
From superuser@gmail.com  Sun Dec  1 11:08:08 2013
Return-Path: <superuser@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EB78D1AE126 for <dmarc@ietfa.amsl.com>; Sun,  1 Dec 2013 11:08:08 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eRVgQI6JSGaw for <dmarc@ietfa.amsl.com>; Sun,  1 Dec 2013 11:08:06 -0800 (PST)
Received: from mail-wi0-x22c.google.com (mail-wi0-x22c.google.com [IPv6:2a00:1450:400c:c05::22c]) by ietfa.amsl.com (Postfix) with ESMTP id D5C741AE035 for <dmarc@ietf.org>; Sun,  1 Dec 2013 11:08:05 -0800 (PST)
Received: by mail-wi0-f172.google.com with SMTP id en1so3839063wid.11 for <dmarc@ietf.org>; Sun, 01 Dec 2013 11:08:03 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=wbpUz/tvPM8jJDfOhJSATNZvNQmQbNN1X2BGhXtLFKY=; b=elg4xtMbeZQeELTF806x1JFuXlAc3moGDf5MTFA9fBZXAKcqPHfuBL1Z/0bC7nOCyH 5bxDJXfiu7pv2KeHph/Ga3L74wwaVxRxig3k/RgjghUA61NpqSMPNkB0s0VUTpI9qfbl 2vySXTxd3xRO+3Xy7mJ8SW7vGGdk3+/mOFHdS5ovYn3u24VJCPXcdyCa+2B5w8Rc6Tnq KsGhYwdYfa+63efa0yDojVyT0S5vQvNdqisooUKCUbWsRoXctWaGR8ToLl3mvoNtlQxM HGrfvMe3HoXKs0qe3AGL9Szz3C7BqrSLw7HT3ljor5PU7zkZgyzI1SDM/pwsrUY6SlTf zKPQ==
MIME-Version: 1.0
X-Received: by 10.180.79.38 with SMTP id g6mr15281403wix.60.1385924883429; Sun, 01 Dec 2013 11:08:03 -0800 (PST)
Received: by 10.181.13.230 with HTTP; Sun, 1 Dec 2013 11:08:03 -0800 (PST)
In-Reply-To: <alpine.BSF.2.00.1312010149530.46631@joyce.lan>
References: <CE39F90A45FF0C49A1EA229FC9899B057309A1@USCLES544.agna.amgreetings.com> <20130809215557.Horde.NqTAQuKnN8mOfxFmS6Uf4g1@horde.andreasschulze.de> <alpine.BSF.2.00.1308091619240.69005@joyce.lan> <20130809234600.Horde.BohsttCU7cC5wFyE1swI8w3@horde.andreasschulze.de> <CAL0qLwYx5KdaCM2VNXdDPit4Lyen+5oQfpu1qF-GYwb8=MELqQ@mail.gmail.com> <alpine.BSF.2.00.1312010149530.46631@joyce.lan>
Date: Sun, 1 Dec 2013 11:08:03 -0800
Message-ID: <CAL0qLwb4BsGVff5QB2yaEwp389pW1T9DAUw1Ut3kEM7OdqggSg@mail.gmail.com>
From: "Murray S. Kucherawy" <superuser@gmail.com>
To: John R Levine <johnl@taugh.com>
Content-Type: multipart/alternative; boundary=f46d044287f65cbfb204ec7dc8ad
Cc: "dmarc@ietf.org" <dmarc@ietf.org>, Andreas Schulze <sca@andreasschulze.de>
Subject: Re: [dmarc-ietf] Section 12.2.2
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 01 Dec 2013 19:08:09 -0000

--f46d044287f65cbfb204ec7dc8ad
Content-Type: text/plain; charset=ISO-8859-1

On Sat, Nov 30, 2013 at 11:08 PM, John R Levine <johnl@taugh.com> wrote:

> If nobody implemented http reporting yet
>>> we should consider removing it from the spec...
>>>
>>
>> Any other opinions on this point?
>>
>
> The current spec is too messed up to allow interoperable implementations.
> (PUT and POST are not the same thing at all.)
>
> For large reports, http PUT is a much better way to deliver them than
> mail, since it's basically just a file upload to the target's web server,
> no base64 encoding or decoding needed, and no extra copies filling up mail
> spools.  It's easily made snoop and spoof resistant by using https, and
> it's easy to program because all of the usual http libraries support it.
>
> If any of the usual suspects are interested, I can tell you how to fix the
> spec.  It's not very hard, change it to be only PUT, and specify how to
> construct the PUT filename for each report.
>

Sure, can you send specific "change this to that" sets?  I'll change it in
the working copy.

Thanks,
-MSK

--f46d044287f65cbfb204ec7dc8ad
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">On Sat, Nov 30, 2013 at 11:08 PM, John R Levine <span dir=
=3D"ltr">&lt;<a href=3D"mailto:johnl@taugh.com" target=3D"_blank">johnl@tau=
gh.com</a>&gt;</span> wrote:<br><div class=3D"gmail_extra"><div class=3D"gm=
ail_quote">
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex"><div class=3D"im"><blockquote class=3D"gmail=
_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:=
1ex"><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-le=
ft:1px #ccc solid;padding-left:1ex">

If nobody implemented http reporting yet<br>
we should consider removing it from the spec...<br>
</blockquote>
<br>
Any other opinions on this point?<br>
</blockquote>
<br></div>
The current spec is too messed up to allow interoperable implementations. (=
PUT and POST are not the same thing at all.)<br>
<br>
For large reports, http PUT is a much better way to deliver them than mail,=
 since it&#39;s basically just a file upload to the target&#39;s web server=
, no base64 encoding or decoding needed, and no extra copies filling up mai=
l spools. =A0It&#39;s easily made snoop and spoof resistant by using https,=
 and it&#39;s easy to program because all of the usual http libraries suppo=
rt it.<br>

<br>
If any of the usual suspects are interested, I can tell you how to fix the =
spec. =A0It&#39;s not very hard, change it to be only PUT, and specify how =
to construct the PUT filename for each report.<br></blockquote><div><br>
</div><div>Sure, can you send specific &quot;change this to that&quot; sets=
?=A0 I&#39;ll change it in the working copy.<br><br>Thanks,<br></div><div>-=
MSK <br></div></div></div></div>

--f46d044287f65cbfb204ec7dc8ad--

From prvs=00406d3484=johnl@taugh.com  Sun Dec  1 12:51:37 2013
Return-Path: <prvs=00406d3484=johnl@taugh.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E62481AE109 for <dmarc@ietfa.amsl.com>; Sun,  1 Dec 2013 12:51:37 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.792
X-Spam-Level: 
X-Spam-Status: No, score=-1.792 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_DKIM_INVALID=0.01] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HNG2iz9PCTVn for <dmarc@ietfa.amsl.com>; Sun,  1 Dec 2013 12:51:36 -0800 (PST)
Received: from leila.iecc.com (leila6.iecc.com [IPv6:2001:470:1f07:1126:0:4c:6569:6c61]) by ietfa.amsl.com (Postfix) with ESMTP id E74911AE10E for <dmarc@ietf.org>; Sun,  1 Dec 2013 12:51:30 -0800 (PST)
Received: (qmail 20682 invoked from network); 1 Dec 2013 20:51:27 -0000
Received: from leila.iecc.com (64.57.183.34) by mail1.iecc.com with QMQP; 1 Dec 2013 20:51:27 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=iecc.com; h=date:from:to:cc:subject:in-reply-to:message-id:references:mime-version:content-type:user-agent:cleverness; s=529ba14f.xn--hew.k1310; i=sendmail-bs@submit.iecc.com; bh=zPQHATB9Hs3hBnk5u8tNSZTdLm0IiHU65+zyVfpiObw=; b=JTfRDPEpYdCH2zIWjDjLy+zeQDx3aMUGdlkhefHPwNBI4JoaX/OM0qdGQqgMjyQllJmRTF/nntyEdIoaKj9AD9EHmsOLykrYHkTncibK6oRHk0fyPPcR4lGVqyWBKvECb0v0nMFFpuN9S6GM0KW95JRK5gvnwVaCYGSaqHuzmVUX7LltDH9rfySnbBOLLsy3eTwFC/K4qYsxN/MsiLuEcqlRbeNzhpO7mnAAsCGMH/taup5OyHnbBDR5q4M9a4Sg
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=taugh.com; h=date:from:to:cc:subject:in-reply-to:message-id:references:mime-version:content-type:user-agent:cleverness; s=529ba14f.xn--hew.k1310; olt=sendmail-bs@submit.iecc.com; bh=zPQHATB9Hs3hBnk5u8tNSZTdLm0IiHU65+zyVfpiObw=; b=faPzzSvuczUBi4m9esKHbqi6DNXN0m3BMa+/ui3ZNRNgLuH2331x+KUxJG0NrRNndW/Cl9m5uVtWZvnxuOCCF705fwWN25ViuIj0XuMxkPIcl4gJRqaSyzvGbWsmGj0E9Z6KiPp6azA9mYRAcSEvtVbfQhLgMiaAgVYeWWKLNpgreePGMotfmrTVPiHAAY+qIhCpEz7jj1lfF1UT7ih+EQJaoOxvbNy2OLLDXcMKEZIZELFI9C/wxqkC9tkwqKhy
Received: from localhost (sendmail-bs@127.0.0.1) by localhost with SMTP; 1 Dec 2013 20:51:27 -0000
Date: Sun, 1 Dec 2013 15:51:26 -0500 (EST)
From: John R Levine <johnl@taugh.com>
To: "Murray S. Kucherawy" <superuser@gmail.com>
In-Reply-To: <CAL0qLwb4BsGVff5QB2yaEwp389pW1T9DAUw1Ut3kEM7OdqggSg@mail.gmail.com>
Message-ID: <alpine.BSF.2.00.1312011520360.67215@joyce.lan>
References: <CE39F90A45FF0C49A1EA229FC9899B057309A1@USCLES544.agna.amgreetings.com> <20130809215557.Horde.NqTAQuKnN8mOfxFmS6Uf4g1@horde.andreasschulze.de> <alpine.BSF.2.00.1308091619240.69005@joyce.lan> <20130809234600.Horde.BohsttCU7cC5wFyE1swI8w3@horde.andreasschulze.de> <CAL0qLwYx5KdaCM2VNXdDPit4Lyen+5oQfpu1qF-GYwb8=MELqQ@mail.gmail.com> <alpine.BSF.2.00.1312010149530.46631@joyce.lan> <CAL0qLwb4BsGVff5QB2yaEwp389pW1T9DAUw1Ut3kEM7OdqggSg@mail.gmail.com>
User-Agent: Alpine 2.00 (BSF 1167 2008-08-23)
Cleverness: None detected
MIME-Version: 1.0
Content-Type: MULTIPART/signed; protocol="application/pkcs7-signature"; micalg=sha1; BOUNDARY="3825401791-824759681-1385931087=:67215"
Cc: "dmarc@ietf.org" <dmarc@ietf.org>
Subject: Re: [dmarc-ietf] Section 12.2.2
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 01 Dec 2013 20:51:38 -0000

  This message is in MIME format.  The first part should be readable text,
  while the remaining parts are likely unreadable without MIME-aware tools.

--3825401791-824759681-1385931087=:67215
Content-Type: TEXT/PLAIN; charset=US-ASCII; format=flowed

> Sure, can you send specific "change this to that" sets?  I'll change it in
> the working copy.

Replace section 11.2.2, which I gather is now 12.2.2, with this:

11.2.2.  HTTP

    Where an "http" or "https" method is requested in a Domain Owner's
    URI list, the Mail Receiver delivers the the data using a PUT http
    request.  The URI for the PUT request is the URI from the list
    concatenated with a filename constructed as described in the previous
    section.  The extension in the filename MUST be .xml.  The filename
    SHOULD contain a unique-id that is difficult to guess.  For example,
    if the URI in the list were "http://example.com/dmarc-report/" the URI
    for the PUT request might be

http://example.com/dmarc-report/mail.receiver.example!example.com!1013662812!1013749130!!~q!}{..xml

    The Mail Receiver MUST send the Appendix C data as a text/xml media
    type and SHOULD use the gzip content-coding.

I checked that the http and URI specs specifically allow exclamation points.

The semantics of a PUT is that the URI is the name of a file that's being 
uploaded.  If you do two puts with the same URI, the second one replaces 
the first one, so don't do that unless the first one was a mistake.  Bad 
guys can send fake reports, which they can also do through e-mail, but 
they can't stomp on real reports unless they know the filename, which 
seems unlikely with a unique-id.

R's,
John

PS: The rule for unique-id imports "token" from MIME, which allows 
exclamation points and periods tildes and and curly braces.  Is that 
really what you want?
--3825401791-824759681-1385931087=:67215
Content-Type: APPLICATION/pkcs7-signature; name=smime.p7s
Content-Transfer-Encoding: BASE64
Content-Description: S/MIME Cryptographic Signature
Content-Disposition: attachment; filename=smime.p7s
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--3825401791-824759681-1385931087=:67215--

From franck@peachymango.org  Sun Dec  1 13:36:47 2013
Return-Path: <franck@peachymango.org>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 562A01AE19F for <dmarc@ietfa.amsl.com>; Sun,  1 Dec 2013 13:36:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level: 
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uqoasy3E-0C4 for <dmarc@ietfa.amsl.com>; Sun,  1 Dec 2013 13:36:44 -0800 (PST)
Received: from smtp.01.com (smtp.01.com [199.36.142.181]) by ietfa.amsl.com (Postfix) with ESMTP id C68511AE183 for <dmarc@ietf.org>; Sun,  1 Dec 2013 13:36:44 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by smtp-out-2.01.com (Postfix) with ESMTP id 8FA334F41C2; Sun,  1 Dec 2013 15:36:42 -0600 (CST)
X-Virus-Scanned: amavisd-new at smtp-out-2.01.com
Received: from smtp.01.com ([127.0.0.1]) by localhost (smtp-out-2.01.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Lr1IdKXmRjOR; Sun,  1 Dec 2013 15:36:42 -0600 (CST)
Received: from smtp.01.com (localhost [127.0.0.1]) by smtp-out-2.01.com (Postfix) with ESMTP id 6E0004F41CC; Sun,  1 Dec 2013 15:36:42 -0600 (CST)
Received: from localhost (localhost [127.0.0.1]) by smtp-out-2.01.com (Postfix) with ESMTP id 587F54F41C6; Sun,  1 Dec 2013 15:36:42 -0600 (CST)
X-Virus-Scanned: amavisd-new at smtp-out-2.01.com
Received: from smtp.01.com ([127.0.0.1]) by localhost (smtp-out-2.01.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id 69l4GTupKded; Sun,  1 Dec 2013 15:36:42 -0600 (CST)
Received: from [10.0.0.12] (c-24-5-172-97.hsd1.ca.comcast.net [24.5.172.97]) by smtp-out-2.01.com (Postfix) with ESMTPSA id 6FF7C4F41C2; Sun,  1 Dec 2013 15:36:41 -0600 (CST)
Content-Type: multipart/alternative; boundary="Apple-Mail=_E867E268-31FA-4ED9-8521-900A6018981E"
Mime-Version: 1.0 (Mac OS X Mail 7.0 \(1822\))
From: Franck Martin <franck@peachymango.org>
In-Reply-To: <CAL0qLwavNqnmgFLFYMgTnDGQxTXJvwS1L4zjccR=e2GvzQzuqA@mail.gmail.com>
Date: Sun, 1 Dec 2013 13:36:44 -0800
Message-Id: <61D26087-7352-481F-A710-A04CF4062F84@peachymango.org>
References: <52251471.8070001@gmail.com> <CAL0qLwavNqnmgFLFYMgTnDGQxTXJvwS1L4zjccR=e2GvzQzuqA@mail.gmail.com>
To: "Murray S. Kucherawy" <superuser@gmail.com>
X-Mailer: Apple Mail (2.1822)
Cc: "dmarc@ietf.org" <dmarc@ietf.org>, Raman Gupta <rocketraman@gmail.com>
Subject: Re: [dmarc-ietf] Suggestion: handle null reverse path SPF alignment with RFC5322.From in different domain
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 01 Dec 2013 21:36:47 -0000

--Apple-Mail=_E867E268-31FA-4ED9-8521-900A6018981E
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=iso-8859-1

Murray,

Raman was talking when the return-path is empty like for bounces.

DMARC follows SPF and uses for alignment whatever SPF used to give a =
result. So when there is a return path, this is the domain in the =
return-path (envelope from) otherwise when the return-path is empty this =
is the domain in the helo/ehlo.

=46rom the text below from Raman, which describes the way DMARC works =
accurately, I'm not sure what alternate behavior DMARC should have?

May be the issue is: "The host in bar.com is a valid SPF sender for =
domain foo.com". However I have no idea how you can infer this statement =
programatically. There is no DNS record today that allows you to infer =
it (?).

On Nov 30, 2013, at 10:39 PM, Murray S. Kucherawy <superuser@gmail.com> =
wrote:

> Any other input on this point?  DMARC currently only considers the SPF =
result if there is alignment between the return path and the =46rom =
field.
>=20
>=20
> On Mon, Sep 2, 2013 at 3:42 PM, Raman Gupta <rocketraman@gmail.com> =
wrote:
> I encountered a use case recently with an auto-generated email with
> RFC5322.=46rom domain foo.com, sent from a host in domain bar.com.
> Because the email was auto-generated by sieve, it contained a null
> return path. The host in bar.com is a valid SPF sender for domain =
foo.com.
>=20
> DMARC failed the SPF check despite the valid SPF, since the
> RFC5322.=46rom address was not aligned with the domain bar.com =
extracted
> from the HELO/EHLO.
>=20
> A valid way to circumvent this problem is to use DKIM signing, aligned
> with foo.com, in which case DMARC is designed to ignore the SPF
> failure and pass overall.
>=20
> However, I do think this is a valid situation which the SPF alignment
> rules should consider.
>=20
> I hope I have explained this sufficiently. Thank you to Steven Jones
> and Scott Kitterman and others on the dmarc-discuss list for
> clarifying the situation presented here.
>=20
> Regards,
> Raman Gupta
> Principal
> VIVO Systems
> _______________________________________________
> dmarc mailing list
> dmarc@ietf.org
> https://www.ietf.org/mailman/listinfo/dmarc
>=20
> _______________________________________________
> dmarc mailing list
> dmarc@ietf.org
> https://www.ietf.org/mailman/listinfo/dmarc


--Apple-Mail=_E867E268-31FA-4ED9-8521-900A6018981E
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=iso-8859-1

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Diso-8859-1"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space;">Murray,<div><br></div><div>Raman was talking when =
the return-path is empty like for =
bounces.</div><div><br></div><div>DMARC follows SPF and uses for =
alignment whatever SPF used to give a result. So when there is a return =
path, this is the domain in the return-path (envelope from) otherwise =
when the return-path is empty this is the domain in the =
helo/ehlo.</div><div><br></div><div>=46rom the text below from Raman, =
which describes the way DMARC works accurately, I'm not sure what =
alternate behavior DMARC should have?</div><div><br></div><div>May be =
the issue is: "The host in&nbsp;<a =
href=3D"http://bar.com">bar.com</a>&nbsp;is a valid SPF sender for =
domain&nbsp;foo.com". However I have no idea how you can infer this =
statement programatically. There is no DNS record today that allows you =
to infer it (?).</div><div><br><div><div>On Nov 30, 2013, at 10:39 PM, =
Murray S. Kucherawy &lt;<a =
href=3D"mailto:superuser@gmail.com">superuser@gmail.com</a>&gt; =
wrote:</div><br class=3D"Apple-interchange-newline"><blockquote =
type=3D"cite"><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Diso-8859-1"><div dir=3D"ltr">Any other input on this =
point?&nbsp; DMARC currently only considers the SPF result if there is =
alignment between the return path and the =46rom field.<br></div><div =
class=3D"gmail_extra"><br><br><div class=3D"gmail_quote">
On Mon, Sep 2, 2013 at 3:42 PM, Raman Gupta <span dir=3D"ltr">&lt;<a =
href=3D"mailto:rocketraman@gmail.com" =
target=3D"_blank">rocketraman@gmail.com</a>&gt;</span> =
wrote:<br><blockquote class=3D"gmail_quote" style=3D"margin: 0px 0px 0px =
0.8ex; border-left-width: 1px; border-left-color: rgb(204, 204, 204); =
border-left-style: solid; padding-left: 1ex; position: static; z-index: =
auto;">
I encountered a use case recently with an auto-generated email with<br>
RFC5322.=46rom domain <a href=3D"http://foo.com/" =
target=3D"_blank">foo.com</a>, sent from a host in domain <a =
href=3D"http://bar.com/" target=3D"_blank">bar.com</a>.<br>
Because the email was auto-generated by sieve, it contained a null<br>
return path. The host in <a href=3D"http://bar.com/" =
target=3D"_blank">bar.com</a> is a valid SPF sender for domain <a =
href=3D"http://foo.com/" target=3D"_blank">foo.com</a>.<br>
<br>
DMARC failed the SPF check despite the valid SPF, since the<br>
RFC5322.=46rom address was not aligned with the domain <a =
href=3D"http://bar.com/" target=3D"_blank">bar.com</a> extracted<br>
from the HELO/EHLO.<br>
<br>
A valid way to circumvent this problem is to use DKIM signing, =
aligned<br>
with <a href=3D"http://foo.com/" target=3D"_blank">foo.com</a>, in which =
case DMARC is designed to ignore the SPF<br>
failure and pass overall.<br>
<br>
However, I do think this is a valid situation which the SPF =
alignment<br>
rules should consider.<br>
<br>
I hope I have explained this sufficiently. Thank you to Steven Jones<br>
and Scott Kitterman and others on the dmarc-discuss list for<br>
clarifying the situation presented here.<br>
<br>
Regards,<br>
Raman Gupta<br>
Principal<br>
VIVO Systems<br>
_______________________________________________<br>
dmarc mailing list<br>
<a href=3D"mailto:dmarc@ietf.org">dmarc@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/dmarc" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/dmarc</a><br>
</blockquote></div><br></div>
_______________________________________________<br>dmarc mailing =
list<br><a =
href=3D"mailto:dmarc@ietf.org">dmarc@ietf.org</a><br>https://www.ietf.org/=
mailman/listinfo/dmarc<br></blockquote></div><br></div></body></html>=

--Apple-Mail=_E867E268-31FA-4ED9-8521-900A6018981E--

From franck@peachymango.org  Sun Dec  1 13:44:02 2013
Return-Path: <franck@peachymango.org>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 032AB1AE1AD for <dmarc@ietfa.amsl.com>; Sun,  1 Dec 2013 13:44:02 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.902
X-Spam-Level: 
X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XvtRJ1QQhqfB for <dmarc@ietfa.amsl.com>; Sun,  1 Dec 2013 13:44:00 -0800 (PST)
Received: from smtp.01.com (smtp.01.com [199.36.142.181]) by ietfa.amsl.com (Postfix) with ESMTP id 681991AE1AA for <dmarc@ietf.org>; Sun,  1 Dec 2013 13:44:00 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by smtp-out-2.01.com (Postfix) with ESMTP id 834C24F4086; Sun,  1 Dec 2013 15:43:58 -0600 (CST)
X-Virus-Scanned: amavisd-new at smtp-out-2.01.com
Received: from smtp.01.com ([127.0.0.1]) by localhost (smtp-out-2.01.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ryS_Frmh-TNE; Sun,  1 Dec 2013 15:43:58 -0600 (CST)
Received: from smtp.01.com (localhost [127.0.0.1]) by smtp-out-2.01.com (Postfix) with ESMTP id 60DE04F41D5; Sun,  1 Dec 2013 15:43:58 -0600 (CST)
Received: from localhost (localhost [127.0.0.1]) by smtp-out-2.01.com (Postfix) with ESMTP id 4AE4D4F41D0; Sun,  1 Dec 2013 15:43:58 -0600 (CST)
X-Virus-Scanned: amavisd-new at smtp-out-2.01.com
Received: from smtp.01.com ([127.0.0.1]) by localhost (smtp-out-2.01.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id Ct_Ca9VeOxeW; Sun,  1 Dec 2013 15:43:58 -0600 (CST)
Received: from [10.0.0.12] (c-24-5-172-97.hsd1.ca.comcast.net [24.5.172.97]) by smtp-out-2.01.com (Postfix) with ESMTPSA id 51DDB4F4086; Sun,  1 Dec 2013 15:43:57 -0600 (CST)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 7.0 \(1822\))
From: Franck Martin <franck@peachymango.org>
In-Reply-To: <alpine.BSF.2.00.1312011520360.67215@joyce.lan>
Date: Sun, 1 Dec 2013 13:44:00 -0800
Content-Transfer-Encoding: quoted-printable
Message-Id: <CCDE91CD-A369-41CC-8B05-52204FCC9110@peachymango.org>
References: <CE39F90A45FF0C49A1EA229FC9899B057309A1@USCLES544.agna.amgreetings.com> <20130809215557.Horde.NqTAQuKnN8mOfxFmS6Uf4g1@horde.andreasschulze.de> <alpine.BSF.2.00.1308091619240.69005@joyce.lan> <20130809234600.Horde.BohsttCU7cC5wFyE1swI8w3@horde.andreasschulze.de> <CAL0qLwYx5KdaCM2VNXdDPit4Lyen+5oQfpu1qF-GYwb8=MELqQ@mail.gmail.com> <alpine.BSF.2.00.1312010149530.46631@joyce.lan> <CAL0qLwb4BsGVff5QB2yaEwp389pW1T9DAUw1Ut3kEM7OdqggSg@mail.gmail.com> <alpine.BSF.2.00.1312011520360.67215@joyce.lan>
To: John R Levine <johnl@taugh.com>
X-Mailer: Apple Mail (2.1822)
Cc: "dmarc@ietf.org" <dmarc@ietf.org>, "Murray S. Kucherawy" <superuser@gmail.com>
Subject: Re: [dmarc-ietf] Section 12.2.2
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 01 Dec 2013 21:44:02 -0000

On Dec 1, 2013, at 12:51 PM, John R Levine <johnl@taugh.com> wrote:

>> Sure, can you send specific "change this to that" sets?  I'll change =
it in
>> the working copy.
>=20
> Replace section 11.2.2, which I gather is now 12.2.2, with this:
>=20
> 11.2.2.  HTTP
>=20
>   Where an "http" or "https" method is requested in a Domain Owner's
>   URI list, the Mail Receiver delivers the the data using a PUT http
>   request.  The URI for the PUT request is the URI from the list
>   concatenated with a filename constructed as described in the =
previous
>   section.  The extension in the filename MUST be .xml.  The filename
>   SHOULD contain a unique-id that is difficult to guess.  For example,
>   if the URI in the list were "http://example.com/dmarc-report/" the =
URI
>   for the PUT request might be
>=20
> =
http://example.com/dmarc-report/mail.receiver.example!example.com!10136628=
12!1013749130!!~q!}{..xml
>=20
>   The Mail Receiver MUST send the Appendix C data as a text/xml media
>   type and SHOULD use the gzip content-coding.
>=20
> I checked that the http and URI specs specifically allow exclamation =
points.
>=20
> The semantics of a PUT is that the URI is the name of a file that's =
being uploaded.  If you do two puts with the same URI, the second one =
replaces the first one, so don't do that unless the first one was a =
mistake.  Bad guys can send fake reports, which they can also do through =
e-mail, but they can't stomp on real reports unless they know the =
filename, which seems unlikely with a unique-id.
>=20

For email, we do recommend, that the report be sufficiently =
authenticated (pass DMARC). What kind of protection we could provide for =
http? Client certificate, which would require https only? Add some sort =
of DNS record to say these reports come only from these IPs?

I think we should drop http, anyhow, and mandate https. This is =
fashionable lately.


From prvs=00406d3484=johnl@taugh.com  Sun Dec  1 14:15:16 2013
Return-Path: <prvs=00406d3484=johnl@taugh.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 182341AE1B5 for <dmarc@ietfa.amsl.com>; Sun,  1 Dec 2013 14:15:16 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.792
X-Spam-Level: 
X-Spam-Status: No, score=-1.792 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_DKIM_INVALID=0.01] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 14_QNT-6KFeN for <dmarc@ietfa.amsl.com>; Sun,  1 Dec 2013 14:15:14 -0800 (PST)
Received: from leila.iecc.com (leila6.iecc.com [IPv6:2001:470:1f07:1126:0:4c:6569:6c61]) by ietfa.amsl.com (Postfix) with ESMTP id 4B3F51ADF26 for <dmarc@ietf.org>; Sun,  1 Dec 2013 14:15:13 -0800 (PST)
Received: (qmail 32254 invoked from network); 1 Dec 2013 22:15:11 -0000
Received: from leila.iecc.com (64.57.183.34) by mail1.iecc.com with QMQP; 1 Dec 2013 22:15:11 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=iecc.com; h=date:from:to:cc:subject:in-reply-to:message-id:references:mime-version:content-type:user-agent:cleverness; s=529bb4ef.xn--hew.k1310; i=sendmail-bs@submit.iecc.com; bh=LGeCpXPHQd1bZiTVmdPeZXwklhH9QT7ca5mFuaEuj3M=; b=vrAjtSdGP0jBrJlAljAf6euEvhQF3nqZvTMXGzn5g21duq/IAfnzq8+V3UeWO4PdMF/BFWsfeD/mD5ZjN+j7mIWKuOJDGKaJhExXsX3ZCvZBnYzxwchrY4aiuAPPEjm1SSJghZl56l+9RNq8DiERynfUQv0rfQIr6a58ygThlsX8DAuFFJdOBNj6riX6PqNcRHrCAwMO6CuZ1g+gXlrlCrQZkI+XIHpzD7DfRdqpAEgYMKPlfzIvRYcEmzorWyGz
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=taugh.com; h=date:from:to:cc:subject:in-reply-to:message-id:references:mime-version:content-type:user-agent:cleverness; s=529bb4ef.xn--hew.k1310; olt=sendmail-bs@submit.iecc.com; bh=LGeCpXPHQd1bZiTVmdPeZXwklhH9QT7ca5mFuaEuj3M=; b=oShgkps3Im4Oj4iV+DHfC4eSUugz2dILlWhdHAe4LoCutcpHqTPO27mpx3qLlVjKYNu1ihwvDo0oWIcQNpjOYba1lcsrIt+EoEO3jywNrTwZee0WstpIi9mCSTj0I+xaBRbuHxczGsGS+r7WcLwQHdxWfYm3w+0lza2d/hoL6O2EWwOWMA6WUGvfTA5ZjvZbqL80eRnzpMrw1l9sMAz4bqGhkrbJyT7nsSAhaXZyogv0HETvNG+BbY8jrsl+njX/
Received: from localhost (sendmail-bs@127.0.0.1) by localhost with SMTP; 1 Dec 2013 22:15:11 -0000
Date: Sun, 1 Dec 2013 17:15:10 -0500 (EST)
From: John R Levine <johnl@taugh.com>
To: Franck Martin <franck@peachymango.org>
In-Reply-To: <CCDE91CD-A369-41CC-8B05-52204FCC9110@peachymango.org>
Message-ID: <alpine.BSF.2.00.1312011704470.67496@joyce.lan>
References: <CE39F90A45FF0C49A1EA229FC9899B057309A1@USCLES544.agna.amgreetings.com> <20130809215557.Horde.NqTAQuKnN8mOfxFmS6Uf4g1@horde.andreasschulze.de> <alpine.BSF.2.00.1308091619240.69005@joyce.lan> <20130809234600.Horde.BohsttCU7cC5wFyE1swI8w3@horde.andreasschulze.de> <CAL0qLwYx5KdaCM2VNXdDPit4Lyen+5oQfpu1qF-GYwb8=MELqQ@mail.gmail.com> <alpine.BSF.2.00.1312010149530.46631@joyce.lan> <CAL0qLwb4BsGVff5QB2yaEwp389pW1T9DAUw1Ut3kEM7OdqggSg@mail.gmail.com> <alpine.BSF.2.00.1312011520360.67215@joyce.lan> <CCDE91CD-A369-41CC-8B05-52204FCC9110@peachymango.org>
User-Agent: Alpine 2.00 (BSF 1167 2008-08-23)
Cleverness: None detected
MIME-Version: 1.0
Content-Type: MULTIPART/signed; protocol="application/pkcs7-signature"; micalg=sha1; BOUNDARY="3825401791-275686907-1385936111=:67496"
Cc: "dmarc@ietf.org" <dmarc@ietf.org>
Subject: Re: [dmarc-ietf] Section 12.2.2
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 01 Dec 2013 22:15:16 -0000

  This message is in MIME format.  The first part should be readable text,
  while the remaining parts are likely unreadable without MIME-aware tools.

--3825401791-275686907-1385936111=:67496
Content-Type: TEXT/PLAIN; charset=US-ASCII; format=flowed

> For email, we do recommend, that the report be sufficiently 
> authenticated (pass DMARC). What kind of protection we could provide for 
> http? Client certificate, which would require https only? Add some sort 
> of DNS record to say these reports come only from these IPs?

Client certificates work now, anything else requires moving parts that 
don't exist yet.

Replace section 11.2.2, which I gather is now 12.2.2, with this:

11.2.2.  HTTP

   Where an "http" or "https" method is requested in a Domain Owner's
   URI list, the Mail Receiver delivers the the data using a PUT http
   request.  The URI for the PUT request is the URI from the list
   concatenated with a filename constructed as described in the previous
   section.  The extension in the filename MUST be .xml.  The filename
   SHOULD contain a unique-id that is difficult to guess.  For example,
   if the URI in the list were "http://example.com/dmarc-report/" the URI
   for the PUT request might be

   http://example.com/dmarc-report/mail.receiver.example!example.com!1013662812!1013749130!!~q!}{..xml

   The Mail Receiver MUST send the Appendix C data as a text/xml media
   type and SHOULD use gzip content-coding.  If the URI has an "https"
   method the Mail Receiver SHOULD present a client certificate that
   includes the domain in its report (in the example above,
   mail.receiver.example) to authenticate itself.

R's,
John
--3825401791-275686907-1385936111=:67496
Content-Type: APPLICATION/pkcs7-signature; name=smime.p7s
Content-Transfer-Encoding: BASE64
Content-Description: S/MIME Cryptographic Signature
Content-Disposition: attachment; filename=smime.p7s
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--3825401791-275686907-1385936111=:67496--

From sca@andreasschulze.de  Sun Dec  1 23:08:09 2013
Return-Path: <sca@andreasschulze.de>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B418A1AE43D for <dmarc@ietfa.amsl.com>; Sun,  1 Dec 2013 23:08:09 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.246
X-Spam-Level: 
X-Spam-Status: No, score=0.246 tagged_above=-999 required=5 tests=[BAYES_40=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HELO_EQ_DE=0.35, RCVD_IN_DNSWL_NONE=-0.0001, RP_MATCHES_RCVD=-0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id M3UiTkuoR0fQ for <dmarc@ietfa.amsl.com>; Sun,  1 Dec 2013 23:08:08 -0800 (PST)
Received: from mout.andreasschulze.de (mout.andreasschulze.de [84.201.4.158]) by ietfa.amsl.com (Postfix) with ESMTP id 4F3A31AE3E0 for <dmarc@ietf.org>; Sun,  1 Dec 2013 23:08:08 -0800 (PST)
X-Received: line deleted by mout
X-Received: line deleted by mout
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=andreasschulze.de; s=GzhbMIk; t=1385968080; r=y; bh=w8LCB5A/QXSWrJpCaA34irF8gIZ3p2u+fN93IGPiGG4=; h=Date:From:To:Subject:References:In-Reply-To; b=IrNK0cTDEqBtQIyknhOpJq1FDR3Oz2NBTiHaeEPbedYM3jfiWXGfibmuezMG/cltp gN2JZS4AbW6mUCwMxvvTP9P+X5wHofhoIL+uKzKuluI1GNTPOqjjs5gxFq4GhBSkcF cz9cxeC9nTJ+uRIIN/mF4+GEe/8GS6l8bJUvhR7ofHn4JCbDj6zh4g0DvO9a8Q/jFo MndASjXQK6iTbDWgL80/mb4E0pjLQUQKdGGop7wJ4gAOnRIlwBG+ScgE1M/7hLhT8l ZPeYk72zd/p7e5g5wN/qgxxvhdIr6u2NKV0ExbYA2y+TW6xjyQfrkrs1bYx0uMwNI8 1nM+jXFgWoqdWn5+KD9z09Nzw/WHreUmscKxt5+LpDx9gRQrnh+EhUYME09d/vZ9tJ MpUBd59mGysxcB542yy8AQVu9xsRyt49nwl42imNXFmCcV/LSpfkFyzsFNL7nJDEL2 UPUF8ctjPwvcrje2rnBUyoyQqJJEOs6vGPcNuMb+VLPCpPNfYqaKNUVV13pzXBwSCa hPJWqW4KXaA1K+mB451yoUbWqEMEkJ5LhcmtPbhnRLzl+H6hs1/yAybbmKo436EMi9 LxBPsmd0NpyDxlvJgfUmWQfP/hTgz6s0MTaDhK3HUmeIH4hZ+6e9DRb8Rer1PEbDWn eLzx92sR73H5phSNNW2euj7k=
X-Received: line deleted by mout
Date: Mon, 02 Dec 2013 08:07:58 +0100
Message-ID: <20131202080758.Horde.QeBC6E23JVJtnEoI-fytdA1@horde.andreasschulze.de>
From: Andreas Schulze <sca@andreasschulze.de>
To: dmarc@ietf.org
References: <CE39F90A45FF0C49A1EA229FC9899B057309A1@USCLES544.agna.amgreetings.com> <20130809215557.Horde.NqTAQuKnN8mOfxFmS6Uf4g1@horde.andreasschulze.de> <alpine.BSF.2.00.1308091619240.69005@joyce.lan> <20130809234600.Horde.BohsttCU7cC5wFyE1swI8w3@horde.andreasschulze.de> <CAL0qLwYx5KdaCM2VNXdDPit4Lyen+5oQfpu1qF-GYwb8=MELqQ@mail.gmail.com> <alpine.BSF.2.00.1312010149530.46631@joyce.lan> <CAL0qLwb4BsGVff5QB2yaEwp389pW1T9DAUw1Ut3kEM7OdqggSg@mail.gmail.com> <alpine.BSF.2.00.1312011520360.67215@joyce.lan> <CCDE91CD-A369-41CC-8B05-52204FCC9110@peachymango.org> <alpine.BSF.2.00.1312011704470.67496@joyce.lan>
In-Reply-To: <alpine.BSF.2.00.1312011704470.67496@joyce.lan>
User-Agent: Internet Messaging Program (IMP) H5 (6.1.6)
Content-Type: text/plain; charset=UTF-8; format=flowed; DelSp=Yes
MIME-Version: 1.0
Content-Disposition: inline
Subject: Re: [dmarc-ietf] Section 12.2.2
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 02 Dec 2013 07:08:09 -0000

Zitat von John R Levine <johnl@taugh.com>:

>> For email, we do recommend, that the report be sufficiently  
>> authenticated (pass DMARC). What kind of protection we could  
>> provide for http? Client certificate, which would require https  
>> only? Add some sort of DNS record to say these reports come only  
>> from these IPs?
>
> Client certificates work now, anything else requires moving parts  
> that don't exist yet.

yes, the requirement for authentication could be satisfied by client  
certificates.
But this introduces additional complexity. I'm sure, I would get less  
more reports
if I would request them https.

So it could be an second way a reporter could send *full* reports if  
mailto: limit it's size.

Andreas




From mjones@agari.com  Mon Dec  2 11:59:49 2013
Return-Path: <mjones@agari.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8851F1AD8D5 for <dmarc@ietfa.amsl.com>; Mon,  2 Dec 2013 11:59:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.4
X-Spam-Level: 
X-Spam-Status: No, score=-1.4 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, J_CHICKENPOX_35=0.6, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IbJ69avXsTGD for <dmarc@ietfa.amsl.com>; Mon,  2 Dec 2013 11:59:48 -0800 (PST)
Received: from mail-pd0-x233.google.com (mail-pd0-x233.google.com [IPv6:2607:f8b0:400e:c02::233]) by ietfa.amsl.com (Postfix) with ESMTP id D881D1AD845 for <dmarc@ietf.org>; Mon,  2 Dec 2013 11:59:47 -0800 (PST)
Received: by mail-pd0-f179.google.com with SMTP id r10so18815466pdi.38 for <dmarc@ietf.org>; Mon, 02 Dec 2013 11:59:45 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=agari.com; s=s1024; h=content-type:mime-version:subject:from:in-reply-to:date:cc :message-id:references:to; bh=5XCA0VjDg5Hz6hm96RRgF0VQTKFUNxtWgjBP/N5FmVE=; b=EE1CFTCdCugc765sxgLWn836NXwpzBjoavlsMHGgnyACq3+gGjKZJ94kuXi6hO1dgp NRhqRFsE/7Ho+QL5nwcwIfvCfaw40Ig4mh48QUZ44bQ8VieEn9vDTKPnlJFQdboJCrkz Y8Q1dAPg4Zu1lWTJK2epggoqvEHPxhJ9CYomE=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:content-type:mime-version:subject:from :in-reply-to:date:cc:message-id:references:to; bh=5XCA0VjDg5Hz6hm96RRgF0VQTKFUNxtWgjBP/N5FmVE=; b=HTV0bh+3neha3ImtSg2nAqN+4A21Omnrm1zf3JgqN/eX0FoBYW5rxmrqjV7/R+9mbK YeS1jOeTQesgkjVFtEbKbRQezp6DcTZ06ALoT3gcL1lVbB7Xs9D3eSL+cjHNUmRIvEB3 ZQM+nvt9MMc+XlPCQ8zk+VX7KHfDVmeiMrV67CMwRM65gHLQYlsqcZp4qz4y5x1D8Vjd wPEo9extcJiSFketMYaWeN925yrQBzbI2R0BBsac1Gfthl0kPveF1ILrg/lu7SiZzAuL /GNiSP+HxgSmAiLnYyC5ei1+Yls/Un1c7fEo8IEv9ecYyeOLZMEDGEFCGMJG13r+DX0U edFA==
X-Gm-Message-State: ALoCoQn9vaEpyAGAL/nf0rWezhaWAkLRSzCDWhta1AYUh+w5EtG+1XmUjWHDdghTkp0bOhILMiOR
X-Received: by 10.66.192.198 with SMTP id hi6mr70530883pac.87.1386014385560; Mon, 02 Dec 2013 11:59:45 -0800 (PST)
Received: from [10.0.1.162] (50-197-151-169-static.hfc.comcastbusiness.net. [50.197.151.169]) by mx.google.com with ESMTPSA id oj6sm141198784pab.9.2013.12.02.11.59.44 for <multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Mon, 02 Dec 2013 11:59:44 -0800 (PST)
Content-Type: multipart/alternative; boundary="Apple-Mail=_71923185-5971-4D7B-AC34-2A041E6ACE7F"
Mime-Version: 1.0 (Mac OS X Mail 7.0 \(1822\))
From: Mike Jones <mjones@agari.com>
In-Reply-To: <CAL0qLwb2eY_1kgW0-67iMhjFF4tXjQLJC_r6sfMwUeh1dkACjw@mail.gmail.com>
Date: Mon, 2 Dec 2013 11:59:42 -0800
Message-Id: <3D832EE3-06F7-47C6-AC06-65A1CCF789E2@agari.com>
References: <CE83E341.3B48F%greg.colburn@returnpath.com> <CAL0qLwb2eY_1kgW0-67iMhjFF4tXjQLJC_r6sfMwUeh1dkACjw@mail.gmail.com>
To: "Murray S. Kucherawy" <superuser@gmail.com>
X-Mailer: Apple Mail (2.1822)
Cc: "dmarc@ietf.org" <dmarc@ietf.org>, Greg Colburn <Greg.Colburn@returnpath.com>
Subject: Re: [dmarc-ietf] XSD concern, policy_evaluated should be required
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 02 Dec 2013 19:59:49 -0000

--Apple-Mail=_71923185-5971-4D7B-AC34-2A041E6ACE7F
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=iso-8859-1

I agree with Greg's point, the min0ccurs should be 1.  What is the =
purpose of the report without this data included?=20

Thanks,
Mike Jones





On Nov 30, 2013, at 10:47 PM, Murray S. Kucherawy <superuser@gmail.com> =
wrote:

> Do any others wish to comment on this point?
>=20
> -MSK
>=20
>=20
> On Wed, Oct 16, 2013 at 5:31 AM, Greg Colburn =
<Greg.Colburn@returnpath.com> wrote:
> We noticed some stray aggregate reports without policy_evaluated =
blocks.  According to page 70 in the current draft, policy_evaluated is =
minOccurs=3D"0".  Here is the relevant XSD.
>=20
>    <xs:complexType name=3D"RowType">
>      <xs:all>
>        <!-- The connecting IP. -->
>        <xs:element name=3D"source_ip" type=3D"IPAddress"/>
>        <!-- The number of matching messages -->
>        <xs:element name=3D"count" type=3D"xs:integer"/>
>        <!-- The DMARC disposition applying to matching
>             messages. -->
>        <xs:element name=3D"policy_evaluated"
>                    type=3D"PolicyEvaluatedType"
>                    minOccurs=3D"0"/>
>      </xs:all>
>    </xs:complexType>
>=20
> In my mind the policy_evaluated block is very important, in many ways =
its the entire point of the report.  It generally answers the question =
of "what happened".  Without policy_evaluated a significant amount of =
the value of the data is lost.  I propose that we update the XSD to  set =
the minOccurs to 1.
>=20
>=20
>    <xs:complexType name=3D"RowType">
>      <xs:all>
>        <!-- The connecting IP. -->
>        <xs:element name=3D"source_ip" type=3D"IPAddress"/>
>        <!-- The number of matching messages -->
>        <xs:element name=3D"count" type=3D"xs:integer"/>
>        <!-- The DMARC disposition applying to matching
>             messages. -->
>        <xs:element name=3D"policy_evaluated"
>                    type=3D"PolicyEvaluatedType"
>                    minOccurs=3D"1"/>
>      </xs:all>
>    </xs:complexType>
>=20
> Sincerely,
>=20
> Greg Colburn
>=20
>=20
>=20
> _______________________________________________
> dmarc mailing list
> dmarc@ietf.org
> https://www.ietf.org/mailman/listinfo/dmarc
>=20
>=20
> _______________________________________________
> dmarc mailing list
> dmarc@ietf.org
> https://www.ietf.org/mailman/listinfo/dmarc


--Apple-Mail=_71923185-5971-4D7B-AC34-2A041E6ACE7F
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=iso-8859-1

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Diso-8859-1"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space;">I =
agree with Greg's point, the min0ccurs should be 1. &nbsp;What is the =
purpose of the report without this data =
included?&nbsp;<div><br></div><div>Thanks,</div><div>Mike =
Jones</div><div><br><div><div apple-content-edited=3D"true">
<div><br></div><b style=3D"color: rgb(0, 0, 0); font-family: Helvetica;  =
font-style: normal; font-variant: normal; letter-spacing: normal; =
line-height: normal; orphans: 2; text-align: -webkit-auto; text-indent: =
0px; text-transform: none; white-space: normal; widows: 2; word-spacing: =
0px; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; =
"><font color=3D"#444444"><br></font></b><br =
class=3D"Apple-interchange-newline">
</div>
<br><div><div>On Nov 30, 2013, at 10:47 PM, Murray S. Kucherawy &lt;<a =
href=3D"mailto:superuser@gmail.com">superuser@gmail.com</a>&gt; =
wrote:</div><br class=3D"Apple-interchange-newline"><blockquote =
type=3D"cite"><div dir=3D"ltr"><div>Do any others wish to comment on =
this point?<br><br></div>-MSK<br></div><div =
class=3D"gmail_extra"><br><br><div class=3D"gmail_quote">On Wed, Oct 16, =
2013 at 5:31 AM, Greg Colburn <span dir=3D"ltr">&lt;<a =
href=3D"mailto:Greg.Colburn@returnpath.com" =
target=3D"_blank">Greg.Colburn@returnpath.com</a>&gt;</span> wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 =
.8ex;border-left:1px #ccc solid;padding-left:1ex"><div =
style=3D"font-size:14px;font-family:Consolas,sans-serif;word-wrap:break-wo=
rd"><pre =
style=3D"text-indent:0px;letter-spacing:normal;font-variant:normal;text-al=
ign:start;font-style:normal;margin-bottom:0px;font-weight:normal;line-heig=
ht:normal;text-transform:none;font-size:1em;margin-top:0px;word-spacing:0p=
x">We noticed some stray aggregate reports without policy_evaluated =
blocks.  According to page 70 in the current draft, policy_evaluated is =
minOccurs=3D"0".  Here is the relevant XSD.</pre><pre =
style=3D"text-indent:0px;letter-spacing:normal;font-variant:normal;text-al=
ign:start;font-style:normal;margin-bottom:0px;font-weight:normal;line-heig=
ht:normal;text-transform:none;font-size:1em;margin-top:0px;word-spacing:0p=
x"><br></pre><pre =
style=3D"text-indent:0px;letter-spacing:normal;font-variant:normal;text-al=
ign:start;font-style:normal;margin-bottom:0px;font-weight:normal;line-heig=
ht:normal;text-transform:none;font-size:1em;margin-top:0px;word-spacing:0p=
x">   &lt;xs:complexType name=3D"RowType"&gt;
</pre><pre =
style=3D"text-indent:0px;letter-spacing:normal;font-variant:normal;text-al=
ign:start;font-style:normal;margin-bottom:0px;font-weight:normal;line-heig=
ht:normal;text-transform:none;font-size:1em;margin-top:0px;word-spacing:0p=
x">     &lt;xs:all&gt;
       &lt;!-- The connecting IP. --&gt;
       &lt;xs:element name=3D"source_ip" type=3D"IPAddress"/&gt;
       &lt;!-- The number of matching messages --&gt;
       &lt;xs:element name=3D"count" type=3D"xs:integer"/&gt;
       &lt;!-- The DMARC disposition applying to matching
            messages. --&gt;
       &lt;xs:element name=3D"policy_evaluated"
                   type=3D"PolicyEvaluatedType"
                   minOccurs=3D"0"/&gt;
     &lt;/xs:all&gt;
   &lt;/xs:complexType&gt;</pre><pre =
style=3D"text-indent:0px;letter-spacing:normal;font-variant:normal;text-al=
ign:start;font-style:normal;margin-bottom:0px;font-weight:normal;line-heig=
ht:normal;text-transform:none;font-size:1em;margin-top:0px;word-spacing:0p=
x"><br></pre><pre =
style=3D"text-indent:0px;letter-spacing:normal;font-variant:normal;text-al=
ign:start;font-style:normal;margin-bottom:0px;font-weight:normal;line-heig=
ht:normal;text-transform:none;font-size:1em;margin-top:0px;word-spacing:0p=
x"><pre =
style=3D"text-indent:0px;letter-spacing:normal;font-variant:normal;text-al=
ign:start;font-style:normal;margin-bottom:0px;font-weight:normal;line-heig=
ht:normal;text-transform:none;font-size:1em;margin-top:0px;word-spacing:0p=
x">In my mind the policy_evaluated block is very important, in many ways =
its the entire point of the report.  It generally answers the question =
of "what happened".  Without policy_evaluated a significant amount of =
the value of the data is lost.  I propose that we update the XSD to  set =
the minOccurs to 1.</pre>
<pre =
style=3D"text-indent:0px;letter-spacing:normal;font-variant:normal;text-al=
ign:start;font-style:normal;margin-bottom:0px;font-weight:normal;line-heig=
ht:normal;text-transform:none;font-size:1em;margin-top:0px;word-spacing:0p=
x"><span style=3D"white-space:normal;font-family:Consolas,sans-serif"><pre=
 =
style=3D"text-indent:0px;letter-spacing:normal;font-variant:normal;text-al=
ign:start;font-style:normal;margin-bottom:0px;font-weight:normal;line-heig=
ht:normal;text-transform:none;font-size:1em;margin-top:0px;word-spacing:0p=
x"><br></pre><pre =
style=3D"text-indent:0px;letter-spacing:normal;font-variant:normal;text-al=
ign:start;font-style:normal;margin-bottom:0px;font-weight:normal;line-heig=
ht:normal;text-transform:none;font-size:1em;margin-top:0px;word-spacing:0p=
x">   &lt;xs:complexType name=3D"RowType"&gt;
</pre><pre =
style=3D"text-indent:0px;letter-spacing:normal;font-variant:normal;text-al=
ign:start;font-style:normal;margin-bottom:0px;font-weight:normal;line-heig=
ht:normal;text-transform:none;font-size:1em;margin-top:0px;word-spacing:0p=
x">     &lt;xs:all&gt;
       &lt;!-- The connecting IP. --&gt;
       &lt;xs:element name=3D"source_ip" type=3D"IPAddress"/&gt;
       &lt;!-- The number of matching messages --&gt;
       &lt;xs:element name=3D"count" type=3D"xs:integer"/&gt;
       &lt;!-- The DMARC disposition applying to matching
            messages. --&gt;
       &lt;xs:element name=3D"policy_evaluated"
                   type=3D"PolicyEvaluatedType"
                   minOccurs=3D"1"/&gt;
     &lt;/xs:all&gt;
   &lt;/xs:complexType&gt;</pre><pre =
style=3D"text-indent:0px;letter-spacing:normal;font-variant:normal;text-al=
ign:start;font-style:normal;margin-bottom:0px;font-weight:normal;line-heig=
ht:normal;text-transform:none;font-size:1em;margin-top:0px;word-spacing:0p=
x"><br></pre><pre =
style=3D"text-indent:0px;letter-spacing:normal;font-variant:normal;text-al=
ign:start;font-style:normal;margin-bottom:0px;font-weight:normal;line-heig=
ht:normal;text-transform:none;font-size:1em;margin-top:0px;word-spacing:0p=
x">Sincerely,</pre><pre =
style=3D"text-indent:0px;letter-spacing:normal;font-variant:normal;text-al=
ign:start;font-style:normal;margin-bottom:0px;font-weight:normal;line-heig=
ht:normal;text-transform:none;font-size:1em;margin-top:0px;word-spacing:0p=
x"><br></pre><pre =
style=3D"text-indent:0px;letter-spacing:normal;font-variant:normal;text-al=
ign:start;font-style:normal;margin-bottom:0px;font-weight:normal;line-heig=
ht:normal;text-transform:none;font-size:1em;margin-top:0px;word-spacing:0p=
x">Greg Colburn</pre><pre =
style=3D"text-indent:0px;letter-spacing:normal;font-variant:normal;text-al=
ign:start;font-style:normal;margin-bottom:0px;font-weight:normal;line-heig=
ht:normal;text-transform:none;font-size:1em;margin-top:0px;word-spacing:0p=
x"><br></pre></span></pre><pre =
style=3D"text-indent:0px;letter-spacing:normal;font-variant:normal;text-al=
ign:start;font-style:normal;margin-bottom:0px;font-weight:normal;line-heig=
ht:normal;text-transform:none;font-size:1em;margin-top:0px;word-spacing:0p=
x"><br></pre></pre></div>
<br>_______________________________________________<br>
dmarc mailing list<br>
<a href=3D"mailto:dmarc@ietf.org">dmarc@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/dmarc" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/dmarc</a><br>
<br></blockquote></div><br></div>
_______________________________________________<br>dmarc mailing =
list<br><a =
href=3D"mailto:dmarc@ietf.org">dmarc@ietf.org</a><br>https://www.ietf.org/=
mailman/listinfo/dmarc<br></blockquote></div><br></div></div></body></html=
>=

--Apple-Mail=_71923185-5971-4D7B-AC34-2A041E6ACE7F--

From superuser@gmail.com  Mon Dec  2 19:35:21 2013
Return-Path: <superuser@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 825CF1ADFC1 for <dmarc@ietfa.amsl.com>; Mon,  2 Dec 2013 19:35:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Iy0OcZ8nSwAU for <dmarc@ietfa.amsl.com>; Mon,  2 Dec 2013 19:35:19 -0800 (PST)
Received: from mail-wi0-x235.google.com (mail-wi0-x235.google.com [IPv6:2a00:1450:400c:c05::235]) by ietfa.amsl.com (Postfix) with ESMTP id CDC2D1ADEA7 for <dmarc@ietf.org>; Mon,  2 Dec 2013 19:35:18 -0800 (PST)
Received: by mail-wi0-f181.google.com with SMTP id hq4so5871054wib.8 for <dmarc@ietf.org>; Mon, 02 Dec 2013 19:35:15 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=mV5zzUCn5Suw5wTmbptnfTxKidhbBkRmfVNH5fzZ3Bs=; b=U36SBjqyQE6g7Gj74wqCvDtzlW7rcYu+I2f+CRRAkgIJrGRfGuvlbu7mZuz3CpXgc1 YES37BGspvwMHVDgoi7fQAYWRc0KKpTUV0u64KZ3TWFxNvbcUufTWLi5wtxhNBLz2Dve HzLJUMcQLtDmCS8pH6Z4RELdxIVV5jtN+DoBT4/VNH3WpHSxgmHpeJ/AxOhRYkb9qFG0 MCv9Z7ecykt1I9aCFI0HnIW5fez02BXFEKPbNXorl13wJzDZb6BiQBrma03kPqSzaIr+ VYdloleYsVbQethweWtdqGEDZUoPe2A7bUV9/yr2dXk57KSuFpw+r5Ju9N7AiolyV3nt dJdA==
MIME-Version: 1.0
X-Received: by 10.180.24.137 with SMTP id u9mr432272wif.5.1386041715834; Mon, 02 Dec 2013 19:35:15 -0800 (PST)
Received: by 10.181.13.230 with HTTP; Mon, 2 Dec 2013 19:35:15 -0800 (PST)
In-Reply-To: <61D26087-7352-481F-A710-A04CF4062F84@peachymango.org>
References: <52251471.8070001@gmail.com> <CAL0qLwavNqnmgFLFYMgTnDGQxTXJvwS1L4zjccR=e2GvzQzuqA@mail.gmail.com> <61D26087-7352-481F-A710-A04CF4062F84@peachymango.org>
Date: Mon, 2 Dec 2013 19:35:15 -0800
Message-ID: <CAL0qLwYkxAiE_X7RJE2hSYbok6v-k-1Pym6Sx0VmadD+yO0d8A@mail.gmail.com>
From: "Murray S. Kucherawy" <superuser@gmail.com>
To: Franck Martin <franck@peachymango.org>
Content-Type: multipart/alternative; boundary=f46d04447f671dc61604ec98fcd5
Cc: "dmarc@ietf.org" <dmarc@ietf.org>, Raman Gupta <rocketraman@gmail.com>
Subject: Re: [dmarc-ietf] Suggestion: handle null reverse path SPF alignment with RFC5322.From in different domain
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 03 Dec 2013 03:35:21 -0000

--f46d04447f671dc61604ec98fcd5
Content-Type: text/plain; charset=ISO-8859-1

I understood what he was saying; my issue was with my mis-remembering of
what DMARC does with SPF.  For some reason I was remembering that only an
SPF check against the envelope sender mattered.  I must've been
decaffeinated.

Regardless, I agree that I don't know what algorithm, short of a heuristic
or something more liberal, could be used to match foo.com and bar.com in
the example.  The more liberal the matching is, the easier we open up an
abuse vector.  If this does become a pain point, we could adopt something
like ATPS, but that's only something this group should consider if there's
plenty of evidence that it's necessary.

-MSK



On Sun, Dec 1, 2013 at 1:36 PM, Franck Martin <franck@peachymango.org>wrote:

> Murray,
>
> Raman was talking when the return-path is empty like for bounces.
>
> DMARC follows SPF and uses for alignment whatever SPF used to give a
> result. So when there is a return path, this is the domain in the
> return-path (envelope from) otherwise when the return-path is empty this is
> the domain in the helo/ehlo.
>
> From the text below from Raman, which describes the way DMARC works
> accurately, I'm not sure what alternate behavior DMARC should have?
>
> May be the issue is: "The host in bar.com is a valid SPF sender for
> domain foo.com". However I have no idea how you can infer this statement
> programatically. There is no DNS record today that allows you to infer it
> (?).
>
> On Nov 30, 2013, at 10:39 PM, Murray S. Kucherawy <superuser@gmail.com>
> wrote:
>
> Any other input on this point?  DMARC currently only considers the SPF
> result if there is alignment between the return path and the From field.
>
>
> On Mon, Sep 2, 2013 at 3:42 PM, Raman Gupta <rocketraman@gmail.com> wrote:
>
>> I encountered a use case recently with an auto-generated email with
>> RFC5322.From domain foo.com, sent from a host in domain bar.com.
>> Because the email was auto-generated by sieve, it contained a null
>> return path. The host in bar.com is a valid SPF sender for domain foo.com
>> .
>>
>> DMARC failed the SPF check despite the valid SPF, since the
>> RFC5322.From address was not aligned with the domain bar.com extracted
>> from the HELO/EHLO.
>>
>> A valid way to circumvent this problem is to use DKIM signing, aligned
>> with foo.com, in which case DMARC is designed to ignore the SPF
>> failure and pass overall.
>>
>> However, I do think this is a valid situation which the SPF alignment
>> rules should consider.
>>
>> I hope I have explained this sufficiently. Thank you to Steven Jones
>> and Scott Kitterman and others on the dmarc-discuss list for
>> clarifying the situation presented here.
>>
>> Regards,
>> Raman Gupta
>> Principal
>> VIVO Systems
>> _______________________________________________
>> dmarc mailing list
>> dmarc@ietf.org
>> https://www.ietf.org/mailman/listinfo/dmarc
>>
>
> _______________________________________________
> dmarc mailing list
> dmarc@ietf.org
> https://www.ietf.org/mailman/listinfo/dmarc
>
>
>

--f46d04447f671dc61604ec98fcd5
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div><div>I understood what he was saying; my issue was wi=
th my mis-remembering of what DMARC does with SPF.=A0 For some reason I was=
 remembering that only an SPF check against the envelope sender mattered.=
=A0 I must&#39;ve been decaffeinated.<br>
<br></div>Regardless, I agree that I don&#39;t know what algorithm, short o=
f a heuristic or something more liberal, could be used to match <a href=3D"=
http://foo.com">foo.com</a> and <a href=3D"http://bar.com">bar.com</a> in t=
he example.=A0 The more liberal the matching is, the easier we open up an a=
buse vector.=A0 If this does become a pain point, we could adopt something =
like ATPS, but that&#39;s only something this group should consider if ther=
e&#39;s plenty of evidence that it&#39;s necessary.<br>
<br></div>-MSK<br><div><div><br></div></div></div><div class=3D"gmail_extra=
"><br><br><div class=3D"gmail_quote">On Sun, Dec 1, 2013 at 1:36 PM, Franck=
 Martin <span dir=3D"ltr">&lt;<a href=3D"mailto:franck@peachymango.org" tar=
get=3D"_blank">franck@peachymango.org</a>&gt;</span> wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex"><div style=3D"word-wrap:break-word">Murray,<=
div><br></div><div>Raman was talking when the return-path is empty like for=
 bounces.</div>
<div><br></div><div>DMARC follows SPF and uses for alignment whatever SPF u=
sed to give a result. So when there is a return path, this is the domain in=
 the return-path (envelope from) otherwise when the return-path is empty th=
is is the domain in the helo/ehlo.</div>
<div><br></div><div>From the text below from Raman, which describes the way=
 DMARC works accurately, I&#39;m not sure what alternate behavior DMARC sho=
uld have?</div><div><br></div><div>May be the issue is: &quot;The host in=
=A0<a href=3D"http://bar.com" target=3D"_blank">bar.com</a>=A0is a valid SP=
F sender for domain=A0<a href=3D"http://foo.com" target=3D"_blank">foo.com<=
/a>&quot;. However I have no idea how you can infer this statement programa=
tically. There is no DNS record today that allows you to infer it (?).</div=
>
<div><div class=3D"h5"><div><br><div><div>On Nov 30, 2013, at 10:39 PM, Mur=
ray S. Kucherawy &lt;<a href=3D"mailto:superuser@gmail.com" target=3D"_blan=
k">superuser@gmail.com</a>&gt; wrote:</div><br><blockquote type=3D"cite"><d=
iv dir=3D"ltr">
Any other input on this point?=A0 DMARC currently only considers the SPF re=
sult if there is alignment between the return path and the From field.<br><=
/div><div class=3D"gmail_extra"><br><br><div class=3D"gmail_quote">
On Mon, Sep 2, 2013 at 3:42 PM, Raman Gupta <span dir=3D"ltr">&lt;<a href=
=3D"mailto:rocketraman@gmail.com" target=3D"_blank">rocketraman@gmail.com</=
a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"margin:0=
px 0px 0px 0.8ex;border-left-width:1px;border-left-color:rgb(204,204,204);b=
order-left-style:solid;padding-left:1ex">

I encountered a use case recently with an auto-generated email with<br>
RFC5322.From domain <a href=3D"http://foo.com/" target=3D"_blank">foo.com</=
a>, sent from a host in domain <a href=3D"http://bar.com/" target=3D"_blank=
">bar.com</a>.<br>
Because the email was auto-generated by sieve, it contained a null<br>
return path. The host in <a href=3D"http://bar.com/" target=3D"_blank">bar.=
com</a> is a valid SPF sender for domain <a href=3D"http://foo.com/" target=
=3D"_blank">foo.com</a>.<br>
<br>
DMARC failed the SPF check despite the valid SPF, since the<br>
RFC5322.From address was not aligned with the domain <a href=3D"http://bar.=
com/" target=3D"_blank">bar.com</a> extracted<br>
from the HELO/EHLO.<br>
<br>
A valid way to circumvent this problem is to use DKIM signing, aligned<br>
with <a href=3D"http://foo.com/" target=3D"_blank">foo.com</a>, in which ca=
se DMARC is designed to ignore the SPF<br>
failure and pass overall.<br>
<br>
However, I do think this is a valid situation which the SPF alignment<br>
rules should consider.<br>
<br>
I hope I have explained this sufficiently. Thank you to Steven Jones<br>
and Scott Kitterman and others on the dmarc-discuss list for<br>
clarifying the situation presented here.<br>
<br>
Regards,<br>
Raman Gupta<br>
Principal<br>
VIVO Systems<br>
_______________________________________________<br>
dmarc mailing list<br>
<a href=3D"mailto:dmarc@ietf.org" target=3D"_blank">dmarc@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/dmarc" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/dmarc</a><br>
</blockquote></div><br></div>
_______________________________________________<br>dmarc mailing list<br><a=
 href=3D"mailto:dmarc@ietf.org" target=3D"_blank">dmarc@ietf.org</a><br><a =
href=3D"https://www.ietf.org/mailman/listinfo/dmarc" target=3D"_blank">http=
s://www.ietf.org/mailman/listinfo/dmarc</a><br>
</blockquote></div><br></div></div></div></div></blockquote></div><br></div=
>

--f46d04447f671dc61604ec98fcd5--

From superuser@gmail.com  Tue Dec  3 00:26:21 2013
Return-Path: <superuser@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 74A1F1ADF73 for <dmarc@ietfa.amsl.com>; Tue,  3 Dec 2013 00:26:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.599
X-Spam-Level: 
X-Spam-Status: No, score=-0.599 tagged_above=-999 required=5 tests=[BAYES_05=-0.5, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZqIHipCh0eWx for <dmarc@ietfa.amsl.com>; Tue,  3 Dec 2013 00:26:13 -0800 (PST)
Received: from mail-wi0-x236.google.com (mail-wi0-x236.google.com [IPv6:2a00:1450:400c:c05::236]) by ietfa.amsl.com (Postfix) with ESMTP id B1BCA1ADF98 for <dmarc@ietf.org>; Tue,  3 Dec 2013 00:26:12 -0800 (PST)
Received: by mail-wi0-f182.google.com with SMTP id en1so6086475wid.9 for <dmarc@ietf.org>; Tue, 03 Dec 2013 00:26:09 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=p1UDqHTvmVe04JXFjc2TPrg+9jwuf2KSWdnlp3zueco=; b=DiWCe1oJKd8BJF+Dh5QkVRKa5FAvPVnpfHviHCYPRiuSnx77ZBpy5Ha+KChHkntyNT gh6hL0r6vUUbPrAYz7lp0t6TUIdhoA9qONai7Ma8sLaWIbX5XFaZx+EJ3M11imsUPn2A qgCKWSYOdRy7mLLhJlkN8WyOg/WVWfpZXbXkH4ev0f675cNRCxgmudH2wP6Hy/JkazpE N5KT5t3TqSTsjQk+65ycVTL6oWRrWnD+tkBM7e2wpAhwV0IPYtfm2hGb2VsZD8nj9uBI Uhb1lApHUvFBcf6oGWJtW7XRnF2OujhUlfxLFBZz+PV36wyhrgf8unjw5sdHJlOG6IOt ON9A==
MIME-Version: 1.0
X-Received: by 10.194.104.66 with SMTP id gc2mr1028387wjb.75.1386059169651; Tue, 03 Dec 2013 00:26:09 -0800 (PST)
Received: by 10.181.13.230 with HTTP; Tue, 3 Dec 2013 00:26:09 -0800 (PST)
In-Reply-To: <524CA422.8030008@bluepopcorn.net>
References: <524CA422.8030008@bluepopcorn.net>
Date: Tue, 3 Dec 2013 00:26:09 -0800
Message-ID: <CAL0qLwZDhVM0edfzJe_wrKPSjC6c9bvabbO-Bp7+LVowHtg0=w@mail.gmail.com>
From: "Murray S. Kucherawy" <superuser@gmail.com>
To: Jim Fenton <fenton@bluepopcorn.net>
Content-Type: multipart/alternative; boundary=089e0102ef8471e21704ec9d0cbc
Cc: "dmarc@ietf.org" <dmarc@ietf.org>
Subject: Re: [dmarc-ietf] External review of draft-kucherawy-dmarc-base-01
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 03 Dec 2013 08:26:21 -0000

--089e0102ef8471e21704ec9d0cbc
Content-Type: text/plain; charset=ISO-8859-1

On Wed, Oct 2, 2013 at 3:54 PM, Jim Fenton <fenton@bluepopcorn.net> wrote:

> I have not been monitoring this mailing list, but a couple of people
> have asked me to have a look at the DMARC spec.  I apologize for the
> amount of time it has taken for me to get to this.
>
>
Thanks for the review, Jim.  Sorry it's taken so long for me to get all the
way through this.


> I'll leave out the editorial issues, but I'm happy to share those (in
> particular, with the editors) if there is interest.  I'll start with a
> lot of specific comments; there are a few additional comments at the
> very end.
>

Happy to have your editorial comments off-list if you like.


>
> ===
>
> 1. Introduction
>
> Paragraph 3:  I'm surprised to see the use of the word "policy". In the
> context of ADSP (originally Sender Signing Policy), the word "policy"
> was considered inaccurate because it was deemed inappropriate to dictate
> policy to a Receiving Domain. Even though SSP was describing the
> domain's policy with respect to signing messages with DKIM, the word
> "practices" was substituted. Is it now considered acceptable to make
> policy requests of a Receiving Domain?
>

I don't think this has come up during the development of DMARC.  In
contrast, I think the use of "policy" in the SPF context has become widely
understood to indicate it's a request from the author domain.  I do think
it's pretty clear from the document that there are no illusions that
something's being demanded of the receiver.

In the case of SSP and ADSP, I think we were trying to describe the signing
practices of the author domain, so the receiver could make an intelligent
judgement about accepting or rejecting the message.  In DMARC, the
practices are implied by the nature of the protocol except for what
alignment of identifiers a receiver should expect.



> Paragraph 4 #1: "assertions about senders' practices" : shouldn't that
> be Domain Owners' practices, since the sender might include spoofers?
>

Yes, though we haven't introduced that term yet.  I'll change it to the
lowercase form.


>
> Paragraph 3 #1: "Senders make policy assertions" -> "Domain owners
> publish policy assertions". But see comment below about "domain owners",
> and note that DMARC records contain considerably more than policy
> assertions.
>

OK.


>
> Paragraph 3 #2-1: "The receiver" might be interpreted as being an MUA.
> Suggest "Receiving domains". "how the mail is handled" -> "how they
> should handle the mail"
>

The outer bullet refers to SMTP Receivers, which I don't believe includes
MUAs.

OK on the second one.


>
> Last bullet: I immediately went to the case of the From: header field
> with multiple addresses, which had been a significant issue with ADSP.
> More about this later.
>
> 2.1 High-Level Goals
>
> First bullet: senders -> Domain Owners. Similar comment on the word
> "receivers".
>

OK.


>
> Third bullet: "effect on legitimate messages" isn't clear on what the
> "effect" is. Deliverability impact?
>

Will fix.


>
> 2.4 Out of Scope
>
> This section is full of double negatives, e.g., "not in scope for this
> work include: DMARC shall not be required..."
>

Will fix.


>
> Authentication of individuals rather than domains: DMARC doesn't perform
> authentication at all, it acts on the result of two other mechanisms.
> This muddies that point.
>

I'm not sure it's important to dive into this; we're saying this is a topic
we don't want to handle either way.


>
> 3. Terminology and Definitions
>
> The main part of this section is indeed terminology and definitions, but
> the subsections, particularly 3.2, aren't.  This should be reorganized.
>

OK.


>
> Domain Owner: This definition clearly defines the Domain Owner as the
> registrant of a domain. But as we will see much later, DMARC records are
> sometimes published by From domains directly, which could be a person or
> organization delegated by the Domain Owner. Perhaps another term is
> needed, because there are some things that are available only to Domain
> Owners and others that are also available to those able to publish a DNS
> record for a subdomain.
>

The definition does include more complex arrangements than merely the
registering entity.


>
> Organizational Domain: I have many problems with this:
>
> (1) An algorithm like this doesn't belong in the definitions.
>

Fixed.


> (2) This creates a dependency on a public suffix list such as that
> published by Mozilla, but doesn't require the use of a particular list.
> This would create an inconsistency in the result of DMARC that I
> consider to be an interoperability problem.
>

Yes.  We acknowledge that public suffix is far from an ideal solution, but
until some of the ideas being discussed in APPSAWG and elsewhere become a
reality, it's the only operational option.  Your point is taken, though,
that lots of sources for this information is a problem.  I'll add a note
about it.


> (3) During the development of ADSP, it was made clear to me by the DNS
> folks that there is no way, in practice, to determine an Organizational
> Domain.
>

Right; see my comment above about APPSAWG work.


> (4) The last paragraph acknowledges that it is a heuristic, and its use
> of "currently" implies that something better is in the works (which
> needs to be described instead in the spec).
>

It will be once there's a document to which to refer.


>
> 3.2 Overview
>
> Paragraph 1: "Mail sent for such a domain" -> "Mail sent from such a
> domain" (important distinction!)
>

Fixed.


>
> Paragraph 2: Feedback is to the Domain Owner, not the claimed sender.
>

OK.


>
> Paragraph 4: "from the Domain Owner" -> "from the Organizational Domain"
>

OK.


>
> [aside: I see, much later in the spec, that DMARC records can be
> published by the From domain directly, not just from the Domain Owner. A
> lot of earlier text needs to be cleaned up to accommodate that.]
>

Are those not the same?  Or are you talking about the subdomain case?


>
> 3.3 Flow Diagram
>
> "The above diagram shows the flow of messages": But there are lots
> more.  Spoofed messages have a different flow. So do mailing lists,
> domains with multiple layers of MTAs, etc. This is just the simplest
> flow of legitimate messages.
>

I'll label it as a simple or typical example.


>
> Item 6: "author's DNS data".  For SPF and DKIM, what's queried is not
> necessarily the author domain.
>

It is if the identifiers are aligned.  I'll make that more claer.


>
> Item 7: "queries to the author domain": Organizational Domain? (with the
> above aside as a caveat)
>

OK.


>
> 3.4 Identifier Alignment
>
> It would be good to start with a definition of what identifier alignment
> is, and I'm not finding that (perhaps it is buried there somewhere).
>

It's earlier in Section 3.


>
> Paragraph 2 end: "most MUAs represent..." introduces a UI issue, and we
> have considered that out-of-bounds in the past.
>

In DKIM, we require From: to be signed because it's the one guaranteed to
be visible and most likely to impact user understanding of the origin of
the message.  DMARC takes advantage of that same assumption.  But yes, this
is something that could be debated.


>
> Paragraph 4: identity alignment -> identifier alignment
>

Fixed.


>
> This section should discuss the rare-but-legal case of From: header
> fields with multiple addresses.
>

This is covered in Section 10.1.


>
> 3.4.1 DKIM-authenticated identifiers
>
> I got confused here right away by the use of "strict" and "relaxed"
> modes without proper introduction to what they are, since those terms
> are used in DKIM (as canonicalization modes) and mean something very
> different here. It was only when I got to the SPF section and it was
> still talking about strict and relaxed that I realized those terms were
> being used in DMARC as well.
>

DKIM defines "simple", not "strict".  Either way, I'll add a note about the
recycling of the name.


>
> Paragraph 2: must be equal -> must be equal in order to be considered to
> be in alignment
>

Fixed.


>
> Last paragraph: "DMARC pass" hasn't been defined anywhere.  Does DMARC
> produce a pass/fail result?
>

Yes.  I'll mention this earlier.


>
> 3.4.1 and 3.4.2
>
> I'm unclear on the motivation for having both strict and relaxed modes.
> Is it because we don't know what will work in practice, or because
> different sorts of domains will want to choose differently. If the
> latter, please give some guidance for which mode should be used in which
> situation.
>

OK.


>
> 4. Policy
>
> Paragraph 2: sending domains -> Organizational Domains (with above caveat)
>

Changed to "its domains".


>
> Paragraph 4: It's possible to determine non-use of SPF, but not DKIM, in
> this way.
>

The DKIM equivalent is to not sign the message.  What you're trying to
avoid is false positives here.


>
> 5. DMARC Policy Record
>
> Paragraph 2: "matches perfectly with the DNS".  Not at all -- the fact
> that it isn't possible to deterministically determine the organizational
> domain, is an example of the mismatch.  Also, operational limits on DNS
> record sizes prompts the use of non obvious syntax like the !<size>
> construct.
>

I think we're talking here about why we store the record in the DNS, like
SPF and DKIM and various others have done.  We're not saying here that we
espouse ways of determining things like the zone cut from DNS data.


>
> 5.2 General Record Format
>
> Paragraph 2: Last sentence is less about DMARC than about change control
> for the spec itself.
>

Fixed.


>
> adkim tag: Definition unnecessarily limits alignment modes to "s" and
> "anything else". Suggest that it require "s" or "r", with other values
> reserved for future use.
>

Fixed, by just deferring to the ABNF.


>
> fo: The tag value can contain both 0 and 1; what happens then?
>

The union of the two means "0" is a no-op in that case.


>
> d: Not sure why it's interesting to find about broken signatures when
> there's a good signature that meets alignment requirements.
>

Operators do appear to want this information, probably to aid in debugging.


>
> p: quarantine: What does "fails the DMARC mechanism" mean overall? Is
> this defined somewhere?  "suspicious": After all the controversy about
> the use of the use of the word suspicious in SSP/ADSP, I'm highly amused
> to see it here.
>

I've added "failed" earlier in the document to indicate that DMARC produces
a result, so hopefully that's clarified here.

SSP/ADSP tried to define Suspicious as a result, as I recall, or at least
explain what it meant.  We say clearly here that we have no idea by what
criteria a receiver will normally categorize something as suspicious (or
whatever word it uses), but the intent here is to give the receiver
information in that direction.


> pct: DNS domain isn't defined. DMARC mechanism is to be applied -> DMARC
> policy is to be applied
>

"DNS domain" is a term of art that was acceptable in the past during IESG
reviews when use of "domain" was ambiguous.  That's why it's started
appearing here.

Fixed.



>
> rf: This is comma-separated, while other tag values are colon-separated.
> Why the inconsistency?
>

Fixed.


> Initial default values are -> Possible values are (and possibly
> reference a registry)
>

We didn't make a registry for this because there's really only one in use
in this space, and no new ones are anticipated.


> [IODEF] is listed as an Informative Reference; shouldn't it be normative
> like [AFRF]?
>

True.  Fixed.


>
> ri: It seems like everything is best-effort; the Receiving Domain is
> doing a favor here (and sendto: is itself best effort).
>

Right.  This is explicitly described as a request.


>
> sp: Does this apply to subdomains at all levels, or just direct
> subdomains? What's the motivation for specifying a different policy for
> subdomains vs. the organizational domain?  Should also point out that sp
> is meaningful only for DMARC records published in Organizational Domains
> and not From domains, (although  publishing in From domains isn't
> introduced until later in the document).
>

It applies to all subdomains.  I'll make it say so.

The motivation here is the same as it was for ADSP; if I protect
bluepopcorn.net only, the spoofers could send mail with believable
subdomains of that domain without receivers taking any DMARC-specific
action.

I'm not clear on the case you're talking about; in the DMARC context, when
is the OD different from the From domain?


>
> 6. Policy Enforcement Considerations
>
> Paragraph 2: "...not to increase the likelihood of accepting abusive
> mail..." This seems like a qualitative requirement, not sure it belongs
> here.
>

This is a "Considerations" section.  It's just discussion, nothing
normative.


>
> 7.1 Verifying External Destinations
>
> Paragraph 3: SHOULD -- shouldn't that be a MUST?
>

We describe a few paragraphs down a reason why one would elect not to
implement that advice, so SHOULD is more appropriate here.


>
> Item 8: If rua and ruf can be overridden by the report receiver,
> wouldn't it be useful to be able to override at least ri and perhaps
> other values as well?
>

Possibly.  I'll let the rest of the community weigh in on that point.  What
other values might be worth allowing for an override?


>
> Third to last paragraph: "*._report._dmarc.example.com" looks rather
> scary -- mechanisms that depend on DNS wildcarding are always fragile.
> This may very well work, but it looks to me like this record actually
> says that example.com is willing to receive reports for ANY domain, not
> just child domains.
>

Right, that was actually the intent.  The prose has already been updated.


>
> 7.2 Aggregate reports
>
> The format for these reports is critical to interoperability -- should
> it really be specified in an appendix?  It's more important to specify
> the format of the reports than the requirements shown in the bulleted list.
>

The XML definition is quite large.  We found this arrangement -- no huge
gap in the text -- to be more palatable.


>
> 7.3 Failure reports
>
> Paragraph 1 reads as though AFRF is the only reporting format, but needs
> to accommodate IODEF and any future-defined reporting formats as well.
> For extensibility, there should also be a way for the Mail Receiver to
> generate a meta-report saying that they don't support the requested
> report format.
>
>
I think we might consider just yanking IODEF out.  I can't think of a
single implementation to date.  Does anybody know of one?

7.3.1 Reporting Format Update
>
> Are there any updates to IODEF?
>

I don't think there have been any implementations, so presently there are
no updates.


>
> 7.4 Failure Reports
>
> Paragraph 2: "ruf" tag -> "rf" tag
>

Fixed.


>
> 8. Policy Discovery
>
> This is the first mention I have seen that DMARC records are published
> directly on From domains; up to this point it looked like DMARC was only
> published by a Domain Owner on an Administrative Domain.  This changes a
> lot -- like the fact that a delegate of the Domain Owner, and not the
> [administrative] Domain Owner him/herself, can set the policy for a
> domain. This might require a major change of terminology usage, or at
> least a change in the definition of Domain Owner, to fix.
>

I'm not sure where the confusion came in.  The only domain of interest to
DMARC is the From domain; it is from this that the rest of the work (most
importantly, identifier alignment) is derived.

Who would a delegate of the Domain Owner be?  From the perspective of a
receiver, such a delegation is not visible; the query goes the OD.


>
> Items 2 and 4: Effectively, this means that v=DMARC2 records are
> completely independent of v=DMARC1 records. There is no interoperability
> between versions. Is this what is intended?
>

This document defines v1.  v2 could define itself in such a way that it
accepts part or all of a v1 record, but a v1 record is incompatible with
one explicitly declared to be for v2.  This is precisely the same as
"v=DKIM1": If you're extending DKIM v1, you just declare new tags; once you
say v2, you're saying you don't want to keep the old meanings.


> "If the RFC5322.From domain does not exist...": This specifies an action
> that has nothing to do with DMARC. I don't know the history of this but
> it seems like if there was going to be some global "you SHOULD reject
> messages with a nonexistent From domain" action, it belongs someplace
> like RFC 5322, not here. See also comment under A.4.
>

I agree that RFC5322 doesn't establish this requirement.  We're saying that
a DMARC implementation needs to take this action as it, along with normal
DMARC operation, defeats spoof attempts.


> 9. Domain Owner Actions
>
> Paragraph 1: "set up an address to receive reports" -- could also
> delegate that externally
>

Sure.  Do we need to identify all the things a Domain Owner might do
external to itself?  That seems like it could become tedious; I think
that's already implicit.


>
> Paragraph 2: What does "protect those email addresses" mean?
>

Typical abuse prevention is what we have in mind there.


>
> Paragraph 3: What does this have to do with domain owner actions? If
> this is connected to the previous paragraph, note that there is no
> requirement that reports use SPF and/or DKIM authentication (although
> perhaps there should be).
>

The steps listed prior to that advise the reader to deploy authentication
technologies.  This gives references to those materials.


>
> Paragraph 4: Need some specific guidance on how URIs other than mailto:
> are to be used (although there is some discussion of this in section 11;
> maybe a forward reference is needed)
>

There's more being added about using http: reporting from John Levine.


>
> 10.1 Extract Author Domain
>
> Paragraph 3: "Such messages SHOULD be rejected." Again, this specifies
> an action on messages that has nothing to do with DMARC. In particular,
> bullet 2 and 4 describe messages that are legal according to RFC 5322,
> and if they're undesirable should have been addressed there.
>

DMARC-aware operators see those exceptional cases in vanishingly small
numbers.  That specific community appears to be of the consensus opinion
that they aren't worth the introduced complexity for exceptional handling.


> If the messages are rejected, should they be silently discarded or fully
> rejected (per section 15.4)?
>

The action isn't specified.  Their delivery simply needs to be prevented.


>
> 10.3 Messaging Sampling
>
> Much of this section applies generally to the application of policy and
> not specifically to sampling, so perhaps the section heading should be
> "Policy Application" or something like that.
>

I don't understand what you're saying here.  How is this not a message
sampling function?


>
> 11.1 Discovery
>
> Paragraph 1: Does not discuss DMARC policy records associated with
> Administrative Domains, only those associated with the From address
> (converse of everything before section 8).
>

Still not clear on the distinction being made here.


>
> Paragraph 2: Section 7.1 -> Section 8
>

Fixed.


>
> 11.2 Transport
>
> Paragraph 1: "secure transport mechanism" needs to be specified more
> completely. Does SMTP/TLS qualify? Is successful certificate
> verification required?
>

This states a general requirement.  The specific instances (e.g., in the
mail and web spaces) are given in subsequent sections.


>
> Paragraph 3: "Mail Receiver SHOULD send" -- section 11.2.4 (paragraph 1)
> says that an attempt MUST be made.
>

11.2.4 says SHOULD be generated, and if one is generated, it MUST be
attempted across the full URI set.


>
> 11.2.1 Email
>
> Paragraph 1: Is it equally acceptable to send via SMTP over SSL (port 465)?
>

Are there implementations of this?


>
> Filename extensions: Is the .gz format just a GZIPped XML file?  That
> isn't stated clearly, and if it is, why not make the extension .xml.gz?
>

That's fixed in the unpublished version.


>
> 11.2.2 HTTP
>
> Paragraph 2: "POST or PUT" -- which method is used? Must reporting URIs
> support both methods? Or is there a process for discovering which method
> is to be used?
>
> I'm not an expert in HTTP, but I have the feeling that this transport
> (and all transports except possibly mailto:) is underspecified. For
> example, what Content-Types MUST be supported? Are there any other HTTP
> headers that MUST be included?
>

There's a separate submission to fix this.


>
> 11.2.4 Error Reports
>
> Paragraph 1: Last sentence seems to say that mailto: URIs are preferred
> over other transports, which is the opposite of the last paragraph of
> section 9.
>

For error reports, that's correct.


>
> Why is the error report in a text/plain format rather than a text/xml
> format like the feedback reports themselves?
>

There's no encoded data in an error report.  The point is to bring operator
attention to the fact that there's a problem.


>
> "Note: A more rigorous syntax specification...will be added here" says
> this is still an experimental capability.
>

Correct.


>
> 12. Capacity Planning
>
> DNS: This understates the actual DNS load; there will be additional
> queries in connection with looking up and sending feedback and aggregate
> reports, additional queries associated with reporting addresses that are
> outside the current domain, and probably other things I haven't
> considered (like DNSSEC). A more thorough analysis is needed here.
>

I've added text about those cases, except DNSSEC which is an entire layer
that is important to but ultimately not within the DMARC layer.


>
> 13. Minimum Implementations
>
> Please provide separate minimum requirements for Domain Owners (or other
> publishers of DMARC records) and Mail Receivers. Bear in mind that
> Domain Owners, etc. may not themselves receive the reports.
>

Added as a TBD item.


>
> 14. Privacy Considerations
>
> One privacy consideration I don't see listed anywhere is forwarding
> privacy: Basic email provides good protection against message senders
> finding out the actual delivery address of forwarded mail. The reporting
> capabilities of DMARC make it trivially easy for a Domain Owner to
> discover the delivery address of a message delivered to a
> DMARC-compliant Receiving Domain.
>

Added.


>
> 14.2 Report Recipients
>
> It might be noted that the privacy consideration is not that different
> from a domain with an MX record that is handled by someone outside the
> domain.
>

Would that be a useful illustration outside of the prose that's already
there?


>
> 14.4 Secure Protocols
>
> Should there be a requirement that if the original message was sent with
> TLS, that feedback reports be sent securely?
>

Mentioned it.


>
> 15.1 Use of RFC5322.From
>
> Last paragraph: "This document prescribes no specific action, other
> than..."  Section 10.1 does indeed prescribe a specific action that
> SHOULD be taken.
>

Isn't that what this paragraph is saying?


> 15.3 DNS Load and Caching
>
> It would be good to see a more thorough analysis of DNS effects -- both
> the number of queries that DMARC adds and the possible use of DMARC
> records (large records, at well-known locations in DNS) for DNS
> amplification attacks.
>

OK.


>
> 15.5 Identifier Alignment Considerations
>
> Paragraph 1: Don't the concerns about SPF apply apply to DKIM key
> records too?
>

Yes; fixed.


>
> Paragraph 3: "cede" -> "delegate" (administrator doesn't actually lose
> control)
>

Fixed.


>
> 17. Security Considerations
>
> Check RFC 6376 Section 8.x for other attacks that might be documented
> here. In particular, attackers might publish intentionally malformed
> DMARC records in conjunction with domains they control and send mail
> from in an effort to make DMARC less useful or onerous in some way, in
> an effort to discourage its use.
>

OK.


>
>
> 17.2 DNS Security
>
> This should emphasize that both the publication of DNSSEC by Domain
> Owners and the use of DNSSEC-aware resolvers by Mail Receivers is
> needed.  See also RFC 6376 section 8.5.
>

OK.


>
> Appendix A. Technology Considerations
>
> These provide good insight into some of the design choices made in the
> development of DMARC. Is the intent to include this in the
> standards-track document, or is this just information to aid the
> evaluation process?
>

We weren't planning to remove them.


>
> A.4 Domain Existence Test
>
> This section indicates that there was operational experience that the
> error rate was too high. Given that experience, I am surprised that
> section 8 says that the receiver SHOULD reject the message.
>

That may be an oversight, i.e., we removed one but forgot to remove the
other.  What does the community think about this?


>
> A.5 Issues With ADSP In Operation
>
> This section reads like somewhat of a debate with ADSP, or as though
> DMARC is competing with ADSP. DMARC and ADSP have different goals, and
> different constraints (e.g., SPF is explicitly out of scope of ADSP) so
> the list of issues doesn't really make sense.
>

Right; the goal here is to highlight that the use cases were different, as
are the solution spaces.


>
> A.6 Organizational Domain Discovery Issues
>
> Paragraph 3: "Climbing the tree", explored extensively in the
> development of ADSP, can of course be constrained to a specific limited
> number of queries. But ultimately even a one-level climb was considered
> too much and was rejected. Nevertheless, DMARC does look for policy in
> two places (the From domain and the Organizational Domain).
>

Right, but not based directly on the DNS; I think that was the objection
with SSP/ADSP.


>
> The approach being used in DMARC was briefly considered in ADSP, but
> didn't even make it into a draft at the strong advice of the DNS
> Directorate that there is no way to reliably determine the delegation
> level in a domain name.
>

Right; as I said above, we don't intend to keep this method as soon as
something endorsed by the larger community is available.


>
> =====
>
> General Comments
>
> There is no discussion of the effect of the effect of DMARC on some very
> common situations, such as mailing lists and forwarding (except a couple
> of hints at heuristics in the XML Schema). If the deployment of DMARC
> has an effect on the delivery of messages sent through mailing lists,
> that's a serious problem. I'm not aware of a straightforward answer to
> that problem, other than to maintain a whitelist of mailing lists that
> themselves authenticate their messages, which would normally not align
> with the From addresses at all. This has been cited as a serious problem
> with ADSP, so one would not want to repeat that problem here.
>
>
RFC6377 tackled a lot of these points.  It's been pointed out on the list
that (a) DMARC has the same concerns as ADSP with respect to lists as it's
currently defined, and (b) this is something the DMARC community would like
to spend time and energy trying to solve.

But you're right, the document doesn't say anything about this yet, and
probably should.

-MSK

--089e0102ef8471e21704ec9d0cbc
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><br><div><div class=3D"gmail_extra"><div class=3D"gmail_qu=
ote">On Wed, Oct 2, 2013 at 3:54 PM, Jim Fenton <span dir=3D"ltr">&lt;<a hr=
ef=3D"mailto:fenton@bluepopcorn.net" target=3D"_blank">fenton@bluepopcorn.n=
et</a>&gt;</span> wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-=
left:1px solid rgb(204,204,204);padding-left:1ex">I have not been monitorin=
g this mailing list, but a couple of people<br>
have asked me to have a look at the DMARC spec. =A0I apologize for the<br>
amount of time it has taken for me to get to this.<br>
<br></blockquote><div><br>Thanks for the review, Jim.=A0 Sorry it&#39;s tak=
en so long for me to get all the way through this.<br>=A0</div><blockquote =
class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px sol=
id rgb(204,204,204);padding-left:1ex">

I&#39;ll leave out the editorial issues, but I&#39;m happy to share those (=
in<br>
particular, with the editors) if there is interest. =A0I&#39;ll start with =
a<br>
lot of specific comments; there are a few additional comments at the<br>
very end.<br></blockquote><div><br></div><div>Happy to have your editorial =
comments off-list if you like.<br>=A0<br></div><blockquote class=3D"gmail_q=
uote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,2=
04);padding-left:1ex">

<br>
=3D=3D=3D<br>
<br>
1. Introduction<br>
<br>
Paragraph 3: =A0I&#39;m surprised to see the use of the word &quot;policy&q=
uot;. In the<br>
context of ADSP (originally Sender Signing Policy), the word &quot;policy&q=
uot;<br>
was considered inaccurate because it was deemed inappropriate to dictate<br=
>
policy to a Receiving Domain. Even though SSP was describing the<br>
domain&#39;s policy with respect to signing messages with DKIM, the word<br=
>
&quot;practices&quot; was substituted. Is it now considered acceptable to m=
ake<br>
policy requests of a Receiving Domain?<br></blockquote><div><br></div><div>=
I don&#39;t think this has come up during the development of DMARC.=A0 In c=
ontrast, I think the use of &quot;policy&quot; in the SPF context has becom=
e widely understood to indicate it&#39;s a request from the author domain.=
=A0 I do think it&#39;s pretty clear from the document that there are no il=
lusions that something&#39;s being demanded of the receiver.<br>
<br></div><div>In the case of SSP and ADSP, I think we were trying to descr=
ibe the signing practices of the author domain, so the receiver could make =
an intelligent judgement about accepting or rejecting the message.=A0 In DM=
ARC, the practices are implied by the nature of the protocol except for wha=
t alignment of identifiers a receiver should expect.<br>
<br></div><div><br></div><blockquote class=3D"gmail_quote" style=3D"margin:=
0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
<br>
Paragraph 4 #1: &quot;assertions about senders&#39; practices&quot; : shoul=
dn&#39;t that<br>
be Domain Owners&#39; practices, since the sender might include spoofers?<b=
r></blockquote><div><br></div><div>Yes, though we haven&#39;t introduced th=
at term yet.=A0 I&#39;ll change it to the lowercase form.<br>=A0<br></div>
<blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-=
left:1px solid rgb(204,204,204);padding-left:1ex">
<br>
Paragraph 3 #1: &quot;Senders make policy assertions&quot; -&gt; &quot;Doma=
in owners<br>
publish policy assertions&quot;. But see comment below about &quot;domain o=
wners&quot;,<br>
and note that DMARC records contain considerably more than policy<br>
assertions.<br></blockquote><div><br></div><div>OK.<br>=A0<br></div><blockq=
uote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1p=
x solid rgb(204,204,204);padding-left:1ex">
<br>
Paragraph 3 #2-1: &quot;The receiver&quot; might be interpreted as being an=
 MUA.<br>
Suggest &quot;Receiving domains&quot;. &quot;how the mail is handled&quot; =
-&gt; &quot;how they<br>
should handle the mail&quot;<br></blockquote><div><br></div><div>The outer =
bullet refers to SMTP Receivers, which I don&#39;t believe includes MUAs.<b=
r><br></div><div>OK on the second one.<br>=A0<br></div><blockquote class=3D=
"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(2=
04,204,204);padding-left:1ex">

<br>
Last bullet: I immediately went to the case of the From: header field<br>
with multiple addresses, which had been a significant issue with ADSP.<br>
More about this later.<br>
<br>
2.1 High-Level Goals<br>
<br>
First bullet: senders -&gt; Domain Owners. Similar comment on the word<br>
&quot;receivers&quot;.<br></blockquote><div><br></div><div>OK.<br>=A0<br></=
div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;bor=
der-left:1px solid rgb(204,204,204);padding-left:1ex">
<br>
Third bullet: &quot;effect on legitimate messages&quot; isn&#39;t clear on =
what the<br>
&quot;effect&quot; is. Deliverability impact?<br></blockquote><div><br></di=
v><div>Will fix.<br>=A0<br></div><blockquote class=3D"gmail_quote" style=3D=
"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-le=
ft:1ex">

<br>
2.4 Out of Scope<br>
<br>
This section is full of double negatives, e.g., &quot;not in scope for this=
<br>
work include: DMARC shall not be required...&quot;<br></blockquote><div><br=
></div><div>Will fix.<br>=A0<br></div><blockquote class=3D"gmail_quote" sty=
le=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);paddi=
ng-left:1ex">

<br>
Authentication of individuals rather than domains: DMARC doesn&#39;t perfor=
m<br>
authentication at all, it acts on the result of two other mechanisms.<br>
This muddies that point.<br></blockquote><div><br></div><div>I&#39;m not su=
re it&#39;s important to dive into this; we&#39;re saying this is a topic w=
e don&#39;t want to handle either way.<br>=A0<br></div><blockquote class=3D=
"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(2=
04,204,204);padding-left:1ex">

<br>
3. Terminology and Definitions<br>
<br>
The main part of this section is indeed terminology and definitions, but<br=
>
the subsections, particularly 3.2, aren&#39;t. =A0This should be reorganize=
d.<br></blockquote><div><br></div><div>OK.<br>=A0<br></div><blockquote clas=
s=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid r=
gb(204,204,204);padding-left:1ex">

<br>
Domain Owner: This definition clearly defines the Domain Owner as the<br>
registrant of a domain. But as we will see much later, DMARC records are<br=
>
sometimes published by From domains directly, which could be a person or<br=
>
organization delegated by the Domain Owner. Perhaps another term is<br>
needed, because there are some things that are available only to Domain<br>
Owners and others that are also available to those able to publish a DNS<br=
>
record for a subdomain.<br></blockquote><div><br></div><div>The definition =
does include more complex arrangements than merely the registering entity.<=
br>=A0<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0=
px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">

<br>
Organizational Domain: I have many problems with this:<br>
<br>
(1) An algorithm like this doesn&#39;t belong in the definitions.<br></bloc=
kquote><div><br></div><div>Fixed.<br>=A0<br></div><blockquote class=3D"gmai=
l_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,20=
4,204);padding-left:1ex">

(2) This creates a dependency on a public suffix list such as that<br>
published by Mozilla, but doesn&#39;t require the use of a particular list.=
<br>
This would create an inconsistency in the result of DMARC that I<br>
consider to be an interoperability problem.<br></blockquote><div><br></div>=
<div>Yes.=A0 We acknowledge that public suffix is far from an ideal solutio=
n, but until some of the ideas being discussed in APPSAWG and elsewhere bec=
ome a reality, it&#39;s the only operational option.=A0 Your point is taken=
, though, that lots of sources for this information is a problem.=A0 I&#39;=
ll add a note about it.<br>
=A0<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px =
0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
(3) During the development of ADSP, it was made clear to me by the DNS<br>
folks that there is no way, in practice, to determine an Organizational<br>
Domain.<br></blockquote><div><br></div><div>Right; see my comment above abo=
ut APPSAWG work.<br>=A0<br></div><blockquote class=3D"gmail_quote" style=3D=
"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-le=
ft:1ex">

(4) The last paragraph acknowledges that it is a heuristic, and its use<br>
of &quot;currently&quot; implies that something better is in the works (whi=
ch<br>
needs to be described instead in the spec).<br></blockquote><div><br></div>=
<div>It will be once there&#39;s a document to which to refer.<br>=A0<br></=
div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;bor=
der-left:1px solid rgb(204,204,204);padding-left:1ex">

<br>
3.2 Overview<br>
<br>
Paragraph 1: &quot;Mail sent for such a domain&quot; -&gt; &quot;Mail sent =
from such a<br>
domain&quot; (important distinction!)<br></blockquote><div><br></div><div>F=
ixed.<br>=A0<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px=
 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
<br>
Paragraph 2: Feedback is to the Domain Owner, not the claimed sender.<br></=
blockquote><div><br></div><div>OK.<br>=A0<br></div><blockquote class=3D"gma=
il_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,2=
04,204);padding-left:1ex">

<br>
Paragraph 4: &quot;from the Domain Owner&quot; -&gt; &quot;from the Organiz=
ational Domain&quot;<br></blockquote><div><br></div><div>OK.<br>=A0<br></di=
v><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;borde=
r-left:1px solid rgb(204,204,204);padding-left:1ex">

<br>
[aside: I see, much later in the spec, that DMARC records can be<br>
published by the From domain directly, not just from the Domain Owner. A<br=
>
lot of earlier text needs to be cleaned up to accommodate that.]<br></block=
quote><div><br></div><div>Are those not the same?=A0 Or are you talking abo=
ut the subdomain case?<br>=A0<br></div><blockquote class=3D"gmail_quote" st=
yle=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padd=
ing-left:1ex">

<br>
3.3 Flow Diagram<br>
<br>
&quot;The above diagram shows the flow of messages&quot;: But there are lot=
s<br>
more. =A0Spoofed messages have a different flow. So do mailing lists,<br>
domains with multiple layers of MTAs, etc. This is just the simplest<br>
flow of legitimate messages.<br></blockquote><div><br></div><div>I&#39;ll l=
abel it as a simple or typical example.<br>=A0<br></div><blockquote class=
=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rg=
b(204,204,204);padding-left:1ex">

<br>
Item 6: &quot;author&#39;s DNS data&quot;. =A0For SPF and DKIM, what&#39;s =
queried is not<br>
necessarily the author domain.<br></blockquote><div><br></div><div>It is if=
 the identifiers are aligned.=A0 I&#39;ll make that more claer.<br>=A0<br><=
/div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;bo=
rder-left:1px solid rgb(204,204,204);padding-left:1ex">

<br>
Item 7: &quot;queries to the author domain&quot;: Organizational Domain? (w=
ith the<br>
above aside as a caveat)<br></blockquote><div><br></div><div>OK.<br>=A0<br>=
</div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;b=
order-left:1px solid rgb(204,204,204);padding-left:1ex">
<br>
3.4 Identifier Alignment<br>
<br>
It would be good to start with a definition of what identifier alignment<br=
>
is, and I&#39;m not finding that (perhaps it is buried there somewhere).<br=
></blockquote><div><br></div><div>It&#39;s earlier in Section 3.<br>=A0<br>=
</div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;b=
order-left:1px solid rgb(204,204,204);padding-left:1ex">

<br>
Paragraph 2 end: &quot;most MUAs represent...&quot; introduces a UI issue, =
and we<br>
have considered that out-of-bounds in the past.<br></blockquote><div><br></=
div><div>In DKIM, we require From: to be signed because it&#39;s the one gu=
aranteed to be visible and most likely to impact user understanding of the =
origin of the message.=A0 DMARC takes advantage of that same assumption.=A0=
 But yes, this is something that could be debated.<br>
</div><div>=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0=
px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
<br>
Paragraph 4: identity alignment -&gt; identifier alignment<br></blockquote>=
<div><br></div><div>Fixed.<br>=A0<br></div><blockquote class=3D"gmail_quote=
" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);=
padding-left:1ex">

<br>
This section should discuss the rare-but-legal case of From: header<br>
fields with multiple addresses.<br></blockquote><div><br></div><div>This is=
 covered in Section 10.1.<br>=A0<br></div><blockquote class=3D"gmail_quote"=
 style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);p=
adding-left:1ex">

<br>
3.4.1 DKIM-authenticated identifiers<br>
<br>
I got confused here right away by the use of &quot;strict&quot; and &quot;r=
elaxed&quot;<br>
modes without proper introduction to what they are, since those terms<br>
are used in DKIM (as canonicalization modes) and mean something very<br>
different here. It was only when I got to the SPF section and it was<br>
still talking about strict and relaxed that I realized those terms were<br>
being used in DMARC as well.<br></blockquote><div><br></div><div>DKIM defin=
es &quot;simple&quot;, not &quot;strict&quot;.=A0 Either way, I&#39;ll add =
a note about the recycling of the name.<br>=A0<br></div><blockquote class=
=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rg=
b(204,204,204);padding-left:1ex">

<br>
Paragraph 2: must be equal -&gt; must be equal in order to be considered to=
<br>
be in alignment<br></blockquote><div><br></div><div>Fixed.<br>=A0<br></div>=
<blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-=
left:1px solid rgb(204,204,204);padding-left:1ex">
<br>
Last paragraph: &quot;DMARC pass&quot; hasn&#39;t been defined anywhere. =
=A0Does DMARC<br>
produce a pass/fail result?<br></blockquote><div><br></div><div>Yes.=A0 I&#=
39;ll mention this earlier.<br>=A0<br></div><blockquote class=3D"gmail_quot=
e" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204)=
;padding-left:1ex">

<br>
3.4.1 and 3.4.2<br>
<br>
I&#39;m unclear on the motivation for having both strict and relaxed modes.=
<br>
Is it because we don&#39;t know what will work in practice, or because<br>
different sorts of domains will want to choose differently. If the<br>
latter, please give some guidance for which mode should be used in which<br=
>
situation.<br></blockquote><div><br></div><div>OK.<br>=A0<br></div><blockqu=
ote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px=
 solid rgb(204,204,204);padding-left:1ex">
<br>
4. Policy<br>
<br>
Paragraph 2: sending domains -&gt; Organizational Domains (with above cavea=
t)<br></blockquote><div><br></div><div>Changed to &quot;its domains&quot;.<=
br>=A0<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0=
px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">

<br>
Paragraph 4: It&#39;s possible to determine non-use of SPF, but not DKIM, i=
n<br>
this way.<br></blockquote><div><br></div><div>The DKIM equivalent is to not=
 sign the message.=A0 What you&#39;re trying to avoid is false positives he=
re.<br>=A0<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0=
px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">

<br>
5. DMARC Policy Record<br>
<br>
Paragraph 2: &quot;matches perfectly with the DNS&quot;. =A0Not at all -- t=
he fact<br>
that it isn&#39;t possible to deterministically determine the organizationa=
l<br>
domain, is an example of the mismatch. =A0Also, operational limits on DNS<b=
r>
record sizes prompts the use of non obvious syntax like the !&lt;size&gt;<b=
r>
construct.<br></blockquote><div><br></div><div>I think we&#39;re talking he=
re about why we store the record in the DNS, like SPF and DKIM and various =
others have done.=A0 We&#39;re not saying here that we espouse ways of dete=
rmining things like the zone cut from DNS data.<br>
=A0<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px =
0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
<br>
5.2 General Record Format<br>
<br>
Paragraph 2: Last sentence is less about DMARC than about change control<br=
>
for the spec itself.<br></blockquote><div><br></div><div>Fixed.<br>=A0<br><=
/div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;bo=
rder-left:1px solid rgb(204,204,204);padding-left:1ex">
<br>
adkim tag: Definition unnecessarily limits alignment modes to &quot;s&quot;=
 and<br>
&quot;anything else&quot;. Suggest that it require &quot;s&quot; or &quot;r=
&quot;, with other values<br>
reserved for future use.<br></blockquote><div><br></div><div>Fixed, by just=
 deferring to the ABNF.<br>=A0<br></div><blockquote class=3D"gmail_quote" s=
tyle=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);pad=
ding-left:1ex">

<br>
fo: The tag value can contain both 0 and 1; what happens then?<br></blockqu=
ote><div><br></div><div>The union of the two means &quot;0&quot; is a no-op=
 in that case.<br>=A0<br></div><blockquote class=3D"gmail_quote" style=3D"m=
argin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left=
:1ex">

<br>
d: Not sure why it&#39;s interesting to find about broken signatures when<b=
r>
there&#39;s a good signature that meets alignment requirements.<br></blockq=
uote><div><br></div><div>Operators do appear to want this information, prob=
ably to aid in debugging.<br>=A0<br></div><blockquote class=3D"gmail_quote"=
 style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);p=
adding-left:1ex">

<br>
p: quarantine: What does &quot;fails the DMARC mechanism&quot; mean overall=
? Is<br>
this defined somewhere? =A0&quot;suspicious&quot;: After all the controvers=
y about<br>
the use of the use of the word suspicious in SSP/ADSP, I&#39;m highly amuse=
d<br>
to see it here.<br></blockquote><div><br></div><div>I&#39;ve added &quot;fa=
iled&quot; earlier in the document to indicate that DMARC produces a result=
, so hopefully that&#39;s clarified here.<br><br></div><div>SSP/ADSP tried =
to define Suspicious as a result, as I recall, or at least explain what it =
meant.=A0 We say clearly here that we have no idea by what criteria a recei=
ver will normally categorize something as suspicious (or whatever word it u=
ses), but the intent here is to give the receiver information in that direc=
tion.<br>
<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8=
ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
<br>
pct: DNS domain isn&#39;t defined. DMARC mechanism is to be applied -&gt; D=
MARC<br>
policy is to be applied<br></blockquote><div><br></div><div>&quot;DNS domai=
n&quot; is a term of art that was acceptable in the past during IESG review=
s when use of &quot;domain&quot; was ambiguous.=A0 That&#39;s why it&#39;s =
started appearing here.<br>
<br></div><div>Fixed.<br><br></div><div>=A0<br></div><blockquote class=3D"g=
mail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204=
,204,204);padding-left:1ex">
<br>
rf: This is comma-separated, while other tag values are colon-separated.<br=
>
Why the inconsistency?<br></blockquote><div><br></div><div>Fixed.<br>=A0<br=
></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;=
border-left:1px solid rgb(204,204,204);padding-left:1ex">
Initial default values are -&gt; Possible values are (and possibly<br>
reference a registry)<br></blockquote><div><br></div><div>We didn&#39;t mak=
e a registry for this because there&#39;s really only one in use in this sp=
ace, and no new ones are anticipated.<br>=A0<br></div><blockquote class=3D"=
gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(20=
4,204,204);padding-left:1ex">

[IODEF] is listed as an Informative Reference; shouldn&#39;t it be normativ=
e<br>
like [AFRF]?<br></blockquote><div><br></div><div>True.=A0 Fixed.<br>=A0<br>=
</div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;b=
order-left:1px solid rgb(204,204,204);padding-left:1ex">
<br>
ri: It seems like everything is best-effort; the Receiving Domain is<br>
doing a favor here (and sendto: is itself best effort).<br></blockquote><di=
v><br></div><div>Right.=A0 This is explicitly described as a request.<br>=
=A0<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px =
0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">

<br>
sp: Does this apply to subdomains at all levels, or just direct<br>
subdomains? What&#39;s the motivation for specifying a different policy for=
<br>
subdomains vs. the organizational domain? =A0Should also point out that sp<=
br>
is meaningful only for DMARC records published in Organizational Domains<br=
>
and not From domains, (although =A0publishing in From domains isn&#39;t<br>
introduced until later in the document).<br></blockquote><div><br></div><di=
v>It applies to all subdomains.=A0 I&#39;ll make it say so.<br><br></div><d=
iv>The motivation here is the same as it was for ADSP; if I protect <a href=
=3D"http://bluepopcorn.net">bluepopcorn.net</a> only, the spoofers could se=
nd mail with believable subdomains of that domain without receivers taking =
any DMARC-specific action.<br>
<br></div><div>I&#39;m not clear on the case you&#39;re talking about; in t=
he DMARC context, when is the OD different from the From domain?<br>=A0<br>=
</div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;b=
order-left:1px solid rgb(204,204,204);padding-left:1ex">

<br>
6. Policy Enforcement Considerations<br>
<br>
Paragraph 2: &quot;...not to increase the likelihood of accepting abusive<b=
r>
mail...&quot; This seems like a qualitative requirement, not sure it belong=
s<br>
here.<br></blockquote><div><br></div><div>This is a &quot;Considerations&qu=
ot; section.=A0 It&#39;s just discussion, nothing normative.<br>=A0<br></di=
v><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;borde=
r-left:1px solid rgb(204,204,204);padding-left:1ex">

<br>
7.1 Verifying External Destinations<br>
<br>
Paragraph 3: SHOULD -- shouldn&#39;t that be a MUST?<br></blockquote><div><=
br></div><div>We describe a few paragraphs down a reason why one would elec=
t not to implement that advice, so SHOULD is more appropriate here.<br>
=A0<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px =
0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
<br>
Item 8: If rua and ruf can be overridden by the report receiver,<br>
wouldn&#39;t it be useful to be able to override at least ri and perhaps<br=
>
other values as well?<br></blockquote><div><br></div><div>Possibly.=A0 I&#3=
9;ll let the rest of the community weigh in on that point.=A0 What other va=
lues might be worth allowing for an override?<br>=A0<br></div><blockquote c=
lass=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px soli=
d rgb(204,204,204);padding-left:1ex">

<br>
Third to last paragraph: &quot;*._report._<a href=3D"http://dmarc.example.c=
om" target=3D"_blank">dmarc.example.com</a>&quot; looks rather<br>
scary -- mechanisms that depend on DNS wildcarding are always fragile.<br>
This may very well work, but it looks to me like this record actually<br>
says that <a href=3D"http://example.com" target=3D"_blank">example.com</a> =
is willing to receive reports for ANY domain, not<br>
just child domains.<br></blockquote><div><br></div><div>Right, that was act=
ually the intent.=A0 The prose has already been updated.<br>=A0<br></div><b=
lockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-le=
ft:1px solid rgb(204,204,204);padding-left:1ex">

<br>
7.2 Aggregate reports<br>
<br>
The format for these reports is critical to interoperability -- should<br>
it really be specified in an appendix? =A0It&#39;s more important to specif=
y<br>
the format of the reports than the requirements shown in the bulleted list.=
<br></blockquote><div><br></div><div>The XML definition is quite large.=A0 =
We found this arrangement -- no huge gap in the text -- to be more palatabl=
e.<br>
=A0<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px =
0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
<br>
7.3 Failure reports<br>
<br>
Paragraph 1 reads as though AFRF is the only reporting format, but needs<br=
>
to accommodate IODEF and any future-defined reporting formats as well.<br>
For extensibility, there should also be a way for the Mail Receiver to<br>
generate a meta-report saying that they don&#39;t support the requested<br>
report format.<br>
<br></blockquote><div><br></div><div>I think we might consider just yanking=
 IODEF out.=A0 I can&#39;t think of a single implementation to date.=A0 Doe=
s anybody know of one?<br> <br></div><blockquote class=3D"gmail_quote" styl=
e=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);paddin=
g-left:1ex">

7.3.1 Reporting Format Update<br>
<br>
Are there any updates to IODEF?<br></blockquote><div><br></div><div>I don&#=
39;t think there have been any implementations, so presently there are no u=
pdates.<br>=A0<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0=
px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">

<br>
7.4 Failure Reports<br>
<br>
Paragraph 2: &quot;ruf&quot; tag -&gt; &quot;rf&quot; tag<br></blockquote><=
div><br></div><div>Fixed.<br>=A0<br></div><blockquote class=3D"gmail_quote"=
 style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);p=
adding-left:1ex">

<br>
8. Policy Discovery<br>
<br>
This is the first mention I have seen that DMARC records are published<br>
directly on From domains; up to this point it looked like DMARC was only<br=
>
published by a Domain Owner on an Administrative Domain. =A0This changes a<=
br>
lot -- like the fact that a delegate of the Domain Owner, and not the<br>
[administrative] Domain Owner him/herself, can set the policy for a<br>
domain. This might require a major change of terminology usage, or at<br>
least a change in the definition of Domain Owner, to fix.<br></blockquote><=
div><br></div><div>I&#39;m not sure where the confusion came in.=A0 The onl=
y domain of interest to DMARC is the From domain; it is from this that the =
rest of the work (most importantly, identifier alignment) is derived.<br>
<br></div><div>Who would a delegate of the Domain Owner be?=A0 From the per=
spective of a receiver, such a delegation is not visible; the query goes th=
e OD.<br></div><div>=A0<br></div><blockquote class=3D"gmail_quote" style=3D=
"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-le=
ft:1ex">

<br>
Items 2 and 4: Effectively, this means that v=3DDMARC2 records are<br>
completely independent of v=3DDMARC1 records. There is no interoperability<=
br>
between versions. Is this what is intended?<br></blockquote><div><br></div>=
<div>This document defines v1.=A0 v2 could define itself in such a way that=
 it accepts part or all of a v1 record, but a v1 record is incompatible wit=
h one explicitly declared to be for v2.=A0 This is precisely the same as &q=
uot;v=3DDKIM1&quot;: If you&#39;re extending DKIM v1, you just declare new =
tags; once you say v2, you&#39;re saying you don&#39;t want to keep the old=
 meanings.<br>
<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8=
ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
<br>
&quot;If the RFC5322.From domain does not exist...&quot;: This specifies an=
 action<br>
that has nothing to do with DMARC. I don&#39;t know the history of this but=
<br>
it seems like if there was going to be some global &quot;you SHOULD reject<=
br>
messages with a nonexistent From domain&quot; action, it belongs someplace<=
br>
like RFC 5322, not here. See also comment under A.4.<br></blockquote><div><=
br></div><div>I agree that RFC5322 doesn&#39;t establish this requirement.=
=A0 We&#39;re saying that a DMARC implementation needs to take this action =
as it, along with normal DMARC operation, defeats spoof attempts.<br>
<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8=
ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
<br>
9. Domain Owner Actions<br>
<br>
Paragraph 1: &quot;set up an address to receive reports&quot; -- could also=
<br>
delegate that externally<br></blockquote><div><br></div><div>Sure.=A0 Do we=
 need to identify all the things a Domain Owner might do external to itself=
?=A0 That seems like it could become tedious; I think that&#39;s already im=
plicit.<br>
=A0<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px =
0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
<br>
Paragraph 2: What does &quot;protect those email addresses&quot; mean?<br><=
/blockquote><div><br></div><div>Typical abuse prevention is what we have in=
 mind there.<br>=A0<br></div><blockquote class=3D"gmail_quote" style=3D"mar=
gin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1=
ex">

<br>
Paragraph 3: What does this have to do with domain owner actions? If<br>
this is connected to the previous paragraph, note that there is no<br>
requirement that reports use SPF and/or DKIM authentication (although<br>
perhaps there should be).<br></blockquote><div><br></div><div>The steps lis=
ted prior to that advise the reader to deploy authentication technologies.=
=A0 This gives references to those materials.<br>=A0<br></div><blockquote c=
lass=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px soli=
d rgb(204,204,204);padding-left:1ex">

<br>
Paragraph 4: Need some specific guidance on how URIs other than mailto:<br>
are to be used (although there is some discussion of this in section 11;<br=
>
maybe a forward reference is needed)<br></blockquote><div><br></div><div>Th=
ere&#39;s more being added about using http: reporting from John Levine.<br=
>=A0<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px=
 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">

<br>
10.1 Extract Author Domain<br>
<br>
Paragraph 3: &quot;Such messages SHOULD be rejected.&quot; Again, this spec=
ifies<br>
an action on messages that has nothing to do with DMARC. In particular,<br>
bullet 2 and 4 describe messages that are legal according to RFC 5322,<br>
and if they&#39;re undesirable should have been addressed there. <br></bloc=
kquote><div><br></div>DMARC-aware operators see those exceptional cases in =
vanishingly small numbers.=A0 That specific community appears to be of the =
consensus opinion that they aren&#39;t worth the introduced complexity for =
exceptional handling.<br>
=A0<br></div><div class=3D"gmail_quote"><blockquote class=3D"gmail_quote" s=
tyle=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);pad=
ding-left:1ex">
If the messages are rejected, should they be silently discarded or fully<br=
>
rejected (per section 15.4)?<br></blockquote><div><br></div><div>The action=
 isn&#39;t specified.=A0 Their delivery simply needs to be prevented.<br>=
=A0<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px =
0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">

<br>
10.3 Messaging Sampling<br>
<br>
Much of this section applies generally to the application of policy and<br>
not specifically to sampling, so perhaps the section heading should be<br>
&quot;Policy Application&quot; or something like that.<br></blockquote><div=
><br></div><div>I don&#39;t understand what you&#39;re saying here.=A0 How =
is this not a message sampling function?<br>=A0<br></div><blockquote class=
=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rg=
b(204,204,204);padding-left:1ex">

<br>
11.1 Discovery<br>
<br>
Paragraph 1: Does not discuss DMARC policy records associated with<br>
Administrative Domains, only those associated with the From address<br>
(converse of everything before section 8).<br></blockquote><div><br></div><=
div>Still not clear on the distinction being made here.<br>=A0<br></div><bl=
ockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-lef=
t:1px solid rgb(204,204,204);padding-left:1ex">

<br>
Paragraph 2: Section 7.1 -&gt; Section 8<br></blockquote><div><br></div><di=
v>Fixed.<br>=A0<br></div><blockquote class=3D"gmail_quote" style=3D"margin:=
0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
<br>
11.2 Transport<br>
<br>
Paragraph 1: &quot;secure transport mechanism&quot; needs to be specified m=
ore<br>
completely. Does SMTP/TLS qualify? Is successful certificate<br>
verification required?<br></blockquote><div><br></div><div>This states a ge=
neral requirement.=A0 The specific instances (e.g., in the mail and web spa=
ces) are given in subsequent sections.<br>=A0<br></div><blockquote class=3D=
"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(2=
04,204,204);padding-left:1ex">

<br>
Paragraph 3: &quot;Mail Receiver SHOULD send&quot; -- section 11.2.4 (parag=
raph 1)<br>
says that an attempt MUST be made.<br></blockquote><div><br></div><div>11.2=
.4 says SHOULD be generated, and if one is generated, it MUST be attempted =
across the full URI set.<br>=A0<br></div><blockquote class=3D"gmail_quote" =
style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);pa=
dding-left:1ex">

<br>
11.2.1 Email<br>
<br>
Paragraph 1: Is it equally acceptable to send via SMTP over SSL (port 465)?=
<br></blockquote><div><br></div><div>Are there implementations of this?<br>=
=A0<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px =
0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">

<br>
Filename extensions: Is the .gz format just a GZIPped XML file? =A0That<br>
isn&#39;t stated clearly, and if it is, why not make the extension .xml.gz?=
<br></blockquote><div><br></div><div>That&#39;s fixed in the unpublished ve=
rsion.<br>=A0<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0p=
x 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">

<br>
11.2.2 HTTP<br>
<br>
Paragraph 2: &quot;POST or PUT&quot; -- which method is used? Must reportin=
g URIs<br>
support both methods? Or is there a process for discovering which method<br=
>
is to be used?<br>
<br>
I&#39;m not an expert in HTTP, but I have the feeling that this transport<b=
r>
(and all transports except possibly mailto:) is underspecified. For<br>
example, what Content-Types MUST be supported? Are there any other HTTP<br>
headers that MUST be included?<br></blockquote><div><br></div><div>There&#3=
9;s a separate submission to fix this.<br>=A0<br></div><blockquote class=3D=
"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(2=
04,204,204);padding-left:1ex">

<br>
11.2.4 Error Reports<br>
<br>
Paragraph 1: Last sentence seems to say that mailto: URIs are preferred<br>
over other transports, which is the opposite of the last paragraph of<br>
section 9.<br></blockquote><div><br></div><div>For error reports, that&#39;=
s correct.<br>=A0<br></div><blockquote class=3D"gmail_quote" style=3D"margi=
n:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex=
">

<br>
Why is the error report in a text/plain format rather than a text/xml<br>
format like the feedback reports themselves?<br></blockquote><div><br></div=
><div>There&#39;s no encoded data in an error report.=A0 The point is to br=
ing operator attention to the fact that there&#39;s a problem.<br>=A0<br></=
div>
<blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-=
left:1px solid rgb(204,204,204);padding-left:1ex">
<br>
&quot;Note: A more rigorous syntax specification...will be added here&quot;=
 says<br>
this is still an experimental capability.<br></blockquote><div><br></div><d=
iv>Correct.<br>=A0<br></div><blockquote class=3D"gmail_quote" style=3D"marg=
in:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1e=
x">

<br>
12. Capacity Planning<br>
<br>
DNS: This understates the actual DNS load; there will be additional<br>
queries in connection with looking up and sending feedback and aggregate<br=
>
reports, additional queries associated with reporting addresses that are<br=
>
outside the current domain, and probably other things I haven&#39;t<br>
considered (like DNSSEC). A more thorough analysis is needed here.<br></blo=
ckquote><div><br></div><div>I&#39;ve added text about those cases, except D=
NSSEC which is an entire layer that is important to but ultimately not with=
in the DMARC layer.<br>
=A0<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px =
0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
<br>
13. Minimum Implementations<br>
<br>
Please provide separate minimum requirements for Domain Owners (or other<br=
>
publishers of DMARC records) and Mail Receivers. Bear in mind that<br>
Domain Owners, etc. may not themselves receive the reports.<br></blockquote=
><div><br></div><div>Added as a TBD item.<br></div><div>=A0<br></div><block=
quote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1=
px solid rgb(204,204,204);padding-left:1ex">

<br>
14. Privacy Considerations<br>
<br>
One privacy consideration I don&#39;t see listed anywhere is forwarding<br>
privacy: Basic email provides good protection against message senders<br>
finding out the actual delivery address of forwarded mail. The reporting<br=
>
capabilities of DMARC make it trivially easy for a Domain Owner to<br>
discover the delivery address of a message delivered to a<br>
DMARC-compliant Receiving Domain.<br></blockquote><div><br></div><div>Added=
.<br>=A0<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px=
 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
<br>
14.2 Report Recipients<br>
<br>
It might be noted that the privacy consideration is not that different<br>
from a domain with an MX record that is handled by someone outside the<br>
domain.<br></blockquote><div><br></div><div>Would that be a useful illustra=
tion outside of the prose that&#39;s already there?<br>=A0<br></div><blockq=
uote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1p=
x solid rgb(204,204,204);padding-left:1ex">

<br>
14.4 Secure Protocols<br>
<br>
Should there be a requirement that if the original message was sent with<br=
>
TLS, that feedback reports be sent securely?<br></blockquote><div><br></div=
><div>Mentioned it.<br>=A0<br></div><blockquote class=3D"gmail_quote" style=
=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding=
-left:1ex">

<br>
15.1 Use of RFC5322.From<br>
<br>
Last paragraph: &quot;This document prescribes no specific action, other<br=
>
than...&quot; =A0Section 10.1 does indeed prescribe a specific action that<=
br>
SHOULD be taken.<br></blockquote><div><br></div><div>Isn&#39;t that what th=
is paragraph is saying?<br> <br></div><blockquote class=3D"gmail_quote" sty=
le=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);paddi=
ng-left:1ex">

<br>
15.3 DNS Load and Caching<br>
<br>
It would be good to see a more thorough analysis of DNS effects -- both<br>
the number of queries that DMARC adds and the possible use of DMARC<br>
records (large records, at well-known locations in DNS) for DNS<br>
amplification attacks.<br></blockquote><div><br></div><div>OK.<br>=A0<br></=
div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;bor=
der-left:1px solid rgb(204,204,204);padding-left:1ex">
<br>
15.5 Identifier Alignment Considerations<br>
<br>
Paragraph 1: Don&#39;t the concerns about SPF apply apply to DKIM key<br>
records too?<br></blockquote><div><br></div><div>Yes; fixed.<br>=A0<br></di=
v><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;borde=
r-left:1px solid rgb(204,204,204);padding-left:1ex">
<br>
Paragraph 3: &quot;cede&quot; -&gt; &quot;delegate&quot; (administrator doe=
sn&#39;t actually lose<br>
control)<br></blockquote><div><br></div><div>Fixed.<br>=A0<br></div><blockq=
uote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1p=
x solid rgb(204,204,204);padding-left:1ex">
<br>
17. Security Considerations<br>
<br>
Check RFC 6376 Section 8.x for other attacks that might be documented<br>
here. In particular, attackers might publish intentionally malformed<br>
DMARC records in conjunction with domains they control and send mail<br>
from in an effort to make DMARC less useful or onerous in some way, in<br>
an effort to discourage its use.<br></blockquote><div><br></div><div>OK.<br=
>=A0<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px=
 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
<br>
<br>
17.2 DNS Security<br>
<br>
This should emphasize that both the publication of DNSSEC by Domain<br>
Owners and the use of DNSSEC-aware resolvers by Mail Receivers is<br>
needed. =A0See also RFC 6376 section 8.5.<br></blockquote><div><br></div><d=
iv>OK.<br>=A0<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0p=
x 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
<br>
Appendix A. Technology Considerations<br>
<br>
These provide good insight into some of the design choices made in the<br>
development of DMARC. Is the intent to include this in the<br>
standards-track document, or is this just information to aid the<br>
evaluation process?<br></blockquote><div><br></div><div>We weren&#39;t plan=
ning to remove them.<br>=A0<br></div><blockquote class=3D"gmail_quote" styl=
e=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);paddin=
g-left:1ex">

<br>
A.4 Domain Existence Test<br>
<br>
This section indicates that there was operational experience that the<br>
error rate was too high. Given that experience, I am surprised that<br>
section 8 says that the receiver SHOULD reject the message.<br></blockquote=
><div><br></div><div>That may be an oversight, i.e., we removed one but for=
got to remove the other.=A0 What does the community think about this?<br>
=A0<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px =
0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">=A0<br>
A.5 Issues With ADSP In Operation<br>
<br>
This section reads like somewhat of a debate with ADSP, or as though<br>
DMARC is competing with ADSP. DMARC and ADSP have different goals, and<br>
different constraints (e.g., SPF is explicitly out of scope of ADSP) so<br>
the list of issues doesn&#39;t really make sense.<br></blockquote><div><br>=
</div><div>Right; the goal here is to highlight that the use cases were dif=
ferent, as are the solution spaces.<br>=A0<br></div><blockquote class=3D"gm=
ail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,=
204,204);padding-left:1ex">

<br>
A.6 Organizational Domain Discovery Issues<br>
<br>
Paragraph 3: &quot;Climbing the tree&quot;, explored extensively in the<br>
development of ADSP, can of course be constrained to a specific limited<br>
number of queries. But ultimately even a one-level climb was considered<br>
too much and was rejected. Nevertheless, DMARC does look for policy in<br>
two places (the From domain and the Organizational Domain).<br></blockquote=
><div><br></div><div>Right, but not based directly on the DNS; I think that=
 was the objection with SSP/ADSP.<br>=A0<br></div><blockquote class=3D"gmai=
l_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,20=
4,204);padding-left:1ex">

<br>
The approach being used in DMARC was briefly considered in ADSP, but<br>
didn&#39;t even make it into a draft at the strong advice of the DNS<br>
Directorate that there is no way to reliably determine the delegation<br>
level in a domain name.<br></blockquote><div><br></div><div>Right; as I sai=
d above, we don&#39;t intend to keep this method as soon as something endor=
sed by the larger community is available.<br>=A0<br></div><blockquote class=
=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rg=
b(204,204,204);padding-left:1ex">

<br>
=3D=3D=3D=3D=3D<br>
<br>
General Comments<br>
<br>
There is no discussion of the effect of the effect of DMARC on some very<br=
>
common situations, such as mailing lists and forwarding (except a couple<br=
>
of hints at heuristics in the XML Schema). If the deployment of DMARC<br>
has an effect on the delivery of messages sent through mailing lists,<br>
that&#39;s a serious problem. I&#39;m not aware of a straightforward answer=
 to<br>
that problem, other than to maintain a whitelist of mailing lists that<br>
themselves authenticate their messages, which would normally not align<br>
with the From addresses at all. This has been cited as a serious problem<br=
>
with ADSP, so one would not want to repeat that problem here.<br>
<br></blockquote><div><br></div><div>RFC6377 tackled a lot of these points.=
=A0 It&#39;s been pointed out on the list that (a) DMARC has the same conce=
rns as ADSP with respect to lists as it&#39;s currently defined, and (b) th=
is is something the DMARC community would like to spend time and energy try=
ing to solve.<br>
<br>But you&#39;re right, the document doesn&#39;t say anything about this =
yet, and probably should.<br><br>-MSK <br></div></div></div></div></div>

--089e0102ef8471e21704ec9d0cbc--

From rocketraman@gmail.com  Tue Dec  3 09:50:22 2013
Return-Path: <rocketraman@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2839E1AE1A6 for <dmarc@ietfa.amsl.com>; Tue,  3 Dec 2013 09:50:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1
X-Spam-Level: 
X-Spam-Status: No, score=-1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, FREEMAIL_REPLY=1, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id echj_gZk5LZv for <dmarc@ietfa.amsl.com>; Tue,  3 Dec 2013 09:50:20 -0800 (PST)
Received: from mail-ie0-x231.google.com (mail-ie0-x231.google.com [IPv6:2607:f8b0:4001:c03::231]) by ietfa.amsl.com (Postfix) with ESMTP id 628F71AE1A2 for <dmarc@ietf.org>; Tue,  3 Dec 2013 09:50:20 -0800 (PST)
Received: by mail-ie0-f177.google.com with SMTP id tp5so24334263ieb.36 for <dmarc@ietf.org>; Tue, 03 Dec 2013 09:50:17 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=message-id:date:from:user-agent:mime-version:to:cc:subject :references:in-reply-to:content-type:content-transfer-encoding; bh=BfbSsXXh4XZgCNGKXJ9Hs20WaOHV585x00TUtQW1N10=; b=vlFrR7GyrfKms4XW/mZMinafNAOmW0FWIDfX9qTMzwgJAxOtZRF3lGx1fdmWS2j6bJ LTtQWVCLyRg06l1e3zDaxKC5Y8UMRSQ3gAetO8B93a/7I+oh4/SQxX9Jn4pg2VrPQ8tX R2YFg2AuR+BFq2kNtE45M5NZjiAmHbRr6kvLh+VE4L34ha0sultiVWn2N9XQpp1SBdt+ Z9D3rvh1Rl5ZIwVCfF/AuzvlOVx7CCWnVb5Zc5rggzS/PrTc9d3gDlokWQCIsrcwScm9 uGrfp1H4n8jWDH3gRMiO7Th0raKTFmXplzIwE3ahFvdQ4wZCruoAMIh0kvGNU3W8v2eK wJLQ==
X-Received: by 10.50.141.133 with SMTP id ro5mr3777311igb.35.1386093017652; Tue, 03 Dec 2013 09:50:17 -0800 (PST)
Received: from mail.rocketraman.com (CPEc86000c77d08-CM602ad06d1aa0.cpe.net.cable.rogers.com. [99.224.82.85]) by mx.google.com with ESMTPSA id j16sm4179932igf.6.2013.12.03.09.50.17 for <multiple recipients> (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 03 Dec 2013 09:50:17 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mail.rocketraman.com (Postfix) with ESMTP id 6EDAE1DE0285; Tue,  3 Dec 2013 12:50:16 -0500 (EST)
X-Virus-Scanned: amavisd-new at rocketraman.com
Received: from mail.rocketraman.com ([127.0.0.1]) by localhost (mail.rocketraman.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id djVnrQO2uDVm; Tue,  3 Dec 2013 12:50:13 -0500 (EST)
Received: from [192.168.1.6] (edison.rocketraman.com [192.168.1.6]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.rocketraman.com (Postfix) with ESMTPS; Tue,  3 Dec 2013 12:50:13 -0500 (EST)
Message-ID: <529E19D5.5020304@gmail.com>
Date: Tue, 03 Dec 2013 12:50:13 -0500
From: Raman Gupta <rocketraman@gmail.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Thunderbird/24.1.0
MIME-Version: 1.0
To: "dmarc@ietf.org" <dmarc@ietf.org>
References: <52251471.8070001@gmail.com> <CAL0qLwavNqnmgFLFYMgTnDGQxTXJvwS1L4zjccR=e2GvzQzuqA@mail.gmail.com> <61D26087-7352-481F-A710-A04CF4062F84@peachymango.org>
In-Reply-To: <61D26087-7352-481F-A710-A04CF4062F84@peachymango.org>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
Cc: "Murray S. Kucherawy" <superuser@gmail.com>, Franck Martin <franck@peachymango.org>
Subject: Re: [dmarc-ietf] Suggestion: handle null reverse path SPF alignment with RFC5322.From in different domain
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 03 Dec 2013 17:50:22 -0000

On 12/01/2013 04:36 PM, Franck Martin wrote:
> Murray,
> 
> Raman was talking when the return-path is empty like for bounces.

Right.

> DMARC follows SPF and uses for alignment whatever SPF used to give a
> result. So when there is a return path, this is the domain in the
> return-path (envelope from) otherwise when the return-path is empty
> this is the domain in the helo/ehlo.
>
> From the text below from Raman, which describes the way DMARC works
> accurately, I'm not sure what alternate behavior DMARC should have?

The alternate behavior could be: DMARC alignment rules for
RFC5322.From would apply when there is an RFC521.MailFrom address
available. Otherwise, DMARC falls back to the regular DKIM and/or SPF
identification rules.

See below.

> May be the issue is: "The host in bar.com <http://bar.com> is a valid
> SPF sender for domain foo.com". However I have no idea how you can
> infer this statement programatically. There is no DNS record today
> that allows you to infer it (?).

I may have stated the initial situation slightly incorrectly. I should
have said: the evaluation of the SPF record linked to the HELO/EHLO
FQDN was valid. See, for example:

http://www.openspf.org/FAQ/Common_mistakes#helo

In this case, the SPF evaluation based on the HELO/EHLO identification
and linked record is that the email is valid, but the extra DMARC
alignment rules cause a DMARC failure, since the HELO/EHLO domain does
not match the RFC5322.From domain.

If there was no DMARC RFC5322.From alignment rule against the SPF
HELO/EHLO identification in this case, is there a new abuse vector?

Regards,
Raman

> On Nov 30, 2013, at 10:39 PM, Murray S. Kucherawy <superuser@gmail.com
> <mailto:superuser@gmail.com>> wrote:
> 
>> Any other input on this point?  DMARC currently only considers the
>> SPF result if there is alignment between the return path and the
>> From field.
>>
>>
>> On Mon, Sep 2, 2013 at 3:42 PM, Raman Gupta <rocketraman@gmail.com
>> <mailto:rocketraman@gmail.com>> wrote:
>>
>> I encountered a use case recently with an auto-generated email
>> with RFC5322.From domain foo.com <http://foo.com/>, sent from a
>> host in domain bar.com <http://bar.com/>. Because the email was
>> auto-generated by sieve, it contained a null return path. The
>> host in bar.com <http://bar.com/> is a valid SPF sender for
>> domain foo.com <http://foo.com/>.
>> 
>> DMARC failed the SPF check despite the valid SPF, since the 
>> RFC5322.From address was not aligned with the domain bar.com 
>> <http://bar.com/> extracted from the HELO/EHLO.
>> 
>> A valid way to circumvent this problem is to use DKIM signing, 
>> aligned with foo.com <http://foo.com/>, in which case DMARC is
>> designed to ignore the SPF failure and pass overall.
>> 
>> However, I do think this is a valid situation which the SPF 
>> alignment rules should consider.
>> 
>> I hope I have explained this sufficiently. Thank you to Steven
>> Jones and Scott Kitterman and others on the dmarc-discuss list
>> for clarifying the situation presented here.
>>
>> Regards,
>> Raman Gupta
>> Principal
>> VIVO Systems
>> _______________________________________________
>> dmarc mailing list
>> dmarc@ietf.org <mailto:dmarc@ietf.org>
>> https://www.ietf.org/mailman/listinfo/dmarc

From franck@peachymango.org  Tue Dec  3 10:20:46 2013
Return-Path: <franck@peachymango.org>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CCD621AD791 for <dmarc@ietfa.amsl.com>; Tue,  3 Dec 2013 10:20:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.902
X-Spam-Level: 
X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4izP1OETBYrR for <dmarc@ietfa.amsl.com>; Tue,  3 Dec 2013 10:20:44 -0800 (PST)
Received: from smtp.01.com (smtp.01.com [199.36.142.181]) by ietfa.amsl.com (Postfix) with ESMTP id 44AAC1AD34C for <dmarc@ietf.org>; Tue,  3 Dec 2013 10:20:44 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by smtp-out-1.01.com (Postfix) with ESMTP id 3B5663F43FC; Tue,  3 Dec 2013 12:20:41 -0600 (CST)
X-Virus-Scanned: amavisd-new at smtp-out-1.01.com
Received: from smtp.01.com ([127.0.0.1]) by localhost (smtp-out-1.01.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id H08zY3dtLdAn; Tue,  3 Dec 2013 12:20:41 -0600 (CST)
Received: from smtp.01.com (localhost [127.0.0.1]) by smtp-out-1.01.com (Postfix) with ESMTP id 17FFB3F43A9; Tue,  3 Dec 2013 12:20:41 -0600 (CST)
Received: from localhost (localhost [127.0.0.1]) by smtp-out-1.01.com (Postfix) with ESMTP id 07F9D3F438F; Tue,  3 Dec 2013 12:20:41 -0600 (CST)
X-Virus-Scanned: amavisd-new at smtp-out-1.01.com
Received: from smtp.01.com ([127.0.0.1]) by localhost (smtp-out-1.01.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id PFdIRFLWDKqf; Tue,  3 Dec 2013 12:20:40 -0600 (CST)
Received: from mail-2.01.com (mail.01.com [172.18.30.178]) by smtp-out-1.01.com (Postfix) with ESMTP id DE62B3F4310; Tue,  3 Dec 2013 12:20:40 -0600 (CST)
Date: Tue, 3 Dec 2013 12:20:40 -0600 (CST)
From: Franck Martin <franck@peachymango.org>
To: Raman Gupta <rocketraman@gmail.com>
Message-ID: <566070910.92478.1386094840230.JavaMail.zimbra@peachymango.org>
In-Reply-To: <WM!b8f38dd8d8359692e25133634298cd8ac885b5aedabd2b6dc80ce10f50c324828a38d0d19887cac2cb3f73dbad4efada!@asav-1.01.com>
References: <52251471.8070001@gmail.com> <CAL0qLwavNqnmgFLFYMgTnDGQxTXJvwS1L4zjccR=e2GvzQzuqA@mail.gmail.com> <61D26087-7352-481F-A710-A04CF4062F84@peachymango.org> <529E19D5.5020304@gmail.com> <WM!b8f38dd8d8359692e25133634298cd8ac885b5aedabd2b6dc80ce10f50c324828a38d0d19887cac2cb3f73dbad4efada!@asav-1.01.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 7bit
X-Originating-IP: [69.28.149.129]
X-Mailer: Zimbra 8.0.5_GA_5839 (ZimbraWebClient - FF25 (Mac)/8.0.5_GA_5839)
Thread-Topic: Suggestion: handle null reverse path SPF alignment with RFC5322.From in different domain
Thread-Index: VlGEltez82HwQsnUhgcx7foLZX3O+Q==
Cc: dmarc@ietf.org, "Murray S. Kucherawy" <superuser@gmail.com>
Subject: Re: [dmarc-ietf] Suggestion: handle null reverse path SPF alignment with RFC5322.From in different domain
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 03 Dec 2013 18:20:47 -0000

----- Original Message -----
> From: "Raman Gupta" <rocketraman@gmail.com>
> To: dmarc@ietf.org
> Cc: "Franck Martin" <franck@peachymango.org>, "Murray S. Kucherawy" <superuser@gmail.com>
> Sent: Tuesday, December 3, 2013 9:50:13 AM
> Subject: Re: [dmarc-ietf] Suggestion: handle null reverse path SPF alignment with RFC5322.From in different domain
> 
> On 12/01/2013 04:36 PM, Franck Martin wrote:
> > Murray,
> > 
> > Raman was talking when the return-path is empty like for bounces.
> 
> Right.
> 
> > DMARC follows SPF and uses for alignment whatever SPF used to give a
> > result. So when there is a return path, this is the domain in the
> > return-path (envelope from) otherwise when the return-path is empty
> > this is the domain in the helo/ehlo.
> >
> > From the text below from Raman, which describes the way DMARC works
> > accurately, I'm not sure what alternate behavior DMARC should have?
> 
> The alternate behavior could be: DMARC alignment rules for
> RFC5322.From would apply when there is an RFC521.MailFrom address
> available. Otherwise, DMARC falls back to the regular DKIM and/or SPF
> identification rules.
> 
> See below.
> 
> > May be the issue is: "The host in bar.com <http://bar.com> is a valid
> > SPF sender for domain foo.com". However I have no idea how you can
> > infer this statement programatically. There is no DNS record today
> > that allows you to infer it (?).
> 
> I may have stated the initial situation slightly incorrectly. I should
> have said: the evaluation of the SPF record linked to the HELO/EHLO
> FQDN was valid. See, for example:
> 
> http://www.openspf.org/FAQ/Common_mistakes#helo
> 
> In this case, the SPF evaluation based on the HELO/EHLO identification
> and linked record is that the email is valid, but the extra DMARC
> alignment rules cause a DMARC failure, since the HELO/EHLO domain does
> not match the RFC5322.From domain.
> 
> If there was no DMARC RFC5322.From alignment rule against the SPF
> HELO/EHLO identification in this case, is there a new abuse vector?
> 

Yes. I see plenty fake bounces with attack payload in them.

From rocketraman@gmail.com  Tue Dec  3 10:27:53 2013
Return-Path: <rocketraman@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6B7DE1AE17E for <dmarc@ietfa.amsl.com>; Tue,  3 Dec 2013 10:27:53 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level: 
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rvnn9CM9-kKD for <dmarc@ietfa.amsl.com>; Tue,  3 Dec 2013 10:27:52 -0800 (PST)
Received: from mail-ie0-x231.google.com (mail-ie0-x231.google.com [IPv6:2607:f8b0:4001:c03::231]) by ietfa.amsl.com (Postfix) with ESMTP id 79F011AE179 for <dmarc@ietf.org>; Tue,  3 Dec 2013 10:27:52 -0800 (PST)
Received: by mail-ie0-f177.google.com with SMTP id tp5so24432613ieb.36 for <dmarc@ietf.org>; Tue, 03 Dec 2013 10:27:49 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=message-id:date:from:user-agent:mime-version:to:cc:subject :references:in-reply-to:content-type:content-transfer-encoding; bh=QtjE6uLmISV+00neaztygCb75yjq5UfxqDKrMT5Z3ks=; b=Tn0KHFZFzS7FReFB/pGFAtpOylZKifxQWcPwGLfAOVXUwLq++F1YARQ0hu/W4NfpEy og6ctwB2n2BK8si6UYzGsXXM0FpNGpSKbvdeUjjKZNj+Txy7EFT4PBOSlEqq8ZAvSBsb wrYvg/6RMMFUtO8SYpozzh9sgx7kk32P121jT5eO+Zodorr4XW+cnrWJK3oZ+8nfU9xf mE/SERQFd8rGKdgLqaGAUIl4VJ2vXlqrH220Mc+uRAqHI3B/qic6QxfztbJlFX8A27Et dBqVxJ8r/zi9rCK2CJmRILraWUMgRWDm0cgYzpKGnYywQvvYnj71DqrhuHa/fe656RER InsQ==
X-Received: by 10.42.82.196 with SMTP id e4mr2682250icl.58.1386095269807; Tue, 03 Dec 2013 10:27:49 -0800 (PST)
Received: from mail.rocketraman.com (CPEc86000c77d08-CM602ad06d1aa0.cpe.net.cable.rogers.com. [99.224.82.85]) by mx.google.com with ESMTPSA id k6sm4350607igx.8.2013.12.03.10.27.49 for <multiple recipients> (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 03 Dec 2013 10:27:49 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mail.rocketraman.com (Postfix) with ESMTP id 9E0F71DE02C4; Tue,  3 Dec 2013 13:27:48 -0500 (EST)
X-Virus-Scanned: amavisd-new at rocketraman.com
Received: from mail.rocketraman.com ([127.0.0.1]) by localhost (mail.rocketraman.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EleH4Gu-AhvO; Tue,  3 Dec 2013 13:27:46 -0500 (EST)
Received: from [192.168.1.6] (edison.rocketraman.com [192.168.1.6]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.rocketraman.com (Postfix) with ESMTPS; Tue,  3 Dec 2013 13:27:46 -0500 (EST)
Message-ID: <529E22A2.8050804@gmail.com>
Date: Tue, 03 Dec 2013 13:27:46 -0500
From: Raman Gupta <rocketraman@gmail.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Thunderbird/24.1.0
MIME-Version: 1.0
To: Franck Martin <franck@peachymango.org>
References: <52251471.8070001@gmail.com> <CAL0qLwavNqnmgFLFYMgTnDGQxTXJvwS1L4zjccR=e2GvzQzuqA@mail.gmail.com> <61D26087-7352-481F-A710-A04CF4062F84@peachymango.org> <529E19D5.5020304@gmail.com> <WM!b8f38dd8d8359692e25133634298cd8ac885b5aedabd2b6dc80ce10f50c324828a38d0d19887cac2cb3f73dbad4efada!@asav-1.01.com> <566070910.92478.1386094840230.JavaMail.zimbra@peachymango.org>
In-Reply-To: <566070910.92478.1386094840230.JavaMail.zimbra@peachymango.org>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
Cc: dmarc@ietf.org, "Murray S. Kucherawy" <superuser@gmail.com>
Subject: Re: [dmarc-ietf] Suggestion: handle null reverse path SPF alignment with RFC5322.From in different domain
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 03 Dec 2013 18:27:53 -0000

On 12/03/2013 01:20 PM, Franck Martin wrote:
>> If there was no DMARC RFC5322.From alignment rule against the SPF
>> HELO/EHLO identification in this case, is there a new abuse vector?
>>
> 
> Yes. I see plenty fake bounces with attack payload in them.

And the fake bounces have a valid SPF?

Regards,
Raman

From franck@peachymango.org  Tue Dec  3 15:51:23 2013
Return-Path: <franck@peachymango.org>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 38E991AE1D5 for <dmarc@ietfa.amsl.com>; Tue,  3 Dec 2013 15:51:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.902
X-Spam-Level: 
X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pRhOEGobucEk for <dmarc@ietfa.amsl.com>; Tue,  3 Dec 2013 15:51:21 -0800 (PST)
Received: from smtp.01.com (smtp.01.com [199.36.142.181]) by ietfa.amsl.com (Postfix) with ESMTP id 11C7E1ADFA9 for <dmarc@ietf.org>; Tue,  3 Dec 2013 15:51:20 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by smtp-out-2.01.com (Postfix) with ESMTP id EC5B64F443B; Tue,  3 Dec 2013 17:51:17 -0600 (CST)
X-Virus-Scanned: amavisd-new at smtp-out-2.01.com
Received: from smtp.01.com ([127.0.0.1]) by localhost (smtp-out-2.01.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PD3LLvUtyDWx; Tue,  3 Dec 2013 17:51:17 -0600 (CST)
Received: from smtp.01.com (localhost [127.0.0.1]) by smtp-out-2.01.com (Postfix) with ESMTP id CAF6F4F4448; Tue,  3 Dec 2013 17:51:17 -0600 (CST)
Received: from localhost (localhost [127.0.0.1]) by smtp-out-2.01.com (Postfix) with ESMTP id B464C4F4442; Tue,  3 Dec 2013 17:51:17 -0600 (CST)
X-Virus-Scanned: amavisd-new at smtp-out-2.01.com
Received: from smtp.01.com ([127.0.0.1]) by localhost (smtp-out-2.01.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id xQmHAQeomF2U; Tue,  3 Dec 2013 17:51:17 -0600 (CST)
Received: from mail-2.01.com (mail.01.com [172.18.30.178]) by smtp-out-2.01.com (Postfix) with ESMTP id 8C12C4F443B; Tue,  3 Dec 2013 17:51:17 -0600 (CST)
Date: Tue, 3 Dec 2013 17:51:16 -0600 (CST)
From: Franck Martin <franck@peachymango.org>
To: Raman Gupta <rocketraman@gmail.com>
Message-ID: <1048972620.112399.1386114676857.JavaMail.zimbra@peachymango.org>
In-Reply-To: <WM!21e13261dc0062d78deeab7824846014c0f865fb21ef9782913f8c001d689a80c3b92685bfbd675c82da39e86cef850e!@asav-1.01.com>
References: <52251471.8070001@gmail.com> <CAL0qLwavNqnmgFLFYMgTnDGQxTXJvwS1L4zjccR=e2GvzQzuqA@mail.gmail.com> <61D26087-7352-481F-A710-A04CF4062F84@peachymango.org> <529E19D5.5020304@gmail.com> <WM!b8f38dd8d8359692e25133634298cd8ac885b5aedabd2b6dc80ce10f50c324828a38d0d19887cac2cb3f73dbad4efada!@asav-1.01.com> <566070910.92478.1386094840230.JavaMail.zimbra@peachymango.org> <529E22A2.8050804@gmail.com> <WM!21e13261dc0062d78deeab7824846014c0f865fb21ef9782913f8c001d689a80c3b92685bfbd675c82da39e86cef850e!@asav-1.01.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 7bit
X-Originating-IP: [69.28.149.129]
X-Mailer: Zimbra 8.0.5_GA_5839 (ZimbraWebClient - FF25 (Mac)/8.0.5_GA_5839)
Thread-Topic: Suggestion: handle null reverse path SPF alignment with RFC5322.From in different domain
Thread-Index: 39L/cK4jNDP2Xdk2gmlZ7An2mrtoOw==
Cc: dmarc@ietf.org, "Murray S. Kucherawy" <superuser@gmail.com>
Subject: Re: [dmarc-ietf] Suggestion: handle null reverse path SPF alignment with RFC5322.From in different domain
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 03 Dec 2013 23:51:23 -0000

----- Original Message -----
> From: "Raman Gupta" <rocketraman@gmail.com>
> To: "Franck Martin" <franck@peachymango.org>
> Cc: dmarc@ietf.org, "Murray S. Kucherawy" <superuser@gmail.com>
> Sent: Tuesday, December 3, 2013 10:27:46 AM
> Subject: Re: [dmarc-ietf] Suggestion: handle null reverse path SPF alignment with RFC5322.From in different domain
> 
> On 12/03/2013 01:20 PM, Franck Martin wrote:
> >> If there was no DMARC RFC5322.From alignment rule against the SPF
> >> HELO/EHLO identification in this case, is there a new abuse vector?
> >>
> > 
> > Yes. I see plenty fake bounces with attack payload in them.
> 
> And the fake bounces have a valid SPF?
> 
Considering that many people forgets to put a SPF record on the hostname pointed by the helo, no, but this would not stop spammers to adopt SPF if that gives them an edge.

From superuser@gmail.com  Fri Dec  6 12:08:59 2013
Return-Path: <superuser@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0E9BA1AE06F for <dmarc@ietfa.amsl.com>; Fri,  6 Dec 2013 12:08:59 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hZuK4XDsljFn for <dmarc@ietfa.amsl.com>; Fri,  6 Dec 2013 12:08:56 -0800 (PST)
Received: from mail-wg0-x22e.google.com (mail-wg0-x22e.google.com [IPv6:2a00:1450:400c:c00::22e]) by ietfa.amsl.com (Postfix) with ESMTP id E54CD1AE05B for <dmarc@ietf.org>; Fri,  6 Dec 2013 12:08:55 -0800 (PST)
Received: by mail-wg0-f46.google.com with SMTP id m15so1138244wgh.25 for <dmarc@ietf.org>; Fri, 06 Dec 2013 12:08:51 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-type; bh=rT6jonBnUYr2TvQKRUEzvqE7D4nMBKrleMKj8E0M9uw=; b=dBThUIyvS0qTnBzvipohFhYef5byxvhnt/R8li6wQwpbBnbyNNfYJU0DkNW3XDuJ++ yOFHZuiS7juU35eV3e+hpnqLhqVead+a6Tgb+HkG2Vfe3Pjug3/Rcov4ZuIfSloAiocy 12WZK4Uf35lQM+0LsP0rcTVX8McU+69ni9sPRf9aykdtWJ0HXmX3ILmpTOiOV10GT66i wUGAyg0IYcEWmR65S7mkGmyIwQwrrqEfYDrqy8ZoNr3JP5J0zbXaN6CrQD+CJc4N17JS wuDbV3zdb4nFvENchleXVxMwnGGAWFlwK7bVKBsZaWAgKJ32Ca6vbWXT/pnA+vYEywTs kvBg==
MIME-Version: 1.0
X-Received: by 10.194.21.225 with SMTP id y1mr4897714wje.60.1386360531651; Fri, 06 Dec 2013 12:08:51 -0800 (PST)
Received: by 10.181.13.230 with HTTP; Fri, 6 Dec 2013 12:08:51 -0800 (PST)
In-Reply-To: <20131206195151.11363.70071.idtracker@ietfa.amsl.com>
References: <20131206195151.11363.70071.idtracker@ietfa.amsl.com>
Date: Fri, 6 Dec 2013 12:08:51 -0800
Message-ID: <CAL0qLwa8mZtixFY2P6mi7t9zS58vfYM+EYS8EVy_kvOWW1BV3w@mail.gmail.com>
From: "Murray S. Kucherawy" <superuser@gmail.com>
To: "dmarc@ietf.org" <dmarc@ietf.org>
Content-Type: multipart/alternative; boundary=047d7b5d98ab0513ed04ece33770
Subject: Re: [dmarc-ietf] New Version Notification for draft-kucherawy-dmarc-base-02.txt
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 06 Dec 2013 20:08:59 -0000

--047d7b5d98ab0513ed04ece33770
Content-Type: text/plain; charset=ISO-8859-1

On Fri, Dec 6, 2013 at 11:51 AM, <internet-drafts@ietf.org> wrote:

>
> A new version of I-D, draft-kucherawy-dmarc-base-02.txt
> has been successfully submitted by Murray S. Kucherawy and posted to the
> IETF repository.
>
> Filename:        draft-kucherawy-dmarc-base
> Revision:        02
> Title:           Domain-based Message Authentication, Reporting and
> Conformance (DMARC)
> Creation date:   2013-12-06
> Group:           Individual Submission
> Number of pages: 78
> URL:
> http://www.ietf.org/internet-drafts/draft-kucherawy-dmarc-base-02.txt
> Status:
> http://datatracker.ietf.org/doc/draft-kucherawy-dmarc-base
> Htmlized:        http://tools.ietf.org/html/draft-kucherawy-dmarc-base-02
> Diff:
> http://www.ietf.org/rfcdiff?url2=draft-kucherawy-dmarc-base-02
>
> Abstract:
>    This memo presents a proposal for a scalable mechanism by which a
>    mail sending organization can express, using the Domain Name System,
>    domain-level policies and preferences for message validation,
>    disposition, and reporting, and a mail receiving organization can use
>    those policies and preferences to improve mail handling.
>
>    The email ecosystem currently lacks a cohesive mechanism through
>    which email senders and receivers can make use of multiple
>    authentication protocols to establish reliable domain identifiers,
>    communicate policies about those identifiers, and report about mail
>    using those identifiers.  This lack of cohesion has several effects:
>    receivers have difficulty providing feedback to senders about
>    authentication, senders therefore have difficulty evaluating their
>    authentication deployments, and as a result neither is able to make
>    effective use of existing authentication technology
>
>    The enclosed proposal is not intended to introduce mechanisms that
>    provide elevated delivery privilege of authenticated email.  The
>    proposal presents a mechanism for policy distribution that enables a
>    continuum of increasingly strict handling of messages that fail
>    multiple authentication checks, from no action, through altered
>    delivery, up to message rejection.
>

This version addresses most of the feedback that's been posted to date.  It
doesn't include unresolved things that are still being discussed on the
list.

The diff link is probably going to be useful to most people given the size
of the document.

Have at it!

-MSK

--047d7b5d98ab0513ed04ece33770
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">On Fri, Dec 6, 2013 at 11:51 AM,  <span dir=3D"ltr">&lt;<a=
 href=3D"mailto:internet-drafts@ietf.org" target=3D"_blank">internet-drafts=
@ietf.org</a>&gt;</span> wrote:<br><div class=3D"gmail_extra"><div class=3D=
"gmail_quote">
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex"><br>
A new version of I-D, draft-kucherawy-dmarc-base-02.txt<br>
has been successfully submitted by Murray S. Kucherawy and posted to the<br=
>
IETF repository.<br>
<br>
Filename: =A0 =A0 =A0 =A0draft-kucherawy-dmarc-base<br>
Revision: =A0 =A0 =A0 =A002<br>
Title: =A0 =A0 =A0 =A0 =A0 Domain-based Message Authentication, Reporting a=
nd Conformance (DMARC)<br>
Creation date: =A0 2013-12-06<br>
Group: =A0 =A0 =A0 =A0 =A0 Individual Submission<br>
Number of pages: 78<br>
URL: =A0 =A0 =A0 =A0 =A0 =A0 <a href=3D"http://www.ietf.org/internet-drafts=
/draft-kucherawy-dmarc-base-02.txt" target=3D"_blank">http://www.ietf.org/i=
nternet-drafts/draft-kucherawy-dmarc-base-02.txt</a><br>
Status: =A0 =A0 =A0 =A0 =A0<a href=3D"http://datatracker.ietf.org/doc/draft=
-kucherawy-dmarc-base" target=3D"_blank">http://datatracker.ietf.org/doc/dr=
aft-kucherawy-dmarc-base</a><br>
Htmlized: =A0 =A0 =A0 =A0<a href=3D"http://tools.ietf.org/html/draft-kucher=
awy-dmarc-base-02" target=3D"_blank">http://tools.ietf.org/html/draft-kuche=
rawy-dmarc-base-02</a><br>
Diff: =A0 =A0 =A0 =A0 =A0 =A0<a href=3D"http://www.ietf.org/rfcdiff?url2=3D=
draft-kucherawy-dmarc-base-02" target=3D"_blank">http://www.ietf.org/rfcdif=
f?url2=3Ddraft-kucherawy-dmarc-base-02</a><br>
<br>
Abstract:<br>
=A0 =A0This memo presents a proposal for a scalable mechanism by which a<br=
>
=A0 =A0mail sending organization can express, using the Domain Name System,=
<br>
=A0 =A0domain-level policies and preferences for message validation,<br>
=A0 =A0disposition, and reporting, and a mail receiving organization can us=
e<br>
=A0 =A0those policies and preferences to improve mail handling.<br>
<br>
=A0 =A0The email ecosystem currently lacks a cohesive mechanism through<br>
=A0 =A0which email senders and receivers can make use of multiple<br>
=A0 =A0authentication protocols to establish reliable domain identifiers,<b=
r>
=A0 =A0communicate policies about those identifiers, and report about mail<=
br>
=A0 =A0using those identifiers. =A0This lack of cohesion has several effect=
s:<br>
=A0 =A0receivers have difficulty providing feedback to senders about<br>
=A0 =A0authentication, senders therefore have difficulty evaluating their<b=
r>
=A0 =A0authentication deployments, and as a result neither is able to make<=
br>
=A0 =A0effective use of existing authentication technology<br>
<br>
=A0 =A0The enclosed proposal is not intended to introduce mechanisms that<b=
r>
=A0 =A0provide elevated delivery privilege of authenticated email. =A0The<b=
r>
=A0 =A0proposal presents a mechanism for policy distribution that enables a=
<br>
=A0 =A0continuum of increasingly strict handling of messages that fail<br>
=A0 =A0multiple authentication checks, from no action, through altered<br>
=A0 =A0delivery, up to message rejection.<br></blockquote><div><br></div><d=
iv>This version addresses most of the feedback that&#39;s been posted to da=
te.=A0 It doesn&#39;t include unresolved things that are still being discus=
sed on the list.<br>
<br></div><div>The diff link is probably going to be useful to most people =
given the size of the document.<br><br></div><div>Have at it!<br><br></div>=
<div>-MSK <br></div></div></div></div>

--047d7b5d98ab0513ed04ece33770--

From fenton@bluepopcorn.net  Fri Dec  6 15:22:51 2013
Return-Path: <fenton@bluepopcorn.net>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3841C1ADF93 for <dmarc@ietfa.amsl.com>; Fri,  6 Dec 2013 15:22:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.102
X-Spam-Level: 
X-Spam-Status: No, score=-0.102 tagged_above=-999 required=5 tests=[BAYES_40=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oNpjx8xKo7fw for <dmarc@ietfa.amsl.com>; Fri,  6 Dec 2013 15:22:40 -0800 (PST)
Received: from v2.bluepopcorn.net (v2.bluepopcorn.net [IPv6:2607:f2f8:a994::2]) by ietfa.amsl.com (Postfix) with ESMTP id 842581ADF63 for <dmarc@ietf.org>; Fri,  6 Dec 2013 15:22:40 -0800 (PST)
Received: from splunge.local ([12.250.97.26]) (authenticated bits=0) by v2.bluepopcorn.net (8.14.3/8.14.3/Debian-9.4) with ESMTP id rB6NLd6O029891 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 6 Dec 2013 15:21:44 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=bluepopcorn.net; s=supersize; t=1386372105; bh=vlfsPXsxYXAiDKhvMwjf4ndzcde0sFU+ZojN0YWMyKs=; h=Message-ID:Date:From:MIME-Version:To:CC:Subject:References: In-Reply-To:Content-Type; b=kjIkT5cn21izTfbh8XBxej7yNXMLDBCRs5Q97RE5ehatdvADLmGqRDWjiHAF1zdJX NGOX6lZaeF0xhD1TQuOvCOC77R7vQa7J4gno6Rr8isRPRvdXceLE7zjSQ00InYtSIg puwKNVb5XwHJIVOGKaLFuPo0cdMfjNt5NP+MUbt0=
Message-ID: <52A25C31.4070407@bluepopcorn.net>
Date: Fri, 06 Dec 2013 15:22:25 -0800
From: Jim Fenton <fenton@bluepopcorn.net>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:24.0) Gecko/20100101 Thunderbird/24.1.1
MIME-Version: 1.0
To: "Murray S. Kucherawy" <superuser@gmail.com>
References: <524CA422.8030008@bluepopcorn.net> <CAL0qLwZDhVM0edfzJe_wrKPSjC6c9bvabbO-Bp7+LVowHtg0=w@mail.gmail.com>
In-Reply-To: <CAL0qLwZDhVM0edfzJe_wrKPSjC6c9bvabbO-Bp7+LVowHtg0=w@mail.gmail.com>
X-Enigmail-Version: 1.6
Content-Type: multipart/alternative; boundary="------------030009040808050707070307"
Cc: "dmarc@ietf.org" <dmarc@ietf.org>
Subject: Re: [dmarc-ietf] External review of draft-kucherawy-dmarc-base-01
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 06 Dec 2013 23:22:51 -0000

This is a multi-part message in MIME format.
--------------030009040808050707070307
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

A few reply responses inline.

On 12/3/13 12:26 AM, Murray S. Kucherawy wrote:
>
>
> Happy to have your editorial comments off-list if you like.

I just need to find my marked-up copy of the spec, which is around here
somewhere...
>  
>
>
>     ===
>
>     1. Introduction
>
>     Paragraph 3:  I'm surprised to see the use of the word "policy".
>     In the
>     context of ADSP (originally Sender Signing Policy), the word "policy"
>     was considered inaccurate because it was deemed inappropriate to
>     dictate
>     policy to a Receiving Domain. Even though SSP was describing the
>     domain's policy with respect to signing messages with DKIM, the word
>     "practices" was substituted. Is it now considered acceptable to make
>     policy requests of a Receiving Domain?
>
>
> I don't think this has come up during the development of DMARC.  In
> contrast, I think the use of "policy" in the SPF context has become
> widely understood to indicate it's a request from the author domain. 
> I do think it's pretty clear from the document that there are no
> illusions that something's being demanded of the receiver.
>
> In the case of SSP and ADSP, I think we were trying to describe the
> signing practices of the author domain, so the receiver could make an
> intelligent judgement about accepting or rejecting the message.  In
> DMARC, the practices are implied by the nature of the protocol except
> for what alignment of identifiers a receiver should expect.

I don't see the distinction between what SSP/ADSP and DMARC are trying
to do that might make one "practices" and the other "policy". If our
language has evolved, that's all right; I'm just pointing out the
earlier discussion, which happened at IETF 65:
http://tools.ietf.org/wg/dkim/minutes?item=minutes65.html
>
>
>     Paragraph 3 #2-1: "The receiver" might be interpreted as being an MUA.
>     Suggest "Receiving domains". "how the mail is handled" -> "how they
>     should handle the mail"
>
>
> The outer bullet refers to SMTP Receivers, which I don't believe
> includes MUAs.

OK, missed the context set by the outer bullet.
>
>     Authentication of individuals rather than domains: DMARC doesn't
>     perform
>     authentication at all, it acts on the result of two other mechanisms.
>     This muddies that point.
>
>
> I'm not sure it's important to dive into this; we're saying this is a
> topic we don't want to handle either way.

But when you say "rather than domains", it gives the impression that
DMARC authenticates at the domain level, which it doesn't do.

>
>
>     Domain Owner: This definition clearly defines the Domain Owner as the
>     registrant of a domain. But as we will see much later, DMARC
>     records are
>     sometimes published by From domains directly, which could be a
>     person or
>     organization delegated by the Domain Owner. Perhaps another term is
>     needed, because there are some things that are available only to
>     Domain
>     Owners and others that are also available to those able to publish
>     a DNS
>     record for a subdomain.
>
>
> The definition does include more complex arrangements than merely the
> registering entity.

I'm still not getting how the more complex arrangements are covered.
Perhaps it's from the definition of ADMD (which I haven't read
recently).  If so, you might want to say that more directly; calling it
"analogous" is a little vague.
>  
>
>     (2) This creates a dependency on a public suffix list such as that
>     published by Mozilla, but doesn't require the use of a particular
>     list.
>     This would create an inconsistency in the result of DMARC that I
>     consider to be an interoperability problem.
>
>
> Yes.  We acknowledge that public suffix is far from an ideal solution,
> but until some of the ideas being discussed in APPSAWG and elsewhere
> become a reality, it's the only operational option.  Your point is
> taken, though, that lots of sources for this information is a
> problem.  I'll add a note about it.

I'm still worried about this.
>
>     [aside: I see, much later in the spec, that DMARC records can be
>     published by the From domain directly, not just from the Domain
>     Owner. A
>     lot of earlier text needs to be cleaned up to accommodate that.]
>
>
> Are those not the same?  Or are you talking about the subdomain case?

The subdomain case, yes.

>     5. DMARC Policy Record
>
>     Paragraph 2: "matches perfectly with the DNS".  Not at all -- the fact
>     that it isn't possible to deterministically determine the
>     organizational
>     domain, is an example of the mismatch.  Also, operational limits
>     on DNS
>     record sizes prompts the use of non obvious syntax like the !<size>
>     construct.
>
>
> I think we're talking here about why we store the record in the DNS,
> like SPF and DKIM and various others have done.  We're not saying here
> that we espouse ways of determining things like the zone cut from DNS
> data.

I just think the statement "matches perfectly" is overdone.  If DNS had
slightly different capabilities DMARC would be easier, so I'd tone down
that statement.
>  
>
>     fo: The tag value can contain both 0 and 1; what happens then?
>
>
> The union of the two means "0" is a no-op in that case.

They conflict, so you should either prohibit that case (my preference)
or define the behavior.
>  
>
>
>     p: quarantine: What does "fails the DMARC mechanism" mean overall? Is
>     this defined somewhere?  "suspicious": After all the controversy about
>     the use of the use of the word suspicious in SSP/ADSP, I'm highly
>     amused
>     to see it here.
>
>
> I've added "failed" earlier in the document to indicate that DMARC
> produces a result, so hopefully that's clarified here.
>
> SSP/ADSP tried to define Suspicious as a result, as I recall, or at
> least explain what it meant.  We say clearly here that we have no idea
> by what criteria a receiver will normally categorize something as
> suspicious (or whatever word it uses), but the intent here is to give
> the receiver information in that direction.

Like I said, I was mostly amused to find the word "suspicious". Perhaps
people are more comfortable with it now than when we tried to use it for
SSP/ADSP.
>  
>
>     Initial default values are -> Possible values are (and possibly
>     reference a registry)
>
>
> We didn't make a registry for this because there's really only one in
> use in this space, and no new ones are anticipated.

Two: iodef and afrf, right?
>  
>
>
>     sp: Does this apply to subdomains at all levels, or just direct
>     subdomains? What's the motivation for specifying a different
>     policy for
>     subdomains vs. the organizational domain?  Should also point out
>     that sp
>     is meaningful only for DMARC records published in Organizational
>     Domains
>     and not From domains, (although  publishing in From domains isn't
>     introduced until later in the document).
>
>
> It applies to all subdomains.  I'll make it say so.
>
> The motivation here is the same as it was for ADSP; if I protect
> bluepopcorn.net <http://bluepopcorn.net> only, the spoofers could send
> mail with believable subdomains of that domain without receivers
> taking any DMARC-specific action.

Agreed that you want to cover all subdomains. I'm just not clear on
whether the term "subdomain" includes all "sub-subdomains", etc.  It
might not be clear to other readers of the spec either.
>
> I'm not clear on the case you're talking about; in the DMARC context,
> when is the OD different from the From domain?

Section 8, Policy Discovery, item 1 talks of looking for a DMARC record
at the From domain.  Since it's always looking at the exact domain in
the From address, the sp tag has no effect for this lookup. So sp only
makes sense for DMARC records published at ODs, not for other DMARC
records. It might be a good idea to point that out, lest someone think
that an SP on a DMARC record published at foo.example.com would apply to
bar.foo.example.com.

> 7.1 Verifying External Destinations
>
>
>     Paragraph 3: SHOULD -- shouldn't that be a MUST?
>
>
> We describe a few paragraphs down a reason why one would elect not to
> implement that advice, so SHOULD is more appropriate here.

Ah. OK.
>  
>
>
>     7.2 Aggregate reports
>
>     The format for these reports is critical to interoperability -- should
>     it really be specified in an appendix?  It's more important to specify
>     the format of the reports than the requirements shown in the
>     bulleted list.
>
>
> The XML definition is quite large.  We found this arrangement -- no
> huge gap in the text -- to be more palatable.

More of a question for the standards-format people: you don't want it to
seem non-normative.  Or should something like this be in a separate
spec?  This one IS getting big...
>  
>
>     8. Policy Discovery
>
>     This is the first mention I have seen that DMARC records are published
>     directly on From domains; up to this point it looked like DMARC
>     was only
>     published by a Domain Owner on an Administrative Domain.  This
>     changes a
>     lot -- like the fact that a delegate of the Domain Owner, and not the
>     [administrative] Domain Owner him/herself, can set the policy for a
>     domain. This might require a major change of terminology usage, or at
>     least a change in the definition of Domain Owner, to fix.
>
>
> I'm not sure where the confusion came in.  The only domain of interest
> to DMARC is the From domain; it is from this that the rest of the work
> (most importantly, identifier alignment) is derived.
>
> Who would a delegate of the Domain Owner be?  From the perspective of
> a receiver, such a delegation is not visible; the query goes the OD.

This goes back to my earlier confusion about the definition of Domain
Owner. I had interpreted it more narrowly as the registrant of the
domain. When you say, "From the perspective of a receiver, such a
delegation is not visible", what about the case where the receiver gets
a message with 5322.From = <root@foo.example.com>, and looks up and
finds a DMARC record at foo.example.com?  That would be visible, because
the OD is example.com.

But the bigger issue for me was that I came this far in understanding
DMARC and only now find that it's possible to publish a DMARC record on
the actual From domain, and not just on the OD.  That should be
introduced much earlier.
>  
>
>
>     Items 2 and 4: Effectively, this means that v=DMARC2 records are
>     completely independent of v=DMARC1 records. There is no
>     interoperability
>     between versions. Is this what is intended?
>
>
> This document defines v1.  v2 could define itself in such a way that
> it accepts part or all of a v1 record, but a v1 record is incompatible
> with one explicitly declared to be for v2.  This is precisely the same
> as "v=DKIM1": If you're extending DKIM v1, you just declare new tags;
> once you say v2, you're saying you don't want to keep the old meanings.

OK.  I'm not sure we thoroughly thought out the interoperability issues
with version tags in DKIM, and was hoping we might be able to do so
here. I wonder how useful these tags are...if there's ever a DMARC v2,
would it be a better idea to publish the records under _dmarc2 ?
>
>
>     "If the RFC5322.From domain does not exist...": This specifies an
>     action
>     that has nothing to do with DMARC. I don't know the history of
>     this but
>     it seems like if there was going to be some global "you SHOULD reject
>     messages with a nonexistent From domain" action, it belongs someplace
>     like RFC 5322, not here. See also comment under A.4.
>
>
> I agree that RFC5322 doesn't establish this requirement.  We're saying
> that a DMARC implementation needs to take this action as it, along
> with normal DMARC operation, defeats spoof attempts.

Although this is an exceedingly rare usage, I still wonder whether this
(and not 5322) is an appropriate place to place additional restrictions
on otherwise-legal mail.

In the event that the message is rejected during an SMTP transaction,
should there be an error code specified for this?
>
>
>     9. Domain Owner Actions
>
>     Paragraph 1: "set up an address to receive reports" -- could also
>     delegate that externally
>
>
> Sure.  Do we need to identify all the things a Domain Owner might do
> external to itself?  That seems like it could become tedious; I think
> that's already implicit.

But the external delegation requires some specific actions of its own to
make sure that the reporting domain is authorized.
>  
>
>
>     10.1 Extract Author Domain
>
>     Paragraph 3: "Such messages SHOULD be rejected." Again, this specifies
>     an action on messages that has nothing to do with DMARC. In
>     particular,
>     bullet 2 and 4 describe messages that are legal according to RFC 5322,
>     and if they're undesirable should have been addressed there.
>
>
> DMARC-aware operators see those exceptional cases in vanishingly small
> numbers.  That specific community appears to be of the consensus
> opinion that they aren't worth the introduced complexity for
> exceptional handling.
>  
>
>     If the messages are rejected, should they be silently discarded or
>     fully
>     rejected (per section 15.4)?
>
>
> The action isn't specified.  Their delivery simply needs to be prevented.

Shouldn't there be at least recommended action?
>  
>
>
>     10.3 Messaging Sampling
>
>     Much of this section applies generally to the application of
>     policy and
>     not specifically to sampling, so perhaps the section heading should be
>     "Policy Application" or something like that.
>
>
> I don't understand what you're saying here.  How is this not a message
> sampling function?

The main focus of the section is the application of policy. Sampling is
a part of that, of course, but seems like a subtopic.
>  
>
>
>     11.1 Discovery
>
>     Paragraph 1: Does not discuss DMARC policy records associated with
>     Administrative Domains, only those associated with the From address
>     (converse of everything before section 8).
>
>
> Still not clear on the distinction being made here.

It talks about finding the DMARC policy record at the 5322.From domain,
but not at the OD domain.
>  
>
>
>     11.2.1 Email
>
>     Paragraph 1: Is it equally acceptable to send via SMTP over SSL
>     (port 465)?
>
>
> Are there implementations of this?

Good question. I think I ran across it in my /etc/services file.
>
>     A.6 Organizational Domain Discovery Issues
>
>     Paragraph 3: "Climbing the tree", explored extensively in the
>     development of ADSP, can of course be constrained to a specific
>     limited
>     number of queries. But ultimately even a one-level climb was
>     considered
>     too much and was rejected. Nevertheless, DMARC does look for policy in
>     two places (the From domain and the Organizational Domain).
>
>
> Right, but not based directly on the DNS; I think that was the
> objection with SSP/ADSP.

I'm not sure what you mean by "not based directly on the DNS".
>  
>
>
>     The approach being used in DMARC was briefly considered in ADSP, but
>     didn't even make it into a draft at the strong advice of the DNS
>     Directorate that there is no way to reliably determine the delegation
>     level in a domain name.
>
>
> Right; as I said above, we don't intend to keep this method as soon as
> something endorsed by the larger community is available.

Is there an initiative by the larger community that is addressing this?

===
But I see that there's a -02 version now.  More to read...

-Jim


--------------030009040808050707070307
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    <div class="moz-cite-prefix">A few reply responses inline.<br>
      <br>
      On 12/3/13 12:26 AM, Murray S. Kucherawy wrote:<br>
    </div>
    <blockquote
cite="mid:CAL0qLwZDhVM0edfzJe_wrKPSjC6c9bvabbO-Bp7+LVowHtg0=w@mail.gmail.com"
      type="cite">
      <div dir="ltr"><br>
        <div>
          <div class="gmail_extra">
            <div class="gmail_quote"><br>
              <div>Happy to have your editorial comments off-list if you
                like.<br>
              </div>
            </div>
          </div>
        </div>
      </div>
    </blockquote>
    <br>
    I just need to find my marked-up copy of the spec, which is around
    here somewhere...<br>
    <blockquote
cite="mid:CAL0qLwZDhVM0edfzJe_wrKPSjC6c9bvabbO-Bp7+LVowHtg0=w@mail.gmail.com"
      type="cite">
      <div dir="ltr">
        <div>
          <div class="gmail_extra">
            <div class="gmail_quote">
              <div>&nbsp;<br>
              </div>
              <blockquote class="gmail_quote" style="margin:0px 0px 0px
                0.8ex;border-left:1px solid
                rgb(204,204,204);padding-left:1ex">
                <br>
                ===<br>
                <br>
                1. Introduction<br>
                <br>
                Paragraph 3: &nbsp;I'm surprised to see the use of the word
                "policy". In the<br>
                context of ADSP (originally Sender Signing Policy), the
                word "policy"<br>
                was considered inaccurate because it was deemed
                inappropriate to dictate<br>
                policy to a Receiving Domain. Even though SSP was
                describing the<br>
                domain's policy with respect to signing messages with
                DKIM, the word<br>
                "practices" was substituted. Is it now considered
                acceptable to make<br>
                policy requests of a Receiving Domain?<br>
              </blockquote>
              <div><br>
              </div>
              <div>I don't think this has come up during the development
                of DMARC.&nbsp; In contrast, I think the use of "policy" in
                the SPF context has become widely understood to indicate
                it's a request from the author domain.&nbsp; I do think it's
                pretty clear from the document that there are no
                illusions that something's being demanded of the
                receiver.<br>
                <br>
              </div>
              <div>In the case of SSP and ADSP, I think we were trying
                to describe the signing practices of the author domain,
                so the receiver could make an intelligent judgement
                about accepting or rejecting the message.&nbsp; In DMARC, the
                practices are implied by the nature of the protocol
                except for what alignment of identifiers a receiver
                should expect.<br>
              </div>
            </div>
          </div>
        </div>
      </div>
    </blockquote>
    <br>
    I don't see the distinction between what SSP/ADSP and DMARC are
    trying to do that might make one "practices" and the other "policy".
    If our language has evolved, that's all right; I'm just pointing out
    the earlier discussion, which happened at IETF 65:
    <a class="moz-txt-link-freetext" href="http://tools.ietf.org/wg/dkim/minutes?item=minutes65.html">http://tools.ietf.org/wg/dkim/minutes?item=minutes65.html</a>
    <blockquote
cite="mid:CAL0qLwZDhVM0edfzJe_wrKPSjC6c9bvabbO-Bp7+LVowHtg0=w@mail.gmail.com"
      type="cite">
      <div dir="ltr">
        <div>
          <div class="gmail_extra">
            <div class="gmail_quote">
              <blockquote class="gmail_quote" style="margin:0px 0px 0px
                0.8ex;border-left:1px solid
                rgb(204,204,204);padding-left:1ex">
                <br>
                Paragraph 3 #2-1: "The receiver" might be interpreted as
                being an MUA.<br>
                Suggest "Receiving domains". "how the mail is handled"
                -&gt; "how they<br>
                should handle the mail"<br>
              </blockquote>
              <div><br>
              </div>
              <div>The outer bullet refers to SMTP Receivers, which I
                don't believe includes MUAs.<br>
              </div>
            </div>
          </div>
        </div>
      </div>
    </blockquote>
    <br>
    OK, missed the context set by the outer bullet.<br>
    <blockquote
cite="mid:CAL0qLwZDhVM0edfzJe_wrKPSjC6c9bvabbO-Bp7+LVowHtg0=w@mail.gmail.com"
      type="cite">
      <div dir="ltr">
        <div>
          <div class="gmail_extra">
            <div class="gmail_quote"><br>
              <blockquote class="gmail_quote" style="margin:0px 0px 0px
                0.8ex;border-left:1px solid
                rgb(204,204,204);padding-left:1ex">
                Authentication of individuals rather than domains: DMARC
                doesn't perform<br>
                authentication at all, it acts on the result of two
                other mechanisms.<br>
                This muddies that point.<br>
              </blockquote>
              <div><br>
              </div>
              <div>I'm not sure it's important to dive into this; we're
                saying this is a topic we don't want to handle either
                way.<br>
              </div>
            </div>
          </div>
        </div>
      </div>
    </blockquote>
    <br>
    But when you say "rather than domains", it gives the impression that
    DMARC authenticates at the domain level, which it doesn't do.<br>
    <br>
    <blockquote
cite="mid:CAL0qLwZDhVM0edfzJe_wrKPSjC6c9bvabbO-Bp7+LVowHtg0=w@mail.gmail.com"
      type="cite">
      <div dir="ltr">
        <div>
          <div class="gmail_extra">
            <div class="gmail_quote"><br>
              <blockquote class="gmail_quote" style="margin:0px 0px 0px
                0.8ex;border-left:1px solid
                rgb(204,204,204);padding-left:1ex">
                <br>
                Domain Owner: This definition clearly defines the Domain
                Owner as the<br>
                registrant of a domain. But as we will see much later,
                DMARC records are<br>
                sometimes published by From domains directly, which
                could be a person or<br>
                organization delegated by the Domain Owner. Perhaps
                another term is<br>
                needed, because there are some things that are available
                only to Domain<br>
                Owners and others that are also available to those able
                to publish a DNS<br>
                record for a subdomain.<br>
              </blockquote>
              <div><br>
              </div>
              <div>The definition does include more complex arrangements
                than merely the registering entity.<br>
              </div>
            </div>
          </div>
        </div>
      </div>
    </blockquote>
    <br>
    I'm still not getting how the more complex arrangements are covered.
    Perhaps it's from the definition of ADMD (which I haven't read
    recently).&nbsp; If so, you might want to say that more directly; calling
    it "analogous" is a little vague.<br>
    <blockquote
cite="mid:CAL0qLwZDhVM0edfzJe_wrKPSjC6c9bvabbO-Bp7+LVowHtg0=w@mail.gmail.com"
      type="cite">
      <div dir="ltr">
        <div>
          <div class="gmail_extra">
            <div class="gmail_quote">
              <div>&nbsp; <br>
              </div>
              <blockquote class="gmail_quote" style="margin:0px 0px 0px
                0.8ex;border-left:1px solid
                rgb(204,204,204);padding-left:1ex">
                (2) This creates a dependency on a public suffix list
                such as that<br>
                published by Mozilla, but doesn't require the use of a
                particular list.<br>
                This would create an inconsistency in the result of
                DMARC that I<br>
                consider to be an interoperability problem.<br>
              </blockquote>
              <div><br>
              </div>
              <div>Yes.&nbsp; We acknowledge that public suffix is far from
                an ideal solution, but until some of the ideas being
                discussed in APPSAWG and elsewhere become a reality,
                it's the only operational option.&nbsp; Your point is taken,
                though, that lots of sources for this information is a
                problem.&nbsp; I'll add a note about it.<br>
              </div>
            </div>
          </div>
        </div>
      </div>
    </blockquote>
    <br>
    I'm still worried about this.<br>
    <blockquote
cite="mid:CAL0qLwZDhVM0edfzJe_wrKPSjC6c9bvabbO-Bp7+LVowHtg0=w@mail.gmail.com"
      type="cite">
      <div dir="ltr">
        <div>
          <div class="gmail_extra">
            <div class="gmail_quote"><br>
              <blockquote class="gmail_quote" style="margin:0px 0px 0px
                0.8ex;border-left:1px solid
                rgb(204,204,204);padding-left:1ex">
                [aside: I see, much later in the spec, that DMARC
                records can be<br>
                published by the From domain directly, not just from the
                Domain Owner. A<br>
                lot of earlier text needs to be cleaned up to
                accommodate that.]<br>
              </blockquote>
              <div><br>
              </div>
              <div>Are those not the same?&nbsp; Or are you talking about the
                subdomain case?<br>
              </div>
            </div>
          </div>
        </div>
      </div>
    </blockquote>
    <br>
    The subdomain case, yes.<br>
    <br>
    <blockquote
cite="mid:CAL0qLwZDhVM0edfzJe_wrKPSjC6c9bvabbO-Bp7+LVowHtg0=w@mail.gmail.com"
      type="cite">
      <div dir="ltr">
        <div>
          <div class="gmail_extra">
            <div class="gmail_quote">
              <blockquote class="gmail_quote" style="margin:0px 0px 0px
                0.8ex;border-left:1px solid
                rgb(204,204,204);padding-left:1ex">
                5. DMARC Policy Record<br>
                <br>
                Paragraph 2: "matches perfectly with the DNS". &nbsp;Not at
                all -- the fact<br>
                that it isn't possible to deterministically determine
                the organizational<br>
                domain, is an example of the mismatch. &nbsp;Also,
                operational limits on DNS<br>
                record sizes prompts the use of non obvious syntax like
                the !&lt;size&gt;<br>
                construct.<br>
              </blockquote>
              <div><br>
              </div>
              <div>I think we're talking here about why we store the
                record in the DNS, like SPF and DKIM and various others
                have done.&nbsp; We're not saying here that we espouse ways
                of determining things like the zone cut from DNS data.<br>
              </div>
            </div>
          </div>
        </div>
      </div>
    </blockquote>
    <br>
    I just think the statement "matches perfectly" is overdone.&nbsp; If DNS
    had slightly different capabilities DMARC would be easier, so I'd
    tone down that statement.<br>
    <blockquote
cite="mid:CAL0qLwZDhVM0edfzJe_wrKPSjC6c9bvabbO-Bp7+LVowHtg0=w@mail.gmail.com"
      type="cite">
      <div dir="ltr">
        <div>
          <div class="gmail_extra">
            <div class="gmail_quote">
              <div>&nbsp;
                <br>
              </div>
              <blockquote class="gmail_quote" style="margin:0px 0px 0px
                0.8ex;border-left:1px solid
                rgb(204,204,204);padding-left:1ex">
                fo: The tag value can contain both 0 and 1; what happens
                then?<br>
              </blockquote>
              <div><br>
              </div>
              <div>The union of the two means "0" is a no-op in that
                case.<br>
              </div>
            </div>
          </div>
        </div>
      </div>
    </blockquote>
    <br>
    They conflict, so you should either prohibit that case (my
    preference) or define the behavior.<br>
    <blockquote
cite="mid:CAL0qLwZDhVM0edfzJe_wrKPSjC6c9bvabbO-Bp7+LVowHtg0=w@mail.gmail.com"
      type="cite">
      <div dir="ltr">
        <div>
          <div class="gmail_extra">
            <div class="gmail_quote">&nbsp;<br>
              <blockquote class="gmail_quote" style="margin:0px 0px 0px
                0.8ex;border-left:1px solid
                rgb(204,204,204);padding-left:1ex">
                <br>
                p: quarantine: What does "fails the DMARC mechanism"
                mean overall? Is<br>
                this defined somewhere? &nbsp;"suspicious": After all the
                controversy about<br>
                the use of the use of the word suspicious in SSP/ADSP,
                I'm highly amused<br>
                to see it here.<br>
              </blockquote>
              <div><br>
              </div>
              <div>I've added "failed" earlier in the document to
                indicate that DMARC produces a result, so hopefully
                that's clarified here.<br>
                <br>
              </div>
              <div>SSP/ADSP tried to define Suspicious as a result, as I
                recall, or at least explain what it meant.&nbsp; We say
                clearly here that we have no idea by what criteria a
                receiver will normally categorize something as
                suspicious (or whatever word it uses), but the intent
                here is to give the receiver information in that
                direction.<br>
              </div>
            </div>
          </div>
        </div>
      </div>
    </blockquote>
    <br>
    Like I said, I was mostly amused to find the word "suspicious".
    Perhaps people are more comfortable with it now than when we tried
    to use it for SSP/ADSP.<br>
    <blockquote
cite="mid:CAL0qLwZDhVM0edfzJe_wrKPSjC6c9bvabbO-Bp7+LVowHtg0=w@mail.gmail.com"
      type="cite">
      <div dir="ltr">
        <div>
          <div class="gmail_extra">
            <div class="gmail_quote">&nbsp;<br>
              <blockquote class="gmail_quote" style="margin:0px 0px 0px
                0.8ex;border-left:1px solid
                rgb(204,204,204);padding-left:1ex">
                Initial default values are -&gt; Possible values are
                (and possibly<br>
                reference a registry)<br>
              </blockquote>
              <div><br>
              </div>
              <div>We didn't make a registry for this because there's
                really only one in use in this space, and no new ones
                are anticipated.<br>
              </div>
            </div>
          </div>
        </div>
      </div>
    </blockquote>
    <br>
    Two: iodef and afrf, right?<br>
    <blockquote
cite="mid:CAL0qLwZDhVM0edfzJe_wrKPSjC6c9bvabbO-Bp7+LVowHtg0=w@mail.gmail.com"
      type="cite">
      <div dir="ltr">
        <div>
          <div class="gmail_extra">
            <div class="gmail_quote">&nbsp;<br>
              <blockquote class="gmail_quote" style="margin:0px 0px 0px
                0.8ex;border-left:1px solid
                rgb(204,204,204);padding-left:1ex">
                <br>
                sp: Does this apply to subdomains at all levels, or just
                direct<br>
                subdomains? What's the motivation for specifying a
                different policy for<br>
                subdomains vs. the organizational domain? &nbsp;Should also
                point out that sp<br>
                is meaningful only for DMARC records published in
                Organizational Domains<br>
                and not From domains, (although &nbsp;publishing in From
                domains isn't<br>
                introduced until later in the document).<br>
              </blockquote>
              <div><br>
              </div>
              <div>It applies to all subdomains.&nbsp; I'll make it say so.<br>
                <br>
              </div>
              <div>The motivation here is the same as it was for ADSP;
                if I protect <a moz-do-not-send="true"
                  href="http://bluepopcorn.net">bluepopcorn.net</a>
                only, the spoofers could send mail with believable
                subdomains of that domain without receivers taking any
                DMARC-specific action.<br>
              </div>
            </div>
          </div>
        </div>
      </div>
    </blockquote>
    <br>
    Agreed that you want to cover all subdomains. I'm just not clear on
    whether the term "subdomain" includes all "sub-subdomains", etc.&nbsp; It
    might not be clear to other readers of the spec either.<br>
    <blockquote
cite="mid:CAL0qLwZDhVM0edfzJe_wrKPSjC6c9bvabbO-Bp7+LVowHtg0=w@mail.gmail.com"
      type="cite">
      <div dir="ltr">
        <div>
          <div class="gmail_extra">
            <div class="gmail_quote">
              <div>
                <br>
              </div>
              <div>I'm not clear on the case you're talking about; in
                the DMARC context, when is the OD different from the
                From domain?<br>
              </div>
            </div>
          </div>
        </div>
      </div>
    </blockquote>
    <br>
    Section 8, Policy Discovery, item 1 talks of looking for a DMARC
    record at the From domain.&nbsp; Since it's always looking at the exact
    domain in the From address, the sp tag has no effect for this
    lookup. So sp only makes sense for DMARC records published at ODs,
    not for other DMARC records. It might be a good idea to point that
    out, lest someone think that an SP on a DMARC record published at
    foo.example.com would apply to bar.foo.example.com.<br>
    <br>
    <blockquote
cite="mid:CAL0qLwZDhVM0edfzJe_wrKPSjC6c9bvabbO-Bp7+LVowHtg0=w@mail.gmail.com"
      type="cite">
      <div dir="ltr">
        <div>
          <div class="gmail_extra">
            <div class="gmail_quote">7.1 Verifying External Destinations<br>
              <blockquote class="gmail_quote" style="margin:0px 0px 0px
                0.8ex;border-left:1px solid
                rgb(204,204,204);padding-left:1ex">
                <br>
                Paragraph 3: SHOULD -- shouldn't that be a MUST?<br>
              </blockquote>
              <div><br>
              </div>
              <div>We describe a few paragraphs down a reason why one
                would elect not to implement that advice, so SHOULD is
                more appropriate here.<br>
              </div>
            </div>
          </div>
        </div>
      </div>
    </blockquote>
    <br>
    Ah. OK.<br>
    <blockquote
cite="mid:CAL0qLwZDhVM0edfzJe_wrKPSjC6c9bvabbO-Bp7+LVowHtg0=w@mail.gmail.com"
      type="cite">
      <div dir="ltr">
        <div>
          <div class="gmail_extra">
            <div class="gmail_quote">&nbsp;<br>
              <blockquote class="gmail_quote" style="margin:0px 0px 0px
                0.8ex;border-left:1px solid
                rgb(204,204,204);padding-left:1ex">
                <br>
                7.2 Aggregate reports<br>
                <br>
                The format for these reports is critical to
                interoperability -- should<br>
                it really be specified in an appendix? &nbsp;It's more
                important to specify<br>
                the format of the reports than the requirements shown in
                the bulleted list.<br>
              </blockquote>
              <div><br>
              </div>
              <div>The XML definition is quite large.&nbsp; We found this
                arrangement -- no huge gap in the text -- to be more
                palatable.<br>
              </div>
            </div>
          </div>
        </div>
      </div>
    </blockquote>
    <br>
    More of a question for the standards-format people: you don't want
    it to seem non-normative.&nbsp; Or should something like this be in a
    separate spec?&nbsp; This one IS getting big...<br>
    <blockquote
cite="mid:CAL0qLwZDhVM0edfzJe_wrKPSjC6c9bvabbO-Bp7+LVowHtg0=w@mail.gmail.com"
      type="cite">
      <div dir="ltr">
        <div>
          <div class="gmail_extra">
            <div class="gmail_quote">
              <div>&nbsp;
                <br>
              </div>
              <blockquote class="gmail_quote" style="margin:0px 0px 0px
                0.8ex;border-left:1px solid
                rgb(204,204,204);padding-left:1ex">
                8. Policy Discovery<br>
                <br>
                This is the first mention I have seen that DMARC records
                are published<br>
                directly on From domains; up to this point it looked
                like DMARC was only<br>
                published by a Domain Owner on an Administrative Domain.
                &nbsp;This changes a<br>
                lot -- like the fact that a delegate of the Domain
                Owner, and not the<br>
                [administrative] Domain Owner him/herself, can set the
                policy for a<br>
                domain. This might require a major change of terminology
                usage, or at<br>
                least a change in the definition of Domain Owner, to
                fix.<br>
              </blockquote>
              <div><br>
              </div>
              <div>I'm not sure where the confusion came in.&nbsp; The only
                domain of interest to DMARC is the From domain; it is
                from this that the rest of the work (most importantly,
                identifier alignment) is derived.<br>
                <br>
              </div>
              <div>Who would a delegate of the Domain Owner be?&nbsp; From
                the perspective of a receiver, such a delegation is not
                visible; the query goes the OD.<br>
              </div>
            </div>
          </div>
        </div>
      </div>
    </blockquote>
    <br>
    This goes back to my earlier confusion about the definition of
    Domain Owner. I had interpreted it more narrowly as the registrant
    of the domain. When you say, "From the perspective of a receiver,
    such a delegation is not visible", what about the case where the
    receiver gets a message with 5322.From =
    <a class="moz-txt-link-rfc2396E" href="mailto:root@foo.example.com">&lt;root@foo.example.com&gt;</a>, and looks up and finds a DMARC record
    at foo.example.com?&nbsp; That would be visible, because the OD is
    example.com.<br>
    <br>
    But the bigger issue for me was that I came this far in
    understanding DMARC and only now find that it's possible to publish
    a DMARC record on the actual From domain, and not just on the OD.&nbsp;
    That should be introduced much earlier.<br>
    <blockquote
cite="mid:CAL0qLwZDhVM0edfzJe_wrKPSjC6c9bvabbO-Bp7+LVowHtg0=w@mail.gmail.com"
      type="cite">
      <div dir="ltr">
        <div>
          <div class="gmail_extra">
            <div class="gmail_quote">
              <div>&nbsp;<br>
              </div>
              <blockquote class="gmail_quote" style="margin:0px 0px 0px
                0.8ex;border-left:1px solid
                rgb(204,204,204);padding-left:1ex">
                <br>
                Items 2 and 4: Effectively, this means that v=DMARC2
                records are<br>
                completely independent of v=DMARC1 records. There is no
                interoperability<br>
                between versions. Is this what is intended?<br>
              </blockquote>
              <div><br>
              </div>
              <div>This document defines v1.&nbsp; v2 could define itself in
                such a way that it accepts part or all of a v1 record,
                but a v1 record is incompatible with one explicitly
                declared to be for v2.&nbsp; This is precisely the same as
                "v=DKIM1": If you're extending DKIM v1, you just declare
                new tags; once you say v2, you're saying you don't want
                to keep the old meanings.<br>
              </div>
            </div>
          </div>
        </div>
      </div>
    </blockquote>
    <br>
    OK.&nbsp; I'm not sure we thoroughly thought out the interoperability
    issues with version tags in DKIM, and was hoping we might be able to
    do so here. I wonder how useful these tags are...if there's ever a
    DMARC v2, would it be a better idea to publish the records under
    _dmarc2 ?<br>
    <blockquote
cite="mid:CAL0qLwZDhVM0edfzJe_wrKPSjC6c9bvabbO-Bp7+LVowHtg0=w@mail.gmail.com"
      type="cite">
      <div dir="ltr">
        <div>
          <div class="gmail_extra">
            <div class="gmail_quote">
              <div>
                <br>
              </div>
              <blockquote class="gmail_quote" style="margin:0px 0px 0px
                0.8ex;border-left:1px solid
                rgb(204,204,204);padding-left:1ex">
                <br>
                "If the RFC5322.From domain does not exist...": This
                specifies an action<br>
                that has nothing to do with DMARC. I don't know the
                history of this but<br>
                it seems like if there was going to be some global "you
                SHOULD reject<br>
                messages with a nonexistent From domain" action, it
                belongs someplace<br>
                like RFC 5322, not here. See also comment under A.4.<br>
              </blockquote>
              <div><br>
              </div>
              <div>I agree that RFC5322 doesn't establish this
                requirement.&nbsp; We're saying that a DMARC implementation
                needs to take this action as it, along with normal DMARC
                operation, defeats spoof attempts.<br>
              </div>
            </div>
          </div>
        </div>
      </div>
    </blockquote>
    <br>
    Although this is an exceedingly rare usage, I still wonder whether
    this (and not 5322) is an appropriate place to place additional
    restrictions on otherwise-legal mail.<br>
    <br>
    In the event that the message is rejected during an SMTP
    transaction, should there be an error code specified for this?<br>
    <blockquote
cite="mid:CAL0qLwZDhVM0edfzJe_wrKPSjC6c9bvabbO-Bp7+LVowHtg0=w@mail.gmail.com"
      type="cite">
      <div dir="ltr">
        <div>
          <div class="gmail_extra">
            <div class="gmail_quote">
              <div>
                <br>
              </div>
              <blockquote class="gmail_quote" style="margin:0px 0px 0px
                0.8ex;border-left:1px solid
                rgb(204,204,204);padding-left:1ex">
                <br>
                9. Domain Owner Actions<br>
                <br>
                Paragraph 1: "set up an address to receive reports" --
                could also<br>
                delegate that externally<br>
              </blockquote>
              <div><br>
              </div>
              <div>Sure.&nbsp; Do we need to identify all the things a Domain
                Owner might do external to itself?&nbsp; That seems like it
                could become tedious; I think that's already implicit.<br>
              </div>
            </div>
          </div>
        </div>
      </div>
    </blockquote>
    <br>
    But the external delegation requires some specific actions of its
    own to make sure that the reporting domain is authorized.<br>
    <blockquote
cite="mid:CAL0qLwZDhVM0edfzJe_wrKPSjC6c9bvabbO-Bp7+LVowHtg0=w@mail.gmail.com"
      type="cite">
      <div dir="ltr">
        <div>
          <div class="gmail_extra">
            <div class="gmail_quote">&nbsp;<br>
              <blockquote class="gmail_quote" style="margin:0px 0px 0px
                0.8ex;border-left:1px solid
                rgb(204,204,204);padding-left:1ex">
                <br>
                10.1 Extract Author Domain<br>
                <br>
                Paragraph 3: "Such messages SHOULD be rejected." Again,
                this specifies<br>
                an action on messages that has nothing to do with DMARC.
                In particular,<br>
                bullet 2 and 4 describe messages that are legal
                according to RFC 5322,<br>
                and if they're undesirable should have been addressed
                there. <br>
              </blockquote>
              <div><br>
              </div>
              DMARC-aware operators see those exceptional cases in
              vanishingly small numbers.&nbsp; That specific community
              appears to be of the consensus opinion that they aren't
              worth the introduced complexity for exceptional handling.<br>
              &nbsp;<br>
            </div>
            <div class="gmail_quote">
              <blockquote class="gmail_quote" style="margin:0px 0px 0px
                0.8ex;border-left:1px solid
                rgb(204,204,204);padding-left:1ex">
                If the messages are rejected, should they be silently
                discarded or fully<br>
                rejected (per section 15.4)?<br>
              </blockquote>
              <div><br>
              </div>
              <div>The action isn't specified.&nbsp; Their delivery simply
                needs to be prevented.<br>
              </div>
            </div>
          </div>
        </div>
      </div>
    </blockquote>
    <br>
    Shouldn't there be at least recommended action?<br>
    <blockquote
cite="mid:CAL0qLwZDhVM0edfzJe_wrKPSjC6c9bvabbO-Bp7+LVowHtg0=w@mail.gmail.com"
      type="cite">
      <div dir="ltr">
        <div>
          <div class="gmail_extra">
            <div class="gmail_quote">
              <div>&nbsp;<br>
              </div>
              <blockquote class="gmail_quote" style="margin:0px 0px 0px
                0.8ex;border-left:1px solid
                rgb(204,204,204);padding-left:1ex">
                <br>
                10.3 Messaging Sampling<br>
                <br>
                Much of this section applies generally to the
                application of policy and<br>
                not specifically to sampling, so perhaps the section
                heading should be<br>
                "Policy Application" or something like that.<br>
              </blockquote>
              <div><br>
              </div>
              <div>I don't understand what you're saying here.&nbsp; How is
                this not a message sampling function?<br>
              </div>
            </div>
          </div>
        </div>
      </div>
    </blockquote>
    <br>
    The main focus of the section is the application of policy. Sampling
    is a part of that, of course, but seems like a subtopic.<br>
    <blockquote
cite="mid:CAL0qLwZDhVM0edfzJe_wrKPSjC6c9bvabbO-Bp7+LVowHtg0=w@mail.gmail.com"
      type="cite">
      <div dir="ltr">
        <div>
          <div class="gmail_extra">
            <div class="gmail_quote">
              <div>&nbsp;<br>
              </div>
              <blockquote class="gmail_quote" style="margin:0px 0px 0px
                0.8ex;border-left:1px solid
                rgb(204,204,204);padding-left:1ex">
                <br>
                11.1 Discovery<br>
                <br>
                Paragraph 1: Does not discuss DMARC policy records
                associated with<br>
                Administrative Domains, only those associated with the
                From address<br>
                (converse of everything before section 8).<br>
              </blockquote>
              <div><br>
              </div>
              <div>Still not clear on the distinction being made here.<br>
              </div>
            </div>
          </div>
        </div>
      </div>
    </blockquote>
    <br>
    It talks about finding the DMARC policy record at the 5322.From
    domain, but not at the OD domain.<br>
    <blockquote
cite="mid:CAL0qLwZDhVM0edfzJe_wrKPSjC6c9bvabbO-Bp7+LVowHtg0=w@mail.gmail.com"
      type="cite">
      <div dir="ltr">
        <div>
          <div class="gmail_extra">
            <div class="gmail_quote">&nbsp; <br>
              <blockquote class="gmail_quote" style="margin:0px 0px 0px
                0.8ex;border-left:1px solid
                rgb(204,204,204);padding-left:1ex">
                <br>
                11.2.1 Email<br>
                <br>
                Paragraph 1: Is it equally acceptable to send via SMTP
                over SSL (port 465)?<br>
              </blockquote>
              <div><br>
              </div>
              <div>Are there implementations of this?<br>
              </div>
            </div>
          </div>
        </div>
      </div>
    </blockquote>
    <br>
    Good question. I think I ran across it in my /etc/services file.<br>
    <blockquote
cite="mid:CAL0qLwZDhVM0edfzJe_wrKPSjC6c9bvabbO-Bp7+LVowHtg0=w@mail.gmail.com"
      type="cite">
      <div dir="ltr">
        <div>
          <div class="gmail_extra">
            <div class="gmail_quote"><br>
              <blockquote class="gmail_quote" style="margin:0px 0px 0px
                0.8ex;border-left:1px solid
                rgb(204,204,204);padding-left:1ex">
                A.6 Organizational Domain Discovery Issues<br>
                <br>
                Paragraph 3: "Climbing the tree", explored extensively
                in the<br>
                development of ADSP, can of course be constrained to a
                specific limited<br>
                number of queries. But ultimately even a one-level climb
                was considered<br>
                too much and was rejected. Nevertheless, DMARC does look
                for policy in<br>
                two places (the From domain and the Organizational
                Domain).<br>
              </blockquote>
              <div><br>
              </div>
              <div>Right, but not based directly on the DNS; I think
                that was the objection with SSP/ADSP.<br>
              </div>
            </div>
          </div>
        </div>
      </div>
    </blockquote>
    <br>
    I'm not sure what you mean by "not based directly on the DNS".<br>
    <blockquote
cite="mid:CAL0qLwZDhVM0edfzJe_wrKPSjC6c9bvabbO-Bp7+LVowHtg0=w@mail.gmail.com"
      type="cite">
      <div dir="ltr">
        <div>
          <div class="gmail_extra">
            <div class="gmail_quote">
              <div>&nbsp;<br>
              </div>
              <blockquote class="gmail_quote" style="margin:0px 0px 0px
                0.8ex;border-left:1px solid
                rgb(204,204,204);padding-left:1ex">
                <br>
                The approach being used in DMARC was briefly considered
                in ADSP, but<br>
                didn't even make it into a draft at the strong advice of
                the DNS<br>
                Directorate that there is no way to reliably determine
                the delegation<br>
                level in a domain name.<br>
              </blockquote>
              <div><br>
              </div>
              <div>Right; as I said above, we don't intend to keep this
                method as soon as something endorsed by the larger
                community is available.<br>
              </div>
            </div>
          </div>
        </div>
      </div>
    </blockquote>
    <br>
    Is there an initiative by the larger community that is addressing
    this?<br>
    <br>
    ===<br>
    But I see that there's a -02 version now.&nbsp; More to read...<br>
    <br>
    -Jim<br>
    <br>
  </body>
</html>

--------------030009040808050707070307--

From franck@peachymango.org  Fri Dec  6 16:36:36 2013
Return-Path: <franck@peachymango.org>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 09DDB1ADF7F for <dmarc@ietfa.amsl.com>; Fri,  6 Dec 2013 16:36:36 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level: 
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wVmrstHsGuHn for <dmarc@ietfa.amsl.com>; Fri,  6 Dec 2013 16:36:33 -0800 (PST)
Received: from smtp.01.com (smtp.01.com [199.36.142.181]) by ietfa.amsl.com (Postfix) with ESMTP id EC6521AD7BF for <dmarc@ietf.org>; Fri,  6 Dec 2013 16:36:32 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by smtp-out-2.01.com (Postfix) with ESMTP id DFE294F422C; Fri,  6 Dec 2013 18:36:28 -0600 (CST)
X-Virus-Scanned: amavisd-new at smtp-out-2.01.com
Received: from smtp.01.com ([127.0.0.1]) by localhost (smtp-out-2.01.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eOWmeTAyCrJZ; Fri,  6 Dec 2013 18:36:28 -0600 (CST)
Received: from smtp.01.com (localhost [127.0.0.1]) by smtp-out-2.01.com (Postfix) with ESMTP id BFF024F408A; Fri,  6 Dec 2013 18:36:28 -0600 (CST)
Received: from localhost (localhost [127.0.0.1]) by smtp-out-2.01.com (Postfix) with ESMTP id A82284F4288; Fri,  6 Dec 2013 18:36:28 -0600 (CST)
X-Virus-Scanned: amavisd-new at smtp-out-2.01.com
Received: from smtp.01.com ([127.0.0.1]) by localhost (smtp-out-2.01.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id J6MNqmiI1EDf; Fri,  6 Dec 2013 18:36:28 -0600 (CST)
Received: from mail-2.01.com (mail.01.com [172.18.30.178]) by smtp-out-2.01.com (Postfix) with ESMTP id 7B9504F408A; Fri,  6 Dec 2013 18:36:28 -0600 (CST)
Date: Fri, 6 Dec 2013 18:36:27 -0600 (CST)
From: Franck Martin <franck@peachymango.org>
To: Jim Fenton <fenton@bluepopcorn.net>
Message-ID: <715316768.247342.1386376587794.JavaMail.zimbra@peachymango.org>
In-Reply-To: <WM!fc797558ad76328a42a6713fe1ee0f808276af8997f2326cc79437eb24447602ad33d5069fa2054e32f4c0f578713544!@asav-2.01.com>
References: <524CA422.8030008@bluepopcorn.net> <CAL0qLwZDhVM0edfzJe_wrKPSjC6c9bvabbO-Bp7+LVowHtg0=w@mail.gmail.com> <52A25C31.4070407@bluepopcorn.net> <WM!fc797558ad76328a42a6713fe1ee0f808276af8997f2326cc79437eb24447602ad33d5069fa2054e32f4c0f578713544!@asav-2.01.com>
MIME-Version: 1.0
Content-Type: multipart/alternative;  boundary="----=_Part_247341_1976134241.1386376587791"
X-Originating-IP: [69.28.149.129]
X-Mailer: Zimbra 8.0.5_GA_5839 (ZimbraWebClient - FF25 (Mac)/8.0.5_GA_5839)
Thread-Topic: External review of draft-kucherawy-dmarc-base-01
Thread-Index: Muil9mluiTxISEq/53cPUvAU2e2WBg==
Cc: dmarc@ietf.org, "Murray S. Kucherawy" <superuser@gmail.com>
Subject: Re: [dmarc-ietf] External review of draft-kucherawy-dmarc-base-01
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 07 Dec 2013 00:36:36 -0000

------=_Part_247341_1976134241.1386376587791
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 7bit

----- Original Message -----

> From: "Jim Fenton" <fenton@bluepopcorn.net>
> To: "Murray S. Kucherawy" <superuser@gmail.com>
> Cc: dmarc@ietf.org
> Sent: Friday, December 6, 2013 3:22:25 PM
> Subject: Re: [dmarc-ietf] External review of draft-kucherawy-dmarc-base-01

> A few reply responses inline.

> On 12/3/13 12:26 AM, Murray S. Kucherawy wrote:

> > > "If the RFC5322.From domain does not exist...": This specifies an action
> > 
> 
> > > that has nothing to do with DMARC. I don't know the history of this but
> > 
> 
> > > it seems like if there was going to be some global "you SHOULD reject
> > 
> 
> > > messages with a nonexistent From domain" action, it belongs someplace
> > 
> 
> > > like RFC 5322, not here. See also comment under A.4.
> > 
> 

> > I agree that RFC5322 doesn't establish this requirement. We're saying that
> > a
> > DMARC implementation needs to take this action as it, along with normal
> > DMARC operation, defeats spoof attempts.
> 

> Although this is an exceedingly rare usage, I still wonder whether this (and
> not 5322) is an appropriate place to place additional restrictions on
> otherwise-legal mail.

> In the event that the message is rejected during an SMTP transaction, should
> there be an error code specified for this?

There may be a BCP to discuss a bit more about it. Also I think we need to stress more these cases in security considerations or inline. 

However, RFC5322 section 3.6 says there must be one and only one From: header for the message to be "valid". So we can point to this rule and say something like with DMARC you should enforce that, and not be lenient ( http://tools.ietf.org/html/draft-ietf-appsawg-malformed-mail-11 section 1.1 second paragraph) 

Moreover RFC5322 says: 
from            =   "From:" mailbox-list CRLF 
So there must be at least one domain name in this Field. Once again, you can be less lenient here. Not DMARC role, here, but you can point back to this RFC and say stop to be lenient. 

However, IEA RFC 6854, states, that 
from = "From:" (mailbox-list / address-list) CRLF 
is ok between non IEA aware MTAs (section 3). I did not like the change of the From: header because it increases uncertainty in emails. Fortunately it is limited in scope, so once you have an MTA that can do IEA, you can enforce the mailbox-list again . 
Now closer to your point, I don't think any RFC states that the domain name found in the From: must exists or even be mildly "emailable", this is a "common" check you may do for the envelope from (cf http://spamassassin.apache.org/tests_3_3_x.html NO_DNS_FOR_FROM ). It is not common for the From: header but this is something DMARC could point out as something worth considering. 

Finally, you can't imagine what you find in bounces... All the badness , breakages are there... (or nearly). 

------=_Part_247341_1976134241.1386376587791
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html><body><div style=3D"font-family: arial,helvetica,sans-serif; font-siz=
e: 12pt; color: #000000"><hr id=3D"zwchr"><blockquote style=3D"border-left:=
2px solid #1010FF;margin-left:5px;padding-left:5px;color:#000;font-weight:n=
ormal;font-style:normal;text-decoration:none;font-family:Helvetica,Arial,sa=
ns-serif;font-size:12pt;"><b>From: </b>"Jim Fenton" &lt;fenton@bluepopcorn.=
net&gt;<br><b>To: </b>"Murray S. Kucherawy" &lt;superuser@gmail.com&gt;<br>=
<b>Cc: </b>dmarc@ietf.org<br><b>Sent: </b>Friday, December 6, 2013 3:22:25 =
PM<br><b>Subject: </b>Re: [dmarc-ietf] External review of draft-kucherawy-d=
marc-base-01<br><div><br></div>
 =20
   =20
 =20
 =20
    <div class=3D"moz-cite-prefix">A few reply responses inline.<br>
      <br>
      On 12/3/13 12:26 AM, Murray S. Kucherawy wrote:<br>
    </div><br>
    <blockquote cite=3D"mid:CAL0qLwZDhVM0edfzJe_wrKPSjC6c9bvabbO-Bp7+LVowHt=
g0=3Dw@mail.gmail.com">
      <div dir=3D"ltr">
        <div>
          <div class=3D"gmail_extra">
            <div class=3D"gmail_quote">
              <div>
                <br>
              </div>
              <blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px
                0.8ex;border-left:1px solid
                rgb(204,204,204);padding-left:1ex">
                <br>
                "If the RFC5322.From domain does not exist...": This
                specifies an action<br>
                that has nothing to do with DMARC. I don't know the
                history of this but<br>
                it seems like if there was going to be some global "you
                SHOULD reject<br>
                messages with a nonexistent From domain" action, it
                belongs someplace<br>
                like RFC 5322, not here. See also comment under A.4.<br>
              </blockquote>
              <div><br>
              </div>
              <div>I agree that RFC5322 doesn't establish this
                requirement.&nbsp; We're saying that a DMARC implementation
                needs to take this action as it, along with normal DMARC
                operation, defeats spoof attempts.<br>
              </div>
            </div>
          </div>
        </div>
      </div>
    </blockquote>
    <br>
    Although this is an exceedingly rare usage, I still wonder whether
    this (and not 5322) is an appropriate place to place additional
    restrictions on otherwise-legal mail.<br>
    <br>
    In the event that the message is rejected during an SMTP
    transaction, should there be an error code specified for this?<br>
    </blockquote><div>There may be a BCP to discuss a bit more about it. Al=
so I think we need to stress more these cases in security considerations or=
 inline.<br></div><div><br></div><div>However, RFC5322 section 3.6 says the=
re must be one and only one From: header for the message to be "valid". So =
we can point to this rule and say something like with DMARC you should enfo=
rce that, and not be lenient (<a href=3D"http://tools.ietf.org/html/draft-i=
etf-appsawg-malformed-mail-11">http://tools.ietf.org/html/draft-ietf-appsaw=
g-malformed-mail-11</a> section 1.1 second paragraph)<br></div><div><br></d=
iv><div>Moreover RFC5322 says:<br></div><div><pre class=3D"newpage">from   =
         =3D   "From:" mailbox-list CRLF</pre></div><div>So there must be a=
t least one domain name in this Field. Once again, you can be less lenient =
here. Not DMARC role, here, but you can point back to this RFC and say stop=
 to be lenient.<br></div><div><br></div><div>However, IEA RFC 6854, states,=
 that <br></div><div style=3D"text-align: left;" data-mce-style=3D"text-ali=
gn: left;"><pre class=3D"newpage">from =3D "From:" (mailbox-list / address-=
list) CRLF</pre><pre class=3D"newpage"><span style=3D"font-family: arial,he=
lvetica,sans-serif;" data-mce-style=3D"font-family: arial,helvetica,sans-se=
rif;">is ok between non IEA aware MTAs (section 3). I did not like the chan=
ge of the From: header because it increases uncertainty in emails. Fortunat=
ely it is limited in scope, so once you have an MTA that can do IEA, you ca=
n enforce the mailbox-list again</span>.<br></pre><pre class=3D"newpage"><s=
pan style=3D"font-family: arial,helvetica,sans-serif;" data-mce-style=3D"fo=
nt-family: arial,helvetica,sans-serif;">Now closer to your point, I don't t=
hink any RFC states that the domain name found in the From: must exists or =
even be mildly "emailable", this is a "common" check you may do for the env=
elope from (cf <a href=3D"http://spamassassin.apache.org/tests_3_3_x.html">=
http://spamassassin.apache.org/tests_3_3_x.html</a> <span size=3D"-1">NO_DN=
S_FOR_FROM </span>). It is not common for the From: header but this is some=
thing DMARC could point out as something worth considering.<br><br>Finally,=
 you can't imagine what you find in bounces... All the badness</span><span =
style=3D"font-family: arial,helvetica,sans-serif;">, breakages are there...=
 (or nearly).</span><br></pre></div></div></body></html>
------=_Part_247341_1976134241.1386376587791--

From mstevens@etla.org  Sat Dec  7 09:46:01 2013
Return-Path: <mstevens@etla.org>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5D1391AE245 for <dmarc@ietfa.amsl.com>; Sat,  7 Dec 2013 09:46:01 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level: 
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MQCN1G-HXAmB for <dmarc@ietfa.amsl.com>; Sat,  7 Dec 2013 09:45:59 -0800 (PST)
Received: from ceres.etla.org (ceres.etla.org [IPv6:2001:ba8:1f1:f1ef::2]) by ietfa.amsl.com (Postfix) with ESMTP id 4B6901AE16B for <dmarc@ietf.org>; Sat,  7 Dec 2013 09:45:59 -0800 (PST)
Received: from mstevens by ceres.etla.org with local (Exim 4.80) (envelope-from <mstevens@etla.org>) id 1VpLwr-0000de-TB; Sat, 07 Dec 2013 17:45:49 +0000
Date: Sat, 7 Dec 2013 17:45:49 +0000
From: Michael Stevens <mstevens@etla.org>
To: "Murray S. Kucherawy" <superuser@gmail.com>
Message-ID: <20131207174549.GA31351@ceres.etla.org>
References: <20131206195151.11363.70071.idtracker@ietfa.amsl.com> <CAL0qLwa8mZtixFY2P6mi7t9zS58vfYM+EYS8EVy_kvOWW1BV3w@mail.gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <CAL0qLwa8mZtixFY2P6mi7t9zS58vfYM+EYS8EVy_kvOWW1BV3w@mail.gmail.com>
X-Phase-Of-Moon: The Moon is Waxing Crescent (29% of Full)
User-Agent: Mutt/1.5.21 (2010-09-15)
Cc: "dmarc@ietf.org" <dmarc@ietf.org>
Subject: Re: [dmarc-ietf] New Version Notification for draft-kucherawy-dmarc-base-02.txt
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 07 Dec 2013 17:46:01 -0000

On Fri, Dec 06, 2013 at 12:08:51PM -0800, Murray S. Kucherawy wrote:
> On Fri, Dec 6, 2013 at 11:51 AM, <internet-drafts@ietf.org> wrote:
> 
> >
> > A new version of I-D, draft-kucherawy-dmarc-base-02.txt
> > has been successfully submitted by Murray S. Kucherawy and posted to the
> > IETF repository.
> >
> > Filename:        draft-kucherawy-dmarc-base
> > Revision:        02
> > Title:           Domain-based Message Authentication, Reporting and
> > Conformance (DMARC)
> > Creation date:   2013-12-06
> > Group:           Individual Submission
> > Number of pages: 78
> > URL:
> > http://www.ietf.org/internet-drafts/draft-kucherawy-dmarc-base-02.txt
> > Status:
> > http://datatracker.ietf.org/doc/draft-kucherawy-dmarc-base
> > Htmlized:        http://tools.ietf.org/html/draft-kucherawy-dmarc-base-02
> > Diff:
> > http://www.ietf.org/rfcdiff?url2=draft-kucherawy-dmarc-base-02
> >
> > Abstract:
> >    This memo presents a proposal for a scalable mechanism by which a
> >    mail sending organization can express, using the Domain Name System,
> >    domain-level policies and preferences for message validation,
> >    disposition, and reporting, and a mail receiving organization can use
> >    those policies and preferences to improve mail handling.
> >
> >    The email ecosystem currently lacks a cohesive mechanism through
> >    which email senders and receivers can make use of multiple
> >    authentication protocols to establish reliable domain identifiers,
> >    communicate policies about those identifiers, and report about mail
> >    using those identifiers.  This lack of cohesion has several effects:
> >    receivers have difficulty providing feedback to senders about
> >    authentication, senders therefore have difficulty evaluating their
> >    authentication deployments, and as a result neither is able to make
> >    effective use of existing authentication technology
> >
> >    The enclosed proposal is not intended to introduce mechanisms that
> >    provide elevated delivery privilege of authenticated email.  The
> >    proposal presents a mechanism for policy distribution that enables a
> >    continuum of increasingly strict handling of messages that fail
> >    multiple authentication checks, from no action, through altered
> >    delivery, up to message rejection.
> >
> 
> This version addresses most of the feedback that's been posted to date.  It
> doesn't include unresolved things that are still being discussed on the
> list.
> 
> The diff link is probably going to be useful to most people given the size
> of the document.
> 
> Have at it!

Tiny comments, second paragraph ending "effective use of existing
authentication technology".

p8 "   2.  Log details required to generate forensic and aggreagate
reports"

spelling mistake in aggreagate?

Michael

From prvs=0046476b60=johnl@iecc.com  Sat Dec  7 15:42:15 2013
Return-Path: <prvs=0046476b60=johnl@iecc.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 01F0B1AE453 for <dmarc@ietfa.amsl.com>; Sat,  7 Dec 2013 15:42:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.894
X-Spam-Level: 
X-Spam-Status: No, score=-1.894 tagged_above=-999 required=5 tests=[BAYES_20=-0.001, DKIM_SIGNED=0.1, GB_I_LETTER=-2, RP_MATCHES_RCVD=-0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_DKIM_INVALID=0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nUEcng7qHIji for <dmarc@ietfa.amsl.com>; Sat,  7 Dec 2013 15:42:13 -0800 (PST)
Received: from leila.iecc.com (leila6.iecc.com [IPv6:2001:470:1f07:1126:0:4c:6569:6c61]) by ietfa.amsl.com (Postfix) with ESMTP id 7707B1ADF64 for <dmarc@ietf.org>; Sat,  7 Dec 2013 15:42:13 -0800 (PST)
Received: (qmail 8963 invoked from network); 7 Dec 2013 23:42:06 -0000
Received: from leila.iecc.com (64.57.183.34) by mail1.iecc.com with QMQP; 7 Dec 2013 23:42:06 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=iecc.com; h=date:message-id:from:to:cc:subject:in-reply-to:mime-version:content-type:content-transfer-encoding; s=52a3b24e.xn--btvx9d.k1310; i=johnl@user.iecc.com; bh=XmJ1itaL8jQkHc2/f005yilDnGLKTCtpySbMG9lt+kc=; b=mZ9WHM4HKRESWzuTG3+WSIydZDKO6FWvdV+uGLNgJEpAaTM5Ulqi8YvnwEnhJa5J316N+e4aU6IEmpDGtoO0H8cw358dFHYIcixV3YMypWzGp3rlvHsI6UqztkoGn6iNuwtSHHdpwAQO0B6qR81upu4xqrUW2z3ukMK8W/QFBTcCf7kIN8YWwZGoqJDPfb9cvypQ4yLOXAkp6orcoxJ4M2tGQdmGRuTV31W/9n7nmU/bmkk1swqr7FsM98f9TSk9
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=taugh.com; h=date:message-id:from:to:cc:subject:in-reply-to:mime-version:content-type:content-transfer-encoding; s=52a3b24e.xn--btvx9d.k1310; olt=johnl@user.iecc.com; bh=XmJ1itaL8jQkHc2/f005yilDnGLKTCtpySbMG9lt+kc=; b=H8S4uWNEw4h1f9HUYTgmX8aZrq55yjxCWRVjQkYJdCPPRdptUQ3AXGr/SDshzQ8v0Pr2O5DbFecNo1Fa4E956rPB26+Kdij/eeLLEDhpVzEAYQZtTOAzHpXfmuB55PefLzg7XYaawN6e6UNYY0p8qPUS2Y9Opd2GQvLSmOWxKRIO3MIybh7MkqNS3u8U2xALEwTTVigIrB2Uwe0vQwAdwNkRkD9Q6Pph1MklBRJ2Yfsimj5Xq3deMrq6maf9Rp+C
Date: 7 Dec 2013 23:41:44 -0000
Message-ID: <20131207234144.82970.qmail@joyce.lan>
From: "John Levine" <johnl@taugh.com>
To: dmarc@ietf.org
In-Reply-To: <CAL0qLwa8mZtixFY2P6mi7t9zS58vfYM+EYS8EVy_kvOWW1BV3w@mail.gmail.com>
Organization: 
X-Headerized: yes
Mime-Version: 1.0
Content-type: text/plain; charset=utf-8
Content-transfer-encoding: 8bit
Cc: superuser@gmail.com
Subject: Re: [dmarc-ietf] New Version Notification for draft-kucherawy-dmarc-base-02.txt
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 07 Dec 2013 23:42:15 -0000

In case it wasn't obvious, in new 11.2.2, the use of "!~q!}{." as the
unique-id in the filename was a hint that you might want to reconsider
the ABNF in section 11.2.1 that defines unique-id as a MIME token,
which can be nearly any random text characters, and instead constrain
it to characters that won't confuse shell scripts or simpleminded
filename parsers and the like.  (I know that bad people can send
anything they want as a filename, but this way you can just reject
stuff with crud in the name rather than trying to handle it.)

In the existing mail reports, the unique-id is optional, and when I
looked through the reports I've gotten, the only reporter that uses
one is Linkedin.  Theirs is always the string "dhalia" which isn't
very unique so I expect it's a bug.

I'd suggest changing the unique-id ABNF on page 37 to

     unique-id = 1*(LETTER | DIGIT)

Speaking of ABNF, in section 5.3 are all the tags and values intended
to be case independent, including v=DMARC1?  If not, you have to turn
them into unreadable hex.

R's,
John



From franck@peachymango.org  Sat Dec  7 16:55:28 2013
Return-Path: <franck@peachymango.org>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9431E1AE471 for <dmarc@ietfa.amsl.com>; Sat,  7 Dec 2013 16:55:28 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.902
X-Spam-Level: 
X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mYPur3HgELfV for <dmarc@ietfa.amsl.com>; Sat,  7 Dec 2013 16:55:26 -0800 (PST)
Received: from smtp.01.com (smtp.01.com [199.36.142.181]) by ietfa.amsl.com (Postfix) with ESMTP id 63C4F1AE46D for <dmarc@ietf.org>; Sat,  7 Dec 2013 16:55:26 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by smtp-out-1.01.com (Postfix) with ESMTP id C0F133F41B4; Sat,  7 Dec 2013 18:55:21 -0600 (CST)
X-Virus-Scanned: amavisd-new at smtp-out-1.01.com
Received: from smtp.01.com ([127.0.0.1]) by localhost (smtp-out-1.01.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OwwW6nNUfki3; Sat,  7 Dec 2013 18:55:21 -0600 (CST)
Received: from smtp.01.com (localhost [127.0.0.1]) by smtp-out-1.01.com (Postfix) with ESMTP id A2B423F41D0; Sat,  7 Dec 2013 18:55:21 -0600 (CST)
Received: from localhost (localhost [127.0.0.1]) by smtp-out-1.01.com (Postfix) with ESMTP id 8D3CE3F41CD; Sat,  7 Dec 2013 18:55:21 -0600 (CST)
X-Virus-Scanned: amavisd-new at smtp-out-1.01.com
Received: from smtp.01.com ([127.0.0.1]) by localhost (smtp-out-1.01.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id WMQDrQd9fdVu; Sat,  7 Dec 2013 18:55:21 -0600 (CST)
Received: from [10.0.0.12] (c-24-5-172-97.hsd1.ca.comcast.net [24.5.172.97]) by smtp-out-1.01.com (Postfix) with ESMTPSA id B19683F41B4; Sat,  7 Dec 2013 18:55:20 -0600 (CST)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 7.0 \(1822\))
From: Franck Martin <franck@peachymango.org>
In-Reply-To: <WM!5daac5ba8130cfe4bef566486885b45a278da8d9ac5272a4640196eb047cb3553a3fdb453e93e2b65d5309e364664066!@asav-3.01.com>
Date: Sat, 7 Dec 2013 16:55:49 -0800
Content-Transfer-Encoding: quoted-printable
Message-Id: <E5EEF917-6022-41BF-8CFB-4840F0010D36@peachymango.org>
References: <20131207234144.82970.qmail@joyce.lan> <WM!5daac5ba8130cfe4bef566486885b45a278da8d9ac5272a4640196eb047cb3553a3fdb453e93e2b65d5309e364664066!@asav-3.01.com>
To: John Levine <johnl@taugh.com>
X-Mailer: Apple Mail (2.1822)
Cc: dmarc@ietf.org, "Murray S. Kucherawy" <superuser@gmail.com>
Subject: Re: [dmarc-ietf] New Version Notification for draft-kucherawy-dmarc-base-02.txt
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 08 Dec 2013 00:55:28 -0000

On Dec 7, 2013, at 3:41 PM, John Levine <johnl@taugh.com> wrote:

> In case it wasn't obvious, in new 11.2.2, the use of "!~q!}{." as the
> unique-id in the filename was a hint that you might want to reconsider
> the ABNF in section 11.2.1 that defines unique-id as a MIME token,
> which can be nearly any random text characters, and instead constrain
> it to characters that won't confuse shell scripts or simpleminded
> filename parsers and the like.  (I know that bad people can send
> anything they want as a filename, but this way you can just reject
> stuff with crud in the name rather than trying to handle it.)
>=20
> In the existing mail reports, the unique-id is optional, and when I
> looked through the reports I've gotten, the only reporter that uses
> one is Linkedin.  Theirs is always the string "dhalia" which isn't
> very unique so I expect it's a bug.
>=20

It is not a bug, and it is not unique. It depends where you report is =
generated from. We can generate several reports for the same =
(timestart,timeend,domain). The unique id allows you to know you have =
not received a duplicate.

This is one of the purpose of this uniqueid: to avoid to have to collate =
all the data in one location.

see =
https://github.com/linkedin/dmarc-msys/blob/master/dmarc_report.py#L44 =
and =
https://github.com/linkedin/dmarc-msys/blob/master/dmarc_report.py#L171


From prvs=0047e5a481=johnl@taugh.com  Sat Dec  7 17:00:36 2013
Return-Path: <prvs=0047e5a481=johnl@taugh.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 54A011AE471 for <dmarc@ietfa.amsl.com>; Sat,  7 Dec 2013 17:00:36 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.792
X-Spam-Level: 
X-Spam-Status: No, score=-3.792 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, GB_I_LETTER=-2, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_DKIM_INVALID=0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1k_RmoydUvvw for <dmarc@ietfa.amsl.com>; Sat,  7 Dec 2013 17:00:34 -0800 (PST)
Received: from leila.iecc.com (leila6.iecc.com [IPv6:2001:470:1f07:1126:0:4c:6569:6c61]) by ietfa.amsl.com (Postfix) with ESMTP id 64DAC1AE46D for <dmarc@ietf.org>; Sat,  7 Dec 2013 17:00:34 -0800 (PST)
Received: (qmail 23925 invoked from network); 8 Dec 2013 01:00:29 -0000
Received: from leila.iecc.com (64.57.183.34) by mail1.iecc.com with QMQP; 8 Dec 2013 01:00:29 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=iecc.com; h=date:from:to:cc:subject:in-reply-to:message-id:references:mime-version:content-type:user-agent:cleverness; s=52a3c4ad.xn--3zv.k1310; i=sendmail-bs@submit.iecc.com; bh=qHBvi/WpZX5SZRUn/TS6ryP4DYoZoznVZibbNiiTXjU=; b=qxXHa0auw3PhXbVW/YoYLPRgbR4H4tlmgH8HlAtSvFuUldRSky0icPxbo3zOleMAP0OWr8oCdt1bzCCD77zt+HwsE9SVTdIf5SgEz2yrGkrPd1vSIbokOUm8Qwtvcr2oBRB2MIyPSXTLfiVUommrJX9LK9k7nkRpLVwp1vOqwNQFUxxCZa1QclRTRgFmYZ5A0avAbY9bD7V8iMRilYg2D8KrXlB6b2Lviot6uT6TMdDDtFkFmlmBg2/FCb693sJH
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=taugh.com; h=date:from:to:cc:subject:in-reply-to:message-id:references:mime-version:content-type:user-agent:cleverness; s=52a3c4ad.xn--3zv.k1310; olt=sendmail-bs@submit.iecc.com; bh=qHBvi/WpZX5SZRUn/TS6ryP4DYoZoznVZibbNiiTXjU=; b=Far2NpSCdUaMuJxwsuYLt8hW4XriTYDIpCr5acebXCftFro0gkZHMVqFAgID62VHiVu46LzSN2hHpE0uVy1+TSYGt8nx2f8NROJ/sQVrLdBY4yBt/Xj8tdsSdbT6PVVWcyEHDqpAQbVHDYmeGHiehTsXN3YaHYvfgh8vKm7j1iQ5WwCxpn/JUn5C7eeVp1qTr3aNWm3bsTJTp11OyB7yApbyLUsaHyLgUOXhhDPlUM0YhbNC6zmTFAVo/em9noPm
Received: from localhost (sendmail-bs@127.0.0.1) by localhost with SMTP; 8 Dec 2013 01:00:28 -0000
Date: Sat, 7 Dec 2013 20:00:28 -0500 (EST)
From: John R Levine <johnl@taugh.com>
To: Franck Martin <franck@peachymango.org>
In-Reply-To: <E5EEF917-6022-41BF-8CFB-4840F0010D36@peachymango.org>
Message-ID: <alpine.BSF.2.00.1312071958490.83382@joyce.lan>
References: <20131207234144.82970.qmail@joyce.lan> <WM!5daac5ba8130cfe4bef566486885b45a278da8d9ac5272a4640196eb047cb3553a3fdb453e93e2b65d5309e364664066!@asav-3.01.com> <E5EEF917-6022-41BF-8CFB-4840F0010D36@peachymango.org>
User-Agent: Alpine 2.00 (BSF 1167 2008-08-23)
Cleverness: None detected
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII; format=flowed
Cc: dmarc@ietf.org
Subject: Re: [dmarc-ietf] New Version Notification for draft-kucherawy-dmarc-base-02.txt
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 08 Dec 2013 01:00:36 -0000

>> In the existing mail reports, the unique-id is optional, and when I
>> looked through the reports I've gotten, the only reporter that uses
>> one is Linkedin.  Theirs is always the string "dhalia" which isn't
>> very unique so I expect it's a bug.
>
> It is not a bug, and it is not unique. It depends where you report is generated from. We can generate several reports for the same (timestart,timeend,domain). The unique id allows you to know you have not received a duplicate.
>
> This is one of the purpose of this uniqueid: to avoid to have to collate all the data in one location.

Oh, OK.  Usually people pick something that doesn't look like the the name 
of the programmer's girlfriend, or maybe his cat.

In any event, it still looks like limiting the unique ID to letters and 
digits won't break anything.

Regards,
John Levine, johnl@taugh.com, Taughannock Networks, Trumansburg NY
Please consider the environment before reading this e-mail.

From franck@peachymango.org  Sat Dec  7 17:22:24 2013
Return-Path: <franck@peachymango.org>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5FC0E1AE169 for <dmarc@ietfa.amsl.com>; Sat,  7 Dec 2013 17:22:24 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.902
X-Spam-Level: 
X-Spam-Status: No, score=-3.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, GB_I_LETTER=-2, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7wZD0qIbPtrJ for <dmarc@ietfa.amsl.com>; Sat,  7 Dec 2013 17:22:23 -0800 (PST)
Received: from smtp.01.com (smtp.01.com [199.36.142.181]) by ietfa.amsl.com (Postfix) with ESMTP id E16501AE15A for <dmarc@ietf.org>; Sat,  7 Dec 2013 17:22:22 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by smtp-out-1.01.com (Postfix) with ESMTP id C89583F418C; Sat,  7 Dec 2013 19:22:18 -0600 (CST)
X-Virus-Scanned: amavisd-new at smtp-out-1.01.com
Received: from smtp.01.com ([127.0.0.1]) by localhost (smtp-out-1.01.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id U9X6DwCYKc6u; Sat,  7 Dec 2013 19:22:18 -0600 (CST)
Received: from smtp.01.com (localhost [127.0.0.1]) by smtp-out-1.01.com (Postfix) with ESMTP id A68C93F41C3; Sat,  7 Dec 2013 19:22:18 -0600 (CST)
Received: from localhost (localhost [127.0.0.1]) by smtp-out-1.01.com (Postfix) with ESMTP id 900EF3F41B4; Sat,  7 Dec 2013 19:22:18 -0600 (CST)
X-Virus-Scanned: amavisd-new at smtp-out-1.01.com
Received: from smtp.01.com ([127.0.0.1]) by localhost (smtp-out-1.01.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id KuubSbTMtjvy; Sat,  7 Dec 2013 19:22:18 -0600 (CST)
Received: from [10.0.0.12] (c-24-5-172-97.hsd1.ca.comcast.net [24.5.172.97]) by smtp-out-1.01.com (Postfix) with ESMTPSA id EBA223F418C; Sat,  7 Dec 2013 19:22:17 -0600 (CST)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 7.0 \(1822\))
From: Franck Martin <franck@peachymango.org>
In-Reply-To: <WM!26eff2d1ccc2e7052eb7fd1716167d2e4832aab2e9f74da371a36a6f53625116b410299056d4186410efeeb6e58441b4!@asav-3.01.com>
Date: Sat, 7 Dec 2013 17:22:46 -0800
Content-Transfer-Encoding: quoted-printable
Message-Id: <97371680-8922-45DA-BEAC-EA03EA6D15AA@peachymango.org>
References: <20131207234144.82970.qmail@joyce.lan> <WM!5daac5ba8130cfe4bef566486885b45a278da8d9ac5272a4640196eb047cb3553a3fdb453e93e2b65d5309e364664066!@asav-3.01.com> <E5EEF917-6022-41BF-8CFB-4840F0010D36@peachymango.org> <alpine.BSF.2.00.1312071958490.83382@joyce.lan> <WM!26eff2d1ccc2e7052eb7fd1716167d2e4832aab2e9f74da371a36a6f53625116b410299056d4186410efeeb6e58441b4!@asav-3.01.com>
To: John R Levine <johnl@taugh.com>
X-Mailer: Apple Mail (2.1822)
Cc: dmarc@ietf.org
Subject: Re: [dmarc-ietf] New Version Notification for draft-kucherawy-dmarc-base-02.txt
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 08 Dec 2013 01:22:24 -0000

On Dec 7, 2013, at 5:00 PM, John R Levine <johnl@taugh.com> wrote:

>>> In the existing mail reports, the unique-id is optional, and when I
>>> looked through the reports I've gotten, the only reporter that uses
>>> one is Linkedin.  Theirs is always the string "dhalia" which isn't
>>> very unique so I expect it's a bug.
>>=20
>> It is not a bug, and it is not unique. It depends where you report is =
generated from. We can generate several reports for the same =
(timestart,timeend,domain). The unique id allows you to know you have =
not received a duplicate.
>>=20
>> This is one of the purpose of this uniqueid: to avoid to have to =
collate all the data in one location.
>=20
> Oh, OK.  Usually people pick something that doesn't look like the the =
name of the programmer's girlfriend, or maybe his cat.

You lack imagination... :P

>=20
> In any event, it still looks like limiting the unique ID to letters =
and digits won't break anything.
>=20

Agreed


From jgomez@seryrich.com  Mon Dec 23 14:18:40 2013
Return-Path: <jgomez@seryrich.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1BD0D1AE0B0 for <dmarc@ietfa.amsl.com>; Mon, 23 Dec 2013 14:18:40 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.798
X-Spam-Level: 
X-Spam-Status: No, score=0.798 tagged_above=-999 required=5 tests=[BAYES_50=0.8, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wjQnTVUDDNap for <dmarc@ietfa.amsl.com>; Mon, 23 Dec 2013 14:18:38 -0800 (PST)
Received: from eh.msi.es (eh.msi.es [213.27.239.123]) by ietfa.amsl.com (Postfix) with ESMTP id CB39D1AE2F6 for <dmarc@ietf.org>; Mon, 23 Dec 2013 14:18:37 -0800 (PST)
Received: from servidor3 (62.82.191.195) by exchange01.exchange.msi.es (192.168.223.3) with Microsoft SMTP Server (TLS) id 8.3.298.1; Mon, 23 Dec 2013 23:18:32 +0100
Message-ID: <FD23CA672DB84CAC8D557038730D445F@fgsr.local>
From: "J. Gomez" <jgomez@seryrich.com>
To: <dmarc@ietf.org>
References: <20131218024625.3682.qmail@joyce.lan><77426B543150464AA3F30DF1A91365DE6AE3D350@ESV4-MBX02.linkedin.biz><alpine.BSF.2.00.1312201434530.2774@joyce.lan><412E757C-2B55-42AE-9D45-2E77EF5B4D79@schmitt.ca><alpine.BSF.2.00.1312201523300.35058@joyce.lan> <CAGGEJxZ-1E5hB=4Hs279j_CGO5hsHTuWSawvW3XfY+TbrcJ4FA@mail.gmail.com>
Date: Mon, 23 Dec 2013 23:24:07 +0100
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.3790.4657
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.3790.4913
Subject: Re: [dmarc-ietf] [dmarc-discuss] the endless list argument, was Opinions, Please?
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 23 Dec 2013 22:18:40 -0000

On Friday, December 20, 2013 11:26 PM [GMT+1=3DCET], Al Iverson wrote:

> I found it trivial to modify my own mailing list software to simply
> rewrite the From header so that the sender and visible from are "the
> list" instead of "the person." That way the list domain's reputation
> and policy apply, not the poster's. I recognize that John abhors this
> as a solution, but I do want to remind folks that there are other
> options to make everything play together nicely, if desired. Time will
> tell with regard to what ends up getting most often adopted.

It depends on what you consider "adoption" of DMARC. I see no problem =
adopting DMARC to the "p=3Dnone" level, but there is NO WAY I will =
publish "p=3Dreject" or "p=3Dquarantine" in any email-enabled domain =
under my control.

And of course, I will NEVER check DMARC in incoming email, because I =
CANNOT trust others publishing DMARC records to understand the fine =
nuances of DMARC interoperability issues.

Why will I do that? Because life is hard enough, and time is precious =
enough, to waste them fighting useless battles.

So, does that count as me "adopting" DMARC? I guess it's debatable.

Regards,

J. Gomez

