">tana.it</a>&lt;/domain&gt;<br>
&gt; =A0 =A0 =A0 =A0&lt;result&gt;neutral&lt;/result&gt;<br>
&gt; =A0 =A0 =A0 =A0&lt;human_result&gt;<br>
&gt; =A0 =A0 =A0 =A0 =A0signature error:<br>
&gt; =A0 =A0 =A0 =A0 =A0DKIM-Signature could not parse or has bad tags/valu=
es<br>
&gt; =A0 =A0 =A0 =A0&lt;/human_result&gt;<br>
&gt; =A0 =A0 =A0&lt;/dkim&gt;<br>
&gt;<br>
&gt; That may refer to the fact that I don&#39;t sign some critical fields,=
<br>
&gt; such as the subject and content-type, or to the fact that I use l=3D t=
o<br>
&gt; allow footers. =A0Shouldn&#39;t that get a &quot;policy&quot; result, =
rather than<br>
&gt; &quot;neutral&quot;?<br>
&gt;<br>
&gt; I produce such fettered signing as I found DKIM-Signatures survive<br>
&gt; better through mailing list that way. =A0I&#39;ll have to strengthen m=
y DKIM<br>
&gt; options in case of abuse, and suppose DMARC reports will make me<br>
&gt; notice if someone manages to add a payload without breaking the sig<br=
>
&gt; and then replays the message massively. =A0However, I&#39;m not clear =
on how<br>
&gt; exactly replay attacks would be detected. =A0Was that part of DMARC<br=
>
&gt; requirements?<br>
&gt; _______________________________________________<br>
&gt; dmarc mailing list<br>
&gt; <a href=3D"mailto:dmarc@ietf.org">dmarc@ietf.org</a><br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/dmarc" target=3D"_bla=
nk">https://www.ietf.org/mailman/listinfo/dmarc</a><br>
<br>
<br>
<br>_______________________________________________<br>
dmarc mailing list<br>
<a href=3D"mailto:dmarc@ietf.org">dmarc@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/dmarc" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/dmarc</a><br>
<br></blockquote></div>

--e89a8f3bab8581c50e04dc640cfd--

From superuser@gmail.com  Wed May 22 22:43:27 2013
Return-Path: <superuser@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D65CD11E8182 for <dmarc@ietfa.amsl.com>; Wed, 22 May 2013 22:43:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, NO_RELAYS=-0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KiPHEhWSJp1E for <dmarc@ietfa.amsl.com>; Wed, 22 May 2013 22:43:26 -0700 (PDT)
Received: from mail-wi0-x22f.google.com (mail-wi0-x22f.google.com [IPv6:2a00:1450:400c:c05::22f]) by ietfa.amsl.com (Postfix) with ESMTP id BA6CF11E817D for <dmarc@ietf.org>; Wed, 22 May 2013 22:43:22 -0700 (PDT)
Received: by mail-wi0-f175.google.com with SMTP id hn14so4308020wib.14 for <dmarc@ietf.org>; Wed, 22 May 2013 22:43:21 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-type; bh=HIDGx1ZGtMV+hdh+HJ++IT3oc/4zxl+jbg/1qWz1lTo=; b=awsReQN+J2v2u0QDYbvBBpMglGIB1ncA6lOZnj1Lb0gWFr/E6c+NrA7owwt1ayI7+/ 7peDwBdY5kHf9D2XYS/AGhnPZWVUgqOWb+S/pgAXkvxGCZ2zw6Kz0ZDXwJybcbX44oQc i8eLsofMancc2U8YaYVYmCwsgJbvlpkeQoVtKPN3xcJI2uj06iY5Ewjpft5pILCYy8tV 67vp2BohjBdirbggGdR/fTn2uiTJ/z4kn+b9TRlYmduMLRanlmVp3AMix5uHUn3dW8v6 rnj26r+VVlXAUEU3VFzb8pIhIQX8mTuJd0A6DTxBjB5VXI/ZWmECdkNMywDTceGwKFOO Vd4w==
MIME-Version: 1.0
X-Received: by 10.180.37.133 with SMTP id y5mr20849961wij.20.1369287801127; Wed, 22 May 2013 22:43:21 -0700 (PDT)
Received: by 10.180.14.34 with HTTP; Wed, 22 May 2013 22:43:20 -0700 (PDT)
In-Reply-To: <519B47DC.20008@cisco.com>
References: <519B47DC.20008@cisco.com>
Date: Wed, 22 May 2013 22:43:20 -0700
Message-ID: <CAL0qLwYZOp1FNVSAmzXYkZG_O3Yv+EQrAKKLpRiE5svcOMamTA@mail.gmail.com>
From: "Murray S. Kucherawy" <superuser@gmail.com>
To: "dmarc@ietf.org" <dmarc@ietf.org>
Content-Type: multipart/alternative; boundary=e89a8f50335afb47f904dd5c28af
Subject: [dmarc-ietf] Fwd: Eliot's review of the DMARC spec
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 23 May 2013 05:43:27 -0000

--e89a8f50335afb47f904dd5c28af
Content-Type: text/plain; charset=windows-1252
Content-Transfer-Encoding: quoted-printable

This got caught in list moderation and I accidentally discarded it.
However it was also sent direct to me, so I do still have it; re-sending.

---------- Forwarded message ----------
From: Eliot Lear <lear@cisco.com>
Date: Tue, May 21, 2013 at 3:09 AM
Subject: Eliot's review of the DMARC spec
To: dmarc@ietf.org, draft-kucherawy-dmarc-base.all@tools.ietf.org, Barry
Leiba <barryleiba@computer.org>


 I've been asked to take a look at the DMARC spec.  Let me start by saying
that I know that you guys have running code.  I beg your indulgence and ask
you to read through.  While this review may come across as a bit negative,
and while I have concerns about several components (potential downgrade
attack etc).

In general I'd say this document needs some cleanup, and in my opinion, it
is *not* ready to move forward as a proposed standard.  To start with, the
requirements section is horribly confused.  Some are not requirements but
specifications, others are vague.  They read like there was a negotiation
among the contributors on what to keep out and what to keep in, or perhaps
these are markers for the working group.  Whatever.

The whole section needs to be replaced with something simpler, like:

[1]  Here is what the specification is out to accomplish (and not
accomplish).
[1a] A formal description of the threat model
[2]  Here are the assumptions we make about sender capabilities
[3]  Here are the assumptions we're making about receiver capabilities.

Let me stress conciseness!!

The document is laden with terms that are either explained later or not
explained at all (see below for examples).

A clear overview of the entire system should be provided.  It needn't be
long; perhaps a page or two.  Yes, include a pretty ASCII picture (maybe a
swimming pool diagram or two).

Please also intersperse the examples.  Otherwise the reader has to jump all
over the document.

The Security Considerations section needs a serious edit cut.

More detailed comments below.  This list is incomplete and should receive
further review, once the document is updated.

Sections 2.1 =96 2.3 are advertisements for the mechanism, and largely
vacuous.  I would be happy to read how DMARC actually helps with phishing
or scaling, but these sections don't go into enough detail to be
meaningful.  Particularly off putting is the statement:

   [...] the DMARC mechanism is viewed more importantly as a
   substantial step forward in terms of creating reliable and defensible
   message streams.


By whom and why is it more important?  Let's avoid the advertisements and
the appeal to some vague authority.

Section 3 needs a fair amount of work.  I would prefer to see more detailed
statements about what the goals are.

So for instance, taking each bullet point in turn:

   o  Minimize false positives.


Positive for what?  Phish?  Positive authentication?

   o  Provide robust authentication reporting.


By whom to whom?  And what is authentication reporting in this context?

   o  Reduce the amount of successfully delivered phish.


Is the intent here solely to avoid phish or also spam?  Are we talking
about "fraudulant and/or dangerous email?"  I'm nitpicking on phish because
if this is a major high level goal, I want to understand what precisely you
intend to minimize.


Section 3.2 really belongs in Security Considerations.

Also, a nit: these are goals not requirements, unless we can say who is
making them requirements.  And if it's not the IETF, then let's back off
that language.

Section 3.3 point 3 is full of forward references and use of jargon like
"joe job" attacks, leading one straight to Google.  I'm not documenting the
rest at the moment, but the document is laden with this sort of thing, and
really needs to be unladen.


Section 3.4:

1.  is not a requirement, but an assertion.
2.  is all mixed up.  What precisely is the requirement?  The last sentence
belongs in another sentence.
3.  Is not really a requirement but a statement that DNS will be used.
5.  "No action" is used without explaining what that means.  I know that
sounds obvious "take no action", but does that mean HALT?  Let the message
through?  What?
6.  This is obvious.  The reverse is hard and necessary.  How can a policy
be applied that functions across an entire domain?
7.  I don't understand why this is in the doc at all, and why it is a
requirement.
8.  This requires that state be maintained on a receiver, and could be an
attack vector.
9.  Is not a requirement.
10,11,12.  Requirements for aggregate report without actually saying what
is being aggregated or reported.
14.  If we're using DNS, this is obvious.


Section 4:

The glossary needs to be moved forward!!!

Organizational Domain: Question: what would happen if two sites develop two
separate lists of public suffixes that don't match?  In particular, could a
parent domain assert authority for messages sent from a child domain?  What
are the implications if a TLD is not listed?  Does anyone know the
breakdown of the Egyptian domains in Arabic?

4.2: Summary  =3D> Overview.  This also needs to be moved forward, although
if you rewrite and shrink Section 3 as I recommend, it will have that
effect ;-)

Section 5:

A Domain Owner advertises DMARC participation by adding a DNS TXT
   record (described in Section 6) {R3, R15, R16} to one or more sending
   domains under its direct or indirect control (e.g. operated by a
   delegate by agreement with the Domain Owner).


I think you mean "A Domain Owner advertises DMARC participation of one or
more sending domains by advertising them through a DNS TXT record."

   A Mail Receiver MUST consider an arriving message to pass the DMARC
   test if and only if one or more of the underlying message
   authentication mechanisms pass with proper identifier alignment.


Please define what the test actually IS!!

Later on:

   A Domain Owner that does not advertise an SPF policy or sign with
   DKIM is making an implicit statement that the use cases those
   protocols satisfy are not to be considered when determining whether
   or not the message under evaluation is valid.  For example, not
   publishing an SPF policy is an implicit message from Domain Owners to
   Mail Receivers that successful path authorization is not to be taken
   as sufficient evidence that the Domain Owner authorized the message.


Either I'm confused or this example is backwards.  How can you do
successful path authorization in the first place without SPF?


Section 8.2:

For example, a TXT resource record at
   "*._report._dmarc.example.com" containing at least "v=3DDMARC1"
   confirms that example.com is willing to receive DMARC reports for any
   domain.


Any domain or any CHILD domain?

Section 8.4:

That last comment in (2) seems to indicate that there should be a way to
collapse the ABNF, but I leave it to Dave who is Mr. ABNF as to whether
that is the right thing to do (I guess the tradeoff would be a mandatory
order).

Section 9:

Steps 2 and 4 look both repetitive and they conflict.  One says that the
record must START with a version and the other simply requires its
inclusion.  ???


Section 11.3 as an example:

   Attention must be paid to the possible presence of the "pct" tag in
   the DMARC policy record.  If the tag is present, the Mail Receiver
   MUST NOT enact the requested policy ("p" tag or "sp" tag") on more
   than the stated percent of the totality of affected messages.


The first sentence is chatty, and reflects the overall informal tone of the
document.  This is a technical specification and not a casual conversation.

Section 12.2.1: EMail

Please justify your normative language in the following cases:

   In the case of a "mailto" URI, the Mail Receiver SHOULD communicate
   reports using the method described in [STARTTLS].


As a matter of security, RFC-2119 gives license to you to use MUST here.
Why not do it?

   The aggregate data MUST be present using the media type "application/
   gzip", and the filenames SHOULD be constructed using the following
   ABNF:


On what basis according to RFC-2119  MUST aggregate data be compressed?
Separately, why is the filename at all important, requiring a SHOULD?


Section 13:

   o  Is able to send and/or receive reports at least daily;

   o  Is able to send and/or receive reports using "mailto" URIs;


Receive?  Eh?  How can one receive a report at least daily?  Using a URI?


Section 15 Security Considerations:

15.1, 15.2, and elsewhere don't follow the best current practices specified
in RFC-3552, and those that have evolved since.  State the threat and state
the remediation (if any).  I would split 15.4 to two points: there is the
potential for a downgrade attack as SPF is only as strong as its weakest
link in the path, and that a poor deployment of SPF can lead to garbage
getting through.

I don't really see 15.9 as a security consideration, but more of a
deployment consideration.

15.10.4:

Open transport mechanisms should be
   avoided.


"Unencrypted"?

15.12:

Again, poorly stated threat.  Remediation seems to suggest DNSSEC but then
doesn't require its use.  At the same time, the text gives license to
implementations to defer message processing when DNSSEC isn't deployed.
This leads to interoperability issues.  Be clear: either require DNSSEC or
don't but don't NOT require it and then recommend deferrals.

Eliot

--e89a8f50335afb47f904dd5c28af
Content-Type: text/html; charset=windows-1252
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">This got caught in list moderation and I accidentally disc=
arded it.=A0 However it was also sent direct to me, so I do still have it; =
re-sending.<br><div><div><br><div class=3D"gmail_quote">---------- Forwarde=
d message ----------<br>
From: <b class=3D"gmail_sendername">Eliot Lear</b> <span dir=3D"ltr">&lt;<a=
 href=3D"mailto:lear@cisco.com">lear@cisco.com</a>&gt;</span><br>Date: Tue,=
 May 21, 2013 at 3:09 AM<br>Subject: Eliot&#39;s review of the DMARC spec<b=
r>
To: <a href=3D"mailto:dmarc@ietf.org">dmarc@ietf.org</a>, <a href=3D"mailto=
:draft-kucherawy-dmarc-base.all@tools.ietf.org">draft-kucherawy-dmarc-base.=
all@tools.ietf.org</a>, Barry Leiba &lt;<a href=3D"mailto:barryleiba@comput=
er.org">barryleiba@computer.org</a>&gt;<br>
<br><br>
 =20

   =20
 =20
  <div bgcolor=3D"#FFFFFF" text=3D"#000000">
    I&#39;ve been asked to take a look at the DMARC spec.=A0 Let me start b=
y
    saying that I know that you guys have running code.=A0 I beg your
    indulgence and ask you to read through.=A0 While this review may come
    across as a bit negative, and while I have concerns about several
    components (potential downgrade attack etc).<br>
    <br>
    In general I&#39;d say this document needs some cleanup, and in my
    opinion, it is <b>not</b> ready to move forward as a proposed
    standard.=A0 To start with, the requirements section is horribly
    confused.=A0 Some are not requirements but specifications, others are
    vague.=A0 They read like there was a negotiation among the
    contributors on what to keep out and what to keep in, or perhaps
    these are markers for the working group.=A0 Whatever.=A0 <br>
    <br>
    The whole section needs to be replaced with something simpler, like:<br=
>
    <br>
    [1]=A0 Here is what the specification is out to accomplish (and not
    accomplish).<br>
    [1a] A formal description of the threat model<br>
    [2]=A0 Here are the assumptions we make about sender capabilities<br>
    [3]=A0 Here are the assumptions we&#39;re making about receiver
    capabilities.<br>
    <br>
    Let me stress conciseness!!<br>
    <br>
    The document is laden with terms that are either explained later or
    not explained at all (see below for examples).<br>
    <br>
    A clear overview of the entire system should be provided.=A0 It
    needn&#39;t be long; perhaps a page or two.=A0 Yes, include a pretty AS=
CII
    picture (maybe a swimming pool diagram or two).<br>
    <br>
    Please also intersperse the examples.=A0 Otherwise the reader has to
    jump all over the document.<br>
    <br>
    The Security Considerations section needs a serious edit cut.<br>
    <br>
    More detailed comments below.=A0 This list is incomplete and should
    receive further review, once the document is updated.<br>
    <br>
    Sections 2.1 <small>=96 2.3 are advertisements for the mechanism, and
      largely vacuous.=A0 I would be happy to read how DMARC actually
      helps with phishing or scaling</small>, but these sections don&#39;t
    go into enough detail to be meaningful.=A0 Particularly off putting is
    the statement:<br>
    <br>
    <blockquote type=3D"cite">=A0=A0 [...] the DMARC mechanism is viewed mo=
re
      importantly as a<br>
      =A0=A0 substantial step forward in terms of creating reliable and
      defensible<br>
      =A0=A0 message streams.</blockquote>
    <br>
    By whom and why is it more important?=A0 Let&#39;s avoid the
    advertisements and the appeal to some vague authority.<br>
    <br>
    Section 3 needs a fair amount of work.=A0 I would prefer to see more
    detailed statements about what the goals are.=A0 <br>
    <br>
    So for instance, taking each bullet point in turn:<br>
    <br>
    <blockquote type=3D"cite">=A0=A0 o=A0 Minimize false positives.<br>
    </blockquote>
    <br>
    Positive for what?=A0 Phish?=A0 Positive authentication?<br>
    <br>
    <blockquote type=3D"cite">=A0=A0 o=A0 Provide robust authentication
      reporting.<br>
    </blockquote>
    <br>
    By whom to whom?=A0 And what is authentication reporting in this
    context?<br>
    <br>
    <blockquote type=3D"cite">=A0=A0 o=A0 Reduce the amount of successfully
      delivered phish.<br>
    </blockquote>
    <br>
    Is the intent here solely to avoid phish or also spam?=A0 Are we
    talking about &quot;fraudulant and/or dangerous email?&quot;=A0 I&#39;m=
 nitpicking
    on phish because if this is a major high level goal, I want to
    understand what precisely you intend to minimize.<br>
    <br>
    <br>
    Section 3.2 really belongs in Security Considerations.<br>
    <br>
    Also, a nit: these are goals not requirements, unless we can say who
    is making them requirements.=A0 And if it&#39;s not the IETF, then let&=
#39;s
    back off that language.<br>
    <br>
    Section 3.3 point 3 is full of forward references and use of jargon
    like &quot;joe job&quot; attacks, leading one straight to Google.=A0 I&=
#39;m not
    documenting the rest at the moment, but the document is laden with
    this sort of thing, and really needs to be unladen.<br>
    <br>
    <br>
    Section 3.4:<br>
    <br>
    1.=A0 is not a requirement, but an assertion.<br>
    2.=A0 is all mixed up.=A0 What precisely is the requirement?=A0 The las=
t
    sentence belongs in another sentence.<br>
    3.=A0 Is not really a requirement but a statement that DNS will be
    used.=A0 <br>
    5.=A0 &quot;No action&quot; is used without explaining what that means.=
=A0 I know
    that sounds obvious &quot;take no action&quot;, but does that mean HALT=
?=A0 Let
    the message through?=A0 What?<br>
    6.=A0 This is obvious.=A0 The reverse is hard and necessary.=A0 How can=
 a
    policy be applied that functions across an entire domain?<br>
    7.=A0 I don&#39;t understand why this is in the doc at all, and why it =
is
    a requirement.<br>
    8.=A0 This requires that state be maintained on a receiver, and could
    be an attack vector.<br>
    9.=A0 Is not a requirement.<br>
    10,11,12.=A0 Requirements for aggregate report without actually saying
    what is being aggregated or reported.<br>
    14.=A0 If we&#39;re using DNS, this is obvious.<br>
    <br>
    <br>
    Section 4: <br>
    <br>
    The glossary needs to be moved forward!!!<br>
    <br>
    Organizational Domain: Question: what would happen if two sites
    develop two separate lists of public suffixes that don&#39;t match?=A0 =
In
    particular, could a parent domain assert authority for messages sent
    from a child domain?=A0 What are the implications if a TLD is not
    listed?=A0 Does anyone know the breakdown of the Egyptian domains in
    Arabic?<br>
    <br>
    4.2: Summary=A0 =3D&gt; Overview.=A0 This also needs to be moved forwar=
d,
    although if you rewrite and shrink Section 3 as I recommend, it will
    have that effect ;-)<br>
    <br>
    Section 5:<br>
    <br>
    <blockquote type=3D"cite">A Domain Owner advertises DMARC
      participation by adding a DNS TXT<br>
      =A0=A0 record (described in Section 6) {R3, R15, R16} to one or more
      sending<br>
      =A0=A0 domains under its direct or indirect control (e.g. operated by
      a<br>
      =A0=A0 delegate by agreement with the Domain Owner).=A0</blockquote>
    <br>
    I think you mean &quot;A Domain Owner advertises DMARC participation of
    one or more sending domains by advertising them through a DNS TXT
    record.&quot;<br>
    <blockquote type=3D"cite">=A0=A0 A Mail Receiver MUST consider an arriv=
ing
      message to pass the DMARC<br>
      =A0=A0 test if and only if one or more of the underlying message<br>
      =A0=A0 authentication mechanisms pass with proper identifier
      alignment.</blockquote>
    <br>
    Please define what the test actually IS!!<br>
    <br>
    Later on:<br>
    <br>
    <blockquote type=3D"cite">=A0=A0 A Domain Owner that does not advertise=
 an
      SPF policy or sign with<br>
      =A0=A0 DKIM is making an implicit statement that the use cases those<=
br>
      =A0=A0 protocols satisfy are not to be considered when determining
      whether<br>
      =A0=A0 or not the message under evaluation is valid.=A0 For example, =
not<br>
      =A0=A0 publishing an SPF policy is an implicit message from Domain
      Owners to<br>
      =A0=A0 Mail Receivers that successful path authorization is not to be
      taken<br>
      =A0=A0 as sufficient evidence that the Domain Owner authorized the
      message.<br>
    </blockquote>
    <br>
    Either I&#39;m confused or this example is backwards.=A0 How can you do
    successful path authorization in the first place without SPF?<br>
    <br>
    <br>
    Section 8.2:<br>
    <br>
    <blockquote type=3D"cite">For example, a TXT resource record at<br>
      =A0=A0 &quot;*._report._<a href=3D"http://dmarc.example.com" target=
=3D"_blank">dmarc.example.com</a>&quot; containing at least &quot;v=3DDMARC=
1&quot;<br>
      =A0=A0 confirms that <a href=3D"http://example.com" target=3D"_blank"=
>example.com</a> is willing to receive DMARC reports
      for any<br>
      =A0=A0 domain.<br>
    </blockquote>
    <br>
    Any domain or any CHILD domain?<br>
    <br>
    Section 8.4:<br>
    <br>
    That last comment in (2) seems to indicate that there should be a
    way to collapse the ABNF, but I leave it to Dave who is Mr. ABNF as
    to whether that is the right thing to do (I guess the tradeoff would
    be a mandatory order).<br>
    <br>
    Section 9:<br>
    <br>
    Steps 2 and 4 look both repetitive and they conflict.=A0 One says that
    the record must START with a version and the other simply requires
    its inclusion.=A0 ???<br>
    <br>
    <br>
    Section 11.3 as an example:<br>
    <br>
    <blockquote type=3D"cite">=A0=A0 Attention must be paid to the possible
      presence of the &quot;pct&quot; tag in<br>
      =A0=A0 the DMARC policy record.=A0 If the tag is present, the Mail
      Receiver<br>
      =A0=A0 MUST NOT enact the requested policy (&quot;p&quot; tag or &quo=
t;sp&quot; tag&quot;) on
      more<br>
      =A0=A0 than the stated percent of the totality of affected messages.<=
br>
    </blockquote>
    <br>
    The first sentence is chatty, and reflects the overall informal tone
    of the document.=A0 This is a technical specification and not a casual
    conversation.<br>
    <br>
    Section 12.2.1: EMail<br>
    <br>
    Please justify your normative language in the following cases:<br>
    <blockquote type=3D"cite">=A0=A0 In the case of a &quot;mailto&quot; UR=
I, the Mail
      Receiver SHOULD communicate<br>
      =A0=A0 reports using the method described in [STARTTLS].</blockquote>
    <br>
    As a matter of security, RFC-2119 gives license to you to use MUST
    here.=A0 Why not do it?<br>
    <br>
    <blockquote type=3D"cite">=A0=A0 The aggregate data MUST be present usi=
ng
      the media type &quot;application/<br>
      =A0=A0 gzip&quot;, and the filenames SHOULD be constructed using the
      following<br>
      =A0=A0 ABNF:</blockquote>
    <br>
    On what basis according to RFC-2119=A0 MUST aggregate data be
    compressed? <br>
    Separately, why is the filename at all important, requiring a
    SHOULD?<br>
    <br>
    <br>
    Section 13:<br>
    <br>
    <blockquote type=3D"cite">=A0=A0 o=A0 Is able to send and/or receive re=
ports
      at least daily;<br>
      <br>
      =A0=A0 o=A0 Is able to send and/or receive reports using &quot;mailto=
&quot; URIs;<br>
    </blockquote>
    <br>
    Receive?=A0 Eh?=A0 How can one receive a report at least daily?=A0 Usin=
g a
    URI?<br>
    <br>
    <br>
    Section 15 Security Considerations:<br>
    <br>
    15.1, 15.2, and elsewhere don&#39;t follow the best current practices
    specified in RFC-3552, and those that have evolved since.=A0 State the
    threat and state the remediation (if any).=A0 I would split 15.4 to
    two points: there is the potential for a downgrade attack as SPF is
    only as strong as its weakest link in the path, and that a poor
    deployment of SPF can lead to garbage getting through.<br>
    <br>
    I don&#39;t really see 15.9 as a security consideration, but more of a
    deployment consideration.<br>
    <br>
    15.10.4:<br>
    <blockquote type=3D"cite">Open transport mechanisms should be<br>
      =A0=A0 avoided.<br>
    </blockquote>
    <br>
    &quot;Unencrypted&quot;?<br>
    <br>
    15.12:<br>
    <br>
    Again, poorly stated threat.=A0 Remediation seems to suggest DNSSEC
    but then doesn&#39;t require its use.=A0 At the same time, the text giv=
es
    license to implementations to defer message processing when DNSSEC
    isn&#39;t deployed.=A0 This leads to interoperability issues.=A0 Be cle=
ar:
    either require DNSSEC or don&#39;t but don&#39;t NOT require it and the=
n
    recommend deferrals.<span class=3D"HOEnZb"><font color=3D"#888888"><br>
    <br>
    Eliot<br>
  </font></span></div>

</div><br></div></div></div>

--e89a8f50335afb47f904dd5c28af--

From sm@resistor.net  Thu May 23 03:00:35 2013
Return-Path: <sm@resistor.net>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0707A21F90CD for <dmarc@ietfa.amsl.com>; Thu, 23 May 2013 03:00:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.544
X-Spam-Level: 
X-Spam-Status: No, score=-102.544 tagged_above=-999 required=5 tests=[AWL=0.055, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rElE5y6-QfkI for <dmarc@ietfa.amsl.com>; Thu, 23 May 2013 03:00:33 -0700 (PDT)
Received: from mx.ipv6.elandsys.com (mx.ipv6.elandsys.com [IPv6:2001:470:f329:1::1]) by ietfa.amsl.com (Postfix) with ESMTP id 68A6021F90D2 for <dmarc@ietf.org>; Thu, 23 May 2013 03:00:33 -0700 (PDT)
Received: from SUBMAN.resistor.net (IDENT:sm@localhost [127.0.0.1]) (authenticated bits=0) by mx.elandsys.com (8.14.5/8.14.5) with ESMTP id r4NA0ONF027575; Thu, 23 May 2013 03:00:27 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=opendkim.org; s=mail2010; t=1369303229; bh=OvJQDCohqEk1Q9kMy7HVHq3W26mI+qxSudnCwPtoIvA=; h=Date:To:From:Subject:Cc:In-Reply-To:References; b=jYB0C3CkENv2gQ0vMeO5KyEDlHNrwr9eEZIfqaM9iyGJwYPN3K7sxL4HhOMu5vxvv /pSNwa3Zg7fNFyJwqluXUAq9zDgjyK437aGhI6kBb0VyFhQeLYqvot7hpRkQSx1OP4 PdJSq+GSSYXaJOhe36ZLr5750v/UvR+JvuFCuHps=
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=resistor.net; s=mail; t=1369303229; i=@resistor.net; bh=OvJQDCohqEk1Q9kMy7HVHq3W26mI+qxSudnCwPtoIvA=; h=Date:To:From:Subject:Cc:In-Reply-To:References; b=rXBSE4Em/lnhxsxCz8Sst3W124OgM3fSOuSTkqR0zo+nVGUHkf6VGiq1JMTXNLi2G lLx0npygCmlYalgCviA69jrNp5aEHFZV/6aGJlgjg9NENSEhkiWoW1jFMT0y4wUwRY hMlZNwEJWUBiqjy4jRRCY0+M/XGW/mPKtMjTeJKI=
Message-Id: <6.2.5.6.2.20130523002139.0da7ac58@resistor.net>
X-Mailer: QUALCOMM Windows Eudora Version 6.2.5.6
Date: Thu, 23 May 2013 02:55:13 -0700
To: dmarc@ietf.org
From: SM <sm@resistor.net>
In-Reply-To: <CAL0qLwYZOp1FNVSAmzXYkZG_O3Yv+EQrAKKLpRiE5svcOMamTA@mail.g mail.com>
References: <519B47DC.20008@cisco.com> <CAL0qLwYZOp1FNVSAmzXYkZG_O3Yv+EQrAKKLpRiE5svcOMamTA@mail.gmail.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed
Cc: Eliot Lear <lear@cisco.com>
Subject: Re: [dmarc-ietf] Fwd: Eliot's review of the DMARC spec
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 23 May 2013 10:00:35 -0000

At 22:43 22-05-2013, Murray S. Kucherawy wrote:
>---------- Forwarded message ----------
>From: Eliot Lear <lear@cisco.com>

[snip]

>I've been asked to take a look at the DMARC spec.  Let me start by 
>saying that I know that you guys have running code.  I beg your 
>indulgence and ask you to read through.  While this review may come 
>across as a bit negative, and while I have concerns about several 
>components (potential downgrade attack etc).

I strongly agree with what is mentioned in Eliot's review.

>In general I'd say this document needs some cleanup, and in my 
>opinion, it is not ready to move forward as a proposed standard.  To 
>start with, the requirements section is horribly confused.  Some are 
>not requirements but specifications, others are vague.  They read 
>like there was a negotiation among the contributors on what to keep 
>out and what to keep in, or perhaps these are markers for the 
>working group.  Whatever.

If the aim to have a proposed standard I suggest focusing on the 
protocol aspect instead of having a document which tries to say everything.

>The whole section needs to be replaced with something simpler, like:
>
>[1]  Here is what the specification is out to accomplish (and not accomplish).
>[1a] A formal description of the threat model
>[2]  Here are the assumptions we make about sender capabilities
>[3]  Here are the assumptions we're making about receiver capabilities.
>
>Let me stress conciseness!!

Agreed.

 From the Abstract:

   "This memo presents a proposal for a scalable mechanism by which an
    organization can express, using the Domain Name System, domain-level
    policies and preferences for message validation, disposition, and
    reporting with predictable and accurate results.

    The enclosed proposal is not intended to introduce mechanisms that
    provide elevated delivery privilege of authenticated email.  The
    proposal presents a mechanism for policy distribution that enables a
    continuum of increasingly strict handling of messages that fail
    multiple authentication checks, from no action, through silent
    reporting, up to message rejection."

The body of the draft diverges significantly from what is stated in 
the Abstract.  Instead of expressing policies and preferences parts 
of the draft imposes policies (on the receiver).

The Introduction Section discusses about DMARC from a high-level 
perspective and does not convey any information about the 
technologies used in the design.  I had to read up to page 15 to get 
an idea of what DMARC is about.  It is not clear how DMARC URIs fit 
into the picture.

Some text in the document sounds like marketing to me.  For example, 
in Section 2.1:

   "DMARC is designed to support the extreme scalability requirements
    that characterize the systemic problem of identifying the origination
    and legitimacy of email.  DMARC seeks to preserve the positive
    aspects of the current email infrastructure, such as the ability for
    anyone to communicate with anyone else without introduction."

I suggest focusing on how the protocol works instead of trying to 
convince the reader about scalability requirements.

In Section 2.2:

   "This document is significantly informed by ongoing efforts to enact
    large-scale, Internet-wide, anti-phishing measures.  Whereas DMARC
    can only be used to combat specific forms of exact-domain phishing
    directly, the DMARC mechanism is viewed more importantly as a
    substantial step forward in terms of creating reliable and defensible
    message streams."

This can be discussed under security considerations if the question 
is considered as in scope for the protocol.

It would be easier to move Section 3 out.  The text makes the 
document look like a compliance document instead of a protocol 
specification.  In my opinion security considerations are about what 
threats were identified, what was addressed, what was not addressed, 
together with explanations.  Saying that X is out of scope does not 
sound like consideration has been given to a security issue.

The terminology section mentions terms such as "cousin domains", 
"domain owner", etc.  Although such terms may be popular I don't 
think that it is a good idea to use them in a protocol document as 
they can be ambiguous.

In Section 5:

   "A Mail Receiver MUST consider an arriving message to pass the DMARC
    test if and only if one or more of the underlying message
    authentication mechanisms pass with proper identifier alignment."

The above conveys the idea.  It does not provide adequate information 
for the implementer.

   "A Mail Receiver implementing the DMARC mechanism MUST make a best-
    effort to adhere to the Domain Owner's published DMARC policy when a
    message fails the DMARC test."

The above uses a "MUST" to tell people that they ought to make a 
best-effort.  In my opinion that is incorrect usage of RFC 2119 key words.

   "Mail Receivers MAY deviate from a Domain Owner's published policy
    during message processing and SHOULD make available the fact and
    reason of the deviation to the Domain Owner via feedback reporting."

I read the above as "if you do not do what I say you have to provide 
me with a justification".  Let me rewrite the text:

   "Mail Receivers deviating from a Domain Owner's published policy
    during message processing and MUST make available the fact and
    reason of the deviation to the Domain Owner via feedback reporting."

If that text is not acceptable to mail receivers the RFC 2119 SHOULD 
will have the same effect.

In Section 7:

   "When this is done, the DNS domain name thus recorded MUST be encoded as an
    A-label, as described in Section 2.3 of [IDNA]."

The above is under "policy enforcement considerations".  It should be 
in a section discussing the DNS aspects of the specification.

Section 8.2 is about "Verifying External Destinations".  If I am not 
mistaken, IETF specifications are not about imposing a specific 
method.  Section 8.2 sounds like a tutorial for the implementer 
instead of a definition of what the "DMARC policy string" means.

   "A report receiver MUST publish such a record in its DNS if it wishes
    to receive reports for other domains."

The RFC 2119 usage is inappropriate here.  I would put it after the 
high-level view (see Eliot's message) of how DMARC works.

In Section 8.3:

   "The report SHOULD include the following data:

    o  Enough information for the report consumer to re-calculate DMARC
       disposition based on the published policy, message dispositon, and
       SPF, DKIM, and identifier alignment results. {R12}"

"enough information" is an ambiguous description of what the report 
should include.

In Section 11.2:

   "Heuristics applied in the absence of use by a Domain Owner of either
    SPF or DKIM (e.g., [Best-Guess-SPF]) SHOULD NOT be used, as it may be
    the case that the Domain Owner wishes a Message Receiver not to
    consider the results of that underlying authentication protocol at
    all."

The reference would have to be normative.

In Section 11.3:

   'If email is subject to the DMARC policy of "quarantine", the Mail
    Receiver SHOULD quarantine the message.  If the email is not subject
    to the "quarantine" policy (e.g., due to the "pct" tag), the Mail
    Receiver SHOULD apply local spam classification as normal.'

The usage of RFC 2119 key words in the above is incorrect.

In Section 12.2.1:

  'In the case of a "mailto" URI, the Mail Receiver SHOULD communicate
    reports using the method described in [STARTTLS].'

Has the usual STARTTLS issues been taken into consideration for the 
RFC 2119 recommendation?

   "The aggregate data MUST be an XML file subjected to GZIP compression.
    The aggregate data MUST be present using the media type "application/
    gzip", and the filenames SHOULD be constructed using the following
    ABNF:"

In Section 12.2.2 it mentioned that:

   'Where an "http" or "https" method is requested in a Domain Owner's
    URI list, the Mail Receiver MAY encode the data using the
    "application/gzip" media type ([GZIP]) or MAY send the Appendix C
    data uncompressed or unencoded.'

The data exchange format depends on the URI scheme being used.  In my 
opinion that makes the implementation more complex.

   'For the GZIP file itself, the extension MUST be "gz"; for the XML
    report, the extension MUST be "xml".'

I would ask why such a RFC 2119 requirement is in the draft.

   "Email streams carrying DMARC feedback data MUST conform to the DMARC
    mechanism, thereby resulting in an aligned "pass" (see Section 4.3)."

As far as I am aware the IETF does not do conformance.

   'The RFC5322.Subject field for individual report submissions SHOULD
    conform to the following ABNF:'

The Subject field is specified as structured text in the above.

In Section 12.2.2:

   "The header portion of the POST or PUT request SHOULD contain a
    Subject field as described in Section 12.2.1."

This sounds like sending RFC 5322 formatted messages over HTTP.

In Section 15.8:

   "Many systems are able to scan the SMTP reply text to determine the
    nature of the rejection, thus providing a machine-detectable reason
    for rejection allows automated sorting of rejection causes so they
    can be properly addressed."

I don't think that it is a good idea to discuss about that as part of 
a protocol specification.

I suggest giving careful consideration to privacy.  The draft 
discusses about that in Section 15.10.1.  The draft would require a 
detailed review to understand what information is being exchanged and 
how that can affect users.

In Section 15.12:

   "The DMARC mechanism and its underlying technologies (SPF, DKIM)
    depend on the security of the DNS.  To reduce the risk of subversion
    of the DMARC mechanism due to DNS-based exploits, serious consideration
    should be given to the deployment of DNSSEC in parallel to the deployment
    of DMARC."

I would ask whether anyone who has deployed this mechanism is 
actually using DNSSEC.  If not the above is not saying anything to 
ensure secure use of the protocol.

   "S/MIME, or Secure Multipurpose Internet Mail Extensions, is a
    standard for encryption and signing of MIME data in a message.  This
    was suggested and considered as a third security protocol for
    authenticating the source of a message."

I could not understand the relationship between S/MIME and what this 
specification attempts to do.

   "It has been suggested in several message authentication efforts that
    the Sender header field be checked for an identifier of interest, as
    the standards indicate this as the proper way to indicate a re-
    mailing of content such as through a mailing list.  Most recently, it
    was a protocol-level option for DomainKeys, but on evolution to DKIM,
    this property was removed."

That discussion would be better in a DKIM-related document instead of 
adding it to this draft.

   'DMARC has been characterized as a "super-ADSP" of sorts.'

It is not a good idea to include criticism of other protocols in a 
draft that specifies a protocol unless it is relevant to the protocol 
being specified.

I suggest dropping the idea of using the "public suffix list" as 
previous attempts to use it have not been successful in the IETF.

Regards,
-sm 


From johnl@iecc.com  Thu May 23 11:36:11 2013
Return-Path: <johnl@iecc.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A93AB21F9401 for <dmarc@ietfa.amsl.com>; Thu, 23 May 2013 11:36:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -110.808
X-Spam-Level: 
X-Spam-Status: No, score=-110.808 tagged_above=-999 required=5 tests=[AWL=-0.109, BAYES_00=-2.599, GB_ABOUTYOU=0.5, HABEAS_ACCREDITED_SOI=-4.3, RCVD_IN_BSP_TRUSTED=-4.3, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Fap1hE6MaUAo for <dmarc@ietfa.amsl.com>; Thu, 23 May 2013 11:35:58 -0700 (PDT)
Received: from leila.iecc.com (leila6.iecc.com [IPv6:2001:470:1f07:1126:0:4c:6569:6c61]) by ietfa.amsl.com (Postfix) with ESMTP id 3ED5321F87C5 for <dmarc@ietf.org>; Thu, 23 May 2013 11:15:35 -0700 (PDT)
Received: (qmail 76438 invoked from network); 23 May 2013 18:15:27 -0000
Received: from leila.iecc.com (64.57.183.34) by mail1.iecc.com with QMQP; 23 May 2013 18:15:27 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=iecc.com; h=date:message-id:from:to:cc:subject:in-reply-to:mime-version:content-type:content-transfer-encoding; s=519e5cbf.xn--i8sz2z.k1305; i=johnl@user.iecc.com; bh=RGa10LnU54oOO5LoE+LuvyCV+5wvh91SqDFe73z33jo=; b=LR5km9XBIkLn/LlfVUpeB74X7RWlMflcDSlC9MBoDz31NbyI9WkIVMYv8fLMA74UEe01eWiCktJNHtkmXsMZwn4260BsX/0jI4FDOvKvpo8hQe1eYUZEYAzejEwXb3HA1rKHPDvUO/fpkLvjbHGlUV7PSmlVMGeU0s3SD+3HUXg=
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=taugh.com; h=date:message-id:from:to:cc:subject:in-reply-to:mime-version:content-type:content-transfer-encoding; s=519e5cbf.xn--i8sz2z.k1305; olt=johnl@user.iecc.com; bh=RGa10LnU54oOO5LoE+LuvyCV+5wvh91SqDFe73z33jo=; b=u4md4Av1n2uxazqgbzcnqy4/JGHfrq0Lg+51ARhffibGk9lxqGMZ/LYshRB13/+J1sJgIvAxY0ZshpvYBJezg4t/H8ZaUgc/OqcR1yknyXh775CAeEO5IkvXfUtaSg6jv8Y0q4ZupVgCCnqk681hpbwjDXpUzQVawluaPGn7u8I=
Date: 23 May 2013 18:15:05 -0000
Message-ID: <20130523181505.26913.qmail@joyce.lan>
From: "John Levine" <johnl@taugh.com>
To: dmarc@ietf.org
In-Reply-To: <CAL0qLwYZOp1FNVSAmzXYkZG_O3Yv+EQrAKKLpRiE5svcOMamTA@mail.gmail.com>
Organization: 
X-Headerized: yes
Mime-Version: 1.0
Content-type: text/plain; charset=utf-8
Content-transfer-encoding: 8bit
Cc: Eliot Lear <lear@cisco.com>
Subject: Re: [dmarc-ietf] Fwd: Eliot's review of the DMARC spec
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 23 May 2013 18:36:11 -0000

I agree with pretty much everything Eliot said.  Fortunately, having
written a DMARC implementation that handles everything other than
sending reports (the stuff is in a database, I could do it if I wanted
to) I believe the problems can be fixed with little or no change to the
bits on the wire.

DMARC does two separate things.  One is the policy stuff, what a
domain would like you to do if you see mail with their domain on the
From: line and no corresponding DKIM or SPF authentication.  The other
is the report stuff, requesting per-message and daily aggregate
reports from the world about the authentication results of mail with
your domain on the From: line.

The two parts have practically nothing to do with each other other
than sharing the _dmarc DNS record and it's quite possible to use
one without the other.  I've collected lots of interesting stats
for domains that will never publish a DMARC policy.

As far as what it does, or what it's good for, the policy stuff does
one very specific thing, denouncing unauthenticated mail with your
domain on the From: line.  For some senders, that category of mail
matches up well with a narrow but significant category of phishing.
For others it may match up with phish-like behaviors in which company
employees send mail from outside to avoid routing mail through the
corporate servers (a big issue for stockbrokers and the like where the
servers log everything.)  For a lot of senders, e.g., ISPs, the policy
isn't useful at all since the authentication model doesn't match what
their users do.  I would strenuously resist any attempts to claim that
it does more, particularly attempts to make it the FUSSP of the month,
often from people who should know better.

The reporting stuff is useful to see what sort of mail purporting to
be from you is arriving at the sites that send reports.  For some
domains, it may be useful to see how much you're being phished.  If
you're a stockbroker, it could be useful to find people evading the
server logging by sending from gmail.  Again, I would resist attempts
to claim that it does more than what it does, send reports which may
tell you interesting things about your mail (and in the security
section, note that it can also tell you interesting things about other
people's mail, e.g., the mailing lists that your users subscribe to.)

All but one of the technical comments seem on target.  I think the
protocol is OK, but the description needs to be edited down be a
description of what it does, leaving out all the reasons it's
wonderful.

Nit about the pct phrase:

>8.  This requires that state be maintained on a receiver, and could be an
>attack vector.

I implement it as perform policy if (time mod 100) < pct, which I
think is what everyone else does, no DMARC state needed.  It's worth
mentioning this as an adequate implementation.

R's,
John

From tim@eudaemon.net  Thu May 23 12:48:05 2013
Return-Path: <tim@eudaemon.net>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3269721F981C for <dmarc@ietfa.amsl.com>; Thu, 23 May 2013 12:48:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level: 
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sTTRJnOrdXsn for <dmarc@ietfa.amsl.com>; Thu, 23 May 2013 12:47:49 -0700 (PDT)
Received: from pie.eudaemon.net (pie.eudaemon.net [72.250.241.194]) by ietfa.amsl.com (Postfix) with ESMTP id 65D6021F9743 for <dmarc@ietf.org>; Thu, 23 May 2013 12:11:40 -0700 (PDT)
Received: from [10.0.1.7] (sctv-72-100.mounet.com [216.145.72.100]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by pie.eudaemon.net (Postfix) with ESMTPSA id 0F3A4CB46 for <dmarc@ietf.org>; Thu, 23 May 2013 15:12:17 -0400 (EDT)
From: Tim Draegen <tim@eudaemon.net>
Content-Type: multipart/alternative; boundary="Apple-Mail=_6D9A5480-CB30-4E7E-8E60-0983EF013665"
Message-Id: <1B552522-AF8D-4A2C-8F46-BFF25DC199D7@eudaemon.net>
Mime-Version: 1.0 (Mac OS X Mail 6.3 \(1503\))
Date: Thu, 23 May 2013 15:11:38 -0400
References: <519B47DC.20008@cisco.com> <CAL0qLwYZOp1FNVSAmzXYkZG_O3Yv+EQrAKKLpRiE5svcOMamTA@mail.gmail.com>
To: "dmarc@ietf.org" <dmarc@ietf.org>
In-Reply-To: <CAL0qLwYZOp1FNVSAmzXYkZG_O3Yv+EQrAKKLpRiE5svcOMamTA@mail.gmail.com>
X-Mailer: Apple Mail (2.1503)
Subject: Re: [dmarc-ietf] Eliot's review of the DMARC spec
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 23 May 2013 19:48:05 -0000

--Apple-Mail=_6D9A5480-CB30-4E7E-8E60-0983EF013665
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=windows-1252

On May 23, 2013, at 1:43 AM, Murray S. Kucherawy <superuser@gmail.com> =
wrote:
> [Requirements] read like there was a negotiation among the =
contributors on what to keep out and what to keep in, or perhaps these =
are markers for the working group.

Ha!  Eliot, you've nailed it.  Looking back, the document is largely the =
result of a long negotiation between organizations that all share a =
desire to combat fraud, and yet brought very different =
perspectives/emphasis to the effort.

Against that backdrop, a hearty +1 to your's and SM's comments.  =
Converting the DMARC memo into a proper protocol document means chopping =
away a great deal of the "result of long negotiation" bits, but =
hopefully those bits can be stitched together into supplementary =
documentation, as they're valuable as reference and maybe to clarify =
future discussion.

=3D- Tim


--Apple-Mail=_6D9A5480-CB30-4E7E-8E60-0983EF013665
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=windows-1252

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dwindows-1252"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space; =
"><div><div>On May 23, 2013, at 1:43 AM, Murray S. Kucherawy &lt;<a =
href=3D"mailto:superuser@gmail.com">superuser@gmail.com</a>&gt; =
wrote:</div><blockquote type=3D"cite"><span style=3D"font-family: =
Thonburi; font-size: medium; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
orphans: 2; text-align: -webkit-auto; text-indent: 0px; text-transform: =
none; white-space: normal; widows: 2; word-spacing: 0px; =
-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; display: =
inline !important; float: none; ">[Requirements] read like there was a =
negotiation among the contributors on what to keep out and what to keep =
in, or perhaps these are markers for the working =
group.</span></blockquote></div><br><div>Ha! &nbsp;Eliot, you've nailed =
it. &nbsp;Looking back, the document is largely the result of a long =
negotiation between organizations that all share a desire to combat =
fraud, and yet brought very different perspectives/emphasis to the =
effort.</div><div><br></div><div>Against that backdrop, a hearty +1 to =
your's and SM's comments. &nbsp;Converting the DMARC memo into a proper =
protocol document means chopping away a great deal of the "result of =
long negotiation" bits, but hopefully those bits can be stitched =
together into supplementary documentation, as they're valuable as =
reference and maybe to clarify future =
discussion.</div><div><br></div><div>=3D- =
Tim</div><div><br></div></body></html>=

--Apple-Mail=_6D9A5480-CB30-4E7E-8E60-0983EF013665--

From matt@tnpi.net  Thu May 23 15:09:27 2013
Return-Path: <matt@tnpi.net>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4A62321F974C for <dmarc@ietfa.amsl.com>; Thu, 23 May 2013 15:09:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.599
X-Spam-Level: 
X-Spam-Status: No, score=-3.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id orPT2jFvv3HL for <dmarc@ietfa.amsl.com>; Thu, 23 May 2013 15:09:13 -0700 (PDT)
Received: from mail.theartfarm.com (mail.theartfarm.com [208.75.177.101]) by ietfa.amsl.com (Postfix) with ESMTP id 9EC2521F8491 for <dmarc@ietf.org>; Thu, 23 May 2013 14:24:37 -0700 (PDT)
Received: (qmail 62378 invoked by uid 1026); 23 May 2013 21:24:36 -0000
Received: from c-76-121-98-64.hsd1.wa.comcast.net (HELO [10.0.1.125]) (76.121.98.64) by mail.theartfarm.com (qpsmtpd/0.93) with (AES128-SHA encrypted) ESMTPSA; Thu, 23 May 2013 17:24:36 -0400
Authentication-Results: mail.theartfarm.com; auth=pass (plain) smtp.auth=matt@theartfarm.com; iprev=pass
X-Virus-Checked: by ClamAV 0.97.7 on mail.theartfarm.com
X-Virus-Found: No
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed; d=tnpi.net; h=content-type:mime-version:subject:from:in-reply-to:date:cc:content-transfer-encoding:message-id:references:to; s=mar2013; bh=A9n7A6Car3Jn4UFqZh1hwASqqYtvXLlERQqgE2BvHKc=; b=L3Sc35R4U97VcV7vo6e5wJDXFQhH6/Tmw1T2DEjQAXLkvE1KNQvZhYIKBjZDLWSdKZTbdkV/EA1K60gYpcoi1t3zzldWXZ8xEi+mXOHDinFvA/hhFrwkhS6Tba2+Yw/SZXqI7gYYgPevaZqUg8v1qnXJVQ8ptlzYkqM0wvMNprLdlsF4xbqrQsDmAGpG3BVl29o6xt0TBe5n4JnrVcitFKQMKyf/pSKzjbviaHmQldda7gIJKTQ8WlCcqQV1dAK6EpLNk/qJz9ZrK25X5e4yAqRyKCzIItwVxO4fX2CLOXA0gP0zthJuGSu+lnqLcdNgpitufBGE25vRXRNjmpnUKA==
X-HELO: [10.0.1.125]
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 6.3 \(1503\))
From: Matt Simerson <matt@tnpi.net>
In-Reply-To: <20130523181505.26913.qmail@joyce.lan>
Date: Thu, 23 May 2013 14:24:35 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <A3033A6D-B42B-48B9-90C4-FEA9621F2A95@tnpi.net>
References: <20130523181505.26913.qmail@joyce.lan>
To: "John Levine" <johnl@taugh.com>
X-Mailer: Apple Mail (2.1503)
Cc: dmarc@ietf.org, Eliot Lear <lear@cisco.com>
Subject: Re: [dmarc-ietf] Fwd: Eliot's review of the DMARC spec
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 23 May 2013 22:09:27 -0000

On May 23, 2013, at 11:15 AM, "John Levine" <johnl@taugh.com> wrote:

> I agree with pretty much everything Eliot said.

+1

> Fortunately, having
> written a DMARC implementation that handles everything other than
> sending reports (the stuff is in a database, I could do it if I wanted
> to) I believe the problems can be fixed with little or no change to =
the
> bits on the wire.

I have written two implementations of DMARC (one merely validates, the =
other (Mail::DMARC) is mostly complete and does validation as well as =
send/receive aggregate reports. As an implementer, my "indulgence" is =
heartily extended. I would much prefer a more straight forward and =
concise specification.=20

> DMARC does two separate things.  One is the policy stuff, what a
> domain would like you to do if you see mail with their domain on the
> From: line and no corresponding DKIM or SPF authentication.  The other
> is the report stuff, requesting per-message and daily aggregate
> reports from the world about the authentication results of mail with
> your domain on the From: line.
>=20
> The two parts have practically nothing to do with each other other
> than sharing the _dmarc DNS record and it's quite possible to use
> one without the other.


I wonder whether DMARC shouldn't be two specifications? It seems that =
the validation portions of DMARC are well defined, straight forward to =
implement, and could easily be implemented by most modern MTAs (whether =
by milter, Amavis, or SpamAssassin).=20

The reporting aspects OTOH, are complex and encumbered with technical =
issues, security issues and sticky legal questions about information =
disclosure. While the reporting is valuable, its value will certainly be =
diminished by the number of organizations that implement it.

> The reporting stuff is useful to see what sort of mail purporting to
> be from you is arriving at the sites that send reports.

+1

> For some domains, it may be useful to see how much you're being =
phished.

It is also useful to see how many DMARC deploying sites fail to validate =
the DKIM signatures. For the DMARC receiver, reporting is a burden.  But =
as a domain author, DMARC reporting is very useful.=20

> Nit about the pct phrase:
>=20
>> 8.  This requires that state be maintained on a receiver, and could =
be an
>> attack vector.
>=20
> I implement it as perform policy if (time mod 100) < pct, which I
> think is what everyone else does, no DMARC state needed.  It's worth
> mentioning this as an adequate implementation.

I implemented with rand:

$result->reason( type =3D> 'sampled_out' ) if rand(100) >=3D =
$policy->pct;

Matt


From johnl@taugh.com  Thu May 23 16:11:52 2013
Return-Path: <johnl@taugh.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2966721F9401 for <dmarc@ietfa.amsl.com>; Thu, 23 May 2013 16:11:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level: 
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, NO_RELAYS=-0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iAymvlzzLncW for <dmarc@ietfa.amsl.com>; Thu, 23 May 2013 16:11:51 -0700 (PDT)
Received: from leila.iecc.com (leila6.iecc.com [IPv6:2001:470:1f07:1126:0:4c:6569:6c61]) by ietfa.amsl.com (Postfix) with ESMTP id D559C21F96B4 for <dmarc@ietf.org>; Thu, 23 May 2013 16:11:46 -0700 (PDT)
Received: (qmail 47132 invoked from network); 23 May 2013 23:11:46 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=iecc.com; h=date:message-id:from:to:cc:subject:in-reply-to:references:mime-version:content-type:user-agent:cleverness; s=b81b.519ea232.k1305; bh=aUV2SZht8mUZ+L6DGmoIzP1bpuqXP8tr01ImVVxXBL4=; b=FjUhf+vBXERjKSgbNEwT7xzpfsHIrgh37ArNuYT3FrezeblcTJ4XFA68xm8FRXTLFFTRjHCignH1R7vpvYL2n2oPhqFM2fu7jZJilsDdnMVpSQT80+QHH8qdE+z5ZqrQAbNEB5bpJcdgaSjyXkRtXdefhoQkNdelZLdSoF6DGB8=
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=taugh.com; h=date:message-id:from:to:cc:subject:in-reply-to:references:mime-version:content-type:user-agent:cleverness; s=b81b.519ea232.k1305; bh=aUV2SZht8mUZ+L6DGmoIzP1bpuqXP8tr01ImVVxXBL4=; b=TI5WHIK9S8AxVZv4Pn99SVyeDTXv/MAB6+EW8hBR1jPW8/ZjPK9vVkgkMc/68FZk+E7+7wr26y4JFu1CjRd13Y6xFjrA8wodtGcq69L8aQbhI25hwkizHPFe7OzCKK4e6nR9Xr5WDpxXadnr/07Edgk9wz0Z9NBtCPlWG268oeg=
Received: (ofmipd 127.0.0.1); 23 May 2013 23:11:23 -0000
Date: 23 May 2013 19:11:45 -0400
Message-ID: <alpine.BSF.2.00.1305231859220.27371@joyce.lan>
From: "John R Levine" <johnl@taugh.com>
To: "Matt Simerson" <matt@tnpi.net>
In-Reply-To: <A3033A6D-B42B-48B9-90C4-FEA9621F2A95@tnpi.net>
References: <20130523181505.26913.qmail@joyce.lan> <A3033A6D-B42B-48B9-90C4-FEA9621F2A95@tnpi.net>
User-Agent: Alpine 2.00 (BSF 1167 2008-08-23)
Cleverness: None detected
MIME-Version: 1.0
Content-Type: MULTIPART/signed; protocol="application/pkcs7-signature"; micalg=sha1; BOUNDARY="3825401791-1021801674-1369350706=:27371"
Cc: dmarc@ietf.org, Eliot Lear <lear@cisco.com>
Subject: Re: [dmarc-ietf] Fwd: Eliot's review of the DMARC spec
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 23 May 2013 23:11:52 -0000

  This message is in MIME format.  The first part should be readable text,
  while the remaining parts are likely unreadable without MIME-aware tools.

--3825401791-1021801674-1369350706=:27371
Content-Type: TEXT/PLAIN; charset=US-ASCII; format=flowed

> I wonder whether DMARC shouldn't be two specifications? It seems that 
> the validation portions of DMARC are well defined, straight forward to 
> implement, and could easily be implemented by most modern MTAs (whether 
> by milter, Amavis, or SpamAssassin).
>
> The reporting aspects OTOH, are complex and encumbered with technical 
> issues, security issues and sticky legal questions about information 
> disclosure. While the reporting is valuable, its value will certainly be 
> diminished by the number of organizations that implement it.

I don't see any benefit in that.  I expect the spec will be somewhat 
shorter when we're done, and in most cases I expect that people who 
implement one will at least partially implement the other.

>> I implement it as perform policy if (time mod 100) < pct, which I
>> think is what everyone else does, no DMARC state needed.  It's worth
>> mentioning this as an adequate implementation.
>
> I implemented with rand:
>
> $result->reason( type => 'sampled_out' ) if rand(100) >= $policy->pct;

rand() is usually seeded from the stuff including clock so it amounts to 
the same thing.  The point of course is that you can do the percent stuff 
by rolling dice, not by a rolling average.

Regards,
John Levine, johnl@taugh.com, Taughannock Networks, Trumansburg NY
"I dropped the toothpaste", said Tom, crestfallenly.
--3825401791-1021801674-1369350706=:27371
Content-Type: APPLICATION/pkcs7-signature; name=smime.p7s
Content-Transfer-Encoding: BASE64
Content-Description: S/MIME Cryptographic Signature
Content-Disposition: attachment; filename=smime.p7s
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--3825401791-1021801674-1369350706=:27371--
