
From nobody Tue Dec  2 15:53:45 2014
Return-Path: <doug.mtview@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 16C991A1A94 for <dmarc@ietfa.amsl.com>; Tue,  2 Dec 2014 15:53:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.9
X-Spam-Level: *
X-Spam-Status: No, score=1.9 tagged_above=-999 required=5 tests=[BAYES_50=0.8,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, J_CHICKENPOX_110=0.6, J_CHICKENPOX_16=0.6, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WxB2ZzVaFtrq for <dmarc@ietfa.amsl.com>; Tue,  2 Dec 2014 15:53:43 -0800 (PST)
Received: from mail-ie0-x22e.google.com (mail-ie0-x22e.google.com [IPv6:2607:f8b0:4001:c03::22e]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1C73D1A1EF1 for <dmarc@ietf.org>; Tue,  2 Dec 2014 15:53:43 -0800 (PST)
Received: by mail-ie0-f174.google.com with SMTP id rl12so12299957iec.5 for <dmarc@ietf.org>; Tue, 02 Dec 2014 15:53:42 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=subject:mime-version:content-type:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=VSg20Ipip6DLgrbCE2/FWsTXu+AHmH3ubxx3i9qIJAI=; b=REVqP/KlckEKzoBxT8oyetmgswOruVGW1otTTl+rw4/S7eUWcbPaVZql48JCnZSfW9 SE60cGBVCO2MRmUS+y84mSzK5SVkG/dITWMC8gc88ZELbMh20S9oYkNHc56SvUNw/HtK A6XCIBLkkU+WME0bX+ywca0ohNaxDYtvyL21dVdnMpcGjSJwUiluP+U28OBNlu9I4nzN 0nLF77dgJAopkWCjtMiNHY4zKXwjDvu34X96AIghL5nY9gus3JlZDaUrpNrUzQCmczqW kYG+7WDZQi9Uf/2SPWZMnfSWp/th+vsSXvb/vr1gxD3upvxUd2DtN0QY1y7FFsvhFPEL pmYA==
X-Received: by 10.107.154.10 with SMTP id c10mr2065472ioe.78.1417564422099; Tue, 02 Dec 2014 15:53:42 -0800 (PST)
Received: from [192.168.0.54] (107-0-5-6-ip-static.hfc.comcastbusiness.net. [107.0.5.6]) by mx.google.com with ESMTPSA id lo1sm3065787igb.8.2014.12.02.15.53.40 for <multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Tue, 02 Dec 2014 15:53:40 -0800 (PST)
Mime-Version: 1.0 (Mac OS X Mail 7.3 \(1878.6\))
Content-Type: text/plain; charset=iso-8859-1
From: Douglas Otis <doug.mtview@gmail.com>
In-Reply-To: <547B3AD5.6080608@isdg.net>
Date: Tue, 2 Dec 2014 15:53:38 -0800
Content-Transfer-Encoding: quoted-printable
Message-Id: <14E927A9-E064-4557-A420-62068F4C1722@gmail.com>
References: <2140954939.2054796.1417088097368.JavaMail.zimbra@anubisnetworks.com> <WM!970944e167ae048a91a635150f9f3855a2d603836d521c5229f0cbbc2db6b425d0c72a9d048cbe7a72c5cd43585174ac!@asav-2.01.com> <84727963.90926.1417116923261.JavaMail.zimbra@peachymango.org> <604251448.2117889.1417166505526.JavaMail.zimbra@anubisnetworks.com> <871tomo7ai.fsf@uwakimon.sk.tsukuba.ac.jp> <473201342.2157870.1417262661092.JavaMail.zimbra@anubisnetworks.com> <547B3AD5.6080608@isdg.net>
To: Hector Santos <hsantos@isdg.net>
X-Mailer: Apple Mail (2.1878.6)
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/VjMIwKl5-tA6pRqm0AacRULBGwU
Cc: =?iso-8859-1?Q?Jos=E9_Ferreira?= <jose.ferreira@anubisnetworks.com>, dmarc@ietf.org, Douglas Otis <doug.mtview@gmail.com>
Subject: Re: [dmarc-ietf] DMARC and Bounces (was: Indirect Mail Flows)
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Dec 2014 23:53:45 -0000

On Nov 30, 2014, at 7:42 AM, Hector Santos <hsantos@isdg.net> wrote:

> On 11/29/2014 7:04 AM, Jos=E9 Ferreira wrote:
>>=20
>> Like is said, they are rare but important. And some domain owners may =
not adopt p=3Dreject for that reason.
>>=20
>> Jose Borges Ferreira
>=20
> Domains that publish a p=3Dreject and don 't understand its possible =
outcomes, shouldn't be our (IETF protocol standards development) =
problem.  It helps to know they exist, but they should not be the reason =
for throwing out the proverbial baby out the window.

Dear Hector,

DMARC is throwing out three decades of defined header field roles for =
Author and Sender and is not compatible with email.  This happens when =
the =46rom MUST have the same domain as that of the Sender to achieve =
the DMARC required alignment.  This is not possible when dealing with =
various third-party services, such as mailing-lists or even offering the =
disrupted services DSNs.=20

> We are not going to solve the mailing list problem UNTIL the mailing =
list folks (software developers) change their software TO SUPPORT =
Policy.  We still have people that are trying to avoid it, FOR 10 YEARS, =
and that avoidance has not worked!

Strongly disagree. DMARC does not permit legitimate and valid email to =
be accepted from a third-party service which disrupts valid email uses.

These include:

-- forwarding of email to a different domain (as might be done with =
alumni accounts)

-- use of third-party services where the =46rom header field properly =
retains the role of the Author as stipulated by RFC5322

DMARC assumes users are unable to understand message sources based on =
the Sender header field, where the source agent role has been defined.  =
In fact, the Sender should not be placed into the =46rom header field.  =
Once that dubious practice becomes required, even guessing who authored =
a message becomes doubtful.

> Its really that simple, however, the complete integrated solution is =
COMPLEX (and costly) and for the most part, only a total system =
integration can handle it.   If you (speaking in general) only have a =
MAILING LIST package, well, you need to wait for the other parts to fit =
in as well and vice versa.

Is it really overly complex to make Sender header fields visible to =
users?  This should remove justifications for rejecting otherwise valid =
and legitimate messages.  If so, no changes would be needed when Sender =
header fields comply with either SPF or DKIM.  It seems DMARC needs a =
fallback mode for policies imposed by DMARC domains to override =
miss-applying DMARC policy against normal email accounts.  As it is now, =
the best that can be done is to downgrade p=3Dreject to p=3Dquarantine.  =
Users are then expected to find valid messages being placed into their =
spam folders, which defeats stronger protections otherwise afforded when =
users are informed acceptance is based on a strict policy of either =46rom=
 or the Sender header field alignment.  It only makes sense for =
transactional sources to exclude otherwise legitimate forms of email =
that includes the Sender header field.  As such, DMARC should have a =
setting to explicitly include use of the Sender header field alignment.  =
Otherwise, DMARC remains incompatible with email.

> All I reading (and it seems to be subsiding) are ML folks trying to =
advocate avoiding domains with strong, restrictive policies.  Well, =
can't have it both ways.  Intentional ignorance and expectation that =
things will continue to work and integrate well, is in my strong =
technical software engineering opinion, unrealistic.

If policies are to be strictly enforced, they should offer a mode that =
permits valid and legitimate email.  As currently defined, DMARC can't.

> All parts need to fit together and since its a multi-component =
integration problem, there are only a few packages that can do that. =
That is what makes this a long time difficult problem to solve.  You =
have systems people, operations, networks, mailing list people, etc and =
most have different goals and agendas.

DMARC is attempting to satisfy a narrow range of services where the =46rom=
 and the Sender header fields must be within the same domain.  When =
domains such as AOL and Yahoo decide their users' messages must be =
strictly enforced in this manner, this non-compliant policy disrupts =
many normal, expected, and legitimate email.  This disrupts email's =
agility at meeting a broad range of uses and has the effect of =
balkanizing these services.

It is DMARC that is being unrealistic.

Regards,
Douglas Otis





From nobody Tue Dec  2 16:25:18 2014
Return-Path: <mfidelman@meetinghouse.net>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 866561A8873 for <dmarc@ietfa.amsl.com>; Tue,  2 Dec 2014 16:25:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 3.019
X-Spam-Level: ***
X-Spam-Status: No, score=3.019 tagged_above=-999 required=5 tests=[BAYES_50=0.8, J_CHICKENPOX_110=0.6, J_CHICKENPOX_16=0.6, MISSING_HEADERS=1.021, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0sXby147F364 for <dmarc@ietfa.amsl.com>; Tue,  2 Dec 2014 16:25:13 -0800 (PST)
Received: from server1.neighborhoods.net (server1.neighborhoods.net [207.154.13.48]) by ietfa.amsl.com (Postfix) with ESMTP id BC8E11A8860 for <dmarc@ietf.org>; Tue,  2 Dec 2014 16:25:13 -0800 (PST)
Received: from localhost (localhost.localdomain [127.0.0.1]) by server1.neighborhoods.net (Postfix) with ESMTP id EB58ACC0FD for <dmarc@ietf.org>; Tue,  2 Dec 2014 19:25:12 -0500 (EST)
X-Virus-Scanned: by amavisd-new-2.6.2 (20081215) (Debian) at neighborhoods.net
Received: from server1.neighborhoods.net ([127.0.0.1]) by localhost (server1.neighborhoods.net [127.0.0.1]) (amavisd-new, port 10024) with LMTP id G9low7QDRvwU for <dmarc@ietf.org>; Tue,  2 Dec 2014 19:25:04 -0500 (EST)
Received: from new-host-3.home (pool-173-76-231-196.bstnma.fios.verizon.net [173.76.231.196]) by server1.neighborhoods.net (Postfix) with ESMTPSA id DF2E5CC0F7 for <dmarc@ietf.org>; Tue,  2 Dec 2014 19:25:03 -0500 (EST)
Message-ID: <547E585F.1070604@meetinghouse.net>
Date: Tue, 02 Dec 2014 19:25:03 -0500
From: Miles Fidelman <mfidelman@meetinghouse.net>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:33.0) Gecko/20100101 Firefox/33.0 SeaMonkey/2.30
MIME-Version: 1.0
CC: dmarc@ietf.org
References: <2140954939.2054796.1417088097368.JavaMail.zimbra@anubisnetworks.com> <WM!970944e167ae048a91a635150f9f3855a2d603836d521c5229f0cbbc2db6b425d0c72a9d048cbe7a72c5cd43585174ac!@asav-2.01.com> <84727963.90926.1417116923261.JavaMail.zimbra@peachymango.org> <604251448.2117889.1417166505526.JavaMail.zimbra@anubisnetworks.com> <871tomo7ai.fsf@uwakimon.sk.tsukuba.ac.jp> <473201342.2157870.1417262661092.JavaMail.zimbra@anubisnetworks.com> <547B3AD5.6080608@isdg.net> <14E927A9-E064-4557-A420-62068F4C1722@gmail.com>
In-Reply-To: <14E927A9-E064-4557-A420-62068F4C1722@gmail.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: quoted-printable
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/BtwlNNeJlMpYMydJfI6l12sMasw
Subject: Re: [dmarc-ietf] DMARC and Bounces
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 03 Dec 2014 00:25:15 -0000

Douglas Otis wrote:
> On Nov 30, 2014, at 7:42 AM, Hector Santos <hsantos@isdg.net> wrote:
>
>> On 11/29/2014 7:04 AM, Jos=E9 Ferreira wrote:
>>> Like is said, they are rare but important. And some domain owners may=
 not adopt p=3Dreject for that reason.
>>>
>>> Jose Borges Ferreira
>> Domains that publish a p=3Dreject and don 't understand its possible o=
utcomes, shouldn't be our (IETF protocol standards development) problem. =
 It helps to know they exist, but they should not be the reason for throw=
ing out the proverbial baby out the window.
> Dear Hector,
>
> DMARC is throwing out three decades of defined header field roles for A=
uthor and Sender and is not compatible with email.  This happens when the=
 From MUST have the same domain as that of the Sender to achieve the DMAR=
C required alignment.  This is not possible when dealing with various thi=
rd-party services, such as mailing-lists or even offering the disrupted s=
ervices DSNs.
>
>> We are not going to solve the mailing list problem UNTIL the mailing l=
ist folks (software developers) change their software TO SUPPORT Policy. =
 We still have people that are trying to avoid it, FOR 10 YEARS, and that=
 avoidance has not worked!
> Strongly disagree. DMARC does not permit legitimate and valid email to =
be accepted from a third-party service which disrupts valid email uses.
>
> These include:
>
> -- forwarding of email to a different domain (as might be done with alu=
mni accounts)
>
> -- use of third-party services where the From header field properly ret=
ains the role of the Author as stipulated by RFC5322
>
> DMARC assumes users are unable to understand message sources based on t=
he Sender header field, where the source agent role has been defined.  In=
 fact, the Sender should not be placed into the From header field.  Once =
that dubious practice becomes required, even guessing who authored a mess=
age becomes doubtful.
>
>> Its really that simple, however, the complete integrated solution is C=
OMPLEX (and costly) and for the most part, only a total system integratio=
n can handle it.   If you (speaking in general) only have a MAILING LIST =
package, well, you need to wait for the other parts to fit in as well and=
 vice versa.
> Is it really overly complex to make Sender header fields visible to use=
rs?  This should remove justifications for rejecting otherwise valid and =
legitimate messages.  If so, no changes would be needed when Sender heade=
r fields comply with either SPF or DKIM.  It seems DMARC needs a fallback=
 mode for policies imposed by DMARC domains to override miss-applying DMA=
RC policy against normal email accounts.  As it is now, the best that can=
 be done is to downgrade p=3Dreject to p=3Dquarantine.  Users are then ex=
pected to find valid messages being placed into their spam folders, which=
 defeats stronger protections otherwise afforded when users are informed =
acceptance is based on a strict policy of either From or the Sender heade=
r field alignment.  It only makes sense for transactional sources to excl=
ude otherwise legitimate forms of email that includes the Sender header f=
ield.  As such, DMARC should have a setting to explicitly include use of =
the Sender header field alignment.  Otherwise, DMARC remains incompatible=
 with email.
>
>> All I reading (and it seems to be subsiding) are ML folks trying to ad=
vocate avoiding domains with strong, restrictive policies.  Well, can't h=
ave it both ways.  Intentional ignorance and expectation that things will=
 continue to work and integrate well, is in my strong technical software =
engineering opinion, unrealistic.
> If policies are to be strictly enforced, they should offer a mode that =
permits valid and legitimate email.  As currently defined, DMARC can't.
>
>> All parts need to fit together and since its a multi-component integra=
tion problem, there are only a few packages that can do that. That is wha=
t makes this a long time difficult problem to solve.  You have systems pe=
ople, operations, networks, mailing list people, etc and most have differ=
ent goals and agendas.
> DMARC is attempting to satisfy a narrow range of services where the Fro=
m and the Sender header fields must be within the same domain.  When doma=
ins such as AOL and Yahoo decide their users' messages must be strictly e=
nforced in this manner, this non-compliant policy disrupts many normal, e=
xpected, and legitimate email.  This disrupts email's agility at meeting =
a broad range of uses and has the effect of balkanizing these services.
>
> It is DMARC that is being unrealistic.
>
>

Agreed.

Miles Fidelman

--=20
In theory, there is no difference between theory and practice.
In practice, there is.   .... Yogi Berra



From nobody Wed Dec  3 12:37:19 2014
Return-Path: <ned+dmarc@mrochek.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C5B151A1B94 for <dmarc@ietfa.amsl.com>; Wed,  3 Dec 2014 12:37:17 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.412
X-Spam-Level: 
X-Spam-Status: No, score=-1.412 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, J_CHICKENPOX_16=0.6, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zPJTwyAN21Ol for <dmarc@ietfa.amsl.com>; Wed,  3 Dec 2014 12:37:13 -0800 (PST)
Received: from mauve.mrochek.com (mauve.mrochek.com [66.159.242.17]) by ietfa.amsl.com (Postfix) with ESMTP id 1D1261A1F02 for <dmarc@ietf.org>; Wed,  3 Dec 2014 12:37:13 -0800 (PST)
Received: from dkim-sign.mauve.mrochek.com by mauve.mrochek.com (PMDF V6.1-1 #35243) id <01PFOFDVWUK0005ARK@mauve.mrochek.com> for dmarc@ietf.org; Wed, 3 Dec 2014 12:32:10 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=mrochek.com; s=mauve; t=1417638733; bh=PLcXekVDlU/H/uWxvSAq5tL1PVklO9ObACJvJFOUEj0=; h=From:Cc:Date:Subject:In-reply-to:References:To; b=BMYEKeUEoXj/XfVsX5bJqKgv/t9GndwsYwf3oOBlhWlO/5kzkIi9ZYVahYKd5dv1E phAOL99d4yaxZlvSDrsEV/gLbhBy3WCkbRvmPvfO4UAnu0T88WcDmezMas3gtIeD5+ 59x7PxTFRHWDQhUKAmQOO/b9P/GX0ObBL7+gHyPM=
MIME-version: 1.0
Content-transfer-encoding: 7BIT
Content-type: text/plain; CHARSET=US-ASCII
Received: from mauve.mrochek.com by mauve.mrochek.com (PMDF V6.1-1 #35243) id <01PEV4HDAQXS00005K@mauve.mrochek.com> (original mail from NED@mauve.mrochek.com) for dmarc@ietf.org; Wed, 03 Dec 2014 12:32:05 -0800 (PST)
From: ned+dmarc@mrochek.com
Message-id: <01PFOFDSRCRC00005K@mauve.mrochek.com>
Date: Wed, 03 Dec 2014 12:16:15 -0800 (PST)
In-reply-to: "Your message dated Fri, 07 Nov 2014 23:26:03 -0800" <CAL0qLwbZRzTUjxS54g5tA_89Qyk=N9nhysKd52wOEfu3Y2QFPg@mail.gmail.com>
References: <CAL0qLwZ_6JW1=cFcsOLNK26zp0NG-tiNo7Q2t=sCPcqaYjvWcw@mail.gmail.com> <87d292z9k3.fsf@uwakimon.sk.tsukuba.ac.jp> <01PEMWEN5Q8W003WE3@mauve.mrochek.com> <BLU436-SMTP253EA25D463C800116EDEF8CA820@phx.gbl> <49460.113.148.46.181.1415422638.risu@infoshako.sk.tsukuba.ac.jp> <CAL0qLwbZRzTUjxS54g5tA_89Qyk=N9nhysKd52wOEfu3Y2QFPg@mail.gmail.com>
To: "Murray S. Kucherawy" <superuser@gmail.com>
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/xtfc_HYfe5nK_5OnK4tv6bOG6jA
Cc: "dmarc@ietf.org" <dmarc@ietf.org>, "J. Trent Adams" <jtrentadams@live.com>, ned+dmarc@mrochek.com, "Stephen J. Turnbull" <turnbull@sk.tsukuba.ac.jp>
Subject: Re: [dmarc-ietf] draft-kucherawy-dmarc-base feedback
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 03 Dec 2014 20:37:18 -0000

Apologies for the very late response, but since you asked me a direct question
about this I figured I owed you an answer.

"Murray S. Kucherawy" <superuser@gmail.com> wrote:

> On Fri, Nov 7, 2014 at 8:57 PM, <turnbull@sk.tsukuba.ac.jp> wrote:

> > Trent Adams writes:
> >
> > > -----
> > > It is important to note that identifier alignment cannot occur, and
> > > DMARC determination applied, with a message that is not valid per RFC
> > > 5322 [MAIL].  This is particularly true when a message has a malformed
> > > or absent RFC5322.From field.
> > > -----
> >
> > I occasionally see non-ASCII octets introduced by spam/virus checkers in
> > X-Spam-* fields in the header or in the (non-8-bit) message body, due to
> > copying message content into those contexts.  The From field is perfectly
> > valid, however.  Does that really mean that identifier alignment cannot
> > occur?
> >
> > (I think that is a plausible policy choice, since in an invalid message
> > "anything can happen".  But I don't see that it's a no-brainer.)
> >

> Do you have another suggestion?

> Note that there's nothing normative in Trent's suggestion.  If a receiver
> thinks it can continue with the X-Spam-* fields malformed as described,
> then it can continue on that basis.

> > > Starting off, we can ignore a <null> address in the RFC5322.From field
> > > as DMARC will have no bearing in that case.  Similarly, when there is
> > > exactly one address in the RFC5322.From field, application of DMARC is
> > > reasonably straight forward.
> >
> > By "DMARC", you really mean "DMARC policy", right?  DMARC the protocol
> > does need to say something about what happens if alignment fails or no
> > policy can be discovered.

Right, and the "no policy can be discovered" case breaks down into
two subcases, one where you have a valid message that simply doesn't
specify any domains with an associated DMARC policy in the right places, 
and an invalid message you can't make sense of.

My original point was that DMARC shouldn't make it a matter of compliance
to reject anything in the former space. The latter case is trickier, and
careful wording is required to deal with it.

> That's how I understood what he said.

> > > That leaves taking some action based on the DMARC policies associated
> > > with the set of domains represented in the RFC5322.From field.  It seems
> > > that the most reasonable approach is to gather the DMARC policies for
> > > all addresses, and then apply the most strict.
> >
> > I wouldn't call that "reasonable".  It's the only plausible option, but
> > here's the problematic use case:
> >
> > Co-Chairs Trent and Stephen decide to hold a meeting of The Committee.
> > For organizational political reasons it is necessary that (a) both names
> > appear on the memo and (b) Stephen has to do the dirty work.  Stephen
> > sends the mail "From: trent@example.com, stephen@example.org", with proper
> > SPF and DKIM setups.  Unfortunately, example.com publishes p=reject,
> > example.com alignment fails because Stephen sent the message, the MTAs
> > reject the message, and nobody except Trent and Stephen shows up to the
> > meeting.  I see two ways this message could pass DMARC: Stephen has the
> > keys for example.com, or the Japanese "ringi" system, where I write and
> > sign the message, send it to Trent, who then signs the message but
> > otherwise forwards it verbatim.  Both seem fragile to me.

> > OTOH, only checking policies of aligned SPF source domains and DKIM
> > signers means that Stephen (or any scammer) can add "POTUS@whitehouse.gov"
> > to the From field and pass DMARC.  It's obvious what the Felons of April
> > would do with that.

> > I guess the most plausible approach to this issue is to say that if you
> > want to use DMARC and have multiple authors, you must contrive to give all
> > the authors mailboxes in the same domain.  In the example, I could create
> > the-committee.example.org for committee members, or give trent a
> > forwarding mailbox at example.org itself.

> Ned, do you concur with this analysis?  Is Trent's proposal coupled with
> this caveat a valid remedy for your point?

Again, my point was in regards to cases of valid RFC 5322 mail where no DMARC
policy attached to anything. You're talking about a case where it does attach
here. So this isn't really a remedy for the issue I raised, but as a solution
to the problem posed, it seems like about the only one that makes sense.

That's not to say I like it, but the realities are what they are.

> > > Given all that, here's my suggested revision to Section 5.6.1.:
> > >
> > > -----
> > > 5.6.1.  Extract Author Domain
> > >
> > > In order to be processed by DMARC, the domain(s) must be extracted from
> > > the domain of the email address(es) within the addr-spec portion of the
> > > RFC5322.From field. If the domain is encoded with UTF-8, the domain name
> > > must be converted to an A-label for further processing. If no domain is
> > > found, the message SHOULD be rejected (as it is forbidden under RFC 5322
> >
> > I still don't think a null From filed is any business of DMARC the
> > protocol.  That's really an issue for (a) the security considerations
> > section or (b) the planned BCP.
> >

> I think we're all in agreement on that point so far.

> > > [MAIL]).  If more than one domain identifier is found, the full set of
> > > domains MAY be collected as a set of identifiers for DMARC processing.
> >
> > But this seems to be the insecure approach I describe above:
> >
> > >    5.  Conduct identifier alignment checks.  With authentication checks
> > >        and policy discovery performed, the Mail Receiver checks if
> > >        Authenticated Identifiers fall into alignment as described in
> > >        Section 3.  If one or more of the Authenticated Identifiers align
> > >        with an identifier extracted from the addr-spec of the
> > >        RFC5322.From domain, the message is considered to pass the
> > >        DMARC mechanism check.
> >
> > AFAICS this allows me (using a throwaway mailbox at a throwaway domain) to
> > send spam that passes DMARC on your behalf, as long as my mailbox appears
> > in From, too.  Am I misunderstanding your proposed algorithm?

> No, because in (6) the strictest rule applies.  Your throwaway domain might
> pass, but the other advertised author's would not.

Agreed.

> > >        All other conditions (authentication
> > >        failures, identifier mismatches) are considered to be DMARC
> > >        mechanism check failures.

> > Bottom line, I think both messages where no Authenticated Identifiers can
> > be extracted and those where multiple Authenticated Identifiers can be
> > extracted should be defined to be mechanism check failures.  In the former
> > case, policy discovery is impossible, in the latter, the strictest policy
> > should be applied.

> Right, I think that's what Trent is also saying.

> And everyone seems to agree on just dropping STARTTLS as well.

Good.

				Ned


From nobody Thu Dec 11 15:00:28 2014
Return-Path: <johnl@taugh.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A8A1F1A899B for <dmarc@ietfa.amsl.com>; Thu, 11 Dec 2014 15:00:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.663
X-Spam-Level: *
X-Spam-Status: No, score=1.663 tagged_above=-999 required=5 tests=[BAYES_50=0.8, HELO_MISMATCH_COM=0.553, HOST_MISMATCH_NET=0.311, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JpJdxb8ojeMX for <dmarc@ietfa.amsl.com>; Thu, 11 Dec 2014 15:00:22 -0800 (PST)
Received: from miucha.iecc.com (abusenet-1-pt.tunnel.tserv4.nyc4.ipv6.he.net [IPv6:2001:470:1f06:1126::2]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B88561A877B for <dmarc@ietf.org>; Thu, 11 Dec 2014 15:00:21 -0800 (PST)
Received: (qmail 88539 invoked from network); 11 Dec 2014 23:00:17 -0000
Received: from miucha.iecc.com (64.57.183.18) by mail1.iecc.com with QMQP; 11 Dec 2014 23:00:17 -0000
Date: 11 Dec 2014 22:59:58 -0000
Message-ID: <20141211225958.10749.qmail@ary.lan>
From: "John Levine" <johnl@taugh.com>
To: dmarc@ietf.org
In-Reply-To: <BL2SR01MB6054A8FBBD0432D1196008896630@BL2SR01MB605.namsdf01.sdf.exchangelabs.com>
Organization: 
X-Headerized: yes
Mime-Version: 1.0
Content-type: text/plain; charset=utf-8
Content-transfer-encoding: 8bit
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/0gByqvEcJoiVCe5i8D6RgiNCuZE
Cc: tzink@exchange.microsoft.com
Subject: Re: [dmarc-ietf] Phishing attacks on the Display From
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Dec 2014 23:00:25 -0000

>4.       Anything else?

Figure out how to display signed mail from famous brands in a
distinctive way analogous to browser green bars, and tell people
to look for that.

Crooks can figure out ways to misspell Paypal faster than you can
blacklist them, and half the time the crooks don't even bother to fake
the From: address any more, expecting people to pay attention to the
pretty graphics in the message body.

R's,
John

PS: The technology to do green bar S/MIME signatures is about 98% in
place now.


From nobody Thu Dec 11 16:57:17 2014
Return-Path: <tzink@exchange.microsoft.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5825E1A90D9 for <dmarc@ietfa.amsl.com>; Thu, 11 Dec 2014 16:57:16 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.798
X-Spam-Level: 
X-Spam-Status: No, score=0.798 tagged_above=-999 required=5 tests=[BAYES_50=0.8, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nEZK6mZdZC2N for <dmarc@ietfa.amsl.com>; Thu, 11 Dec 2014 16:57:14 -0800 (PST)
Received: from na01-sn2-obe.outbound.o365filtering.com (mail-sn2on0023.outbound.o365filtering.com [IPv6:2a01:111:f400:7c04::23]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 11F931A90C8 for <dmarc@ietf.org>; Thu, 11 Dec 2014 16:57:13 -0800 (PST)
Received: from BLUSR01MB601.namsdf01.sdf.exchangelabs.com (10.255.124.166) by BLUSR01MB601.namsdf01.sdf.exchangelabs.com (10.255.124.166) with Microsoft SMTP Server (TLS) id 15.1.53.3; Fri, 12 Dec 2014 00:56:49 +0000
Received: from BLUSR01MB601.namsdf01.sdf.exchangelabs.com ([169.254.4.152]) by BLUSR01MB601.namsdf01.sdf.exchangelabs.com ([169.254.4.152]) with mapi id 15.01.0053.000; Fri, 12 Dec 2014 00:56:49 +0000
From: Terry Zink <tzink@exchange.microsoft.com>
To: John Levine <johnl@taugh.com>, "dmarc@ietf.org" <dmarc@ietf.org>
Thread-Topic: [dmarc-ietf] Phishing attacks on the Display From
Thread-Index: AdAVlNRs8SfCDeiSSrmuo4sG2LBxBQAAVsUAAAQF7gA=
Date: Fri, 12 Dec 2014 00:56:49 +0000
Message-ID: <BLUSR01MB6013689E192A8F46B3E35A496600@BLUSR01MB601.namsdf01.sdf.exchangelabs.com>
References: <BL2SR01MB6054A8FBBD0432D1196008896630@BL2SR01MB605.namsdf01.sdf.exchangelabs.com> <20141211225958.10749.qmail@ary.lan>
In-Reply-To: <20141211225958.10749.qmail@ary.lan>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [2001:4898:80e0:ee43::2]
x-microsoft-antispam: BCL:0;PCL:0;RULEID:;SRVR:BLUSR01MB601;
authentication-results: spf=none (sender IP is ) smtp.mailfrom=tzink@exchange.microsoft.com; 
x-exchange-antispam-report-test: UriScan:;
x-exchange-antispam-report-cfa-test: BCL:0;PCL:0;RULEID:;SRVR:BLUSR01MB601;
x-forefront-prvs: 04238CD941
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(6009001)(189002)(199003)(13464003)(377454003)(97736003)(2501002)(21056001)(106356001)(64706001)(20776003)(105586002)(50986999)(54356999)(76176999)(46102003)(86362001)(77156002)(92566001)(54206007)(101416001)(33656002)(19580405001)(19580395003)(120916001)(99396003)(31966008)(87936001)(2656002)(107886001)(107046002)(4396001)(62966003)(54606007)(68736005)(102836002)(15975445007)(3826002); DIR:OUT; SFP:1102; SCL:1; SRVR:BLUSR01MB601; H:BLUSR01MB601.namsdf01.sdf.exchangelabs.com; FPR:; SPF:None; PTR:InfoNoRecords; MX:1; A:1; LANG:en; 
received-spf: None (protection.outlook.com: exchange.microsoft.com does not designate permitted sender hosts)
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: exchange.microsoft.com
X-MS-Exchange-CrossTenant-originalarrivaltime: 12 Dec 2014 00:56:49.1784 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: f686d426-8d16-42db-81b7-ab578e110ccd
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BLUSR01MB601
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/xesLXGJ1QGJKd_SC_Swh8COPTVU
Subject: Re: [dmarc-ietf] Phishing attacks on the Display From
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 12 Dec 2014 00:57:16 -0000

> Figure out how to display signed mail from famous brands in a
> distinctive way analogous to browser green bars, and tell people
> to look for that. The technology to do green bar S/MIME signatures=20
> is about 98% in place now.

1. Hotmail/outlook.com puts a green shield in the web UX in front of truste=
d senders who authenticate. Is that what you mean?

2. They do it based upon SPF/DKIM + sender's brand is on their internal lis=
t. How is that different than the S/MIME thing you mention?

-- Terry

-----Original Message-----
From: dmarc [mailto:dmarc-bounces@ietf.org] On Behalf Of John Levine
Sent: Thursday, December 11, 2014 3:00 PM
To: dmarc@ietf.org
Cc: Terry Zink
Subject: Re: [dmarc-ietf] Phishing attacks on the Display From

>4.       Anything else?

Figure out how to display signed mail from famous brands in a
distinctive way analogous to browser green bars, and tell people
to look for that.

Crooks can figure out ways to misspell Paypal faster than you can
blacklist them, and half the time the crooks don't even bother to fake
the From: address any more, expecting people to pay attention to the
pretty graphics in the message body.

R's,
John

PS: The technology to do green bar S/MIME signatures is about 98% in
place now.

_______________________________________________
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


From nobody Thu Dec 11 17:07:30 2014
Return-Path: <dhc@dcrocker.net>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5B7C91A1A2D for <dmarc@ietfa.amsl.com>; Thu, 11 Dec 2014 17:07:18 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id d3YCwvj1KR0x for <dmarc@ietfa.amsl.com>; Thu, 11 Dec 2014 17:07:12 -0800 (PST)
Received: from sbh17.songbird.com (sbh17.songbird.com [72.52.113.17]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 713381A00C3 for <dmarc@ietf.org>; Thu, 11 Dec 2014 17:07:12 -0800 (PST)
Received: from [192.168.0.8] (cpe-76-93-128-63.san.res.rr.com [76.93.128.63]) (authenticated bits=0) by sbh17.songbird.com (8.13.8/8.13.8) with ESMTP id sBC175JU020150 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT); Thu, 11 Dec 2014 17:07:09 -0800
Message-ID: <548A3FA6.1070808@dcrocker.net>
Date: Thu, 11 Dec 2014 17:06:46 -0800
From: Dave Crocker <dhc@dcrocker.net>
Organization: Brandenburg InternetWorking
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: Terry Zink <tzink@exchange.microsoft.com>, John Levine <johnl@taugh.com>,  "dmarc@ietf.org" <dmarc@ietf.org>
References: <BL2SR01MB6054A8FBBD0432D1196008896630@BL2SR01MB605.namsdf01.sdf.exchangelabs.com> <20141211225958.10749.qmail@ary.lan> <BLUSR01MB6013689E192A8F46B3E35A496600@BLUSR01MB601.namsdf01.sdf.exchangelabs.com>
In-Reply-To: <BLUSR01MB6013689E192A8F46B3E35A496600@BLUSR01MB601.namsdf01.sdf.exchangelabs.com>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.0 (sbh17.songbird.com [72.52.113.66]); Thu, 11 Dec 2014 17:07:09 -0800 (PST)
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/uvcdgEezUvoqPJqX4F6B0hKmhSg
Subject: Re: [dmarc-ietf] Phishing attacks on the Display From
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: dcrocker@bbiw.net
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 12 Dec 2014 01:07:19 -0000

On 12/11/2014 4:56 PM, Terry Zink wrote:
>> Figure out how to display signed mail from famous brands in a 
>> distinctive way analogous to browser green bars, and tell people to
>> look for that. The technology to do green bar S/MIME signatures is
>> about 98% in place now.
> 
> 1. Hotmail/outlook.com puts a green shield in the web UX in front of
> trusted senders who authenticate. Is that what you mean?

Do you have some empirical data that that's useful, at scale?  That is,
that is reduces end-user mistakes?


>From your previous note:

> How do we combat Display From (Friendly From) attacks? For example:

The very difficult challenge, here, is to define the vulnerability
sufficiently precisely so that we can consider remedies while not
killing the utility of the field.  That's the simpler technical
challenge.  The more difficult one is the same as I ask about above:
Proving efficacy.

d/

-- 
Dave Crocker
Brandenburg InternetWorking
bbiw.net


From nobody Thu Dec 11 19:42:42 2014
Return-Path: <johnl@taugh.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1234A1A1B4B for <dmarc@ietfa.amsl.com>; Thu, 11 Dec 2014 19:42:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.137
X-Spam-Level: 
X-Spam-Status: No, score=-1.137 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HELO_MISMATCH_COM=0.553, HOST_MISMATCH_NET=0.311, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Z3jKjt-0_RZw for <dmarc@ietfa.amsl.com>; Thu, 11 Dec 2014 19:42:40 -0800 (PST)
Received: from miucha.iecc.com (abusenet-1-pt.tunnel.tserv4.nyc4.ipv6.he.net [IPv6:2001:470:1f06:1126::2]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AD5E61A1B3E for <dmarc@ietf.org>; Thu, 11 Dec 2014 19:42:39 -0800 (PST)
Received: (qmail 21382 invoked from network); 12 Dec 2014 03:42:35 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=iecc.com; h=date:message-id:from:to:cc:subject:in-reply-to:references:mime-version:content-type:user-agent; s=5384.548a642b.k1412; bh=qjZbrwdYjj6tabTebXwNp0KfQZIPEmpAW8Hn8XofrZM=; b=PA07ldG/0KMa0Wge3ck3Vo29FVy3hzV9JolpQ595U0mCTarMb3rA9e+JPjCWOaQ9kxmVriXQLwzv79AqrbUhhXyVHQpszD0S/v0Y0JA5TxswWuyTTl4ye9jbYkMntHlpmxUmNAHMyZXgMvb3eZAVyLEz6fZspMLAEs1kYQJyJiXxOZo7JSyZIXJANM1GTE2dMS1W+TYyj+YiXhXp91nXWh1P2sIhOuGnAauwrL9is3nC90wepeivE4p18M+UGsZB
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=taugh.com; h=date:message-id:from:to:cc:subject:in-reply-to:references:mime-version:content-type:user-agent; s=5384.548a642b.k1412; bh=qjZbrwdYjj6tabTebXwNp0KfQZIPEmpAW8Hn8XofrZM=; b=iDIgjyADZ6iXyPOyYofjk94ZeQmoIOFsTXWR/FfQcoDsxu7ORPnWbTC26OFnGkoABUEquslybYePv8HVMcGtmkHK7+iDk0+CRMvmbm3WhS45wvcfd3lZFY5W3vwLwCDvATnDyFIK+rQOxm32qVGFeukY8Go7Ab6E1AyKh5X7qyTanR4eaZkO1R1FtMve6tGisGFcqwJCQE+Whu2m4DpkH3mD2KeX5VhfmgfYiV7FIQFzjsAQ2EH13BuoTKrGvoD0
Received: from localhost ([IPv6:2001:470:1f07:1126::78:696d:6170]) by imap.iecc.com ([IPv6:2001:470:1f07:1126::78:696d:6170]) with ESMTPS (TLS1.0/X.509/SHA1) via TCP6; 12 Dec 2014 03:42:34 -0000
Date: 11 Dec 2014 22:42:37 -0500
Message-ID: <alpine.OSX.2.11.1412112239100.27461@ary.lan>
From: "John R Levine" <johnl@taugh.com>
To: "Terry Zink" <tzink@exchange.microsoft.com>
In-Reply-To: <BLUSR01MB6013689E192A8F46B3E35A496600@BLUSR01MB601.namsdf01.sdf.exchangelabs.com>
References: <BL2SR01MB6054A8FBBD0432D1196008896630@BL2SR01MB605.namsdf01.sdf.exchangelabs.com> <20141211225958.10749.qmail@ary.lan> <BLUSR01MB6013689E192A8F46B3E35A496600@BLUSR01MB601.namsdf01.sdf.exchangelabs.com>
User-Agent: Alpine 2.11 (OSX 23 2013-08-11)
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII; format=flowed
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/Mzt01bm6bRjQt1VgSk0pdumeWDQ
Cc: "dmarc@ietf.org" <dmarc@ietf.org>
Subject: Re: [dmarc-ietf] Phishing attacks on the Display From
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 12 Dec 2014 03:42:41 -0000

> 1. Hotmail/outlook.com puts a green shield in the web UX in front of trusted senders who authenticate. Is that what you mean?

Only sort of.  That's ad-hoc since each recipient system has their private 
list of green-bar-worthy senders.  (I mean, if I wanted to get into it, 
how would I do so?)

> 2. They do it based upon SPF/DKIM + sender's brand is on their internal 
> list. How is that different than the S/MIME thing you mention?

S/MIME signs the message body using the same kind of certificates that 
browsers use for HTTPS connections, so you should be able to get an EV 
certificate for S/MIME the same way you do for HTTPS.  The problem is that 
as far as I know, no MUAs look for the EV flag or display EV mail any 
differently from any other signed message.  The other problem is that no 
major webmail handles S/MIME at all, even though the spec has been stable 
for decades and it's in Outlook, Thunderbird, and all the other desktop 
MUAs.

Regards,
John Levine, johnl@taugh.com, Taughannock Networks, Trumansburg NY
Please consider the environment before reading this e-mail.


From nobody Thu Dec 11 21:23:39 2014
Return-Path: <steve@wordtothewise.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CB2541A1B42 for <dmarc@ietfa.amsl.com>; Thu, 11 Dec 2014 21:23:36 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.69
X-Spam-Level: 
X-Spam-Status: No, score=0.69 tagged_above=-999 required=5 tests=[BAYES_50=0.8, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GegMd9JIyM_Z for <dmarc@ietfa.amsl.com>; Thu, 11 Dec 2014 21:23:35 -0800 (PST)
Received: from mail.wordtothewise.com (mail.wordtothewise.com [184.105.179.154]) by ietfa.amsl.com (Postfix) with ESMTP id DA9A31A6EDE for <dmarc@ietf.org>; Thu, 11 Dec 2014 21:23:35 -0800 (PST)
Received: from satsuke.wordtothewise.com (204.11.227.194.static.etheric.net [204.11.227.194]) by mail.wordtothewise.com (Postfix) with ESMTPSA id 51DAC8134D for <dmarc@ietf.org>; Thu, 11 Dec 2014 21:23:35 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=wordtothewise.com; s=aardvark; t=1418361815; bh=4ycuvenlGJq/5DqkOmt+kTNi9QccNv8csIxQTpG1rOM=; h=Subject:From:In-Reply-To:Date:References:To:From; b=jX2B1BdpUVg4FhxPtqbYKs8OFUc6GVOOYUUxx5HUttmmAJt8jirhmn5z3H/8yVkx6 sHvInRBcZHB1mn5XCE3RdWVPGskyi5X5XMuNVaFxgzmJGO1dua5Hdrw5gRCjQ8QzHU 0XySSQOC8o4O8vYsdBJWDPsMeaF3NoH1kG5z3WXA=
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 7.3 \(1878.6\))
From: Steve Atkins <steve@wordtothewise.com>
In-Reply-To: <alpine.OSX.2.11.1412112239100.27461@ary.lan>
Date: Thu, 11 Dec 2014 21:23:32 -0800
Content-Transfer-Encoding: quoted-printable
Message-Id: <AB4D4652-A24C-4E21-B70B-A4F792785F16@wordtothewise.com>
References: <BL2SR01MB6054A8FBBD0432D1196008896630@BL2SR01MB605.namsdf01.sdf.exchangelabs.com> <20141211225958.10749.qmail@ary.lan> <BLUSR01MB6013689E192A8F46B3E35A496600@BLUSR01MB601.namsdf01.sdf.exchangelabs.com> <alpine.OSX.2.11.1412112239100.27461@ary.lan>
To: "dmarc@ietf.org" <dmarc@ietf.org>
X-Mailer: Apple Mail (2.1878.6)
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/7ACQ8_pnI8pSltX3cK8z0fMysSE
Subject: Re: [dmarc-ietf] Phishing attacks on the Display From
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 12 Dec 2014 05:23:37 -0000

On Dec 11, 2014, at 7:42 PM, John R Levine <johnl@taugh.com> wrote:

>> 1. Hotmail/outlook.com puts a green shield in the web UX in front of =
trusted senders who authenticate. Is that what you mean?
>=20
> Only sort of.  That's ad-hoc since each recipient system has their =
private list of green-bar-worthy senders.  (I mean, if I wanted to get =
into it, how would I do so?)

It's also difficult for my bank to do any useful user education about =
that if it's only supported by one freemail provider. It would need to =
be supported by most major MUAs - with compatible implementations and a =
consistent UI - before they could start that process.

Cheers,
  Steve=


From nobody Thu Dec 11 23:13:11 2014
Return-Path: <sven.krohlas@1und1.de>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 861DA1A9129 for <dmarc@ietfa.amsl.com>; Thu, 11 Dec 2014 23:13:00 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level: 
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CkQzQsBDiEkZ for <dmarc@ietfa.amsl.com>; Thu, 11 Dec 2014 23:12:58 -0800 (PST)
Received: from moi.1and1.com (moi002.1and1.com [212.227.126.209]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2DE481AC414 for <dmarc@ietf.org>; Thu, 11 Dec 2014 23:12:49 -0800 (PST)
Received: from [172.17.11.160] by mri.1and1.com with esmtpsa (TLS1.2:DHE_RSA_AES_128_CBC_SHA1:128) (Exim 4.80) (envelope-from <sven.krohlas@1und1.de>) id 1XzKP9-00008e-H2 for dmarc@ietf.org; Fri, 12 Dec 2014 08:12:47 +0100
Message-ID: <548A956D.7090807@1und1.de>
Date: Fri, 12 Dec 2014 08:12:45 +0100
From: Sven Krohlas <sven.krohlas@1und1.de>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.3.0
MIME-Version: 1.0
To: dmarc@ietf.org
References: <20141211225958.10749.qmail@ary.lan>
In-Reply-To: <20141211225958.10749.qmail@ary.lan>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 8bit
X-Virus-Scanned: ClamAV@mvs-ha-bs
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/yzhogi5OWWli3IdCkjz2UdrieTM
Subject: Re: [dmarc-ietf] Phishing attacks on the Display From
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 12 Dec 2014 07:13:00 -0000

Hi,

On 12/11/14 23:59, John Levine wrote:
>> 4.       Anything else?
>
> Figure out how to display signed mail from famous brands in a
> distinctive way analogous to browser green bars, and tell people
> to look for that.

in Germany there exists »trustedDialog« for that use case. Most
major ISPs take part in it and use it in their web frontends.

Basically a message is being displayed with a brand logo iff
DKIM verification was successfull and they are on a white list.

Details are only available in German, as I can see it:
http://united-internet-dialog.de/digital-mail-solutions


From nobody Fri Dec 12 10:15:21 2014
Return-Path: <johnl@taugh.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A6BBC1A8745 for <dmarc@ietfa.amsl.com>; Fri, 12 Dec 2014 10:15:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.862
X-Spam-Level: 
X-Spam-Status: No, score=0.862 tagged_above=-999 required=5 tests=[BAYES_20=-0.001, HELO_MISMATCH_COM=0.553, HOST_MISMATCH_NET=0.311, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 221sDaw51_sD for <dmarc@ietfa.amsl.com>; Fri, 12 Dec 2014 10:15:19 -0800 (PST)
Received: from miucha.iecc.com (abusenet-1-pt.tunnel.tserv4.nyc4.ipv6.he.net [IPv6:2001:470:1f06:1126::2]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C0FCE1A873D for <dmarc@ietf.org>; Fri, 12 Dec 2014 10:15:18 -0800 (PST)
Received: (qmail 26899 invoked from network); 12 Dec 2014 18:15:14 -0000
Received: from miucha.iecc.com (64.57.183.18) by mail1.iecc.com with QMQP; 12 Dec 2014 18:15:14 -0000
Date: 12 Dec 2014 18:14:55 -0000
Message-ID: <20141212181455.13248.qmail@ary.lan>
From: "John Levine" <johnl@taugh.com>
To: dmarc@ietf.org
In-Reply-To: <AB4D4652-A24C-4E21-B70B-A4F792785F16@wordtothewise.com>
Organization: 
X-Headerized: yes
Mime-Version: 1.0
Content-type: text/plain; charset=utf-8
Content-transfer-encoding: 8bit
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/vjcN2-9gIH_RlextVYCp5N5hM6c
Cc: steve@wordtothewise.com
Subject: Re: [dmarc-ietf] Phishing attacks on the Display From
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 12 Dec 2014 18:15:19 -0000

>>> 1. Hotmail/outlook.com puts a green shield in the web UX in front of trusted senders
>who authenticate. Is that what you mean?
>> 
>> Only sort of.  That's ad-hoc since each recipient system has their private list of
>green-bar-worthy senders.  (I mean, if I wanted to get into it, how would I do so?)
>
>It's also difficult for my bank to do any useful user education about that if it's only
>supported by one freemail provider. It would need to be supported by most major MUAs -
>with compatible implementations and a consistent UI - before they could start that
>process.

Right.  To be useful it has to be consistent and well-publicised.
Green bar certs in browsers are the best analogy I can think of.

R's,
John


From nobody Fri Dec 12 17:02:19 2014
Return-Path: <tzink@exchange.microsoft.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 569A41A7113 for <dmarc@ietfa.amsl.com>; Fri, 12 Dec 2014 17:02:12 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.902
X-Spam-Level: 
X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3jflqL53m6jg for <dmarc@ietfa.amsl.com>; Fri, 12 Dec 2014 17:02:04 -0800 (PST)
Received: from na01-by1-obe.outbound.o365filtering.com (na01-by1-obe.ptr.o365filtering.com [64.4.22.91]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A02301A6FE1 for <dmarc@ietf.org>; Fri, 12 Dec 2014 17:02:04 -0800 (PST)
Received: from BL2SR01MB605.namsdf01.sdf.exchangelabs.com (10.255.109.167) by BL2SR01MB605.namsdf01.sdf.exchangelabs.com (10.255.109.167) with Microsoft SMTP Server (TLS) id 15.1.53.3; Sat, 13 Dec 2014 01:02:02 +0000
Received: from BL2SR01MB605.namsdf01.sdf.exchangelabs.com ([169.254.10.188]) by BL2SR01MB605.namsdf01.sdf.exchangelabs.com ([169.254.10.188]) with mapi id 15.01.0053.000; Sat, 13 Dec 2014 01:02:02 +0000
From: Terry Zink <tzink@exchange.microsoft.com>
To: John Levine <johnl@taugh.com>, "dmarc@ietf.org" <dmarc@ietf.org>
Thread-Topic: [dmarc-ietf] Phishing attacks on the Display From
Thread-Index: AdAVlNRs8SfCDeiSSrmuo4sG2LBxBQAAVsUAAAQF7gAABdkogAADhkQAABrwtIAADjNxIA==
Date: Sat, 13 Dec 2014 01:02:02 +0000
Message-ID: <BL2SR01MB60504846EA2A37151D900B696610@BL2SR01MB605.namsdf01.sdf.exchangelabs.com>
References: <AB4D4652-A24C-4E21-B70B-A4F792785F16@wordtothewise.com> <20141212181455.13248.qmail@ary.lan>
In-Reply-To: <20141212181455.13248.qmail@ary.lan>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [131.107.159.116]
x-microsoft-antispam: BCL:0;PCL:0;RULEID:;SRVR:BL2SR01MB605;
authentication-results: taugh.com; dkim=none (message not signed) header.d=none;taugh.com; dmarc=none action=none header.from=exchange.microsoft.com;
x-exchange-antispam-report-test: UriScan:;
x-exchange-antispam-report-cfa-test: BCL:0;PCL:0;RULEID:;SRVR:BL2SR01MB605;
x-forefront-prvs: 04244E0DC5
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(6009001)(377454003)(51704005)(199003)(13464003)(189002)(19580395003)(19580405001)(106356001)(64706001)(33656002)(76176999)(54356999)(50986999)(97736003)(20776003)(107046002)(99396003)(46102003)(31966008)(4396001)(86362001)(101416001)(2656002)(120916001)(68736005)(54206007)(77156002)(62966003)(54606007)(87936001)(92566001)(15975445007)(66066001)(2501002)(102836002)(105586002)(21056001); DIR:OUT; SFP:1102; SCL:1; SRVR:BL2SR01MB605; H:BL2SR01MB605.namsdf01.sdf.exchangelabs.com; FPR:; SPF:None; PTR:InfoNoRecords; A:1; MX:1; LANG:en; 
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: exchange.microsoft.com
X-MS-Exchange-CrossTenant-originalarrivaltime: 13 Dec 2014 01:02:02.6443 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: f686d426-8d16-42db-81b7-ab578e110ccd
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL2SR01MB605
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/bg22GzN3OEMGlVmHjq743gxO4ss
Cc: "steve@wordtothewise.com" <steve@wordtothewise.com>
Subject: Re: [dmarc-ietf] Phishing attacks on the Display From
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 13 Dec 2014 01:02:13 -0000

Thanks for everyone's thoughts. It sounds like doing something with the Dis=
play and training users on it is the consensus.

-- Terry

-----Original Message-----
From: dmarc [mailto:dmarc-bounces@ietf.org] On Behalf Of John Levine
Sent: Friday, December 12, 2014 10:15 AM
To: dmarc@ietf.org
Cc: steve@wordtothewise.com
Subject: Re: [dmarc-ietf] Phishing attacks on the Display From

>>> 1. Hotmail/outlook.com puts a green shield in the web UX in front of tr=
usted senders
>who authenticate. Is that what you mean?
>>=20
>> Only sort of.  That's ad-hoc since each recipient system has their priva=
te list of
>green-bar-worthy senders.  (I mean, if I wanted to get into it, how would =
I do so?)
>
>It's also difficult for my bank to do any useful user education about that=
 if it's only
>supported by one freemail provider. It would need to be supported by most =
major MUAs -
>with compatible implementations and a consistent UI - before they could st=
art that
>process.

Right.  To be useful it has to be consistent and well-publicised.
Green bar certs in browsers are the best analogy I can think of.

R's,
John

_______________________________________________
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc


From nobody Fri Dec 12 17:27:46 2014
Return-Path: <doug.mtview@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8DB1C1A8AAF for <dmarc@ietfa.amsl.com>; Fri, 12 Dec 2014 17:27:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level: 
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZfoYWqvJOr4u for <dmarc@ietfa.amsl.com>; Fri, 12 Dec 2014 17:27:44 -0800 (PST)
Received: from mail-pd0-x231.google.com (mail-pd0-x231.google.com [IPv6:2607:f8b0:400e:c02::231]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1B5101A8AAB for <dmarc@ietf.org>; Fri, 12 Dec 2014 17:27:44 -0800 (PST)
Received: by mail-pd0-f177.google.com with SMTP id ft15so8125913pdb.36 for <dmarc@ietf.org>; Fri, 12 Dec 2014 17:27:43 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=subject:mime-version:content-type:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=n3aAS/fskRh2j+e69/gv1ZMAvUk2E1KC6/YXaVhshnE=; b=H5qilywciTtV/OaDYPuwR5uDqdJ1GRaCVLXe9H7te36d5d1+oxk1SxRgapuSM7Q0Pf rCh8ZhwOSoo79k87np4DgOOWuh0LVBs+JAmYu4cW+jKDURaHAjyThhLnAzyNPBOZS9ur zqURz1SjQLcC/ogJXRIFAoise93d+J9DazcU62hBxq9mFiiV+zh+2G97Upa6kk40wcs/ 5r3D3ekKhVx2RgjnWJXM3xS/QAmVYGjmLNJCbXRfh94kCMjPUeW/iv5V9NesHdnTr9R6 Jl2ScSz+ydSMeYLfmB3wfZ+qPjvWeCfqaKVagiYL4eg19DJKsuD2/4vrRe5SRdINFP8O JnHg==
X-Received: by 10.68.190.229 with SMTP id gt5mr30854676pbc.119.1418434063326;  Fri, 12 Dec 2014 17:27:43 -0800 (PST)
Received: from [192.168.0.54] (107-0-5-6-ip-static.hfc.comcastbusiness.net. [107.0.5.6]) by mx.google.com with ESMTPSA id on1sm2628533pdb.32.2014.12.12.17.27.41 for <multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Fri, 12 Dec 2014 17:27:42 -0800 (PST)
Mime-Version: 1.0 (Mac OS X Mail 7.3 \(1878.6\))
Content-Type: text/plain; charset=us-ascii
From: Douglas Otis <doug.mtview@gmail.com>
In-Reply-To: <BL2SR01MB60504846EA2A37151D900B696610@BL2SR01MB605.namsdf01.sdf.exchangelabs.com>
Date: Fri, 12 Dec 2014 17:27:40 -0800
Content-Transfer-Encoding: quoted-printable
Message-Id: <09D5FA16-83EF-4B6A-A2EF-45687A4529EA@gmail.com>
References: <AB4D4652-A24C-4E21-B70B-A4F792785F16@wordtothewise.com> <20141212181455.13248.qmail@ary.lan> <BL2SR01MB60504846EA2A37151D900B696610@BL2SR01MB605.namsdf01.sdf.exchangelabs.com>
To: Terry Zink <tzink@exchange.microsoft.com>
X-Mailer: Apple Mail (2.1878.6)
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/yKJSXtEAAE2yIYzEML6uGDohiuQ
Cc: "dmarc@ietf.org" <dmarc@ietf.org>, John Levine <johnl@taugh.com>, Douglas Otis <doug.mtview@gmail.com>, "steve@wordtothewise.com" <steve@wordtothewise.com>
Subject: Re: [dmarc-ietf] Phishing attacks on the Display From
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 13 Dec 2014 01:27:45 -0000

On Dec 12, 2014, at 5:02 PM, Terry Zink <tzink@exchange.microsoft.com> =
wrote:

> Thanks for everyone's thoughts. It sounds like doing something with =
the Display and training users on it is the consensus.

Dear Terry,

This effort should include considerations for Sender header fields in =
addition to =46rom header fields which Outlook already permits with on =
behalf of or by ensuring the Sender header field is displayed.  Being =
constrained to just the =46rom header field is only suitable for =
transactional messages where it can be assumed these header fields share =
the same domain.  When a domain might wish to permit message forwarding =
to a different provider or participate in various mailing lists it is =
crucial recipients be able to deduce who authored the content as being =
distinct from that of the Sending agent.  The relationship between the =
Sender and the Author might be understood by the recipient or separately =
authorized using a mechanism like tpa-label.  Email is not HTTP. Failing =
to separately recognize Author/Sender roles has proven disruptive when =
DMARC policy is applied against normal email accounts.

Regards,
Douglas Otis=


From nobody Fri Dec 19 13:30:18 2014
Return-Path: <superuser@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1A2491AC3D3 for <dmarc@ietfa.amsl.com>; Fri, 19 Dec 2014 13:30:17 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id x6vfCa8yiq3a for <dmarc@ietfa.amsl.com>; Fri, 19 Dec 2014 13:30:15 -0800 (PST)
Received: from mail-wi0-x230.google.com (mail-wi0-x230.google.com [IPv6:2a00:1450:400c:c05::230]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 575E01AC3B3 for <dmarc@ietf.org>; Fri, 19 Dec 2014 13:30:12 -0800 (PST)
Received: by mail-wi0-f176.google.com with SMTP id ex7so3158754wid.15 for <dmarc@ietf.org>; Fri, 19 Dec 2014 13:30:11 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:date:message-id:subject:from:to:content-type; bh=LuNJAuXDG7vvFyhRv3CInaoWUpbP+k3q4Sj/vgV/8Tw=; b=AsIb2DaWPTJqmebWF0OY377rQ909LUR4B1Y/1NQ1YnzzYSDLJDah+sCqsQl8veawCp xoGQyyRpARVCi4dOoYPUj0Ar5Omha1ytJSdqEUIRQNjrhOQnU4UfZoHd2UAZE236/f9L 8DRGJZygVDxUcRwSkHdoxg8r378o/XFFZzRV95L3KXWVE03/UQBBwWgAw4BauoGPmraH 0Fmzab737BLIJYQJPJKyHPb8NewhKBa2F7y+5c1tDRjPOX6nAAXUcpx7e5EyLzjOholV geYZ4p5fqolzdcydnFS8dD1M0s7Ajxv+UkZztabzEzo8jY3WwCr1ETdjc/QOjuqSVKVt UWYw==
MIME-Version: 1.0
X-Received: by 10.180.94.37 with SMTP id cz5mr9266891wib.61.1419024611121; Fri, 19 Dec 2014 13:30:11 -0800 (PST)
Received: by 10.27.8.74 with HTTP; Fri, 19 Dec 2014 13:30:10 -0800 (PST)
Date: Fri, 19 Dec 2014 13:30:10 -0800
Message-ID: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com>
From: "Murray S. Kucherawy" <superuser@gmail.com>
To: "dmarc@ietf.org" <dmarc@ietf.org>
Content-Type: multipart/alternative; boundary=f46d04426c2cdfa312050a98696c
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/wE-meMQj9PBHVzDi3Ew08E673CI
Subject: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 19 Dec 2014 21:30:17 -0000

--f46d04426c2cdfa312050a98696c
Content-Type: text/plain; charset=UTF-8

Colleagues,

draft-kucherawy-dmarc-base is nearing IESG conflict review, and it's been
pointed out that a review from back in April has not been properly attended
to.

Could I get the WG (forgive me, co-chairs!) to comment on this so that I
can see what changes might be appropriate here?  Having this resolved
before the telechat in the first week of January would be truly delightful.

Note that some amount of this may have already been addressed (it was about
-04; -08 is current, and at least the ABNF issue Jim raises will be handled
in -09), so please at least check -08 when considering your responses.

The posting:
http://www.ietf.org/mail-archive/web/dmarc/current/msg00764.html

Thank you!

-MSK

--f46d04426c2cdfa312050a98696c
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div><div><div><div>Colleagues,<br><br></div>draft-kuchera=
wy-dmarc-base is nearing IESG conflict review, and it&#39;s been pointed ou=
t that a review from back in April has not been properly attended to.<br><b=
r></div>Could I get the WG (forgive me, co-chairs!) to comment on this so t=
hat I can see what changes might be appropriate here?=C2=A0 Having this res=
olved before the telechat in the first week of January would be truly delig=
htful.<br><br></div>Note that some amount of this may have already been add=
ressed (it was about -04; -08 is current, and at least the ABNF issue Jim r=
aises will be handled in -09), so please at least check -08 when considerin=
g your responses.<br><br>The posting: <a href=3D"http://www.ietf.org/mail-a=
rchive/web/dmarc/current/msg00764.html">http://www.ietf.org/mail-archive/we=
b/dmarc/current/msg00764.html</a><br><br>Thank you!<br><br></div>-MSK<br></=
div>

--f46d04426c2cdfa312050a98696c--


From nobody Fri Dec 19 14:30:38 2014
Return-Path: <dhc@dcrocker.net>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6FF901ACE23 for <dmarc@ietfa.amsl.com>; Fri, 19 Dec 2014 14:30:35 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 525eB7Pkxbnf for <dmarc@ietfa.amsl.com>; Fri, 19 Dec 2014 14:30:32 -0800 (PST)
Received: from sbh17.songbird.com (sbh17.songbird.com [72.52.113.17]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 63E931ACE27 for <dmarc@ietf.org>; Fri, 19 Dec 2014 14:30:27 -0800 (PST)
Received: from [192.168.1.66] (76-218-8-156.lightspeed.sntcca.sbcglobal.net [76.218.8.156]) (authenticated bits=0) by sbh17.songbird.com (8.13.8/8.13.8) with ESMTP id sBJMUJSH030228 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT); Fri, 19 Dec 2014 14:30:22 -0800
Message-ID: <5494A6F5.5020906@dcrocker.net>
Date: Fri, 19 Dec 2014 14:30:13 -0800
From: Dave Crocker <dhc@dcrocker.net>
Organization: Brandenburg InternetWorking
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Thunderbird/31.3.0
MIME-Version: 1.0
To: jim fenton <fenton@bluepopcorn.net>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com>
In-Reply-To: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com>
Content-Type: text/plain; charset=windows-1252
Content-Transfer-Encoding: 8bit
X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.0 (sbh17.songbird.com [72.52.113.66]); Fri, 19 Dec 2014 14:30:23 -0800 (PST)
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/HeR5n09K75zTSUo3283pajKShLU
Cc: "dmarc@ietf.org" <dmarc@ietf.org>, "Murray S. Kucherawy" <superuser@gmail.com>
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: dcrocker@bbiw.net
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 19 Dec 2014 22:30:35 -0000

On 12/19/2014 1:30 PM, Murray S. Kucherawy wrote:
> Could I get the WG (forgive me, co-chairs!) to comment

Some of Jim's note are about writing style, precision, specific
terminology usage, points of nuance, or requests for clarification.
I'll leave clarification to Murry, and I'll assume that Murray and/or
the RFC Editor will deal with such niceties.  The niceties matter, but
don't group require discussion, IMO.

So my feedback is limited to points I consider substantive or even
possibly controversial:

Meta-concern:  Since Jim cited paragraph numbers rather than explicitly
quoting text, I've no idea whether I'm looking at the correct text.  In
fact, I've started to fear that his par numbering is zero based...

Substative Meta-concern:  It's important to distinguish between comments
that make sense to pursue in an effort at further development -- that
is, the new working group -- versus ones that clarify the existing spec
or identify significant failures in it.


> The posting:
> http://www.ietf.org/mail-archive/web/dmarc/current/msg00764.html



>     From: Jim Fenton <fenton at bluepopcorn.net>
>     To: "dmarc at ietf.org" <dmarc at ietf.org>
>     Date: Wed, 16 Apr 2014 12:11:45 -0700
...

> Bullet 10: Again, DMARC doesn't do authentication, even for domains; it
> relies on other authentication mechanisms.

I originally thought this, too, but in fact DMARC does do authentication:

     DMARC asserts authenticity of the rfc5322.From field domain name.
That's a distinct semantic increment over anything SPF or DKIM do on
their own.



> 3.1.2 General Concepts
...
> Paragraph 3 doesn't quite capture the sense of alignment properly,
> especially for SPF. A message that is authorized by SPF might have an
> unaligned envelope-from address, so the validity of SPF for such
> messages is moot.

I think this is par. 2 in the -08 draft and that text looks fine to me.

If someone thinks the text needs changing, they need to offer candidate
text.



> 3.2 Organizational Domain
> 
> I remain very concerned about this algorithm since I have been
> previously told very specifically not to do this by the DNS folks. I'm
> also concerned about the inconsistency (interoperability impact) that
> could result from different operators using different public suffix lists.

Everyone is concerned about it.  But it's the best that is currently
available.


> 4. Policy
> 
> Paragraph 4 basically says, if you don't want a particular
> authentication scheme to be considered by DMARC, don't use it at all.
> For a domain that is using SPF and DMARC (for example), this could be an
> impediment to their deployment of DKIM because they could not test with
> it without having it immediately affect recipients' message handling.
> One possibility would be to ignore DKIM if the testing (t=y) flag is
> set, although a campaign would be needed to get the many domains
> currently using t=y to turn it off. Another possibility would be to have
> a setting in DMARC to ignore a specific authentication method entirely.

The first possibility isn't viabile, for the reason cited.  The second
possibility might be worth pursuing in the DMARC working group, rather
than in a document that captures existing DMARC practice.

There are, of course, other possibilities, such as not having DMARC
pursue operational nuance that makes the spec more complex, trying to
handle special cases.  That is, if a site isn't ready to use DMARC, it
shouldn't.


> 5. DMARC policy record
> 
> Paragraph 2: Again, "matches perfectly with the DNS" is an inaccurate
> characterization. If the query requirement matched perfectly with the
> DNS, DNS would have a way to determine the Administrative Domain without
> resorting to suffix lists and such. Just strike the sentence; this isn't
> relevant here anyway.

-08 doesn't have this language.



> 7.1 Verifying External Destinations
> 
> Paragraph 3: "verification steps SHOULD be taken" These steps are to
> protect another domain from attack. It needs to be a MUST.

6.1 in -08.

Given the problems with the search for org domain, a SHOULD is as far as
is practical here.

I'd suggest noting that that's a reason this can't be a MUST.



> 8. Policy Discovery
...

5.6.3 in -08


> Second-to-last paragraph: "If the RFC5322.From domain does not exist in
> the DNS" is basically changing what RFC5321/5322 allow. This isn't the
> place to be making fundamental changes to the behavior of email.

It isn't meant to be.

-08 text says:

     "If the RFC5322.From domain does not exist in the DNS, Mail
   Receivers
   SHOULD direct the receiving SMTP server to reject the message.  The
   choice of mechanism for such rejection and the implications of those
   choices are discussed in Section 9.3."

I suggest removing it.  Although a common anti-abuse mechanism, it's out
of scope for DMARC.


> 9. Domain Owner Actions

5.5 in -08

> Last paragraph doesn't seem like it fits. Suggest it be removed.

While I could imagine a better place for it in the doc, having a /terse/
pointer like this to some authentication pedagogy seems useful to me, in
an authentication-related spec...


> 10.1 Extract author domain

6.6.1 in -08

> "Such messages SHOULD be rejected": 

looks like it's been removed.


> 11.1 Discovery
6.2.1 in -08

> Mail Receivers can also discover reporting requests from the
> Organizational Domain. That should be mentioned here. But I'm a little
> confused why we have another Discovery section at all.

The text's use of the word 'corresponds' handles the mapping to org
domain, IMO.


> 11.2.1 Email
> 
> The whole thing about filenames needs to go away. Since it's only a
> SHOULD requirement, the Report Receiver needs to be able to handle
> reports that don't follow this format as well as those that do. 

"SHOULD" is a very strong normative statement. Note that it permits
non-conformance only in the presence of singular knowledge by the
non-conforming party.

Filename labeling is generally considered useful.  Why wouldn't it be
useful here?


> I also
> wonder if some operating systems have trouble with filenames containing
> the "!" character. 

If they are, they already need to be able to resolve the issue.


> 14.1 Data Exposure Considerations
> 
> Last paragraph: what's an "unexpected Mail Receiver"?
> 
> The privacy consideration here, which isn't obvious from the wording, is
> that users may currently use forwarding in a way that prevents the
> sender from determining the ultimate delivery address. DMARC has the
> potential to break that. This might be important in the case of a user
> that is trying to distance themselves from a stalker.

How is that a DMARC-specific 'exposure' consideration?


> 14.2 Report Recipients
> 
> Some potential exists for report recipients to perform traffic analysis:
> to obtain metadata about the receiver's traffic. In addition to
> verifying compliance with policies, receivers need to consider that
> before sending reports to a third party.

+1



d/



-- 
Dave Crocker
Brandenburg InternetWorking
bbiw.net


From nobody Fri Dec 19 14:34:36 2014
Return-Path: <superuser@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 387DE1A854D for <dmarc@ietfa.amsl.com>; Fri, 19 Dec 2014 14:34:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dlzuB84yCrJm for <dmarc@ietfa.amsl.com>; Fri, 19 Dec 2014 14:34:31 -0800 (PST)
Received: from mail-wi0-x22b.google.com (mail-wi0-x22b.google.com [IPv6:2a00:1450:400c:c05::22b]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 22AD61ACE41 for <dmarc@ietf.org>; Fri, 19 Dec 2014 14:34:31 -0800 (PST)
Received: by mail-wi0-f171.google.com with SMTP id bs8so3317804wib.4 for <dmarc@ietf.org>; Fri, 19 Dec 2014 14:34:30 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=lspYawh88pvSJut8KhU0e95n4sPGQD7HjGvG4DViWLc=; b=lJ2HCDsf4xTlCUNhqiHnS9wjLAA7HP4ekoHpsH0bZj5l2SPkbqNz5jHaNoQ4RT2uga p9hk9arbsRXqY/Zudmh79mMEcxtCZ+SroIT7WNm2OhjOucUURsnwsTJcALbfL4H8uRBm OYx+V6fK9hhxsOc/xwoDTAY0zxN7yxBchOfnQuv/J6n+thb6oshe5vAgyPi9lF3OOBm7 guqzOVgLy/xXebqQOTx3A/r+xbWQ9RITOP2hYw+tJdK+1FepLh078cWzN4S1GSEed0qV ucHtwswLZ40UtbttC2mB1TyufKUhijzwdeO6mQrmiDJkPlu0NzNkHlQGwjZDYdXog1Ib kv8w==
MIME-Version: 1.0
X-Received: by 10.180.85.33 with SMTP id e1mr9619322wiz.61.1419028469967; Fri, 19 Dec 2014 14:34:29 -0800 (PST)
Received: by 10.27.8.74 with HTTP; Fri, 19 Dec 2014 14:34:29 -0800 (PST)
In-Reply-To: <5494A6F5.5020906@dcrocker.net>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <5494A6F5.5020906@dcrocker.net>
Date: Fri, 19 Dec 2014 14:34:29 -0800
Message-ID: <CAL0qLwY_v09_DGLgpXFU93Qqq85HUppH_1Q5X440=-sFoUqNfA@mail.gmail.com>
From: "Murray S. Kucherawy" <superuser@gmail.com>
To: Dave Crocker <dcrocker@bbiw.net>
Content-Type: multipart/alternative; boundary=f46d04428074e0f42f050a994f56
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/8NF1SpPvtpzOfD-Klg9UiTQ6ZoM
Cc: jim fenton <fenton@bluepopcorn.net>, "dmarc@ietf.org" <dmarc@ietf.org>
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 19 Dec 2014 22:34:33 -0000

--f46d04428074e0f42f050a994f56
Content-Type: text/plain; charset=UTF-8

On Fri, Dec 19, 2014 at 2:30 PM, Dave Crocker <dhc@dcrocker.net> wrote:

> Meta-concern:  Since Jim cited paragraph numbers rather than explicitly
> quoting text, I've no idea whether I'm looking at the correct text.  In
> fact, I've started to fear that his par numbering is zero based...
>

The document has been reorganized since his original comments, so this was
an issue for me as well.

Thanks for your comments.  There was a separate feedback comment that was
purely typos/nits which I'll handle myself and not foist on the WG unless I
really get stuck; dealing with this substantive stuff was my greatest worry.

-MSK

--f46d04428074e0f42f050a994f56
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">On Fri, Dec 19, 2014 at 2:30 PM, Dave Crocker <span dir=3D=
"ltr">&lt;<a href=3D"mailto:dhc@dcrocker.net" target=3D"_blank">dhc@dcrocke=
r.net</a>&gt;</span> wrote:<div class=3D"gmail_extra"><div class=3D"gmail_q=
uote"><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-l=
eft:1px #ccc solid;padding-left:1ex">Meta-concern:=C2=A0 Since Jim cited pa=
ragraph numbers rather than explicitly<br>
quoting text, I&#39;ve no idea whether I&#39;m looking at the correct text.=
=C2=A0 In<br>
fact, I&#39;ve started to fear that his par numbering is zero based...<br><=
/blockquote><div><br></div><div>The document has been reorganized since his=
 original comments, so this was an issue for me as well.<br><br></div><div>=
Thanks for your comments.=C2=A0 There was a separate feedback comment that =
was purely typos/nits which I&#39;ll handle myself and not foist on the WG =
unless I really get stuck; dealing with this substantive stuff was my great=
est worry.<br></div><div><br></div><div>-MSK</div></div></div></div>

--f46d04428074e0f42f050a994f56--


From nobody Sat Dec 20 23:19:14 2014
Return-Path: <fenton@bluepopcorn.net>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AFBE81A0195 for <dmarc@ietfa.amsl.com>; Sat, 20 Dec 2014 23:19:11 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.689
X-Spam-Level: 
X-Spam-Status: No, score=0.689 tagged_above=-999 required=5 tests=[BAYES_50=0.8, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id urRtQ90pt8k0 for <dmarc@ietfa.amsl.com>; Sat, 20 Dec 2014 23:19:09 -0800 (PST)
Received: from v2.bluepopcorn.net (v2.bluepopcorn.net [IPv6:2607:f2f8:a994::2]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C823B1A0196 for <dmarc@ietf.org>; Sat, 20 Dec 2014 23:19:08 -0800 (PST)
Received: from [IPv6:2001:470:1f05:bfe:35c5:65a4:405f:3c65] ([IPv6:2001:470:1f05:bfe:35c5:65a4:405f:3c65]) (authenticated bits=0) by v2.bluepopcorn.net (8.14.3/8.14.3/Debian-9.4) with ESMTP id sBL7IvBT010055 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NO); Sat, 20 Dec 2014 23:18:59 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=bluepopcorn.net; s=supersize; t=1419146340; bh=eai+Hj+DXEOE5XOY/7nLmtL19cOU8ANwRwZzvg5LjZs=; h=Message-ID:Date:From:MIME-Version:To:CC:Subject:References: In-Reply-To:Content-Type:Content-Transfer-Encoding; b=BiOsvGpdjS1nJfbsoVz6ayYd1qcwDgA0bjE7o7pq4/YpSyQSq9WET+pwWTnBN34dQ C2jII7k8Jt2jWLoe+i/IkhjyN4kAjbtx0xqSUIx6z34AHoWBfmDOB2Ggipgox7dNvC DsH717qQGd44nRx/K9uX7zw66Va0uV8dAhtFsNrk=
Message-ID: <54967461.2070702@bluepopcorn.net>
Date: Sat, 20 Dec 2014 23:18:57 -0800
From: Jim Fenton <fenton@bluepopcorn.net>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.3.0
MIME-Version: 1.0
To: dcrocker@bbiw.net
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <5494A6F5.5020906@dcrocker.net>
In-Reply-To: <5494A6F5.5020906@dcrocker.net>
Content-Type: text/plain; charset=windows-1252
Content-Transfer-Encoding: quoted-printable
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/U3ubIDikpTK6LnYVMoxLv1tii6A
Cc: "dmarc@ietf.org" <dmarc@ietf.org>, "Murray S. Kucherawy" <superuser@gmail.com>
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 21 Dec 2014 07:19:12 -0000

Hi, Dave -

On 12/19/2014 02:30 PM, Dave Crocker wrote:

[2.4 Out of Scope]
>> Bullet 10: Again, DMARC doesn't do authentication, even for domains; i=
t
>> relies on other authentication mechanisms.
> I originally thought this, too, but in fact DMARC does do authenticatio=
n:
>
>      DMARC asserts authenticity of the rfc5322.From field domain name.
> That's a distinct semantic increment over anything SPF or DKIM do on
> their own.

What it does is different enough from SPF and DKIM that I think it's
overloading the term "authentication" to use it again here. It doesn't
contribute to a clear understanding. It looks at the results of SPF and
DKIM, which operate at the domain level, so this bullet isn't really
necessary.
>
>
>
>> 3.1.2 General Concepts
> ...
>> Paragraph 3 doesn't quite capture the sense of alignment properly,
>> especially for SPF. A message that is authorized by SPF might have an
>> unaligned envelope-from address, so the validity of SPF for such
>> messages is moot.
> I think this is par. 2 in the -08 draft and that text looks fine to me.=


Yes, paragraph 2. My point is that a the last sentence seems to say that
if a message arrives from a server authorized by SPF, it will not be
affected by DMARC policies.
>
> If someone thinks the text needs changing, they need to offer candidate=

> text.

DMARC's filtering function is based on whether SPF or DKIM can provide
an authenticated, aligned identifier for the message under
consideration. Messages that purport to be from a Domain Owner's domain
and arrive from servers that are not authorized by that domain's SPF and
do not contain an appropriate DKIM signature can be affected by DMARC
policies.

[I think the additional "that domain's" will do it.]
>
>
>
>> 3.2 Organizational Domain
>>
>> I remain very concerned about this algorithm since I have been
>> previously told very specifically not to do this by the DNS folks. I'm=

>> also concerned about the inconsistency (interoperability impact) that
>> could result from different operators using different public suffix li=
sts.
> Everyone is concerned about it.  But it's the best that is currently
> available.
>
>
>> 4. Policy
>>
>> Paragraph 4 basically says, if you don't want a particular
>> authentication scheme to be considered by DMARC, don't use it at all.
>> For a domain that is using SPF and DMARC (for example), this could be =
an
>> impediment to their deployment of DKIM because they could not test wit=
h
>> it without having it immediately affect recipients' message handling.
>> One possibility would be to ignore DKIM if the testing (t=3Dy) flag is=

>> set, although a campaign would be needed to get the many domains
>> currently using t=3Dy to turn it off. Another possibility would be to =
have
>> a setting in DMARC to ignore a specific authentication method entirely=
=2E
> The first possibility isn't viabile, for the reason cited.  The second
> possibility might be worth pursuing in the DMARC working group, rather
> than in a document that captures existing DMARC practice.
>
> There are, of course, other possibilities, such as not having DMARC
> pursue operational nuance that makes the spec more complex, trying to
> handle special cases.  That is, if a site isn't ready to use DMARC, it
> shouldn't.

The point is that use of DMARC may come first, and makes SPF and DKIM
more brittle. Domains that have deployed DMARC may want to deploy both
SPF and DKIM (having already deployed one or the other), but it would be
better if they didn't have to turn off DMARC to do so.

Agree that this is a bit of a corner case.
>
>
>> 5. DMARC policy record
>>
>> Paragraph 2: Again, "matches perfectly with the DNS" is an inaccurate
>> characterization. If the query requirement matched perfectly with the
>> DNS, DNS would have a way to determine the Administrative Domain witho=
ut
>> resorting to suffix lists and such. Just strike the sentence; this isn=
't
>> relevant here anyway.
> -08 doesn't have this language.

Now section 5.1, paragraph 2. Honestly, this reads like marketing fluff
that doesn't belong in a specification like this.
>
>
>
>> 7.1 Verifying External Destinations
>>
>> Paragraph 3: "verification steps SHOULD be taken" These steps are to
>> protect another domain from attack. It needs to be a MUST.
> 6.1 in -08.
>
> Given the problems with the search for org domain, a SHOULD is as far a=
s
> is practical here.
>
> I'd suggest noting that that's a reason this can't be a MUST.

This is already predicated on having discovered the DMARC policy, so the
org domain search is irrelevant.

If this is only a SHOULD, under what circumstances might a Mail Receiver
follow a different procedure, or not do this at all? This reporting
procedure is one of the core aspects of DMARC; if someone is doing
something different, I would think that the specification would want to
say that it's not DMARC any more.
>
>
>
>> 8. Policy Discovery
> ...
>
> 5.6.3 in -08
>
>
>> Second-to-last paragraph: "If the RFC5322.From domain does not exist i=
n
>> the DNS" is basically changing what RFC5321/5322 allow. This isn't the=

>> place to be making fundamental changes to the behavior of email.
> It isn't meant to be.
>
> -08 text says:
>
>      "If the RFC5322.From domain does not exist in the DNS, Mail
>    Receivers
>    SHOULD direct the receiving SMTP server to reject the message.  The
>    choice of mechanism for such rejection and the implications of those=

>    choices are discussed in Section 9.3."
>
> I suggest removing it.  Although a common anti-abuse mechanism, it's ou=
t
> of scope for DMARC.

+1

>
>
>> 9. Domain Owner Actions
> 5.5 in -08
>
>> Last paragraph doesn't seem like it fits. Suggest it be removed.
> While I could imagine a better place for it in the doc, having a /terse=
/
> pointer like this to some authentication pedagogy seems useful to me, i=
n
> an authentication-related spec...

The paragraph I was referencing (having to do with "mailto" URIs) is not
in -08.
>
>
>> 10.1 Extract author domain
> 6.6.1 in -08
5.6.1, actually
>
>> "Such messages SHOULD be rejected":=20
> looks like it's been removed.
Yes, it has.
>
>
>> 11.1 Discovery
> 6.2.1 in -08
>
>> Mail Receivers can also discover reporting requests from the
>> Organizational Domain. That should be mentioned here. But I'm a little=

>> confused why we have another Discovery section at all.
> The text's use of the word 'corresponds' handles the mapping to org
> domain, IMO.

This is more of a comment about document organization. The previous
sections have been talking about things that follow discovery of the
policy record, and now when talking about aggregate reports there's
another section about discovery. Why here; isn't this a little redundant?=

>
>
>> 11.2.1 Email
>>
>> The whole thing about filenames needs to go away. Since it's only a
>> SHOULD requirement, the Report Receiver needs to be able to handle
>> reports that don't follow this format as well as those that do.=20
> "SHOULD" is a very strong normative statement. Note that it permits
> non-conformance only in the presence of singular knowledge by the
> non-conforming party.
>
> Filename labeling is generally considered useful.  Why wouldn't it be
> useful here?

SHOULD isn't strong enough for the Report Receiver to depend on. There
are other ways to get the information that is encoded into the filename.

If the spec wants to suggest, "here's a nice file name format that you
MAY want to use", that's fine. But SHOULD is both too weak if the
recipient can't depend on it and too strong if it's merely advice.
>
>
>> I also
>> wonder if some operating systems have trouble with filenames containin=
g
>> the "!" character.=20
> If they are, they already need to be able to resolve the issue.

I suppose. Seems like there might be other choices that would be less
likely to cause an issue, but I suspect that ship has sailed already.
>
>
>> 14.1 Data Exposure Considerations
Now section 8.1
>>
>> Last paragraph: what's an "unexpected Mail Receiver"?

That's now paragraph 5, and I now think it's clear enough.
>>
>> The privacy consideration here, which isn't obvious from the wording, =
is
>> that users may currently use forwarding in a way that prevents the
>> sender from determining the ultimate delivery address. DMARC has the
>> potential to break that. This might be important in the case of a user=

>> that is trying to distance themselves from a stalker.
> How is that a DMARC-specific 'exposure' consideration?

Because it's the retrieval (or search for) the DMARC record might
reveals that. But on rereading this, paragraph 4 addresses this
sufficiently.

New issue: Paragraph 3 refers to "Both report types" but since iodef was
removed, it should just say "The AFRF report type".
>
>
>> 14.2 Report Recipients
>>
>> Some potential exists for report recipients to perform traffic analysi=
s:
>> to obtain metadata about the receiver's traffic. In addition to
>> verifying compliance with policies, receivers need to consider that
>> before sending reports to a third party.
> +1
-Jim



From nobody Sun Dec 21 07:38:20 2014
Return-Path: <stephen@xemacs.org>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CF3B81A1A95 for <dmarc@ietfa.amsl.com>; Sun, 21 Dec 2014 07:38:11 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.609
X-Spam-Level: 
X-Spam-Status: No, score=0.609 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_EQ_JP=1.244, HOST_EQ_JP=1.265] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SUJDVwD_ygQw for <dmarc@ietfa.amsl.com>; Sun, 21 Dec 2014 07:38:09 -0800 (PST)
Received: from shako.sk.tsukuba.ac.jp (shako.sk.tsukuba.ac.jp [130.158.97.161]) by ietfa.amsl.com (Postfix) with ESMTP id D99F81A1A92 for <dmarc@ietf.org>; Sun, 21 Dec 2014 07:38:08 -0800 (PST)
Received: from uwakimon.sk.tsukuba.ac.jp (uwakimon.sk.tsukuba.ac.jp [130.158.99.156]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by shako.sk.tsukuba.ac.jp (Postfix) with ESMTPS id 097481C38CB; Mon, 22 Dec 2014 00:38:07 +0900 (JST)
Received: by uwakimon.sk.tsukuba.ac.jp (Postfix, from userid 1000) id D216D1A2CFC; Mon, 22 Dec 2014 00:38:06 +0900 (JST)
From: "Stephen J. Turnbull" <stephen@xemacs.org>
To: Jim Fenton <fenton@bluepopcorn.net>
In-Reply-To: <54967461.2070702@bluepopcorn.net>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <5494A6F5.5020906@dcrocker.net> <54967461.2070702@bluepopcorn.net>
X-Mailer: VM undefined under 21.5  (beta34) "kale" acf1c26e3019 XEmacs Lucid (x86_64-unknown-linux)
Date: Mon, 22 Dec 2014 00:38:06 +0900
Message-ID: <874mspnhcx.fsf@uwakimon.sk.tsukuba.ac.jp>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/GTW5q3djrJHOQz9Z3duiKXR_icc
Cc: "dmarc@ietf.org" <dmarc@ietf.org>, "Murray S. Kucherawy" <superuser@gmail.com>, dcrocker@bbiw.net
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 21 Dec 2014 15:38:13 -0000

Jim Fenton writes:
 > Hi, Dave -
 > 
 > On 12/19/2014 02:30 PM, Dave Crocker wrote:
 > 
 > [2.4 Out of Scope]
 > >> Bullet 10: Again, DMARC doesn't do authentication, even for domains; it
 > >> relies on other authentication mechanisms.
 > > I originally thought this, too, but in fact DMARC does do authentication:
 > >
 > >      DMARC asserts authenticity of the rfc5322.From field domain name.
 > > That's a distinct semantic increment over anything SPF or DKIM do on
 > > their own.
 > 
 > What it does is different enough from SPF and DKIM that I think it's
 > overloading the term "authentication" to use it again here. It doesn't
 > contribute to a clear understanding. It looks at the results of SPF and
 > DKIM, which operate at the domain level, so this bullet isn't really
 > necessary.

It's important to be precise about these concepts.  As I read RFC
4949, Dave is correct.  It's true that most of the heavy lifting was
done by SPF or DKIM, and in that sense DMARC is very different.

Nevertheless, it's the fact that DMARC authenticates the domain of the
address in From that makes it useful.  And problematic: it is that
claim of authentication that justifies use of "p=reject".  It had
better be in the document.


From nobody Sun Dec 21 08:23:20 2014
Return-Path: <dhc@dcrocker.net>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 20A421A1B63 for <dmarc@ietfa.amsl.com>; Sun, 21 Dec 2014 08:23:17 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dDwDG0vnFB10 for <dmarc@ietfa.amsl.com>; Sun, 21 Dec 2014 08:23:14 -0800 (PST)
Received: from sbh17.songbird.com (sbh17.songbird.com [72.52.113.17]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 354331A1B5F for <dmarc@ietf.org>; Sun, 21 Dec 2014 08:23:13 -0800 (PST)
Received: from [192.168.1.66] (76-218-8-156.lightspeed.sntcca.sbcglobal.net [76.218.8.156]) (authenticated bits=0) by sbh17.songbird.com (8.13.8/8.13.8) with ESMTP id sBLGN5CT006565 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT); Sun, 21 Dec 2014 08:23:09 -0800
Message-ID: <5496F3E0.7040205@dcrocker.net>
Date: Sun, 21 Dec 2014 08:22:56 -0800
From: Dave Crocker <dhc@dcrocker.net>
Organization: Brandenburg InternetWorking
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Thunderbird/31.3.0
MIME-Version: 1.0
To: Jim Fenton <fenton@bluepopcorn.net>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <5494A6F5.5020906@dcrocker.net> <54967461.2070702@bluepopcorn.net>
In-Reply-To: <54967461.2070702@bluepopcorn.net>
Content-Type: text/plain; charset=windows-1252
Content-Transfer-Encoding: 8bit
X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.0 (sbh17.songbird.com [72.52.113.66]); Sun, 21 Dec 2014 08:23:09 -0800 (PST)
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/E_4Amd8eFX5VtiUKk06_kn9TXvg
Cc: "dmarc@ietf.org" <dmarc@ietf.org>, "Murray S. Kucherawy" <superuser@gmail.com>
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: dcrocker@bbiw.net
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 21 Dec 2014 16:23:17 -0000

On 12/20/2014 11:18 PM, Jim Fenton wrote:
>>      DMARC asserts authenticity of the rfc5322.From field domain name.
>> That's a distinct semantic increment over anything SPF or DKIM do on
>> their own.
> 
> What it does is different enough from SPF and DKIM that I think it's
> overloading the term "authentication" to use it again here.

Jim,

It's not 'overloading' anything.

Authentication is a term of art.  It's meaning is well-established.  For
example:

   Internet Security Glossary, Version 2
   https://tools.ietf.org/html/rfc4949

   $ authentication
      (I) The process of verifying a claim that a system entity or
      system resource has a certain attribute value.

There are many authentication mechanisms.  The issue is not whether
DMARC's authentication is 'different from' SPF or DKIM.  The issue is
whether it is authenticating something.

It is.

The fact that SPF and DKIM are in the mix is not relevant to the
question of whether DMARC is authenticating something.

It is authenticating the domain name in the rfc5322.From field.

Neither SPF nor DKIM make any assertions about the validity of the
domain name in the rfc5322.From field.


> It doesn't
> contribute to a clear understanding. It looks at the results of SPF and
> DKIM, which operate at the domain level, so this bullet isn't really
> necessary.

The results of SPF and DKIM say nothing about the rfc5322.From field.
The assertion of validity for the domain name in that field is a bit of
value-add that is specific to DMARC.  Value-add of that sort is
classically called authentication.


>>> 3.1.2 General Concepts
>> ...
>>> Paragraph 3 doesn't quite capture the sense of alignment properly,
>>> especially for SPF. A message that is authorized by SPF might have an
>>> unaligned envelope-from address, so the validity of SPF for such
>>> messages is moot.
>> I think this is par. 2 in the -08 draft and that text looks fine to me.
> 
> Yes, paragraph 2. My point is that a the last sentence seems to say that
> if a message arrives from a server authorized by SPF, it will not be
> affected by DMARC policies.
...

>> If someone thinks the text needs changing, they need to offer candidate
>> text.
> 
> DMARC's filtering function is based on whether SPF or DKIM can provide
> an authenticated, aligned identifier for the message under
> consideration. Messages that purport to be from a Domain Owner's domain
> and arrive from servers that are not authorized by that domain's SPF and
> do not contain an appropriate DKIM signature can be affected by DMARC
> policies.

I don't read that existing last sentence the way you do.  However on
reflection, I think the first sentence can be improved and would prefer
some wording changes for the paragraph, too.  Perhaps:

   DMARC's filtering function is based on whether the rfc5322.From field
domain is aligned with (matches) an authenticated domain name from SPF
or DKIM.  When a message has a published DMARC policy associated with
the domain name in the RFC5322.From field, and that domain is not
validated through SPF or DKIM, the disposition of that message can be
affected by the DMARC policy.



>>> 4. Policy
>>>
>>> Paragraph 4 basically says, 
...
>> There are, of course, other possibilities, such as not having DMARC
>> pursue operational nuance that makes the spec more complex, trying to
>> handle special cases.  That is, if a site isn't ready to use DMARC, it
>> shouldn't.
> 
> The point is that use of DMARC may come first, and makes SPF and DKIM
> more brittle. Domains that have deployed DMARC may want to deploy both
> SPF and DKIM (having already deployed one or the other), but it would be
> better if they didn't have to turn off DMARC to do so.

It does not 'make SPF and DKIM more brittle'.  It does not affect their
operation at all.

As for DMARC 'coming first', I don't understand that.  DMARC can't
operate without an existing SPF and/or DKIM infrastructure.

At any rate, as for your 'it would be better' assertion, it well might
be true.  But responding to that concern can't happen in isolation.

To deal with it appears to impose more overall complexity.  And systems
complexity creates its own base of errors that we would then have to
deal with.


>>> 5. DMARC policy record
>>>
>>> Paragraph 2: Again, "matches perfectly with the DNS" is an inaccurate
>>> characterization. If the query requirement matched perfectly with the
>>> DNS, DNS would have a way to determine the Administrative Domain without
>>> resorting to suffix lists and such. Just strike the sentence; this isn't
>>> relevant here anyway.
>> -08 doesn't have this language.
> 
> Now section 5.1, paragraph 2. Honestly, this reads like marketing fluff
> that doesn't belong in a specification like this.

'Perfectly' and 'considerable' do tend to add a bit of marketing tone.

I think that dropping those two words moves the entire paragraph into
the realm of offering a simple and common justification for use of the
DNS, presumably instead of inventing a new query mechanism.

People often do not understand the benefit of re-using an existing
mechanism rather than defining a new one, especially when the mechanism
involves a deployment and operation of a global infrastructure.  (cf,
DKIM vs. IIM...)


>>> 7.1 Verifying External Destinations
>>>
>>> Paragraph 3: "verification steps SHOULD be taken" These steps are to
>>> protect another domain from attack. It needs to be a MUST.
>> 6.1 in -08.
>>
>> Given the problems with the search for org domain, a SHOULD is as far as
>> is practical here.
>>
>> I'd suggest noting that that's a reason this can't be a MUST.
> 
> This is already predicated on having discovered the DMARC policy, so the
> org domain search is irrelevant.
> 
> If this is only a SHOULD, under what circumstances might a Mail Receiver
> follow a different procedure, or not do this at all? 

When the receiver has some basis for knowing that it's ok to deviate
from this portion of the specification.


d/

-- 
Dave Crocker
Brandenburg InternetWorking
bbiw.net


From nobody Mon Dec 22 07:44:09 2014
Return-Path: <sklist@kitterman.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BDD2F1A1A9A for <dmarc@ietfa.amsl.com>; Mon, 22 Dec 2014 07:44:07 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.103
X-Spam-Level: 
X-Spam-Status: No, score=-0.103 tagged_above=-999 required=5 tests=[BAYES_40=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pea7LKn_esLZ for <dmarc@ietfa.amsl.com>; Mon, 22 Dec 2014 07:44:05 -0800 (PST)
Received: from mailout03.controlledmail.com (mailout03.controlledmail.com [208.43.65.50]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B81B51A1A69 for <dmarc@ietf.org>; Mon, 22 Dec 2014 07:44:05 -0800 (PST)
Received: from kitterman-optiplex-9020m.localnet (static-72-81-252-21.bltmmd.fios.verizon.net [72.81.252.21]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mailout03.controlledmail.com (Postfix) with ESMTPSA id CFA84C40103 for <dmarc@ietf.org>; Mon, 22 Dec 2014 09:44:04 -0600 (CST)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=kitterman.com; s=201409; t=1419263044; bh=J1K9N7cpxNLXuyFPbNWr9xCcKcROPMu4hoeUFS+yq9g=; h=From:To:Subject:Date:In-Reply-To:References:From; b=utlXTskm8jGcQb/WDwSLq1DiCYmJuJmQJ87e/Ti52ctsxP5MP+Wlx83NNmGsd7DRO neWHXExLpPBMbV1nRgHMr9hv+rV2xh+F2WGHsBgtRDYPv3FxRO4h/fxQU+BCwMKLTG ZjKkaTS0Gy2T7SSHWPMUIshbM7Dz7Y55M0Spk24c=
From: Scott Kitterman <sklist@kitterman.com>
To: dmarc@ietf.org
Date: Mon, 22 Dec 2014 10:44:04 -0500
Message-ID: <6858606.AfKicQ9CJZ@kitterman-optiplex-9020m>
User-Agent: KMail/4.13.3 (Linux/3.13.0-37-generic; KDE/4.13.3; x86_64; ; )
In-Reply-To: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 7Bit
Content-Type: text/plain; charset="us-ascii"
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/Yp3bStKMED6bZT9MgAXIsZvJjQU
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Dec 2014 15:44:07 -0000

On Friday, December 19, 2014 01:30:10 PM Murray S. Kucherawy wrote:
> Colleagues,
> 
> draft-kucherawy-dmarc-base is nearing IESG conflict review, and it's been
> pointed out that a review from back in April has not been properly attended
> to.
> 
> Could I get the WG (forgive me, co-chairs!) to comment on this so that I
> can see what changes might be appropriate here?  Having this resolved
> before the telechat in the first week of January would be truly delightful.
> 
> Note that some amount of this may have already been addressed (it was about
> -04; -08 is current, and at least the ABNF issue Jim raises will be handled
> in -09), so please at least check -08 when considering your responses.
> 
> The posting:
> http://www.ietf.org/mail-archive/web/dmarc/current/msg00764.html

There was a recent thread on postfix-users about DMARC rejections when there 
are DNS errors that caused me to review -08 to see what it says on the matter.

At the end of section 5.6.2, it says:

   Handling of messages for which SPF and/or DKIM evaluation encounters
   a DNS error is left to the discretion of the Mail Receiver.  Further
   discussion is available in Section 5.6.3.

My reading of 5.6.3 though is that it only discusses DNS errors in the context 
of failing to retrieve the DMARC record.  Any discussion about handling DNS 
errors for SPF/DKIM seems to be missing.

Scott K


From nobody Mon Dec 22 10:40:41 2014
Return-Path: <franck@peachymango.org>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 298B31A1BF6 for <dmarc@ietfa.amsl.com>; Mon, 22 Dec 2014 10:40:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.601
X-Spam-Level: 
X-Spam-Status: No, score=-0.601 tagged_above=-999 required=5 tests=[BAYES_05=-0.5, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JaVa0HEqBG4j for <dmarc@ietfa.amsl.com>; Mon, 22 Dec 2014 10:40:39 -0800 (PST)
Received: from mx-out-1.zmailcloud.com (01.zmailcloud.com [192.198.85.104]) by ietfa.amsl.com (Postfix) with ESMTP id 294321A1BEC for <dmarc@ietf.org>; Mon, 22 Dec 2014 10:40:39 -0800 (PST)
Received: from smtp.01.com (smtp.01.com [10.10.0.43]) by mx-out-1.zmailcloud.com (Postfix) with ESMTP id A9DD5564BCD; Mon, 22 Dec 2014 12:40:38 -0600 (CST)
Received: from localhost (localhost [127.0.0.1]) by smtp-out-2.01.com (Postfix) with ESMTP id 8B9086027C; Mon, 22 Dec 2014 12:40:38 -0600 (CST)
X-Virus-Scanned: amavisd-new at smtp-out-2.01.com
Received: from smtp.01.com ([127.0.0.1]) by localhost (smtp-out-2.01.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id d_FMckSk6sOH; Mon, 22 Dec 2014 12:40:38 -0600 (CST)
Received: from smtp.01.com (localhost [127.0.0.1]) by smtp-out-2.01.com (Postfix) with ESMTP id 52D3F60153; Mon, 22 Dec 2014 12:40:38 -0600 (CST)
DKIM-Filter: OpenDKIM Filter v2.8.4 smtp-out-2.01.com 52D3F60153
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=peachymango.org; s=61F775A4-4A7F-11E4-A6BB-61E3068E35F6; t=1419273638; bh=gA2QqOHyslKz4uq72EulAIjeufRaC1f0at8MZLCfgcM=; h=Date:From:To:Message-ID:Subject:MIME-Version:Content-Type: Content-Transfer-Encoding; b=HquhZQna435pvZIQ0H5znrafDbjNb8KW5e5DlZB4kyDScH2C6h3kktsnmXce1mcxO c3Iwlrx8B8guEUfy5gr/u4dgnQ2F7zE2P63fAu5BIih9PyHn5sxHYIhfVh4yLrNgf5 mvy8WiEjtPmst3zouWSh6HESzqkFWrd3eZs+gzQs=
Received: from localhost (localhost [127.0.0.1]) by smtp-out-2.01.com (Postfix) with ESMTP id 397B06027C; Mon, 22 Dec 2014 12:40:38 -0600 (CST)
X-Virus-Scanned: amavisd-new at smtp-out-2.01.com
Received: from smtp.01.com ([127.0.0.1]) by localhost (smtp-out-2.01.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id SfnT-nu6TWY1; Mon, 22 Dec 2014 12:40:38 -0600 (CST)
Received: from mail-2.01.com (mail.01.com [10.10.0.41]) by smtp-out-2.01.com (Postfix) with ESMTP id 16EB760153; Mon, 22 Dec 2014 12:40:38 -0600 (CST)
Date: Mon, 22 Dec 2014 12:40:36 -0600 (CST)
From: Franck Martin <franck@peachymango.org>
To: Scott Kitterman <sklist@kitterman.com>
Message-ID: <951030635.14870.1419273636075.JavaMail.zimbra@peachymango.org>
In-Reply-To: <WM!9543661f657248dc741330b4b167a949446f09cd6be3f25fdf9d91615225029aa0fd14d2fb2d5e5bdc468c9f985b9b67!@asav-2.01.com>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <6858606.AfKicQ9CJZ@kitterman-optiplex-9020m> <WM!9543661f657248dc741330b4b167a949446f09cd6be3f25fdf9d91615225029aa0fd14d2fb2d5e5bdc468c9f985b9b67!@asav-2.01.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable
X-Originating-IP: [10.1.101.178]
X-Mailer: Zimbra 8.0.5_GA_5839 (ZimbraWebClient - FF34 (Mac)/8.0.5_GA_5839)
Thread-Topic: Jim Fenton's review of -04
Thread-Index: lKz/DnmO+LZ66y3FBTCHGM3YMETSyw==
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/s9G5dDUpfAYgDLaXyOHWoP5Wr3o
Cc: dmarc@ietf.org
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Dec 2014 18:40:41 -0000

----- Original Message -----
> From: "Scott Kitterman" <sklist@kitterman.com>
> To: dmarc@ietf.org
> Sent: Monday, December 22, 2014 7:44:04 AM
> Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
>=20
> On Friday, December 19, 2014 01:30:10 PM Murray S. Kucherawy wrote:
> > Colleagues,
> >=20
> > draft-kucherawy-dmarc-base is nearing IESG conflict review, and it's be=
en
> > pointed out that a review from back in April has not been properly atte=
nded
> > to.
> >=20
> > Could I get the WG (forgive me, co-chairs!) to comment on this so that =
I
> > can see what changes might be appropriate here?  Having this resolved
> > before the telechat in the first week of January would be truly delight=
ful.
> >=20
> > Note that some amount of this may have already been addressed (it was a=
bout
> > -04; -08 is current, and at least the ABNF issue Jim raises will be han=
dled
> > in -09), so please at least check -08 when considering your responses.
> >=20
> > The posting:
> > http://www.ietf.org/mail-archive/web/dmarc/current/msg00764.html
>=20
> There was a recent thread on postfix-users about DMARC rejections when th=
ere
> are DNS errors that caused me to review -08 to see what it says on the
> matter.
>=20
> At the end of section 5.6.2, it says:
>=20
>    Handling of messages for which SPF and/or DKIM evaluation encounters
>    a DNS error is left to the discretion of the Mail Receiver.  Further
>    discussion is available in Section 5.6.3.
>=20
> My reading of 5.6.3 though is that it only discusses DNS errors in the
> context
> of failing to retrieve the DMARC record.  Any discussion about handling D=
NS
> errors for SPF/DKIM seems to be missing.


I had a few issues with a large sender, which had their TXT record overload=
ed (not uncommon, this is where google analytics and other wants to prove w=
ho you are). Combined with a low TTL, it would happen rarely, but frequentl=
y enough that an SPF could not be assessed and DMARC would fail. The fallba=
ck mechanism in bind is slow when you have edns issues.

1) I wished that SPF record location would have been _spf.<domain name>
2) may be here the recommendation, is that with DMARC it is best to tempfai=
l an email if you can=E2=80=99t get an SPF result due to DNS (same with DKI=
M), rather than carry on and pass the result to higher policy layers.


From nobody Mon Dec 22 11:02:34 2014
Return-Path: <sklist@kitterman.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 86C741A6D3F for <dmarc@ietfa.amsl.com>; Mon, 22 Dec 2014 11:02:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.002
X-Spam-Level: 
X-Spam-Status: No, score=-2.002 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id akSnmLNC1Q6b for <dmarc@ietfa.amsl.com>; Mon, 22 Dec 2014 11:02:30 -0800 (PST)
Received: from mailout03.controlledmail.com (mailout03.controlledmail.com [208.43.65.50]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 409831A3BA3 for <dmarc@ietf.org>; Mon, 22 Dec 2014 11:02:30 -0800 (PST)
Received: from kitterman-optiplex-9020m.localnet (static-72-81-252-21.bltmmd.fios.verizon.net [72.81.252.21]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mailout03.controlledmail.com (Postfix) with ESMTPSA id 749FAC40103 for <dmarc@ietf.org>; Mon, 22 Dec 2014 13:02:28 -0600 (CST)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=kitterman.com; s=201409; t=1419274948; bh=Z+O8YKSCJUHZTT+uvAvUnXedw0rxF5IKVcpV0q24rMg=; h=From:To:Subject:Date:In-Reply-To:References:From; b=j661/EtvVx2z8rQkUMP72Z87GJBJNlDTqP+0+WL4tXq3KcZ0ClatlJnVE/+LXhzCU MjmjYpSxHrSVyO7GTxQtMCCi2YdS89K51iKVgMnjcpmx+dZqUZaRmRvb9w37ep8X8R zHKkAXjeZs0dvl5HK/RyhQq0VLxvpo79xrJSJrqM=
From: Scott Kitterman <sklist@kitterman.com>
To: dmarc@ietf.org
Date: Mon, 22 Dec 2014 14:02:28 -0500
Message-ID: <4068953.ZrKghXMp7t@kitterman-optiplex-9020m>
User-Agent: KMail/4.13.3 (Linux/3.13.0-37-generic; KDE/4.13.3; x86_64; ; )
In-Reply-To: <951030635.14870.1419273636075.JavaMail.zimbra@peachymango.org>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <WM!9543661f657248dc741330b4b167a949446f09cd6be3f25fdf9d91615225029aa0fd14d2fb2d5e5bdc468c9f985b9b67!@asav-2.01.com> <951030635.14870.1419273636075.JavaMail.zimbra@peachymango.org>
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain; charset="utf-8"
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/1p0mrxMWQ3On43YLn_T43w_bs-w
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Dec 2014 19:02:32 -0000

On Monday, December 22, 2014 12:40:36 PM Franck Martin wrote:
> ----- Original Message -----
>=20
> > From: "Scott Kitterman" <sklist@kitterman.com>
> > To: dmarc@ietf.org
> > Sent: Monday, December 22, 2014 7:44:04 AM
> > Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
> >=20
> > On Friday, December 19, 2014 01:30:10 PM Murray S. Kucherawy wrote:=

> > > Colleagues,
> > >=20
> > > draft-kucherawy-dmarc-base is nearing IESG conflict review, and i=
t's
> > > been
> > > pointed out that a review from back in April has not been properl=
y
> > > attended
> > > to.
> > >=20
> > > Could I get the WG (forgive me, co-chairs!) to comment on this so=
 that I
> > > can see what changes might be appropriate here?  Having this reso=
lved
> > > before the telechat in the first week of January would be truly
> > > delightful.
> > >=20
> > > Note that some amount of this may have already been addressed (it=
 was
> > > about
> > > -04; -08 is current, and at least the ABNF issue Jim raises will =
be
> > > handled
> > > in -09), so please at least check -08 when considering your respo=
nses.
> > >=20
> > > The posting:
> > > http://www.ietf.org/mail-archive/web/dmarc/current/msg00764.html
> >=20
> > There was a recent thread on postfix-users about DMARC rejections w=
hen
> > there are DNS errors that caused me to review -08 to see what it sa=
ys on
> > the matter.
> >=20
> > At the end of section 5.6.2, it says:
> >    Handling of messages for which SPF and/or DKIM evaluation encoun=
ters
> >    a DNS error is left to the discretion of the Mail Receiver.  Fur=
ther
> >    discussion is available in Section 5.6.3.
> >=20
> > My reading of 5.6.3 though is that it only discusses DNS errors in =
the
> > context
> > of failing to retrieve the DMARC record.  Any discussion about hand=
ling
> > DNS
> > errors for SPF/DKIM seems to be missing.
>=20
> I had a few issues with a large sender, which had their TXT record
> overloaded (not uncommon, this is where google analytics and other wa=
nts to
> prove who you are). Combined with a low TTL, it would happen rarely, =
but
> frequently enough that an SPF could not be assessed and DMARC would f=
ail.
> The fallback mechanism in bind is slow when you have edns issues.
>=20
> 1) I wished that SPF record location would have been _spf.<domain nam=
e>
> 2) may be here the recommendation, is that with DMARC it is best to t=
empfail
> an email if you can=E2=80=99t get an SPF result due to DNS (same with=
 DKIM), rather
> than carry on and pass the result to higher policy layers.

The underscore location was considered at the time, but in 2004 we beli=
eved=20
that it would have created a significant barrier to deployment since ma=
ny=20
tools/service provider control panels at the time didn't allow it.  It =
would=20
certainly be better now, but as with type SPF, there's no transition=20=

mechanism.  If we were going to transition SPF records anywhere, it wou=
ld have=20
been better to do it to the new RR type.

Both SPF and DKIM do have a temporary error state, so it's certainly po=
ssible=20
to include this.  I think it's totally up to the receiver if they choos=
e to=20
defer (45X) or choose not to use DMARC in case of a temporary error in =
one of=20
the underlying protocols (i.e. SPF or DKIM) making it impossible to mak=
e a=20
complete DMARC evaluation.

Perhaps 5.6.3 needs something like "SHOULD NOT act on DMARC policy if a=
=20
temporary error in SPF or DKIM processing prevents a full evaluation."

Scott K


From nobody Mon Dec 22 11:11:36 2014
Return-Path: <R.E.Sonneveld@sonnection.nl>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 233DB1A1EF2 for <dmarc@ietfa.amsl.com>; Mon, 22 Dec 2014 11:11:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.701
X-Spam-Level: 
X-Spam-Status: No, score=-2.701 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fdMqeIk3V9Ul for <dmarc@ietfa.amsl.com>; Mon, 22 Dec 2014 11:11:30 -0800 (PST)
Received: from mx20.mailtransaction.com (mx20.mailtransaction.com [78.46.16.213]) by ietfa.amsl.com (Postfix) with ESMTP id EA18D1A6F2B for <dmarc@ietf.org>; Mon, 22 Dec 2014 11:11:15 -0800 (PST)
Received: from mx14.mailtransaction.com (mx11.mailtransaction.com [88.198.59.230]) by mx20.mailtransaction.com (Postfix) with ESMTP id 3k5qz63QNjz1L8cr; Mon, 22 Dec 2014 20:11:14 +0100 (CET)
Received: from jaguar.sonnection.nl (D57E1702.static.ziggozakelijk.nl [213.126.23.2]) by mx14.mailtransaction.com (Postfix) with ESMTP id 3k5qz61tvHz5MhcJ; Mon, 22 Dec 2014 20:11:14 +0100 (CET)
Received: from localhost (localhost [127.0.0.1]) by jaguar.sonnection.nl (Postfix) with ESMTP id 46FE9123488; Mon, 22 Dec 2014 20:11:18 +0100 (CET)
X-Virus-Scanned: amavisd-new at sonnection.nl
Received: from jaguar.sonnection.nl ([127.0.0.1]) by localhost (jaguar.sonnection.nl [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id Xx4nnPkqGzBH; Mon, 22 Dec 2014 20:11:12 +0100 (CET)
Received: from [192.168.1.49] (unknown [192.168.1.49]) by jaguar.sonnection.nl (Postfix) with ESMTPSA id ADAF6123482; Mon, 22 Dec 2014 20:11:12 +0100 (CET)
Message-ID: <54986CCC.70200@sonnection.nl>
Date: Mon, 22 Dec 2014 20:11:08 +0100
From: "Rolf E. Sonneveld" <R.E.Sonneveld@sonnection.nl>
Organization: Sonnection B.V.
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.3.0
MIME-Version: 1.0
To: Scott Kitterman <sklist@kitterman.com>, dmarc@ietf.org
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <WM!9543661f657248dc741330b4b167a949446f09cd6be3f25fdf9d91615225029aa0fd14d2fb2d5e5bdc468c9f985b9b67!@asav-2.01.com> <951030635.14870.1419273636075.JavaMail.zimbra@peachymango.org> <4068953.ZrKghXMp7t@kitterman-optiplex-9020m>
In-Reply-To: <4068953.ZrKghXMp7t@kitterman-optiplex-9020m>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: quoted-printable
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=sonnection.nl; s=2009; t=1419275474; bh=rFk1FUcHLMR0ET2WHkaQcSGbgfSL6mb41sX3f2QZqFI=; h=Message-ID:Date:From:To:Subject:From; b=Z5mCgy61/0hY7MK+TL6uAldnQqU0L6pctAVOakPmPvcxo4kHDUxvGMMKcCLKfxfnY mayQVnrJdTqoLPFyHspX3Tw8NKmjPJ17fI9vdLdqlOx6OSpNFahcYr/Ztm6wYEFQSZ UAcBjyzhpWPJ2lytYrp0hi7+D6Y5f56SxrHwBK2M=
DKIM-Filter: OpenDKIM Filter v2.8.2 mx20.mailtransaction.com 3k5qz63QNjz1L8cr
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/GX1EoKOHsgRADtVmLOH2Zshm6e4
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: R.E.Sonneveld@sonnection.nl
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Dec 2014 19:11:34 -0000

On 12/22/2014 08:02 PM, Scott Kitterman wrote:
> On Monday, December 22, 2014 12:40:36 PM Franck Martin wrote:
>> ----- Original Message -----
>>
>>> From: "Scott Kitterman" <sklist@kitterman.com>
>>> To: dmarc@ietf.org
>>> Sent: Monday, December 22, 2014 7:44:04 AM
>>> Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
>>>
>>> On Friday, December 19, 2014 01:30:10 PM Murray S. Kucherawy wrote:
>>>> Colleagues,
>>>>
>>>> draft-kucherawy-dmarc-base is nearing IESG conflict review, and it's
>>>> been
>>>> pointed out that a review from back in April has not been properly
>>>> attended
>>>> to.
>>>>
>>>> Could I get the WG (forgive me, co-chairs!) to comment on this so th=
at I
>>>> can see what changes might be appropriate here?  Having this resolve=
d
>>>> before the telechat in the first week of January would be truly
>>>> delightful.
>>>>
>>>> Note that some amount of this may have already been addressed (it wa=
s
>>>> about
>>>> -04; -08 is current, and at least the ABNF issue Jim raises will be
>>>> handled
>>>> in -09), so please at least check -08 when considering your response=
s.
>>>>
>>>> The posting:
>>>> http://www.ietf.org/mail-archive/web/dmarc/current/msg00764.html
>>> There was a recent thread on postfix-users about DMARC rejections whe=
n
>>> there are DNS errors that caused me to review -08 to see what it says=
 on
>>> the matter.
>>>
>>> At the end of section 5.6.2, it says:
>>>     Handling of messages for which SPF and/or DKIM evaluation encount=
ers
>>>     a DNS error is left to the discretion of the Mail Receiver.  Furt=
her
>>>     discussion is available in Section 5.6.3.
>>>
>>> My reading of 5.6.3 though is that it only discusses DNS errors in th=
e
>>> context
>>> of failing to retrieve the DMARC record.  Any discussion about handli=
ng
>>> DNS
>>> errors for SPF/DKIM seems to be missing.
>> I had a few issues with a large sender, which had their TXT record
>> overloaded (not uncommon, this is where google analytics and other wan=
ts to
>> prove who you are). Combined with a low TTL, it would happen rarely, b=
ut
>> frequently enough that an SPF could not be assessed and DMARC would fa=
il.
>> The fallback mechanism in bind is slow when you have edns issues.
>>
>> 1) I wished that SPF record location would have been _spf.<domain name=
>
>> 2) may be here the recommendation, is that with DMARC it is best to te=
mpfail
>> an email if you can=E2=80=99t get an SPF result due to DNS (same with =
DKIM), rather
>> than carry on and pass the result to higher policy layers.
> The underscore location was considered at the time, but in 2004 we beli=
eved
> that it would have created a significant barrier to deployment since ma=
ny
> tools/service provider control panels at the time didn't allow it.  It =
would
> certainly be better now, but as with type SPF, there's no transition
> mechanism.  If we were going to transition SPF records anywhere, it wou=
ld have
> been better to do it to the new RR type.
>
> Both SPF and DKIM do have a temporary error state, so it's certainly po=
ssible
> to include this.  I think it's totally up to the receiver if they choos=
e to
> defer (45X) or choose not to use DMARC in case of a temporary error in =
one of
> the underlying protocols (i.e. SPF or DKIM) making it impossible to mak=
e a
> complete DMARC evaluation.
>
> Perhaps 5.6.3 needs something like "SHOULD NOT act on DMARC policy if a
> temporary error in SPF or DKIM processing prevents a full evaluation."

+1

/rolf


From nobody Mon Dec 22 11:16:22 2014
Return-Path: <dhc@dcrocker.net>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 41CE71A6EF3 for <dmarc@ietfa.amsl.com>; Mon, 22 Dec 2014 11:16:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8Q8nFpPj0TL1 for <dmarc@ietfa.amsl.com>; Mon, 22 Dec 2014 11:16:17 -0800 (PST)
Received: from sbh17.songbird.com (sbh17.songbird.com [72.52.113.17]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DC0F31A6EEC for <dmarc@ietf.org>; Mon, 22 Dec 2014 11:16:16 -0800 (PST)
Received: from [192.168.1.66] (76-218-8-156.lightspeed.sntcca.sbcglobal.net [76.218.8.156]) (authenticated bits=0) by sbh17.songbird.com (8.13.8/8.13.8) with ESMTP id sBMJGCdl012939 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT); Mon, 22 Dec 2014 11:16:15 -0800
Message-ID: <54986DF1.9060807@dcrocker.net>
Date: Mon, 22 Dec 2014 11:16:01 -0800
From: Dave Crocker <dhc@dcrocker.net>
Organization: Brandenburg InternetWorking
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Thunderbird/31.3.0
MIME-Version: 1.0
To: R.E.Sonneveld@sonnection.nl, Scott Kitterman <sklist@kitterman.com>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <WM!9543661f657248dc741330b4b167a949446f09cd6be3f25fdf9d91615225029aa0fd14d2fb2d5e5bdc468c9f985b9b67!@asav-2.01.com> <951030635.14870.1419273636075.JavaMail.zimbra@peachymango.org> <4068953.ZrKghXMp7t@kitterman-optiplex-9020m> <54986CCC.70200@sonnection.nl>
In-Reply-To: <54986CCC.70200@sonnection.nl>
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 7bit
X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.0 (sbh17.songbird.com [72.52.113.66]); Mon, 22 Dec 2014 11:16:16 -0800 (PST)
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/One8k00s1AIAbev4VTua88OqBHU
Cc: dmarc@ietf.org
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: dcrocker@bbiw.net
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Dec 2014 19:16:19 -0000

On 12/22/2014 11:11 AM, Rolf E. Sonneveld wrote:
>>
>> Perhaps 5.6.3 needs something like "SHOULD NOT act on DMARC policy if a
>> temporary error in SPF or DKIM processing prevents a full evaluation."
> 
> +1


We need to be careful about how this is phrased.  I specifically suspect
that the above suggested wording is a bad idea, or worse, probably wrong.

DMARC /requires/ prior validation of the author From domain via a
lower-level mechanism.  SPF and DKIM are defined for now.  If neither of
them validates the domain, then DMARC fails.

There is no 'should' about it.  It fails.

Failing means that the polices are not applied.  As in MUST NOT be applied.

d/

-- 
Dave Crocker
Brandenburg InternetWorking
bbiw.net


From nobody Mon Dec 22 11:39:36 2014
Return-Path: <kurta@drkurt.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 338B81AC3D5 for <dmarc@ietfa.amsl.com>; Mon, 22 Dec 2014 11:39:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.378
X-Spam-Level: 
X-Spam-Status: No, score=-1.378 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id teVmyLaCPpjs for <dmarc@ietfa.amsl.com>; Mon, 22 Dec 2014 11:39:30 -0800 (PST)
Received: from mail-wg0-x22e.google.com (mail-wg0-x22e.google.com [IPv6:2a00:1450:400c:c00::22e]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 53F5C1AC3C8 for <dmarc@ietf.org>; Mon, 22 Dec 2014 11:39:30 -0800 (PST)
Received: by mail-wg0-f46.google.com with SMTP id x13so7462110wgg.5 for <dmarc@ietf.org>; Mon, 22 Dec 2014 11:39:29 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=drkurt.com; s=20130612; h=mime-version:sender:in-reply-to:references:date:message-id:subject :from:to:content-type; bh=BQ5thOAWzrRWFpZ5Id32mxvdRcmQfUiZVaoDSIBz84g=; b=E6G1j5J/QoixM5Y7v/AAv6qzHnKAn4l/U5KDMeQ502M2ouDK8oVTRDh/UCUNu6T+Pw IGz9Y4/hyN8fD9LQauieDcQ8od8jNB7HLLQvpEpCKLHCq/LfN6YKH87kqhQIBaqrbEti XVZ6aitXmSits/VGXbFubHOoEm5KR4gXp01Y8=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:sender:in-reply-to:references:date :message-id:subject:from:to:content-type; bh=BQ5thOAWzrRWFpZ5Id32mxvdRcmQfUiZVaoDSIBz84g=; b=Cny7K5nLnem9usN/HqpB1pcPUyHg+QZBf1rzJkswqwPmxLxGNtqWvhU+HN8plikK9j 8V84D4QZPQeYX4z08WGPsPBWdQ22wgHdbga738ez8qWZWNJ9FuWmBhBy5JP3lbGn6joK WVov5N5d7vbh2ZOUg/z50mH02NV+Au1z00ZM6+E81GVwP3Hr7lKnGHr5R8Yyt4Ah1t4b sgmyfG/8JAmUCo5G2CP071iCcF4IsorQ17HI+z/oTjs0UG2W7gd4Dq/y2znndrjIKei2 L9cgci+CjJ444GVjEuomgKuggsVGM7bo7mlFWaIMgBkoR4zoRrgXTSkv3fRbn8PZV693 +0Fw==
X-Gm-Message-State: ALoCoQmkC7PdRMHQLndrBzMHlzO2+bzMLF3PKiqKv0x8s4wgRTlvOwME6H0Qac19YmRmylXUQANk
MIME-Version: 1.0
X-Received: by 10.194.109.6 with SMTP id ho6mr45095433wjb.93.1419277169008; Mon, 22 Dec 2014 11:39:29 -0800 (PST)
Sender: kurta@drkurt.com
Received: by 10.194.41.161 with HTTP; Mon, 22 Dec 2014 11:39:28 -0800 (PST)
In-Reply-To: <54986DF1.9060807@dcrocker.net>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <WM!9543661f657248dc741330b4b167a949446f09cd6be3f25fdf9d91615225029aa0fd14d2fb2d5e5bdc468c9f985b9b67!@asav-2.01.com> <951030635.14870.1419273636075.JavaMail.zimbra@peachymango.org> <4068953.ZrKghXMp7t@kitterman-optiplex-9020m> <54986CCC.70200@sonnection.nl> <54986DF1.9060807@dcrocker.net>
Date: Mon, 22 Dec 2014 11:39:28 -0800
X-Google-Sender-Auth: 0gPmoQIvpqE_Pa2hFsnRD4DBaIY
Message-ID: <CABuGu1podBwNdxbX2w3TU8ytNVaiQL=qBo5y=5ncuWZXQTReaw@mail.gmail.com>
From: Kurt Andersen <kboth@drkurt.com>
To: Dave Crocker <dcrocker@bbiw.net>, "dmarc@ietf.org" <dmarc@ietf.org>
Content-Type: multipart/alternative; boundary=047d7bf10b507f37f1050ad3374a
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/xMmbCJlbxSbVvDtNsFJVQjJqAVA
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Dec 2014 19:39:33 -0000

--047d7bf10b507f37f1050ad3374a
Content-Type: text/plain; charset=UTF-8

On Mon, Dec 22, 2014 at 11:16 AM, Dave Crocker <dhc@dcrocker.net> wrote:

> On 12/22/2014 11:11 AM, Rolf E. Sonneveld wrote:
> >>
> >> Perhaps 5.6.3 needs something like "SHOULD NOT act on DMARC policy if a
> >> temporary error in SPF or DKIM processing prevents a full evaluation."
> >
> > +1
>
> We need to be careful about how this is phrased.  I specifically suspect
> that the above suggested wording is a bad idea, or worse, probably wrong.
>
> DMARC /requires/ prior validation of the author From domain via a
> lower-level mechanism.  SPF and DKIM are defined for now.  If neither of
> them validates the domain, then DMARC fails.
>
> There is no 'should' about it.  It fails.
>
> Failing means that the polices are not applied.  As in MUST NOT be applied.


DMARC is built on a positive assertion model. To say that a failure means
that no policy is applied is contrary to the model. The policy is
explicitly *applied* if neither SPF nor DMARC validates the aligned domain.

I disagree with the "not act. . .[if not] full evaluation" - if SPF
tempfails, but DKIM passes, that is sufficient for a DMARC pass and I don't
see any reason to force the DMARC evaluation to some other value. If SPF
tempfails and DKIM is missing or fails, then treating the outcome as
"unknown" seems reasonable

If SPF or DKIM come up with a temp error, that could be an attack vector to
bypass DMARC enforcement, but if receivers simply tempfail such mail, it
seems consistent to me with the handling of any other error that is
expected to be transient in nature. If it really is an attack of some sort,
the mail will eventually time out on the sender's machine.

I'm not sure that adding this detail prior to the WG's work output would be
prudent or in keeping with the intent of the current "stake in the sand"
spec.

--Kurt

--047d7bf10b507f37f1050ad3374a
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">On Mon, Dec 22, 2014 at 11:16 AM, Dave Crocker <span dir=
=3D"ltr">&lt;<a href=3D"mailto:dhc@dcrocker.net" target=3D"_blank">dhc@dcro=
cker.net</a>&gt;</span> wrote:<br><div class=3D"gmail_extra"><div class=3D"=
gmail_quote"><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px =
0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><span class=
=3D"">On 12/22/2014 11:11 AM, Rolf E. Sonneveld wrote:<br>
&gt;&gt;<br>
&gt;&gt; Perhaps 5.6.3 needs something like &quot;SHOULD NOT act on DMARC p=
olicy if a<br>
&gt;&gt; temporary error in SPF or DKIM processing prevents a full evaluati=
on.&quot;<br>
&gt;<br>
&gt; +1<br>
<br>
</span>We need to be careful about how this is phrased.=C2=A0 I specificall=
y suspect<br>
that the above suggested wording is a bad idea, or worse, probably wrong.<b=
r>
<br>
DMARC /requires/ prior validation of the author From domain via a<br>
lower-level mechanism.=C2=A0 SPF and DKIM are defined for now.=C2=A0 If nei=
ther of<br>
them validates the domain, then DMARC fails.<br>
<br>
There is no &#39;should&#39; about it.=C2=A0 It fails.<br>
<br>
Failing means that the polices are not applied.=C2=A0 As in MUST NOT be app=
lied.</blockquote><div><br></div><div>DMARC is built on a positive assertio=
n model. To say that a failure means that no policy is applied is contrary =
to the model. The policy is explicitly *applied* if neither SPF nor DMARC v=
alidates the aligned domain. <br><br></div><div>I disagree with the &quot;n=
ot act. . .[if not] full evaluation&quot; - if SPF tempfails, but DKIM pass=
es, that is sufficient for a DMARC pass and I don&#39;t see any reason to f=
orce the DMARC evaluation to some other value. If SPF tempfails and DKIM is=
 missing or fails, then treating the outcome as &quot;unknown&quot; seems r=
easonable<br></div><div><br>If SPF or DKIM come up with a temp error, that =
could be an attack vector to bypass DMARC enforcement, but if receivers sim=
ply tempfail such mail, it seems consistent to me with the handling of any =
other error that is expected to be transient in nature. If it really is an =
attack of some sort, the mail will eventually time out on the sender&#39;s =
machine.<br><br>I&#39;m not sure that adding this detail prior to the WG&#3=
9;s work output would be prudent or in keeping with the intent of the curre=
nt &quot;stake in the sand&quot; spec.<br><br></div><div>--Kurt<br></div></=
div><br></div></div>

--047d7bf10b507f37f1050ad3374a--


From nobody Mon Dec 22 11:47:23 2014
Return-Path: <R.E.Sonneveld@sonnection.nl>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9BEA21A6EE0 for <dmarc@ietfa.amsl.com>; Mon, 22 Dec 2014 11:47:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.701
X-Spam-Level: 
X-Spam-Status: No, score=-2.701 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1Xjfr_3aV3LQ for <dmarc@ietfa.amsl.com>; Mon, 22 Dec 2014 11:47:19 -0800 (PST)
Received: from mx10.mailtransaction.com (mx10.mailtransaction.com [88.198.59.241]) by ietfa.amsl.com (Postfix) with ESMTP id 3204A1A6F80 for <dmarc@ietf.org>; Mon, 22 Dec 2014 11:47:19 -0800 (PST)
Received: from mx24.mailtransaction.com (mx21.mailtransaction.com [78.46.16.236]) by mx10.mailtransaction.com (Postfix) with ESMTP id 3k5rmj4VJzz5MhcJ; Mon, 22 Dec 2014 20:47:17 +0100 (CET)
Received: from jaguar.sonnection.nl (D57E1702.static.ziggozakelijk.nl [213.126.23.2]) by mx24.mailtransaction.com (Postfix) with ESMTP id 3k5rmj31mWz1L8cr; Mon, 22 Dec 2014 20:47:17 +0100 (CET)
Received: from localhost (localhost [127.0.0.1]) by jaguar.sonnection.nl (Postfix) with ESMTP id 637F8123488; Mon, 22 Dec 2014 20:47:21 +0100 (CET)
X-Virus-Scanned: amavisd-new at sonnection.nl
Received: from jaguar.sonnection.nl ([127.0.0.1]) by localhost (jaguar.sonnection.nl [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id SMMlfFssDdgx; Mon, 22 Dec 2014 20:47:16 +0100 (CET)
Received: from [192.168.1.49] (unknown [192.168.1.49]) by jaguar.sonnection.nl (Postfix) with ESMTPSA id DB250123482; Mon, 22 Dec 2014 20:47:15 +0100 (CET)
Message-ID: <5498753F.9090300@sonnection.nl>
Date: Mon, 22 Dec 2014 20:47:11 +0100
From: "Rolf E. Sonneveld" <R.E.Sonneveld@sonnection.nl>
Organization: Sonnection B.V.
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.3.0
MIME-Version: 1.0
To: dcrocker@bbiw.net, Scott Kitterman <sklist@kitterman.com>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <WM!9543661f657248dc741330b4b167a949446f09cd6be3f25fdf9d91615225029aa0fd14d2fb2d5e5bdc468c9f985b9b67!@asav-2.01.com> <951030635.14870.1419273636075.JavaMail.zimbra@peachymango.org> <4068953.ZrKghXMp7t@kitterman-optiplex-9020m> <54986CCC.70200@sonnection.nl> <54986DF1.9060807@dcrocker.net>
In-Reply-To: <54986DF1.9060807@dcrocker.net>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=sonnection.nl; s=2009; t=1419277637; bh=/o3Cz2/OA1/QymeFflB7wAJS1gjcp4Z1AZanslpXXXk=; h=Message-ID:Date:From:To:Subject:From; b=F+mJUeBrilceuHAw/Xnt3gXnHcAVIISmDD0MMCcu4YaoE3XS9UmGj5WH44HMzOya+ FHs/oc+rtwmifhEARXiO0xgTcQxB7I+kfLfa4vEYGOWl2liSvXNiRWNbNQMUkjGTBr EWZepB/OoNMHYCJ6Ww6F6TmQXcRkqK6Ahn2d2EFY=
DKIM-Filter: OpenDKIM Filter v2.8.2 mx10.mailtransaction.com 3k5rmj4VJzz5MhcJ
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/UsxqwLFWv2at36x5vVxukte_vQ4
Cc: dmarc@ietf.org
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: R.E.Sonneveld@sonnection.nl
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Dec 2014 19:47:21 -0000

On 12/22/2014 08:16 PM, Dave Crocker wrote:
> On 12/22/2014 11:11 AM, Rolf E. Sonneveld wrote:
>>> Perhaps 5.6.3 needs something like "SHOULD NOT act on DMARC policy if a
>>> temporary error in SPF or DKIM processing prevents a full evaluation."
>> +1
>
> We need to be careful about how this is phrased.  I specifically suspect
> that the above suggested wording is a bad idea, or worse, probably wrong.
>
> DMARC /requires/ prior validation of the author From domain via a
> lower-level mechanism.  SPF and DKIM are defined for now.  If neither of
> them validates the domain, then DMARC fails.

What do you mean with 'validates'?:

a) confirm that the domain exists and that the required information for 
the lower-level mechanism(s) could successfully be determined?
b) 'authenticates'
c) something else?

Assuming you mean a) (or something that is close to it), then the 
problem here is: what if SPF cannot be 'validated' while DKIM can, and 
vice versa?

>
> There is no 'should' about it.  It fails.
>
> Failing means that the polices are not applied.  As in MUST NOT be applied.

This seems to me to be contradictory of the way the word 'fails' is used 
in http://tools.ietf.org/id/draft-kucherawy-dmarc-base-08.txt. For 
example: how should I interpret these last two lines, when comparing 
this with what is being said about 'fails'  in the context of 
'p=quarantine' and 'p=reject':

>        quarantine:  The Domain Owner wishes to have email that fails the
>           DMARC mechanism check to be treated by Mail Receivers as
>           suspicious.  Depending on the capabilities of the Mail
>           Receiver, this can mean "place into spam folder", "scrutinize
>           with additional intensity", and/or "flag as suspicious".

and

>        reject:  The Domain Owner wishes for Mail Receivers to reject
>           email that fails the DMARC mechanism check.  Rejection SHOULD
>           occur during the SMTP transaction.  See Section 9.3 for some
>           discussion of SMTP rejection methods and their implications.

Please read http://tools.ietf.org/id/draft-kucherawy-dmarc-base-08.txt 
again and mark every occurrence of he word 'fail' or 'fails'. Often it 
is used in the context of DKIM and SPF checks, sometimes in the context 
of DMARC mechanisms etc.

I'm confused.

/rolf


From nobody Mon Dec 22 11:53:40 2014
Return-Path: <franck@peachymango.org>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 703C41A6FF6 for <dmarc@ietfa.amsl.com>; Mon, 22 Dec 2014 11:53:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level: 
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id b1XFxxIUGyqm for <dmarc@ietfa.amsl.com>; Mon, 22 Dec 2014 11:53:32 -0800 (PST)
Received: from mx-out-1.zmailcloud.com (01.zmailcloud.com [192.198.85.104]) by ietfa.amsl.com (Postfix) with ESMTP id 171B41A6FED for <dmarc@ietf.org>; Mon, 22 Dec 2014 11:53:31 -0800 (PST)
Received: from smtp.01.com (smtp.01.com [10.10.0.43]) by mx-out-1.zmailcloud.com (Postfix) with ESMTP id 9BA38564BAC; Mon, 22 Dec 2014 13:53:30 -0600 (CST)
Received: from localhost (localhost [127.0.0.1]) by smtp-out-2.01.com (Postfix) with ESMTP id 92DBC6028C; Mon, 22 Dec 2014 13:53:30 -0600 (CST)
X-Virus-Scanned: amavisd-new at smtp-out-2.01.com
Received: from smtp.01.com ([127.0.0.1]) by localhost (smtp-out-2.01.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EgOwKaJM-fhY; Mon, 22 Dec 2014 13:53:30 -0600 (CST)
Received: from smtp.01.com (localhost [127.0.0.1]) by smtp-out-2.01.com (Postfix) with ESMTP id 66EC66028D; Mon, 22 Dec 2014 13:53:30 -0600 (CST)
DKIM-Filter: OpenDKIM Filter v2.8.4 smtp-out-2.01.com 66EC66028D
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=peachymango.org; s=61F775A4-4A7F-11E4-A6BB-61E3068E35F6; t=1419278010; bh=qsJKiEA+eo4IRJQEhLj0K2O+Nkrb4wEGLv4wUogXzhA=; h=Date:From:To:Message-ID:Subject:MIME-Version:Content-Type: Content-Transfer-Encoding; b=Ufntz/cxNYeD0F+/tk7VFD/OQTHDrHyi1jf6dgp5CoYfXuMAC/as08eJp5HO5kag2 XOSqkQgx9Dt0ygu8vM9MiLyTvsLV42xLxxmEZJGsVtBSsuaB1cXkgmu7Yz/AeIhfk+ tV8zWCnwxgmbREWQaT7xluyloBhxOcAcGrh6q10Y=
Received: from localhost (localhost [127.0.0.1]) by smtp-out-2.01.com (Postfix) with ESMTP id 5019B6028C; Mon, 22 Dec 2014 13:53:30 -0600 (CST)
X-Virus-Scanned: amavisd-new at smtp-out-2.01.com
Received: from smtp.01.com ([127.0.0.1]) by localhost (smtp-out-2.01.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id h7sW7_2SRaOe; Mon, 22 Dec 2014 13:53:30 -0600 (CST)
Received: from mail-2.01.com (mail.01.com [10.10.0.41]) by smtp-out-2.01.com (Postfix) with ESMTP id 2DA0860288; Mon, 22 Dec 2014 13:53:30 -0600 (CST)
Date: Mon, 22 Dec 2014 13:53:30 -0600 (CST)
From: Franck Martin <franck@peachymango.org>
To: dcrocker@bbiw.net
Message-ID: <1219737888.17066.1419278010000.JavaMail.zimbra@peachymango.org>
In-Reply-To: <WM!23a258ca1a3d1d5795a5fa8768900ef1a212c87e4fd0a23d158da7ffd331ae494c9543834846dab74b393ecefef71a60!@asav-3.01.com>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <WM!9543661f657248dc741330b4b167a949446f09cd6be3f25fdf9d91615225029aa0fd14d2fb2d5e5bdc468c9f985b9b67!@asav-2.01.com> <951030635.14870.1419273636075.JavaMail.zimbra@peachymango.org> <4068953.ZrKghXMp7t@kitterman-optiplex-9020m> <54986CCC.70200@sonnection.nl> <54986DF1.9060807@dcrocker.net> <WM!23a258ca1a3d1d5795a5fa8768900ef1a212c87e4fd0a23d158da7ffd331ae494c9543834846dab74b393ecefef71a60!@asav-3.01.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 7bit
X-Originating-IP: [10.1.101.178]
X-Mailer: Zimbra 8.0.5_GA_5839 (ZimbraWebClient - FF34 (Mac)/8.0.5_GA_5839)
Thread-Topic: Jim Fenton's review of -04
Thread-Index: bXRFRVlXfwHdzwnUsnFU1HXAEKsSRA==
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/n9b4FAy8ltOglA1XM56ToJkydYM
Cc: R E Sonneveld <R.E.Sonneveld@sonnection.nl>, dmarc@ietf.org, Scott Kitterman <sklist@kitterman.com>
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Dec 2014 19:53:34 -0000

----- Original Message -----
> From: "Dave Crocker" <dhc@dcrocker.net>
> To: "R E Sonneveld" <R.E.Sonneveld@sonnection.nl>, "Scott Kitterman" <sklist@kitterman.com>
> Cc: dmarc@ietf.org
> Sent: Monday, December 22, 2014 11:16:01 AM
> Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
> 
> On 12/22/2014 11:11 AM, Rolf E. Sonneveld wrote:
> >>
> >> Perhaps 5.6.3 needs something like "SHOULD NOT act on DMARC policy if a
> >> temporary error in SPF or DKIM processing prevents a full evaluation."
> > 
> > +1
> 
> 
> We need to be careful about how this is phrased.  I specifically suspect
> that the above suggested wording is a bad idea, or worse, probably wrong.
> 
> DMARC /requires/ prior validation of the author From domain via a
> lower-level mechanism.  SPF and DKIM are defined for now.  If neither of
> them validates the domain, then DMARC fails.
> 
> There is no 'should' about it.  It fails.
> 
> Failing means that the polices are not applied.  As in MUST NOT be applied.
> 

You are opening an attack vector here. I could DDoS your domain Name servers and then send emails on your behalf... As a receiver, It would be better to tempfail emails until DNS is restored.


From nobody Mon Dec 22 12:18:24 2014
Return-Path: <sklist@kitterman.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 147CE1ABC74 for <dmarc@ietfa.amsl.com>; Mon, 22 Dec 2014 12:18:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.002
X-Spam-Level: 
X-Spam-Status: No, score=-2.002 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HkUjifhob8pv for <dmarc@ietfa.amsl.com>; Mon, 22 Dec 2014 12:18:21 -0800 (PST)
Received: from mailout03.controlledmail.com (mailout03.controlledmail.com [208.43.65.50]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A8CF11A8848 for <dmarc@ietf.org>; Mon, 22 Dec 2014 12:18:21 -0800 (PST)
Received: from kitterman-optiplex-9020m.localnet (static-72-81-252-21.bltmmd.fios.verizon.net [72.81.252.21]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mailout03.controlledmail.com (Postfix) with ESMTPSA id AB877C40103 for <dmarc@ietf.org>; Mon, 22 Dec 2014 14:18:20 -0600 (CST)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=kitterman.com; s=201409; t=1419279500; bh=BI0+NhI3WCeCr+AdVnITNaWTAJ97xjhnYXKB9q81JIg=; h=From:To:Subject:Date:In-Reply-To:References:From; b=Pe8rFk6kqtBH7iKF1TO8f1gP8N/zFxFkXN7jsSOGnN2YPfZVw7EITxQNyCEeNuy/n 0j5fk11xJ1J9XblmzB7pQOZVpeAPHx8X5k7ouziUOoohl6X9lhIkDjcGaNTSkPl4+M O02QHO8DGjlDxMuB4/DWx8OFuZqvlC3lYonZQK0M=
From: Scott Kitterman <sklist@kitterman.com>
To: dmarc@ietf.org
Date: Mon, 22 Dec 2014 15:18:21 -0500
Message-ID: <7243484.JQFTys4I1u@kitterman-optiplex-9020m>
User-Agent: KMail/4.13.3 (Linux/3.13.0-37-generic; KDE/4.13.3; x86_64; ; )
In-Reply-To: <54986DF1.9060807@dcrocker.net>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <54986CCC.70200@sonnection.nl> <54986DF1.9060807@dcrocker.net>
MIME-Version: 1.0
Content-Transfer-Encoding: 7Bit
Content-Type: text/plain; charset="us-ascii"
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/xjvz5DEOG2yZr7GAqVgK_7emI5A
Subject: [dmarc-ietf] DMARC and TEMP errors was: Re: Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Dec 2014 20:18:23 -0000

On Monday, December 22, 2014 11:16:01 AM Dave Crocker wrote:
> On 12/22/2014 11:11 AM, Rolf E. Sonneveld wrote:
> >> Perhaps 5.6.3 needs something like "SHOULD NOT act on DMARC policy if a
> >> temporary error in SPF or DKIM processing prevents a full evaluation."
> > 
> > +1
> 
> We need to be careful about how this is phrased.  I specifically suspect
> that the above suggested wording is a bad idea, or worse, probably wrong.
> 
> DMARC /requires/ prior validation of the author From domain via a
> lower-level mechanism.  SPF and DKIM are defined for now.  If neither of
> them validates the domain, then DMARC fails.
> 
> There is no 'should' about it.  It fails.
> 
> Failing means that the polices are not applied.  As in MUST NOT be applied.

I'm confused.  If DKIM does not verify and align and SPF does not pass and 
align then the DMARC result is fail and the policy IS applied.  I must be 
reading you wrong because I think that's the opposite of what you wrote.

I bring it up because it appears (in the postfix-users discussion) that 
possibly a large mail provider (doesn't matter which, really) may be applying 
DMARC fail policy (to reject in this case) when the underlying SPF/DKIM checks 
do not reach a definitive result due to transient DNS errors.

As I read -08 what to do in that case is undefined.  There's a dangling pointer 
to 5.6.3.  It's dangling because nothing in that section addresses the 
question of how to handle DKIM/SPF temporary errors.

Scott K


From nobody Mon Dec 22 12:27:30 2014
Return-Path: <dhc@dcrocker.net>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5A4F41A6FE3 for <dmarc@ietfa.amsl.com>; Mon, 22 Dec 2014 12:27:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Zp2o4UtaoWc5 for <dmarc@ietfa.amsl.com>; Mon, 22 Dec 2014 12:27:28 -0800 (PST)
Received: from sbh17.songbird.com (sbh17.songbird.com [72.52.113.17]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EE5691A6F10 for <dmarc@ietf.org>; Mon, 22 Dec 2014 12:27:27 -0800 (PST)
Received: from [192.168.1.66] (76-218-8-156.lightspeed.sntcca.sbcglobal.net [76.218.8.156]) (authenticated bits=0) by sbh17.songbird.com (8.13.8/8.13.8) with ESMTP id sBMKRNUt014886 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT); Mon, 22 Dec 2014 12:27:27 -0800
Message-ID: <54987EA0.1050306@dcrocker.net>
Date: Mon, 22 Dec 2014 12:27:12 -0800
From: Dave Crocker <dhc@dcrocker.net>
Organization: Brandenburg InternetWorking
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Thunderbird/31.3.0
MIME-Version: 1.0
To: Kurt Andersen <kboth@drkurt.com>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com>	<WM!9543661f657248dc741330b4b167a949446f09cd6be3f25fdf9d91615225029aa0fd14d2fb2d5e5bdc468c9f985b9b67!@asav-2.01.com>	<951030635.14870.1419273636075.JavaMail.zimbra@peachymango.org>	<4068953.ZrKghXMp7t@kitterman-optiplex-9020m>	<54986CCC.70200@sonnection.nl>	<54986DF1.9060807@dcrocker.net> <CABuGu1podBwNdxbX2w3TU8ytNVaiQL=qBo5y=5ncuWZXQTReaw@mail.gmail.com>
In-Reply-To: <CABuGu1podBwNdxbX2w3TU8ytNVaiQL=qBo5y=5ncuWZXQTReaw@mail.gmail.com>
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 7bit
X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.0 (sbh17.songbird.com [72.52.113.66]); Mon, 22 Dec 2014 12:27:27 -0800 (PST)
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/auyf50tgL9UuxDpeAgdaS1tQoqY
Cc: "dmarc@ietf.org" <dmarc@ietf.org>
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: dcrocker@bbiw.net
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Dec 2014 20:27:29 -0000

On 12/22/2014 11:39 AM, Kurt Andersen wrote:
>     Failing means that the polices are not applied.  As in MUST NOT be
>     applied.
> 
> 
> DMARC is built on a positive assertion model. To say that a failure
> means that no policy is applied is contrary to the model. The policy is
> explicitly *applied* if neither SPF nor DMARC validates the aligned domain


oops. sorry.  right.

d/

-- 
Dave Crocker
Brandenburg InternetWorking
bbiw.net


From nobody Tue Dec 23 21:45:46 2014
Return-Path: <superuser@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2DE751ACCDF for <dmarc@ietfa.amsl.com>; Tue, 23 Dec 2014 21:45:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.701
X-Spam-Level: 
X-Spam-Status: No, score=0.701 tagged_above=-999 required=5 tests=[BAYES_50=0.8, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id V4hFqhkYh1JJ for <dmarc@ietfa.amsl.com>; Tue, 23 Dec 2014 21:45:41 -0800 (PST)
Received: from mail-wg0-x233.google.com (mail-wg0-x233.google.com [IPv6:2a00:1450:400c:c00::233]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BD7451ACC82 for <dmarc@ietf.org>; Tue, 23 Dec 2014 21:45:40 -0800 (PST)
Received: by mail-wg0-f51.google.com with SMTP id x12so10512276wgg.38 for <dmarc@ietf.org>; Tue, 23 Dec 2014 21:45:39 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=rJqurFZe6PtxBUl2yTZs5GQ9y8m0tX26o45Tlp34rxc=; b=ZzA6V+BoCU3ZyJZPWluBRazjniiYR1BwDr0Ubx27SBtVcLs7oby0H52GjtdyPtXfnJ xpWgesblKITMHPeZKYUBnD3Z9Ks7SLQXyVezsv2nVzeUEu3yaFDJ7P5KNPVTnmFZSFvl S2imXp1YDer7S50kxQEK3Ydt1sSzGUaqbEx67GtuhDg/rIvh2hHGWsFjuU8FkEK9+eIq bjEvBbBgRMwFjId6Xl5rx+vcw0HTQuoke+UhNJQ848XrlXJKd310tHD6SgnlqLDJZzWZ o/6hRbIRafAevcYAKkMv362qmINpz3nTFwShAZr53YeEUgzA6M5wSyA7HgB3VH82IA9h 94Rg==
MIME-Version: 1.0
X-Received: by 10.180.218.39 with SMTP id pd7mr48868659wic.21.1419399939168; Tue, 23 Dec 2014 21:45:39 -0800 (PST)
Received: by 10.27.204.198 with HTTP; Tue, 23 Dec 2014 21:45:39 -0800 (PST)
In-Reply-To: <5463ECBD.9030703@sonnection.nl>
References: <CAL0qLwYOtQe0RLfPmO6TjoJv4CUKUoiRV=uzi29ip70_OZ9p3A@mail.gmail.com> <5463ECBD.9030703@sonnection.nl>
Date: Wed, 24 Dec 2014 00:45:39 -0500
Message-ID: <CAL0qLwYSTGhBixiOEyxnbQJ5O6h4F+0-8xiAAE7kvUUEnogkiQ@mail.gmail.com>
From: "Murray S. Kucherawy" <superuser@gmail.com>
To: "<R.E.Sonneveld@sonnection.nl>" <R.E.Sonneveld@sonnection.nl>
Content-Type: multipart/alternative; boundary=001a1134cd582b1f31050aefcde0
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/nOJUOrOtOkFKpYtXDZ391XA_U2w
Cc: "dmarc@ietf.org" <dmarc@ietf.org>
Subject: Re: [dmarc-ietf] draft-kucherawy-dmarc-base updated (-06)
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Dec 2014 05:45:45 -0000

--001a1134cd582b1f31050aefcde0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Hi Rolf, getting back to your review (thanks for the nudge):

On Wed, Nov 12, 2014 at 6:26 PM, Rolf E. Sonneveld <
R.E.Sonneveld@sonnection.nl> wrote:

>
>
> Abstract:
>
> This lack of cohesion has several effects: receivers have difficulty
> providing feedback to senders about authentication, senders therefore hav=
e
> difficulty evaluating their authentication deployments, and as a result
> neither is able to make effective use of existing authentication technolo=
gy.
>
>
> This focuses on the reporting function of DMARC, leaving out the policy
> part of it.
>
> Suggested text:
>
> This lack of cohesion has several effects: senders have difficulty
> providing information about their use of an authentication policy and
> receivers have difficulty determining a disposition preferred by senders.
> Vice versa, mail receivers have difficulty providing feedback to senders
> about authentication, senders therefore have difficulty evaluating their
> authentication deployments, and as a result neither is able to make
> effective use of existing authentication technology.
>
>
The Abstract appears to have been rewritten since you reviewed it, so a
straight text swap won't work anymore.  The new text focuses on what's
being provided, not what was missing.  Do you want to take another run at
it?


>  Introduction:
>
> [...] mail receivers have tried to protect senders [...]
>
>
> Suggested:
>
> [...] mail receivers have tried to protect senders and their own
> users/customers [...]
>
> This text no longer appears in the draft.


>  Starting with "DMARC allows domain owners and receivers to collaborate
> by", the terms 'domain owners', 'receivers', 'senders' and 'SMTP
> receivers', 'Mail Receivers', 'mail receivers' are used throughout the
> document. I'd suggest to add a definition of the term ' Mail Senders' to
> the introduction part of chapter 3 and then use only the terms as defined
> in 3., throughout the document. Suggested text for the term Mail Sender:
>
>
>    - Mail Sender: the sender of mail with a domain for which the Domain
>    Owner may have published a DKIM public key and/or an SPF authenticatio=
n
>    record and/or a DMARC policy;
>
>
> (although we may want to not mention DKIM or SPF here).
>

It looks like that got cleared up; -08 has no reference to "Mail Sender".


> 2.2 Out of Scope
>
> Add:
>
> o    cousin domain attacks
>
Covered in Section 2.4 of -08.


>  3.1.2 Key Concepts
>
> Last sentence: add a reference to this 'other referenced material'.
>
Good idea; added.

>  3.1.3 Flow diagram
>
> The box titled 'User Mailbox' could give the impression that there's only
> one choice for delivery. However, quarantining can be done without delive=
ry
> to a mailbox. I'd suggest to label this box 'rMDA'.
>
That's already done in -08.


>  The part within parentheses of step 6:
>
>   6. Recipient transport service conducts SPF and DKIM authentication
> checks by passing the necessary data to their respective modules, each of
> which require queries to the Author Domain=E2=80=99s DNS data (when ident=
ifiers are
> aligned; see below).
>
>
> might indicate that SPF and DKIM authentication checks need not be
> performed when identifiers are not aligned. However, for sake of reportin=
g,
> SPF and DKIM authentication checks will in general always be done, or am =
I
> missing something?
>

I can envision a DMARC implementation that skips SPF or DKIM checks if the
corresponding identifiers are not aligned, because they won't be
interesting to DMARC in that case.

> 3.1.4.1 DKIM-authenticated Identifiers
>
> remove (or change) the 'Cousin Domain' example: it doesn't hold when a ba=
d
> actor is signing the mail with d=3Dcousindomain and
> RFC5322.From=3Dlocalpart@cousindomain
>

It's not there in -08.


>  4 Use of RFC5322.From
>
> Last bullet (The DMARC mechanism ...). It seems the other bullets provide
> reasons why RFC5322.From is chosen while the last one does not. It looks =
to
> me as a circular reasoning.
>
It's not there in -08.


>  5.2 DMARC URIs
>
> It is not clear from the text what the report originator must do when the
> report payload exceeds the maximum size as indicated by the record. Shoul=
d
> it not send anything, should it split up reports, should it notify the
> requester that there was a report exceeding the maximum size?
>

Section 6.2.2 in both versions explains what to do here.


>  5.3 General Record Format
>
> adkim and aspf do not provide a list of all possible options (like is don=
e
> for fo and p). Of course it is pretty obvious that for 'strict' the 's'
> must be used, but it's not clear from the text.
>
They're there in -08.

> Next, the P: and pct: tags: they show that (in hindsight) the policy part
> and the reporting part of DMARC might have been better off, when they wer=
e
> defined in different specs. Now we need to complicate the text to say tha=
t
> the policy tag p: is required, but not for third-party reporting records.
> And for pct, that it "MUST NOT be applied to the DMARC-generated reports"=
.
> Well, I believe this has been discussed before, no need to redo this
> discussion.
>
> I'd suggest to synchronize the short description of the tags in 5.3 with
> the descriptions of the tags in the table of 10.4 (now different
> terminology is used here and there, for example Requested Mail Receiver
> policy (5.3) and Requested handling policy (10.4). Suggested text in 5.3
> becomes then:
> [...]
>
Section 5.3 is meant to be verbose descriptions of each of the tags, while
Section 10.4 is a set of short, terse descriptions with references to the
places where the details can be found.  We could add section numbers to the
references found in 10.4 if you think that would be helpful.

> Further suggestion for the table in 10.4: reverse the order of 'p' and
> 'pct' as 'p' is first discussed in the text of 5.3, before 'pct'.
>

I see what you're after here, but as it is they're in alphabetical order,
like a dictionary, and I think that makes for easier referencing.

> Suggestion for 'ri': remove the normative language (MUST and SHOULD) as
> that might ask for a 'compliancy'  section. Instead, move these suggested
> values to the BCP document.
>
Well there is a normative component there, which is to say that anyone has
to be able to produce at least daily reports.  I think we have to at least
say that.  We (the IETF) seem to shy away from doing minimum compliance
sections these days.

>  5.6.2. Determine Handling Policy
>
> Bullet 6 in combination with the introduction text might give the
> impression that the receiver MUST always follow the policy as published b=
y
> the Domain Owner. Suggestion to replace the text:
>
> 6. Apply policy. Emails that fail the DMARC mechanism check are disposed
> of in accordance with the discovered DMARC policy of the Domain Owner. Se=
e
> Section 5.3
>
> with:
>
> 6. Apply policy. Emails that fail the DMARC mechanism SHOULD be disposed
> of in accordance with the discovered DMARC policy of the Domain Owner. Se=
e
> Section 5.3
>
> Section 5 itself already has the equivalent of that SHOULD, followed by a
"MAY deviate" based on local policy.

>  5.6.3. Policy Discovery.
>
> This paragraph states that:
>
> If the RFC5322.From domain does not exist in the DNS, Mail Receivers
> SHOULD direct the receiving SMTP server to reject the message. The choice
> of mechanism for such rejection and the implications of those choices are
> discussed in Section 9.3.
>
> Although this might be common practice (either by default MTA settings, o=
r
> by configuration parameters set by many mail operators), I believe this
> informational RFC about DMARC cannot use normative language here to decri=
be
> what must be done with mail with a domain that is not present in DNS.
>
This has been brought up before.  I think consensus has landed on the idea
that this is an acceptable thing to say because it applies only to
operators that are choosing to be DMARC participants.  Moreover, the SHOULD
ultimately enables you to make the choice for yourself if you think
bouncing mail from non-existent domains would be destructive.  And this is
what DMARC operators have been doing for a while now, so I'll also fall
back to noting that this specific effort is documenting current practice.
If the working group wants to make a different statement, it can crack this
topic open if and when it starts work on a version of DMARC along the
Standards Track.

 5.7 Last sentence:
>
> Mail Receivers SHOULD also implement reporting instructions of DMARC in
> place of any extensions to SPF or DKIM that might enable such reporting.
>
> Not sure what this means. But it seems to me DMARC cannot claim priority
> over other options/extensions in other IETF protocols.
>
This is another spot where the SHOULD gives the operator the choice to do
both if it wishes.  I can't remember off the top of my head what the use
case is here, but essentially the absence of a request for DKIM or SPF
reporting (as developed by the MARF working group some time ago) should not
preclude DMARC reporting, nor should their presence interfere with DMARC
reporting.

-MSK

--001a1134cd582b1f31050aefcde0
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hi Rolf, getting back to your review (thanks for the nudge=
):<br><br>On Wed, Nov 12, 2014 at 6:26 PM, Rolf E. Sonneveld <span dir=3D"l=
tr">&lt;<a href=3D"mailto:R.E.Sonneveld@sonnection.nl" target=3D"_blank">R.=
E.Sonneveld@sonnection.nl</a>&gt;</span> wrote:<br><div class=3D"gmail_extr=
a"><div class=3D"gmail_quote"><blockquote class=3D"gmail_quote" style=3D"ma=
rgin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
 =20
   =20
 =20
  <br><div bgcolor=3D"#FFFFFF" text=3D"#000000"><br>
    Abstract:<br>
    <br>
    <blockquote>This lack of cohesion has several effects: receivers
      have difficulty providing feedback to senders about
      authentication, senders therefore have difficulty evaluating their
      authentication deployments, and as a result neither is able to
      make effective use of existing authentication technology.<br>
    </blockquote>
    <br>
    This focuses on the reporting function of DMARC, leaving out the
    policy part of it.<br>
    <br>
    Suggested text:<br>
    <br>
    <blockquote>This lack of cohesion has several effects: senders have
      difficulty providing information about their use of an
      authentication policy and receivers have difficulty determining a
      disposition preferred by senders. Vice versa, mail receivers have
      difficulty providing feedback to senders about authentication,
      senders therefore have difficulty evaluating their authentication
      deployments, and as a result neither is able to make effective use
      of existing authentication technology.<br></blockquote></div></blockq=
uote><div><br></div><div>The Abstract appears to have been rewritten since =
you reviewed it, so a straight text swap won&#39;t work anymore.=C2=A0 The =
new text focuses on what&#39;s being provided, not what was missing.=C2=A0 =
Do you want to take another run at it?<br>=C2=A0<br></div><blockquote class=
=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padd=
ing-left:1ex"><div bgcolor=3D"#FFFFFF" text=3D"#000000"><blockquote>
    </blockquote>
    Introduction:<br>
    <br>
    <blockquote>[...] mail receivers have tried to protect senders [...]<br=
>
    </blockquote>
    <br>
    Suggested:<br>
    <br>
    <blockquote>[...] mail receivers have tried to protect senders and
      their own users/customers [...]<br></blockquote></div></blockquote><d=
iv>This text no longer appears in the draft.<br>=C2=A0</div><blockquote cla=
ss=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;pa=
dding-left:1ex"><div bgcolor=3D"#FFFFFF" text=3D"#000000"><blockquote>
    </blockquote>
    Starting with &quot;DMARC allows domain owners and receivers to
    collaborate by&quot;, the terms &#39;domain owners&#39;, &#39;receivers=
&#39;, &#39;senders&#39;
    and &#39;SMTP receivers&#39;, &#39;Mail Receivers&#39;, &#39;mail recei=
vers&#39; are used
    throughout the document. I&#39;d suggest to add a definition of the ter=
m
    &#39; Mail Senders&#39; to the introduction part of chapter 3 and then =
use
    only the terms as defined in 3., throughout the document. Suggested
    text for the term Mail Sender:<br>
    <br>
    <ul>
      <li>Mail Sender: the sender of mail with a domain for which the
        Domain Owner may have published a DKIM public key and/or an SPF
        authentication record and/or a DMARC policy;</li>
    </ul>
    <br>
    (although we may want to not mention DKIM or SPF here).<br></div></bloc=
kquote><div><br></div><div>It looks like that got cleared up; -08 has no re=
ference to &quot;Mail Sender&quot;.<br>=C2=A0<br></div><blockquote class=3D=
"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding=
-left:1ex"><div bgcolor=3D"#FFFFFF" text=3D"#000000">
    2.2 Out of Scope<br>
   =20
    <p>Add: <br>
    </p>
    <p>o=C2=A0=C2=A0=C2=A0 cousin domain attacks<br></p></div></blockquote>=
<div>Covered in Section 2.4 of -08.<br>=C2=A0</div><blockquote class=3D"gma=
il_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-lef=
t:1ex"><div bgcolor=3D"#FFFFFF" text=3D"#000000"><p>
    </p>
    <p>3.1.2 Key Concepts<br>
    </p>
    <p>Last sentence: add a reference to this &#39;other referenced
      material&#39;.<br></p></div></blockquote><div>Good idea; added.<br></=
div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-lef=
t:1px #ccc solid;padding-left:1ex"><div bgcolor=3D"#FFFFFF" text=3D"#000000=
"><p>
    </p>
    <p>3.1.3 Flow diagram<br>
    </p>
    <p>The box titled &#39;User Mailbox&#39; could give the impression that
      there&#39;s only one choice for delivery. However, quarantining can b=
e
      done without delivery to a mailbox. I&#39;d suggest to label this box
      &#39;rMDA&#39;.<br></p></div></blockquote><div>That&#39;s already don=
e in -08.<br>=C2=A0<br></div><blockquote class=3D"gmail_quote" style=3D"mar=
gin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div bgcolor=3D=
"#FFFFFF" text=3D"#000000"><p>
    </p>
    <p>The part within parentheses of step 6:<br>
    </p>
    <p> </p>
    <blockquote type=3D"cite">=C2=A06. Recipient transport service conducts=
 SPF
      and DKIM authentication checks by passing the necessary data to
      their respective modules, each of which require queries to the
      Author Domain=E2=80=99s DNS data (when identifiers are aligned; see
      below).</blockquote>
    <br>
    might indicate that SPF and DKIM authentication checks need not be
    performed when identifiers are not aligned. However, for sake of
    reporting, SPF and DKIM authentication checks will in general always
    be done, or am I missing something?<br></div></blockquote><div><br></di=
v><div>I can envision a DMARC implementation that skips SPF or DKIM checks =
if the corresponding identifiers are not aligned, because they won&#39;t be=
 interesting to DMARC in that case.<br></div><blockquote class=3D"gmail_quo=
te" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"=
><div bgcolor=3D"#FFFFFF" text=3D"#000000">
    <p>3.1.4.1 DKIM-authenticated Identifiers<br>
    </p>
    <p>remove (or change) the &#39;Cousin Domain&#39; example: it doesn&#39=
;t hold
      when a bad actor is signing the mail with d=3Dcousindomain and
      RFC5322.From=3Dlocalpart@cousindomain<br></p></div></blockquote><div>=
<br></div><div>It&#39;s not there in -08.<br>=C2=A0<br></div><blockquote cl=
ass=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;p=
adding-left:1ex"><div bgcolor=3D"#FFFFFF" text=3D"#000000"><p>
    </p>
    <p>4 Use of RFC5322.From<br>
    </p>
    <p>Last bullet (The DMARC mechanism ...). It seems the other bullets
      provide reasons why RFC5322.From is chosen while the last one does
      not. It looks to me as a circular reasoning.<br></p></div></blockquot=
e><div>It&#39;s not there in -08.<br></div><div>=C2=A0</div><blockquote cla=
ss=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;pa=
dding-left:1ex"><div bgcolor=3D"#FFFFFF" text=3D"#000000"><p>
    </p>
    <p>5.2 DMARC URIs<br>
    </p>
    <p>It is not clear from the text what the report originator must do
      when the report payload exceeds the maximum size as indicated by
      the record. Should it not send anything, should it split up
      reports, should it notify the requester that there was a report
      exceeding the maximum size?<br></p></div></blockquote><div><br></div>=
<div>Section 6.2.2 in both versions explains what to do here.<br>=C2=A0<br>=
</div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-l=
eft:1px #ccc solid;padding-left:1ex"><div bgcolor=3D"#FFFFFF" text=3D"#0000=
00"><p>
    </p>
    <p>5.3 General Record Format<br>
    </p>
    <p>adkim and aspf do not provide a list of all possible options
      (like is done for fo and p). Of course it is pretty obvious that
      for &#39;strict&#39; the &#39;s&#39; must be used, but it&#39;s not c=
lear from the
      text.<br></p></div></blockquote><div>They&#39;re there in -08. <br></=
div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-lef=
t:1px #ccc solid;padding-left:1ex"><div bgcolor=3D"#FFFFFF" text=3D"#000000=
"><p>
    </p>Next, the P: and pct: tags: they show that (in hindsight) the
      policy part and the reporting part of DMARC might have been better
      off, when they were defined in different specs. Now we need to
      complicate the text to say that the policy tag p: is required, but
      not for third-party reporting records. And for pct, that it &quot;MUS=
T
      NOT be applied to the DMARC-generated reports&quot;. Well, I believe
      this has been discussed before, no need to redo this discussion.<br>
   =20
    <p>I&#39;d suggest to synchronize the short description of the tags in
      5.3 with the descriptions of the tags in the table of 10.4 (now
      different terminology is used here and there, for example
      Requested Mail Receiver policy (5.3) and Requested handling policy
      (10.4). Suggested text in 5.3 becomes then: <br>[...]<br></p></div></=
blockquote><div>Section 5.3 is meant to be verbose descriptions of each of =
the tags, while Section 10.4 is a set of short, terse descriptions with ref=
erences to the places where the details can be found.=C2=A0 We could add se=
ction numbers to the references found in 10.4 if you think that would be he=
lpful.<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8e=
x;border-left:1px #ccc solid;padding-left:1ex"><div bgcolor=3D"#FFFFFF" tex=
t=3D"#000000"><p>
    </p>Further suggestion for the table in 10.4: reverse the order of
      &#39;p&#39; and &#39;pct&#39; as &#39;p&#39; is first discussed in th=
e text of 5.3, before
      &#39;pct&#39;.<br></div></blockquote><div><br></div><div>I see what y=
ou&#39;re after here, but as it is they&#39;re in alphabetical order, like =
a dictionary, and I think that makes for easier referencing. <br></div><blo=
ckquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #c=
cc solid;padding-left:1ex"><div bgcolor=3D"#FFFFFF" text=3D"#000000">
   =20
    <p>Suggestion for &#39;ri&#39;: remove the normative language (MUST and
      SHOULD) as that might ask for a &#39;compliancy&#39;=C2=A0 section. I=
nstead,
      move these suggested values to the BCP document.<br></p></div></block=
quote><div>Well there is a normative component there, which is to say that =
anyone has to be able to produce at least daily reports.=C2=A0 I think we h=
ave to at least say that.=C2=A0 We (the IETF) seem to shy away from doing m=
inimum compliance sections these days. <br></div><blockquote class=3D"gmail=
_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:=
1ex"><div bgcolor=3D"#FFFFFF" text=3D"#000000"><p>
    </p>
    <p>5.6.2. Determine Handling Policy<br>
    </p>
    <p>Bullet 6 in combination with the introduction text might give the
      impression that the receiver MUST always follow the policy as
      published by the Domain Owner. Suggestion to replace the text:<br>
    </p>
    <blockquote>
      <p>6. Apply policy. Emails that fail the DMARC mechanism check are
        disposed of in accordance with the discovered DMARC policy of
        the Domain Owner. See Section 5.3 <br>
      </p>
    </blockquote>
    <p>with:<br>
    </p>
    <blockquote>
      <p>6. Apply policy. Emails that fail the DMARC mechanism SHOULD be
        disposed of in accordance with the discovered DMARC policy of
        the Domain Owner. See Section 5.3 <br></p></blockquote></div></bloc=
kquote><div>Section 5 itself already has the equivalent of that SHOULD, fol=
lowed by a &quot;MAY deviate&quot; based on local policy. <br></div><blockq=
uote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc =
solid;padding-left:1ex"><div bgcolor=3D"#FFFFFF" text=3D"#000000"><blockquo=
te><p>
      </p>
    </blockquote>
    <p>5.6.3. Policy Discovery.<br>
    </p>
    <p>This paragraph states that:<br>
    </p>
    <blockquote>
      <p>If the RFC5322.From domain does not exist in the DNS, Mail
        Receivers SHOULD direct the receiving SMTP server to reject the
        message. The choice of mechanism for such rejection and the
        implications of those choices are discussed in Section 9.3.<br>
      </p>
    </blockquote>
    <p>Although this might be common practice (either by default MTA
      settings, or by configuration parameters set by many mail
      operators), I believe this informational RFC about DMARC cannot
      use normative language here to decribe what must be done with mail
      with a domain that is not present in DNS.<br></p></div></blockquote><=
div>This has been brought up before.=C2=A0 I think consensus has landed on =
the idea that this is an acceptable thing to say because it applies only to=
 operators that are choosing to be DMARC participants.=C2=A0 Moreover, the =
SHOULD ultimately enables you to make the choice for yourself if you think =
bouncing mail from non-existent domains would be destructive.=C2=A0 And thi=
s is what DMARC operators have been doing for a while now, so I&#39;ll also=
 fall back to noting that this specific effort is documenting current pract=
ice.=C2=A0 If the working group wants to make a different statement, it can=
 crack this topic open if and when it starts work on a version of DMARC alo=
ng the Standards Track.<br><br></div><blockquote class=3D"gmail_quote" styl=
e=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div bg=
color=3D"#FFFFFF" text=3D"#000000"><p>
    </p>
    <p>5.7 Last sentence:<br>
    </p>
    <blockquote>
      <p>Mail Receivers SHOULD also implement reporting instructions of
        DMARC in place of any extensions to SPF or DKIM that might
        enable such reporting.<br>
      </p>
    </blockquote>
    <p>Not sure what this means. But it seems to me DMARC cannot claim
      priority over other options/extensions in other IETF protocols.<br></=
p></div></blockquote><div>This is another spot where the SHOULD gives the o=
perator the choice to do both if it wishes.=C2=A0 I can&#39;t remember off =
the top of my head what the use case is here, but essentially the absence o=
f a request for DKIM or SPF reporting (as developed by the MARF working gro=
up some time ago) should not preclude DMARC reporting, nor should their pre=
sence interfere with DMARC reporting.<br></div><div>=C2=A0</div></div>-MSK<=
br></div></div>

--001a1134cd582b1f31050aefcde0--


From nobody Tue Dec 23 21:49:08 2014
Return-Path: <superuser@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 75E571ACD20 for <dmarc@ietfa.amsl.com>; Tue, 23 Dec 2014 21:49:07 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PenA8bCgN6H7 for <dmarc@ietfa.amsl.com>; Tue, 23 Dec 2014 21:49:06 -0800 (PST)
Received: from mail-wg0-x22f.google.com (mail-wg0-x22f.google.com [IPv6:2a00:1450:400c:c00::22f]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0CEC21ACC82 for <dmarc@ietf.org>; Tue, 23 Dec 2014 21:49:06 -0800 (PST)
Received: by mail-wg0-f47.google.com with SMTP id n12so10499273wgh.6 for <dmarc@ietf.org>; Tue, 23 Dec 2014 21:49:04 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=ETpeuGzcPCK+ikqMr3YT/DtcAVfU1uvYl5VtUbqRDKM=; b=GNPCOEoNvzfamcuN7kws7nlL3Lb/g2Fba5JSOmDoEo2EGCXYLmWG7Jb2BXmcktifOC dexeMcbEpN4ojdJns/aaXGeFP09R7DH5ME4DE7UMgpmxt/zHFNEvw4YjgX/Rfssi7Pz1 Hn+Vkf6BxVAKw1jzlR9WG9nQZHhQ04NzkC32UDa04idsTYBatfsTOTSA/NnhmGiUsLoA 9LSKc0QMZW8t+uv4nzgYz6UYFC/Oo9aeB/yWcmg+BjojmQtN7Phk5RZx2aH0MYCWcwaq cRa8wFMzhNXkcNn5CXMsNrI6czNzHrqFEHLTO9q1YtJZO4xKJCbDCc9o6mFAnjMu9q9h o4DQ==
MIME-Version: 1.0
X-Received: by 10.194.200.234 with SMTP id jv10mr60275876wjc.110.1419400144906;  Tue, 23 Dec 2014 21:49:04 -0800 (PST)
Received: by 10.27.204.198 with HTTP; Tue, 23 Dec 2014 21:49:04 -0800 (PST)
In-Reply-To: <7243484.JQFTys4I1u@kitterman-optiplex-9020m>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <54986CCC.70200@sonnection.nl> <54986DF1.9060807@dcrocker.net> <7243484.JQFTys4I1u@kitterman-optiplex-9020m>
Date: Wed, 24 Dec 2014 00:49:04 -0500
Message-ID: <CAL0qLwbKy8Uxqq1LcsQP68q_=vmcuqc1sySgjUJU2kBBvsonWQ@mail.gmail.com>
From: "Murray S. Kucherawy" <superuser@gmail.com>
To: Scott Kitterman <sklist@kitterman.com>
Content-Type: multipart/alternative; boundary=047d7bb70bb26e7189050aefd910
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/3e7qm08fRNjNINZ8ZxpltDfym_o
Cc: "dmarc@ietf.org" <dmarc@ietf.org>
Subject: Re: [dmarc-ietf] DMARC and TEMP errors was: Re: Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Dec 2014 05:49:07 -0000

--047d7bb70bb26e7189050aefd910
Content-Type: text/plain; charset=UTF-8

On Mon, Dec 22, 2014 at 3:18 PM, Scott Kitterman <sklist@kitterman.com>
wrote:

>
> As I read -08 what to do in that case is undefined.  There's a dangling
> pointer
> to 5.6.3.  It's dangling because nothing in that section addresses the
> question of how to handle DKIM/SPF temporary errors.
>
>
5.6.3's final paragraph makes it clear that the action taken is at the
discretion of the mail receiver, and gives two examples of non-destructive
ways to handle that case.  Do we need to say more than that?

-MSK

--047d7bb70bb26e7189050aefd910
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">On Mon, Dec 22, 2014 at 3:18 PM, Scott Kitterman <span dir=
=3D"ltr">&lt;<a href=3D"mailto:sklist@kitterman.com" target=3D"_blank">skli=
st@kitterman.com</a>&gt;</span> wrote:<br><div class=3D"gmail_extra"><div c=
lass=3D"gmail_quote"><blockquote class=3D"gmail_quote" style=3D"margin:0 0 =
0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><br>
As I read -08 what to do in that case is undefined.=C2=A0 There&#39;s a dan=
gling pointer<br>
to 5.6.3.=C2=A0 It&#39;s dangling because nothing in that section addresses=
 the<br>
question of how to handle DKIM/SPF temporary errors.<br>
<br></blockquote><div><br></div><div>5.6.3&#39;s final paragraph makes it c=
lear that the action taken is at the discretion of the mail receiver, and g=
ives two examples of non-destructive ways to handle that case.=C2=A0 Do we =
need to say more than that?<br><br></div><div>-MSK<br></div></div></div></d=
iv>

--047d7bb70bb26e7189050aefd910--


From nobody Tue Dec 23 22:12:11 2014
Return-Path: <superuser@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B060D1ACD07 for <dmarc@ietfa.amsl.com>; Tue, 23 Dec 2014 22:12:04 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dnGHy1thuO7V for <dmarc@ietfa.amsl.com>; Tue, 23 Dec 2014 22:11:57 -0800 (PST)
Received: from mail-wg0-x22e.google.com (mail-wg0-x22e.google.com [IPv6:2a00:1450:400c:c00::22e]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D08921ACD26 for <dmarc@ietf.org>; Tue, 23 Dec 2014 22:11:56 -0800 (PST)
Received: by mail-wg0-f46.google.com with SMTP id x13so10614983wgg.5 for <dmarc@ietf.org>; Tue, 23 Dec 2014 22:11:55 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=HuY+p/zzkYZ03KXkE13nDkE7N33RSsYSej/AqsL4vlA=; b=xPtOuOmMgA6s60fEaNAyyBa3yV0aqvwIFjj0XudLYc7BPnYKQcJTznIFtMqWlvuN3x RE9bYPrIaPwlBBJk+vXu755z7YHWTB/U8IQ5bplHtbEHiTKM/liW/EcXxQKk+c69SLTk O33HA50AdHelSWIdDW94v3eoVSlT3ILQVSUyHS37mTLh2Idqi/VkAS/mO9gGuCqjzvKZ DguVr8k2Zn4KEuKoAcpYbxyMoZoS7lGqFxGrq+KRixzQVf2G1IoLtdaxDzKWcTMNInJ3 hP9tz/fJVTfW8y04W8l3Ih9nQWyJIZsTxs0RhFYUQ6FqVxHueBSRZyQqqanCQWxW+E75 NBEw==
MIME-Version: 1.0
X-Received: by 10.194.62.76 with SMTP id w12mr60172026wjr.5.1419401515573; Tue, 23 Dec 2014 22:11:55 -0800 (PST)
Received: by 10.27.204.198 with HTTP; Tue, 23 Dec 2014 22:11:55 -0800 (PST)
In-Reply-To: <5494A6F5.5020906@dcrocker.net>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <5494A6F5.5020906@dcrocker.net>
Date: Wed, 24 Dec 2014 01:11:55 -0500
Message-ID: <CAL0qLwZthPfZ-22=yi2rrp_GKXK3igc=M8LhftxMx7GRUde7Dw@mail.gmail.com>
From: "Murray S. Kucherawy" <superuser@gmail.com>
To: Dave Crocker <dcrocker@bbiw.net>
Content-Type: multipart/alternative; boundary=047d7ba977a421288e050af02b30
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/8mM7ksQn4mO_tZMoUOcXINMN3a8
Cc: jim fenton <fenton@bluepopcorn.net>, "dmarc@ietf.org" <dmarc@ietf.org>
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Dec 2014 06:12:05 -0000

--047d7ba977a421288e050af02b30
Content-Type: text/plain; charset=UTF-8

On Fri, Dec 19, 2014 at 5:30 PM, Dave Crocker <dhc@dcrocker.net> wrote:

> > 3.2 Organizational Domain
> >
> > I remain very concerned about this algorithm since I have been
> > previously told very specifically not to do this by the DNS folks. I'm
> > also concerned about the inconsistency (interoperability impact) that
> > could result from different operators using different public suffix
> lists.
>
> Everyone is concerned about it.  But it's the best that is currently
> available.
>

+1, and furthermore, -08's Section 3.2 and Appendix A.6 both admit the
current method is flawed and DMARC operators should switch to something
better as soon as such a thing becomes available.  I don't know what more
can be said at this point.


> > 4. Policy
> >
> > Paragraph 4 basically says, if you don't want a particular
> > authentication scheme to be considered by DMARC, don't use it at all.
> > For a domain that is using SPF and DMARC (for example), this could be an
> > impediment to their deployment of DKIM because they could not test with
> > it without having it immediately affect recipients' message handling.
> > One possibility would be to ignore DKIM if the testing (t=y) flag is
> > set, although a campaign would be needed to get the many domains
> > currently using t=y to turn it off. Another possibility would be to have
> > a setting in DMARC to ignore a specific authentication method entirely.
>
> The first possibility isn't viabile, for the reason cited.  The second
> possibility might be worth pursuing in the DMARC working group, rather
> than in a document that captures existing DMARC practice.
>
> There are, of course, other possibilities, such as not having DMARC
> pursue operational nuance that makes the spec more complex, trying to
> handle special cases.  That is, if a site isn't ready to use DMARC, it
> shouldn't.
>

The "pct" tag was also provided to address the concern that the impact of
enabling DMARC is uncertain.


> > 7.1 Verifying External Destinations
> >
> > Paragraph 3: "verification steps SHOULD be taken" These steps are to
> > protect another domain from attack. It needs to be a MUST.
>
> 6.1 in -08.
>
> Given the problems with the search for org domain, a SHOULD is as far as
> is practical here.
>
> I'd suggest noting that that's a reason this can't be a MUST.
>

I think it's SHOULD because at the time it was written, the verification
process was untested.  It's in production now (OpenDMARC implements it), so
I agree that a MUST is appropriate.


> > 8. Policy Discovery
> ...
>
> 5.6.3 in -08
>
>
> > Second-to-last paragraph: "If the RFC5322.From domain does not exist in
> > the DNS" is basically changing what RFC5321/5322 allow. This isn't the
> > place to be making fundamental changes to the behavior of email.
>
> It isn't meant to be.
>
> -08 text says:
>
>      "If the RFC5322.From domain does not exist in the DNS, Mail
>    Receivers
>    SHOULD direct the receiving SMTP server to reject the message.  The
>    choice of mechanism for such rejection and the implications of those
>    choices are discussed in Section 9.3."
>
> I suggest removing it.  Although a common anti-abuse mechanism, it's out
> of scope for DMARC.
>

I disagree.  DMARC operators all seem to apply this practice, so it's
correct to say that if you play this game, you reject mail from
non-existent domains.  Essentially in this way DMARC is a profile of
RFC5321/RFC5322, which is perfectly acceptable.  We are not updating those
standards here, merely profiling them.


> > 9. Domain Owner Actions
>
> 5.5 in -08
>
> > Last paragraph doesn't seem like it fits. Suggest it be removed.
>
> While I could imagine a better place for it in the doc, having a /terse/
> pointer like this to some authentication pedagogy seems useful to me, in
> an authentication-related spec...
>

+1.


> > 11.1 Discovery
> 6.2.1 in -08
>
> > Mail Receivers can also discover reporting requests from the
> > Organizational Domain. That should be mentioned here. But I'm a little
> > confused why we have another Discovery section at all.
>
> The text's use of the word 'corresponds' handles the mapping to org
> domain, IMO.
>

+1, and there isn't a second Discovery section anymore; there was a Great
Consolidation at around the -05 version.


> > 11.2.1 Email
> >
> > The whole thing about filenames needs to go away. Since it's only a
> > SHOULD requirement, the Report Receiver needs to be able to handle
> > reports that don't follow this format as well as those that do.
>
> "SHOULD" is a very strong normative statement. Note that it permits
> non-conformance only in the presence of singular knowledge by the
> non-conforming party.
>
> Filename labeling is generally considered useful.  Why wouldn't it be
> useful here?
>

+1, not to mention again that this is current practice among DMARC
operators and doesn't seem to be an issue so far.


> > 14.1 Data Exposure Considerations
> >
> > Last paragraph: what's an "unexpected Mail Receiver"?
>

Reworded.


> > The privacy consideration here, which isn't obvious from the wording, is
> > that users may currently use forwarding in a way that prevents the
> > sender from determining the ultimate delivery address. DMARC has the
> > potential to break that. This might be important in the case of a user
> > that is trying to distance themselves from a stalker.
>
> How is that a DMARC-specific 'exposure' consideration?
>

DMARC creates the exposure.  If A sends mail to B which forwards to C and
then to D, D can send reports back to A, revealing the forwarding
relationship from C to D.

Reworded to accommodate.


> > 14.2 Report Recipients
> >
> > Some potential exists for report recipients to perform traffic analysis:
> > to obtain metadata about the receiver's traffic. In addition to
> > verifying compliance with policies, receivers need to consider that
> > before sending reports to a third party.
>
> +1
>

Added.

-MSK

--047d7ba977a421288e050af02b30
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">On Fri, Dec 19, 2014 at 5:30 PM, Dave Crocker <span dir=3D=
"ltr">&lt;<a href=3D"mailto:dhc@dcrocker.net" target=3D"_blank">dhc@dcrocke=
r.net</a>&gt;</span> wrote:<br><div class=3D"gmail_extra"><div class=3D"gma=
il_quote"><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;bord=
er-left:1px #ccc solid;padding-left:1ex">&gt; 3.2 Organizational Domain<br>
&gt;<br>
&gt; I remain very concerned about this algorithm since I have been<br>
&gt; previously told very specifically not to do this by the DNS folks. I&#=
39;m<br>
&gt; also concerned about the inconsistency (interoperability impact) that<=
br>
&gt; could result from different operators using different public suffix li=
sts.<br>
<br>
Everyone is concerned about it.=C2=A0 But it&#39;s the best that is current=
ly<br>
available.<br></blockquote><div><br></div><div>+1, and furthermore, -08&#39=
;s Section 3.2 and Appendix A.6 both admit the current method is flawed and=
 DMARC operators should switch to something better as soon as such a thing =
becomes available.=C2=A0 I don&#39;t know what more can be said at this poi=
nt.<br>=C2=A0<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0 =
0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
&gt; 4. Policy<br>
&gt;<br>
&gt; Paragraph 4 basically says, if you don&#39;t want a particular<br>
&gt; authentication scheme to be considered by DMARC, don&#39;t use it at a=
ll.<br>
&gt; For a domain that is using SPF and DMARC (for example), this could be =
an<br>
&gt; impediment to their deployment of DKIM because they could not test wit=
h<br>
&gt; it without having it immediately affect recipients&#39; message handli=
ng.<br>
&gt; One possibility would be to ignore DKIM if the testing (t=3Dy) flag is=
<br>
&gt; set, although a campaign would be needed to get the many domains<br>
&gt; currently using t=3Dy to turn it off. Another possibility would be to =
have<br>
&gt; a setting in DMARC to ignore a specific authentication method entirely=
.<br>
<br>
The first possibility isn&#39;t viabile, for the reason cited.=C2=A0 The se=
cond<br>
possibility might be worth pursuing in the DMARC working group, rather<br>
than in a document that captures existing DMARC practice.<br>
<br>
There are, of course, other possibilities, such as not having DMARC<br>
pursue operational nuance that makes the spec more complex, trying to<br>
handle special cases.=C2=A0 That is, if a site isn&#39;t ready to use DMARC=
, it<br>
shouldn&#39;t.<br></blockquote><div><br></div><div>The &quot;pct&quot; tag =
was also provided to address the concern that the impact of enabling DMARC =
is uncertain.<br>=C2=A0<br></div><blockquote class=3D"gmail_quote" style=3D=
"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
&gt; 7.1 Verifying External Destinations<br>
&gt;<br>
&gt; Paragraph 3: &quot;verification steps SHOULD be taken&quot; These step=
s are to<br>
&gt; protect another domain from attack. It needs to be a MUST.<br>
<br>
6.1 in -08.<br>
<br>
Given the problems with the search for org domain, a SHOULD is as far as<br=
>
is practical here.<br>
<br>
I&#39;d suggest noting that that&#39;s a reason this can&#39;t be a MUST.<b=
r></blockquote><div><br></div><div>I think it&#39;s SHOULD because at the t=
ime it was written, the verification process was untested.=C2=A0 It&#39;s i=
n production now (OpenDMARC implements it), so I agree that a MUST is appro=
priate.<br>=C2=A0<br></div><blockquote class=3D"gmail_quote" style=3D"margi=
n:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
&gt; 8. Policy Discovery<br>
...<br>
<br>
5.6.3 in -08<br>
<br>
<br>
&gt; Second-to-last paragraph: &quot;If the RFC5322.From domain does not ex=
ist in<br>
&gt; the DNS&quot; is basically changing what RFC5321/5322 allow. This isn&=
#39;t the<br>
&gt; place to be making fundamental changes to the behavior of email.<br>
<br>
It isn&#39;t meant to be.<br>
<br>
-08 text says:<br>
<br>
=C2=A0 =C2=A0 =C2=A0&quot;If the RFC5322.From domain does not exist in the =
DNS, Mail<br>
=C2=A0 =C2=A0Receivers<br>
=C2=A0 =C2=A0SHOULD direct the receiving SMTP server to reject the message.=
=C2=A0 The<br>
=C2=A0 =C2=A0choice of mechanism for such rejection and the implications of=
 those<br>
=C2=A0 =C2=A0choices are discussed in Section 9.3.&quot;<br>
<br>
I suggest removing it.=C2=A0 Although a common anti-abuse mechanism, it&#39=
;s out<br>
of scope for DMARC.<br></blockquote><div><br></div><div>I disagree.=C2=A0 D=
MARC operators all seem to apply this practice, so it&#39;s correct to say =
that if you play this game, you reject mail from non-existent domains.=C2=
=A0 Essentially in this way DMARC is a profile of RFC5321/RFC5322, which is=
 perfectly acceptable.=C2=A0 We are not updating those standards here, mere=
ly profiling them.<br>=C2=A0<br></div><blockquote class=3D"gmail_quote" sty=
le=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
&gt; 9. Domain Owner Actions<br>
<br>
5.5 in -08<br>
<br>
&gt; Last paragraph doesn&#39;t seem like it fits. Suggest it be removed.<b=
r>
<br>
While I could imagine a better place for it in the doc, having a /terse/<br=
>
pointer like this to some authentication pedagogy seems useful to me, in<br=
>
an authentication-related spec...<br></blockquote><div><br>+1.<br>=C2=A0<br=
></div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-=
left:1px #ccc solid;padding-left:1ex">
&gt; 11.1 Discovery<br>
6.2.1 in -08<br>
<br>
&gt; Mail Receivers can also discover reporting requests from the<br>
&gt; Organizational Domain. That should be mentioned here. But I&#39;m a li=
ttle<br>
&gt; confused why we have another Discovery section at all.<br>
<br>
The text&#39;s use of the word &#39;corresponds&#39; handles the mapping to=
 org<br>
domain, IMO.<br></blockquote><div><br></div><div>+1, and there isn&#39;t a =
second Discovery section anymore; there was a Great Consolidation at around=
 the -05 version.<br>=C2=A0<br></div><blockquote class=3D"gmail_quote" styl=
e=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
&gt; 11.2.1 Email<br>
&gt;<br>
&gt; The whole thing about filenames needs to go away. Since it&#39;s only =
a<br>
&gt; SHOULD requirement, the Report Receiver needs to be able to handle<br>
&gt; reports that don&#39;t follow this format as well as those that do.<br=
>
<br>
&quot;SHOULD&quot; is a very strong normative statement. Note that it permi=
ts<br>
non-conformance only in the presence of singular knowledge by the<br>
non-conforming party.<br>
<br>
Filename labeling is generally considered useful.=C2=A0 Why wouldn&#39;t it=
 be<br>
useful here?<br></blockquote><div><br></div><div>+1, not to mention again t=
hat this is current practice among DMARC operators and doesn&#39;t seem to =
be an issue so far.<br></div><div>=C2=A0<br></div><blockquote class=3D"gmai=
l_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left=
:1ex">
&gt; 14.1 Data Exposure Considerations<br>
&gt;<br>
&gt; Last paragraph: what&#39;s an &quot;unexpected Mail Receiver&quot;?<br=
></blockquote><div><br></div><div>Reworded.<br>=C2=A0<br></div><blockquote =
class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid=
;padding-left:1ex">
&gt; The privacy consideration here, which isn&#39;t obvious from the wordi=
ng, is<br>
&gt; that users may currently use forwarding in a way that prevents the<br>
&gt; sender from determining the ultimate delivery address. DMARC has the<b=
r>
&gt; potential to break that. This might be important in the case of a user=
<br>
&gt; that is trying to distance themselves from a stalker.<br>
<br>
How is that a DMARC-specific &#39;exposure&#39; consideration?<br></blockqu=
ote><div><br></div><div>DMARC creates the exposure.=C2=A0 If A sends mail t=
o B which forwards to C and then to D, D can send reports back to A, reveal=
ing the forwarding relationship from C to D.<br><br></div><div>Reworded to =
accommodate.<br>=C2=A0<br></div><blockquote class=3D"gmail_quote" style=3D"=
margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
&gt; 14.2 Report Recipients<br>
&gt;<br>
&gt; Some potential exists for report recipients to perform traffic analysi=
s:<br>
&gt; to obtain metadata about the receiver&#39;s traffic. In addition to<br=
>
&gt; verifying compliance with policies, receivers need to consider that<br=
>
&gt; before sending reports to a third party.<br>
<br>
+1<br></blockquote><div><br></div><div>Added.<br><br></div><div>-MSK<br></d=
iv></div></div></div>

--047d7ba977a421288e050af02b30--


From nobody Tue Dec 23 22:26:03 2014
Return-Path: <superuser@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5DA9F1ACD28 for <dmarc@ietfa.amsl.com>; Tue, 23 Dec 2014 22:26:01 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RuNtBs2tH8Kx for <dmarc@ietfa.amsl.com>; Tue, 23 Dec 2014 22:25:59 -0800 (PST)
Received: from mail-wi0-x22c.google.com (mail-wi0-x22c.google.com [IPv6:2a00:1450:400c:c05::22c]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9DACD1ACD05 for <dmarc@ietf.org>; Tue, 23 Dec 2014 22:25:58 -0800 (PST)
Received: by mail-wi0-f172.google.com with SMTP id n3so12736383wiv.17 for <dmarc@ietf.org>; Tue, 23 Dec 2014 22:25:57 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=eHZagfUfpbT/OUXw5FKnM1Sn5X0Ykbl08/3eIHvZfhM=; b=Y5EWeIO1RpNV566yJPyPDw6diXcJtkg23FNiemLipXY0qce4KDJC3TovXvrb1RQsBE cHF/3hH0pj5qcVghVUec22/Bp56PH0blS6HTNeahuSuADbCORkxNZ/kWNVAT3J5oO7Od ldS+/WUHX1dHOvyTcmygGX5r9FdaupvNIfzlwfQz+kw6e3quBzEDWxp6wsMhoXf/8naC DOGmsSr1Dg156UWMlsdPKkbUFizk48xu/uQiSROI4DcLulIBOH96SclIKd95XX646g8n pLXfOuBdkVupqvdgWoI2AR9cUBCeHpLQhdgo0iTFrCjeDf/5va89Llbw0YEgw3TjTzci 0Ukw==
MIME-Version: 1.0
X-Received: by 10.194.200.234 with SMTP id jv10mr60534058wjc.110.1419402357320;  Tue, 23 Dec 2014 22:25:57 -0800 (PST)
Received: by 10.27.204.198 with HTTP; Tue, 23 Dec 2014 22:25:57 -0800 (PST)
In-Reply-To: <54967461.2070702@bluepopcorn.net>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <5494A6F5.5020906@dcrocker.net> <54967461.2070702@bluepopcorn.net>
Date: Wed, 24 Dec 2014 01:25:57 -0500
Message-ID: <CAL0qLwaYoCvZK0+iebJ6VFpYFzC1=LX1_r3iCrof4tfhprqhKw@mail.gmail.com>
From: "Murray S. Kucherawy" <superuser@gmail.com>
To: Jim Fenton <fenton@bluepopcorn.net>
Content-Type: multipart/alternative; boundary=047d7bb70bb24d3239050af05df5
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/L7kMazZIcZE-EF44R52mwGuYf5M
Cc: "dmarc@ietf.org" <dmarc@ietf.org>, Dave Crocker <dcrocker@bbiw.net>
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Dec 2014 06:26:01 -0000

--047d7bb70bb24d3239050af05df5
Content-Type: text/plain; charset=UTF-8

For the stuff not already answered in my last reply to Dave:

On Sun, Dec 21, 2014 at 2:18 AM, Jim Fenton <fenton@bluepopcorn.net> wrote:

> [2.4 Out of Scope]
> >> Bullet 10: Again, DMARC doesn't do authentication, even for domains; it
> >> relies on other authentication mechanisms.
> > I originally thought this, too, but in fact DMARC does do authentication:
> >
> >      DMARC asserts authenticity of the rfc5322.From field domain name.
> > That's a distinct semantic increment over anything SPF or DKIM do on
> > their own.
>
> What it does is different enough from SPF and DKIM that I think it's
> overloading the term "authentication" to use it again here. It doesn't
> contribute to a clear understanding. It looks at the results of SPF and
> DKIM, which operate at the domain level, so this bullet isn't really
> necessary.
>

Doesn't RFC5322.From also operate at the domain level in our context?

DMARC's filtering function is based on whether SPF or DKIM can provide
> an authenticated, aligned identifier for the message under
> consideration. Messages that purport to be from a Domain Owner's domain
> and arrive from servers that are not authorized by that domain's SPF and
> do not contain an appropriate DKIM signature can be affected by DMARC
> policies.
>
> [I think the additional "that domain's" will do it.]
>

Added.


> >> 5. DMARC policy record
> >>
> >> Paragraph 2: Again, "matches perfectly with the DNS" is an inaccurate
> >> characterization. If the query requirement matched perfectly with the
> >> DNS, DNS would have a way to determine the Administrative Domain without
> >> resorting to suffix lists and such. Just strike the sentence; this isn't
> >> relevant here anyway.
> > -08 doesn't have this language.
>
> Now section 5.1, paragraph 2. Honestly, this reads like marketing fluff
> that doesn't belong in a specification like this.
>

I don't have any trouble removing it.  I think it was added to ward off
anyone that might claim "You shouldn't be using the DNS for this."


> >> 11.1 Discovery
> > 6.2.1 in -08
> >
> >> Mail Receivers can also discover reporting requests from the
> >> Organizational Domain. That should be mentioned here. But I'm a little
> >> confused why we have another Discovery section at all.
> > The text's use of the word 'corresponds' handles the mapping to org
> > domain, IMO.
>
> This is more of a comment about document organization. The previous
> sections have been talking about things that follow discovery of the
> policy record, and now when talking about aggregate reports there's
> another section about discovery. Why here; isn't this a little redundant?
>

It's mainly to say that there isn't a specific discovery process for
aggregate report details; it's already done.  This might be a legacy from
ancient versions where there was a separate process.  I'll tidy it up by
merging it into the previous subsection.


> SHOULD isn't strong enough for the Report Receiver to depend on. There
> are other ways to get the information that is encoded into the filename.
>

Like what?


> If the spec wants to suggest, "here's a nice file name format that you
> MAY want to use", that's fine. But SHOULD is both too weak if the
> recipient can't depend on it and too strong if it's merely advice.
>

I'm not so sure.  If we're going to go with MAY, then we also need some
kind of signal that the filename used does conform to the proposed
encoding, or else there might be some attempt to extract report parameters
that simply aren't there.


> >> The privacy consideration here, which isn't obvious from the wording, is
> >> that users may currently use forwarding in a way that prevents the
> >> sender from determining the ultimate delivery address. DMARC has the
> >> potential to break that. This might be important in the case of a user
> >> that is trying to distance themselves from a stalker.
> > How is that a DMARC-specific 'exposure' consideration?
>
> Because it's the retrieval (or search for) the DMARC record might
> reveals that. But on rereading this, paragraph 4 addresses this
> sufficiently.
>
> New issue: Paragraph 3 refers to "Both report types" but since iodef was
> removed, it should just say "The AFRF report type".
>

That refers to the aggregate and detailed reports ("rua" and "ruf"), not
IODEF and AFRF.

-MSK

--047d7bb70bb24d3239050af05df5
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">For the stuff not already answered in my last reply to Dav=
e:<br><div><br>On Sun, Dec 21, 2014 at 2:18 AM, Jim Fenton <span dir=3D"ltr=
">&lt;<a href=3D"mailto:fenton@bluepopcorn.net" target=3D"_blank">fenton@bl=
uepopcorn.net</a>&gt;</span> wrote:<br><div class=3D"gmail_extra"><div clas=
s=3D"gmail_quote"><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .=
8ex;border-left:1px #ccc solid;padding-left:1ex">[2.4 Out of Scope]<br>
<span class=3D"">&gt;&gt; Bullet 10: Again, DMARC doesn&#39;t do authentica=
tion, even for domains; it<br>
&gt;&gt; relies on other authentication mechanisms.<br>
&gt; I originally thought this, too, but in fact DMARC does do authenticati=
on:<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0 DMARC asserts authenticity of the rfc5322.From fie=
ld domain name.<br>
&gt; That&#39;s a distinct semantic increment over anything SPF or DKIM do =
on<br>
&gt; their own.<br>
<br>
</span>What it does is different enough from SPF and DKIM that I think it&#=
39;s<br>
overloading the term &quot;authentication&quot; to use it again here. It do=
esn&#39;t<br>
contribute to a clear understanding. It looks at the results of SPF and<br>
DKIM, which operate at the domain level, so this bullet isn&#39;t really<br=
>
necessary.<br></blockquote><div><br></div>Doesn&#39;t RFC5322.From also ope=
rate at the domain level in our context?<br><br></div><div class=3D"gmail_q=
uote"><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-l=
eft:1px #ccc solid;padding-left:1ex"><span class=3D"">
</span>DMARC&#39;s filtering function is based on whether SPF or DKIM can p=
rovide<br>
an authenticated, aligned identifier for the message under<br>
consideration. Messages that purport to be from a Domain Owner&#39;s domain=
<br>
and arrive from servers that are not authorized by that domain&#39;s SPF an=
d<br>
do not contain an appropriate DKIM signature can be affected by DMARC<br>
policies.<br>
<br>
[I think the additional &quot;that domain&#39;s&quot; will do it.]<br></blo=
ckquote><div><br></div><div>Added.<br>=C2=A0<br></div><blockquote class=3D"=
gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-=
left:1ex">
<span class=3D"">&gt;&gt; 5. DMARC policy record<br>
&gt;&gt;<br>
&gt;&gt; Paragraph 2: Again, &quot;matches perfectly with the DNS&quot; is =
an inaccurate<br>
&gt;&gt; characterization. If the query requirement matched perfectly with =
the<br>
&gt;&gt; DNS, DNS would have a way to determine the Administrative Domain w=
ithout<br>
&gt;&gt; resorting to suffix lists and such. Just strike the sentence; this=
 isn&#39;t<br>
&gt;&gt; relevant here anyway.<br>
&gt; -08 doesn&#39;t have this language.<br>
<br>
</span>Now section 5.1, paragraph 2. Honestly, this reads like marketing fl=
uff<br>
that doesn&#39;t belong in a specification like this.<br></blockquote><div>=
<br></div><div>I don&#39;t have any trouble removing it.=C2=A0 I think it w=
as added to ward off anyone that might claim &quot;You shouldn&#39;t be usi=
ng the DNS for this.&quot;<br>=C2=A0<br></div><blockquote class=3D"gmail_qu=
ote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex=
">
<span class=3D"">&gt;&gt; 11.1 Discovery<br>
&gt; 6.2.1 in -08<br>
&gt;<br>
&gt;&gt; Mail Receivers can also discover reporting requests from the<br>
&gt;&gt; Organizational Domain. That should be mentioned here. But I&#39;m =
a little<br>
&gt;&gt; confused why we have another Discovery section at all.<br>
&gt; The text&#39;s use of the word &#39;corresponds&#39; handles the mappi=
ng to org<br>
&gt; domain, IMO.<br>
<br>
</span>This is more of a comment about document organization. The previous<=
br>
sections have been talking about things that follow discovery of the<br>
policy record, and now when talking about aggregate reports there&#39;s<br>
another section about discovery. Why here; isn&#39;t this a little redundan=
t?<br></blockquote><div><br></div><div>It&#39;s mainly to say that there is=
n&#39;t a specific discovery process for aggregate report details; it&#39;s=
 already done.=C2=A0 This might be a legacy from ancient versions where the=
re was a separate process.=C2=A0 I&#39;ll tidy it up by merging it into the=
 previous subsection.<br>=C2=A0<br></div><blockquote class=3D"gmail_quote" =
style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
SHOULD isn&#39;t strong enough for the Report Receiver to depend on. There<=
br>
are other ways to get the information that is encoded into the filename.<br=
></blockquote><div><br></div><div>Like what?<br>=C2=A0<br></div><blockquote=
 class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc soli=
d;padding-left:1ex">
If the spec wants to suggest, &quot;here&#39;s a nice file name format that=
 you<br>
MAY want to use&quot;, that&#39;s fine. But SHOULD is both too weak if the<=
br>
recipient can&#39;t depend on it and too strong if it&#39;s merely advice.<=
br></blockquote><div><br></div><div>I&#39;m not so sure.=C2=A0 If we&#39;re=
 going to go with MAY, then we also need some kind of signal that the filen=
ame used does conform to the proposed encoding, or else there might be some=
 attempt to extract report parameters that simply aren&#39;t there.<br></di=
v><div>=C2=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 =
.8ex;border-left:1px #ccc solid;padding-left:1ex">
<span class=3D"">&gt;&gt; The privacy consideration here, which isn&#39;t o=
bvious from the wording, is<br>
&gt;&gt; that users may currently use forwarding in a way that prevents the=
<br>
&gt;&gt; sender from determining the ultimate delivery address. DMARC has t=
he<br>
&gt;&gt; potential to break that. This might be important in the case of a =
user<br>
&gt;&gt; that is trying to distance themselves from a stalker.<br>
&gt; How is that a DMARC-specific &#39;exposure&#39; consideration?<br>
<br>
</span>Because it&#39;s the retrieval (or search for) the DMARC record migh=
t<br>
reveals that. But on rereading this, paragraph 4 addresses this<br>
sufficiently.<br>
<br>
New issue: Paragraph 3 refers to &quot;Both report types&quot; but since io=
def was<br>
removed, it should just say &quot;The AFRF report type&quot;.<br></blockquo=
te><div><br></div><div>That refers to the aggregate and detailed reports (&=
quot;rua&quot; and &quot;ruf&quot;), not IODEF and AFRF.<br><br></div><div>=
-MSK<br></div></div></div></div></div>

--047d7bb70bb24d3239050af05df5--


From nobody Tue Dec 23 22:32:48 2014
Return-Path: <superuser@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 610571ACD36 for <dmarc@ietfa.amsl.com>; Tue, 23 Dec 2014 22:32:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 77lTZmqjvwv6 for <dmarc@ietfa.amsl.com>; Tue, 23 Dec 2014 22:32:45 -0800 (PST)
Received: from mail-wg0-x22b.google.com (mail-wg0-x22b.google.com [IPv6:2a00:1450:400c:c00::22b]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 91AB21ACD31 for <dmarc@ietf.org>; Tue, 23 Dec 2014 22:32:45 -0800 (PST)
Received: by mail-wg0-f43.google.com with SMTP id l18so10701110wgh.16 for <dmarc@ietf.org>; Tue, 23 Dec 2014 22:32:44 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=mJiAqnotDbYLLEi7Oq7X4IZdga7intd7JBig144syUg=; b=AisI+oWhZNK8i04/rMhtOuPcgjMGl02+31Ry/k7blOKJwyymzIzsqjPmQZT91ScLsy V1qnGpEBJyMvxhmvh15e4/xE82kMnn+22pYObLdi5wruW3m+ei0RC39WrA8WyEYyr8B+ 9RybGVLtUsdUKRhErEJ88AL1BBda0GGJdojkxWuwrbZ2YFDE8kM4iJCV4IA4e/8dd5HG EetLa31+0yiBH0+lfEliZhsyjLZAut0JC2qcfU1g4GKfWjq3tEK3DX2Bv5//PpHZMu1e 3asTCY8im6pM33WS+Vn14v3wyATKTnrhoJOZO1BPAIHcIszKn5eEiL8okXE1rodlXui+ 3BjA==
MIME-Version: 1.0
X-Received: by 10.180.91.36 with SMTP id cb4mr47864415wib.30.1419402764372; Tue, 23 Dec 2014 22:32:44 -0800 (PST)
Received: by 10.27.204.198 with HTTP; Tue, 23 Dec 2014 22:32:44 -0800 (PST)
In-Reply-To: <6858606.AfKicQ9CJZ@kitterman-optiplex-9020m>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <6858606.AfKicQ9CJZ@kitterman-optiplex-9020m>
Date: Wed, 24 Dec 2014 01:32:44 -0500
Message-ID: <CAL0qLwZeFbZ0pDCDNdpn7Xx_4m6DJ+eeTgwYMSFgJOX0ZiBBWg@mail.gmail.com>
From: "Murray S. Kucherawy" <superuser@gmail.com>
To: Scott Kitterman <sklist@kitterman.com>
Content-Type: multipart/alternative; boundary=f46d043d6711905133050af075b3
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/QXU2qtEZkyOW9XxX-ohLOC6CJ0U
Cc: "dmarc@ietf.org" <dmarc@ietf.org>
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Dec 2014 06:32:47 -0000

--f46d043d6711905133050af075b3
Content-Type: text/plain; charset=UTF-8

On Mon, Dec 22, 2014 at 10:44 AM, Scott Kitterman <sklist@kitterman.com>
wrote:

> There was a recent thread on postfix-users about DMARC rejections when
> there
> are DNS errors that caused me to review -08 to see what it says on the
> matter.
>
> At the end of section 5.6.2, it says:
>
>    Handling of messages for which SPF and/or DKIM evaluation encounters
>    a DNS error is left to the discretion of the Mail Receiver.  Further
>    discussion is available in Section 5.6.3.
>
> My reading of 5.6.3 though is that it only discusses DNS errors in the
> context
> of failing to retrieve the DMARC record.  Any discussion about handling DNS
> errors for SPF/DKIM seems to be missing.
>

Yes, DMARC punts on what to do when SPF or DKIM encounter transient
failures.  I imagine that's because those modules would arrange to
temp-fail a message that has that problem.  I suppose my experience is that
messages don't even get to the point of DMARC evaluation when that happens,
because the message has already been temp-failed.

If you think about DKIM and SPF as being part of a layer below DMARC, then
I'm not sure it's wise of us to be making any kind of normative statement
about what to do when the lower layers fail.

What do you suggest?

-MSK

--f46d043d6711905133050af075b3
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">On Mon, Dec 22, 2014 at 10:44 AM, Scott Kitterman <span di=
r=3D"ltr">&lt;<a href=3D"mailto:sklist@kitterman.com" target=3D"_blank">skl=
ist@kitterman.com</a>&gt;</span> wrote:<br><div class=3D"gmail_extra"><div =
class=3D"gmail_quote"><blockquote class=3D"gmail_quote" style=3D"margin:0 0=
 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">There was a recent thr=
ead on postfix-users about DMARC rejections when there<br>
are DNS errors that caused me to review -08 to see what it says on the matt=
er.<br>
<br>
At the end of section 5.6.2, it says:<br>
<br>
=C2=A0 =C2=A0Handling of messages for which SPF and/or DKIM evaluation enco=
unters<br>
=C2=A0 =C2=A0a DNS error is left to the discretion of the Mail Receiver.=C2=
=A0 Further<br>
=C2=A0 =C2=A0discussion is available in Section 5.6.3.<br>
<br>
My reading of 5.6.3 though is that it only discusses DNS errors in the cont=
ext<br>
of failing to retrieve the DMARC record.=C2=A0 Any discussion about handlin=
g DNS<br>
errors for SPF/DKIM seems to be missing.<br></blockquote><div><br></div><di=
v>Yes, DMARC punts on what to do when SPF or DKIM encounter transient failu=
res.=C2=A0 I imagine that&#39;s because those modules would arrange to temp=
-fail a message that has that problem.=C2=A0 I suppose my experience is tha=
t messages don&#39;t even get to the point of DMARC evaluation when that ha=
ppens, because the message has already been temp-failed.<br><br></div><div>=
If you think about DKIM and SPF as being part of a layer below DMARC, then =
I&#39;m not sure it&#39;s wise of us to be making any kind of normative sta=
tement about what to do when the lower layers fail.<br><br>What do you sugg=
est?<br><br>-MSK<br></div></div></div></div>

--f46d043d6711905133050af075b3--


From nobody Tue Dec 23 23:02:52 2014
Return-Path: <superuser@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7ED101ACD2B for <dmarc@ietfa.amsl.com>; Tue, 23 Dec 2014 23:02:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6H4jmoSHF6DV for <dmarc@ietfa.amsl.com>; Tue, 23 Dec 2014 23:02:41 -0800 (PST)
Received: from mail-wi0-x22a.google.com (mail-wi0-x22a.google.com [IPv6:2a00:1450:400c:c05::22a]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 06A611ACCE6 for <dmarc@ietf.org>; Tue, 23 Dec 2014 23:02:40 -0800 (PST)
Received: by mail-wi0-f170.google.com with SMTP id bs8so14963589wib.1 for <dmarc@ietf.org>; Tue, 23 Dec 2014 23:02:39 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=QEwid3tuXXdft7LtPcWaco6jnpeZJsRwXf616RiSThM=; b=irmzd3njNPTyiZzFyQ/K9MLN4VEDXE0v7x3mFIR85jtvmifjJ9UPaWH5EVkcnI2B/t YbL4H3XVvW01vjkIRL4p410VXDlVRH9dDhgAGRmcVHWv72HTHzlFFqcXu5pvcHlWuRGy zwfVqnPSiIhq8x/mpLw9HlReRR4Xgoo3ps1sKfo6MCW1nHvtTyCmnh8+66k85FpmyJ4c SQESnYAeE5bHMmMa7/H/aZCz1456MPXevqSmD4jYzXpyXEh1+3aATeNy9mzPiA4hquCm 4+wRwRKx8KPiWHOYBzVfnrOWt2EVMGo3qLw/+FZ/2sXlqyZXeKK1lZJ3timNaTEO88VD ZQKg==
MIME-Version: 1.0
X-Received: by 10.194.62.76 with SMTP id w12mr60541662wjr.5.1419404559642; Tue, 23 Dec 2014 23:02:39 -0800 (PST)
Received: by 10.27.204.198 with HTTP; Tue, 23 Dec 2014 23:02:39 -0800 (PST)
In-Reply-To: <534ED5F1.3010001@bluepopcorn.net>
References: <534ED5F1.3010001@bluepopcorn.net>
Date: Wed, 24 Dec 2014 02:02:39 -0500
Message-ID: <CAL0qLwatbZn6rC_74YBhbXtDp90dymcAvPDuASh=R7tuny2fgA@mail.gmail.com>
From: "Murray S. Kucherawy" <superuser@gmail.com>
To: Jim Fenton <fenton@bluepopcorn.net>
Content-Type: multipart/alternative; boundary=047d7ba977a491f940050af0e02d
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/6DFOSHGuDoZieZm9GY_UlHT_wWY
Cc: "dmarc@ietf.org" <dmarc@ietf.org>
Subject: Re: [dmarc-ietf] Review of draft-kucherawy-dmarc-base-04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Dec 2014 07:02:46 -0000

--047d7ba977a491f940050af0e02d
Content-Type: text/plain; charset=UTF-8

Covering the stuff Dave didn't cover:

On Wed, Apr 16, 2014 at 3:11 PM, Jim Fenton <fenton@bluepopcorn.net> wrote:

> Top of page 6: "The receiver reports to the domain owner..."  The
> receiver actually sends reports to a report receiver designated by the
> domain owner.
>

Fixed.


> 2.4 Out of Scope
>
> I still find the double negatives to be confusing, e.g., "DMARC will not
> make a distinction...".  It's the making of a distinction that's out of
> scope, not the not making a distinction (forgive my own double negative,
> please!).
>

That text is apparently gone.


> Bullet 10: Again, DMARC doesn't do authentication, even for domains; it
> relies on other authentication mechanisms.
>
> 3. Terminology and Definitions
>
> Domain Owner: This definition refers to the domain owner as being the
> registrant of a DNS domain. But as used elsewhere in the spec, it can
> also be a delegate of that registrant that is given control over a
> subdomain. The document frequently refers to a domain owner publishing a
> DMARC record, so it's worth clarifying who has that capability.
>
> Report Receiver: "reports about the messages claiming to be from a third
> party"  We're talking about the reports here, not the messages
> themselves, so I would suggest "reports from a third party about their
> messages".
>

Fixed and fixed.


> 3.1.2 General Concepts
>
> Paragraph 2: "provide feedback to the Domain Owner". Should this say a
> Report Receiver designated by the Domain Owner, or is that too much
> information at this point?
>

Fixed.


> Paragraph 3 doesn't quite capture the sense of alignment properly,
> especially for SPF. A message that is authorized by SPF might have an
> unaligned envelope-from address, so the validity of SPF for such
> messages is moot.
>

This appears to have been rewritten already.


> 3.1.3 Flow Diagram
>
> Item 1: "Author constructs" and "Author also configures" -> "Domain
> Owner constructs" and "Domain Owner also configures" (I missed this last
> time)
>
> Item 7: 'e.g., a "pass" or "fail"'  Are there other results? If not,
> remove the e.g.
>

Fixed and fixed.


> 3.1.4 Identifier Alignment
>
> Paragraph 5: Although this document makes it clear that "strict" and
> "relaxed" are different from their usage in DKIM, I'm still having
> trouble with those words.  "strict" means that only this specific domain
> is affected; "relaxed" means that this domain and its subdomains are
> affected.  So "relaxed" is really more strict in that it enforces more.
> I find the terms to be confusing, and would recommend something that
> more directly describes whether the policy applies to subdomains.
>

Since we're documenting deployed infrastructure here, it's way too late to
be renaming these.


> 3.1.4.1 DKIM-authenticated identifiers
>
> Paragraph 4: Include section reference (3.2) to public suffix lists
> since the section describing it has moved after this text.
>

Added.


> 5.2 General Record Format
>
> fo: A colon-separated list of options is supported, but 0 and 1 conflict
> with each other so that either needs to be prohibited or it needs to
> define which wins.
>

Previously addressed (Scott Kitterman brought it up).


> fo:d: "a signature": In the case of a message with multiple DKIM
> signatures, does that mean if any signature failed evaluation, a message
> is sent? Is a separate message sent for each failed signature?
>

Clarified.


> p:quarantine: What does "suspicious" mean? It sounds like it means
> something other than "place into spam folder" and "scrutinize with
> additional intensity"
>

Clarified.


> pct: "DMARC-generated reports...must be sent and received unhindered".
> How does one identity a DMARC-generated report to make sure it's
> unhindered, especially if a bad actor tries to make their messages look
> like reports?
>

The syntax of a DMARC report is defined elsewhere in the document.
Shouldn't it be easy to identify one?



> 5.3 Formal Definition
>
> dmarc-rfmt: Should allow a colon-separated list as described in 5.2.
>

Fixed.


> 7.2 Aggregate Reports
>
> The list of what SHOULD be in the reports seems like it belongs in the
> definitions of the report formats themselves.
>

The report formats, defined in MARF RFCs, present the syntax you would use
to report those values if you have them.  For DMARC, we're saying that all
of those are a SHOULD.


> 7.3 Failure reports
>
> Paragraphs 1 and 2 conflict -- it looks like a change to include [IODEF]
> in the text was incompletely applied.
>

Cleaned up.


> 7.3.1 Reporting Format Update
>
> "Operators implementing this specification also implement": Is that a
> SHOULD or MUST before "also implement"?
>

It's an implied MUST.  We're being trained lately that use of RFC2119 words
is not always mandatory.  In essence, this is saying "If you're a DMARC
site, this is what you do."

7.4 Utility of Failure Reports
>
> Paragraph 1: "detects an authentication failure" -> "detects a DMARC
> failure" (since authentication can succeed but DMARC fail because of
> alignment)
>

Fixed (new location).


> Paragraph 2 is not relevant to utility of failure reports and probably
> belongs in 7.3.1.
>

It's all been rearranged, and the new layout seems better.


> 8. Policy Discovery
>
> Step 3: This implicitly says that policy directly applied to a subdomain
> takes precedence over that published by an Organizational Domain. That's
> fine, but it should be stated more clearly elsewhere. As I said before,
> it would be helpful to have something earlier in the specification that
> talks about the ability to publish a policy either directly on a
> subdomain or on an Organizational Domain.
>

Isn't this clear from the definition of "sp:" in 5.3 (of -08)?


> Also, note that subdomain policies are necessarily strict (don't apply
> to subdomains of the subdomain) because they won't be discovered using
> this algorithm. It should say that somewhere do operators don't try to
> apply DMARC to subtrees of their organizational domain.
>

I'm a little confused by your example.  If I put a "p" and an "sp" tag at "
example.com", then "p" applies to example.com and "sp" applies to *.
example.com.  That seems clear from 5.3.  Are you suggesting saying that
there's no way to do policy hierarchies?

10.1 Extract author domain
>
> "Such messages SHOULD be rejected": Agree where forbidden by RFC5322,
> but a single RFC5322.From containing multiple entities is explicitly
> valid. Again, this isn't the place to be making fundamental changes to
> the behavior of email.
>

This has already been cleaned up.


> 11.2.3 Error Reports
>
> Last paragraph: If this is published as an independent submission RFC,
> there will be no opportunity to add something here.
>

What might one want to add?

14.4 Secure Protocols
>
> This seems like it belongs more in Security Consideration than here.
>

OK.

15.5 Identifier Alignment Considerations
>
> "DKIM signing practices" -> "DKIM selector records"
>

Fixed.


> Note that actors that can gain control of SPF records or selectors can
> probably publish a DMARC record for the subdomain as well, which will
> take precedence over the record at the Organizational Domain.
>
> Last paragraph: What does "strict" have to do with this?
>

If you set "strict" on example.com, you remove any ability for someone
that's compromised foo.example.com from generating mail that will pass
DMARC.


> 17.3 DNS Security
>
> Might want to make a distinction between DNSSEC publication and
> resolution. Publication is relevant to Domain Owners, and third-party
> Report Receivers. DNSSEC-aware resolution is relevant to Mail Receivers
> and Report Receivers.
>

Done.

-MSK

--047d7ba977a491f940050af0e02d
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Covering the stuff Dave didn&#39;t cover:<br><div><div cla=
ss=3D"gmail_extra"><br><div class=3D"gmail_quote">On Wed, Apr 16, 2014 at 3=
:11 PM, Jim Fenton <span dir=3D"ltr">&lt;<a href=3D"mailto:fenton@bluepopco=
rn.net" target=3D"_blank">fenton@bluepopcorn.net</a>&gt;</span> wrote:<br><=
blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px=
 #ccc solid;padding-left:1ex">Top of page 6: &quot;The receiver reports to =
the domain owner...&quot;=C2=A0 The<br>
receiver actually sends reports to a report receiver designated by the<br>
domain owner.<br></blockquote><div><br></div><div>Fixed.<br>=C2=A0<br></div=
><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1=
px #ccc solid;padding-left:1ex">
2.4 Out of Scope<br>
<br>
I still find the double negatives to be confusing, e.g., &quot;DMARC will n=
ot<br>
make a distinction...&quot;.=C2=A0 It&#39;s the making of a distinction tha=
t&#39;s out of<br>
scope, not the not making a distinction (forgive my own double negative,<br=
>
please!).<br></blockquote><div><br></div><div>That text is apparently gone.=
<br>=C2=A0<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0=
 .8ex;border-left:1px #ccc solid;padding-left:1ex">
Bullet 10: Again, DMARC doesn&#39;t do authentication, even for domains; it=
<br>
relies on other authentication mechanisms.<br>
<br>
3. Terminology and Definitions<br>
<br>
Domain Owner: This definition refers to the domain owner as being the<br>
registrant of a DNS domain. But as used elsewhere in the spec, it can<br>
also be a delegate of that registrant that is given control over a<br>
subdomain. The document frequently refers to a domain owner publishing a<br=
>
DMARC record, so it&#39;s worth clarifying who has that capability.<br>
<br>
Report Receiver: &quot;reports about the messages claiming to be from a thi=
rd<br>
party&quot;=C2=A0 We&#39;re talking about the reports here, not the message=
s<br>
themselves, so I would suggest &quot;reports from a third party about their=
<br>
messages&quot;.<br></blockquote><div><br></div><div>Fixed and fixed.<br>=C2=
=A0<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;b=
order-left:1px #ccc solid;padding-left:1ex">
3.1.2 General Concepts<br>
<br>
Paragraph 2: &quot;provide feedback to the Domain Owner&quot;. Should this =
say a<br>
Report Receiver designated by the Domain Owner, or is that too much<br>
information at this point?<br></blockquote><div><br></div><div>Fixed.<br>=
=C2=A0<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8e=
x;border-left:1px #ccc solid;padding-left:1ex">
Paragraph 3 doesn&#39;t quite capture the sense of alignment properly,<br>
especially for SPF. A message that is authorized by SPF might have an<br>
unaligned envelope-from address, so the validity of SPF for such<br>
messages is moot.<br></blockquote><div><br></div><div>This appears to have =
been rewritten already.<br>=C2=A0<br></div><blockquote class=3D"gmail_quote=
" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
3.1.3 Flow Diagram<br>
<br>
Item 1: &quot;Author constructs&quot; and &quot;Author also configures&quot=
; -&gt; &quot;Domain<br>
Owner constructs&quot; and &quot;Domain Owner also configures&quot; (I miss=
ed this last<br>
time)<br>
<br>
Item 7: &#39;e.g., a &quot;pass&quot; or &quot;fail&quot;&#39;=C2=A0 Are th=
ere other results? If not,<br>
remove the e.g.<br></blockquote><div><br></div><div>Fixed and fixed.<br>=C2=
=A0<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;b=
order-left:1px #ccc solid;padding-left:1ex">
3.1.4 Identifier Alignment<br>
<br>
Paragraph 5: Although this document makes it clear that &quot;strict&quot; =
and<br>
&quot;relaxed&quot; are different from their usage in DKIM, I&#39;m still h=
aving<br>
trouble with those words.=C2=A0 &quot;strict&quot; means that only this spe=
cific domain<br>
is affected; &quot;relaxed&quot; means that this domain and its subdomains =
are<br>
affected.=C2=A0 So &quot;relaxed&quot; is really more strict in that it enf=
orces more.<br>
I find the terms to be confusing, and would recommend something that<br>
more directly describes whether the policy applies to subdomains.<br></bloc=
kquote><div><br></div><div>Since we&#39;re documenting deployed infrastruct=
ure here, it&#39;s way too late to be renaming these.<br>=C2=A0<br></div><b=
lockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px =
#ccc solid;padding-left:1ex">
3.1.4.1 DKIM-authenticated identifiers<br>
<br>
Paragraph 4: Include section reference (3.2) to public suffix lists<br>
since the section describing it has moved after this text.<br></blockquote>=
<div><br></div><div>Added.<br>=C2=A0<br></div><blockquote class=3D"gmail_qu=
ote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex=
">
5.2 General Record Format<br>
<br>
fo: A colon-separated list of options is supported, but 0 and 1 conflict<br=
>
with each other so that either needs to be prohibited or it needs to<br>
define which wins.<br></blockquote><div><br></div><div>Previously addressed=
 (Scott Kitterman brought it up).<br>=C2=A0<br></div><blockquote class=3D"g=
mail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-l=
eft:1ex">
fo:d: &quot;a signature&quot;: In the case of a message with multiple DKIM<=
br>
signatures, does that mean if any signature failed evaluation, a message<br=
>
is sent? Is a separate message sent for each failed signature?<br></blockqu=
ote><div><br></div><div>Clarified.<br>=C2=A0<br></div><blockquote class=3D"=
gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-=
left:1ex">
p:quarantine: What does &quot;suspicious&quot; mean? It sounds like it mean=
s<br>
something other than &quot;place into spam folder&quot; and &quot;scrutiniz=
e with<br>
additional intensity&quot;<br></blockquote><div><br></div><div>Clarified.<b=
r>=C2=A0<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .=
8ex;border-left:1px #ccc solid;padding-left:1ex">
pct: &quot;DMARC-generated reports...must be sent and received unhindered&q=
uot;.<br>
How does one identity a DMARC-generated report to make sure it&#39;s<br>
unhindered, especially if a bad actor tries to make their messages look<br>
like reports?<br></blockquote><div><br></div><div>The syntax of a DMARC rep=
ort is defined elsewhere in the document.=C2=A0 Shouldn&#39;t it be easy to=
 identify one?<br><br>=C2=A0<br></div><blockquote class=3D"gmail_quote" sty=
le=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
5.3 Formal Definition<br>
<br>
dmarc-rfmt: Should allow a colon-separated list as described in 5.2.<br></b=
lockquote><div><br></div><div>Fixed.<br>=C2=A0<br></div><blockquote class=
=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padd=
ing-left:1ex">
7.2 Aggregate Reports<br>
<br>
The list of what SHOULD be in the reports seems like it belongs in the<br>
definitions of the report formats themselves.<br></blockquote><div><br></di=
v><div>The report formats, defined in MARF RFCs, present the syntax you wou=
ld use to report those values if you have them.=C2=A0 For DMARC, we&#39;re =
saying that all of those are a SHOULD.<br>=C2=A0<br></div><blockquote class=
=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padd=
ing-left:1ex">
7.3 Failure reports<br>
<br>
Paragraphs 1 and 2 conflict -- it looks like a change to include [IODEF]<br=
>
in the text was incompletely applied.<br></blockquote><div><br></div><div>C=
leaned up.<br>=C2=A0<br></div><blockquote class=3D"gmail_quote" style=3D"ma=
rgin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
7.3.1 Reporting Format Update<br>
<br>
&quot;Operators implementing this specification also implement&quot;: Is th=
at a<br>
SHOULD or MUST before &quot;also implement&quot;?<br></blockquote><div><br>=
</div><div>It&#39;s an implied MUST.=C2=A0 We&#39;re being trained lately t=
hat use of RFC2119 words is not always mandatory.=C2=A0 In essence, this is=
 saying &quot;If you&#39;re a DMARC site, this is what you do.&quot;<br><br=
></div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-=
left:1px #ccc solid;padding-left:1ex">
7.4 Utility of Failure Reports<br>
<br>
Paragraph 1: &quot;detects an authentication failure&quot; -&gt; &quot;dete=
cts a DMARC<br>
failure&quot; (since authentication can succeed but DMARC fail because of<b=
r>
alignment)<br></blockquote><div><br></div><div>Fixed (new location).<br>=C2=
=A0<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;b=
order-left:1px #ccc solid;padding-left:1ex">
Paragraph 2 is not relevant to utility of failure reports and probably<br>
belongs in 7.3.1.<br></blockquote><div><br></div><div>It&#39;s all been rea=
rranged, and the new layout seems better.<br>=C2=A0<br></div><blockquote cl=
ass=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;p=
adding-left:1ex">
8. Policy Discovery<br>
<br>
Step 3: This implicitly says that policy directly applied to a subdomain<br=
>
takes precedence over that published by an Organizational Domain. That&#39;=
s<br>
fine, but it should be stated more clearly elsewhere. As I said before,<br>
it would be helpful to have something earlier in the specification that<br>
talks about the ability to publish a policy either directly on a<br>
subdomain or on an Organizational Domain.<br></blockquote><div><br></div><d=
iv>Isn&#39;t this clear from the definition of &quot;sp:&quot; in 5.3 (of -=
08)?<br>=C2=A0<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0=
 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
Also, note that subdomain policies are necessarily strict (don&#39;t apply<=
br>
to subdomains of the subdomain) because they won&#39;t be discovered using<=
br>
this algorithm. It should say that somewhere do operators don&#39;t try to<=
br>
apply DMARC to subtrees of their organizational domain.<br></blockquote><di=
v><br></div><div>I&#39;m a little confused by your example.=C2=A0 If I put =
a &quot;p&quot; and an &quot;sp&quot; tag at &quot;<a href=3D"http://exampl=
e.com">example.com</a>&quot;, then &quot;p&quot; applies to <a href=3D"http=
://example.com">example.com</a> and &quot;sp&quot; applies to *.<a href=3D"=
http://example.com">example.com</a>.=C2=A0 That seems clear from 5.3.=C2=A0=
 Are you suggesting saying that there&#39;s no way to do policy hierarchies=
?<br><br></div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex=
;border-left:1px #ccc solid;padding-left:1ex">
10.1 Extract author domain<br>
<br>
&quot;Such messages SHOULD be rejected&quot;: Agree where forbidden by RFC5=
322,<br>
but a single RFC5322.From containing multiple entities is explicitly<br>
valid. Again, this isn&#39;t the place to be making fundamental changes to<=
br>
the behavior of email.<br></blockquote><div><br></div><div>This has already=
 been cleaned up.<br>=C2=A0<br></div><blockquote class=3D"gmail_quote" styl=
e=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
11.2.3 Error Reports<br>
<br>
Last paragraph: If this is published as an independent submission RFC,<br>
there will be no opportunity to add something here.<br></blockquote><div><b=
r></div><div>What might one want to add?<br> <br></div><blockquote class=3D=
"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding=
-left:1ex">
14.4 Secure Protocols<br>
<br>
This seems like it belongs more in Security Consideration than here.<br></b=
lockquote><div><br></div><div>OK.<br><br></div><blockquote class=3D"gmail_q=
uote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1e=
x">
15.5 Identifier Alignment Considerations<br>
<br>
&quot;DKIM signing practices&quot; -&gt; &quot;DKIM selector records&quot;<=
br></blockquote><div><br></div><div>Fixed.<br>=C2=A0<br></div><blockquote c=
lass=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;=
padding-left:1ex">
Note that actors that can gain control of SPF records or selectors can<br>
probably publish a DMARC record for the subdomain as well, which will<br>
take precedence over the record at the Organizational Domain.<br>
<br>
Last paragraph: What does &quot;strict&quot; have to do with this?<br></blo=
ckquote><div><br></div><div>If you set &quot;strict&quot; on <a href=3D"htt=
p://example.com">example.com</a>, you remove any ability for someone that&#=
39;s compromised <a href=3D"http://foo.example.com">foo.example.com</a> fro=
m generating mail that will pass DMARC.<br>=C2=A0<br></div><blockquote clas=
s=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;pad=
ding-left:1ex">
17.3 DNS Security<br>
<br>
Might want to make a distinction between DNSSEC publication and<br>
resolution. Publication is relevant to Domain Owners, and third-party<br>
Report Receivers. DNSSEC-aware resolution is relevant to Mail Receivers<br>
and Report Receivers.<br></blockquote><div><br></div><div>Done.<br><br>-MSK=
 <br></div></div></div></div></div>

--047d7ba977a491f940050af0e02d--


From nobody Tue Dec 23 23:13:30 2014
Return-Path: <franck@peachymango.org>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1183A1ACD3B for <dmarc@ietfa.amsl.com>; Tue, 23 Dec 2014 23:13:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level: 
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lWV0fw0vNXhU for <dmarc@ietfa.amsl.com>; Tue, 23 Dec 2014 23:13:27 -0800 (PST)
Received: from mx-out-1.zmailcloud.com (01.zmailcloud.com [192.198.85.104]) by ietfa.amsl.com (Postfix) with ESMTP id 0769D1ACCE7 for <dmarc@ietf.org>; Tue, 23 Dec 2014 23:13:27 -0800 (PST)
Received: from smtp.01.com (smtp.01.com [10.10.0.43]) by mx-out-1.zmailcloud.com (Postfix) with ESMTP id 90E0D564EEB; Wed, 24 Dec 2014 01:13:26 -0600 (CST)
Received: from localhost (localhost [127.0.0.1]) by smtp-out-2.01.com (Postfix) with ESMTP id 87FEB60203; Wed, 24 Dec 2014 01:13:26 -0600 (CST)
X-Virus-Scanned: amavisd-new at smtp-out-2.01.com
Received: from smtp.01.com ([127.0.0.1]) by localhost (smtp-out-2.01.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BEj8wBokf8CI; Wed, 24 Dec 2014 01:13:26 -0600 (CST)
Received: from smtp.01.com (localhost [127.0.0.1]) by smtp-out-2.01.com (Postfix) with ESMTP id 3124C601D0; Wed, 24 Dec 2014 01:13:26 -0600 (CST)
DKIM-Filter: OpenDKIM Filter v2.8.4 smtp-out-2.01.com 3124C601D0
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=peachymango.org; s=61F775A4-4A7F-11E4-A6BB-61E3068E35F6; t=1419405206; bh=yBfY4Sd+ohlSaK7OnX9LRrdKDLid3hvGLxXphwzkdx8=; h=Date:From:To:Message-ID:Subject:MIME-Version:Content-Type; b=VrSfyK7pGs6zp2OPraZbbE7lv5ZxpyFOQ0Il64dZubXy07HHyCFy0Y8hbbYTHZFJp G3gQMmZBbBZdz1Z6EzNjBcgUIMPpyT1K4WqRzg7gFVA+REPfwt/o4y5mZqDIyFnGJC FH92WNYPpH5rtArQ2dRBaXnaYJeqhwD64yUW7qTg=
Received: from localhost (localhost [127.0.0.1]) by smtp-out-2.01.com (Postfix) with ESMTP id 0AAB360203; Wed, 24 Dec 2014 01:13:26 -0600 (CST)
X-Virus-Scanned: amavisd-new at smtp-out-2.01.com
Received: from smtp.01.com ([127.0.0.1]) by localhost (smtp-out-2.01.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id 0K5D7C0UGDhP; Wed, 24 Dec 2014 01:13:25 -0600 (CST)
Received: from mail-2.01.com (mail.01.com [10.10.0.41]) by smtp-out-2.01.com (Postfix) with ESMTP id D1E9D601D0; Wed, 24 Dec 2014 01:13:25 -0600 (CST)
Date: Wed, 24 Dec 2014 01:13:24 -0600 (CST)
From: Franck Martin <franck@peachymango.org>
To: "Murray S. Kucherawy" <superuser@gmail.com>
Message-ID: <1712480034.45611.1419405204864.JavaMail.zimbra@peachymango.org>
In-Reply-To: <WM!f44f5f14da590ead690430992af0de0e0b9ac1ac0002cda3e42d5aea3315d874527c350daf4494220eb86b4d9d9db2f9!@asav-2.01.com>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <6858606.AfKicQ9CJZ@kitterman-optiplex-9020m> <CAL0qLwZeFbZ0pDCDNdpn7Xx_4m6DJ+eeTgwYMSFgJOX0ZiBBWg@mail.gmail.com> <WM!f44f5f14da590ead690430992af0de0e0b9ac1ac0002cda3e42d5aea3315d874527c350daf4494220eb86b4d9d9db2f9!@asav-2.01.com>
MIME-Version: 1.0
Content-Type: multipart/alternative;  boundary="----=_Part_45610_69099402.1419405204863"
X-Originating-IP: [10.1.101.178]
X-Mailer: Zimbra 8.0.5_GA_5839 (ZimbraWebClient - FF34 (Mac)/8.0.5_GA_5839)
Thread-Topic: Jim Fenton's review of -04
Thread-Index: he8fT5yENeaigtP84xG2geyz4DTpoQ==
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/ukaxWJOrS9e16NhB6iEOao4MZ5w
Cc: dmarc@ietf.org, Scott Kitterman <sklist@kitterman.com>
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Dec 2014 07:13:29 -0000

------=_Part_45610_69099402.1419405204863
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 7bit

----- Original Message -----

> From: "Murray S. Kucherawy" <superuser@gmail.com>
> To: "Scott Kitterman" <sklist@kitterman.com>
> Cc: dmarc@ietf.org
> Sent: Tuesday, December 23, 2014 10:32:44 PM
> Subject: Re: [dmarc-ietf] Jim Fenton's review of -04

> On Mon, Dec 22, 2014 at 10:44 AM, Scott Kitterman < sklist@kitterman.com >
> wrote:

> > There was a recent thread on postfix-users about DMARC rejections when
> > there
> 
> > are DNS errors that caused me to review -08 to see what it says on the
> > matter.
> 

> > At the end of section 5.6.2, it says:
> 

> > Handling of messages for which SPF and/or DKIM evaluation encounters
> 
> > a DNS error is left to the discretion of the Mail Receiver. Further
> 
> > discussion is available in Section 5.6.3.
> 

> > My reading of 5.6.3 though is that it only discusses DNS errors in the
> > context
> 
> > of failing to retrieve the DMARC record. Any discussion about handling DNS
> 
> > errors for SPF/DKIM seems to be missing.
> 

> Yes, DMARC punts on what to do when SPF or DKIM encounter transient failures.
> I imagine that's because those modules would arrange to temp-fail a message
> that has that problem. I suppose my experience is that messages don't even
> get to the point of DMARC evaluation when that happens, because the message
> has already been temp-failed.

As SPF (and DKIM) can report a message with the status tempfail, it means the message is not necessarily tempfail (bounced). 

> If you think about DKIM and SPF as being part of a layer below DMARC, then
> I'm not sure it's wise of us to be making any kind of normative statement
> about what to do when the lower layers fail.

> What do you suggest?

I think we should recommend something here, not sure if it needs to be normative. We do say to ignore the SPF policy when p!=none, though I think we can be normative on the lower layers. I see 2 options here: 
1)tempfail the message is either SPF and DKIM have a tempfail status 
2)tempfail the message if both SPF and DKIM have a tempfail status 

1) is my preferred and is aggressive, therefore not sure people will like it. I'll settle for 2) 

As explained in another post, I'm worried I can run a DNS attack (or just a self inflicted DNS bad config) and get DMARC to reject emails it should have accepted (has the DMARC policy in cache, but cannot assert SPF and DKIM). 

------=_Part_45610_69099402.1419405204863
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html><body><div style=3D"font-family: arial,helvetica,sans-serif; font-siz=
e: 12pt; color: #000000"><hr id=3D"zwchr"><blockquote style=3D"border-left:=
2px solid #1010FF;margin-left:5px;padding-left:5px;color:#000;font-weight:n=
ormal;font-style:normal;text-decoration:none;font-family:Helvetica,Arial,sa=
ns-serif;font-size:12pt;"><b>From: </b>"Murray S. Kucherawy" &lt;superuser@=
gmail.com&gt;<br><b>To: </b>"Scott Kitterman" &lt;sklist@kitterman.com&gt;<=
br><b>Cc: </b>dmarc@ietf.org<br><b>Sent: </b>Tuesday, December 23, 2014 10:=
32:44 PM<br><b>Subject: </b>Re: [dmarc-ietf] Jim Fenton's review of -04<br>=
<div><br></div><div dir=3D"ltr">On Mon, Dec 22, 2014 at 10:44 AM, Scott Kit=
terman <span dir=3D"ltr">&lt;<a href=3D"mailto:sklist@kitterman.com" target=
=3D"_blank">sklist@kitterman.com</a>&gt;</span> wrote:<br><div class=3D"gma=
il_extra"><div class=3D"gmail_quote"><blockquote class=3D"gmail_quote" styl=
e=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">There w=
as a recent thread on postfix-users about DMARC rejections when there<br>
are DNS errors that caused me to review -08 to see what it says on the matt=
er.<br><br>
At the end of section 5.6.2, it says:<br><br>
&nbsp; &nbsp;Handling of messages for which SPF and/or DKIM evaluation enco=
unters<br>
&nbsp; &nbsp;a DNS error is left to the discretion of the Mail Receiver.&nb=
sp; Further<br>
&nbsp; &nbsp;discussion is available in Section 5.6.3.<br><br>
My reading of 5.6.3 though is that it only discusses DNS errors in the cont=
ext<br>
of failing to retrieve the DMARC record.&nbsp; Any discussion about handlin=
g DNS<br>
errors for SPF/DKIM seems to be missing.<br></blockquote><div><br></div><di=
v>Yes, DMARC punts on what to do when SPF or DKIM encounter transient failu=
res.&nbsp; I imagine that's because those modules would arrange to temp-fai=
l a message that has that problem.&nbsp; I suppose my experience is that me=
ssages don't even get to the point of DMARC evaluation when that happens, b=
ecause the message has already been temp-failed.</div></div></div></div></b=
lockquote><div><br>As SPF (and DKIM) can report a message with the status t=
empfail, it means the message is not necessarily tempfail (bounced).<br></d=
iv><blockquote style=3D"border-left:2px solid #1010FF;margin-left:5px;paddi=
ng-left:5px;color:#000;font-weight:normal;font-style:normal;text-decoration=
:none;font-family:Helvetica,Arial,sans-serif;font-size:12pt;"><div dir=3D"l=
tr"><div class=3D"gmail_extra"><div class=3D"gmail_quote"><div><div><br></d=
iv></div><div>If you think about DKIM and SPF as being part of a layer belo=
w DMARC, then I'm not sure it's wise of us to be making any kind of normati=
ve statement about what to do when the lower layers fail.<br><div><br></div=
>What do you suggest?<br><div><br></div></div></div></div></div></blockquot=
e><div>I think we should recommend something here, not sure if it needs to =
be normative. We do say to ignore the SPF policy when p!=3Dnone, though I t=
hink we can be normative on the lower layers. I see 2 options here:<br></di=
v><div>1)tempfail the message is either SPF and DKIM have a tempfail status=
<br></div><div>2)tempfail the message if both SPF and DKIM have a tempfail =
status<br></div><div><br></div><div>1) is my preferred and is aggressive, t=
herefore not sure people will like it. I'll settle for 2)<br></div><div><br=
></div><div>As explained in another post, I'm worried I can run a DNS attac=
k (or just a self inflicted DNS bad config) and get DMARC to reject emails =
it should have accepted (has the DMARC policy in cache, but cannot assert S=
PF and DKIM).<br></div><div><br></div></div></body></html>
------=_Part_45610_69099402.1419405204863--


From nobody Tue Dec 23 23:20:34 2014
Return-Path: <superuser@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9EFBD1ACD4A for <dmarc@ietfa.amsl.com>; Tue, 23 Dec 2014 23:20:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Yf2POmuMOEbg for <dmarc@ietfa.amsl.com>; Tue, 23 Dec 2014 23:20:32 -0800 (PST)
Received: from mail-wg0-x234.google.com (mail-wg0-x234.google.com [IPv6:2a00:1450:400c:c00::234]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DA1321ACD45 for <dmarc@ietf.org>; Tue, 23 Dec 2014 23:20:31 -0800 (PST)
Received: by mail-wg0-f52.google.com with SMTP id x12so10727635wgg.39 for <dmarc@ietf.org>; Tue, 23 Dec 2014 23:20:30 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=UYdCpsMrVdE3jpCk/ftKxVFO+k+/S91oNuN/kDbMjuE=; b=aqK6WEJXXtVzXkYl/1pQtVwXGyDhV228FNpNqhRSZ+/m8SX3w2EPjmAu7gffFDfJmJ Ghwhs9z8JtQxjlyYO+qBf0w6x7MBFXDbG7s7GYFO0R5qwbFsfAAx0zrzrFp9Ouie1thE GHb4cCbcP80dUKE5r0vZGPTuodfu163DFpDDECvQjNVCll3mHdHPiJBlHEC5H4Zjj4bi F4meERXoasjczUcklyQdNr3tpEB+q4y4bgysOsPftKCn1zmfDDy7DKkjXMEsM66mNh3P kMUVqenRr2euW5tWjaToKNswvnlSe5IMnJnF7PWsrwSUDCn3U/Cw+pbg3FGsPNX8VpRK rKdw==
MIME-Version: 1.0
X-Received: by 10.180.85.33 with SMTP id e1mr48331009wiz.61.1419405630593; Tue, 23 Dec 2014 23:20:30 -0800 (PST)
Received: by 10.27.204.198 with HTTP; Tue, 23 Dec 2014 23:20:30 -0800 (PST)
In-Reply-To: <1712480034.45611.1419405204864.JavaMail.zimbra@peachymango.org>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <6858606.AfKicQ9CJZ@kitterman-optiplex-9020m> <CAL0qLwZeFbZ0pDCDNdpn7Xx_4m6DJ+eeTgwYMSFgJOX0ZiBBWg@mail.gmail.com> <WM!f44f5f14da590ead690430992af0de0e0b9ac1ac0002cda3e42d5aea3315d874527c350daf4494220eb86b4d9d9db2f9!@asav-2.01.com> <1712480034.45611.1419405204864.JavaMail.zimbra@peachymango.org>
Date: Wed, 24 Dec 2014 02:20:30 -0500
Message-ID: <CAL0qLwauU9Eu_JNFiumpTwi=YvSysBZ5cVD93cYF46w1z+fFKA@mail.gmail.com>
From: "Murray S. Kucherawy" <superuser@gmail.com>
To: Franck Martin <franck@peachymango.org>
Content-Type: multipart/alternative; boundary=f46d04428074675e7e050af120b4
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/bLdzN07CVtap2WGhMNlmwOgyJx0
Cc: "dmarc@ietf.org" <dmarc@ietf.org>, Scott Kitterman <sklist@kitterman.com>
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Dec 2014 07:20:33 -0000

--f46d04428074675e7e050af120b4
Content-Type: text/plain; charset=UTF-8

On Wed, Dec 24, 2014 at 2:13 AM, Franck Martin <franck@peachymango.org>
wrote:

> I think we should recommend something here, not sure if it needs to be
> normative. We do say to ignore the SPF policy when p!=none, though I think
> we can be normative on the lower layers. I see 2 options here:
> 1)tempfail the message is either SPF and DKIM have a tempfail status
> 2)tempfail the message if both SPF and DKIM have a tempfail status
>
> 1) is my preferred and is aggressive, therefore not sure people will like
> it. I'll settle for 2)
>
> As explained in another post, I'm worried I can run a DNS attack (or just
> a self inflicted DNS bad config) and get DMARC to reject emails it should
> have accepted (has the DMARC policy in cache, but cannot assert SPF and
> DKIM).
>
>
I think it's reasonably clear from 5.6.3 that the "fail open" choice is
possibly dangerous, as is anything that fails open.

But more importantly, I'm also worried about making a normative decision
now about something we deliberately haven't specified up to this point for
whatever reason.  We are supposed to be documenting current practice with
this effort, not establishing something new.

Might this something best left for the standards track WG effort?

-MSK

--f46d04428074675e7e050af120b4
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">On Wed, Dec 24, 2014 at 2:13 AM, Franck Martin <span dir=
=3D"ltr">&lt;<a href=3D"mailto:franck@peachymango.org" target=3D"_blank">fr=
anck@peachymango.org</a>&gt;</span> wrote:<div class=3D"gmail_extra"><div c=
lass=3D"gmail_quote"><blockquote class=3D"gmail_quote" style=3D"margin:0 0 =
0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div><div style=3D"font=
-family:arial,helvetica,sans-serif;font-size:12pt;color:#000000"><span clas=
s=3D""></span><div>I think we should recommend something here, not sure if =
it needs to be normative. We do say to ignore the SPF policy when p!=3Dnone=
, though I think we can be normative on the lower layers. I see 2 options h=
ere:<br></div><div>1)tempfail the message is either SPF and DKIM have a tem=
pfail status<br></div><div>2)tempfail the message if both SPF and DKIM have=
 a tempfail status<br></div><div><br></div><div>1) is my preferred and is a=
ggressive, therefore not sure people will like it. I&#39;ll settle for 2)<b=
r></div><div><br></div><div>As explained in another post, I&#39;m worried I=
 can run a DNS attack (or just a self inflicted DNS bad config) and get DMA=
RC to reject emails it should have accepted (has the DMARC policy in cache,=
 but cannot assert SPF and DKIM).<br></div><div><br></div></div></div></blo=
ckquote></div><br></div><div class=3D"gmail_extra">I think it&#39;s reasona=
bly clear from 5.6.3 that the &quot;fail open&quot; choice is possibly dang=
erous, as is anything that fails open.<br><br></div><div class=3D"gmail_ext=
ra">But more importantly, I&#39;m also worried about making a normative dec=
ision now about something we deliberately haven&#39;t specified up to this =
point for whatever reason.=C2=A0 We are supposed to be documenting current =
practice with this effort, not establishing something new.<br><br>Might thi=
s something best left for the standards track WG effort?<br><br>-MSK<br></d=
iv></div>

--f46d04428074675e7e050af120b4--


From nobody Tue Dec 23 23:40:42 2014
Return-Path: <franck@peachymango.org>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 396891ACD30 for <dmarc@ietfa.amsl.com>; Tue, 23 Dec 2014 23:40:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level: 
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SvW4qz5_hzI7 for <dmarc@ietfa.amsl.com>; Tue, 23 Dec 2014 23:40:39 -0800 (PST)
Received: from mx-out-1.zmailcloud.com (01.zmailcloud.com [192.198.85.104]) by ietfa.amsl.com (Postfix) with ESMTP id 018F41ACD4E for <dmarc@ietf.org>; Tue, 23 Dec 2014 23:40:39 -0800 (PST)
Received: from smtp.01.com (smtp.01.com [10.10.0.43]) by mx-out-1.zmailcloud.com (Postfix) with ESMTP id 9D0F8564EFD; Wed, 24 Dec 2014 01:40:38 -0600 (CST)
Received: from localhost (localhost [127.0.0.1]) by smtp-out-2.01.com (Postfix) with ESMTP id 89E5160236; Wed, 24 Dec 2014 01:40:38 -0600 (CST)
X-Virus-Scanned: amavisd-new at smtp-out-2.01.com
Received: from smtp.01.com ([127.0.0.1]) by localhost (smtp-out-2.01.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rNdm6eE3_xU3; Wed, 24 Dec 2014 01:40:38 -0600 (CST)
Received: from smtp.01.com (localhost [127.0.0.1]) by smtp-out-2.01.com (Postfix) with ESMTP id 5C48660266; Wed, 24 Dec 2014 01:40:38 -0600 (CST)
DKIM-Filter: OpenDKIM Filter v2.8.4 smtp-out-2.01.com 5C48660266
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=peachymango.org; s=61F775A4-4A7F-11E4-A6BB-61E3068E35F6; t=1419406838; bh=fYJ075OQiC+0cggfGNP6oru8FEWJ7+VAjxB8IgVpvXI=; h=Date:From:To:Message-ID:Subject:MIME-Version:Content-Type; b=Q2cfdJvoo+EoyhDsJJvxAf3jNYZ7cwwkbyvqWfe3eJfAGBGVlpSd5EsUaCXuQMr6E slkw9QTnfeDc160pgqZpL8EdinOUYY+Ma7OOhGj4DLA2glQFu6W/MNbfMNoeOo63MX /IGvYBNXnaSUKdtKHm0hayUaVLWKsh+ZnYZN+fwY=
Received: from localhost (localhost [127.0.0.1]) by smtp-out-2.01.com (Postfix) with ESMTP id 3A8556024C; Wed, 24 Dec 2014 01:40:38 -0600 (CST)
X-Virus-Scanned: amavisd-new at smtp-out-2.01.com
Received: from smtp.01.com ([127.0.0.1]) by localhost (smtp-out-2.01.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id a6AzgL3RYYLO; Wed, 24 Dec 2014 01:40:38 -0600 (CST)
Received: from mail-2.01.com (mail.01.com [10.10.0.41]) by smtp-out-2.01.com (Postfix) with ESMTP id 143EB60236; Wed, 24 Dec 2014 01:40:38 -0600 (CST)
Date: Wed, 24 Dec 2014 01:40:37 -0600 (CST)
From: Franck Martin <franck@peachymango.org>
To: "Murray S. Kucherawy" <superuser@gmail.com>
Message-ID: <1194394943.45680.1419406837913.JavaMail.zimbra@peachymango.org>
In-Reply-To: <WM!9095b2c56f52ed2e4cd82de82ff9f481d4d5b92ae96fc875180d1651fad8ff0949fa8ff805810787c119071229e4fff8!@asav-2.01.com>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <6858606.AfKicQ9CJZ@kitterman-optiplex-9020m> <CAL0qLwZeFbZ0pDCDNdpn7Xx_4m6DJ+eeTgwYMSFgJOX0ZiBBWg@mail.gmail.com> <WM!f44f5f14da590ead690430992af0de0e0b9ac1ac0002cda3e42d5aea3315d874527c350daf4494220eb86b4d9d9db2f9!@asav-2.01.com> <1712480034.45611.1419405204864.JavaMail.zimbra@peachymango.org> <CAL0qLwauU9Eu_JNFiumpTwi=YvSysBZ5cVD93cYF46w1z+fFKA@mail.gmail.com> <WM!9095b2c56f52ed2e4cd82de82ff9f481d4d5b92ae96fc875180d1651fad8ff0949fa8ff805810787c119071229e4fff8!@asav-2.01.com>
MIME-Version: 1.0
Content-Type: multipart/alternative;  boundary="----=_Part_45679_832768806.1419406837912"
X-Originating-IP: [10.1.101.179]
X-Mailer: Zimbra 8.0.5_GA_5839 (ZimbraWebClient - FF34 (Mac)/8.0.5_GA_5839)
Thread-Topic: Jim Fenton's review of -04
Thread-Index: fV1/F0XxOZJ6Rfv92LwGvDwdJpKRzQ==
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/N8FWmcSWZUEuOzErshbF6-cWko4
Cc: dmarc@ietf.org, Scott Kitterman <sklist@kitterman.com>
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Dec 2014 07:40:41 -0000

------=_Part_45679_832768806.1419406837912
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 7bit

----- Original Message -----

> From: "Murray S. Kucherawy" <superuser@gmail.com>
> To: "Franck Martin" <franck@peachymango.org>
> Cc: dmarc@ietf.org, "Scott Kitterman" <sklist@kitterman.com>
> Sent: Tuesday, December 23, 2014 11:20:30 PM
> Subject: Re: [dmarc-ietf] Jim Fenton's review of -04

> On Wed, Dec 24, 2014 at 2:13 AM, Franck Martin < franck@peachymango.org >
> wrote:

> > I think we should recommend something here, not sure if it needs to be
> > normative. We do say to ignore the SPF policy when p!=none, though I think
> > we can be normative on the lower layers. I see 2 options here:
> 
> > 1)tempfail the message is either SPF and DKIM have a tempfail status
> 
> > 2)tempfail the message if both SPF and DKIM have a tempfail status
> 

> > 1) is my preferred and is aggressive, therefore not sure people will like
> > it.
> > I'll settle for 2)
> 

> > As explained in another post, I'm worried I can run a DNS attack (or just a
> > self inflicted DNS bad config) and get DMARC to reject emails it should
> > have
> > accepted (has the DMARC policy in cache, but cannot assert SPF and DKIM).
> 

> I think it's reasonably clear from 5.6.3 that the "fail open" choice is
> possibly dangerous, as is anything that fails open.

> But more importantly, I'm also worried about making a normative decision now
> about something we deliberately haven't specified up to this point for
> whatever reason. We are supposed to be documenting current practice with
> this effort, not establishing something new.

> Might this something best left for the standards track WG effort?

Fair enough, but curious about standard practice. For instance what openDMARC do? and others? 

I think DMARC got us to be "stricter" and less "lenient" with email. 

------=_Part_45679_832768806.1419406837912
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html><body><div style=3D"font-family: arial,helvetica,sans-serif; font-siz=
e: 12pt; color: #000000"><hr id=3D"zwchr"><blockquote style=3D"border-left:=
2px solid #1010FF;margin-left:5px;padding-left:5px;color:#000;font-weight:n=
ormal;font-style:normal;text-decoration:none;font-family:Helvetica,Arial,sa=
ns-serif;font-size:12pt;"><b>From: </b>"Murray S. Kucherawy" &lt;superuser@=
gmail.com&gt;<br><b>To: </b>"Franck Martin" &lt;franck@peachymango.org&gt;<=
br><b>Cc: </b>dmarc@ietf.org, "Scott Kitterman" &lt;sklist@kitterman.com&gt=
;<br><b>Sent: </b>Tuesday, December 23, 2014 11:20:30 PM<br><b>Subject: </b=
>Re: [dmarc-ietf] Jim Fenton's review of -04<br><div><br></div><div dir=3D"=
ltr">On Wed, Dec 24, 2014 at 2:13 AM, Franck Martin <span dir=3D"ltr">&lt;<=
a href=3D"mailto:franck@peachymango.org" target=3D"_blank">franck@peachyman=
go.org</a>&gt;</span> wrote:<div class=3D"gmail_extra"><div class=3D"gmail_=
quote"><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-=
left:1px #ccc solid;padding-left:1ex"><div><div style=3D"font-family:arial,=
helvetica,sans-serif;font-size:12pt;color:#000000"><div>I think we should r=
ecommend something here, not sure if it needs to be normative. We do say to=
 ignore the SPF policy when p!=3Dnone, though I think we can be normative o=
n the lower layers. I see 2 options here:<br></div><div>1)tempfail the mess=
age is either SPF and DKIM have a tempfail status<br></div><div>2)tempfail =
the message if both SPF and DKIM have a tempfail status<br></div><div><br><=
/div><div>1) is my preferred and is aggressive, therefore not sure people w=
ill like it. I'll settle for 2)<br></div><div><br></div><div>As explained i=
n another post, I'm worried I can run a DNS attack (or just a self inflicte=
d DNS bad config) and get DMARC to reject emails it should have accepted (h=
as the DMARC policy in cache, but cannot assert SPF and DKIM).<br></div><di=
v><br></div></div></div></blockquote></div><br></div><div class=3D"gmail_ex=
tra">I think it's reasonably clear from 5.6.3 that the "fail open" choice i=
s possibly dangerous, as is anything that fails open.<br><div><br></div></d=
iv><div class=3D"gmail_extra">But more importantly, I'm also worried about =
making a normative decision now about something we deliberately haven't spe=
cified up to this point for whatever reason.&nbsp; We are supposed to be do=
cumenting current practice with this effort, not establishing something new=
.<br><div><br></div>Might this something best left for the standards track =
WG effort?<br><div><br></div></div></div></blockquote><div>Fair enough, but=
 curious about standard practice. For instance what openDMARC do? and other=
s?<br></div><div><br></div><div>I think DMARC got us to be "stricter" and l=
ess "lenient" with email.<br></div><div><br></div></div></body></html>
------=_Part_45679_832768806.1419406837912--


From nobody Tue Dec 23 23:46:11 2014
Return-Path: <superuser@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 87C291ACD52 for <dmarc@ietfa.amsl.com>; Tue, 23 Dec 2014 23:46:09 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id y685IoAONivG for <dmarc@ietfa.amsl.com>; Tue, 23 Dec 2014 23:46:07 -0800 (PST)
Received: from mail-wi0-x22e.google.com (mail-wi0-x22e.google.com [IPv6:2a00:1450:400c:c05::22e]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 401261ACD50 for <dmarc@ietf.org>; Tue, 23 Dec 2014 23:46:07 -0800 (PST)
Received: by mail-wi0-f174.google.com with SMTP id h11so12810093wiw.7 for <dmarc@ietf.org>; Tue, 23 Dec 2014 23:46:06 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:date:message-id:subject:from:to:content-type; bh=j8Ttck6vOCWGcvoKVpNaVyt61yXu+rsIrDvh1t5g7F8=; b=a2vkfywLUZPrJLP92suRE7Y3ailaJ9VTlDbMvX0h8qUuKItiju/ORbdzQt1c/HP7B/ FFy0QJJ1gEHK+OMMIWd4pyYf9uivBU3fhvw6TinjmY90JyoyeXzGH2u+xYdfncPv2h7z PCuRj1h3nmIHT7JXz09ERRw1EWccINduWDwOP6iWWjZPzPAtqSIT4Uv6IHvmC1CuFv1m 2hdlTM8jPs1bEDSvipn26fyjTVBGhsQxXtWzzvMf9fawhatoPqd1CxmDrRxJSarnY83B WJ1k5xh6EfGzbH2wkLpf6XGcr3iNDDfiw+aT1xdW4cESV1Nm9SrlPXVi+RJ/Jyv8n4Ee OEPg==
MIME-Version: 1.0
X-Received: by 10.181.13.242 with SMTP id fb18mr49052320wid.1.1419407166048; Tue, 23 Dec 2014 23:46:06 -0800 (PST)
Received: by 10.27.204.198 with HTTP; Tue, 23 Dec 2014 23:46:05 -0800 (PST)
Date: Wed, 24 Dec 2014 02:46:05 -0500
Message-ID: <CAL0qLwa2XdTN19jYNjp72UwEFtVn3nM7nKMpomtw7ARq43qhVQ@mail.gmail.com>
From: "Murray S. Kucherawy" <superuser@gmail.com>
To: "dmarc@ietf.org" <dmarc@ietf.org>
Content-Type: multipart/alternative; boundary=f46d043c05c4ec9134050af17b51
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/qsPrSwsWA7U0g32AbM3s8uS0nC4
Subject: [dmarc-ietf] draft-kucherawy-dmarc-base
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Dec 2014 07:46:09 -0000

--f46d043c05c4ec9134050af17b51
Content-Type: text/plain; charset=UTF-8

Colleagues,

I'm now completely caught up (as far as I can tell) on addressing feedback
about the DMARC base draft that's going through the ISE process.

As before, I'm resisting changes that add or change anything normative.
I'm going only for things that clarify text, increase the accurate
reflection of current practice, or help us to avoid IESG conflict review
issues.  Please let me know if I've missed anything that fits in one of
those categories.  Otherwise, -09 will go up soon including all of the
changes that seem to fit within those boundaries.

The planned diff to -08, which will become -09, is here:
http://www.blackops.org/~msk/dmarc/diff.html

Anything outside of those is open fodder for future working group
discussion of a standards track version.

-MSK

--f46d043c05c4ec9134050af17b51
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div><div><div>Colleagues,<br><br>I&#39;m now completely c=
aught up (as far as I can tell) on addressing feedback about the DMARC base=
 draft that&#39;s going through the ISE process.<br><br>As before, I&#39;m =
resisting changes that add or change anything normative.=C2=A0 I&#39;m goin=
g only for things that clarify text, increase the accurate reflection of cu=
rrent practice, or help us to avoid IESG conflict review issues.=C2=A0 Plea=
se let me know if I&#39;ve missed anything that fits in one of those catego=
ries.=C2=A0 Otherwise, -09 will go up soon including all of the changes tha=
t seem to fit within those boundaries.<br><br></div><div>The planned diff t=
o -08, which will become -09, is here:<br><a href=3D"http://www.blackops.or=
g/~msk/dmarc/diff.html">http://www.blackops.org/~msk/dmarc/diff.html</a><br=
></div></div><br>Anything outside of those is open fodder for future workin=
g group discussion of a standards track version.<br><br></div>-MSK<br></div=
>

--f46d043c05c4ec9134050af17b51--


From nobody Tue Dec 23 23:55:07 2014
Return-Path: <superuser@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CB8221ACD53 for <dmarc@ietfa.amsl.com>; Tue, 23 Dec 2014 23:55:03 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cZ08BeciEDOP for <dmarc@ietfa.amsl.com>; Tue, 23 Dec 2014 23:55:01 -0800 (PST)
Received: from mail-wi0-x22b.google.com (mail-wi0-x22b.google.com [IPv6:2a00:1450:400c:c05::22b]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BCAB81ACD50 for <dmarc@ietf.org>; Tue, 23 Dec 2014 23:55:00 -0800 (PST)
Received: by mail-wi0-f171.google.com with SMTP id bs8so12912410wib.10 for <dmarc@ietf.org>; Tue, 23 Dec 2014 23:54:59 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=H4GVWF39t/fgC4P6hYrvTkmma/vsoGf89EZ6riVjbqk=; b=EsLwpgM6HaE2iWhfLCDY+qF4KCiGBUsOpioxqHi4IoJSOsw7GFeFAkUVwhNTYegWs/ siySmAgdCbWWi/C/8NH7HikMXrG2DdyW7EjnqDJNbxpBkJ564Wn6vE5wbMZJEE9uCe45 vuXyF22VqXGJTWyW/fevbj7LwO8lZ95rcT7YnN6IJJpBrTN+5pB7HIB8cy2X8NOIWpJP ejMxIzydsMBL+HZ8+DyyUqWUzpIYNEZPDFG88xVY9Cryc6T/DEM6a2WbEvknpqlVHB2z kxM2EAeH3J3G5/I4D4VDIL8O4GqLwxHnibTCgsRt5VA2Zj9DErOn2ZS+ORISu1IDA9ex 6PrQ==
MIME-Version: 1.0
X-Received: by 10.194.200.234 with SMTP id jv10mr61187260wjc.110.1419407699572;  Tue, 23 Dec 2014 23:54:59 -0800 (PST)
Received: by 10.27.204.198 with HTTP; Tue, 23 Dec 2014 23:54:59 -0800 (PST)
In-Reply-To: <1194394943.45680.1419406837913.JavaMail.zimbra@peachymango.org>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <6858606.AfKicQ9CJZ@kitterman-optiplex-9020m> <CAL0qLwZeFbZ0pDCDNdpn7Xx_4m6DJ+eeTgwYMSFgJOX0ZiBBWg@mail.gmail.com> <WM!f44f5f14da590ead690430992af0de0e0b9ac1ac0002cda3e42d5aea3315d874527c350daf4494220eb86b4d9d9db2f9!@asav-2.01.com> <1712480034.45611.1419405204864.JavaMail.zimbra@peachymango.org> <CAL0qLwauU9Eu_JNFiumpTwi=YvSysBZ5cVD93cYF46w1z+fFKA@mail.gmail.com> <WM!9095b2c56f52ed2e4cd82de82ff9f481d4d5b92ae96fc875180d1651fad8ff0949fa8ff805810787c119071229e4fff8!@asav-2.01.com> <1194394943.45680.1419406837913.JavaMail.zimbra@peachymango.org>
Date: Wed, 24 Dec 2014 02:54:59 -0500
Message-ID: <CAL0qLwbAu6vY9xbb6ptkP_YGgMnfqkSUuuNLDhW6uA-5rVhmuA@mail.gmail.com>
From: "Murray S. Kucherawy" <superuser@gmail.com>
To: Franck Martin <franck@peachymango.org>
Content-Type: multipart/alternative; boundary=047d7bb70bb2b97d5c050af19b36
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/OeBdG4qVKureOTYYBS8xg-Q5kKU
Cc: "dmarc@ietf.org" <dmarc@ietf.org>, Scott Kitterman <sklist@kitterman.com>
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Dec 2014 07:55:04 -0000

--047d7bb70bb2b97d5c050af19b36
Content-Type: text/plain; charset=UTF-8

On Wed, Dec 24, 2014 at 2:40 AM, Franck Martin <franck@peachymango.org>
wrote:

> ------------------------------
>
> *From: *"Murray S. Kucherawy" <superuser@gmail.com>
> *To: *"Franck Martin" <franck@peachymango.org>
> *Cc: *dmarc@ietf.org, "Scott Kitterman" <sklist@kitterman.com>
> *Sent: *Tuesday, December 23, 2014 11:20:30 PM
> *Subject: *Re: [dmarc-ietf] Jim Fenton's review of -04
>
> On Wed, Dec 24, 2014 at 2:13 AM, Franck Martin <franck@peachymango.org>
> wrote:
>
>> I think we should recommend something here, not sure if it needs to be
>> normative. We do say to ignore the SPF policy when p!=none, though I think
>> we can be normative on the lower layers. I see 2 options here:
>> 1)tempfail the message is either SPF and DKIM have a tempfail status
>> 2)tempfail the message if both SPF and DKIM have a tempfail status
>>
>> 1) is my preferred and is aggressive, therefore not sure people will like
>> it. I'll settle for 2)
>>
>> As explained in another post, I'm worried I can run a DNS attack (or just
>> a self inflicted DNS bad config) and get DMARC to reject emails it should
>> have accepted (has the DMARC policy in cache, but cannot assert SPF and
>> DKIM).
>>
>>
> I think it's reasonably clear from 5.6.3 that the "fail open" choice is
> possibly dangerous, as is anything that fails open.
>
> But more importantly, I'm also worried about making a normative decision
> now about something we deliberately haven't specified up to this point for
> whatever reason.  We are supposed to be documenting current practice with
> this effort, not establishing something new.
>
> Might this something best left for the standards track WG effort?
>
> Fair enough, but curious about standard practice. For instance what
> openDMARC do? and others?
>
> I think DMARC got us to be "stricter" and less "lenient" with email.
>
>
OpenDMARC gets the message only after OpenDKIM is done with it, so if
OpenDKIM temp-fails, OpenDMARC never even sees it.  Thus, the case we're
concerned about here can't ever happen.

-MSK

--047d7bb70bb2b97d5c050af19b36
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">On Wed, Dec 24, 2014 at 2:40 AM, Franck Martin <span dir=
=3D"ltr">&lt;<a href=3D"mailto:franck@peachymango.org" target=3D"_blank">fr=
anck@peachymango.org</a>&gt;</span> wrote:<br><div class=3D"gmail_extra"><d=
iv class=3D"gmail_quote"><blockquote class=3D"gmail_quote" style=3D"margin:=
0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div><div style=3D"=
font-family:arial,helvetica,sans-serif;font-size:12pt;color:#000000"><hr><b=
lockquote style=3D"border-left:2px solid #1010ff;margin-left:5px;padding-le=
ft:5px;color:#000;font-weight:normal;font-style:normal;text-decoration:none=
;font-family:Helvetica,Arial,sans-serif;font-size:12pt"><span class=3D""><b=
>From: </b>&quot;Murray S. Kucherawy&quot; &lt;<a href=3D"mailto:superuser@=
gmail.com" target=3D"_blank">superuser@gmail.com</a>&gt;<br></span><b>To: <=
/b>&quot;Franck Martin&quot; &lt;<a href=3D"mailto:franck@peachymango.org" =
target=3D"_blank">franck@peachymango.org</a>&gt;<br><b>Cc: </b><a href=3D"m=
ailto:dmarc@ietf.org" target=3D"_blank">dmarc@ietf.org</a>, &quot;Scott Kit=
terman&quot; &lt;<a href=3D"mailto:sklist@kitterman.com" target=3D"_blank">=
sklist@kitterman.com</a>&gt;<br><b>Sent: </b>Tuesday, December 23, 2014 11:=
20:30 PM<span class=3D""><br><b>Subject: </b>Re: [dmarc-ietf] Jim Fenton&#3=
9;s review of -04<br><div><br></div></span><div><div class=3D"h5"><div dir=
=3D"ltr">On Wed, Dec 24, 2014 at 2:13 AM, Franck Martin <span dir=3D"ltr">&=
lt;<a href=3D"mailto:franck@peachymango.org" target=3D"_blank">franck@peach=
ymango.org</a>&gt;</span> wrote:<div class=3D"gmail_extra"><div class=3D"gm=
ail_quote"><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;bor=
der-left:1px #ccc solid;padding-left:1ex"><div><div style=3D"font-family:ar=
ial,helvetica,sans-serif;font-size:12pt;color:#000000"><div>I think we shou=
ld recommend something here, not sure if it needs to be normative. We do sa=
y to ignore the SPF policy when p!=3Dnone, though I think we can be normati=
ve on the lower layers. I see 2 options here:<br></div><div>1)tempfail the =
message is either SPF and DKIM have a tempfail status<br></div><div>2)tempf=
ail the message if both SPF and DKIM have a tempfail status<br></div><div><=
br></div><div>1) is my preferred and is aggressive, therefore not sure peop=
le will like it. I&#39;ll settle for 2)<br></div><div><br></div><div>As exp=
lained in another post, I&#39;m worried I can run a DNS attack (or just a s=
elf inflicted DNS bad config) and get DMARC to reject emails it should have=
 accepted (has the DMARC policy in cache, but cannot assert SPF and DKIM).<=
br></div><div><br></div></div></div></blockquote></div><br></div><div class=
=3D"gmail_extra">I think it&#39;s reasonably clear from 5.6.3 that the &quo=
t;fail open&quot; choice is possibly dangerous, as is anything that fails o=
pen.<br><div><br></div></div><div class=3D"gmail_extra">But more importantl=
y, I&#39;m also worried about making a normative decision now about somethi=
ng we deliberately haven&#39;t specified up to this point for whatever reas=
on.=C2=A0 We are supposed to be documenting current practice with this effo=
rt, not establishing something new.<br><div><br></div>Might this something =
best left for the standards track WG effort?<br><div><br></div></div></div>=
</div></div></blockquote><div>Fair enough, but curious about standard pract=
ice. For instance what openDMARC do? and others?<br></div><div><br></div><d=
iv>I think DMARC got us to be &quot;stricter&quot; and less &quot;lenient&q=
uot; with email.<br></div><div><br></div></div></div></blockquote></div><br=
></div><div class=3D"gmail_extra">OpenDMARC gets the message only after Ope=
nDKIM is done with it, so if OpenDKIM temp-fails, OpenDMARC never even sees=
 it.=C2=A0 Thus, the case we&#39;re concerned about here can&#39;t ever hap=
pen.<br><br>-MSK<br></div></div>

--047d7bb70bb2b97d5c050af19b36--


From nobody Wed Dec 24 00:55:56 2014
Return-Path: <sklist@kitterman.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5C1B41ACDA7 for <dmarc@ietfa.amsl.com>; Wed, 24 Dec 2014 00:55:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.002
X-Spam-Level: 
X-Spam-Status: No, score=-2.002 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vZyuafaYaFpT for <dmarc@ietfa.amsl.com>; Wed, 24 Dec 2014 00:55:52 -0800 (PST)
Received: from mailout03.controlledmail.com (mailout03.controlledmail.com [208.43.65.50]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D31D61A1A1F for <dmarc@ietf.org>; Wed, 24 Dec 2014 00:55:52 -0800 (PST)
Received: from [10.176.126.24] (100.sub-70-198-192.myvzw.com [70.198.192.100]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mailout03.controlledmail.com (Postfix) with ESMTPSA id 59CDDC40103; Wed, 24 Dec 2014 02:55:51 -0600 (CST)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=kitterman.com; s=201409; t=1419411351; bh=BDDQ98rXEaHKOiTX/D4LNVMmMFWRf3bPCv0rckpJXuE=; h=In-Reply-To:References:Subject:From:Date:To:From; b=iCBab0tfmlg8Uh7tGUveqrV8/NzJJFqq/S4WJeIYxE4disNAavAqo/R7ZSBHB1Qed CX5Wrk1uktPa3rD0dxZ4cCIZAbrfh5cwZ4vf33Q1QxVyGlRSXiLjJ+gDAbDrS8cOsc 3ckkPt2W9vA5Oc77CN6aEBSk7vdKik55T08Bk9Tk=
User-Agent: K-9 Mail for Android
In-Reply-To: <CAL0qLwbKy8Uxqq1LcsQP68q_=vmcuqc1sySgjUJU2kBBvsonWQ@mail.gmail.com>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <54986CCC.70200@sonnection.nl> <54986DF1.9060807@dcrocker.net> <7243484.JQFTys4I1u@kitterman-optiplex-9020m> <CAL0qLwbKy8Uxqq1LcsQP68q_=vmcuqc1sySgjUJU2kBBvsonWQ@mail.gmail.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
Content-Type: text/plain; charset=UTF-8
From: Scott Kitterman <sklist@kitterman.com>
Date: Wed, 24 Dec 2014 03:50:27 -0500
To: "dmarc@ietf.org" <dmarc@ietf.org>
Message-ID: <5B5E1BA1-1F6B-444B-A034-08ADA178D589@kitterman.com>
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/0hNFeHcGIkDENLcQm5yhAHwlfE4
Subject: Re: [dmarc-ietf] DMARC and TEMP errors was: Re: Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Dec 2014 08:55:54 -0000

On December 24, 2014 12:49:04 AM EST, "Murray S. Kucherawy" <superuser@gmail.com> wrote:
>On Mon, Dec 22, 2014 at 3:18 PM, Scott Kitterman <sklist@kitterman.com>
>wrote:
>
>>
>> As I read -08 what to do in that case is undefined.  There's a
>dangling
>> pointer
>> to 5.6.3.  It's dangling because nothing in that section addresses
>the
>> question of how to handle DKIM/SPF temporary errors.
>>
>>
>5.6.3's final paragraph makes it clear that the action taken is at the
>discretion of the mail receiver, and gives two examples of
>non-destructive
>ways to handle that case.  Do we need to say more than that?
>
>-MSK

No.  That's specifically about DNS errors related to DMARC record retrieval.  My issue is what to after successfully retrieving the DMARC record if one of SPF/DKIM doesn't pass and align (DMARC fail) and the other of SPF/DKIM returns a DNS error. 

5.6.2 appears to me to promise that is explained in 5.6.3 and it's not. 

Personally, I think rejecting mail based on temporary DNS errors is something the draft should discourage. 

Scott K


From nobody Wed Dec 24 01:06:27 2014
Return-Path: <sklist@kitterman.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DD7DE1AD008 for <dmarc@ietfa.amsl.com>; Wed, 24 Dec 2014 01:06:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.002
X-Spam-Level: 
X-Spam-Status: No, score=-2.002 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id s7H1lIPQ6Qfz for <dmarc@ietfa.amsl.com>; Wed, 24 Dec 2014 01:06:23 -0800 (PST)
Received: from mailout03.controlledmail.com (mailout03.controlledmail.com [208.43.65.50]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D84F31A6F47 for <dmarc@ietf.org>; Wed, 24 Dec 2014 01:06:23 -0800 (PST)
Received: from [10.176.126.24] (100.sub-70-198-192.myvzw.com [70.198.192.100]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mailout03.controlledmail.com (Postfix) with ESMTPSA id 9E19FC40103; Wed, 24 Dec 2014 03:06:21 -0600 (CST)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=kitterman.com; s=201409; t=1419411982; bh=2Yv+wzfmOXzvBM97qUa3BdkfX1HiIt0f5sXcuB6syQ8=; h=In-Reply-To:References:Subject:From:Date:To:From; b=MzPnzI7Avr71EhmXhIMOgKcPVN2wEgJecIzTwLx+biNIofOL31I0Y26GNblEi2kQ0 MbM+/Dv6fH3wQwEOD4mJAIKgBLi1bh/YRZOLpPzOeGox7J5ywBhPWks5phPMGyhfq5 dAzd2oNFvePBQJVcHCeAUiit3QmywFe7NUttSqss=
User-Agent: K-9 Mail for Android
In-Reply-To: <CAL0qLwZeFbZ0pDCDNdpn7Xx_4m6DJ+eeTgwYMSFgJOX0ZiBBWg@mail.gmail.com>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <6858606.AfKicQ9CJZ@kitterman-optiplex-9020m> <CAL0qLwZeFbZ0pDCDNdpn7Xx_4m6DJ+eeTgwYMSFgJOX0ZiBBWg@mail.gmail.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
Content-Type: text/plain; charset=UTF-8
From: Scott Kitterman <sklist@kitterman.com>
Date: Wed, 24 Dec 2014 04:04:51 -0500
To: "dmarc@ietf.org" <dmarc@ietf.org>
Message-ID: <43288BDA-4BDD-4A18-A6DD-232BCFFDEB43@kitterman.com>
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/G6sulMe5sDJoayVNWlKoFrBxW98
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Dec 2014 09:06:26 -0000

On December 24, 2014 1:32:44 AM EST, "Murray S. Kucherawy" <superuser@gmail.com> wrote:
>On Mon, Dec 22, 2014 at 10:44 AM, Scott Kitterman
><sklist@kitterman.com>
>wrote:
>
>> There was a recent thread on postfix-users about DMARC rejections
>when
>> there
>> are DNS errors that caused me to review -08 to see what it says on
>the
>> matter.
>>
>> At the end of section 5.6.2, it says:
>>
>>    Handling of messages for which SPF and/or DKIM evaluation
>encounters
>>    a DNS error is left to the discretion of the Mail Receiver. 
>Further
>>    discussion is available in Section 5.6.3.
>>
>> My reading of 5.6.3 though is that it only discusses DNS errors in
>the
>> context
>> of failing to retrieve the DMARC record.  Any discussion about
>handling DNS
>> errors for SPF/DKIM seems to be missing.
>>
>
>Yes, DMARC punts on what to do when SPF or DKIM encounter transient
>failures.  I imagine that's because those modules would arrange to
>temp-fail a message that has that problem.  I suppose my experience is
>that
>messages don't even get to the point of DMARC evaluation when that
>happens,
>because the message has already been temp-failed.
>
>If you think about DKIM and SPF as being part of a layer below DMARC,
>then
>I'm not sure it's wise of us to be making any kind of normative
>statement
>about what to do when the lower layers fail.
>
>What do you suggest?
>
>-MSK

The draft strongly encourages DMARC implementers to ignore SPF policy, so I don't think assuming messages will be deferred due only due to SPF or DKIM results indicating a temporary DNS error is appropriate. 

I think that in the case of a temporary DNS error in one of the lower level protocols, insufficient inputs are available to conclude a message has failed DMARC tests. 

Receivers can either ignore DMARC for this message due to incomplete evaluation or they can defer the message in the hope that the temporary error will be resolved when the message is retried.  Receivers MUST NOT apply DMARC policy and reject or quarantine because the DMARC evaluation is incomplete. 

Scott K


From nobody Wed Dec 24 01:11:42 2014
Return-Path: <sklist@kitterman.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 539F61AD008 for <dmarc@ietfa.amsl.com>; Wed, 24 Dec 2014 01:11:38 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.002
X-Spam-Level: 
X-Spam-Status: No, score=-2.002 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NvMG1Kw-t05o for <dmarc@ietfa.amsl.com>; Wed, 24 Dec 2014 01:11:36 -0800 (PST)
Received: from mailout03.controlledmail.com (mailout03.controlledmail.com [208.43.65.50]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 967B21AD005 for <dmarc@ietf.org>; Wed, 24 Dec 2014 01:11:36 -0800 (PST)
Received: from [10.176.126.24] (100.sub-70-198-192.myvzw.com [70.198.192.100]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mailout03.controlledmail.com (Postfix) with ESMTPSA id 5F0C7C40103; Wed, 24 Dec 2014 03:11:35 -0600 (CST)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=kitterman.com; s=201409; t=1419412295; bh=TRG+JxEa3qYMvqd5UNmarmexCs0dxr8cqSDsM776oXA=; h=In-Reply-To:References:Subject:From:Date:To:From; b=HD1d36PUeE3rHSclrNUnrC/V341/f6+9FU4erg/CzLDseTIDbfhpn3e+JBTRnJi1Y zfAXOF0OM7ajkhTzdKjOWaenaIv/98vP+pceeCYLSPeYyOFWgwAcWKrOhy7ZCJ//VX l3BTGliF9Ni8diFQuKEsRzmou471yRqSmp0iVreU=
User-Agent: K-9 Mail for Android
In-Reply-To: <CAL0qLwauU9Eu_JNFiumpTwi=YvSysBZ5cVD93cYF46w1z+fFKA@mail.gmail.com>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <6858606.AfKicQ9CJZ@kitterman-optiplex-9020m> <CAL0qLwZeFbZ0pDCDNdpn7Xx_4m6DJ+eeTgwYMSFgJOX0ZiBBWg@mail.gmail.com> <WM!f44f5f14da590ead690430992af0de0e0b9ac1ac0002cda3e42d5aea3315d874527c350daf4494220eb86b4d9d9db2f9!@asav-2.01.com> <1712480034.45611.1419405204864.JavaMail.zimbra@peachymango.org> <CAL0qLwauU9Eu_JNFiumpTwi=YvSysBZ5cVD93cYF46w1z+fFKA@mail.gmail.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
Content-Type: text/plain; charset=UTF-8
From: Scott Kitterman <sklist@kitterman.com>
Date: Wed, 24 Dec 2014 04:09:49 -0500
To: "dmarc@ietf.org" <dmarc@ietf.org>
Message-ID: <62849448-BFA5-49C0-A2B6-7A4B5CC34F2C@kitterman.com>
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/AedZuRRr6Rl9o0tjbnpYUFlc2Ck
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Dec 2014 09:11:38 -0000

On December 24, 2014 2:20:30 AM EST, "Murray S. Kucherawy" <superuser@gmail.com> wrote:
>On Wed, Dec 24, 2014 at 2:13 AM, Franck Martin <franck@peachymango.org>
>wrote:
>
>> I think we should recommend something here, not sure if it needs to
>be
>> normative. We do say to ignore the SPF policy when p!=none, though I
>think
>> we can be normative on the lower layers. I see 2 options here:
>> 1)tempfail the message is either SPF and DKIM have a tempfail status
>> 2)tempfail the message if both SPF and DKIM have a tempfail status
>>
>> 1) is my preferred and is aggressive, therefore not sure people will
>like
>> it. I'll settle for 2)
>>
>> As explained in another post, I'm worried I can run a DNS attack (or
>just
>> a self inflicted DNS bad config) and get DMARC to reject emails it
>should
>> have accepted (has the DMARC policy in cache, but cannot assert SPF
>and
>> DKIM).
>>
>>
>I think it's reasonably clear from 5.6.3 that the "fail open" choice is
>possibly dangerous, as is anything that fails open.
>
>But more importantly, I'm also worried about making a normative
>decision
>now about something we deliberately haven't specified up to this point
>for
>whatever reason.  We are supposed to be documenting current practice
>with
>this effort, not establishing something new.
>
>Might this something best left for the standards track WG effort?

5.6.2 promises 5.6.3 addresses the question and it doesn't. At the very least, 5.6.2 should be fixed not to over promise what 5.6.3 will provide. 

I do think it's better to answer it now.  I'm not sure when or if the WG will address missing chunks of protocol definition.  The charter pretty well assumes there aren't any. 

Scott K



From nobody Wed Dec 24 07:23:04 2014
Return-Path: <dhc@dcrocker.net>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A11E41A8A7F for <dmarc@ietfa.amsl.com>; Wed, 24 Dec 2014 07:23:02 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id U_bm0DtMzWvh for <dmarc@ietfa.amsl.com>; Wed, 24 Dec 2014 07:23:01 -0800 (PST)
Received: from sbh17.songbird.com (sbh17.songbird.com [72.52.113.17]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2399D1A8A7A for <dmarc@ietf.org>; Wed, 24 Dec 2014 07:23:01 -0800 (PST)
Received: from [192.168.1.66] (76-218-8-156.lightspeed.sntcca.sbcglobal.net [76.218.8.156]) (authenticated bits=0) by sbh17.songbird.com (8.13.8/8.13.8) with ESMTP id sBOFMtU5009704 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT); Wed, 24 Dec 2014 07:22:59 -0800
Message-ID: <549ADA41.40005@dcrocker.net>
Date: Wed, 24 Dec 2014 07:22:41 -0800
From: Dave Crocker <dhc@dcrocker.net>
Organization: Brandenburg InternetWorking
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Thunderbird/31.3.0
MIME-Version: 1.0
To: "Murray S. Kucherawy" <superuser@gmail.com>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <5494A6F5.5020906@dcrocker.net> <CAL0qLwZthPfZ-22=yi2rrp_GKXK3igc=M8LhftxMx7GRUde7Dw@mail.gmail.com>
In-Reply-To: <CAL0qLwZthPfZ-22=yi2rrp_GKXK3igc=M8LhftxMx7GRUde7Dw@mail.gmail.com>
Content-Type: text/plain; charset=windows-1252
Content-Transfer-Encoding: 8bit
X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.0 (sbh17.songbird.com [72.52.113.66]); Wed, 24 Dec 2014 07:22:59 -0800 (PST)
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/Ev7c-2G8x73qnINRiTwX13wI5cE
Cc: "dmarc@ietf.org" <dmarc@ietf.org>
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: dcrocker@bbiw.net
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Dec 2014 15:23:02 -0000

On 12/23/2014 10:11 PM, Murray S. Kucherawy wrote:
>     -08 text says:
> 
>          "If the RFC5322.From domain does not exist in the DNS, Mail
>        Receivers
>        SHOULD direct the receiving SMTP server to reject the message.  The
>        choice of mechanism for such rejection and the implications of those
>        choices are discussed in Section 9.3."
> 
>     I suggest removing it.  Although a common anti-abuse mechanism, it's out
>     of scope for DMARC.
> 
> 
> I disagree.  DMARC operators all seem to apply this practice, so it's
> correct to say that if you play this game, you reject mail from
> non-existent domains.  Essentially in this way DMARC is a profile of
> RFC5321/RFC5322, which is perfectly acceptable.  We are not updating
> those standards here, merely profiling them.


The fact that its use happens to correlate with DMARC use is a
distraction.  For example, there are plenty of operators who use apply
this check but do not use DMARC.  If the test is documented in a
specification, it should be in /one/ specification.  Putting it into the
DMARC spec means it has to be documented somewhere else, for the folk
who don't use DMARC.

Broadly, there are all sorts of things that DMARC operators commonly do,
but that are not appropriate to document in the DMARC specification.

DMARC concerns the domain name in the From: field and finding that it
has a DMARC record associated with it.  If there is no record associated
with the domain name, then it is not participating in DMARC.

There are other places to document other, common anti-abuse practices.

The check for an MX is completely out of scope for the DMARC spec.

d/

-- 
Dave Crocker
Brandenburg InternetWorking
bbiw.net


From nobody Wed Dec 24 07:43:44 2014
Return-Path: <superuser@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 405CC1A8A86 for <dmarc@ietfa.amsl.com>; Wed, 24 Dec 2014 07:43:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id K-IURcTM2gc0 for <dmarc@ietfa.amsl.com>; Wed, 24 Dec 2014 07:43:41 -0800 (PST)
Received: from mail-wg0-x230.google.com (mail-wg0-x230.google.com [IPv6:2a00:1450:400c:c00::230]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 90AE01A8A85 for <dmarc@ietf.org>; Wed, 24 Dec 2014 07:43:41 -0800 (PST)
Received: by mail-wg0-f48.google.com with SMTP id y19so11498656wgg.21 for <dmarc@ietf.org>; Wed, 24 Dec 2014 07:43:40 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=izxEKZ+YX8ebxf3ew40wEhjN5SELsZIEjxe+kO10UeI=; b=WLti+kVHJDVbtIDW/Sz9Q6I1L99dvf4/qF6OPCqpVcWEzYNKOuzjwBhOF8BkW/wiJg L5j4WO9DWguHtPDS/C/LKEf7VRgEUiY1E7/XZB1F4XLoQhnKwFNt0z8tMWnVkv6NghG1 91R9NLTiQHgYSDDGKqL4VI3MclRakLVp/82hQNrWtg7kG45JJVysTp2TfppdESvcPKci LBAfOcEfjZC8woWGS93H7u6kMCv90WvTHa8mK9rDPkCVWzp6IgEXxpcVuvQOiCIgu/1u Y8ceYz719X4B+9EhiDoFNXp8q663NY3dehZACpBNYZ11ODBF86LL02/omTzemfgQ7Raw Q5EA==
MIME-Version: 1.0
X-Received: by 10.194.86.135 with SMTP id p7mr64369059wjz.89.1419435820245; Wed, 24 Dec 2014 07:43:40 -0800 (PST)
Received: by 10.27.204.198 with HTTP; Wed, 24 Dec 2014 07:43:40 -0800 (PST)
In-Reply-To: <62849448-BFA5-49C0-A2B6-7A4B5CC34F2C@kitterman.com>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <6858606.AfKicQ9CJZ@kitterman-optiplex-9020m> <CAL0qLwZeFbZ0pDCDNdpn7Xx_4m6DJ+eeTgwYMSFgJOX0ZiBBWg@mail.gmail.com> <WM!f44f5f14da590ead690430992af0de0e0b9ac1ac0002cda3e42d5aea3315d874527c350daf4494220eb86b4d9d9db2f9!@asav-2.01.com> <1712480034.45611.1419405204864.JavaMail.zimbra@peachymango.org> <CAL0qLwauU9Eu_JNFiumpTwi=YvSysBZ5cVD93cYF46w1z+fFKA@mail.gmail.com> <62849448-BFA5-49C0-A2B6-7A4B5CC34F2C@kitterman.com>
Date: Wed, 24 Dec 2014 10:43:40 -0500
Message-ID: <CAL0qLwb8Yac-Nditm+dHbJ4OyfHDAPFYtm7LXv0tD=rQ+aiHQA@mail.gmail.com>
From: "Murray S. Kucherawy" <superuser@gmail.com>
To: Scott Kitterman <sklist@kitterman.com>
Content-Type: multipart/alternative; boundary=089e0102e498d8e800050af827fe
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/Zp5g7kGGVu5qpR3VcPlGbz1exZU
Cc: "dmarc@ietf.org" <dmarc@ietf.org>
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Dec 2014 15:43:43 -0000

--089e0102e498d8e800050af827fe
Content-Type: text/plain; charset=UTF-8

On Wed, Dec 24, 2014 at 4:09 AM, Scott Kitterman <sklist@kitterman.com>
wrote:

> 5.6.2 promises 5.6.3 addresses the question and it doesn't. At the very
> least, 5.6.2 should be fixed not to over promise what 5.6.3 will provide.
>

I'm not clear why you say "it doesn't".  5.6.3 describes two options for
handling a message when the query for the DMARC policy fails due to
transient DNS errors.  Is your issue that it doesn't prescribe one specific
action?

I also don't understand why you say the reference is dangling.  5.6.2 says
that transient DNS errors for SPF and DKIM can occur and says the handling
for that case is left to receiver discretion, but also points out that what
5.6.3 says can also be applied when that happens.

-MSK

--089e0102e498d8e800050af827fe
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">On Wed, Dec 24, 2014 at 4:09 AM, Scott Kitterman <span dir=
=3D"ltr">&lt;<a href=3D"mailto:sklist@kitterman.com" target=3D"_blank">skli=
st@kitterman.com</a>&gt;</span> wrote:<br><div class=3D"gmail_extra"><div c=
lass=3D"gmail_quote"><blockquote class=3D"gmail_quote" style=3D"margin:0 0 =
0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div class=3D"HOEnZb"><=
div class=3D"h5">5.6.2 promises 5.6.3 addresses the question and it doesn&#=
39;t. At the very least, 5.6.2 should be fixed not to over promise what 5.6=
.3 will provide.<br></div></div></blockquote><div><br></div><div>I&#39;m no=
t clear why you say &quot;it doesn&#39;t&quot;.=C2=A0 5.6.3 describes two o=
ptions for handling a message when the query for the DMARC policy fails due=
 to transient DNS errors.=C2=A0 Is your issue that it doesn&#39;t prescribe=
 one specific action?<br><br></div><div>I also don&#39;t understand why you=
 say the reference is dangling.=C2=A0 5.6.2 says that transient DNS errors =
for SPF and DKIM can occur and says the handling for that case is left to r=
eceiver discretion, but also points out that what 5.6.3 says can also be ap=
plied when that happens.<br><br></div><div>-MSK<br></div></div></div></div>

--089e0102e498d8e800050af827fe--


From nobody Wed Dec 24 07:46:49 2014
Return-Path: <superuser@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5072D1A8A8B for <dmarc@ietfa.amsl.com>; Wed, 24 Dec 2014 07:46:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FO-yvg6I8Iyc for <dmarc@ietfa.amsl.com>; Wed, 24 Dec 2014 07:46:44 -0800 (PST)
Received: from mail-wi0-x236.google.com (mail-wi0-x236.google.com [IPv6:2a00:1450:400c:c05::236]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5E6261A8A89 for <dmarc@ietf.org>; Wed, 24 Dec 2014 07:46:44 -0800 (PST)
Received: by mail-wi0-f182.google.com with SMTP id h11so13843233wiw.9 for <dmarc@ietf.org>; Wed, 24 Dec 2014 07:46:43 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=wux9cdS80EAMoiL4on6wwh6KXdTnfta3zVqACRzuo2Q=; b=JUeifnhGuShkxhD8+JMnNQoj+OlpoatlCJ7jfMyqyPs05s5hGozWQm6FtBEsxh0tDC USyT+JvLue+ePe3UROjabY93uYfvpLn6W+zRB7gSKCtMFVxvKsUmyDf3WIlt31MNEZxW /wZg1atIIbNKPehWh9HV5yTisp/Sda9WbRKJyZ4MMxx4sXsvNUgQvFXDUUfcOvYTLlw2 rfYtk2VIIYZvJFExckoq7CretCcm/c6e7PV6L3nKCmKmu4fq7VleiaS/CURw1vzR9A+6 ukgFvPbSZRsq99n/2eU1M3+wy1qyL65MLaKgMdEgeVFzIg76rAwK6lbrbKylQuJZWDCr RxyA==
MIME-Version: 1.0
X-Received: by 10.180.218.39 with SMTP id pd7mr53182851wic.21.1419436003047; Wed, 24 Dec 2014 07:46:43 -0800 (PST)
Received: by 10.27.204.198 with HTTP; Wed, 24 Dec 2014 07:46:42 -0800 (PST)
In-Reply-To: <43288BDA-4BDD-4A18-A6DD-232BCFFDEB43@kitterman.com>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <6858606.AfKicQ9CJZ@kitterman-optiplex-9020m> <CAL0qLwZeFbZ0pDCDNdpn7Xx_4m6DJ+eeTgwYMSFgJOX0ZiBBWg@mail.gmail.com> <43288BDA-4BDD-4A18-A6DD-232BCFFDEB43@kitterman.com>
Date: Wed, 24 Dec 2014 10:46:42 -0500
Message-ID: <CAL0qLwamiZa1xqO5Zg2q3=yih6g3voV-0AcNb3D5gB7hJ=9azA@mail.gmail.com>
From: "Murray S. Kucherawy" <superuser@gmail.com>
To: Scott Kitterman <sklist@kitterman.com>
Content-Type: multipart/alternative; boundary=001a1134cd58be40e1050af83209
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/xxOWuBZW3GxkebtiKiM3vaJVzk4
Cc: "dmarc@ietf.org" <dmarc@ietf.org>
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Dec 2014 15:46:46 -0000

--001a1134cd58be40e1050af83209
Content-Type: text/plain; charset=UTF-8

On Wed, Dec 24, 2014 at 4:04 AM, Scott Kitterman <sklist@kitterman.com>
wrote:

> The draft strongly encourages DMARC implementers to ignore SPF policy, so
> I don't think assuming messages will be deferred due only due to SPF or
> DKIM results indicating a temporary DNS error is appropriate.
>

If there's a transient DNS error getting the SPF policy, then there's no
SPF policy to be ignored.  That's quite a different situation.


> I think that in the case of a temporary DNS error in one of the lower
> level protocols, insufficient inputs are available to conclude a message
> has failed DMARC tests.
>

I agree.


> Receivers can either ignore DMARC for this message due to incomplete
> evaluation or they can defer the message in the hope that the temporary
> error will be resolved when the message is retried.  Receivers MUST NOT
> apply DMARC policy and reject or quarantine because the DMARC evaluation is
> incomplete.
>

Can you provide specific changes, with section numbers, that you'd like to
see applied to resolve this?

-MSK

--001a1134cd58be40e1050af83209
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">On Wed, Dec 24, 2014 at 4:04 AM, Scott Kitterman <span dir=
=3D"ltr">&lt;<a href=3D"mailto:sklist@kitterman.com" target=3D"_blank">skli=
st@kitterman.com</a>&gt;</span> wrote:<br><div class=3D"gmail_extra"><div c=
lass=3D"gmail_quote"><blockquote class=3D"gmail_quote" style=3D"margin:0 0 =
0 .8ex;border-left:1px #ccc solid;padding-left:1ex">The draft strongly enco=
urages DMARC implementers to ignore SPF policy, so I don&#39;t think assumi=
ng messages will be deferred due only due to SPF or DKIM results indicating=
 a temporary DNS error is appropriate.<br></blockquote><div><br></div><div>=
If there&#39;s a transient DNS error getting the SPF policy, then there&#39=
;s no SPF policy to be ignored.=C2=A0 That&#39;s quite a different situatio=
n.<br>=C2=A0<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0 0=
 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
I think that in the case of a temporary DNS error in one of the lower level=
 protocols, insufficient inputs are available to conclude a message has fai=
led DMARC tests.<br></blockquote><div><br></div><div>I agree.<br>=C2=A0<br>=
</div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-l=
eft:1px #ccc solid;padding-left:1ex">
Receivers can either ignore DMARC for this message due to incomplete evalua=
tion or they can defer the message in the hope that the temporary error wil=
l be resolved when the message is retried.=C2=A0 Receivers MUST NOT apply D=
MARC policy and reject or quarantine because the DMARC evaluation is incomp=
lete.<br></blockquote><div><br></div><div>Can you provide specific changes,=
 with section numbers, that you&#39;d like to see applied to resolve this?<=
br><br></div><div>-MSK<br></div></div></div></div>

--001a1134cd58be40e1050af83209--


From nobody Wed Dec 24 07:50:24 2014
Return-Path: <superuser@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 347881A8A82 for <dmarc@ietfa.amsl.com>; Wed, 24 Dec 2014 07:50:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vXXJdqELdHCg for <dmarc@ietfa.amsl.com>; Wed, 24 Dec 2014 07:50:18 -0800 (PST)
Received: from mail-wi0-x22e.google.com (mail-wi0-x22e.google.com [IPv6:2a00:1450:400c:c05::22e]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0939A1A8A83 for <dmarc@ietf.org>; Wed, 24 Dec 2014 07:50:18 -0800 (PST)
Received: by mail-wi0-f174.google.com with SMTP id h11so13799336wiw.7 for <dmarc@ietf.org>; Wed, 24 Dec 2014 07:50:16 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=MQGO9jNY60A4NlTXia0p40OeHK6uS31OSH0d7T7AGvg=; b=FK0cqxlz0xujyMtvqDCLEPGD7oOcaL/cGeAEBcCmuON3AQ8cX+3N8+ga9tPOpdVh6s lnqq276QsMT9ZK+ufehjw1jWygumE9cvmhWGkAmcSOUvO7O6IULzcjguc08mu5AEpo6Q Xlx0OicICJlKmdW43WLB2Beund1FnRAmX8S+jensEXYKhu0hDO5gb4IURMnxp+KkF8Qd MCmzKCHVpCHwYc0Lcwi9pDb2UwFsluXKNpeSMvwiVZQLyxlZp3g0i4yhkVNow3z6Npfn rqOfYX+lIxMwWdDnjL3S6llMYhwhoDWvudBhSmMeQjuueDWVjcjvRDZISAXu6didESrJ 2XCA==
MIME-Version: 1.0
X-Received: by 10.194.86.135 with SMTP id p7mr64419392wjz.89.1419436216862; Wed, 24 Dec 2014 07:50:16 -0800 (PST)
Received: by 10.27.204.198 with HTTP; Wed, 24 Dec 2014 07:50:16 -0800 (PST)
In-Reply-To: <549ADA41.40005@dcrocker.net>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <5494A6F5.5020906@dcrocker.net> <CAL0qLwZthPfZ-22=yi2rrp_GKXK3igc=M8LhftxMx7GRUde7Dw@mail.gmail.com> <549ADA41.40005@dcrocker.net>
Date: Wed, 24 Dec 2014 10:50:16 -0500
Message-ID: <CAL0qLwYVmDL7kCOTkeDk5pMYCA4-y2Bxyi+7F8GPjaxmxmS6Gw@mail.gmail.com>
From: "Murray S. Kucherawy" <superuser@gmail.com>
To: Dave Crocker <dcrocker@bbiw.net>
Content-Type: multipart/alternative; boundary=089e0102e4987ccdd6050af83f0e
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/Tqc088YS430ixgscChrG8f3WaVs
Cc: "dmarc@ietf.org" <dmarc@ietf.org>
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Dec 2014 15:50:22 -0000

--089e0102e4987ccdd6050af83f0e
Content-Type: text/plain; charset=UTF-8

On Wed, Dec 24, 2014 at 10:22 AM, Dave Crocker <dhc@dcrocker.net> wrote:

> > I disagree.  DMARC operators all seem to apply this practice, so it's
> > correct to say that if you play this game, you reject mail from
> > non-existent domains.  Essentially in this way DMARC is a profile of
> > RFC5321/RFC5322, which is perfectly acceptable.  We are not updating
> > those standards here, merely profiling them.
>
> The fact that its use happens to correlate with DMARC use is a
> distraction.  For example, there are plenty of operators who use apply
> this check but do not use DMARC.  If the test is documented in a
> specification, it should be in /one/ specification.  Putting it into the
> DMARC spec means it has to be documented somewhere else, for the folk
> who don't use DMARC.
>

This paragraph appears in the DMARC spec because the operators
participating all agreed that it should be part-and-parcel of this
operating profile of email.  It's not as happenstance as this sounds so
far; the very thrust of DMARC is to make the From: content believable, and
permitting a nonexistent domain name to make it to the inbox contradicts
that goal.

-MSK

--089e0102e4987ccdd6050af83f0e
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">On Wed, Dec 24, 2014 at 10:22 AM, Dave Crocker <span dir=
=3D"ltr">&lt;<a href=3D"mailto:dhc@dcrocker.net" target=3D"_blank">dhc@dcro=
cker.net</a>&gt;</span> wrote:<br><div class=3D"gmail_extra"><div class=3D"=
gmail_quote"><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;b=
order-left:1px #ccc solid;padding-left:1ex"><span class=3D"">&gt; I disagre=
e.=C2=A0 DMARC operators all seem to apply this practice, so it&#39;s<br>
&gt; correct to say that if you play this game, you reject mail from<br>
&gt; non-existent domains.=C2=A0 Essentially in this way DMARC is a profile=
 of<br>
&gt; RFC5321/RFC5322, which is perfectly acceptable.=C2=A0 We are not updat=
ing<br>
&gt; those standards here, merely profiling them.<br>
<br>
</span>The fact that its use happens to correlate with DMARC use is a<br>
distraction.=C2=A0 For example, there are plenty of operators who use apply=
<br>
this check but do not use DMARC.=C2=A0 If the test is documented in a<br>
specification, it should be in /one/ specification.=C2=A0 Putting it into t=
he<br>
DMARC spec means it has to be documented somewhere else, for the folk<br>
who don&#39;t use DMARC.<br></blockquote><div><br></div><div>This paragraph=
 appears in the DMARC spec because the operators participating all agreed t=
hat it should be part-and-parcel of this operating profile of email.=C2=A0 =
It&#39;s not as happenstance as this sounds so far; the very thrust of DMAR=
C is to make the From: content believable, and permitting a nonexistent dom=
ain name to make it to the inbox contradicts that goal.<br><br></div><div>-=
MSK</div></div><br></div></div>

--089e0102e4987ccdd6050af83f0e--


From nobody Wed Dec 24 08:17:21 2014
Return-Path: <franck@peachymango.org>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 23E0F1A8A89 for <dmarc@ietfa.amsl.com>; Wed, 24 Dec 2014 08:17:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level: 
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Vr__vzWQDPlF for <dmarc@ietfa.amsl.com>; Wed, 24 Dec 2014 08:17:18 -0800 (PST)
Received: from mx-out-1.zmailcloud.com (01.zmailcloud.com [192.198.85.104]) by ietfa.amsl.com (Postfix) with ESMTP id 64C441A8A8B for <dmarc@ietf.org>; Wed, 24 Dec 2014 08:17:18 -0800 (PST)
Received: from smtp.01.com (smtp.01.com [10.10.0.43]) by mx-out-1.zmailcloud.com (Postfix) with ESMTP id ED4235647DD; Wed, 24 Dec 2014 10:17:17 -0600 (CST)
Received: from localhost (localhost [127.0.0.1]) by smtp-out-1.01.com (Postfix) with ESMTP id B0694A033B; Wed, 24 Dec 2014 10:17:17 -0600 (CST)
X-Virus-Scanned: amavisd-new at smtp-out-1.01.com
Received: from smtp.01.com ([127.0.0.1]) by localhost (smtp-out-1.01.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JGJxgLXxBP-D; Wed, 24 Dec 2014 10:17:17 -0600 (CST)
Received: from smtp.01.com (localhost [127.0.0.1]) by smtp-out-1.01.com (Postfix) with ESMTP id D3A80A0372; Wed, 24 Dec 2014 10:17:14 -0600 (CST)
DKIM-Filter: OpenDKIM Filter v2.8.4 smtp-out-1.01.com D3A80A0372
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=peachymango.org; s=61F775A4-4A7F-11E4-A6BB-61E3068E35F6; t=1419437835; bh=7nFFd0/LRlh53nSdXIBu1FptjrT329e9Px2cUKMiWFA=; h=Date:From:To:Message-ID:Subject:MIME-Version:Content-Type; b=Hk3qsqTgx6sQ2P96LIfgXazIMNKRoJwyo70C5n5QC8AOkByVym7ZQmvC6wYveLLP9 JaJ8amVW0U0hBF+21nVe2YTtucrruVtR4idG+SCDyq68NBiLMqY1ZiSCdz7Ml2YxYy CIF7k4Y0mPiqpdp/TzyIgxUK/344kabsBoaTGdks=
Received: from localhost (localhost [127.0.0.1]) by smtp-out-1.01.com (Postfix) with ESMTP id BAE21A0357; Wed, 24 Dec 2014 10:17:14 -0600 (CST)
X-Virus-Scanned: amavisd-new at smtp-out-1.01.com
Received: from smtp.01.com ([127.0.0.1]) by localhost (smtp-out-1.01.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id tnDiYPkZvuTL; Wed, 24 Dec 2014 10:17:14 -0600 (CST)
Received: from mail-2.01.com (mail.01.com [10.10.0.41]) by smtp-out-1.01.com (Postfix) with ESMTP id 7A420A033B; Wed, 24 Dec 2014 10:17:14 -0600 (CST)
Date: Wed, 24 Dec 2014 10:17:14 -0600 (CST)
From: Franck Martin <franck@peachymango.org>
To: "Murray S. Kucherawy" <superuser@gmail.com>
Message-ID: <1994741083.49384.1419437834266.JavaMail.zimbra@peachymango.org>
In-Reply-To: <WM!6194380fbbd9d7e8cedb9b68466e59c32adff9bbd7fbab04bfd29af66249f5f6f51483dd8d8b6a3af4e59ddb0d8c18e2!@asav-2.01.com>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <5494A6F5.5020906@dcrocker.net> <CAL0qLwZthPfZ-22=yi2rrp_GKXK3igc=M8LhftxMx7GRUde7Dw@mail.gmail.com> <549ADA41.40005@dcrocker.net> <CAL0qLwYVmDL7kCOTkeDk5pMYCA4-y2Bxyi+7F8GPjaxmxmS6Gw@mail.gmail.com> <WM!6194380fbbd9d7e8cedb9b68466e59c32adff9bbd7fbab04bfd29af66249f5f6f51483dd8d8b6a3af4e59ddb0d8c18e2!@asav-2.01.com>
MIME-Version: 1.0
Content-Type: multipart/alternative;  boundary="----=_Part_49383_1687107832.1419437834265"
X-Originating-IP: [10.1.101.178]
X-Mailer: Zimbra 8.0.5_GA_5839 (ZimbraWebClient - FF34 (Mac)/8.0.5_GA_5839)
Thread-Topic: Jim Fenton's review of -04
Thread-Index: 7tYurEOlobJp0aNi5n7mbJ8euGn2yA==
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/holHbWWDaStOXgcn3jEqKE96l9M
Cc: dmarc@ietf.org, Dave Crocker <dcrocker@bbiw.net>
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Dec 2014 16:17:20 -0000

------=_Part_49383_1687107832.1419437834265
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 7bit

----- Original Message -----

> From: "Murray S. Kucherawy" <superuser@gmail.com>
> To: "Dave Crocker" <dcrocker@bbiw.net>
> Cc: dmarc@ietf.org
> Sent: Wednesday, December 24, 2014 7:50:16 AM
> Subject: Re: [dmarc-ietf] Jim Fenton's review of -04

> On Wed, Dec 24, 2014 at 10:22 AM, Dave Crocker < dhc@dcrocker.net > wrote:

> > > I disagree. DMARC operators all seem to apply this practice, so it's
> 
> > > correct to say that if you play this game, you reject mail from
> 
> > > non-existent domains. Essentially in this way DMARC is a profile of
> 
> > > RFC5321/RFC5322, which is perfectly acceptable. We are not updating
> 
> > > those standards here, merely profiling them.
> 

> > The fact that its use happens to correlate with DMARC use is a
> 
> > distraction. For example, there are plenty of operators who use apply
> 
> > this check but do not use DMARC. If the test is documented in a
> 
> > specification, it should be in /one/ specification. Putting it into the
> 
> > DMARC spec means it has to be documented somewhere else, for the folk
> 
> > who don't use DMARC.
> 

> This paragraph appears in the DMARC spec because the operators participating
> all agreed that it should be part-and-parcel of this operating profile of
> email. It's not as happenstance as this sounds so far; the very thrust of
> DMARC is to make the From: content believable, and permitting a nonexistent
> domain name to make it to the inbox contradicts that goal.

All of this I feel strongly is part of "security considerations", even if they may be not in that chapter. What is the use of doing DMARC, if you allow weak input and vulnerabilities? 

------=_Part_49383_1687107832.1419437834265
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html><body><div style=3D"font-family: arial,helvetica,sans-serif; font-siz=
e: 12pt; color: #000000"><hr id=3D"zwchr"><blockquote style=3D"border-left:=
2px solid #1010FF;margin-left:5px;padding-left:5px;color:#000;font-weight:n=
ormal;font-style:normal;text-decoration:none;font-family:Helvetica,Arial,sa=
ns-serif;font-size:12pt;"><b>From: </b>"Murray S. Kucherawy" &lt;superuser@=
gmail.com&gt;<br><b>To: </b>"Dave Crocker" &lt;dcrocker@bbiw.net&gt;<br><b>=
Cc: </b>dmarc@ietf.org<br><b>Sent: </b>Wednesday, December 24, 2014 7:50:16=
 AM<br><b>Subject: </b>Re: [dmarc-ietf] Jim Fenton's review of -04<br><div>=
<br></div><div dir=3D"ltr">On Wed, Dec 24, 2014 at 10:22 AM, Dave Crocker <=
span dir=3D"ltr">&lt;<a href=3D"mailto:dhc@dcrocker.net" target=3D"_blank">=
dhc@dcrocker.net</a>&gt;</span> wrote:<br><div class=3D"gmail_extra"><div c=
lass=3D"gmail_quote"><blockquote class=3D"gmail_quote" style=3D"margin:0 0 =
0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><span class=3D"">&gt; I=
 disagree.&nbsp; DMARC operators all seem to apply this practice, so it's<b=
r>
&gt; correct to say that if you play this game, you reject mail from<br>
&gt; non-existent domains.&nbsp; Essentially in this way DMARC is a profile=
 of<br>
&gt; RFC5321/RFC5322, which is perfectly acceptable.&nbsp; We are not updat=
ing<br>
&gt; those standards here, merely profiling them.<br>
<br>
</span>The fact that its use happens to correlate with DMARC use is a<br>
distraction.&nbsp; For example, there are plenty of operators who use apply=
<br>
this check but do not use DMARC.&nbsp; If the test is documented in a<br>
specification, it should be in /one/ specification.&nbsp; Putting it into t=
he<br>
DMARC spec means it has to be documented somewhere else, for the folk<br>
who don't use DMARC.<br></blockquote><div><br></div><div>This paragraph app=
ears in the DMARC spec because the operators participating all agreed that =
it should be part-and-parcel of this operating profile of email.&nbsp; It's=
 not as happenstance as this sounds so far; the very thrust of DMARC is to =
make the From: content believable, and permitting a nonexistent domain name=
 to make it to the inbox contradicts that goal.<br><div><br></div></div></d=
iv></div></div></blockquote><div>All of this I feel strongly is part of "se=
curity considerations", even if they may be not in that chapter. What is th=
e use of doing DMARC, if you allow weak input and vulnerabilities?<br></div=
></div></body></html>
------=_Part_49383_1687107832.1419437834265--


From nobody Wed Dec 24 08:21:46 2014
Return-Path: <franck@peachymango.org>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D6B971A8A89 for <dmarc@ietfa.amsl.com>; Wed, 24 Dec 2014 08:21:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level: 
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id s5N61m84oWkm for <dmarc@ietfa.amsl.com>; Wed, 24 Dec 2014 08:21:44 -0800 (PST)
Received: from mx-out-1.zmailcloud.com (01.zmailcloud.com [192.198.85.104]) by ietfa.amsl.com (Postfix) with ESMTP id 5DB401A8A80 for <dmarc@ietf.org>; Wed, 24 Dec 2014 08:21:44 -0800 (PST)
Received: from smtp.01.com (smtp.01.com [10.10.0.43]) by mx-out-1.zmailcloud.com (Postfix) with ESMTP id 036D156492B; Wed, 24 Dec 2014 10:21:44 -0600 (CST)
Received: from localhost (localhost [127.0.0.1]) by smtp-out-1.01.com (Postfix) with ESMTP id E7538A033B; Wed, 24 Dec 2014 10:21:43 -0600 (CST)
X-Virus-Scanned: amavisd-new at smtp-out-1.01.com
Received: from smtp.01.com ([127.0.0.1]) by localhost (smtp-out-1.01.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id D_TBEVDgXb15; Wed, 24 Dec 2014 10:21:43 -0600 (CST)
Received: from smtp.01.com (localhost [127.0.0.1]) by smtp-out-1.01.com (Postfix) with ESMTP id BACB3A0377; Wed, 24 Dec 2014 10:21:43 -0600 (CST)
DKIM-Filter: OpenDKIM Filter v2.8.4 smtp-out-1.01.com BACB3A0377
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=peachymango.org; s=61F775A4-4A7F-11E4-A6BB-61E3068E35F6; t=1419438103; bh=f9OKMTBd+7OFC7mPis4GRn8FlVXaIn8FLMEkynvVtsU=; h=Date:From:To:Message-ID:Subject:MIME-Version:Content-Type; b=iA+7BtjDzLtTB0weDFUGN1pPyCVy59ZIH/1h5wsOdNDuINyNmK2nDQi127D6A0tj2 WuZi4lSeV+R3MfXEs6EWOzsEfTyRGGfemQmO8NHsIuWxhXV+AzZUbf8OUva9qWSgTi D8LfbqA1vdV3pxJ9ZjemA1l7WdQsBHudC2EroTmY=
Received: from localhost (localhost [127.0.0.1]) by smtp-out-1.01.com (Postfix) with ESMTP id A66CEA0357; Wed, 24 Dec 2014 10:21:43 -0600 (CST)
X-Virus-Scanned: amavisd-new at smtp-out-1.01.com
Received: from smtp.01.com ([127.0.0.1]) by localhost (smtp-out-1.01.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id SBXk7jGtCS1v; Wed, 24 Dec 2014 10:21:43 -0600 (CST)
Received: from mail-2.01.com (mail.01.com [10.10.0.41]) by smtp-out-1.01.com (Postfix) with ESMTP id 8BC59A033B; Wed, 24 Dec 2014 10:21:43 -0600 (CST)
Date: Wed, 24 Dec 2014 10:21:43 -0600 (CST)
From: Franck Martin <franck@peachymango.org>
To: "Murray S. Kucherawy" <superuser@gmail.com>
Message-ID: <222921455.49494.1419438103510.JavaMail.zimbra@peachymango.org>
In-Reply-To: <WM!bf76402f84f5e55c933bc3694170109bde51a6e2de4fd2896b21bf2bde2e6eab018eed6a7afbb5428af9ef2bacb41a9c!@asav-2.01.com>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <6858606.AfKicQ9CJZ@kitterman-optiplex-9020m> <CAL0qLwZeFbZ0pDCDNdpn7Xx_4m6DJ+eeTgwYMSFgJOX0ZiBBWg@mail.gmail.com> <43288BDA-4BDD-4A18-A6DD-232BCFFDEB43@kitterman.com> <CAL0qLwamiZa1xqO5Zg2q3=yih6g3voV-0AcNb3D5gB7hJ=9azA@mail.gmail.com> <WM!bf76402f84f5e55c933bc3694170109bde51a6e2de4fd2896b21bf2bde2e6eab018eed6a7afbb5428af9ef2bacb41a9c!@asav-2.01.com>
MIME-Version: 1.0
Content-Type: multipart/alternative;  boundary="----=_Part_49493_609874598.1419438103510"
X-Originating-IP: [10.1.101.178]
X-Mailer: Zimbra 8.0.5_GA_5839 (ZimbraWebClient - FF34 (Mac)/8.0.5_GA_5839)
Thread-Topic: Jim Fenton's review of -04
Thread-Index: ZzR+7p977dZWIE2axivaCBriBLN84w==
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/UGzrr8qlxiZ5OG59IDIjcdAUdZ4
Cc: dmarc@ietf.org, Scott Kitterman <sklist@kitterman.com>
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Dec 2014 16:21:46 -0000

------=_Part_49493_609874598.1419438103510
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 7bit

----- Original Message -----

> From: "Murray S. Kucherawy" <superuser@gmail.com>
> To: "Scott Kitterman" <sklist@kitterman.com>
> Cc: dmarc@ietf.org
> Sent: Wednesday, December 24, 2014 7:46:42 AM
> Subject: Re: [dmarc-ietf] Jim Fenton's review of -04

> On Wed, Dec 24, 2014 at 4:04 AM, Scott Kitterman < sklist@kitterman.com >
> wrote:

> > The draft strongly encourages DMARC implementers to ignore SPF policy, so I
> > don't think assuming messages will be deferred due only due to SPF or DKIM
> > results indicating a temporary DNS error is appropriate.
> 

> If there's a transient DNS error getting the SPF policy, then there's no SPF
> policy to be ignored. That's quite a different situation.

> > I think that in the case of a temporary DNS error in one of the lower level
> > protocols, insufficient inputs are available to conclude a message has
> > failed DMARC tests.
> 

> I agree.

> > Receivers can either ignore DMARC for this message due to incomplete
> > evaluation or they can defer the message in the hope that the temporary
> > error will be resolved when the message is retried. Receivers MUST NOT
> > apply
> > DMARC policy and reject or quarantine because the DMARC evaluation is
> > incomplete.
> 
I would prefer this phrasing 

Receivers can either ignore DMARC for this message due to incomplete evaluation or they can defer the message in the hope that the temporary error will be resolved when the message is retried. Defer seems preferable for security reasons. Receivers MUST NOT apply DMARC policy and reject or quarantine because the DMARC evaluation is incomplete. 

------=_Part_49493_609874598.1419438103510
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html><body><div style=3D"font-family: arial,helvetica,sans-serif; font-siz=
e: 12pt; color: #000000"><div><br></div><hr id=3D"zwchr"><blockquote style=
=3D"border-left:2px solid #1010FF;margin-left:5px;padding-left:5px;color:#0=
00;font-weight:normal;font-style:normal;text-decoration:none;font-family:He=
lvetica,Arial,sans-serif;font-size:12pt;"><b>From: </b>"Murray S. Kucherawy=
" &lt;superuser@gmail.com&gt;<br><b>To: </b>"Scott Kitterman" &lt;sklist@ki=
tterman.com&gt;<br><b>Cc: </b>dmarc@ietf.org<br><b>Sent: </b>Wednesday, Dec=
ember 24, 2014 7:46:42 AM<br><b>Subject: </b>Re: [dmarc-ietf] Jim Fenton's =
review of -04<br><div><br></div><div dir=3D"ltr">On Wed, Dec 24, 2014 at 4:=
04 AM, Scott Kitterman <span dir=3D"ltr">&lt;<a href=3D"mailto:sklist@kitte=
rman.com" target=3D"_blank">sklist@kitterman.com</a>&gt;</span> wrote:<br><=
div class=3D"gmail_extra"><div class=3D"gmail_quote"><blockquote class=3D"g=
mail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-l=
eft:1ex">The draft strongly encourages DMARC implementers to ignore SPF pol=
icy, so I don't think assuming messages will be deferred due only due to SP=
F or DKIM results indicating a temporary DNS error is appropriate.<br></blo=
ckquote><div><br></div><div>If there's a transient DNS error getting the SP=
F policy, then there's no SPF policy to be ignored.&nbsp; That's quite a di=
fferent situation.<br><br></div><blockquote class=3D"gmail_quote" style=3D"=
margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
I think that in the case of a temporary DNS error in one of the lower level=
 protocols, insufficient inputs are available to conclude a message has fai=
led DMARC tests.<br></blockquote><div><br></div><div>I agree.<br><br></div>=
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
Receivers can either ignore DMARC for this message due to incomplete evalua=
tion or they can defer the message in the hope that the temporary error wil=
l be resolved when the message is retried.&nbsp; Receivers MUST NOT apply D=
MARC policy and reject or quarantine because the DMARC evaluation is incomp=
lete.</blockquote></div></div></div></blockquote><div><br></div><div>I woul=
d prefer this phrasing<br></div><div><br></div><div>Receivers can either ig=
nore DMARC for this message due to incomplete evaluation or they can defer =
the message in the hope that the temporary error will be resolved when the =
message is retried. Defer seems preferable for security reasons.&nbsp; Rece=
ivers MUST NOT apply DMARC policy and reject or quarantine because the DMAR=
C evaluation is incomplete.</div><div><br></div><br></div></body></html>
------=_Part_49493_609874598.1419438103510--


From nobody Wed Dec 24 08:24:17 2014
Return-Path: <dhc@dcrocker.net>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 68C901A8A80 for <dmarc@ietfa.amsl.com>; Wed, 24 Dec 2014 08:24:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rZnKjcYjYDW5 for <dmarc@ietfa.amsl.com>; Wed, 24 Dec 2014 08:24:13 -0800 (PST)
Received: from sbh17.songbird.com (sbh17.songbird.com [72.52.113.17]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 42CF11A8A8F for <dmarc@ietf.org>; Wed, 24 Dec 2014 08:24:13 -0800 (PST)
Received: from [192.168.1.66] (76-218-8-156.lightspeed.sntcca.sbcglobal.net [76.218.8.156]) (authenticated bits=0) by sbh17.songbird.com (8.13.8/8.13.8) with ESMTP id sBOGO7sP010578 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT); Wed, 24 Dec 2014 08:24:11 -0800
Message-ID: <549AE89A.9070203@dcrocker.net>
Date: Wed, 24 Dec 2014 08:23:54 -0800
From: Dave Crocker <dhc@dcrocker.net>
Organization: Brandenburg InternetWorking
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Thunderbird/31.3.0
MIME-Version: 1.0
To: "Murray S. Kucherawy" <superuser@gmail.com>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com>	<5494A6F5.5020906@dcrocker.net>	<CAL0qLwZthPfZ-22=yi2rrp_GKXK3igc=M8LhftxMx7GRUde7Dw@mail.gmail.com>	<549ADA41.40005@dcrocker.net> <CAL0qLwYVmDL7kCOTkeDk5pMYCA4-y2Bxyi+7F8GPjaxmxmS6Gw@mail.gmail.com>
In-Reply-To: <CAL0qLwYVmDL7kCOTkeDk5pMYCA4-y2Bxyi+7F8GPjaxmxmS6Gw@mail.gmail.com>
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 8bit
X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.0 (sbh17.songbird.com [72.52.113.66]); Wed, 24 Dec 2014 08:24:11 -0800 (PST)
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/_xDfm7DWQQP57rkqdDWKVBnZm8U
Cc: "dmarc@ietf.org" <dmarc@ietf.org>
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: dcrocker@bbiw.net
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Dec 2014 16:24:14 -0000

On 12/24/2014 7:50 AM, Murray S. Kucherawy wrote:
> This paragraph appears in the DMARC spec because the operators
> participating all agreed that it should be part-and-parcel of this
> operating profile of email.  It's not as happenstance as this sounds so
> far; the very thrust of DMARC is to make the From: content believable,
> and permitting a nonexistent domain name to make it to the inbox
> contradicts that goal.


The goal, as you state it, is at the level of seeking world peace.  It
is very laudable and and very, very broad.  It covers vastly more than
the scope of DMARC.

DMARC is a specific bit of technology working towards that broader goal.
 That something happens to fall within this very broad scope does not
automatically justify documenting it within the much narrower scope of a
detailed specification, unless it is part of that specification's
technology.

The MX record check has no /technical/ relationship to the /technical/
details of DMARC.

Please note that I'm not commenting on the efficacy of the record check,
but on the need to document it in a place that makes sense for the full
range of its implementers.

There are, and will continue to be, plenty of operators using that check
but not DMARC.  That simple fact provides a very pragmatic reason for
moving its specification into some document outside of DMARC.

d/

-- 
Dave Crocker
Brandenburg InternetWorking
bbiw.net


From nobody Wed Dec 24 08:43:55 2014
Return-Path: <prvs=42812d3bb=kandersen@linkedin.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E82641A8A8F for <dmarc@ietfa.amsl.com>; Wed, 24 Dec 2014 08:43:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.978
X-Spam-Level: 
X-Spam-Status: No, score=-3.978 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, IP_NOT_FRIENDLY=0.334, RCVD_IN_DNSWL_MED=-2.3, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fbKdEjHE7FQT for <dmarc@ietfa.amsl.com>; Wed, 24 Dec 2014 08:43:49 -0800 (PST)
Received: from esv4-mav04.corp.linkedin.com (esv4-mav04.corp.linkedin.com [69.28.149.80]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BDF771A1A15 for <dmarc@ietf.org>; Wed, 24 Dec 2014 08:43:49 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linkedin.com; i=@linkedin.com; q=dns/txt; s=proddkim1024; t=1419439429; x=1450975429; h=from:to:cc:subject:date:message-id:content-id: content-transfer-encoding:mime-version; bh=JBtVGvVce7+Rbj46qnj/rBAf4ue8ZbsrkM+jVoYhrOI=; b=YmjdF7qxyuDh/ksMhuGlmerjhR8dm1IaWgbixnc+EpoGDUtC377T5k+Y 7xKcrhw1dvxB6Hf28etbuKJsAQqkwwKduTm0oQ8HxyHD5hMadDk5BS1kw gEh9y4WCWz02SVYGQWPBzRcNG/Wk0/EP0GPVBRz1Q4rmUSTCBwq4bWHzU s=;
X-IronPort-AV: E=Sophos;i="5.07,638,1413270000"; d="scan'208";a="166732136"
Received: from esv4-exctest.linkedin.biz (172.18.46.60) by ESV4-HT01.linkedin.biz (172.18.46.235) with Microsoft SMTP Server (TLS) id 14.3.195.1; Wed, 24 Dec 2014 08:43:49 -0800
Received: from ESV4-MB03.linkedin.biz ([fe80::1caa:1422:7ef8:5ceb]) by esv4-exctest.linkedin.biz ([::1]) with mapi id 14.03.0195.001; Wed, 24 Dec 2014 08:43:48 -0800
From: Kurt Andersen <kandersen@linkedin.com>
To: Franck Martin <franck@peachymango.org>, "Murray S. Kucherawy" <superuser@gmail.com>
Thread-Topic: [dmarc-ietf] Jim Fenton's review of -04
Thread-Index: AQHQH5jKs8GbclOMlEWOwe0m4egu/A==
Date: Wed, 24 Dec 2014 16:43:48 +0000
Message-ID: <D0C02B78.A1952%kandersen@linkedin.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [172.18.46.253]
Content-Type: text/plain; charset="us-ascii"
Content-ID: <6C3BBF488B3CC44DB4A6F31C6A4EA087@linkedin.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/pkW56mia28AIXBRYGLsZ95Ibw98
Cc: "dmarc@ietf.org" <dmarc@ietf.org>, Scott Kitterman <sklist@kitterman.com>
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Dec 2014 16:43:52 -0000

On 2014-12-24, 08:21 , "Franck Martin" <franck@peachymango.org> wrote:

>
> From: "Murray S. Kucherawy" <superuser@gmail.com>
> To: "Scott Kitterman" <sklist@kitterman.com>
> Cc: dmarc@ietf.org
> Sent: Wednesday, December 24, 2014 7:46:42 AM
> Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
>
> > On Wed, Dec 24, 2014 at 4:04 AM, Scott Kitterman
><sklist@kitterman.com> wrote:
> >
> > > The draft strongly encourages DMARC implementers to ignore SPF
>policy,=20
> > > so I don't think assuming messages will be deferred due only due to
>SPF=20
> > > or DKIM results indicating a temporary DNS error is appropriate.
> >
> >
> > If there's a transient DNS error getting the SPF policy, then there's
>no=20
> > SPF policy to be ignored.  That's quite a different situation.
> >
> >
> > > I think that in the case of a temporary DNS error in one of the
>lower=20
> > > level protocols, insufficient inputs are available to conclude a
>message=20
> > > has failed DMARC tests.
> >
> >
> > I agree.
> >
> >
> > Receivers can either ignore DMARC for this message due to incomplete
>evaluation=20
> > or they can defer the message in the hope that the temporary error
>will be=20
> > resolved when the message is retried.  Receivers MUST NOT apply DMARC
>policy=20
> > and reject or quarantine because the DMARC evaluation is incomplete.
>
> I would prefer this phrasing
>
> Receivers can either ignore DMARC for this message due to incomplete
>evaluation=20
> or they can defer the message in the hope that the temporary error will
>be=20
> resolved when the message is retried. Defer seems preferable for
>security reasons.=20
> Receivers MUST NOT apply DMARC policy and reject or quarantine because
>the DMARC=20
> evaluation is incomplete.

I think that it might be worth suggesting that such transient errors could
be=20
reasonably reported since this does constitute an avenue for some sort of
flooding=20
attack or flaw in their DNS infrastructure (consider, for example a
partially broken
DNSSEC implementation). By reporting incidents, it can alert the operators
to the problem.

--Kurt Andersen


From nobody Wed Dec 24 08:50:36 2014
Return-Path: <prvs=42812d3bb=kandersen@linkedin.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C3CB11A19E3 for <dmarc@ietfa.amsl.com>; Wed, 24 Dec 2014 08:50:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.378
X-Spam-Level: 
X-Spam-Status: No, score=-3.378 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, IP_NOT_FRIENDLY=0.334, J_CHICKENPOX_14=0.6, RCVD_IN_DNSWL_MED=-2.3, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MQua0uSk8c5W for <dmarc@ietfa.amsl.com>; Wed, 24 Dec 2014 08:50:33 -0800 (PST)
Received: from esv4-mav04.corp.linkedin.com (esv4-mav04.corp.linkedin.com [69.28.149.80]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1B8F21A066C for <dmarc@ietf.org>; Wed, 24 Dec 2014 08:50:33 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linkedin.com; i=@linkedin.com; q=dns/txt; s=proddkim1024; t=1419439833; x=1450975833; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=CKX9Ww1bckN+TVszeuvOZli3WGY+RIukxREFwixzFqM=; b=N2klMBRKC1GJG5eakJYTxBRpYXhgW59VjMxeledZPolwodW//TeYzLfe KlqwvqWsVKRRmrKF549YrMTfwdaBvfeeTVk00TeigxCm9kpEuMtUU1N8T nXN8nuOyTkRnZSDT19SHm4Cb97s+Tn3iiupwNobMkZMsfx0roNEMVIs6m I=;
X-IronPort-AV: E=Sophos;i="5.07,638,1413270000"; d="scan'208";a="166732953"
Received: from esv4-exctest.linkedin.biz (172.18.46.60) by esv4-cas01.linkedin.biz (172.18.46.140) with Microsoft SMTP Server (TLS) id 14.3.195.1; Wed, 24 Dec 2014 08:50:32 -0800
Received: from ESV4-MB03.linkedin.biz ([fe80::1caa:1422:7ef8:5ceb]) by esv4-exctest.linkedin.biz ([::1]) with mapi id 14.03.0195.001; Wed, 24 Dec 2014 08:50:32 -0800
From: Kurt Andersen <kandersen@linkedin.com>
To: "dcrocker@bbiw.net" <dcrocker@bbiw.net>, "Murray S. Kucherawy" <superuser@gmail.com>
Thread-Topic: [dmarc-ietf] Jim Fenton's review of -04
Thread-Index: AQHQG9MAs8GbclOMlEWOwe0m4egu/JyYBSyAgAbKUoCAAJnigP//kmyA
Date: Wed, 24 Dec 2014 16:50:32 +0000
Message-ID: <D0C02E61.A196B%kandersen@linkedin.com>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <5494A6F5.5020906@dcrocker.net> <CAL0qLwZthPfZ-22=yi2rrp_GKXK3igc=M8LhftxMx7GRUde7Dw@mail.gmail.com> <549ADA41.40005@dcrocker.net>
In-Reply-To: <549ADA41.40005@dcrocker.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [172.18.46.253]
Content-Type: text/plain; charset="us-ascii"
Content-ID: <FFF23CF94F0BA0429C9A35A8BCE47052@linkedin.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/2hWrZEtJem6JqNFGS_l1jsjxH_s
Cc: "dmarc@ietf.org" <dmarc@ietf.org>
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Dec 2014 16:50:35 -0000

On 2014-12-24, 07:22 , "Dave Crocker" <dhc@dcrocker.net> wrote:

>DMARC concerns the domain name in the From: field and finding that it
>has a DMARC record associated with it.  If there is no record associated
>with the domain name, then it is not participating in DMARC.
>
>There are other places to document other, common anti-abuse practices.

I agree with this position. M3AAWG is actually about to publish a
recommendation
to deal with protecting parked domains which includes something like this,
although
it is separate from DMARC itself and can't address the issue of a truly
NXDOMAIN
condition. =20

I think that we have to leave NXDOMAIN handling to the discretion of
receivers.

--Kurt


From nobody Wed Dec 24 09:14:32 2014
Return-Path: <sklist@kitterman.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4B8B01A07BD for <dmarc@ietfa.amsl.com>; Wed, 24 Dec 2014 09:14:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.002
X-Spam-Level: 
X-Spam-Status: No, score=-2.002 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gsExRnTelxSO for <dmarc@ietfa.amsl.com>; Wed, 24 Dec 2014 09:14:29 -0800 (PST)
Received: from mailout03.controlledmail.com (mailout03.controlledmail.com [208.43.65.50]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 918E91A0095 for <dmarc@ietf.org>; Wed, 24 Dec 2014 09:14:29 -0800 (PST)
Received: from scott-latitude-e6320.localnet (unknown [76.92.231.124]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mailout03.controlledmail.com (Postfix) with ESMTPSA id 9BD62C400D1; Wed, 24 Dec 2014 11:14:28 -0600 (CST)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=kitterman.com; s=201409; t=1419441268; bh=7cAVURzthPyBvFGqsvLw3Df224Ma9yE8NbigU8AkfEI=; h=From:To:Subject:Date:In-Reply-To:References:From; b=px623N8gIr4e0naBTQDtWGLdPyNqTR7J+Ut2/t/n0qoUPqAjrxE8/h4SN39rR1/Tm BlOZOB68JS84owrwQZ5PM76vHVu3u89Vq+zudiY9LQvLnMvqS253K+FXHCxzepBPD3 5KKQ+LYwo93pT9EhmUD32UObaufyTFW9OPDKxDHI=
From: Scott Kitterman <sklist@kitterman.com>
To: dmarc@ietf.org
Date: Wed, 24 Dec 2014 12:14:27 -0500
Message-ID: <4165890.y5RTokQk0d@scott-latitude-e6320>
User-Agent: KMail/4.13.3 (Linux/3.13.0-43-generic; KDE/4.13.3; x86_64; ; )
In-Reply-To: <CAL0qLwamiZa1xqO5Zg2q3=yih6g3voV-0AcNb3D5gB7hJ=9azA@mail.gmail.com>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <43288BDA-4BDD-4A18-A6DD-232BCFFDEB43@kitterman.com> <CAL0qLwamiZa1xqO5Zg2q3=yih6g3voV-0AcNb3D5gB7hJ=9azA@mail.gmail.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 7Bit
Content-Type: text/plain; charset="us-ascii"
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/YHJTsohVVj-Sfb7TE__4MV0cuEY
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Dec 2014 17:14:31 -0000

On Wednesday, December 24, 2014 10:46:42 Murray S. Kucherawy wrote:
> On Wed, Dec 24, 2014 at 4:04 AM, Scott Kitterman <sklist@kitterman.com>
> 
> wrote:
> > The draft strongly encourages DMARC implementers to ignore SPF policy, so
> > I don't think assuming messages will be deferred due only due to SPF or
> > DKIM results indicating a temporary DNS error is appropriate.
> 
> If there's a transient DNS error getting the SPF policy, then there's no
> SPF policy to be ignored.  That's quite a different situation.
> 
> > I think that in the case of a temporary DNS error in one of the lower
> > level protocols, insufficient inputs are available to conclude a message
> > has failed DMARC tests.
> 
> I agree.
> 
> > Receivers can either ignore DMARC for this message due to incomplete
> > evaluation or they can defer the message in the hope that the temporary
> > error will be resolved when the message is retried.  Receivers MUST NOT
> > apply DMARC policy and reject or quarantine because the DMARC evaluation
> > is
> > incomplete.
> 
> Can you provide specific changes, with section numbers, that you'd like to
> see applied to resolve this?

Yes, but I just finished a 20 hour drive, so I'll probably sleep first.

Scott K


From nobody Wed Dec 24 09:15:17 2014
Return-Path: <sklist@kitterman.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BCC741A07BD for <dmarc@ietfa.amsl.com>; Wed, 24 Dec 2014 09:15:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.002
X-Spam-Level: 
X-Spam-Status: No, score=-2.002 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fcocnq_42Q10 for <dmarc@ietfa.amsl.com>; Wed, 24 Dec 2014 09:15:14 -0800 (PST)
Received: from mailout03.controlledmail.com (mailout03.controlledmail.com [208.43.65.50]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 794BF1A0095 for <dmarc@ietf.org>; Wed, 24 Dec 2014 09:15:14 -0800 (PST)
Received: from [10.182.208.29] (138.sub-70-195-71.myvzw.com [70.195.71.138]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mailout03.controlledmail.com (Postfix) with ESMTPSA id ADF7BC400D1; Wed, 24 Dec 2014 11:15:12 -0600 (CST)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=kitterman.com; s=201409; t=1419441313; bh=tyxUClNH5JC1dtb9voCb4Ypmd3dDI+wgbpMh5/Mmsek=; h=In-Reply-To:References:Subject:From:Date:To:From; b=IGkX8k7dtOAuhq8Bk5h6uaTYQ+a3m4Pf1h6QnGVIE+sMquSXAJM1msso2BiAIsLK+ m0VvuoKT8s6emjnJzohTWpqmnj1teKYn3/2U9V0hvEPgiT6JJD8laJWr0Ev7G6OBJF JW2WSZIVoW/oYEFtxjuCMOrvYAd0nFCBKFpcxz+g=
User-Agent: K-9 Mail for Android
In-Reply-To: <CAL0qLwb8Yac-Nditm+dHbJ4OyfHDAPFYtm7LXv0tD=rQ+aiHQA@mail.gmail.com>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <6858606.AfKicQ9CJZ@kitterman-optiplex-9020m> <CAL0qLwZeFbZ0pDCDNdpn7Xx_4m6DJ+eeTgwYMSFgJOX0ZiBBWg@mail.gmail.com> <WM!f44f5f14da590ead690430992af0de0e0b9ac1ac0002cda3e42d5aea3315d874527c350daf4494220eb86b4d9d9db2f9!@asav-2.01.com> <1712480034.45611.1419405204864.JavaMail.zimbra@peachymango.org> <CAL0qLwauU9Eu_JNFiumpTwi=YvSysBZ5cVD93cYF46w1z+fFKA@mail.gmail.com> <62849448-BFA5-49C0-A2B6-7A4B5CC34F2C@kitterman.com> <CAL0qLwb8Yac-Nditm+dHbJ4OyfHDAPFYtm7LXv0tD=rQ+aiHQA@mail.gmail.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
Content-Type: text/plain; charset=UTF-8
From: Scott Kitterman <sklist@kitterman.com>
Date: Wed, 24 Dec 2014 11:05:21 -0600
To: "dmarc@ietf.org" <dmarc@ietf.org>
Message-ID: <0A7FFDC3-CF31-45B8-9990-16F43410022A@kitterman.com>
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/WZFlmoN-oJIHdZefKxS7BUHeOlM
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Dec 2014 17:15:15 -0000

On December 24, 2014 9:43:40 AM CST, "Murray S. Kucherawy" <superuser@gmail.com> wrote:
>On Wed, Dec 24, 2014 at 4:09 AM, Scott Kitterman <sklist@kitterman.com>
>wrote:
>
>> 5.6.2 promises 5.6.3 addresses the question and it doesn't. At the
>very
>> least, 5.6.2 should be fixed not to over promise what 5.6.3 will
>provide.
>>
>
>I'm not clear why you say "it doesn't".  5.6.3 describes two options
>for
>handling a message when the query for the DMARC policy fails due to
>transient DNS errors.  Is your issue that it doesn't prescribe one
>specific
>action?
>
>I also don't understand why you say the reference is dangling.  5.6.2
>says
>that transient DNS errors for SPF and DKIM can occur and says the
>handling
>for that case is left to receiver discretion, but also points out that
>what
>5.6.3 says can also be applied when that happens.

And 5.6.3 is completely silent on what to do with SPF or DKIM results indicating a temporary DNS error. The only references to transient DNS errors in 5.6.3 are specific to errors retrieving DMARC records. 

Scott K

Scott K


From nobody Wed Dec 24 14:48:50 2014
Return-Path: <sklist@kitterman.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2820D1A1BE9 for <dmarc@ietfa.amsl.com>; Wed, 24 Dec 2014 14:48:48 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.002
X-Spam-Level: 
X-Spam-Status: No, score=-2.002 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AHjdSYPmtUuI for <dmarc@ietfa.amsl.com>; Wed, 24 Dec 2014 14:48:46 -0800 (PST)
Received: from mailout03.controlledmail.com (mailout03.controlledmail.com [208.43.65.50]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 071191A1BEC for <dmarc@ietf.org>; Wed, 24 Dec 2014 14:48:20 -0800 (PST)
Received: from scott-latitude-e6320.localnet (unknown [76.92.231.124]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mailout03.controlledmail.com (Postfix) with ESMTPSA id 0472CC400D1; Wed, 24 Dec 2014 16:48:20 -0600 (CST)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=kitterman.com; s=201409; t=1419461300; bh=QTITOY5NzDPgJsJeqLYY/Y4QsDie7UtvEcAIai+e+1I=; h=From:To:Subject:Date:In-Reply-To:References:From; b=vgmNVCMEj8VjnSx8BitluXhEvWcT20usWqD77MoucmdnIARmKryQnLf/lNS3zUCY0 Y1J72qrSrzJc5+YQ1+vHpACDxQPw5Q2aLsiAu/Fuy/lv4NUIwHYTlmvgXU5C57sbIl 3NUmy6b8qsRelVY5EAHtH0p1qE9y1aInwF4kMsEg=
From: Scott Kitterman <sklist@kitterman.com>
To: dmarc@ietf.org
Date: Wed, 24 Dec 2014 17:48:17 -0500
Message-ID: <2397001.Fx3SqMl5ZI@scott-latitude-e6320>
User-Agent: KMail/4.13.3 (Linux/3.13.0-43-generic; KDE/4.13.3; x86_64; ; )
In-Reply-To: <CAL0qLwamiZa1xqO5Zg2q3=yih6g3voV-0AcNb3D5gB7hJ=9azA@mail.gmail.com>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <43288BDA-4BDD-4A18-A6DD-232BCFFDEB43@kitterman.com> <CAL0qLwamiZa1xqO5Zg2q3=yih6g3voV-0AcNb3D5gB7hJ=9azA@mail.gmail.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 7Bit
Content-Type: text/plain; charset="us-ascii"
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/Q3v7BeYWhMh03I3whCiShwULS88
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Dec 2014 22:48:48 -0000

On Wednesday, December 24, 2014 10:46:42 Murray S. Kucherawy wrote:
> On Wed, Dec 24, 2014 at 4:04 AM, Scott Kitterman <sklist@kitterman.com>
> 
> wrote:
> > The draft strongly encourages DMARC implementers to ignore SPF policy, so
> > I don't think assuming messages will be deferred due only due to SPF or
> > DKIM results indicating a temporary DNS error is appropriate.
> 
> If there's a transient DNS error getting the SPF policy, then there's no
> SPF policy to be ignored.  That's quite a different situation.
> 
> > I think that in the case of a temporary DNS error in one of the lower
> > level protocols, insufficient inputs are available to conclude a message
> > has failed DMARC tests.
> 
> I agree.
> 
> > Receivers can either ignore DMARC for this message due to incomplete
> > evaluation or they can defer the message in the hope that the temporary
> > error will be resolved when the message is retried.  Receivers MUST NOT
> > apply DMARC policy and reject or quarantine because the DMARC evaluation
> > is
> > incomplete.
> 
> Can you provide specific changes, with section numbers, that you'd like to
> see applied to resolve this?

Here's my suggestion.  Replace this text at the end of section 5.6.2:

   Handling of messages for which SPF and/or DKIM evaluation encounters
   a DNS error is left to the discretion of the Mail Receiver.  Further
   discussion is available in Section 5.6.3.

with:

   Messages for which SPF and/or DKIM evaluation encounters a temporary
   DNS error have not received a definitive result for steps 3 and/or 4 above.
   If the message has not passed the the DMARC mechanism check due to
   an SPF or DKIM check that did not have a DNS error, receivers can either
   ignore DMARC for this message due to incomplete evaluation or they
   can defer the message in the hope that the temporary error will be
   resolved when the message is retried.  Receivers MUST NOT apply DMARC
   policy and reject or quarantine the message because the DMARC
   evaluation is incomplete. When otherwise appropriate due to DMARC
   policy, receivers MAY send feedback reports regarding temporary errors.

   Handling of messages for which SPF and/or DKIM evaluation encounters
   a permanent DNS error is left to the discretion of the Mail Receiver. 

How's that?

Scott K


From nobody Wed Dec 24 17:22:28 2014
Return-Path: <franck@peachymango.org>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 74C771A6F63 for <dmarc@ietfa.amsl.com>; Wed, 24 Dec 2014 17:22:26 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level: 
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id P11VwPegpJbX for <dmarc@ietfa.amsl.com>; Wed, 24 Dec 2014 17:22:23 -0800 (PST)
Received: from mx-out-1.zmailcloud.com (01.zmailcloud.com [192.198.85.104]) by ietfa.amsl.com (Postfix) with ESMTP id 3C34A1A6F61 for <dmarc@ietf.org>; Wed, 24 Dec 2014 17:22:23 -0800 (PST)
Received: from smtp.01.com (smtp.01.com [10.10.0.43]) by mx-out-1.zmailcloud.com (Postfix) with ESMTP id C09B15641A8; Wed, 24 Dec 2014 19:22:22 -0600 (CST)
Received: from localhost (localhost [127.0.0.1]) by smtp-out-2.01.com (Postfix) with ESMTP id A5C29602AE; Wed, 24 Dec 2014 19:22:22 -0600 (CST)
X-Virus-Scanned: amavisd-new at smtp-out-2.01.com
Received: from smtp.01.com ([127.0.0.1]) by localhost (smtp-out-2.01.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ntMzGfoSQPFW; Wed, 24 Dec 2014 19:22:22 -0600 (CST)
Received: from smtp.01.com (localhost [127.0.0.1]) by smtp-out-2.01.com (Postfix) with ESMTP id 4E57B602BA; Wed, 24 Dec 2014 19:22:22 -0600 (CST)
DKIM-Filter: OpenDKIM Filter v2.8.4 smtp-out-2.01.com 4E57B602BA
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=peachymango.org; s=61F775A4-4A7F-11E4-A6BB-61E3068E35F6; t=1419470542; bh=3oUyJR+MYSlmYWtRP7hu7K9m6faSHEB9tayC4XMmm8Q=; h=Date:From:To:Message-ID:Subject:MIME-Version:Content-Type: Content-Transfer-Encoding; b=nTd6kQAVC/jRq2YrpZdiECqh1OWxaOtcbkTbdUf+lfI0N9A9B2pIdpMlFI/eo5EtG oma5u6v+aFumP7MvEKfJKT6XpWka4DmrYTBPKJ8KhyEn/v/bSet0iUlKIb0u9QcOu9 /JWaqdn7Cuj7mqnj6gfTWXGtDrxJGPUukt06i3Yg=
Received: from localhost (localhost [127.0.0.1]) by smtp-out-2.01.com (Postfix) with ESMTP id 2EE5A602B9; Wed, 24 Dec 2014 19:22:22 -0600 (CST)
X-Virus-Scanned: amavisd-new at smtp-out-2.01.com
Received: from smtp.01.com ([127.0.0.1]) by localhost (smtp-out-2.01.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id E4Mu_7YL5t-s; Wed, 24 Dec 2014 19:22:22 -0600 (CST)
Received: from mail-2.01.com (mail.01.com [10.10.0.41]) by smtp-out-2.01.com (Postfix) with ESMTP id 150C7602AE; Wed, 24 Dec 2014 19:22:22 -0600 (CST)
Date: Wed, 24 Dec 2014 19:22:21 -0600 (CST)
From: Franck Martin <franck@peachymango.org>
To: Scott Kitterman <sklist@kitterman.com>
Message-ID: <227572093.52751.1419470541903.JavaMail.zimbra@peachymango.org>
In-Reply-To: <WM!3a05b513a5256b88630334d2c098191df85eb23d98c86fbb56de66f39b17c39fceee7ed8a586dcc64fa159d6c68098bc!@asav-1.01.com>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <43288BDA-4BDD-4A18-A6DD-232BCFFDEB43@kitterman.com> <CAL0qLwamiZa1xqO5Zg2q3=yih6g3voV-0AcNb3D5gB7hJ=9azA@mail.gmail.com> <2397001.Fx3SqMl5ZI@scott-latitude-e6320> <WM!3a05b513a5256b88630334d2c098191df85eb23d98c86fbb56de66f39b17c39fceee7ed8a586dcc64fa159d6c68098bc!@asav-1.01.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 7bit
X-Originating-IP: [10.1.101.179]
X-Mailer: Zimbra 8.0.5_GA_5839 (ZimbraWebClient - FF34 (Mac)/8.0.5_GA_5839)
Thread-Topic: Jim Fenton's review of -04
Thread-Index: 7AvnrqDMptbFlMBgU1eK3TroyFOZGg==
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/p-ibrC4qYeCeNs4ALWyAKCuKEmA
Cc: dmarc@ietf.org
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 25 Dec 2014 01:22:26 -0000

----- Original Message -----
> From: "Scott Kitterman" <sklist@kitterman.com>
> To: dmarc@ietf.org
> Sent: Wednesday, December 24, 2014 2:48:17 PM
> Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
> 
> On Wednesday, December 24, 2014 10:46:42 Murray S. Kucherawy wrote:
> > On Wed, Dec 24, 2014 at 4:04 AM, Scott Kitterman <sklist@kitterman.com>
> > 
> > wrote:
> > > The draft strongly encourages DMARC implementers to ignore SPF policy, so
> > > I don't think assuming messages will be deferred due only due to SPF or
> > > DKIM results indicating a temporary DNS error is appropriate.
> > 
> > If there's a transient DNS error getting the SPF policy, then there's no
> > SPF policy to be ignored.  That's quite a different situation.
> > 
> > > I think that in the case of a temporary DNS error in one of the lower
> > > level protocols, insufficient inputs are available to conclude a message
> > > has failed DMARC tests.
> > 
> > I agree.
> > 
> > > Receivers can either ignore DMARC for this message due to incomplete
> > > evaluation or they can defer the message in the hope that the temporary
> > > error will be resolved when the message is retried.  Receivers MUST NOT
> > > apply DMARC policy and reject or quarantine because the DMARC evaluation
> > > is
> > > incomplete.
> > 
> > Can you provide specific changes, with section numbers, that you'd like to
> > see applied to resolve this?
> 
> Here's my suggestion.  Replace this text at the end of section 5.6.2:
> 
>    Handling of messages for which SPF and/or DKIM evaluation encounters
>    a DNS error is left to the discretion of the Mail Receiver.  Further
>    discussion is available in Section 5.6.3.
> 
> with:
> 
>    Messages for which SPF and/or DKIM evaluation encounters a temporary
>    DNS error have not received a definitive result for steps 3 and/or 4
>    above.
>    If the message has not passed the the DMARC mechanism check due to
>    an SPF or DKIM check that did not have a DNS error, receivers can either
>    ignore DMARC for this message due to incomplete evaluation or they
>    can defer the message in the hope that the temporary error will be
>    resolved when the message is retried.  Receivers MUST NOT apply DMARC
>    policy and reject or quarantine the message because the DMARC
>    evaluation is incomplete. When otherwise appropriate due to DMARC
>    policy, receivers MAY send feedback reports regarding temporary errors.
> 
>    Handling of messages for which SPF and/or DKIM evaluation encounters
>    a permanent DNS error is left to the discretion of the Mail Receiver.
> 
> How's that?
> 
What about pointing it may be a security issue to let these messages through?
 


From nobody Wed Dec 24 21:02:47 2014
Return-Path: <superuser@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 83DA91A8701 for <dmarc@ietfa.amsl.com>; Wed, 24 Dec 2014 21:02:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cNyCnE9qCmLQ for <dmarc@ietfa.amsl.com>; Wed, 24 Dec 2014 21:02:43 -0800 (PST)
Received: from mail-wg0-x233.google.com (mail-wg0-x233.google.com [IPv6:2a00:1450:400c:c00::233]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 01CEA1A86F7 for <dmarc@ietf.org>; Wed, 24 Dec 2014 21:02:42 -0800 (PST)
Received: by mail-wg0-f51.google.com with SMTP id x12so12314808wgg.24 for <dmarc@ietf.org>; Wed, 24 Dec 2014 21:02:41 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=nZDWJXM9vY0cD8toTdCbA0V14W3tFP5qD+Uldi8MA+s=; b=lVtkARngrWYal9VVMMeaykdBBJ1QjKTWH6m/IvjVr4Gs+5rb2thYvj1+upUHEclYFj 0iHgcjxp4YL7mW3hrdIkF4aWTwNXjJGh9seZueqlt9HtpYZEuANNnp3/TbALRaIDtP6Y WCKRXOmWKVCNJ3VVj6LqbPMdH/NCcusnLTTXu/8UpbfhLSgCO+apWXmzqHT0uH8q5+PB Dy8IXhH/4qcFKa1WgEo2GO5NNRhcwd7wBTYXzKvQxoiupXayANIUKdlT0Q6QFlv/wMzU UN1+Owpi92mTErGEl3JX6WkLsjgVWazawq5jK/UO8ZuUxcX0jGwUN8US/i3und7XRpdC 4Y8w==
MIME-Version: 1.0
X-Received: by 10.194.200.234 with SMTP id jv10mr69823572wjc.110.1419483761767;  Wed, 24 Dec 2014 21:02:41 -0800 (PST)
Received: by 10.27.204.198 with HTTP; Wed, 24 Dec 2014 21:02:41 -0800 (PST)
In-Reply-To: <2397001.Fx3SqMl5ZI@scott-latitude-e6320>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <43288BDA-4BDD-4A18-A6DD-232BCFFDEB43@kitterman.com> <CAL0qLwamiZa1xqO5Zg2q3=yih6g3voV-0AcNb3D5gB7hJ=9azA@mail.gmail.com> <2397001.Fx3SqMl5ZI@scott-latitude-e6320>
Date: Thu, 25 Dec 2014 00:02:41 -0500
Message-ID: <CAL0qLwakLdWhHW+JbfQ=LO9yPSSOB=fH_oyLNMpGRPS_EAuudg@mail.gmail.com>
From: "Murray S. Kucherawy" <superuser@gmail.com>
To: Scott Kitterman <sklist@kitterman.com>
Content-Type: multipart/alternative; boundary=047d7bb70bb2627b5e050b035133
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/p4EM35XWFAT-SyMThmSP9b5s0bY
Cc: "dmarc@ietf.org" <dmarc@ietf.org>
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 25 Dec 2014 05:02:46 -0000

--047d7bb70bb2627b5e050b035133
Content-Type: text/plain; charset=UTF-8

On Wed, Dec 24, 2014 at 5:48 PM, Scott Kitterman <sklist@kitterman.com>
wrote:

>
>    Messages for which SPF and/or DKIM evaluation encounters a temporary
>    DNS error have not received a definitive result for steps 3 and/or 4
> above.
>    If the message has not passed the the DMARC mechanism check due to
>    an SPF or DKIM check that did not have a DNS error, receivers can either
>    ignore DMARC for this message due to incomplete evaluation or they
>    can defer the message in the hope that the temporary error will be
>    resolved when the message is retried.  Receivers MUST NOT apply DMARC
>    policy and reject or quarantine the message because the DMARC
>    evaluation is incomplete. When otherwise appropriate due to DMARC
>    policy, receivers MAY send feedback reports regarding temporary errors.
>
>    Handling of messages for which SPF and/or DKIM evaluation encounters
>    a permanent DNS error is left to the discretion of the Mail Receiver.
>
> How's that?
>

I think it pretty much says what's there, but is a lot more clear about
it.  I also think the second sentence is a bit convoluted, so I reworked it
into this.  Does it match what you're trying to say?

                <t> Messages for which SPF and/or DKIM evaluation encounters
                    a temporary DNS error have not received a definitive
                    result for steps 3 and/or 4 above.  When such an
evaluation
                    is done in conjunction with an aligned identifier,
                    completion of the DMARC algorithm is not possible.
                    In this case, receivers can either skip DMARC for this
                    message due to incomplete evaluation, or they can
arrange
                    to defer handling of the message in the hope that the
                    temporary error will be resolved when the message is
                    retried.  In any case, Receivers cannot apply DMARC
                    policy and reject or quarantine the message because the
                    DMARC evaluation is incomplete.  When otherwise
                    appropriate due to DMARC policy, receivers MAY send
                    feedback reports regarding temporary errors. </t>

-MSK

--047d7bb70bb2627b5e050b035133
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: base64

PGRpdiBkaXI9Imx0ciI+T24gV2VkLCBEZWMgMjQsIDIwMTQgYXQgNTo0OCBQTSwgU2NvdHQgS2l0
dGVybWFuIDxzcGFuIGRpcj0ibHRyIj4mbHQ7PGEgaHJlZj0ibWFpbHRvOnNrbGlzdEBraXR0ZXJt
YW4uY29tIiB0YXJnZXQ9Il9ibGFuayI+c2tsaXN0QGtpdHRlcm1hbi5jb208L2E+Jmd0Ozwvc3Bh
bj4gd3JvdGU6PGJyPjxkaXYgY2xhc3M9ImdtYWlsX2V4dHJhIj48ZGl2IGNsYXNzPSJnbWFpbF9x
dW90ZSI+PGJsb2NrcXVvdGUgY2xhc3M9ImdtYWlsX3F1b3RlIiBzdHlsZT0ibWFyZ2luOjBweCAw
cHggMHB4IDAuOGV4O2JvcmRlci1sZWZ0OjFweCBzb2xpZCByZ2IoMjA0LDIwNCwyMDQpO3BhZGRp
bmctbGVmdDoxZXgiPjxicj4NCsKgIMKgTWVzc2FnZXMgZm9yIHdoaWNoIFNQRiBhbmQvb3IgREtJ
TSBldmFsdWF0aW9uIGVuY291bnRlcnMgYSB0ZW1wb3Jhcnk8YnI+DQrCoCDCoEROUyBlcnJvciBo
YXZlIG5vdCByZWNlaXZlZCBhIGRlZmluaXRpdmUgcmVzdWx0IGZvciBzdGVwcyAzIGFuZC9vciA0
IGFib3ZlLjxicj4NCsKgIMKgSWYgdGhlIG1lc3NhZ2UgaGFzIG5vdCBwYXNzZWQgdGhlIHRoZSBE
TUFSQyBtZWNoYW5pc20gY2hlY2sgZHVlIHRvPGJyPg0KwqAgwqBhbiBTUEYgb3IgREtJTSBjaGVj
ayB0aGF0IGRpZCBub3QgaGF2ZSBhIEROUyBlcnJvciwgcmVjZWl2ZXJzIGNhbiBlaXRoZXI8YnI+
DQo8c3BhbiBjbGFzcz0iIj7CoCDCoGlnbm9yZSBETUFSQyBmb3IgdGhpcyBtZXNzYWdlIGR1ZSB0
byBpbmNvbXBsZXRlIGV2YWx1YXRpb24gb3IgdGhleTxicj4NCsKgIMKgY2FuIGRlZmVyIHRoZSBt
ZXNzYWdlIGluIHRoZSBob3BlIHRoYXQgdGhlIHRlbXBvcmFyeSBlcnJvciB3aWxsIGJlPGJyPg0K
wqAgwqByZXNvbHZlZCB3aGVuIHRoZSBtZXNzYWdlIGlzIHJldHJpZWQuwqAgUmVjZWl2ZXJzIE1V
U1QgTk9UIGFwcGx5IERNQVJDPGJyPg0KPC9zcGFuPsKgIMKgcG9saWN5IGFuZCByZWplY3Qgb3Ig
cXVhcmFudGluZSB0aGUgbWVzc2FnZSBiZWNhdXNlIHRoZSBETUFSQzxicj4NCsKgIMKgZXZhbHVh
dGlvbiBpcyBpbmNvbXBsZXRlLiBXaGVuIG90aGVyd2lzZSBhcHByb3ByaWF0ZSBkdWUgdG8gRE1B
UkM8YnI+DQrCoCDCoHBvbGljeSwgcmVjZWl2ZXJzIE1BWSBzZW5kIGZlZWRiYWNrIHJlcG9ydHMg
cmVnYXJkaW5nIHRlbXBvcmFyeSBlcnJvcnMuPGJyPg0KPHNwYW4gY2xhc3M9IiI+PGJyPg0KwqAg
wqBIYW5kbGluZyBvZiBtZXNzYWdlcyBmb3Igd2hpY2ggU1BGIGFuZC9vciBES0lNIGV2YWx1YXRp
b24gZW5jb3VudGVyczxicj4NCjwvc3Bhbj7CoCDCoGEgcGVybWFuZW50IEROUyBlcnJvciBpcyBs
ZWZ0IHRvIHRoZSBkaXNjcmV0aW9uIG9mIHRoZSBNYWlsIFJlY2VpdmVyLjxicj4NCjxicj4NCkhv
dyYjMzk7cyB0aGF0Pzxicj48L2Jsb2NrcXVvdGU+PGRpdj48YnI+PC9kaXY+PGRpdj5JIHRoaW5r
IGl0IHByZXR0eSBtdWNoIHNheXMgd2hhdCYjMzk7cyB0aGVyZSwgYnV0IGlzIGEgbG90IG1vcmUg
Y2xlYXIgYWJvdXQgaXQuwqAgSSBhbHNvIHRoaW5rIHRoZSBzZWNvbmQgc2VudGVuY2UgaXMgYSBi
aXQgY29udm9sdXRlZCwgc28gSSByZXdvcmtlZCBpdCBpbnRvIHRoaXMuwqAgRG9lcyBpdCBtYXRj
aCB3aGF0IHlvdSYjMzk7cmUgdHJ5aW5nIHRvIHNheT88YnI+PGJyPsKgwqDCoMKgwqDCoMKgwqDC
oMKgwqDCoMKgwqDCoCAmbHQ7dCZndDsgTWVzc2FnZXMgZm9yIHdoaWNoIFNQRiBhbmQvb3IgREtJ
TSBldmFsdWF0aW9uIGVuY291bnRlcnM8YnI+wqDCoMKgwqDCoMKgwqDCoMKgwqDCoMKgwqDCoMKg
wqDCoMKgwqAgYSB0ZW1wb3JhcnkgRE5TIGVycm9yIGhhdmUgbm90IHJlY2VpdmVkIGEgZGVmaW5p
dGl2ZTxicj7CoMKgwqDCoMKgwqDCoMKgwqDCoMKgwqDCoMKgwqDCoMKgwqDCoCByZXN1bHQgZm9y
IHN0ZXBzIDMgYW5kL29yIDQgYWJvdmUuwqAgV2hlbiBzdWNoIGFuIGV2YWx1YXRpb248YnI+wqDC
oMKgwqDCoMKgwqDCoMKgwqDCoMKgwqDCoMKgwqDCoMKgwqAgaXMgZG9uZSBpbiBjb25qdW5jdGlv
biB3aXRoIGFuIGFsaWduZWQgaWRlbnRpZmllciw8YnI+wqDCoMKgwqDCoMKgwqDCoMKgwqDCoMKg
wqDCoMKgwqDCoMKgwqAgY29tcGxldGlvbiBvZiB0aGUgRE1BUkMgYWxnb3JpdGhtIGlzIG5vdCBw
b3NzaWJsZS48YnI+wqDCoMKgwqDCoMKgwqDCoMKgwqDCoMKgwqDCoMKgwqDCoMKgwqAgSW4gdGhp
cyBjYXNlLCByZWNlaXZlcnMgY2FuIGVpdGhlciBza2lwIERNQVJDIGZvciB0aGlzPGJyPsKgwqDC
oMKgwqDCoMKgwqDCoMKgwqDCoMKgwqDCoMKgwqDCoMKgIG1lc3NhZ2UgZHVlIHRvIGluY29tcGxl
dGUgZXZhbHVhdGlvbiwgb3IgdGhleSBjYW4gYXJyYW5nZTxicj7CoMKgwqDCoMKgwqDCoMKgwqDC
oMKgwqDCoMKgwqDCoMKgwqDCoCB0byBkZWZlciBoYW5kbGluZyBvZiB0aGUgbWVzc2FnZSBpbiB0
aGUgaG9wZSB0aGF0IHRoZTxicj7CoMKgwqDCoMKgwqDCoMKgwqDCoMKgwqDCoMKgwqDCoMKgwqDC
oCB0ZW1wb3JhcnkgZXJyb3Igd2lsbCBiZSByZXNvbHZlZCB3aGVuIHRoZSBtZXNzYWdlIGlzPGJy
PsKgwqDCoMKgwqDCoMKgwqDCoMKgwqDCoMKgwqDCoMKgwqDCoMKgIHJldHJpZWQuwqAgSW4gYW55
IGNhc2UsIFJlY2VpdmVycyBjYW5ub3QgYXBwbHkgRE1BUkM8YnI+wqDCoMKgwqDCoMKgwqDCoMKg
wqDCoMKgwqDCoMKgwqDCoMKgwqAgcG9saWN5IGFuZCByZWplY3Qgb3IgcXVhcmFudGluZSB0aGUg
bWVzc2FnZSBiZWNhdXNlIHRoZTxicj7CoMKgwqDCoMKgwqDCoMKgwqDCoMKgwqDCoMKgwqDCoMKg
wqDCoCBETUFSQyBldmFsdWF0aW9uIGlzIGluY29tcGxldGUuwqAgV2hlbiBvdGhlcndpc2U8YnI+
wqDCoMKgwqDCoMKgwqDCoMKgwqDCoMKgwqDCoMKgwqDCoMKgwqAgYXBwcm9wcmlhdGUgZHVlIHRv
IERNQVJDIHBvbGljeSwgcmVjZWl2ZXJzIE1BWSBzZW5kPGJyPsKgwqDCoMKgwqDCoMKgwqDCoMKg
wqDCoMKgwqDCoMKgwqDCoMKgIGZlZWRiYWNrIHJlcG9ydHMgcmVnYXJkaW5nIHRlbXBvcmFyeSBl
cnJvcnMuICZsdDsvdCZndDs8YnI+PGJyPjwvZGl2PjxkaXY+LU1TSzxicj48L2Rpdj48L2Rpdj48
L2Rpdj48L2Rpdj4NCg==
--047d7bb70bb2627b5e050b035133--


From nobody Wed Dec 24 21:06:34 2014
Return-Path: <superuser@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C1B341A004E for <dmarc@ietfa.amsl.com>; Wed, 24 Dec 2014 21:06:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id esgDQkHxrG2N for <dmarc@ietfa.amsl.com>; Wed, 24 Dec 2014 21:06:29 -0800 (PST)
Received: from mail-wg0-x233.google.com (mail-wg0-x233.google.com [IPv6:2a00:1450:400c:c00::233]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EDCCD1A86F7 for <dmarc@ietf.org>; Wed, 24 Dec 2014 21:06:28 -0800 (PST)
Received: by mail-wg0-f51.google.com with SMTP id x12so12480329wgg.10 for <dmarc@ietf.org>; Wed, 24 Dec 2014 21:06:27 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=j9ksi2wRpEoO8CJdi77/Pgl/Stk1XuWb6DhRB4dGaHs=; b=sN3JwdJEPzTdYbwgAnwqaOuTJAePbQooBSym2P+Hpszr89ShCgPIQQv4tSgLPuuwsf xqsNLeI5VoFLbSLd0VV/5OaMcqDVJd7wlsQW3X1x1sXS7PI7QxowrRlI38/Az3X0Nwzu U3KJwte2tBH1wF+5SL0JulP2cE33ntwv+JqkVwuWX84Q8YpTPvktexR5cEmtvlc7hk4a 0ImevFDZ9v93Xvmcm2NV0DLgTcROTuNjtCiesyfvb3WgVCTh9RYYAQ8GcN7R/8SkMcKt 2u6nRtq/IvlUtMZn9h4o3uojOiIppLXcxw7bmhJqZ97mmNIHO38tQ7NOCJrIoK5rO5mX ilZQ==
MIME-Version: 1.0
X-Received: by 10.180.218.39 with SMTP id pd7mr57999013wic.21.1419483987705; Wed, 24 Dec 2014 21:06:27 -0800 (PST)
Received: by 10.27.204.198 with HTTP; Wed, 24 Dec 2014 21:06:27 -0800 (PST)
In-Reply-To: <549AE89A.9070203@dcrocker.net>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <5494A6F5.5020906@dcrocker.net> <CAL0qLwZthPfZ-22=yi2rrp_GKXK3igc=M8LhftxMx7GRUde7Dw@mail.gmail.com> <549ADA41.40005@dcrocker.net> <CAL0qLwYVmDL7kCOTkeDk5pMYCA4-y2Bxyi+7F8GPjaxmxmS6Gw@mail.gmail.com> <549AE89A.9070203@dcrocker.net>
Date: Thu, 25 Dec 2014 00:06:27 -0500
Message-ID: <CAL0qLwYNfUBXzBY521kjitTS-qGe9xdsXu5Vchi9xMgyFv443A@mail.gmail.com>
From: "Murray S. Kucherawy" <superuser@gmail.com>
To: Dave Crocker <dcrocker@bbiw.net>
Content-Type: multipart/alternative; boundary=001a1134cd58da05f6050b035e04
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/fRvsZpHpiHYZibvqEEHxsEWaM3s
Cc: "dmarc@ietf.org" <dmarc@ietf.org>
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 25 Dec 2014 05:06:32 -0000

--001a1134cd58da05f6050b035e04
Content-Type: text/plain; charset=UTF-8

On Wed, Dec 24, 2014 at 11:23 AM, Dave Crocker <dhc@dcrocker.net> wrote:

> The goal, as you state it, is at the level of seeking world peace.  It
> is very laudable and and very, very broad.  It covers vastly more than
> the scope of DMARC.
>
> DMARC is a specific bit of technology working towards that broader goal.
>  That something happens to fall within this very broad scope does not
> automatically justify documenting it within the much narrower scope of a
> detailed specification, unless it is part of that specification's
> technology.
>
> The MX record check has no /technical/ relationship to the /technical/
> details of DMARC.
>
> Please note that I'm not commenting on the efficacy of the record check,
> but on the need to document it in a place that makes sense for the full
> range of its implementers.
>
> There are, and will continue to be, plenty of operators using that check
> but not DMARC.  That simple fact provides a very pragmatic reason for
> moving its specification into some document outside of DMARC.
>

I'm surprised we're not hearing more passionate voices in favor of keeping
it given the genesis of the paragraph we're discussing.

At any rate, I'm going to take it out in -09, because I just discovered
that it's actually directly contradicting what Appendix A.4 says.

-MSK

--001a1134cd58da05f6050b035e04
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">On Wed, Dec 24, 2014 at 11:23 AM, Dave Crocker <span dir=
=3D"ltr">&lt;<a href=3D"mailto:dhc@dcrocker.net" target=3D"_blank">dhc@dcro=
cker.net</a>&gt;</span> wrote:<br><div class=3D"gmail_extra"><div class=3D"=
gmail_quote"><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;b=
order-left:1px #ccc solid;padding-left:1ex">The goal, as you state it, is a=
t the level of seeking world peace.=C2=A0 It<br>
is very laudable and and very, very broad.=C2=A0 It covers vastly more than=
<br>
the scope of DMARC.<br>
<br>
DMARC is a specific bit of technology working towards that broader goal.<br=
>
=C2=A0That something happens to fall within this very broad scope does not<=
br>
automatically justify documenting it within the much narrower scope of a<br=
>
detailed specification, unless it is part of that specification&#39;s<br>
technology.<br>
<br>
The MX record check has no /technical/ relationship to the /technical/<br>
details of DMARC.<br>
<br>
Please note that I&#39;m not commenting on the efficacy of the record check=
,<br>
but on the need to document it in a place that makes sense for the full<br>
range of its implementers.<br>
<br>
There are, and will continue to be, plenty of operators using that check<br=
>
but not DMARC.=C2=A0 That simple fact provides a very pragmatic reason for<=
br>
moving its specification into some document outside of DMARC.<br></blockquo=
te><div><br></div><div>I&#39;m surprised we&#39;re not hearing more passion=
ate voices in favor of keeping it given the genesis of the paragraph we&#39=
;re discussing.<br><br></div><div>At any rate, I&#39;m going to take it out=
 in -09, because I just discovered that it&#39;s actually directly contradi=
cting what Appendix A.4 says.<br><br>-MSK<br></div></div></div></div>

--001a1134cd58da05f6050b035e04--


From nobody Wed Dec 24 21:13:40 2014
Return-Path: <johnl@taugh.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2319A1A6FF0 for <dmarc@ietfa.amsl.com>; Wed, 24 Dec 2014 21:13:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.663
X-Spam-Level: *
X-Spam-Status: No, score=1.663 tagged_above=-999 required=5 tests=[BAYES_50=0.8, HELO_MISMATCH_COM=0.553, HOST_MISMATCH_NET=0.311, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oP0xChM-JoHw for <dmarc@ietfa.amsl.com>; Wed, 24 Dec 2014 21:13:30 -0800 (PST)
Received: from miucha.iecc.com (abusenet-1-pt.tunnel.tserv4.nyc4.ipv6.he.net [IPv6:2001:470:1f06:1126::2]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F16761A86F7 for <dmarc@ietf.org>; Wed, 24 Dec 2014 21:13:29 -0800 (PST)
Received: (qmail 86484 invoked from network); 25 Dec 2014 05:13:29 -0000
Received: from miucha.iecc.com (64.57.183.18) by mail1.iecc.com with QMQP; 25 Dec 2014 05:13:29 -0000
Date: 25 Dec 2014 05:13:06 -0000
Message-ID: <20141225051306.28725.qmail@ary.lan>
From: "John Levine" <johnl@taugh.com>
To: dmarc@ietf.org
In-Reply-To: <227572093.52751.1419470541903.JavaMail.zimbra@peachymango.org>
Organization: 
X-Headerized: yes
Mime-Version: 1.0
Content-type: text/plain; charset=utf-8
Content-transfer-encoding: 8bit
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/N-XokNJyBfl4cmq9j_ZbEBCp8T4
Cc: franck@peachymango.org
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 25 Dec 2014 05:13:33 -0000

>What about pointing it may be a security issue to let these messages through?

Only if we also point out that it may be a security issue not to let them through.

Seasons xmas,
John


From nobody Wed Dec 24 22:04:21 2014
Return-Path: <sklist@kitterman.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3A27C1A8718 for <dmarc@ietfa.amsl.com>; Wed, 24 Dec 2014 22:04:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.002
X-Spam-Level: 
X-Spam-Status: No, score=-2.002 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dg6X1d3yqpDe for <dmarc@ietfa.amsl.com>; Wed, 24 Dec 2014 22:04:14 -0800 (PST)
Received: from mailout03.controlledmail.com (mailout03.controlledmail.com [208.43.65.50]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8F29D1A004C for <dmarc@ietf.org>; Wed, 24 Dec 2014 22:04:13 -0800 (PST)
Received: from scott-latitude-e6320.localnet (unknown [76.92.231.124]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mailout03.controlledmail.com (Postfix) with ESMTPSA id EB535C40103; Thu, 25 Dec 2014 00:04:11 -0600 (CST)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=kitterman.com; s=201409; t=1419487452; bh=SOIFdGBnWIE++kh8in1ehWCQ0zPoYMsSb1c3d20XdLo=; h=From:To:Subject:Date:In-Reply-To:References:From; b=mZ4F/OZdkyHOqp9KHCoOgJ+neE7S7C2tHPeqHhhHprOvr7F7wlrLxQC/OBYAPAt+i Wc0QmpSn+0Uw7GA3Hz5IKg8zw9/W9M66XjSmECvG8QzbhlLfY9YPOQCizKAPqgL4B/ FA4Kn0Fvjfd+rFhq/wf092yGmVrkMz3Q+9F5lok8=
From: Scott Kitterman <sklist@kitterman.com>
To: dmarc@ietf.org
Date: Thu, 25 Dec 2014 01:04:08 -0500
Message-ID: <3560918.GJPr4VqMDe@scott-latitude-e6320>
User-Agent: KMail/4.13.3 (Linux/3.13.0-43-generic; KDE/4.13.3; x86_64; ; )
In-Reply-To: <227572093.52751.1419470541903.JavaMail.zimbra@peachymango.org>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <WM!3a05b513a5256b88630334d2c098191df85eb23d98c86fbb56de66f39b17c39fceee7ed8a586dcc64fa159d6c68098bc!@asav-1.01.com> <227572093.52751.1419470541903.JavaMail.zimbra@peachymango.org>
MIME-Version: 1.0
Content-Transfer-Encoding: 7Bit
Content-Type: text/plain; charset="us-ascii"
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/hUdNbNHwLzsabfrZyx8_WsUANiQ
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 25 Dec 2014 06:04:19 -0000

On Wednesday, December 24, 2014 19:22:21 Franck Martin wrote:
> ----- Original Message -----
> 
> > From: "Scott Kitterman" <sklist@kitterman.com>
> > To: dmarc@ietf.org
> > Sent: Wednesday, December 24, 2014 2:48:17 PM
> > Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
> > 
> > On Wednesday, December 24, 2014 10:46:42 Murray S. Kucherawy wrote:
> > > On Wed, Dec 24, 2014 at 4:04 AM, Scott Kitterman <sklist@kitterman.com>
> > > 
> > > wrote:
> > > > The draft strongly encourages DMARC implementers to ignore SPF policy,
> > > > so
> > > > I don't think assuming messages will be deferred due only due to SPF
> > > > or
> > > > DKIM results indicating a temporary DNS error is appropriate.
> > > 
> > > If there's a transient DNS error getting the SPF policy, then there's no
> > > SPF policy to be ignored.  That's quite a different situation.
> > > 
> > > > I think that in the case of a temporary DNS error in one of the lower
> > > > level protocols, insufficient inputs are available to conclude a
> > > > message
> > > > has failed DMARC tests.
> > > 
> > > I agree.
> > > 
> > > > Receivers can either ignore DMARC for this message due to incomplete
> > > > evaluation or they can defer the message in the hope that the
> > > > temporary
> > > > error will be resolved when the message is retried.  Receivers MUST
> > > > NOT
> > > > apply DMARC policy and reject or quarantine because the DMARC
> > > > evaluation
> > > > is
> > > > incomplete.
> > > 
> > > Can you provide specific changes, with section numbers, that you'd like
> > > to
> > > see applied to resolve this?
> > 
> > Here's my suggestion.  Replace this text at the end of section 5.6.2:
> >    Handling of messages for which SPF and/or DKIM evaluation encounters
> >    a DNS error is left to the discretion of the Mail Receiver.  Further
> >    discussion is available in Section 5.6.3.
> > 
> > with:
> >    Messages for which SPF and/or DKIM evaluation encounters a temporary
> >    DNS error have not received a definitive result for steps 3 and/or 4
> >    above.
> >    If the message has not passed the the DMARC mechanism check due to
> >    an SPF or DKIM check that did not have a DNS error, receivers can
> >    either
> >    ignore DMARC for this message due to incomplete evaluation or they
> >    can defer the message in the hope that the temporary error will be
> >    resolved when the message is retried.  Receivers MUST NOT apply DMARC
> >    policy and reject or quarantine the message because the DMARC
> >    evaluation is incomplete. When otherwise appropriate due to DMARC
> >    policy, receivers MAY send feedback reports regarding temporary errors.
> >    
> >    Handling of messages for which SPF and/or DKIM evaluation encounters
> >    a permanent DNS error is left to the discretion of the Mail Receiver.
> > 
> > How's that?
> 
> What about pointing it may be a security issue to let these messages
> through?

It's a security risk to let any messages through.  

What text would you suggest for an addition to security considerations?

Scott K


From nobody Wed Dec 24 22:08:22 2014
Return-Path: <sklist@kitterman.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9E6F31A008A for <dmarc@ietfa.amsl.com>; Wed, 24 Dec 2014 22:08:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.002
X-Spam-Level: 
X-Spam-Status: No, score=-2.002 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PKUlwUKwI-Et for <dmarc@ietfa.amsl.com>; Wed, 24 Dec 2014 22:08:16 -0800 (PST)
Received: from mailout03.controlledmail.com (mailout03.controlledmail.com [208.43.65.50]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A94BA1A8718 for <dmarc@ietf.org>; Wed, 24 Dec 2014 22:08:16 -0800 (PST)
Received: from scott-latitude-e6320.localnet (unknown [76.92.231.124]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mailout03.controlledmail.com (Postfix) with ESMTPSA id 8A84FC40103; Thu, 25 Dec 2014 00:08:15 -0600 (CST)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=kitterman.com; s=201409; t=1419487695; bh=vPDX6jX2ilpu6HMiH2jruZVCLful2De37WWXRw8oh44=; h=From:To:Subject:Date:In-Reply-To:References:From; b=iRKlzOLM3t4IJ1i1qOBcOMM/Voo1K940wd6X/iPhuMXjcgXxZkJF+4jqzpa0JDo0L JM+qTHE3mrJUWA97vtyFC+YwdPvpaYT6ZdA8kzGJb3Jd48NBtYqILSIN2i0nQPsdAA /s0uT6Z3HUfJ7qdnxz5oGGAmv1BD4ZD/o1ow9iHI=
From: Scott Kitterman <sklist@kitterman.com>
To: dmarc@ietf.org
Date: Thu, 25 Dec 2014 01:08:12 -0500
Message-ID: <3004337.MAocVZ5Co9@scott-latitude-e6320>
User-Agent: KMail/4.13.3 (Linux/3.13.0-43-generic; KDE/4.13.3; x86_64; ; )
In-Reply-To: <CAL0qLwakLdWhHW+JbfQ=LO9yPSSOB=fH_oyLNMpGRPS_EAuudg@mail.gmail.com>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <2397001.Fx3SqMl5ZI@scott-latitude-e6320> <CAL0qLwakLdWhHW+JbfQ=LO9yPSSOB=fH_oyLNMpGRPS_EAuudg@mail.gmail.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 7Bit
Content-Type: text/plain; charset="us-ascii"
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/y4JOUl7IhOYjgEkeAsTjFYJ99I4
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 25 Dec 2014 06:08:20 -0000

On Thursday, December 25, 2014 00:02:41 Murray S. Kucherawy wrote:
> On Wed, Dec 24, 2014 at 5:48 PM, Scott Kitterman <sklist@kitterman.com>
> 
> wrote:
> >    Messages for which SPF and/or DKIM evaluation encounters a temporary
> >    DNS error have not received a definitive result for steps 3 and/or 4
> > 
> > above.
> > 
> >    If the message has not passed the the DMARC mechanism check due to
> >    an SPF or DKIM check that did not have a DNS error, receivers can
> >    either
> >    ignore DMARC for this message due to incomplete evaluation or they
> >    can defer the message in the hope that the temporary error will be
> >    resolved when the message is retried.  Receivers MUST NOT apply DMARC
> >    policy and reject or quarantine the message because the DMARC
> >    evaluation is incomplete. When otherwise appropriate due to DMARC
> >    policy, receivers MAY send feedback reports regarding temporary errors.
> >    
> >    Handling of messages for which SPF and/or DKIM evaluation encounters
> >    a permanent DNS error is left to the discretion of the Mail Receiver.
> > 
> > How's that?
> 
> I think it pretty much says what's there, but is a lot more clear about
> it.  I also think the second sentence is a bit convoluted, so I reworked it
> into this.  Does it match what you're trying to say?
> 
>                 <t> Messages for which SPF and/or DKIM evaluation encounters
> a temporary DNS error have not received a definitive result for steps 3
> and/or 4 above.  When such an evaluation
>                     is done in conjunction with an aligned identifier,
>                     completion of the DMARC algorithm is not possible.
>                     In this case, receivers can either skip DMARC for this
>                     message due to incomplete evaluation, or they can
> arrange
>                     to defer handling of the message in the hope that the
>                     temporary error will be resolved when the message is
>                     retried.  In any case, Receivers cannot apply DMARC
>                     policy and reject or quarantine the message because the
>                     DMARC evaluation is incomplete.  When otherwise
>                     appropriate due to DMARC policy, receivers MAY send
>                     feedback reports regarding temporary errors. </t>
> 
> -MSK

I don't think it does.  What I was trying to say is that if you already got an 
aligned pass from one method, you're done.  It doesn't matter if they other 
one gets a DNS error, you already have a definitive result.  I don't think your 
text says that, but I may be wrong.

Also, I don't like the change from MUST NOT to cannot.  Receivers can do 
whatever they want, so cannot isn't correct.  This bit is meant to say that 
receivers aren't free to use DMARC as an excuse to throw away messages every 
time there's a DNS hiccup.  Applying policy in an inappropriate way does have 
an interoperability impact (messages quarantined/rejected that should not be), 
so I think the MUST NOT is appropriate.

Scott K


From nobody Thu Dec 25 18:43:33 2014
Return-Path: <superuser@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 357081A1B66 for <dmarc@ietfa.amsl.com>; Thu, 25 Dec 2014 18:43:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JdNumaAeMpeo for <dmarc@ietfa.amsl.com>; Thu, 25 Dec 2014 18:43:31 -0800 (PST)
Received: from mail-wi0-x22c.google.com (mail-wi0-x22c.google.com [IPv6:2a00:1450:400c:c05::22c]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0FABA1A1B5E for <dmarc@ietf.org>; Thu, 25 Dec 2014 18:43:31 -0800 (PST)
Received: by mail-wi0-f172.google.com with SMTP id n3so16264096wiv.17 for <dmarc@ietf.org>; Thu, 25 Dec 2014 18:43:29 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=RmTwhrJ8Dut6IZVLV4doH4doCZbie4E0KbKaOpkuhfY=; b=ZvC/QPI7XXS5X2+TIdV+b8unG2SxPltUFeRwvLsafBRyoIThKRnvhxqSsXaj7UvI+U FkJ3q6b09uxYVg7by2Asn340urd/CS+7+MXKFKBu++//ANo0RJ2aU3ISP9tRHZqdxU/Q KjQkUbUIv0EWJGVjb2zSqi9kg/sXPgGJ2AHcBQa5kY7Mjkm/UVVWrLgzLjZrL5VbrKvM N3+gjJEfHWGW2aIFHwizfCTZLXEpMKX6om7I7+YeGbgTjvRhEf/gkDCYxDlIWdUtvxz1 PPJG2ySKPbVZ4LoZ1UmVYn5+vi4a4phJJpmkRxnMq7hoiC44qcAgV16XuUXFPB9TGB0o UzxA==
MIME-Version: 1.0
X-Received: by 10.194.86.135 with SMTP id p7mr77749548wjz.89.1419561809811; Thu, 25 Dec 2014 18:43:29 -0800 (PST)
Received: by 10.27.204.198 with HTTP; Thu, 25 Dec 2014 18:43:29 -0800 (PST)
In-Reply-To: <3004337.MAocVZ5Co9@scott-latitude-e6320>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <2397001.Fx3SqMl5ZI@scott-latitude-e6320> <CAL0qLwakLdWhHW+JbfQ=LO9yPSSOB=fH_oyLNMpGRPS_EAuudg@mail.gmail.com> <3004337.MAocVZ5Co9@scott-latitude-e6320>
Date: Thu, 25 Dec 2014 21:43:29 -0500
Message-ID: <CAL0qLwYqmVZdW_XivU0=Vr7itDvfw_0+qm7dthN9nJYXDZK2bg@mail.gmail.com>
From: "Murray S. Kucherawy" <superuser@gmail.com>
To: Scott Kitterman <sklist@kitterman.com>
Content-Type: multipart/alternative; boundary=089e0102e498691d2a050b157d43
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/3Swt7hO8vJ8184sle3C4DEASqsg
Cc: "dmarc@ietf.org" <dmarc@ietf.org>
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 26 Dec 2014 02:43:33 -0000

--089e0102e498691d2a050b157d43
Content-Type: text/plain; charset=UTF-8

On Thu, Dec 25, 2014 at 1:08 AM, Scott Kitterman <sklist@kitterman.com>
wrote:

> I don't think it does.  What I was trying to say is that if you already
> got an
> aligned pass from one method, you're done.  It doesn't matter if they other
> one gets a DNS error, you already have a definitive result.  I don't think
> your
> text says that, but I may be wrong.
>

I think it's close.  I see the distinction you're making, and I've
adjusted.  Have a look at the diff now:
http://www.blackops.org/~msk/dmarc/diff.html

Also, I don't like the change from MUST NOT to cannot.  Receivers can do
> whatever they want, so cannot isn't correct.  This bit is meant to say that
> receivers aren't free to use DMARC as an excuse to throw away messages
> every
> time there's a DNS hiccup.  Applying policy in an inappropriate way does
> have
> an interoperability impact (messages quarantined/rejected that should not
> be),
> so I think the MUST NOT is appropriate.
>

I think "cannot" does do that, actually.  We're saying here that DMARC
can't complete for the case you describe, namely where both SPF and DKIM
suffered some kind of transient error.  In that case, if you're rejecting,
you aren't legitimately doing it in the name of DMARC.

I'm deliberately avoiding using new RFC2119 language here because it's way
too late to be adding major normative goo.  These are supposed to be
corrections to existing text, not addressing oversights in the protocol
itself.  If we got this wrong in the base spec, then it's potential
material for a standards track revision.  Otherwise, if we start down the
path of fixing things, we're never going to be done with this version.

(Pete and Barry would also point out here that it's possible for normative
language to exist without using RFC2119's key words...)

-MSK

--089e0102e498691d2a050b157d43
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">On Thu, Dec 25, 2014 at 1:08 AM, Scott Kitterman <span dir=
=3D"ltr">&lt;<a href=3D"mailto:sklist@kitterman.com" target=3D"_blank">skli=
st@kitterman.com</a>&gt;</span> wrote:<br><div class=3D"gmail_extra"><div c=
lass=3D"gmail_quote"><blockquote class=3D"gmail_quote" style=3D"margin:0px =
0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div=
 class=3D""><div class=3D"h5">I don&#39;t think it does.=C2=A0 What I was t=
rying to say is that if you already got an<br></div></div>
aligned pass from one method, you&#39;re done.=C2=A0 It doesn&#39;t matter =
if they other<br>
one gets a DNS error, you already have a definitive result.=C2=A0 I don&#39=
;t think your<br>
text says that, but I may be wrong.<br></blockquote><div><br></div><div>I t=
hink it&#39;s close.=C2=A0 I see the distinction you&#39;re making, and I&#=
39;ve adjusted.=C2=A0 Have a look at the diff now:<br><a href=3D"http://www=
.blackops.org/~msk/dmarc/diff.html">http://www.blackops.org/~msk/dmarc/diff=
.html</a><br><br></div><blockquote class=3D"gmail_quote" style=3D"margin:0p=
x 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
Also, I don&#39;t like the change from MUST NOT to cannot.=C2=A0 Receivers =
can do<br>
whatever they want, so cannot isn&#39;t correct.=C2=A0 This bit is meant to=
 say that<br>
receivers aren&#39;t free to use DMARC as an excuse to throw away messages =
every<br>
time there&#39;s a DNS hiccup.=C2=A0 Applying policy in an inappropriate wa=
y does have<br>
an interoperability impact (messages quarantined/rejected that should not b=
e),<br>
so I think the MUST NOT is appropriate.<br></blockquote><div><br></div><div=
>I think &quot;cannot&quot; does do that, actually.=C2=A0 We&#39;re saying =
here that DMARC can&#39;t complete for the case you describe, namely where =
both SPF and DKIM suffered some kind of transient error.=C2=A0 In that case=
, if you&#39;re rejecting, you aren&#39;t legitimately doing it in the name=
 of DMARC.<br><br>I&#39;m deliberately avoiding using new RFC2119 language =
here because it&#39;s way too late to be adding major normative goo.=C2=A0 =
These are supposed to be corrections to existing text, not addressing overs=
ights in the protocol itself.=C2=A0 If we got this wrong in the base spec, =
then it&#39;s potential material for a standards track revision.=C2=A0 Othe=
rwise, if we start down the path of fixing things, we&#39;re never going to=
 be done with this version.<br><br></div><div>(Pete and Barry would also po=
int out here that it&#39;s possible for normative language to exist without=
 using RFC2119&#39;s key words...)<br></div><div><br></div><div>-MSK<br></d=
iv></div></div></div>

--089e0102e498691d2a050b157d43--


From nobody Thu Dec 25 18:46:54 2014
Return-Path: <superuser@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 84BE01A1B6F for <dmarc@ietfa.amsl.com>; Thu, 25 Dec 2014 18:46:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id f6JM9pzuElrk for <dmarc@ietfa.amsl.com>; Thu, 25 Dec 2014 18:46:49 -0800 (PST)
Received: from mail-wg0-x22b.google.com (mail-wg0-x22b.google.com [IPv6:2a00:1450:400c:c00::22b]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 946661A1B5E for <dmarc@ietf.org>; Thu, 25 Dec 2014 18:46:49 -0800 (PST)
Received: by mail-wg0-f43.google.com with SMTP id l18so13892387wgh.2 for <dmarc@ietf.org>; Thu, 25 Dec 2014 18:46:48 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=uGVz7XV/HZU4a7I/cLILzflbDseNeU2Gm914apW2XuM=; b=IaROaEGs/45nhvcxOhOBtidKFq4XH5yryJfddpNZQd4CjUGJo+1hatN7LjNwDO52F8 wKWv0oreJyQ9SwF5qwUjfOV4+aJIeTfiQ/ebDSpP5quPfGu0rJFfhEj1RACObpxOc8LN 0sQevJXDkbWpucAZ5/GOiYaa8gTAUXv2P3VwIltn/SXc+cp4B/snTlWvRNHfXiYUaM1O 07QOlIeceJH+aOusJemzjvLVy1EinVjYa0ctZ1u7kZkrbnD9pL69G0HBkb9LraBYAy2N QQkbE+c13TbJnekSyNainD4za+NtWrub56nX/BZdVcExc2QxZkqGKZiPc1O+G8TT9E/w Z37g==
MIME-Version: 1.0
X-Received: by 10.194.200.234 with SMTP id jv10mr78236130wjc.110.1419562008340;  Thu, 25 Dec 2014 18:46:48 -0800 (PST)
Received: by 10.27.204.198 with HTTP; Thu, 25 Dec 2014 18:46:48 -0800 (PST)
In-Reply-To: <549AE89A.9070203@dcrocker.net>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <5494A6F5.5020906@dcrocker.net> <CAL0qLwZthPfZ-22=yi2rrp_GKXK3igc=M8LhftxMx7GRUde7Dw@mail.gmail.com> <549ADA41.40005@dcrocker.net> <CAL0qLwYVmDL7kCOTkeDk5pMYCA4-y2Bxyi+7F8GPjaxmxmS6Gw@mail.gmail.com> <549AE89A.9070203@dcrocker.net>
Date: Thu, 25 Dec 2014 21:46:48 -0500
Message-ID: <CAL0qLwa65h+iH_ixSFNbBLUNTw0-u1EVWdOmpNJh-EOKmgFwdw@mail.gmail.com>
From: "Murray S. Kucherawy" <superuser@gmail.com>
To: Dave Crocker <dcrocker@bbiw.net>
Content-Type: multipart/alternative; boundary=047d7bb70bb23e70db050b158930
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/84DvPGJfsPZoWUv4te_zqBnpavY
Cc: "dmarc@ietf.org" <dmarc@ietf.org>
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 26 Dec 2014 02:46:51 -0000

--047d7bb70bb23e70db050b158930
Content-Type: text/plain; charset=UTF-8

On Wed, Dec 24, 2014 at 11:23 AM, Dave Crocker <dhc@dcrocker.net> wrote:

> > This paragraph appears in the DMARC spec because the operators
> > participating all agreed that it should be part-and-parcel of this
> > operating profile of email.  It's not as happenstance as this sounds so
> > far; the very thrust of DMARC is to make the From: content believable,
> > and permitting a nonexistent domain name to make it to the inbox
> > contradicts that goal.
>
>
> The goal, as you state it, is at the level of seeking world peace.  It
> is very laudable and and very, very broad.  It covers vastly more than
> the scope of DMARC.
>
> DMARC is a specific bit of technology working towards that broader goal.
>  That something happens to fall within this very broad scope does not
> automatically justify documenting it within the much narrower scope of a
> detailed specification, unless it is part of that specification's
> technology.
>
> The MX record check has no /technical/ relationship to the /technical/
> details of DMARC.
>
> Please note that I'm not commenting on the efficacy of the record check,
> but on the need to document it in a place that makes sense for the full
> range of its implementers.
>
> There are, and will continue to be, plenty of operators using that check
> but not DMARC.  That simple fact provides a very pragmatic reason for
> moving its specification into some document outside of DMARC.
>

Although I've already removed the paragraph under discussion, one more
point occurred to me:

There was text in there until recently that required rejection of messages
with multi-valued From: fields.  People complained about this, and so we
backed that down to "are typically rejected" (removing RFC2119 language),
and that seems to have satisfied the critics; as I understand it, this
works under the "profile" argument I made earlier.

How would this be any different?

-MSK

--047d7bb70bb23e70db050b158930
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">On Wed, Dec 24, 2014 at 11:23 AM, Dave Crocker <span dir=
=3D"ltr">&lt;<a href=3D"mailto:dhc@dcrocker.net" target=3D"_blank">dhc@dcro=
cker.net</a>&gt;</span> wrote:<br><div class=3D"gmail_extra"><div class=3D"=
gmail_quote"><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;b=
order-left:1px #ccc solid;padding-left:1ex"><span class=3D"">&gt; This para=
graph appears in the DMARC spec because the operators<br>
&gt; participating all agreed that it should be part-and-parcel of this<br>
&gt; operating profile of email.=C2=A0 It&#39;s not as happenstance as this=
 sounds so<br>
&gt; far; the very thrust of DMARC is to make the From: content believable,=
<br>
&gt; and permitting a nonexistent domain name to make it to the inbox<br>
&gt; contradicts that goal.<br>
<br>
<br>
</span>The goal, as you state it, is at the level of seeking world peace.=
=C2=A0 It<br>
is very laudable and and very, very broad.=C2=A0 It covers vastly more than=
<br>
the scope of DMARC.<br>
<br>
DMARC is a specific bit of technology working towards that broader goal.<br=
>
=C2=A0That something happens to fall within this very broad scope does not<=
br>
automatically justify documenting it within the much narrower scope of a<br=
>
detailed specification, unless it is part of that specification&#39;s<br>
technology.<br>
<br>
The MX record check has no /technical/ relationship to the /technical/<br>
details of DMARC.<br>
<br>
Please note that I&#39;m not commenting on the efficacy of the record check=
,<br>
but on the need to document it in a place that makes sense for the full<br>
range of its implementers.<br>
<br>
There are, and will continue to be, plenty of operators using that check<br=
>
but not DMARC.=C2=A0 That simple fact provides a very pragmatic reason for<=
br>
moving its specification into some document outside of DMARC.<br></blockquo=
te><div><br></div><div>Although I&#39;ve already removed the paragraph unde=
r discussion, one more point occurred to me:<br><br></div><div>There was te=
xt in there until recently that required rejection of messages with multi-v=
alued From: fields.=C2=A0 People complained about this, and so we backed th=
at down to &quot;are typically rejected&quot; (removing RFC2119 language), =
and that seems to have satisfied the critics; as I understand it, this work=
s under the &quot;profile&quot; argument I made earlier.<br><br>How would t=
his be any different?<br><br>-MSK<br></div></div></div></div>

--047d7bb70bb23e70db050b158930--


From nobody Thu Dec 25 19:15:28 2014
Return-Path: <dcrocker@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5D79D1A1BD7 for <dmarc@ietfa.amsl.com>; Thu, 25 Dec 2014 19:15:26 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level: 
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SOQGN74-3sse for <dmarc@ietfa.amsl.com>; Thu, 25 Dec 2014 19:15:24 -0800 (PST)
Received: from mail-qa0-x235.google.com (mail-qa0-x235.google.com [IPv6:2607:f8b0:400d:c00::235]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7A5F31A1B9C for <dmarc@ietf.org>; Thu, 25 Dec 2014 19:15:24 -0800 (PST)
Received: by mail-qa0-f53.google.com with SMTP id j7so6878575qaq.12 for <dmarc@ietf.org>; Thu, 25 Dec 2014 19:15:23 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=message-id:date:from:user-agent:mime-version:to:cc:subject :references:in-reply-to:content-type:content-transfer-encoding; bh=68WXV1X4j/rnkOGE2LMwyifs2gUHERI9842kFsPEYLk=; b=CC+1qHsGPffkRmGcNpFKj5xfDwIkSiTgEV+YZReCihbUg+/Ei4oyJyZhrWWmEKlZvt yQfSgMkgr6fI9Gt1Z2IucoFNz65rUkNVsCxKbK93X2upAKBxXBb9cZaDra9/PDKHJQSL yjY0lwc5FjB8Bd5SlNy/Riwi1Fvo5E1GD2d3nI4cOosbEeRAysNw0fZj38Stmoi9zBZh Un/tjFgkbH9rX8HJRfucmrVlwkP1mQFsjTMvJKz0g1OCuU/fJG9Z4Kc400Q1xRNlNqLl Ot706ixtJhj4HTSF/dBT5QdVHBKOB0qGqemPabgDXtgtWuvi5VYUZpBIuYpIMQXjoG5g wXRA==
X-Received: by 10.224.136.194 with SMTP id s2mr66458888qat.82.1419563723649; Thu, 25 Dec 2014 19:15:23 -0800 (PST)
Received: from [192.168.1.66] (76-218-8-156.lightspeed.sntcca.sbcglobal.net. [76.218.8.156]) by mx.google.com with ESMTPSA id t2sm25128454qae.6.2014.12.25.19.15.22 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 25 Dec 2014 19:15:23 -0800 (PST)
Message-ID: <549CD2B8.5060905@gmail.com>
Date: Thu, 25 Dec 2014 19:15:04 -0800
From: Dave Crocker <dcrocker@gmail.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Thunderbird/31.3.0
MIME-Version: 1.0
To: "Murray S. Kucherawy" <superuser@gmail.com>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <5494A6F5.5020906@dcrocker.net> <CAL0qLwZthPfZ-22=yi2rrp_GKXK3igc=M8LhftxMx7GRUde7Dw@mail.gmail.com> <549ADA41.40005@dcrocker.net> <CAL0qLwYVmDL7kCOTkeDk5pMYCA4-y2Bxyi+7F8GPjaxmxmS6Gw@mail.gmail.com> <549AE89A.9070203@dcrocker.net> <CAL0qLwa65h+iH_ixSFNbBLUNTw0-u1EVWdOmpNJh-EOKmgFwdw@mail.gmail.com>
In-Reply-To: <CAL0qLwa65h+iH_ixSFNbBLUNTw0-u1EVWdOmpNJh-EOKmgFwdw@mail.gmail.com>
Content-Type: text/plain; charset=windows-1252
Content-Transfer-Encoding: 7bit
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/xWWCf1YPP_xaW8fmUPiURypZ0_c
Cc: "dmarc@ietf.org" <dmarc@ietf.org>
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 26 Dec 2014 03:15:26 -0000

On 12/25/2014 6:46 PM, Murray S. Kucherawy wrote:
> Although I've already removed the paragraph under discussion, one more
> point occurred to me:
> 
> There was text in there until recently that required rejection of
> messages with multi-valued From: fields.  People complained about this,
> and so we backed that down to "are typically rejected" (removing RFC2119
> language), and that seems to have satisfied the critics; as I understand
> it, this works under the "profile" argument I made earlier.


I'm pretty sure that the horse is well into the glue stage, but just in
case...

Making modifications to basic, underlying specifications, is a difficult
and potentially dangerous game.

One could argue either way about the multi-valued From:, but at least it
has an essential relationship to DMARC, since DMARC evaluates From:.  If
DMARC were required to handle multi-valued From:, it would alter DMARC
noticeable, as was evident in the debate about this issue.

The MX requirement has no such linkage.

d/

-- 
Dave Crocker
Brandenburg InternetWorking
bbiw.net


From nobody Thu Dec 25 20:30:37 2014
Return-Path: <superuser@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 65DA21A1C02 for <dmarc@ietfa.amsl.com>; Thu, 25 Dec 2014 20:30:36 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 37qlldlAt2PD for <dmarc@ietfa.amsl.com>; Thu, 25 Dec 2014 20:30:34 -0800 (PST)
Received: from mail-wi0-x22a.google.com (mail-wi0-x22a.google.com [IPv6:2a00:1450:400c:c05::22a]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 85D461A1BFE for <dmarc@ietf.org>; Thu, 25 Dec 2014 20:30:34 -0800 (PST)
Received: by mail-wi0-f170.google.com with SMTP id bs8so18343223wib.5 for <dmarc@ietf.org>; Thu, 25 Dec 2014 20:30:33 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=jXbx21fPe82co4+Aj1ZwSQdZBrc8MLnaJytWWraxIq4=; b=a+s3mzDb1t7pLX8HlgQX03kJMssSS6xR7NvwH0M2BTBGrdXYod/CXgDru8iOkxqloc bnyGc9b8e1nCuINVDl4EWgkYIrVyjuEmW7C0mStDGuq5VCTDoa3H3kaCWO4idmy2eJc0 7oAfZ/CO9JUXXIHj7Yb3HJjZh7TZbv7q6wv4fGRMD+tvNGtBhmglgPyFwn4zLsnBib2v KRZoYvKbkLNC39AyKOFui58fPNxAaJmiBDBRonBTTKFvTdw8hTa+FsfhyMMBMG5aRgED KRRlEUo/Q3sv44P2FUTHBCYEwSO3sWerIhTj2dQEIRhE86ekZsaEy1GP5ZMWp/mUawyv tB6g==
MIME-Version: 1.0
X-Received: by 10.194.200.234 with SMTP id jv10mr78753098wjc.110.1419568233315;  Thu, 25 Dec 2014 20:30:33 -0800 (PST)
Received: by 10.27.204.198 with HTTP; Thu, 25 Dec 2014 20:30:32 -0800 (PST)
In-Reply-To: <549CD2B8.5060905@gmail.com>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <5494A6F5.5020906@dcrocker.net> <CAL0qLwZthPfZ-22=yi2rrp_GKXK3igc=M8LhftxMx7GRUde7Dw@mail.gmail.com> <549ADA41.40005@dcrocker.net> <CAL0qLwYVmDL7kCOTkeDk5pMYCA4-y2Bxyi+7F8GPjaxmxmS6Gw@mail.gmail.com> <549AE89A.9070203@dcrocker.net> <CAL0qLwa65h+iH_ixSFNbBLUNTw0-u1EVWdOmpNJh-EOKmgFwdw@mail.gmail.com> <549CD2B8.5060905@gmail.com>
Date: Thu, 25 Dec 2014 23:30:32 -0500
Message-ID: <CAL0qLwbP3-7SzX3e3dnXwF5EtNAQLVa8Bqsj+sJZT1MqBeRFQw@mail.gmail.com>
From: "Murray S. Kucherawy" <superuser@gmail.com>
To: Dave Crocker <dcrocker@gmail.com>
Content-Type: multipart/alternative; boundary=047d7bb70bb24805b6050b16fc31
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/CMup9S-KPQ7-L1y7v5cdh4zzwgg
Cc: "dmarc@ietf.org" <dmarc@ietf.org>
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 26 Dec 2014 04:30:36 -0000

--047d7bb70bb24805b6050b16fc31
Content-Type: text/plain; charset=UTF-8

On Thu, Dec 25, 2014 at 10:15 PM, Dave Crocker <dcrocker@gmail.com> wrote:

> One could argue either way about the multi-valued From:, but at least it
> has an essential relationship to DMARC, since DMARC evaluates From:.  If
> DMARC were required to handle multi-valued From:, it would alter DMARC
> noticeable, as was evident in the debate about this issue.
>
> The MX requirement has no such linkage.
>

I'm afraid the glue is still too thick.  Fortunately at this point, this is
all academic.

I'm staring at this and not understanding how the two are all that
different.  They both seek to ensure that a DMARC evaluation can be done on
the From: domain, and thus both seek to ensure that the From: that lands in
the inbox can be trusted by end users to be valid.

In both cases, as you put it, DMARC evaluates From:.  The only difference I
can see is that one is a self-contained syntactical check while the other
requires consulting another data source (the DNS, in this case) for a
simple validity test.

If the MX/A/AAAA test fails, then there's no policy to apply.  We [used to]
reject on the basis that it's impossible for that message to legitimately
exist.

If the single-value From: test fails, then which domain's policy is to be
applied is potentially indeterminate.  We [still, typically] reject on the
basis that it's impossible to be sure which domain the end user will see,
and thus decide which policy should apply.  DMARC participants don't like
that case and (we claim) protected mail streams never use that syntax
anyway, so we disallow its use for those cases.

To me they have approximately identical goals.  If the MX test can
legitimately be dismissed because it aspires to world peace, why shouldn't
the other?

Anyway, I'm content at this point to leave this for the standards track
discussion when the WG gets around to it.  I'll remain quietly confused
until then.

-MSK

--047d7bb70bb24805b6050b16fc31
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">On Thu, Dec 25, 2014 at 10:15 PM, Dave Crocker <span dir=
=3D"ltr">&lt;<a href=3D"mailto:dcrocker@gmail.com" target=3D"_blank">dcrock=
er@gmail.com</a>&gt;</span> wrote:<br><div class=3D"gmail_extra"><div class=
=3D"gmail_quote"><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8=
ex;border-left:1px #ccc solid;padding-left:1ex">One could argue either way =
about the multi-valued From:, but at least it<br>
has an essential relationship to DMARC, since DMARC evaluates From:.=C2=A0 =
If<br>
DMARC were required to handle multi-valued From:, it would alter DMARC<br>
noticeable, as was evident in the debate about this issue.<br>
<br>
The MX requirement has no such linkage.<br></blockquote><div><br></div><div=
>I&#39;m afraid the glue is still too thick.=C2=A0 Fortunately at this poin=
t, this is all academic.<br></div><div><br></div>I&#39;m staring at this an=
d not understanding how the two are all that different.=C2=A0 They both see=
k to ensure that a DMARC evaluation can be done on the From: domain, and th=
us both seek to ensure that the From: that lands in the inbox can be truste=
d by end users to be valid.<br><br></div><div class=3D"gmail_quote">In both=
 cases, as you put it, DMARC evaluates From:.=C2=A0 The only difference I c=
an see is that one is a self-contained syntactical check while the other re=
quires consulting another data source (the DNS, in this case) for a simple =
validity test.<br></div><div class=3D"gmail_quote"><br></div><div class=3D"=
gmail_quote">If the MX/A/AAAA test fails, then there&#39;s no policy to app=
ly.=C2=A0 We [used to] reject on the basis that it&#39;s impossible for tha=
t message to legitimately exist.<br><br>If the single-value From: test fail=
s, then which domain&#39;s policy is to be applied is potentially indetermi=
nate.=C2=A0 We [still, typically] reject on the basis that it&#39;s impossi=
ble to be sure which domain the end user will see, and thus decide which po=
licy should apply.=C2=A0 DMARC participants don&#39;t like that case and (w=
e claim) protected mail streams never use that syntax anyway, so we disallo=
w its use for those cases.<br><br></div><div class=3D"gmail_quote">To me th=
ey have approximately identical goals.=C2=A0 If the MX test can legitimatel=
y be dismissed because it aspires to world peace, why shouldn&#39;t the oth=
er?<br><br></div><div class=3D"gmail_quote">Anyway, I&#39;m content at this=
 point to leave this for the standards track discussion when the WG gets ar=
ound to it.=C2=A0 I&#39;ll remain quietly confused until then.<br><br></div=
><div class=3D"gmail_quote">-MSK<br></div></div></div>

--047d7bb70bb24805b6050b16fc31--


From nobody Thu Dec 25 20:55:00 2014
Return-Path: <sklist@kitterman.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 657671A1DFA for <dmarc@ietfa.amsl.com>; Thu, 25 Dec 2014 20:54:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.002
X-Spam-Level: 
X-Spam-Status: No, score=-2.002 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PgHGAWolECNI for <dmarc@ietfa.amsl.com>; Thu, 25 Dec 2014 20:54:56 -0800 (PST)
Received: from mailout03.controlledmail.com (mailout03.controlledmail.com [208.43.65.50]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6ADDE1A1DBC for <dmarc@ietf.org>; Thu, 25 Dec 2014 20:54:56 -0800 (PST)
Received: from [192.168.1.113] (unknown [76.92.231.124]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mailout03.controlledmail.com (Postfix) with ESMTPSA id B8117C40103; Thu, 25 Dec 2014 22:54:54 -0600 (CST)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=kitterman.com; s=201409; t=1419569695; bh=xa0rdt1iM0QF2pQbN7cEf35z+JvtR3HRnenTXVrxoFg=; h=In-Reply-To:References:Subject:From:Date:To:From; b=L6fLG0ZkeifxSDMOpWJ7zUskElTEJ5eyVJGCfEwiGhSI42M0hXSNfrsZ9zvgu9RBP FjwG8uz1fdPtGH4mVJQC0yEV+hz+EjD+8CUcujwjXuyP75/SE5TfPHI2C06ngOZxj5 d8aYO2A+pHuhRqsFmr+flWUBKJIUGTUmCqPB7wlQ=
User-Agent: K-9 Mail for Android
In-Reply-To: <CAL0qLwYqmVZdW_XivU0=Vr7itDvfw_0+qm7dthN9nJYXDZK2bg@mail.gmail.com>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <2397001.Fx3SqMl5ZI@scott-latitude-e6320> <CAL0qLwakLdWhHW+JbfQ=LO9yPSSOB=fH_oyLNMpGRPS_EAuudg@mail.gmail.com> <3004337.MAocVZ5Co9@scott-latitude-e6320> <CAL0qLwYqmVZdW_XivU0=Vr7itDvfw_0+qm7dthN9nJYXDZK2bg@mail.gmail.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
Content-Type: text/plain; charset=UTF-8
From: Scott Kitterman <sklist@kitterman.com>
Date: Thu, 25 Dec 2014 22:54:52 -0600
To: "dmarc@ietf.org" <dmarc@ietf.org>
Message-ID: <66CEE14F-375D-4FE9-9485-6DFE58911E54@kitterman.com>
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/u1tOa_x8_X1OffKCsJPra505qAo
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 26 Dec 2014 04:54:58 -0000

On December 25, 2014 8:43:29 PM CST, "Murray S. Kucherawy" <superuser@gmail.com> wrote:
>On Thu, Dec 25, 2014 at 1:08 AM, Scott Kitterman <sklist@kitterman.com>
>wrote:
>
>> I don't think it does.  What I was trying to say is that if you
>already
>> got an
>> aligned pass from one method, you're done.  It doesn't matter if they
>other
>> one gets a DNS error, you already have a definitive result.  I don't
>think
>> your
>> text says that, but I may be wrong.
>>
>
>I think it's close.  I see the distinction you're making, and I've
>adjusted.  Have a look at the diff now:
>http://www.blackops.org/~msk/dmarc/diff.html

I believe that covers it.

>Also, I don't like the change from MUST NOT to cannot.  Receivers can
>do
>> whatever they want, so cannot isn't correct.  This bit is meant to
>say that
>> receivers aren't free to use DMARC as an excuse to throw away
>messages
>> every
>> time there's a DNS hiccup.  Applying policy in an inappropriate way
>does
>> have
>> an interoperability impact (messages quarantined/rejected that should
>not
>> be),
>> so I think the MUST NOT is appropriate.
>>
>
>I think "cannot" does do that, actually.  We're saying here that DMARC
>can't complete for the case you describe, namely where both SPF and
>DKIM
>suffered some kind of transient error.  In that case, if you're
>rejecting,
>you aren't legitimately doing it in the name of DMARC.
>
>I'm deliberately avoiding using new RFC2119 language here because it's
>way
>too late to be adding major normative goo.  These are supposed to be
>corrections to existing text, not addressing oversights in the protocol
>itself.  If we got this wrong in the base spec, then it's potential
>material for a standards track revision.  Otherwise, if we start down
>the
>path of fixing things, we're never going to be done with this version.
>
>(Pete and Barry would also point out here that it's possible for
>normative
>language to exist without using RFC2119's key words...)

OK. I think this solves the problem I was worried about. 

Thanks,

Scott K


From nobody Fri Dec 26 22:06:29 2014
Return-Path: <fenton@bluepopcorn.net>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A73301A3BA0 for <dmarc@ietfa.amsl.com>; Fri, 26 Dec 2014 22:06:28 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.01
X-Spam-Level: 
X-Spam-Status: No, score=-2.01 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SrYp7zoaZR03 for <dmarc@ietfa.amsl.com>; Fri, 26 Dec 2014 22:06:26 -0800 (PST)
Received: from v2.bluepopcorn.net (v2.bluepopcorn.net [IPv6:2607:f2f8:a994::2]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A32B01AD477 for <dmarc@ietf.org>; Fri, 26 Dec 2014 22:06:26 -0800 (PST)
Received: from [IPv6:2001:470:1f05:bfe:a4f0:3380:df88:1295] ([IPv6:2001:470:1f05:bfe:a4f0:3380:df88:1295]) (authenticated bits=0) by v2.bluepopcorn.net (8.14.3/8.14.3/Debian-9.4) with ESMTP id sBR66Kaw007468 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NO); Fri, 26 Dec 2014 22:06:22 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=bluepopcorn.net; s=supersize; t=1419660382; bh=1DJp9CwzWGZsywGAsaNce4BXzkzW9MnYiUBWE/lc0pw=; h=Message-ID:Date:From:MIME-Version:To:CC:Subject:References: In-Reply-To:Content-Type; b=jnfIzHqE9Nlc/eHQ6Z+chzeJdomgnfX0x2DjopFZtuIzB021LSwxlB/3nU12jZJUT Y/3t8AwpODS70e1CVBYeM/CFYB0vRDKy9GTgfmM1TxCHY0K5Rad7hZkWEtFDB5DCXr B+20FHVaaSa5mUPjlV2BMlL1LzP/eoFucUxMVtrI=
Message-ID: <549E4C5C.3040406@bluepopcorn.net>
Date: Fri, 26 Dec 2014 22:06:20 -0800
From: Jim Fenton <fenton@bluepopcorn.net>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.3.0
MIME-Version: 1.0
To: "Murray S. Kucherawy" <superuser@gmail.com>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com>	<5494A6F5.5020906@dcrocker.net>	<54967461.2070702@bluepopcorn.net> <CAL0qLwaYoCvZK0+iebJ6VFpYFzC1=LX1_r3iCrof4tfhprqhKw@mail.gmail.com>
In-Reply-To: <CAL0qLwaYoCvZK0+iebJ6VFpYFzC1=LX1_r3iCrof4tfhprqhKw@mail.gmail.com>
Content-Type: multipart/alternative; boundary="------------030200050207000400020708"
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/lHaeDr1segdLsDuaKcyH8fsoWWc
Cc: "dmarc@ietf.org" <dmarc@ietf.org>
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 27 Dec 2014 06:06:28 -0000

This is a multi-part message in MIME format.
--------------030200050207000400020708
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable

On 12/23/2014 10:25 PM, Murray S. Kucherawy wrote:
> >> 11.1 Discovery
>
>     > 6.2.1 in -08
>     >
>     >> Mail Receivers can also discover reporting requests from the
>     >> Organizational Domain. That should be mentioned here. But I'm a
>     little
>     >> confused why we have another Discovery section at all.
>     > The text's use of the word 'corresponds' handles the mapping to o=
rg
>     > domain, IMO.
>
>     This is more of a comment about document organization. The previous=

>     sections have been talking about things that follow discovery of th=
e
>     policy record, and now when talking about aggregate reports there's=

>     another section about discovery. Why here; isn't this a little
>     redundant?
>
>
> It's mainly to say that there isn't a specific discovery process for
> aggregate report details; it's already done.  This might be a legacy
> from ancient versions where there was a separate process.  I'll tidy
> it up by merging it into the previous subsection.
> =20
>
>     SHOULD isn't strong enough for the Report Receiver to depend on. Th=
ere
>     are other ways to get the information that is encoded into the
>     filename.
>
>
> Like what?

In Appendix C, the section "Report generator metadata" seems to have
most if not all of that information. And that's where it belongs: in the
body of the report, not as metadata that may be conveyed by some
transports and not others. Currently the only transport that is defined
is email, but others may be added later.

For email, some of the metadata currently shows up in three places: (1)
encoded in the filename, (2) encoded in the subject, and (3) in the
metadata section of the report. It would help interoperability to define
one of those that the recipient should depend on, and I nominate the
metadata section of the report, so that other transports can be added
more easily if needed.

> =20
>
>     If the spec wants to suggest, "here's a nice file name format that =
you
>     MAY want to use", that's fine. But SHOULD is both too weak if the
>     recipient can't depend on it and too strong if it's merely advice.
>
>
> I'm not so sure.  If we're going to go with MAY, then we also need
> some kind of signal that the filename used does conform to the
> proposed encoding, or else there might be some attempt to extract
> report parameters that simply aren't there.

I'm suggesting that they shouldn't attempt to do so.New issue: Paragraph
3 refers to "Both report types" but since iodef was
>
>     removed, it should just say "The AFRF report type".
>
>
> That refers to the aggregate and detailed reports ("rua" and "ruf"),
> not IODEF and AFRF.

Ah, thanks.

-Jim


--------------030200050207000400020708
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: 8bit

<html>
  <head>
    <meta content="text/html; charset=utf-8" http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    <div class="moz-cite-prefix">On 12/23/2014 10:25 PM, Murray S.
      Kucherawy wrote:<br>
    </div>
    <blockquote
cite="mid:CAL0qLwaYoCvZK0+iebJ6VFpYFzC1=LX1_r3iCrof4tfhprqhKw@mail.gmail.com"
      type="cite">
      <div dir="ltr">&gt;&gt; 11.1 Discovery<br>
        <div>
          <div class="gmail_extra">
            <div class="gmail_quote">
              <blockquote class="gmail_quote" style="margin:0 0 0
                .8ex;border-left:1px #ccc solid;padding-left:1ex"><span
                  class="">
                  &gt; 6.2.1 in -08<br>
                  &gt;<br>
                  &gt;&gt; Mail Receivers can also discover reporting
                  requests from the<br>
                  &gt;&gt; Organizational Domain. That should be
                  mentioned here. But I'm a little<br>
                  &gt;&gt; confused why we have another Discovery
                  section at all.<br>
                  &gt; The text's use of the word 'corresponds' handles
                  the mapping to org<br>
                  &gt; domain, IMO.<br>
                  <br>
                </span>This is more of a comment about document
                organization. The previous<br>
                sections have been talking about things that follow
                discovery of the<br>
                policy record, and now when talking about aggregate
                reports there's<br>
                another section about discovery. Why here; isn't this a
                little redundant?<br>
              </blockquote>
              <div><br>
              </div>
              <div>It's mainly to say that there isn't a specific
                discovery process for aggregate report details; it's
                already done.Â  This might be a legacy from ancient
                versions where there was a separate process.Â  I'll tidy
                it up by merging it into the previous subsection.<br>
                Â <br>
              </div>
              <blockquote class="gmail_quote" style="margin:0 0 0
                .8ex;border-left:1px #ccc solid;padding-left:1ex">
                SHOULD isn't strong enough for the Report Receiver to
                depend on. There<br>
                are other ways to get the information that is encoded
                into the filename.<br>
              </blockquote>
              <div><br>
              </div>
              <div>Like what?<br>
              </div>
            </div>
          </div>
        </div>
      </div>
    </blockquote>
    <br>
    In Appendix C, the section "Report generator metadata" seems to have
    most if not all of that information. And that's where it belongs: in
    the body of the report, not as metadata that may be conveyed by some
    transports and not others. Currently the only transport that is
    defined is email, but others may be added later.<br>
    <br>
    For email, some of the metadata currently shows up in three places:
    (1) encoded in the filename, (2) encoded in the subject, and (3) in
    the metadata section of the report. It would help interoperability
    to define one of those that the recipient should depend on, and I
    nominate the metadata section of the report, so that other
    transports can be added more easily if needed.<br>
    <br>
    <blockquote
cite="mid:CAL0qLwaYoCvZK0+iebJ6VFpYFzC1=LX1_r3iCrof4tfhprqhKw@mail.gmail.com"
      type="cite">
      <div dir="ltr">
        <div>
          <div class="gmail_extra">
            <div class="gmail_quote">
              <div>Â <br>
              </div>
              <blockquote class="gmail_quote" style="margin:0 0 0
                .8ex;border-left:1px #ccc solid;padding-left:1ex">
                If the spec wants to suggest, "here's a nice file name
                format that you<br>
                MAY want to use", that's fine. But SHOULD is both too
                weak if the<br>
                recipient can't depend on it and too strong if it's
                merely advice.<br>
              </blockquote>
              <div><br>
              </div>
              <div>I'm not so sure.Â  If we're going to go with MAY, then
                we also need some kind of signal that the filename used
                does conform to the proposed encoding, or else there
                might be some attempt to extract report parameters that
                simply aren't there.<br>
              </div>
            </div>
          </div>
        </div>
      </div>
    </blockquote>
    <br>
    I'm suggesting that they shouldn't attempt to do so.New issue:
    Paragraph 3 refers to "Both report types" but since iodef was<br>
    <blockquote
cite="mid:CAL0qLwaYoCvZK0+iebJ6VFpYFzC1=LX1_r3iCrof4tfhprqhKw@mail.gmail.com"
      type="cite">
      <div dir="ltr">
        <div>
          <div class="gmail_extra">
            <div class="gmail_quote">
              <blockquote class="gmail_quote" style="margin:0 0 0
                .8ex;border-left:1px #ccc solid;padding-left:1ex">
                removed, it should just say "The AFRF report type".<br>
              </blockquote>
              <div><br>
              </div>
              <div>That refers to the aggregate and detailed reports
                ("rua" and "ruf"), not IODEF and AFRF.<br>
              </div>
            </div>
          </div>
        </div>
      </div>
    </blockquote>
    <br>
    Ah, thanks.<br>
    <br>
    -Jim<br>
    <br>
  </body>
</html>

--------------030200050207000400020708--


From nobody Sat Dec 27 17:48:13 2014
Return-Path: <franck@peachymango.org>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1EEA21ACE79 for <dmarc@ietfa.amsl.com>; Sat, 27 Dec 2014 17:48:11 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.7
X-Spam-Level: 
X-Spam-Status: No, score=0.7 tagged_above=-999 required=5 tests=[BAYES_50=0.8,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xnfhfe0_Xm5f for <dmarc@ietfa.amsl.com>; Sat, 27 Dec 2014 17:48:08 -0800 (PST)
Received: from mx-out-1.zmailcloud.com (01.zmailcloud.com [192.198.85.104]) by ietfa.amsl.com (Postfix) with ESMTP id 2DA5A1ACE75 for <dmarc@ietf.org>; Sat, 27 Dec 2014 17:48:07 -0800 (PST)
Received: from smtp.01.com (smtp.01.com [10.10.0.43]) by mx-out-1.zmailcloud.com (Postfix) with ESMTP id AF80356499C; Sat, 27 Dec 2014 19:48:06 -0600 (CST)
Received: from localhost (localhost [127.0.0.1]) by smtp-out-2.01.com (Postfix) with ESMTP id A838F60229; Sat, 27 Dec 2014 19:48:06 -0600 (CST)
X-Virus-Scanned: amavisd-new at smtp-out-2.01.com
Received: from smtp.01.com ([127.0.0.1]) by localhost (smtp-out-2.01.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yMkgPMcR2psi; Sat, 27 Dec 2014 19:48:06 -0600 (CST)
Received: from smtp.01.com (localhost [127.0.0.1]) by smtp-out-2.01.com (Postfix) with ESMTP id 54857601D2; Sat, 27 Dec 2014 19:48:06 -0600 (CST)
DKIM-Filter: OpenDKIM Filter v2.8.4 smtp-out-2.01.com 54857601D2
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=peachymango.org; s=61F775A4-4A7F-11E4-A6BB-61E3068E35F6; t=1419731286; bh=T+yviRR1w8VUsQMCn6i0Yzc/hVQM6T/TCz6sWZCa5WQ=; h=Content-Type:Mime-Version:Subject:From:Date:Message-Id:To; b=P2R9ZQYORCUo5gBe9rUKEhAJmXfA2/7goN2AX37P+gQBnam5FNLvYdLdl8PmDdM/L wgX7VZ9wpK1O3zd2Pe3xeQouUc4Mx6sdyRy/7QU90QROsNcyKKnsoKJ7vBovyKA7NZ rdGQ1nymRlkJZpBK9AoD6XuQEnv3eRxBCHlZUNhc=
Received: from localhost (localhost [127.0.0.1]) by smtp-out-2.01.com (Postfix) with ESMTP id 3421D60229; Sat, 27 Dec 2014 19:48:06 -0600 (CST)
X-Virus-Scanned: amavisd-new at smtp-out-2.01.com
Received: from smtp.01.com ([127.0.0.1]) by localhost (smtp-out-2.01.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id xbulD9HuOwgD; Sat, 27 Dec 2014 19:48:06 -0600 (CST)
Received: from [10.0.0.6] (c-67-180-100-98.hsd1.ca.comcast.net [67.180.100.98]) by smtp-out-2.01.com (Postfix) with ESMTPSA id 94CEA601D2; Sat, 27 Dec 2014 19:48:05 -0600 (CST)
Content-Type: multipart/alternative; boundary="Apple-Mail=_81514464-F200-4410-8FDE-F0C5CBA20600"
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
From: Franck Martin <franck@peachymango.org>
In-Reply-To: <WM!e74d5584a01dbb4f6262072d6e9e701b984d0d5e369d6b08f0cdef8d60041ea73de692d6d52a411f72f5095ba2b82bfb!@asav-3.01.com>
Date: Sat, 27 Dec 2014 17:48:03 -0800
Message-Id: <87E3BD84-DE51-4CFC-934D-D0B4874B6D03@peachymango.org>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <5494A6F5.5020906@dcrocker.net> <CAL0qLwZthPfZ-22=yi2rrp_GKXK3igc=M8LhftxMx7GRUde7Dw@mail.gmail.com> <549ADA41.40005@dcrocker.net> <CAL0qLwYVmDL7kCOTkeDk5pMYCA4-y2Bxyi+7F8GPjaxmxmS6Gw@mail.gmail.com> <549AE89A.9070203@dcrocker.net> <CAL0qLwa65h+iH_ixSFNbBLUNTw0-u1EVWdOmpNJh-EOKmgFwdw@mail.gmail.com> <549CD2B8.5060905@gmail.com> <CAL0qLwbP3-7SzX3e3dnXwF5EtNAQLVa8Bqsj+sJZT1MqBeRFQw@mail.gmail.com> <WM!e74d5584a01dbb4f6262072d6e9e701b984d0d5e369d6b08f0cdef8d60041ea73de692d6d52a411f72f5095ba2b82bfb!@asav-3.01.com>
To: "Murray S. Kucherawy" <superuser@gmail.com>
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/HdCAG1urzTJ9W6OiVQPBHXunxe8
Cc: Dave Crocker <dcrocker@gmail.com>, "dmarc@ietf.org" <dmarc@ietf.org>
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 28 Dec 2014 01:48:11 -0000

--Apple-Mail=_81514464-F200-4410-8FDE-F0C5CBA20600
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8


> On Dec 25, 2014, at 8:30 PM, Murray S. Kucherawy <superuser@gmail.com> =
wrote:
>=20
> On Thu, Dec 25, 2014 at 10:15 PM, Dave Crocker <dcrocker@gmail.com =
<mailto:dcrocker@gmail.com>> wrote:
> One could argue either way about the multi-valued From:, but at least =
it
> has an essential relationship to DMARC, since DMARC evaluates From:.  =
If
> DMARC were required to handle multi-valued From:, it would alter DMARC
> noticeable, as was evident in the debate about this issue.
>=20
> The MX requirement has no such linkage.
>=20
> I'm afraid the glue is still too thick.  Fortunately at this point, =
this is all academic.
>=20
> I'm staring at this and not understanding how the two are all that =
different.  They both seek to ensure that a DMARC evaluation can be done =
on the From: domain, and thus both seek to ensure that the From: that =
lands in the inbox can be trusted by end users to be valid.
>=20
> In both cases, as you put it, DMARC evaluates From:.  The only =
difference I can see is that one is a self-contained syntactical check =
while the other requires consulting another data source (the DNS, in =
this case) for a simple validity test.
>=20
> If the MX/A/AAAA test fails, then there's no policy to apply.  We =
[used to] reject on the basis that it's impossible for that message to =
legitimately exist.
>=20
> If the single-value From: test fails, then which domain's policy is to =
be applied is potentially indeterminate.  We [still, typically] reject =
on the basis that it's impossible to be sure which domain the end user =
will see, and thus decide which policy should apply.  DMARC participants =
don't like that case and (we claim) protected mail streams never use =
that syntax anyway, so we disallow its use for those cases.
>=20
> To me they have approximately identical goals.  If the MX test can =
legitimately be dismissed because it aspires to world peace, why =
shouldn't the other?
>=20
> Anyway, I'm content at this point to leave this for the standards =
track discussion when the WG gets around to it.  I'll remain quietly =
confused until then.
>=20

Checking the domain in =46rom is emailable is a security issue, if you =
don=E2=80=99t do it, then you let miscreant be able to use examples.com =
<http://examples.com/> instead of example.com <http://example.com/> and =
easily get away with it. So it is not normative, but it is just here to =
point out, that DMARC does not solve the lower layer vulnerabilities=E2=80=
=A6 they have to be taken cared of for DMARC to be any remotely useful.

This is a common critic to DMARC, to say DMARC is easily workaround by =
miscreants, so why bother?


--Apple-Mail=_81514464-F200-4410-8FDE-F0C5CBA20600
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space;" =
class=3D""><br class=3D""><div><blockquote type=3D"cite" class=3D""><div =
class=3D"">On Dec 25, 2014, at 8:30 PM, Murray S. Kucherawy &lt;<a =
href=3D"mailto:superuser@gmail.com" class=3D"">superuser@gmail.com</a>&gt;=
 wrote:</div><br class=3D"Apple-interchange-newline"><div class=3D""><div =
dir=3D"ltr" class=3D"">On Thu, Dec 25, 2014 at 10:15 PM, Dave Crocker =
<span dir=3D"ltr" class=3D"">&lt;<a href=3D"mailto:dcrocker@gmail.com" =
target=3D"_blank" class=3D"">dcrocker@gmail.com</a>&gt;</span> wrote:<br =
class=3D""><div class=3D"gmail_extra"><div =
class=3D"gmail_quote"><blockquote class=3D"gmail_quote" style=3D"margin:0 =
0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">One could argue =
either way about the multi-valued From:, but at least it<br class=3D"">
has an essential relationship to DMARC, since DMARC evaluates =
From:.&nbsp; If<br class=3D"">
DMARC were required to handle multi-valued From:, it would alter =
DMARC<br class=3D"">
noticeable, as was evident in the debate about this issue.<br class=3D"">
<br class=3D"">
The MX requirement has no such linkage.<br class=3D""></blockquote><div =
class=3D""><br class=3D""></div><div class=3D"">I'm afraid the glue is =
still too thick.&nbsp; Fortunately at this point, this is all =
academic.<br class=3D""></div><div class=3D""><br class=3D""></div>I'm =
staring at this and not understanding how the two are all that =
different.&nbsp; They both seek to ensure that a DMARC evaluation can be =
done on the From: domain, and thus both seek to ensure that the From: =
that lands in the inbox can be trusted by end users to be valid.<br =
class=3D""><br class=3D""></div><div class=3D"gmail_quote">In both =
cases, as you put it, DMARC evaluates From:.&nbsp; The only difference I =
can see is that one is a self-contained syntactical check while the =
other requires consulting another data source (the DNS, in this case) =
for a simple validity test.<br class=3D""></div><div =
class=3D"gmail_quote"><br class=3D""></div><div class=3D"gmail_quote">If =
the MX/A/AAAA test fails, then there's no policy to apply.&nbsp; We =
[used to] reject on the basis that it's impossible for that message to =
legitimately exist.<br class=3D""><br class=3D"">If the single-value =
From: test fails, then which domain's policy is to be applied is =
potentially indeterminate.&nbsp; We [still, typically] reject on the =
basis that it's impossible to be sure which domain the end user will =
see, and thus decide which policy should apply.&nbsp; DMARC participants =
don't like that case and (we claim) protected mail streams never use =
that syntax anyway, so we disallow its use for those cases.<br =
class=3D""><br class=3D""></div><div class=3D"gmail_quote">To me they =
have approximately identical goals.&nbsp; If the MX test can =
legitimately be dismissed because it aspires to world peace, why =
shouldn't the other?<br class=3D""><br class=3D""></div><div =
class=3D"gmail_quote">Anyway, I'm content at this point to leave this =
for the standards track discussion when the WG gets around to it.&nbsp; =
I'll remain quietly confused until then.<br class=3D""><br =
class=3D""></div></div></div></div></blockquote><div><br =
class=3D""></div>Checking the domain in =46rom is emailable is a =
security issue, if you don=E2=80=99t do it, then you let miscreant be =
able to use <a href=3D"http://examples.com" =
class=3D"">examples.com</a>&nbsp;instead of <a href=3D"http://example.com"=
 class=3D"">example.com</a>&nbsp;and easily get away with it. So it is =
not normative, but it is just here to point out, that DMARC does not =
solve the lower layer vulnerabilities=E2=80=A6 they have to be taken =
cared of for DMARC to be any remotely useful.</div><div><br =
class=3D""></div><div>This is a common critic to DMARC, to say DMARC is =
easily workaround by miscreants, so why bother?</div><br =
class=3D""></body></html>=

--Apple-Mail=_81514464-F200-4410-8FDE-F0C5CBA20600--


From nobody Sat Dec 27 19:26:12 2014
Return-Path: <johnl@taugh.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0065D1A90B7 for <dmarc@ietfa.amsl.com>; Sat, 27 Dec 2014 19:26:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 2.263
X-Spam-Level: **
X-Spam-Status: No, score=2.263 tagged_above=-999 required=5 tests=[BAYES_50=0.8, HELO_MISMATCH_COM=0.553, HOST_MISMATCH_NET=0.311, J_CHICKENPOX_16=0.6, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Hkkzze8Q_HxN for <dmarc@ietfa.amsl.com>; Sat, 27 Dec 2014 19:26:08 -0800 (PST)
Received: from miucha.iecc.com (abusenet-1-pt.tunnel.tserv4.nyc4.ipv6.he.net [IPv6:2001:470:1f06:1126::2]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8A5571A1B21 for <dmarc@ietf.org>; Sat, 27 Dec 2014 19:26:08 -0800 (PST)
Received: (qmail 55188 invoked from network); 28 Dec 2014 03:26:06 -0000
Received: from miucha.iecc.com (64.57.183.18) by mail1.iecc.com with QMQP; 28 Dec 2014 03:26:06 -0000
Date: 28 Dec 2014 03:25:44 -0000
Message-ID: <20141228032544.36072.qmail@ary.lan>
From: "John Levine" <johnl@taugh.com>
To: dmarc@ietf.org
In-Reply-To: <CAL0qLwbP3-7SzX3e3dnXwF5EtNAQLVa8Bqsj+sJZT1MqBeRFQw@mail.gmail.com>
Organization: 
X-Headerized: yes
Mime-Version: 1.0
Content-type: text/plain; charset=utf-8
Content-transfer-encoding: 8bit
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/5o77CLqM7olvqHUJ6uLA7ZrmkNw
Cc: superuser@gmail.com
Subject: Re: [dmarc-ietf] missing MX, Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 28 Dec 2014 03:26:10 -0000

>I'm staring at this and not understanding how the two are all that
>different.  They both seek to ensure that a DMARC evaluation can be done on
>the From: domain, and thus both seek to ensure that the From: that lands in
>the inbox can be trusted by end users to be valid.

Now, wait a minute.  DMARC can tell you that a message is probably not
a phish with an exact match From: domain, but it can't tell you that a
return address is "valid" for any but the most uselessly nitpicky
definition of valid.  (Consider a message From:
security@paypal.rbn.ru, with SPF that makes DMARC p=reject happy.)

One can conclude with great confidence that a From: domain that
doesn't exist is not an exact match phish of anything, which tells me
that it's none of DMARC's business.

Also, as others have observed, there are plenty of reasons one might
reject a message before doing DMARC validation (Spamhaus DROP, say)
and it does not seem productive to attempt to compile a list of them.

R's,
John


From nobody Sun Dec 28 11:36:52 2014
Return-Path: <dcrocker@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 47A941A8A9E for <dmarc@ietfa.amsl.com>; Sun, 28 Dec 2014 11:36:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level: 
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nAJUE4Bg961Z for <dmarc@ietfa.amsl.com>; Sun, 28 Dec 2014 11:36:49 -0800 (PST)
Received: from mail-pd0-x22d.google.com (mail-pd0-x22d.google.com [IPv6:2607:f8b0:400e:c02::22d]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 26FA71A8984 for <dmarc@ietf.org>; Sun, 28 Dec 2014 11:36:49 -0800 (PST)
Received: by mail-pd0-f173.google.com with SMTP id ft15so15880871pdb.32 for <dmarc@ietf.org>; Sun, 28 Dec 2014 11:36:48 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=message-id:date:from:user-agent:mime-version:to:cc:subject :references:in-reply-to:content-type:content-transfer-encoding; bh=N51sjKT8R7VWa56jTfzPe2NqLxMX8DjRvfxvNg0nQJo=; b=LtNu64bYScxtv3tUpQf05NsNElKN6oNRzuTix/UuM5TPvFwW2GTjBlJ2mZHqkM2xGB 1U04qeHPzvEoF8IW83XWHGeMlCtWbOg+s9qe7G+3Vd2KBPETJTGsTFqdJZ00FEmF1rac 0Z8SeXWW4ZvHTjtzB+0Kx25EgsVLp7bYJt9SLpGDzUciHMLBgSFfnZ4xWbEhP4l+5Ptz Y/8i3UvvSyClrXqw7cyN7RFklM7f34mq6FsPCs6gZEK2wL/svNjC3uSinG7QxALU86z+ 6paxS8VGTh1C3rjOtDRPhx1VzVOYFKHbg0yPNkayqVqHWNSZBJpelluMc1GiJCicLxXs 5cZA==
X-Received: by 10.70.16.98 with SMTP id f2mr73795378pdd.116.1419795408410; Sun, 28 Dec 2014 11:36:48 -0800 (PST)
Received: from [172.29.101.70] (wsip-72-214-58-13.sd.sd.cox.net. [72.214.58.13]) by mx.google.com with ESMTPSA id gd1sm33552889pbd.67.2014.12.28.11.36.45 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Sun, 28 Dec 2014 11:36:47 -0800 (PST)
Message-ID: <54A05BC9.1090208@gmail.com>
Date: Sun, 28 Dec 2014 11:36:41 -0800
From: Dave Crocker <dcrocker@gmail.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Thunderbird/31.3.0
MIME-Version: 1.0
To: "Murray S. Kucherawy" <superuser@gmail.com>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com>	<5494A6F5.5020906@dcrocker.net>	<CAL0qLwZthPfZ-22=yi2rrp_GKXK3igc=M8LhftxMx7GRUde7Dw@mail.gmail.com>	<549ADA41.40005@dcrocker.net>	<CAL0qLwYVmDL7kCOTkeDk5pMYCA4-y2Bxyi+7F8GPjaxmxmS6Gw@mail.gmail.com>	<549AE89A.9070203@dcrocker.net>	<CAL0qLwa65h+iH_ixSFNbBLUNTw0-u1EVWdOmpNJh-EOKmgFwdw@mail.gmail.com>	<549CD2B8.5060905@gmail.com> <CAL0qLwbP3-7SzX3e3dnXwF5EtNAQLVa8Bqsj+sJZT1MqBeRFQw@mail.gmail.com>
In-Reply-To: <CAL0qLwbP3-7SzX3e3dnXwF5EtNAQLVa8Bqsj+sJZT1MqBeRFQw@mail.gmail.com>
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 8bit
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/hwiiT6Vf-7UUaiums-bs68HO3CA
Cc: "dmarc@ietf.org" <dmarc@ietf.org>
Subject: [dmarc-ietf] `Assessing wg specification scope (was Re: Jim Fenton's review of -04)
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 28 Dec 2014 19:36:51 -0000

Murray, et al,

On 12/25/2014 8:30 PM, Murray S. Kucherawy wrote:
> On Thu, Dec 25, 2014 at 10:15 PM, Dave Crocker <dcrocker@gmail.com
> <mailto:dcrocker@gmail.com>> wrote:
> 
>     One could argue either way about the multi-valued From:, but at least it
>     has an essential relationship to DMARC, since DMARC evaluates From:.  If
>     DMARC were required to handle multi-valued From:, it would alter DMARC
>     noticeable, as was evident in the debate about this issue.
> 
>     The MX requirement has no such linkage.
> 
> I'm afraid the glue is still too thick.  Fortunately at this point, this
> is all academic.
> 
> I'm staring at this and not understanding how the two are all that
> different.  They both seek to ensure that a DMARC evaluation can be done
> on the From: domain, and thus both seek to ensure that the From: that
> lands in the inbox can be trusted by end users to be valid.

When informed, serious participants have a basic difference in their
understanding of the scope of a specification, it's difficult to ensure
proper focus for the work.  It makes interpretations amongst the larger
community likely to be problematic.

So I think this exchange is important to pursue as a matter of
clarifying basic principles...


Good wg charters help understanding of what is in scope but also what is
out of scope.

A specification needs to do the same.  Otherwise, it's content can
wander randomly and -- typically -- defeating the efficacy of the spec.

I think the DMARC spec is somewhere between good and excellent at
stating its scope, which is offered as:

> However, there has been no single widely
>    accepted or publicly available mechanism to communication of domain-
>    specific message handling policiies for receivers, or to request
>    reporting of authentication and disposition of received mail.

So while there is obviously the larger goal of fighting abuses, it is
the publication mechanism of DMARC that is the focus.

But more explicit detail is also provided:

> DMARC allows domain owners and receivers to collaborate by:
> 
>    1.  Providing receivers with assertions about domain owners' policies
> 
>    2.  Providing feedback to senders so they can monitor authentication
>        and judge threats
> 
>    The basic outline of DMARC is:
> 
>    1.  Domain owners publish policy assertions about domains via the
>        DNS.
> 
>    2.  Receivers compare the RFC5322 From: address in the mail to the
>        SPF and DKIM results, if present, and the DMARC policy in DNS.
> 
>    3.  These receivers can use these results to determine how the mail
>        should be handled.
> 
>    4.  The receiver sends reports to the domain owner or its designee
>        about mail claiming to be from their domain.

So, we ought to be able to take any proposed technical point for the
spec and ask whether the above sufficiently informs whether to include
or exclude the point.


> In both cases, as you put it, DMARC evaluates From:.  The only
> difference I can see is that one is a self-contained syntactical check
> while the other requires consulting another data source (the DNS, in
> this case) for a simple validity test.

The presence of a multi-valued From: isn't explicitly ok or not ok,
given the above.

However as we saw during the debate about this issue, having a
multi-valued from makes #2, above, significantly more complex and in
fact makes the semantics of DMARC more challenging.  So a decision to
simplify things by restricting DMARC's use to From: fields with only one
address has a direct benefit on the basic DMARC mechanism.

(For clarity, let's remember that this is not a change to RFC5322, in
that domains not asserting DMARC are still free to use multi-valued From:.)

And now let's look at the MX issue:  How does it related to the above
list of goal/scope statements?

IMO, it is entirely independent.

A From: field that does not support a reply can still be valid.   By way
of pressing this point further, note that an email address isn't just an
email address.  It is a unique identifier.  Hence it's possible that the
From: address could be meant solely to uniquely identify the author,
even without being able to directly reply to their address.

It would be an unusual case, of course, but there is nothing in DMARC
mechanism or semantics that requires that a reply reach the author and
hence there is no reason for DMARC to impose this particular restriction.

Note also the point I cited in the previous message:  Domains that do
not participate in DMARC are just as likely to want to assert the MX
requirement.  Hence it should be documented independently of DMARC.


> If the MX/A/AAAA test fails, then there's no policy to apply.  

I will claim that this is not a correct assessment.  If there is a DMARC
record for the domain, there is policy to apply.


> We [used
> to] reject on the basis that it's impossible for that message to
> legitimately exist.

Some/many sites apply that rule.  Some do not.  The MX/A/AAAA rule is
entirely independent of other anti-abuse mechanisms, and it should
remain independent.


> If the single-value From: test fails, then which domain's policy is to
> be applied is potentially indeterminate. 

Exactly.  And that's why the decision for DMARC constraints to simplify
From: makes sense.

d/

-- 
-- 
Dave Crocker
Brandenburg InternetWorking
bbiw.net


From nobody Mon Dec 29 07:26:37 2014
Return-Path: <MHammer@ag.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B7B1F1A8700 for <dmarc@ietfa.amsl.com>; Mon, 29 Dec 2014 07:26:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level: 
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3Jj5Cea4Qq2L for <dmarc@ietfa.amsl.com>; Mon, 29 Dec 2014 07:26:28 -0800 (PST)
Received: from agwhqht.amgreetings.com (agwhqht.amgreetings.com [207.58.192.31]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6750E1A86FC for <dmarc@ietf.org>; Mon, 29 Dec 2014 07:26:28 -0800 (PST)
Received: from USCLES544.agna.amgreetings.com ([fe80::f5de:4c30:bc26:d70a]) by USCLES533.agna.amgreetings.com ([::1]) with mapi id 14.03.0210.002;  Mon, 29 Dec 2014 10:26:27 -0500
From: "MH Michael Hammer (5304)" <MHammer@ag.com>
To: Scott Kitterman <sklist@kitterman.com>, "dmarc@ietf.org" <dmarc@ietf.org>
Thread-Topic: [dmarc-ietf] Jim Fenton's review of -04
Thread-Index: AQHQG9L/KxUX7EmxxEmD4981Pp72RJycGGUAgAKKnwCAACqBgIAAcEYAgAB1yoCAAGibgIAAEk8AgAFZIoCAACS1AIAFEfLw
Date: Mon, 29 Dec 2014 15:26:26 +0000
Message-ID: <CE39F90A45FF0C49A1EA229FC9899B0525F5323E@USCLES544.agna.amgreetings.com>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <2397001.Fx3SqMl5ZI@scott-latitude-e6320> <CAL0qLwakLdWhHW+JbfQ=LO9yPSSOB=fH_oyLNMpGRPS_EAuudg@mail.gmail.com> <3004337.MAocVZ5Co9@scott-latitude-e6320> <CAL0qLwYqmVZdW_XivU0=Vr7itDvfw_0+qm7dthN9nJYXDZK2bg@mail.gmail.com> <66CEE14F-375D-4FE9-9485-6DFE58911E54@kitterman.com>
In-Reply-To: <66CEE14F-375D-4FE9-9485-6DFE58911E54@kitterman.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.144.15.221]
x-kse-antivirus-interceptor-info: scan successful
x-kse-antivirus-info: Clean
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/bhPudxR6YbzNOQ6K8eEyiw6mKPo
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 29 Dec 2014 15:26:31 -0000

It's still not quite right:

DMARC evaluation can only complete and yield a "pass" result when one =20

       of the underlying authentication mechanisms passes for an aligned =20

       identifier.  If this is not the case and either or both of them =20

       suffered some kind of temporary error (such as a transient DNS =20

       problem), the Receiver evaluating the message is also unable to =20

       conclude that the DMARC mechanism failed and thereby apply the =20

       advertised DMARC policy.  Rather, the Receiver can either skip DMARC=
 =20

       processing for this message due to incomplete evaluation, or it can =
=20

       arrange to defer handling of the message in the hope that the =20

       temporary error will be resolved when the message is retried.  When =
=20

       otherwise appropriate due to DMARC policy, receivers MAY send =20

       feedback reports regarding temporary errors. =20

                                                   =20
The problem is with:

"If this is not the case and either or both of them suffered some kind of t=
emporary error (such as a transient DNS problem),...",
Specifically the use of "either or". If only one (SPF or DKIM) has a transi=
ent DNS error then presumably the other, which has not had an error, can be=
 evaluated (resulting in a "pass" or "DMARC failure". It only becomes an is=
sue when BOTH SPF and DKIM have concurrent temporary errors.  I'm thinking =
that removing the "either or" is appropriate. I'm still cogitating on the r=
est of the paragraph.

Mike


> -----Original Message-----
> From: dmarc [mailto:dmarc-bounces@ietf.org] On Behalf Of Scott Kitterman
> Sent: Thursday, December 25, 2014 11:55 PM
> To: dmarc@ietf.org
> Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
>=20
> On December 25, 2014 8:43:29 PM CST, "Murray S. Kucherawy"
> <superuser@gmail.com> wrote:
> >On Thu, Dec 25, 2014 at 1:08 AM, Scott Kitterman <sklist@kitterman.com>
> >wrote:
> >
> >> I don't think it does.  What I was trying to say is that if you
> >already
> >> got an
> >> aligned pass from one method, you're done.  It doesn't matter if they
> >other
> >> one gets a DNS error, you already have a definitive result.  I don't
> >think
> >> your
> >> text says that, but I may be wrong.
> >>
> >
> >I think it's close.  I see the distinction you're making, and I've
> >adjusted.  Have a look at the diff now:
> >http://www.blackops.org/~msk/dmarc/diff.html
>=20
> I believe that covers it.
>=20
> >Also, I don't like the change from MUST NOT to cannot.  Receivers can
> >do
> >> whatever they want, so cannot isn't correct.  This bit is meant to
> >say that
> >> receivers aren't free to use DMARC as an excuse to throw away
> >messages
> >> every
> >> time there's a DNS hiccup.  Applying policy in an inappropriate way
> >does
> >> have
> >> an interoperability impact (messages quarantined/rejected that should
> >not
> >> be),
> >> so I think the MUST NOT is appropriate.
> >>
> >
> >I think "cannot" does do that, actually.  We're saying here that DMARC
> >can't complete for the case you describe, namely where both SPF and
> >DKIM suffered some kind of transient error.  In that case, if you're
> >rejecting, you aren't legitimately doing it in the name of DMARC.
> >
> >I'm deliberately avoiding using new RFC2119 language here because it's
> >way too late to be adding major normative goo.  These are supposed to
> >be corrections to existing text, not addressing oversights in the
> >protocol itself.  If we got this wrong in the base spec, then it's
> >potential material for a standards track revision.  Otherwise, if we
> >start down the path of fixing things, we're never going to be done with
> >this version.
> >
> >(Pete and Barry would also point out here that it's possible for
> >normative language to exist without using RFC2119's key words...)
>=20
> OK. I think this solves the problem I was worried about.
>=20
> Thanks,
>=20
> Scott K
>=20
> _______________________________________________
> dmarc mailing list
> dmarc@ietf.org
> https://www.ietf.org/mailman/listinfo/dmarc


From nobody Mon Dec 29 08:40:25 2014
Return-Path: <dhc@dcrocker.net>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EE54B1A8953 for <dmarc@ietfa.amsl.com>; Mon, 29 Dec 2014 08:40:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zPso8W3PNDWt for <dmarc@ietfa.amsl.com>; Mon, 29 Dec 2014 08:40:21 -0800 (PST)
Received: from sbh17.songbird.com (sbh17.songbird.com [72.52.113.17]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5A1A81A88B4 for <dmarc@ietf.org>; Mon, 29 Dec 2014 08:40:21 -0800 (PST)
Received: from [192.168.6.2] (ip-64-134-16-147.public.wayport.net [64.134.16.147]) (authenticated bits=0) by sbh17.songbird.com (8.13.8/8.13.8) with ESMTP id sBTGeFnT007059 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT); Mon, 29 Dec 2014 08:40:18 -0800
Message-ID: <54A183EB.6080508@dcrocker.net>
Date: Mon, 29 Dec 2014 08:40:11 -0800
From: Dave Crocker <dhc@dcrocker.net>
Organization: Brandenburg InternetWorking
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Thunderbird/31.3.0
MIME-Version: 1.0
To: "MH Michael Hammer (5304)" <MHammer@ag.com>, Scott Kitterman <sklist@kitterman.com>, "dmarc@ietf.org" <dmarc@ietf.org>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <2397001.Fx3SqMl5ZI@scott-latitude-e6320> <CAL0qLwakLdWhHW+JbfQ=LO9yPSSOB=fH_oyLNMpGRPS_EAuudg@mail.gmail.com> <3004337.MAocVZ5Co9@scott-latitude-e6320> <CAL0qLwYqmVZdW_XivU0=Vr7itDvfw_0+qm7dthN9nJYXDZK2bg@mail.gmail.com> <66CEE14F-375D-4FE9-9485-6DFE58911E54@kitterman.com> <CE39F90A45FF0C49A1EA229FC9899B0525F5323E@USCLES544.agna.amgreetings.com>
In-Reply-To: <CE39F90A45FF0C49A1EA229FC9899B0525F5323E@USCLES544.agna.amgreetings.com>
Content-Type: text/plain; charset=windows-1252
Content-Transfer-Encoding: 8bit
X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.0 (sbh17.songbird.com [72.52.113.66]); Mon, 29 Dec 2014 08:40:19 -0800 (PST)
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/ZvM8imzZNPyRwvBQAWGc-IDg_A0
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: dcrocker@bbiw.net
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 29 Dec 2014 16:40:23 -0000

On 12/29/2014 7:26 AM, MH Michael Hammer (5304) wrote:
> It's still not quite right:
> 
> DMARC evaluation can only complete and yield a "pass" result when one
> 
> 
> of the underlying authentication mechanisms passes for an aligned
> 
> identifier.  If this is not the case and either or both of them
> 
> suffered some kind of temporary error (such as a transient DNS
> 
> problem), the Receiver evaluating the message is also unable to
> 
> conclude that the DMARC mechanism failed and thereby apply the
> 
> advertised DMARC policy.  Rather, the Receiver can either skip DMARC
> 
> 
> processing for this message due to incomplete evaluation, or it can
> 
> 
> arrange to defer handling of the message in the hope that the
> 
> temporary error will be resolved when the message is retried.  When
> 
> 
> otherwise appropriate due to DMARC policy, receivers MAY send
> 
> feedback reports regarding temporary errors.
> 
> 
> The problem is with:
> 
> "If this is not the case and either or both of them suffered some
> kind of temporary error (such as a transient DNS problem),...", 
> Specifically the use of "either or". If only one (SPF or DKIM) has a
> transient DNS error then presumably the other, which has not had an
> error, can be evaluated (resulting in a "pass" or "DMARC failure". It
> only becomes an issue when BOTH SPF and DKIM have concurrent
> temporary errors.  I'm thinking that removing the "either or" is
> appropriate. I'm still cogitating on the rest of the paragraph.


Good catch.  This is complicated by there really being two conditions.

The first is the negative that neither method authenticates.  The second
is the affirmative that one of them failed with a temporary error.

So perhaps something like:

FROM:

> DMARC evaluation can only complete and yield a "pass" result when one
> of the underlying authentication mechanisms passes for an aligned
> identifier.  If this is not the case and either or both of them
> suffered some kind of temporary error (such as a transient DNS
> problem), the Receiver evaluating the message is also unable to
> conclude that the DMARC mechanism failed and thereby apply the
> advertised DMARC policy.


TO:

DMARC evaluation can only complete and yield a "pass" result when one
of the underlying authentication mechanisms passes for an aligned
identifier.  If neither passes and one or both of them failed due to a
temporary error, the Receiver evaluating the message is also unable to
conclude that the DMARC mechanism had a permanent failure and thereby
can apply the advertised DMARC policy.

d/
-- 
Dave Crocker
Brandenburg InternetWorking
bbiw.net


From nobody Mon Dec 29 08:57:18 2014
Return-Path: <ned+dmarc@mrochek.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 23A531A89A0 for <dmarc@ietfa.amsl.com>; Mon, 29 Dec 2014 08:57:17 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.012
X-Spam-Level: 
X-Spam-Status: No, score=-2.012 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bFBRjpzO6tPj for <dmarc@ietfa.amsl.com>; Mon, 29 Dec 2014 08:57:12 -0800 (PST)
Received: from mauve.mrochek.com (mauve.mrochek.com [66.159.242.17]) by ietfa.amsl.com (Postfix) with ESMTP id BCDBF1A899B for <dmarc@ietf.org>; Mon, 29 Dec 2014 08:57:12 -0800 (PST)
Received: from dkim-sign.mauve.mrochek.com by mauve.mrochek.com (PMDF V6.1-1 #35243) id <01PGOJ9VWPE800BANG@mauve.mrochek.com> for dmarc@ietf.org; Mon, 29 Dec 2014 08:52:03 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=mrochek.com; s=mauve; t=1419871923; bh=pZ9k4UbhRjRiUHFlotx78Dv/8MTzgnLNGtiersNIlE8=; h=From:Cc:Date:Subject:In-reply-to:References:To; b=UFL7VCkIXwxmtrCyZVKaXZBEM3oNEV2vn49R6WczWcTfOZmmbzujk31AWDqRegd3M I+MKu2GsZ9J5CWLcR6Khm7qDjm972WIUAKjUse9HH+VoTGZ52I08lslbI9mVfPThK/ FfaHV8dC6PoGgl/3asizeZ0JQQOhkyEbZpnQVHxA=
MIME-version: 1.0
Content-transfer-encoding: 7BIT
Content-type: TEXT/PLAIN; CHARSET=us-ascii
Received: from mauve.mrochek.com by mauve.mrochek.com (PMDF V6.1-1 #35243) id <01PG76POFJA800005K@mauve.mrochek.com> (original mail from NED@mauve.mrochek.com) for dmarc@ietf.org; Mon, 29 Dec 2014 08:51:47 -0800 (PST)
From: ned+dmarc@mrochek.com
Message-id: <01PGOJ9M6F5E00005K@mauve.mrochek.com>
Date: Mon, 29 Dec 2014 08:50:51 -0800 (PST)
In-reply-to: "Your message dated Mon, 29 Dec 2014 08:40:11 -0800" <54A183EB.6080508@dcrocker.net>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <2397001.Fx3SqMl5ZI@scott-latitude-e6320> <CAL0qLwakLdWhHW+JbfQ=LO9yPSSOB=fH_oyLNMpGRPS_EAuudg@mail.gmail.com> <3004337.MAocVZ5Co9@scott-latitude-e6320> <CAL0qLwYqmVZdW_XivU0=Vr7itDvfw_0+qm7dthN9nJYXDZK2bg@mail.gmail.com> <66CEE14F-375D-4FE9-9485-6DFE58911E54@kitterman.com> <CE39F90A45FF0C49A1EA229FC9899B0525F5323E@USCLES544.agna.amgreetings.com> <54A183EB.6080508@dcrocker.net>
To: Dave Crocker <dhc@dcrocker.net>
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/LN1xkoUQKFLUNRF953XZRH3Tr-s
Cc: "dmarc@ietf.org" <dmarc@ietf.org>, Scott Kitterman <sklist@kitterman.com>, "MH Michael Hammer \(5304\)" <MHammer@ag.com>
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 29 Dec 2014 16:57:17 -0000

> On 12/29/2014 7:26 AM, MH Michael Hammer (5304) wrote:
> > It's still not quite right:
> >
> > DMARC evaluation can only complete and yield a "pass" result when one
> >
> >
> > of the underlying authentication mechanisms passes for an aligned
> >
> > identifier.  If this is not the case and either or both of them
> >
> > suffered some kind of temporary error (such as a transient DNS
> >
> > problem), the Receiver evaluating the message is also unable to
> >
> > conclude that the DMARC mechanism failed and thereby apply the
> >
> > advertised DMARC policy.  Rather, the Receiver can either skip DMARC
> >
> >
> > processing for this message due to incomplete evaluation, or it can
> >
> >
> > arrange to defer handling of the message in the hope that the
> >
> > temporary error will be resolved when the message is retried.  When
> >
> >
> > otherwise appropriate due to DMARC policy, receivers MAY send
> >
> > feedback reports regarding temporary errors.
> >
> >
> > The problem is with:
> >
> > "If this is not the case and either or both of them suffered some
> > kind of temporary error (such as a transient DNS problem),...",
> > Specifically the use of "either or". If only one (SPF or DKIM) has a
> > transient DNS error then presumably the other, which has not had an
> > error, can be evaluated (resulting in a "pass" or "DMARC failure". It
> > only becomes an issue when BOTH SPF and DKIM have concurrent
> > temporary errors.  I'm thinking that removing the "either or" is
> > appropriate. I'm still cogitating on the rest of the paragraph.


> Good catch.  This is complicated by there really being two conditions.

> The first is the negative that neither method authenticates.  The second
> is the affirmative that one of them failed with a temporary error.

> So perhaps something like:

> FROM:

> > DMARC evaluation can only complete and yield a "pass" result when one
> > of the underlying authentication mechanisms passes for an aligned
> > identifier.  If this is not the case and either or both of them
> > suffered some kind of temporary error (such as a transient DNS
> > problem), the Receiver evaluating the message is also unable to
> > conclude that the DMARC mechanism failed and thereby apply the
> > advertised DMARC policy.


> TO:

> DMARC evaluation can only complete and yield a "pass" result when one
> of the underlying authentication mechanisms passes for an aligned
> identifier.  If neither passes and one or both of them failed due to a
> temporary error, the Receiver evaluating the message is also unable to
> conclude that the DMARC mechanism had a permanent failure and thereby
> can apply the advertised DMARC policy.

This looks good to me.

				Ned


From nobody Mon Dec 29 10:40:38 2014
Return-Path: <sklist@kitterman.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D6B501A8AF3 for <dmarc@ietfa.amsl.com>; Mon, 29 Dec 2014 10:40:35 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.002
X-Spam-Level: 
X-Spam-Status: No, score=-2.002 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5TQY4cJb9hi5 for <dmarc@ietfa.amsl.com>; Mon, 29 Dec 2014 10:40:33 -0800 (PST)
Received: from mailout03.controlledmail.com (mailout03.controlledmail.com [208.43.65.50]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8D2451A8AF0 for <dmarc@ietf.org>; Mon, 29 Dec 2014 10:40:33 -0800 (PST)
Received: from [192.168.111.2] (static-72-81-252-22.bltmmd.fios.verizon.net [72.81.252.22]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mailout03.controlledmail.com (Postfix) with ESMTPSA id 8C593C40079; Mon, 29 Dec 2014 12:40:32 -0600 (CST)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=kitterman.com; s=201409; t=1419878432; bh=RznBsXGHBJKao41rg9hSKy3tiuWwJlr48dxHZ5TMY/o=; h=In-Reply-To:References:Subject:From:Date:To:From; b=If8FHpMSt4RDvLkAbxU0Bp+QJXxePwbQUcgMBz5tHhnQhWeuFM6Vb/GkBUOIrwG7S FMPdW/7XXHwd9TUqqG3pD59KYYwcuA4A7Ea3sk6I7VA/yXWm47zurn1m0rTJg/fjCa QHnrpbNc1/BjzWYhX9nSe9Eh5DfprYJcFVeibxfo=
User-Agent: K-9 Mail for Android
In-Reply-To: <01PGOJ9M6F5E00005K@mauve.mrochek.com>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <2397001.Fx3SqMl5ZI@scott-latitude-e6320> <CAL0qLwakLdWhHW+JbfQ=LO9yPSSOB=fH_oyLNMpGRPS_EAuudg@mail.gmail.com> <3004337.MAocVZ5Co9@scott-latitude-e6320> <CAL0qLwYqmVZdW_XivU0=Vr7itDvfw_0+qm7dthN9nJYXDZK2bg@mail.gmail.com> <66CEE14F-375D-4FE9-9485-6DFE58911E54@kitterman.com> <CE39F90A45FF0C49A1EA229FC9899B0525F5323E@USCLES544.agna.amgreetings.com> <54A183EB.6080508@dcrocker.net> <01PGOJ9M6F5E00005K@mauve.mrochek.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
Content-Type: text/plain; charset=UTF-8
From: Scott Kitterman <sklist@kitterman.com>
Date: Mon, 29 Dec 2014 13:40:27 -0500
To: "dmarc@ietf.org" <dmarc@ietf.org>
Message-ID: <19D0C566-275F-474B-B823-B7D79CACD8C7@kitterman.com>
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/1NHT4I4HY409NfCA8l8FFEDgoEI
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 29 Dec 2014 18:40:36 -0000

On December 29, 2014 11:50:51 AM EST, ned+dmarc@mrochek.com wrote:
>> On 12/29/2014 7:26 AM, MH Michael Hammer (5304) wrote:
>> > It's still not quite right:
>> >
>> > DMARC evaluation can only complete and yield a "pass" result when
>one
>> >
>> >
>> > of the underlying authentication mechanisms passes for an aligned
>> >
>> > identifier.  If this is not the case and either or both of them
>> >
>> > suffered some kind of temporary error (such as a transient DNS
>> >
>> > problem), the Receiver evaluating the message is also unable to
>> >
>> > conclude that the DMARC mechanism failed and thereby apply the
>> >
>> > advertised DMARC policy.  Rather, the Receiver can either skip
>DMARC
>> >
>> >
>> > processing for this message due to incomplete evaluation, or it can
>> >
>> >
>> > arrange to defer handling of the message in the hope that the
>> >
>> > temporary error will be resolved when the message is retried.  When
>> >
>> >
>> > otherwise appropriate due to DMARC policy, receivers MAY send
>> >
>> > feedback reports regarding temporary errors.
>> >
>> >
>> > The problem is with:
>> >
>> > "If this is not the case and either or both of them suffered some
>> > kind of temporary error (such as a transient DNS problem),...",
>> > Specifically the use of "either or". If only one (SPF or DKIM) has
>a
>> > transient DNS error then presumably the other, which has not had an
>> > error, can be evaluated (resulting in a "pass" or "DMARC failure".
>It
>> > only becomes an issue when BOTH SPF and DKIM have concurrent
>> > temporary errors.  I'm thinking that removing the "either or" is
>> > appropriate. I'm still cogitating on the rest of the paragraph.
>
>
>> Good catch.  This is complicated by there really being two
>conditions.
>
>> The first is the negative that neither method authenticates.  The
>second
>> is the affirmative that one of them failed with a temporary error.
>
>> So perhaps something like:
>
>> FROM:
>
>> > DMARC evaluation can only complete and yield a "pass" result when
>one
>> > of the underlying authentication mechanisms passes for an aligned
>> > identifier.  If this is not the case and either or both of them
>> > suffered some kind of temporary error (such as a transient DNS
>> > problem), the Receiver evaluating the message is also unable to
>> > conclude that the DMARC mechanism failed and thereby apply the
>> > advertised DMARC policy.
>
>
>> TO:
>
>> DMARC evaluation can only complete and yield a "pass" result when one
>> of the underlying authentication mechanisms passes for an aligned
>> identifier.  If neither passes and one or both of them failed due to
>a
>> temporary error, the Receiver evaluating the message is also unable
>to
>> conclude that the DMARC mechanism had a permanent failure and thereby
>> can apply the advertised DMARC policy.
>
>This looks good to me.

Shouldn't it be cannot apply the advertised DMARC policy? 

Scott K


From nobody Mon Dec 29 11:32:37 2014
Return-Path: <dhc@dcrocker.net>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3857D1A9123 for <dmarc@ietfa.amsl.com>; Mon, 29 Dec 2014 11:32:36 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QNSmPePOCHXp for <dmarc@ietfa.amsl.com>; Mon, 29 Dec 2014 11:32:35 -0800 (PST)
Received: from sbh17.songbird.com (sbh17.songbird.com [72.52.113.17]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 273831A9117 for <dmarc@ietf.org>; Mon, 29 Dec 2014 11:32:35 -0800 (PST)
Received: from [172.29.109.235] (wsip-72-214-58-13.sd.sd.cox.net [72.214.58.13]) (authenticated bits=0) by sbh17.songbird.com (8.13.8/8.13.8) with ESMTP id sBTJWUg4012685 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT); Mon, 29 Dec 2014 11:32:34 -0800
Message-ID: <54A1AC4B.2050500@dcrocker.net>
Date: Mon, 29 Dec 2014 11:32:27 -0800
From: Dave Crocker <dhc@dcrocker.net>
Organization: Brandenburg InternetWorking
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Thunderbird/31.3.0
MIME-Version: 1.0
To: Scott Kitterman <sklist@kitterman.com>, "dmarc@ietf.org" <dmarc@ietf.org>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <2397001.Fx3SqMl5ZI@scott-latitude-e6320> <CAL0qLwakLdWhHW+JbfQ=LO9yPSSOB=fH_oyLNMpGRPS_EAuudg@mail.gmail.com> <3004337.MAocVZ5Co9@scott-latitude-e6320> <CAL0qLwYqmVZdW_XivU0=Vr7itDvfw_0+qm7dthN9nJYXDZK2bg@mail.gmail.com> <66CEE14F-375D-4FE9-9485-6DFE58911E54@kitterman.com> <CE39F90A45FF0C49A1EA229FC9899B0525F5323E@USCLES544.agna.amgreetings.com> <54A183EB.6080508@dcrocker.net> <01PGOJ9M6F5E00005K@mauve.mrochek.com> <19D0C566-275F-474B-B823-B7D79CACD8C7@kitterman.com>
In-Reply-To: <19D0C566-275F-474B-B823-B7D79CACD8C7@kitterman.com>
Content-Type: text/plain; charset=windows-1252
Content-Transfer-Encoding: 7bit
X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.0 (sbh17.songbird.com [72.52.113.66]); Mon, 29 Dec 2014 11:32:34 -0800 (PST)
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/u-H_eI3ynnA4mmZSBgstFM1c3Ic
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: dcrocker@bbiw.net
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 29 Dec 2014 19:32:36 -0000

On 12/29/2014 10:40 AM, Scott Kitterman wrote:
TO:
>> >
DMARC evaluation can only complete and yield a "pass" result when one
of the underlying authentication mechanisms passes for an aligned
identifier.  If neither passes and one or both of them failed due to
>> >a
temporary error, the Receiver evaluating the message is also unable
>> >to
conclude that the DMARC mechanism had a permanent failure and thereby
can apply the advertised DMARC policy.
>> >
>> >This looks good to me.
> Shouldn't it be cannot apply the advertised DMARC policy? 

Actually, no, but I also was confused.  It took me some serious effort
to decide that the current wording was correct.  And a spec should not
require that sort of linguistic diligence, IMO.

Looks like a small change can make your form correct...

So I suggest:

     DMARC evaluation can only yield a "pass" result after one
of the underlying authentication mechanisms passes for an aligned
identifier. If neither passes and one or both of them fails due to a
temporary error, the Receiver evaluating the message is unable to
conclude that the DMARC mechanism had a permanent failure; they
therefore cannot (yet) apply the advertised DMARC policy.

d/
-- 
Dave Crocker
Brandenburg InternetWorking
bbiw.net


From nobody Mon Dec 29 11:38:50 2014
Return-Path: <sklist@kitterman.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 09F1B1A89F2 for <dmarc@ietfa.amsl.com>; Mon, 29 Dec 2014 11:38:48 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.002
X-Spam-Level: 
X-Spam-Status: No, score=-2.002 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3BZbh3QpsjzX for <dmarc@ietfa.amsl.com>; Mon, 29 Dec 2014 11:38:47 -0800 (PST)
Received: from mailout03.controlledmail.com (mailout03.controlledmail.com [208.43.65.50]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F2CFB1A89F0 for <dmarc@ietf.org>; Mon, 29 Dec 2014 11:38:46 -0800 (PST)
Received: from [192.168.111.2] (static-72-81-252-22.bltmmd.fios.verizon.net [72.81.252.22]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mailout03.controlledmail.com (Postfix) with ESMTPSA id DAD67C40076; Mon, 29 Dec 2014 13:38:45 -0600 (CST)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=kitterman.com; s=201409; t=1419881925; bh=KyvoZHWQq22NElEolBKsB77LkMj9svBnYKkHHnEuKqA=; h=In-Reply-To:References:Subject:From:Date:To:From; b=uwiJBMJvdBuHDi9QvTXA9+kizbWpzxRxxujV5qooe9EMHJvyZdxQoHTt38bVDq4l2 R97m3uBfh/eZaglO30c7qoo1KLDehA/Fb0Emrm6y7hsN//6r6Vat4yr2AS3QtxP2Lt 6YsugTL9rOfUGJ566NuQ62hNzBTlWNYenehrXaRM=
User-Agent: K-9 Mail for Android
In-Reply-To: <54A1AC4B.2050500@dcrocker.net>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <2397001.Fx3SqMl5ZI@scott-latitude-e6320> <CAL0qLwakLdWhHW+JbfQ=LO9yPSSOB=fH_oyLNMpGRPS_EAuudg@mail.gmail.com> <3004337.MAocVZ5Co9@scott-latitude-e6320> <CAL0qLwYqmVZdW_XivU0=Vr7itDvfw_0+qm7dthN9nJYXDZK2bg@mail.gmail.com> <66CEE14F-375D-4FE9-9485-6DFE58911E54@kitterman.com> <CE39F90A45FF0C49A1EA229FC9899B0525F5323E@USCLES544.agna.amgreetings.com> <54A183EB.6080508@dcrocker.net> <01PGOJ9M6F5E00005K@mauve.mrochek.com> <19D0C566-275F-474B-B823-B7D79CACD8C7@kitterman.com> <54A1AC4B.2050500@dcrocker.net>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
Content-Type: text/plain; charset=UTF-8
From: Scott Kitterman <sklist@kitterman.com>
Date: Mon, 29 Dec 2014 14:38:43 -0500
To: "dmarc@ietf.org" <dmarc@ietf.org>
Message-ID: <31BA1A25-D64B-4FA6-B4F5-1AD2342C35DA@kitterman.com>
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/5BkSpcNdQi_o_Fj2aozd3YQe4_w
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 29 Dec 2014 19:38:48 -0000

On December 29, 2014 2:32:27 PM EST, Dave Crocker <dhc@dcrocker.net> wrote:
>On 12/29/2014 10:40 AM, Scott Kitterman wrote:
>TO:
>>> >
>DMARC evaluation can only complete and yield a "pass" result when one
>of the underlying authentication mechanisms passes for an aligned
>identifier.  If neither passes and one or both of them failed due to
>>> >a
>temporary error, the Receiver evaluating the message is also unable
>>> >to
>conclude that the DMARC mechanism had a permanent failure and thereby
>can apply the advertised DMARC policy.
>>> >
>>> >This looks good to me.
>> Shouldn't it be cannot apply the advertised DMARC policy? 
>
>Actually, no, but I also was confused.  It took me some serious effort
>to decide that the current wording was correct.  And a spec should not
>require that sort of linguistic diligence, IMO.
>
>Looks like a small change can make your form correct...
>
>So I suggest:
>
>     DMARC evaluation can only yield a "pass" result after one
>of the underlying authentication mechanisms passes for an aligned
>identifier. If neither passes and one or both of them fails due to a
>temporary error, the Receiver evaluating the message is unable to
>conclude that the DMARC mechanism had a permanent failure; they
>therefore cannot (yet) apply the advertised DMARC policy.
>
>d/

I think that's better. I'd prefer to leave out the parenthetical yet as I think it raises ambiguity rather than reduces it.

Scott K


From nobody Mon Dec 29 12:15:32 2014
Return-Path: <MHammer@ag.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3312F1AC40B for <dmarc@ietfa.amsl.com>; Mon, 29 Dec 2014 12:15:30 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level: 
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Dzrv52uu1x9x for <dmarc@ietfa.amsl.com>; Mon, 29 Dec 2014 12:15:28 -0800 (PST)
Received: from agwhqht.amgreetings.com (agwhqht.amgreetings.com [207.58.192.41]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 451D21AC3F7 for <dmarc@ietf.org>; Mon, 29 Dec 2014 12:15:27 -0800 (PST)
Received: from USCLES544.agna.amgreetings.com ([fe80::f5de:4c30:bc26:d70a]) by USCLES531.agna.amgreetings.com ([::1]) with mapi id 14.03.0210.002;  Mon, 29 Dec 2014 15:15:26 -0500
From: "MH Michael Hammer (5304)" <MHammer@ag.com>
To: "dcrocker@bbiw.net" <dcrocker@bbiw.net>, Scott Kitterman <sklist@kitterman.com>, "dmarc@ietf.org" <dmarc@ietf.org>
Thread-Topic: [dmarc-ietf] Jim Fenton's review of -04
Thread-Index: AQHQG9L/KxUX7EmxxEmD4981Pp72RJycGGUAgAKKnwCAACqBgIAAcEYAgAB1yoCAAGibgIAAEk8AgAFZIoCAACS1AIAFEfLwgABqHYD//7D7doAAcJ+AgAAOh4D//7YBQA==
Date: Mon, 29 Dec 2014 20:15:26 +0000
Message-ID: <CE39F90A45FF0C49A1EA229FC9899B0525F535AA@USCLES544.agna.amgreetings.com>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <2397001.Fx3SqMl5ZI@scott-latitude-e6320> <CAL0qLwakLdWhHW+JbfQ=LO9yPSSOB=fH_oyLNMpGRPS_EAuudg@mail.gmail.com> <3004337.MAocVZ5Co9@scott-latitude-e6320> <CAL0qLwYqmVZdW_XivU0=Vr7itDvfw_0+qm7dthN9nJYXDZK2bg@mail.gmail.com> <66CEE14F-375D-4FE9-9485-6DFE58911E54@kitterman.com> <CE39F90A45FF0C49A1EA229FC9899B0525F5323E@USCLES544.agna.amgreetings.com> <54A183EB.6080508@dcrocker.net> <01PGOJ9M6F5E00005K@mauve.mrochek.com> <19D0C566-275F-474B-B823-B7D79CACD8C7@kitterman.com> <54A1AC4B.2050500@dcrocker.net>
In-Reply-To: <54A1AC4B.2050500@dcrocker.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.144.15.221]
x-kse-antivirus-interceptor-info: scan successful
x-kse-antivirus-info: Clean
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/UC04kyr1QR92rKxdBYyfZgzXq5E
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 29 Dec 2014 20:15:30 -0000

Still not quite correct...

> -----Original Message-----
> From: dmarc [mailto:dmarc-bounces@ietf.org] On Behalf Of Dave Crocker
> Sent: Monday, December 29, 2014 2:32 PM
> To: Scott Kitterman; dmarc@ietf.org
> Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
>=20
> On 12/29/2014 10:40 AM, Scott Kitterman wrote:
> TO:
> >> >
> DMARC evaluation can only complete and yield a "pass" result when one of
> the underlying authentication mechanisms passes for an aligned identifier=
.  If
> neither passes and one or both of them failed due to
> >> >a
> temporary error, the Receiver evaluating the message is also unable
> >> >to
> conclude that the DMARC mechanism had a permanent failure and thereby
> can apply the advertised DMARC policy.
> >> >
> >> >This looks good to me.
> > Shouldn't it be cannot apply the advertised DMARC policy?
>=20
> Actually, no, but I also was confused.  It took me some serious effort to
> decide that the current wording was correct.  And a spec should not requi=
re
> that sort of linguistic diligence, IMO.
>=20
> Looks like a small change can make your form correct...
>=20
> So I suggest:
>=20
>      DMARC evaluation can only yield a "pass" result after one of the
> underlying authentication mechanisms passes for an aligned identifier. If
> neither passes and one or both of them fails due to a temporary error, th=
e
> Receiver evaluating the message is unable to conclude that the DMARC
> mechanism had a permanent failure; they therefore cannot (yet) apply the
> advertised DMARC policy.
>=20
> d/
> --

If neither of them passes and only one of them fails due to a temporary err=
or (but the other one does not fail due to a temporary error) then the othe=
r one should (must?, not in the normative sense) be an actual failure. Perh=
aps the wording should be: "If neither SPF nor DKIM pass and both of them f=
ail due to temporary errors...". The case we seem to be discussing is where=
 we have temporary failures for both SPF and DKIM.

The other issue (more than a quibble) I have is leaving it at "; they there=
fore cannot (yet) apply the advertised DMARC policy." What should they do? =
I prefer the treat it as a tempfail and allow for retries. The problem with=
 that approach is if the mail has been accepted for delivery. I don't like =
the idea of DSNs or out of band bounces.

Mike


From nobody Mon Dec 29 12:24:22 2014
Return-Path: <sklist@kitterman.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0426D1AC82C for <dmarc@ietfa.amsl.com>; Mon, 29 Dec 2014 12:24:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.002
X-Spam-Level: 
X-Spam-Status: No, score=-2.002 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lxgqVWo0VRpl for <dmarc@ietfa.amsl.com>; Mon, 29 Dec 2014 12:24:18 -0800 (PST)
Received: from mailout03.controlledmail.com (mailout03.controlledmail.com [208.43.65.50]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 15D8A1A907F for <dmarc@ietf.org>; Mon, 29 Dec 2014 12:24:17 -0800 (PST)
Received: from [192.168.111.2] (static-72-81-252-22.bltmmd.fios.verizon.net [72.81.252.22]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mailout03.controlledmail.com (Postfix) with ESMTPSA id D3536C40076; Mon, 29 Dec 2014 14:24:15 -0600 (CST)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=kitterman.com; s=201409; t=1419884656; bh=ed1ExPGX5IehPrSyBYyhNktPZc+20+PiFeHwYADKuyg=; h=In-Reply-To:References:Subject:From:Date:To:From; b=lKiefe29sdnVFrhSPAEQZrNahiTTFI/r/NRYxXrM5KH4dY5m5jCO0QfYIW3enUNvo edekhc0qiFya6gJddE494rpb+PwIiTyrrpznVare/3RCQ/mfGROD/86WCuizdtkk37 KhGLFmxpZDSroVcErv1sXmwONOhRCS6gSmUp9Rk0=
User-Agent: K-9 Mail for Android
In-Reply-To: <CE39F90A45FF0C49A1EA229FC9899B0525F535AA@USCLES544.agna.amgreetings.com>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <2397001.Fx3SqMl5ZI@scott-latitude-e6320> <CAL0qLwakLdWhHW+JbfQ=LO9yPSSOB=fH_oyLNMpGRPS_EAuudg@mail.gmail.com> <3004337.MAocVZ5Co9@scott-latitude-e6320> <CAL0qLwYqmVZdW_XivU0=Vr7itDvfw_0+qm7dthN9nJYXDZK2bg@mail.gmail.com> <66CEE14F-375D-4FE9-9485-6DFE58911E54@kitterman.com> <CE39F90A45FF0C49A1EA229FC9899B0525F5323E@USCLES544.agna.amgreetings.com> <54A183EB.6080508@dcrocker.net> <01PGOJ9M6F5E00005K@mauve.mrochek.com> <19D0C566-275F-474B-B823-B7D79CACD8C7@kitterman.com> <54A1AC4B.2050500@dcrocker.net> <CE39F90A45FF0C49A1EA229FC9899B0525F535AA@USCLES544.agna.amgreetings.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
Content-Type: text/plain; charset=UTF-8
From: Scott Kitterman <sklist@kitterman.com>
Date: Mon, 29 Dec 2014 15:21:46 -0500
To: "dmarc@ietf.org" <dmarc@ietf.org>
Message-ID: <A9FDF340-7BF5-4FF4-A7C2-616E90AE988D@kitterman.com>
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/TzIYlrrdOEpFGJWZWVjm19TNQwg
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 29 Dec 2014 20:24:20 -0000

On December 29, 2014 3:15:26 PM EST, "MH Michael Hammer (5304)" <MHammer@ag.com> wrote:
>Still not quite correct...
>
>> -----Original Message-----
>> From: dmarc [mailto:dmarc-bounces@ietf.org] On Behalf Of Dave Crocker
>> Sent: Monday, December 29, 2014 2:32 PM
>> To: Scott Kitterman; dmarc@ietf.org
>> Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
>> 
>> On 12/29/2014 10:40 AM, Scott Kitterman wrote:
>> TO:
>> >> >
>> DMARC evaluation can only complete and yield a "pass" result when one
>of
>> the underlying authentication mechanisms passes for an aligned
>identifier.  If
>> neither passes and one or both of them failed due to
>> >> >a
>> temporary error, the Receiver evaluating the message is also unable
>> >> >to
>> conclude that the DMARC mechanism had a permanent failure and thereby
>> can apply the advertised DMARC policy.
>> >> >
>> >> >This looks good to me.
>> > Shouldn't it be cannot apply the advertised DMARC policy?
>> 
>> Actually, no, but I also was confused.  It took me some serious
>effort to
>> decide that the current wording was correct.  And a spec should not
>require
>> that sort of linguistic diligence, IMO.
>> 
>> Looks like a small change can make your form correct...
>> 
>> So I suggest:
>> 
>>      DMARC evaluation can only yield a "pass" result after one of the
>> underlying authentication mechanisms passes for an aligned
>identifier. If
>> neither passes and one or both of them fails due to a temporary
>error, the
>> Receiver evaluating the message is unable to conclude that the DMARC
>> mechanism had a permanent failure; they therefore cannot (yet) apply
>the
>> advertised DMARC policy.
>> 
>> d/
>> --
>
>If neither of them passes and only one of them fails due to a temporary
>error (but the other one does not fail due to a temporary error) then
>the other one should (must?, not in the normative sense) be an actual
>failure. Perhaps the wording should be: "If neither SPF nor DKIM pass
>and both of them fail due to temporary errors...". The case we seem to
>be discussing is where we have temporary failures for both SPF and
>DKIM.

No.  As long as either of them have a temporary DNS error, then you can't apply DMARC policy. 

>The other issue (more than a quibble) I have is leaving it at "; they
>therefore cannot (yet) apply the advertised DMARC policy." What should
>they do? I prefer the treat it as a tempfail and allow for retries. The
>problem with that approach is if the mail has been accepted for
>delivery. I don't like the idea of DSNs or out of band bounces.

I think the only two reasonable choices are defer and see what happens on retry or to treat it as DMARC none and press on with other checks. 

Scott K


From nobody Mon Dec 29 12:32:45 2014
Return-Path: <MHammer@ag.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AA9AE1A8AF4 for <dmarc@ietfa.amsl.com>; Mon, 29 Dec 2014 12:32:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level: 
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8_f-FhjUVwf8 for <dmarc@ietfa.amsl.com>; Mon, 29 Dec 2014 12:32:42 -0800 (PST)
Received: from agwhqht.amgreetings.com (agwhqht.amgreetings.com [207.58.192.41]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6E1AE1A8AD7 for <dmarc@ietf.org>; Mon, 29 Dec 2014 12:32:41 -0800 (PST)
Received: from USCLES544.agna.amgreetings.com ([fe80::f5de:4c30:bc26:d70a]) by USCLES531.agna.amgreetings.com ([::1]) with mapi id 14.03.0210.002;  Mon, 29 Dec 2014 15:32:40 -0500
From: "MH Michael Hammer (5304)" <MHammer@ag.com>
To: Scott Kitterman <sklist@kitterman.com>, "dmarc@ietf.org" <dmarc@ietf.org>
Thread-Topic: [dmarc-ietf] Jim Fenton's review of -04
Thread-Index: AQHQG9L/KxUX7EmxxEmD4981Pp72RJycGGUAgAKKnwCAACqBgIAAcEYAgAB1yoCAAGibgIAAEk8AgAFZIoCAACS1AIAFEfLwgABqHYD//7D7doAAcJ+AgAAOh4D//7YBQIAAV8cA//+tbZA=
Date: Mon, 29 Dec 2014 20:32:39 +0000
Message-ID: <CE39F90A45FF0C49A1EA229FC9899B0525F535D6@USCLES544.agna.amgreetings.com>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <2397001.Fx3SqMl5ZI@scott-latitude-e6320> <CAL0qLwakLdWhHW+JbfQ=LO9yPSSOB=fH_oyLNMpGRPS_EAuudg@mail.gmail.com> <3004337.MAocVZ5Co9@scott-latitude-e6320> <CAL0qLwYqmVZdW_XivU0=Vr7itDvfw_0+qm7dthN9nJYXDZK2bg@mail.gmail.com> <66CEE14F-375D-4FE9-9485-6DFE58911E54@kitterman.com> <CE39F90A45FF0C49A1EA229FC9899B0525F5323E@USCLES544.agna.amgreetings.com> <54A183EB.6080508@dcrocker.net> <01PGOJ9M6F5E00005K@mauve.mrochek.com> <19D0C566-275F-474B-B823-B7D79CACD8C7@kitterman.com> <54A1AC4B.2050500@dcrocker.net> <CE39F90A45FF0C49A1EA229FC9899B0525F535AA@USCLES544.agna.amgreetings.com> <A9FDF340-7BF5-4FF4-A7C2-616E90AE988D@kitterman.com>
In-Reply-To: <A9FDF340-7BF5-4FF4-A7C2-616E90AE988D@kitterman.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.144.15.221]
x-kse-antivirus-interceptor-info: scan successful
x-kse-antivirus-info: Clean
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/uydHh_HhlXmPVb1ATrTb2Fioo4s
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 29 Dec 2014 20:32:43 -0000

> -----Original Message-----
> From: dmarc [mailto:dmarc-bounces@ietf.org] On Behalf Of Scott Kitterman
> Sent: Monday, December 29, 2014 3:22 PM
> To: dmarc@ietf.org
> Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
>=20
> On December 29, 2014 3:15:26 PM EST, "MH Michael Hammer (5304)"
> <MHammer@ag.com> wrote:
> >Still not quite correct...
> >
> >> -----Original Message-----
> >> From: dmarc [mailto:dmarc-bounces@ietf.org] On Behalf Of Dave Crocker
> >> Sent: Monday, December 29, 2014 2:32 PM
> >> To: Scott Kitterman; dmarc@ietf.org
> >> Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
> >>
> >> On 12/29/2014 10:40 AM, Scott Kitterman wrote:
> >> TO:
> >> >> >
> >> DMARC evaluation can only complete and yield a "pass" result when one
> >of
> >> the underlying authentication mechanisms passes for an aligned
> >identifier.  If
> >> neither passes and one or both of them failed due to
> >> >> >a
> >> temporary error, the Receiver evaluating the message is also unable
> >> >> >to
> >> conclude that the DMARC mechanism had a permanent failure and
> thereby
> >> can apply the advertised DMARC policy.
> >> >> >
> >> >> >This looks good to me.
> >> > Shouldn't it be cannot apply the advertised DMARC policy?
> >>
> >> Actually, no, but I also was confused.  It took me some serious
> >effort to
> >> decide that the current wording was correct.  And a spec should not
> >require
> >> that sort of linguistic diligence, IMO.
> >>
> >> Looks like a small change can make your form correct...
> >>
> >> So I suggest:
> >>
> >>      DMARC evaluation can only yield a "pass" result after one of the
> >> underlying authentication mechanisms passes for an aligned
> >identifier. If
> >> neither passes and one or both of them fails due to a temporary
> >error, the
> >> Receiver evaluating the message is unable to conclude that the DMARC
> >> mechanism had a permanent failure; they therefore cannot (yet) apply
> >the
> >> advertised DMARC policy.
> >>
> >> d/
> >> --
> >
> >If neither of them passes and only one of them fails due to a temporary
> >error (but the other one does not fail due to a temporary error) then
> >the other one should (must?, not in the normative sense) be an actual
> >failure. Perhaps the wording should be: "If neither SPF nor DKIM pass
> >and both of them fail due to temporary errors...". The case we seem to
> >be discussing is where we have temporary failures for both SPF and
> >DKIM.
>=20
> No.  As long as either of them have a temporary DNS error, then you can't
> apply DMARC policy.
>=20

DOH! I stand corrected.

> >The other issue (more than a quibble) I have is leaving it at "; they
> >therefore cannot (yet) apply the advertised DMARC policy." What should
> >they do? I prefer the treat it as a tempfail and allow for retries. The
> >problem with that approach is if the mail has been accepted for
> >delivery. I don't like the idea of DSNs or out of band bounces.
>=20
> I think the only two reasonable choices are defer and see what happens on
> retry or to treat it as DMARC none and press on with other checks.
>=20

I suppose it's ultimately another example of local policy.  I feel like a D=
MARC "none" opens the door to abuse (I'm thinking of abused financials for =
example). How easily can an abuser induce temporary failures for DNS for a =
given host/domain? I'd prefer a recommendation of "defer and retry" rather =
than a fail open (DMARC none).

Mike=20


From nobody Mon Dec 29 13:57:45 2014
Return-Path: <dhc@dcrocker.net>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EA38D1A9128 for <dmarc@ietfa.amsl.com>; Mon, 29 Dec 2014 13:57:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SefVgHaabN9w for <dmarc@ietfa.amsl.com>; Mon, 29 Dec 2014 13:57:42 -0800 (PST)
Received: from sbh17.songbird.com (sbh17.songbird.com [72.52.113.17]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A6B981A9113 for <dmarc@ietf.org>; Mon, 29 Dec 2014 13:57:42 -0800 (PST)
Received: from [172.29.109.235] (wsip-72-214-58-13.sd.sd.cox.net [72.214.58.13]) (authenticated bits=0) by sbh17.songbird.com (8.13.8/8.13.8) with ESMTP id sBTLvcwL014691 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT) for <dmarc@ietf.org>; Mon, 29 Dec 2014 13:57:42 -0800
Message-ID: <54A1CE4F.2040303@dcrocker.net>
Date: Mon, 29 Dec 2014 13:57:35 -0800
From: Dave Crocker <dhc@dcrocker.net>
Organization: Brandenburg InternetWorking
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Thunderbird/31.3.0
MIME-Version: 1.0
To: dmarc@ietf.org
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <2397001.Fx3SqMl5ZI@scott-latitude-e6320> <CAL0qLwakLdWhHW+JbfQ=LO9yPSSOB=fH_oyLNMpGRPS_EAuudg@mail.gmail.com> <3004337.MAocVZ5Co9@scott-latitude-e6320> <CAL0qLwYqmVZdW_XivU0=Vr7itDvfw_0+qm7dthN9nJYXDZK2bg@mail.gmail.com> <66CEE14F-375D-4FE9-9485-6DFE58911E54@kitterman.com> <CE39F90A45FF0C49A1EA229FC9899B0525F5323E@USCLES544.agna.amgreetings.com> <54A183EB.6080508@dcrocker.net> <01PGOJ9M6F5E00005K@mauve.mrochek.com> <19D0C566-275F-474B-B823-B7D79CACD8C7@kitterman.com> <54A1AC4B.2050500@dcrocker.net> <CE39F90A45FF0C49A1EA229FC9899B0525F535AA@USCLES544.agna.amgreetings.com> <A9FDF340-7BF5-4FF4-A7C2-616E90AE988D@kitterman.com> <CE39F90A45FF0C49A1EA229FC9899B0525F535D6@USCLES544.agna.amgreetings.com>
In-Reply-To: <CE39F90A45FF0C49A1EA229FC9899B0525F535D6@USCLES544.agna.amgreetings.com>
Content-Type: text/plain; charset=windows-1252
Content-Transfer-Encoding: 7bit
X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.0 (sbh17.songbird.com [72.52.113.66]); Mon, 29 Dec 2014 13:57:42 -0800 (PST)
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/AetyzWM6sibysqCoOt0QKXbYxIA
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: dcrocker@bbiw.net
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 29 Dec 2014 21:57:44 -0000

On 12/29/2014 12:32 PM, MH Michael Hammer (5304) wrote:
> I suppose it's ultimately another example of local policy. 

Depends on what that means.

The rule within the protocol needs to be -- and is -- mechanical and
universal: In order to apply DMARC policy, you must first obtain an
authenticated (or, described more usefully, 'authorized') domain name
that is aligned with the From: field domain.

A protocol that treats an initial, temporary error as producing a
permanent error is a pretty fragile protocol, in a networking
environment.  As such, DMARC should at least strongly recommend retries,
in the case of no passes and at least one temp fail.

d/

-- 
Dave Crocker
Brandenburg InternetWorking
bbiw.net


From nobody Mon Dec 29 13:59:47 2014
Return-Path: <smj@crash.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 43B8B1A9113 for <dmarc@ietfa.amsl.com>; Mon, 29 Dec 2014 13:59:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.012
X-Spam-Level: 
X-Spam-Status: No, score=-2.012 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wSVlRl13G1WT for <dmarc@ietfa.amsl.com>; Mon, 29 Dec 2014 13:59:45 -0800 (PST)
Received: from segv.crash.com (segv.crash.com [IPv6:2001:470:1:1e9::4415]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 369C11A9007 for <dmarc@ietf.org>; Mon, 29 Dec 2014 13:59:45 -0800 (PST)
Received: from [10.10.10.41] (70-36-157-26.dsl.static.fusionbroadband.com [70.36.157.26]) (authenticated bits=0) by segv.crash.com (8.14.5/8.14.5/cci-colo-1.6) with ESMTP id sBTLxcnO000240 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NO) for <dmarc@ietf.org>; Mon, 29 Dec 2014 13:59:43 -0800 (PST) (envelope-from smj@crash.com)
X-DKIM: OpenDKIM Filter v2.4.3 segv.crash.com sBTLxcnO000240
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=crash.com; s=20130426; t=1419890383; bh=z0PlX58avzALF1LYVrQPXmhfuDBv3sC7FFZ0hIJLuXA=; h=Message-ID:Date:From:MIME-Version:To:Subject:References: In-Reply-To:Content-Type:Content-Transfer-Encoding; b=MZbC/x7CSU64p0EwM3uV9WJ4RMOA8ojFvInZGYJz5TTiV8v/8Q7WbsS2it2I9mYa3 Ns9okgzMxJIE13m47kXhTNLE2uxBe0OtehC2AS+qqDYflvzA3Qsfgsl/44yUciw356 Kh/TZHBZcNdGPU0c+OfFl67tgGrIV/ggFuGMQ8m8=
X-Authentication-Warning: segv.crash.com: Host 70-36-157-26.dsl.static.fusionbroadband.com [70.36.157.26] claimed to be [10.10.10.41]
Message-ID: <54A1CECB.7010309@crash.com>
Date: Mon, 29 Dec 2014 13:59:39 -0800
From: Steven M Jones <smj@crash.com>
Organization: Crash Computing, Inc.
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Icedove/24.8.1
MIME-Version: 1.0
To: dmarc@ietf.org
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <2397001.Fx3SqMl5ZI@scott-latitude-e6320> <CAL0qLwakLdWhHW+JbfQ=LO9yPSSOB=fH_oyLNMpGRPS_EAuudg@mail.gmail.com> <3004337.MAocVZ5Co9@scott-latitude-e6320> <CAL0qLwYqmVZdW_XivU0=Vr7itDvfw_0+qm7dthN9nJYXDZK2bg@mail.gmail.com> <66CEE14F-375D-4FE9-9485-6DFE58911E54@kitterman.com> <CE39F90A45FF0C49A1EA229FC9899B0525F5323E@USCLES544.agna.amgreetings.com> <54A183EB.6080508@dcrocker.net> <01PGOJ9M6F5E00005K@mauve.mrochek.com> <19D0C566-275F-474B-B823-B7D79CACD8C7@kitterman.com> <54A1AC4B.2050500@dcrocker.net> <CE39F90A45FF0C49A1EA229FC9899B0525F535AA@USCLES544.agna.amgreetings.com> <A9FDF340-7BF5-4FF4-A7C2-616E90AE988D@kitterman.com> <CE39F90A45FF0C49A1EA229FC9899B0525F535D6@USCLES544.agna.amgreetings.com>
In-Reply-To: <CE39F90A45FF0C49A1EA229FC9899B0525F535D6@USCLES544.agna.amgreetings.com>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.2.7 (segv.crash.com [72.52.75.15]); Mon, 29 Dec 2014 13:59:43 -0800 (PST)
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/WVFS_ydtKocHID_5a2pAWSUHLmM
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 29 Dec 2014 21:59:46 -0000

On 12/29/2014 12:32 PM, MH Michael Hammer (5304) wrote:
>
>> -----Original Message-----
>> From: dmarc [mailto:dmarc-bounces@ietf.org] On Behalf Of Scott Kitterman
>> [...]
>> I think the only two reasonable choices are defer and see what happens on
>> retry or to treat it as DMARC none and press on with other checks.
>>
> I suppose it's ultimately another example of local policy.  I feel like a DMARC "none" opens the door to abuse (I'm thinking of abused financials for example). How easily can an abuser induce temporary failures for DNS for a given host/domain? I'd prefer a recommendation of "defer and retry" rather than a fail open (DMARC none).

Is this a point where the phrase "documenting existing common practice"
should guide us? That sounded a lot like recommending a practice versus
documenting...

--S.


From nobody Mon Dec 29 14:29:40 2014
Return-Path: <R.E.Sonneveld@sonnection.nl>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7B29D1A9111 for <dmarc@ietfa.amsl.com>; Mon, 29 Dec 2014 14:29:37 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0
X-Spam-Level: 
X-Spam-Status: No, score=0 tagged_above=-999 required=5 tests=[BAYES_50=0.8, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ScDECDXysEgq for <dmarc@ietfa.amsl.com>; Mon, 29 Dec 2014 14:29:32 -0800 (PST)
Received: from mx10.mailtransaction.com (mx10.mailtransaction.com [88.198.59.241]) by ietfa.amsl.com (Postfix) with ESMTP id 86F9C1A90B3 for <dmarc@ietf.org>; Mon, 29 Dec 2014 14:29:31 -0800 (PST)
Received: from mx14.mailtransaction.com (mx11.mailtransaction.com [88.198.59.230]) by mx10.mailtransaction.com (Postfix) with ESMTP id 3kBD2f3YKqz5MhcJ; Mon, 29 Dec 2014 23:29:30 +0100 (CET)
Received: from jaguar.sonnection.nl (D57E1702.static.ziggozakelijk.nl [213.126.23.2]) by mx14.mailtransaction.com (Postfix) with ESMTP id 3kBD2f1qr5z5MhXC; Mon, 29 Dec 2014 23:29:30 +0100 (CET)
Received: from localhost (localhost [127.0.0.1]) by jaguar.sonnection.nl (Postfix) with ESMTP id 4B9B7123465; Mon, 29 Dec 2014 23:29:34 +0100 (CET)
X-Virus-Scanned: amavisd-new at sonnection.nl
Received: from jaguar.sonnection.nl ([127.0.0.1]) by localhost (jaguar.sonnection.nl [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id qbEdoplKj7Mw; Mon, 29 Dec 2014 23:29:27 +0100 (CET)
Received: from [192.168.1.49] (unknown [192.168.1.49]) by jaguar.sonnection.nl (Postfix) with ESMTPSA id 8316012344E; Mon, 29 Dec 2014 23:29:27 +0100 (CET)
Message-ID: <54A1D5C1.9030505@sonnection.nl>
Date: Mon, 29 Dec 2014 23:29:21 +0100
From: "Rolf E. Sonneveld" <R.E.Sonneveld@sonnection.nl>
Organization: Sonnection B.V.
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.3.0
MIME-Version: 1.0
To: "Murray S. Kucherawy" <superuser@gmail.com>
References: <CAL0qLwYOtQe0RLfPmO6TjoJv4CUKUoiRV=uzi29ip70_OZ9p3A@mail.gmail.com>	<5463ECBD.9030703@sonnection.nl> <CAL0qLwYSTGhBixiOEyxnbQJ5O6h4F+0-8xiAAE7kvUUEnogkiQ@mail.gmail.com>
In-Reply-To: <CAL0qLwYSTGhBixiOEyxnbQJ5O6h4F+0-8xiAAE7kvUUEnogkiQ@mail.gmail.com>
Content-Type: multipart/alternative; boundary="------------060606070207000000070807"
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=sonnection.nl; s=2009; t=1419892170; bh=pHcMWMth2gQKBJnv9S4zF7BcM4NBFLyBjj+SBltN+ew=; h=Message-ID:Date:From:To:Subject:From; b=RIyrrfwpUUglBEFuUvqY7GJ5xSAg+TLRUtcD1X0R8RvL65cU5f+XKt1Y9KWOlCFbI uynYcZb32Nwb9hgLmAPQ6BbRfbQNSoqMf9vdo/Le4HOkVT62fUq7I9DjbEdRybkrCG bYSPix80RDTj7KvhF3ax8T0oZmLjZwFW0lgtC1TQ=
DKIM-Filter: OpenDKIM Filter v2.8.2 mx10.mailtransaction.com 3kBD2f3YKqz5MhcJ
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/EFa57Mjs0sByGoEabE2Hxw_SO8E
Cc: "dmarc@ietf.org" <dmarc@ietf.org>
Subject: Re: [dmarc-ietf] draft-kucherawy-dmarc-base updated (-06)
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: R.E.Sonneveld@sonnection.nl
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 29 Dec 2014 22:29:37 -0000

This is a multi-part message in MIME format.
--------------060606070207000000070807
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: quoted-printable

Hi, Murray,

On 12/24/2014 06:45 AM, Murray S. Kucherawy wrote:
> Hi Rolf, getting back to your review (thanks for the nudge):
>
> On Wed, Nov 12, 2014 at 6:26 PM, Rolf E. Sonneveld=20
> <R.E.Sonneveld@sonnection.nl <mailto:R.E.Sonneveld@sonnection.nl>> wrot=
e:
>
>
>
>     Abstract:
>
>         This lack of cohesion has several effects: receivers have
>         difficulty providing feedback to senders about authentication,
>         senders therefore have difficulty evaluating their
>         authentication deployments, and as a result neither is able to
>         make effective use of existing authentication technology.
>
>
>     This focuses on the reporting function of DMARC, leaving out the
>     policy part of it.
>
>     Suggested text:
>
>         This lack of cohesion has several effects: senders have
>         difficulty providing information about their use of an
>         authentication policy and receivers have difficulty
>         determining a disposition preferred by senders. Vice versa,
>         mail receivers have difficulty providing feedback to senders
>         about authentication, senders therefore have difficulty
>         evaluating their authentication deployments, and as a result
>         neither is able to make effective use of existing
>         authentication technology.
>
>
> The Abstract appears to have been rewritten since you reviewed it, so=20
> a straight text swap won't work anymore. The new text focuses on=20
> what's being provided, not what was missing.  Do you want to take=20
> another run at it?

No need for it, the text of the Abstract in -09 is OK.

>
>     Introduction:
>
>         [...] mail receivers have tried to protect senders [...]
>
>
>     Suggested:
>
>         [...] mail receivers have tried to protect senders and their
>         own users/customers [...]
>
> This text no longer appears in the draft.

OK.

>     Starting with "DMARC allows domain owners and receivers to
>     collaborate by", the terms 'domain owners', 'receivers', 'senders'
>     and 'SMTP receivers', 'Mail Receivers', 'mail receivers' are used
>     throughout the document. I'd suggest to add a definition of the
>     term ' Mail Senders' to the introduction part of chapter 3 and
>     then use only the terms as defined in 3., throughout the document.
>     Suggested text for the term Mail Sender:
>
>       * Mail Sender: the sender of mail with a domain for which the
>         Domain Owner may have published a DKIM public key and/or an
>         SPF authentication record and/or a DMARC policy;
>
>
>     (although we may want to not mention DKIM or SPF here).
>
>
> It looks like that got cleared up; -08 has no reference to "Mail Sender=
".

OK.

>
>     2.2 Out of Scope
>
>     Add:
>
>     o    cousin domain attacks
>
> Covered in Section 2.4 of -08.

OK.

>     3.1.2 Key Concepts
>
>     Last sentence: add a reference to this 'other referenced material'.
>
> Good idea; added.

Thanks.

>     3.1.3 Flow diagram
>
>     The box titled 'User Mailbox' could give the impression that
>     there's only one choice for delivery. However, quarantining can be
>     done without delivery to a mailbox. I'd suggest to label this box
>     'rMDA'.
>
> That's already done in -08.

OK. Well, it's MDA, but that's OK. One typo in the diagram. When:

> "sMTA" is the sending
>     MTA, and "rMTA" is the receiving MTA.

is correct, the box in the diagram should be labelled 'sMTA', not 'oMTA'.

>
>     The part within parentheses of step 6:
>
>>      6. Recipient transport service conducts SPF and DKIM
>>     authentication checks by passing the necessary data to their
>>     respective modules, each of which require queries to the Author
>>     Domain=E2=80=99s DNS data (when identifiers are aligned; see below=
).
>
>     might indicate that SPF and DKIM authentication checks need not be
>     performed when identifiers are not aligned. However, for sake of
>     reporting, SPF and DKIM authentication checks will in general
>     always be done, or am I missing something?
>
>
> I can envision a DMARC implementation that skips SPF or DKIM checks if=20
> the corresponding identifiers are not aligned, because they won't be=20
> interesting to DMARC in that case.

Whether or not to generate reports in the case of non-alignment is not=20
clear from the text, or am I missing something? Par. 3.1.3:

>     8.  If a policy is found, it is combined with the Author's domain a=
nd
>         the SPF and DKIM results to produce a DMARC policy result (a
>         "pass" or "fail"), and can optionally cause one of two kinds of
>         reports to be generated (not shown).

and par. 6.2 goes right into the format of reports, not the conditions=20
under which a report is to be sent.

>     3.1.4.1 DKIM-authenticated Identifiers
>
>     remove (or change) the 'Cousin Domain' example: it doesn't hold
>     when a bad actor is signing the mail with d=3Dcousindomain and
>     RFC5322.From=3Dlocalpart@cousindomain
>
>
> It's not there in -08.

OK.

>
>     4 Use of RFC5322.From
>
>     Last bullet (The DMARC mechanism ...). It seems the other bullets
>     provide reasons why RFC5322.From is chosen while the last one does
>     not. It looks to me as a circular reasoning.
>
> It's not there in -08.

OK.

>     5.2 DMARC URIs
>
>     It is not clear from the text what the report originator must do
>     when the report payload exceeds the maximum size as indicated by
>     the record. Should it not send anything, should it split up
>     reports, should it notify the requester that there was a report
>     exceeding the maximum size?
>
>
> Section 6.2.2 in both versions explains what to do here.

OK.

>
>     5.3 General Record Format
>
>     adkim and aspf do not provide a list of all possible options (like
>     is done for fo and p). Of course it is pretty obvious that for
>     'strict' the 's' must be used, but it's not clear from the text.
>
> They're there in -08.

Excellent.

>     Next, the P: and pct: tags: they show that (in hindsight) the
>     policy part and the reporting part of DMARC might have been better
>     off, when they were defined in different specs. Now we need to
>     complicate the text to say that the policy tag p: is required, but
>     not for third-party reporting records. And for pct, that it "MUST
>     NOT be applied to the DMARC-generated reports". Well, I believe
>     this has been discussed before, no need to redo this discussion.
>
>     I'd suggest to synchronize the short description of the tags in
>     5.3 with the descriptions of the tags in the table of 10.4 (now
>     different terminology is used here and there, for example
>     Requested Mail Receiver policy (5.3) and Requested handling policy
>     (10.4). Suggested text in 5.3 becomes then:
>     [...]
>
> Section 5.3 is meant to be verbose descriptions of each of the tags,=20
> while Section 10.4 is a set of short, terse descriptions with=20
> references to the places where the details can be found.  We could add=20
> section numbers to the references found in 10.4 if you think that=20
> would be helpful.
>
>     Further suggestion for the table in 10.4: reverse the order of 'p'
>     and 'pct' as 'p' is first discussed in the text of 5.3, before 'pct=
'.
>
>
> I see what you're after here, but as it is they're in alphabetical=20
> order, like a dictionary, and I think that makes for easier referencing=
.

Fair enough.

>     Suggestion for 'ri': remove the normative language (MUST and
>     SHOULD) as that might ask for a 'compliancy'  section. Instead,
>     move these suggested values to the BCP document.
>
> Well there is a normative component there, which is to say that anyone=20
> has to be able to produce at least daily reports.  I think we have to=20
> at least say that.  We (the IETF) seem to shy away from doing minimum=20
> compliance sections these days.

A 'conformance' section, similar to what RFC2049 is for MIME, would be=20
nice, indeed ;-)

>     5.6.2. Determine Handling Policy
>
>     Bullet 6 in combination with the introduction text might give the
>     impression that the receiver MUST always follow the policy as
>     published by the Domain Owner. Suggestion to replace the text:
>
>         6. Apply policy. Emails that fail the DMARC mechanism check
>         are disposed of in accordance with the discovered DMARC policy
>         of the Domain Owner. See Section 5.3
>
>     with:
>
>         6. Apply policy. Emails that fail the DMARC mechanism SHOULD
>         be disposed of in accordance with the discovered DMARC policy
>         of the Domain Owner. See Section 5.3
>
> Section 5 itself already has the equivalent of that SHOULD, followed=20
> by a "MAY deviate" based on local policy.

OK.

>     5.6.3. Policy Discovery.
>
>     This paragraph states that:
>
>         If the RFC5322.From domain does not exist in the DNS, Mail
>         Receivers SHOULD direct the receiving SMTP server to reject
>         the message. The choice of mechanism for such rejection and
>         the implications of those choices are discussed in Section 9.3.
>
>     Although this might be common practice (either by default MTA
>     settings, or by configuration parameters set by many mail
>     operators), I believe this informational RFC about DMARC cannot
>     use normative language here to decribe what must be done with mail
>     with a domain that is not present in DNS.
>
> This has been brought up before.  I think consensus has landed on the=20
> idea that this is an acceptable thing to say because it applies only=20
> to operators that are choosing to be DMARC participants.  Moreover,=20
> the SHOULD ultimately enables you to make the choice for yourself if=20
> you think bouncing mail from non-existent domains would be=20
> destructive.  And this is what DMARC operators have been doing for a=20
> while now, so I'll also fall back to noting that this specific effort=20
> is documenting current practice.  If the working group wants to make a=20
> different statement, it can crack this topic open if and when it=20
> starts work on a version of DMARC along the Standards Track.

This has been discussed in the recent thread 'Jim Fenton's review of=20
-04', no need to redo this discussion.

>
>     5.7 Last sentence:
>
>         Mail Receivers SHOULD also implement reporting instructions of
>         DMARC in place of any extensions to SPF or DKIM that might
>         enable such reporting.
>
>     Not sure what this means. But it seems to me DMARC cannot claim
>     priority over other options/extensions in other IETF protocols.
>
> This is another spot where the SHOULD gives the operator the choice to=20
> do both if it wishes.  I can't remember off the top of my head what=20
> the use case is here, but essentially the absence of a request for=20
> DKIM or SPF reporting (as developed by the MARF working group some=20
> time ago) should not preclude DMARC reporting, nor should their=20
> presence interfere with DMARC reporting.

Then, borrowing from your text, may I suggest the following text:

    "Mail Receivers SHOULD implement reporting instructions of DMARC,
    even in the absence of a request for DKIM or SPF reporting [MARF].
    Furthermore, the presence of such requests SHOULD NOT interfere with
    DMARC reporting."


And as a general statement: thanks for all the work, Murray!

/rolf


--------------060606070207000000070807
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html>
  <head>
    <meta content=3D"text/html; charset=3Dutf-8" http-equiv=3D"Content-Ty=
pe">
  </head>
  <body bgcolor=3D"#FFFFFF" text=3D"#000000">
    <div class=3D"moz-cite-prefix">Hi, Murray,<br>
      <br>
      On 12/24/2014 06:45 AM, Murray S. Kucherawy wrote:<br>
    </div>
    <blockquote
cite=3D"mid:CAL0qLwYSTGhBixiOEyxnbQJ5O6h4F+0-8xiAAE7kvUUEnogkiQ@mail.gmai=
l.com"
      type=3D"cite">
      <div dir=3D"ltr">Hi Rolf, getting back to your review (thanks for
        the nudge):<br>
        <br>
        On Wed, Nov 12, 2014 at 6:26 PM, Rolf E. Sonneveld <span
          dir=3D"ltr">&lt;<a moz-do-not-send=3D"true"
            href=3D"mailto:R.E.Sonneveld@sonnection.nl" target=3D"_blank"=
>R.E.Sonneveld@sonnection.nl</a>&gt;</span>
        wrote:<br>
        <div class=3D"gmail_extra">
          <div class=3D"gmail_quote">
            <blockquote class=3D"gmail_quote" style=3D"margin:0 0 0
              .8ex;border-left:1px #ccc solid;padding-left:1ex"> <br>
              <div bgcolor=3D"#FFFFFF" text=3D"#000000"><br>
                Abstract:<br>
                <br>
                <blockquote>This lack of cohesion has several effects:
                  receivers have difficulty providing feedback to
                  senders about authentication, senders therefore have
                  difficulty evaluating their authentication
                  deployments, and as a result neither is able to make
                  effective use of existing authentication technology.<br=
>
                </blockquote>
                <br>
                This focuses on the reporting function of DMARC, leaving
                out the policy part of it.<br>
                <br>
                Suggested text:<br>
                <br>
                <blockquote>This lack of cohesion has several effects:
                  senders have difficulty providing information about
                  their use of an authentication policy and receivers
                  have difficulty determining a disposition preferred by
                  senders. Vice versa, mail receivers have difficulty
                  providing feedback to senders about authentication,
                  senders therefore have difficulty evaluating their
                  authentication deployments, and as a result neither is
                  able to make effective use of existing authentication
                  technology.<br>
                </blockquote>
              </div>
            </blockquote>
            <div><br>
            </div>
            <div>The Abstract appears to have been rewritten since you
              reviewed it, so a straight text swap won't work anymore.=C2=
=A0
              The new text focuses on what's being provided, not what
              was missing.=C2=A0 Do you want to take another run at it?<b=
r>
            </div>
          </div>
        </div>
      </div>
    </blockquote>
    <br>
    No need for it, the text of the Abstract in -09 is OK.<br>
    <br>
    <blockquote
cite=3D"mid:CAL0qLwYSTGhBixiOEyxnbQJ5O6h4F+0-8xiAAE7kvUUEnogkiQ@mail.gmai=
l.com"
      type=3D"cite">
      <div dir=3D"ltr">
        <div class=3D"gmail_extra">
          <div class=3D"gmail_quote">
            <div>=C2=A0<br>
            </div>
            <blockquote class=3D"gmail_quote" style=3D"margin:0 0 0
              .8ex;border-left:1px #ccc solid;padding-left:1ex">
              <div bgcolor=3D"#FFFFFF" text=3D"#000000">
                <blockquote> </blockquote>
                Introduction:<br>
                <br>
                <blockquote>[...] mail receivers have tried to protect
                  senders [...]<br>
                </blockquote>
                <br>
                Suggested:<br>
                <br>
                <blockquote>[...] mail receivers have tried to protect
                  senders and their own users/customers [...]<br>
                </blockquote>
              </div>
            </blockquote>
            <div>This text no longer appears in the draft.<br>
            </div>
          </div>
        </div>
      </div>
    </blockquote>
    <br>
    OK.<br>
    <br>
    <blockquote
cite=3D"mid:CAL0qLwYSTGhBixiOEyxnbQJ5O6h4F+0-8xiAAE7kvUUEnogkiQ@mail.gmai=
l.com"
      type=3D"cite">
      <div dir=3D"ltr">
        <div class=3D"gmail_extra">
          <div class=3D"gmail_quote">
            <div>=C2=A0</div>
            <blockquote class=3D"gmail_quote" style=3D"margin:0 0 0
              .8ex;border-left:1px #ccc solid;padding-left:1ex">
              <div bgcolor=3D"#FFFFFF" text=3D"#000000">
                <blockquote> </blockquote>
                Starting with "DMARC allows domain owners and receivers
                to collaborate by", the terms 'domain owners',
                'receivers', 'senders' and 'SMTP receivers', 'Mail
                Receivers', 'mail receivers' are used throughout the
                document. I'd suggest to add a definition of the term '
                Mail Senders' to the introduction part of chapter 3 and
                then use only the terms as defined in 3., throughout the
                document. Suggested text for the term Mail Sender:<br>
                <br>
                <ul>
                  <li>Mail Sender: the sender of mail with a domain for
                    which the Domain Owner may have published a DKIM
                    public key and/or an SPF authentication record
                    and/or a DMARC policy;</li>
                </ul>
                <br>
                (although we may want to not mention DKIM or SPF here).<b=
r>
              </div>
            </blockquote>
            <div><br>
            </div>
            <div>It looks like that got cleared up; -08 has no reference
              to "Mail Sender".<br>
            </div>
          </div>
        </div>
      </div>
    </blockquote>
    <br>
    OK.<br>
    <br>
    <blockquote
cite=3D"mid:CAL0qLwYSTGhBixiOEyxnbQJ5O6h4F+0-8xiAAE7kvUUEnogkiQ@mail.gmai=
l.com"
      type=3D"cite">
      <div dir=3D"ltr">
        <div class=3D"gmail_extra">
          <div class=3D"gmail_quote">
            <div>=C2=A0<br>
            </div>
            <blockquote class=3D"gmail_quote" style=3D"margin:0 0 0
              .8ex;border-left:1px #ccc solid;padding-left:1ex">
              <div bgcolor=3D"#FFFFFF" text=3D"#000000"> 2.2 Out of Scope=
<br>
                <p>Add: <br>
                </p>
                <p>o=C2=A0=C2=A0=C2=A0 cousin domain attacks<br>
                </p>
              </div>
            </blockquote>
            <div>Covered in Section 2.4 of -08.<br>
            </div>
          </div>
        </div>
      </div>
    </blockquote>
    <br>
    OK.<br>
    <br>
    <blockquote
cite=3D"mid:CAL0qLwYSTGhBixiOEyxnbQJ5O6h4F+0-8xiAAE7kvUUEnogkiQ@mail.gmai=
l.com"
      type=3D"cite">
      <div dir=3D"ltr">
        <div class=3D"gmail_extra">
          <div class=3D"gmail_quote">
            <div>=C2=A0</div>
            <blockquote class=3D"gmail_quote" style=3D"margin:0 0 0
              .8ex;border-left:1px #ccc solid;padding-left:1ex">
              <div bgcolor=3D"#FFFFFF" text=3D"#000000">
                <p> </p>
                <p>3.1.2 Key Concepts<br>
                </p>
                <p>Last sentence: add a reference to this 'other
                  referenced material'.<br>
                </p>
              </div>
            </blockquote>
            <div>Good idea; added.<br>
            </div>
          </div>
        </div>
      </div>
    </blockquote>
    <br>
    Thanks.<br>
    <br>
    <blockquote
cite=3D"mid:CAL0qLwYSTGhBixiOEyxnbQJ5O6h4F+0-8xiAAE7kvUUEnogkiQ@mail.gmai=
l.com"
      type=3D"cite">
      <div dir=3D"ltr">
        <div class=3D"gmail_extra">
          <div class=3D"gmail_quote">
            <blockquote class=3D"gmail_quote" style=3D"margin:0 0 0
              .8ex;border-left:1px #ccc solid;padding-left:1ex">
              <div bgcolor=3D"#FFFFFF" text=3D"#000000">
                <p> </p>
                <p>3.1.3 Flow diagram<br>
                </p>
                <p>The box titled 'User Mailbox' could give the
                  impression that there's only one choice for delivery.
                  However, quarantining can be done without delivery to
                  a mailbox. I'd suggest to label this box 'rMDA'.<br>
                </p>
              </div>
            </blockquote>
            <div>That's already done in -08.<br>
            </div>
          </div>
        </div>
      </div>
    </blockquote>
    <br>
    OK. Well, it's MDA, but that's OK. One typo in the diagram. When:<br>
    <br>
    <blockquote type=3D"cite">
      <pre>"sMTA" is the sending
   MTA, and "rMTA" is the receiving MTA.</pre>
    </blockquote>
    <br>
    is correct, the box in the diagram should be labelled 'sMTA', not
    'oMTA'.<br>
    <br>
    <blockquote
cite=3D"mid:CAL0qLwYSTGhBixiOEyxnbQJ5O6h4F+0-8xiAAE7kvUUEnogkiQ@mail.gmai=
l.com"
      type=3D"cite">
      <div dir=3D"ltr">
        <div class=3D"gmail_extra">
          <div class=3D"gmail_quote">
            <div>=C2=A0<br>
            </div>
            <blockquote class=3D"gmail_quote" style=3D"margin:0 0 0
              .8ex;border-left:1px #ccc solid;padding-left:1ex">
              <div bgcolor=3D"#FFFFFF" text=3D"#000000">
                <p> </p>
                <p>The part within parentheses of step 6:<br>
                </p>
                <p> </p>
                <blockquote type=3D"cite">=C2=A06. Recipient transport se=
rvice
                  conducts SPF and DKIM authentication checks by passing
                  the necessary data to their respective modules, each
                  of which require queries to the Author Domain=E2=80=99s=
 DNS
                  data (when identifiers are aligned; see below).</blockq=
uote>
                <br>
                might indicate that SPF and DKIM authentication checks
                need not be performed when identifiers are not aligned.
                However, for sake of reporting, SPF and DKIM
                authentication checks will in general always be done, or
                am I missing something?<br>
              </div>
            </blockquote>
            <div><br>
            </div>
            <div>I can envision a DMARC implementation that skips SPF or
              DKIM checks if the corresponding identifiers are not
              aligned, because they won't be interesting to DMARC in
              that case.<br>
            </div>
          </div>
        </div>
      </div>
    </blockquote>
    <br>
    Whether or not to generate reports in the case of non-alignment is
    not clear from the text, or am I missing something? Par. 3.1.3:<br>
    <br>
    <blockquote type=3D"cite">
      <pre>   8.  If a policy is found, it is combined with the Author's =
domain and
       the SPF and DKIM results to produce a DMARC policy result (a
       "pass" or "fail"), and can optionally cause one of two kinds of
       reports to be generated (not shown).</pre>
    </blockquote>
    <br>
    and par. 6.2 goes right into the format of reports, not the
    conditions under which a report is to be sent.<br>
    <br>
    <blockquote
cite=3D"mid:CAL0qLwYSTGhBixiOEyxnbQJ5O6h4F+0-8xiAAE7kvUUEnogkiQ@mail.gmai=
l.com"
      type=3D"cite">
      <div dir=3D"ltr">
        <div class=3D"gmail_extra">
          <div class=3D"gmail_quote">
            <blockquote class=3D"gmail_quote" style=3D"margin:0 0 0
              .8ex;border-left:1px #ccc solid;padding-left:1ex">
              <div bgcolor=3D"#FFFFFF" text=3D"#000000">
                <p>3.1.4.1 DKIM-authenticated Identifiers<br>
                </p>
                <p>remove (or change) the 'Cousin Domain' example: it
                  doesn't hold when a bad actor is signing the mail with
                  d=3Dcousindomain and RFC5322.From=3Dlocalpart@cousindom=
ain<br>
                </p>
              </div>
            </blockquote>
            <div><br>
            </div>
            <div>It's not there in -08.<br>
            </div>
          </div>
        </div>
      </div>
    </blockquote>
    <br>
    OK.<br>
    <br>
    <blockquote
cite=3D"mid:CAL0qLwYSTGhBixiOEyxnbQJ5O6h4F+0-8xiAAE7kvUUEnogkiQ@mail.gmai=
l.com"
      type=3D"cite">
      <div dir=3D"ltr">
        <div class=3D"gmail_extra">
          <div class=3D"gmail_quote">
            <div>=C2=A0<br>
            </div>
            <blockquote class=3D"gmail_quote" style=3D"margin:0 0 0
              .8ex;border-left:1px #ccc solid;padding-left:1ex">
              <div bgcolor=3D"#FFFFFF" text=3D"#000000">
                <p> </p>
                <p>4 Use of RFC5322.From<br>
                </p>
                <p>Last bullet (The DMARC mechanism ...). It seems the
                  other bullets provide reasons why RFC5322.From is
                  chosen while the last one does not. It looks to me as
                  a circular reasoning.<br>
                </p>
              </div>
            </blockquote>
            <div>It's not there in -08.<br>
            </div>
          </div>
        </div>
      </div>
    </blockquote>
    <br>
    OK.<br>
    <br>
    <blockquote
cite=3D"mid:CAL0qLwYSTGhBixiOEyxnbQJ5O6h4F+0-8xiAAE7kvUUEnogkiQ@mail.gmai=
l.com"
      type=3D"cite">
      <div dir=3D"ltr">
        <div class=3D"gmail_extra">
          <div class=3D"gmail_quote">
            <div>=C2=A0</div>
            <blockquote class=3D"gmail_quote" style=3D"margin:0 0 0
              .8ex;border-left:1px #ccc solid;padding-left:1ex">
              <div bgcolor=3D"#FFFFFF" text=3D"#000000">
                <p> </p>
                <p>5.2 DMARC URIs<br>
                </p>
                <p>It is not clear from the text what the report
                  originator must do when the report payload exceeds the
                  maximum size as indicated by the record. Should it not
                  send anything, should it split up reports, should it
                  notify the requester that there was a report exceeding
                  the maximum size?<br>
                </p>
              </div>
            </blockquote>
            <div><br>
            </div>
            <div>Section 6.2.2 in both versions explains what to do
              here.<br>
            </div>
          </div>
        </div>
      </div>
    </blockquote>
    <br>
    OK.<br>
    <br>
    <blockquote
cite=3D"mid:CAL0qLwYSTGhBixiOEyxnbQJ5O6h4F+0-8xiAAE7kvUUEnogkiQ@mail.gmai=
l.com"
      type=3D"cite">
      <div dir=3D"ltr">
        <div class=3D"gmail_extra">
          <div class=3D"gmail_quote">
            <div>=C2=A0<br>
            </div>
            <blockquote class=3D"gmail_quote" style=3D"margin:0 0 0
              .8ex;border-left:1px #ccc solid;padding-left:1ex">
              <div bgcolor=3D"#FFFFFF" text=3D"#000000">
                <p> </p>
                <p>5.3 General Record Format<br>
                </p>
                <p>adkim and aspf do not provide a list of all possible
                  options (like is done for fo and p). Of course it is
                  pretty obvious that for 'strict' the 's' must be used,
                  but it's not clear from the text.<br>
                </p>
              </div>
            </blockquote>
            <div>They're there in -08. <br>
            </div>
          </div>
        </div>
      </div>
    </blockquote>
    <br>
    Excellent.<br>
    <br>
    <blockquote
cite=3D"mid:CAL0qLwYSTGhBixiOEyxnbQJ5O6h4F+0-8xiAAE7kvUUEnogkiQ@mail.gmai=
l.com"
      type=3D"cite">
      <div dir=3D"ltr">
        <div class=3D"gmail_extra">
          <div class=3D"gmail_quote">
            <blockquote class=3D"gmail_quote" style=3D"margin:0 0 0
              .8ex;border-left:1px #ccc solid;padding-left:1ex">
              <div bgcolor=3D"#FFFFFF" text=3D"#000000">
                <p> </p>
                Next, the P: and pct: tags: they show that (in
                hindsight) the policy part and the reporting part of
                DMARC might have been better off, when they were defined
                in different specs. Now we need to complicate the text
                to say that the policy tag p: is required, but not for
                third-party reporting records. And for pct, that it
                "MUST NOT be applied to the DMARC-generated reports".
                Well, I believe this has been discussed before, no need
                to redo this discussion.<br>
                <p>I'd suggest to synchronize the short description of
                  the tags in 5.3 with the descriptions of the tags in
                  the table of 10.4 (now different terminology is used
                  here and there, for example Requested Mail Receiver
                  policy (5.3) and Requested handling policy (10.4).
                  Suggested text in 5.3 becomes then: <br>
                  [...]<br>
                </p>
              </div>
            </blockquote>
            <div>Section 5.3 is meant to be verbose descriptions of each
              of the tags, while Section 10.4 is a set of short, terse
              descriptions with references to the places where the
              details can be found.=C2=A0 We could add section numbers to=
 the
              references found in 10.4 if you think that would be
              helpful.<br>
            </div>
            <blockquote class=3D"gmail_quote" style=3D"margin:0 0 0
              .8ex;border-left:1px #ccc solid;padding-left:1ex">
              <div bgcolor=3D"#FFFFFF" text=3D"#000000">
                <p> </p>
                Further suggestion for the table in 10.4: reverse the
                order of 'p' and 'pct' as 'p' is first discussed in the
                text of 5.3, before 'pct'.<br>
              </div>
            </blockquote>
            <div><br>
            </div>
            <div>I see what you're after here, but as it is they're in
              alphabetical order, like a dictionary, and I think that
              makes for easier referencing. <br>
            </div>
          </div>
        </div>
      </div>
    </blockquote>
    <br>
    Fair enough.<br>
    <br>
    <blockquote
cite=3D"mid:CAL0qLwYSTGhBixiOEyxnbQJ5O6h4F+0-8xiAAE7kvUUEnogkiQ@mail.gmai=
l.com"
      type=3D"cite">
      <div dir=3D"ltr">
        <div class=3D"gmail_extra">
          <div class=3D"gmail_quote">
            <blockquote class=3D"gmail_quote" style=3D"margin:0 0 0
              .8ex;border-left:1px #ccc solid;padding-left:1ex">
              <div bgcolor=3D"#FFFFFF" text=3D"#000000">
                <p>Suggestion for 'ri': remove the normative language
                  (MUST and SHOULD) as that might ask for a
                  'compliancy'=C2=A0 section. Instead, move these suggest=
ed
                  values to the BCP document.<br>
                </p>
              </div>
            </blockquote>
            <div>Well there is a normative component there, which is to
              say that anyone has to be able to produce at least daily
              reports.=C2=A0 I think we have to at least say that.=C2=A0 =
We (the
              IETF) seem to shy away from doing minimum compliance
              sections these days. <br>
            </div>
          </div>
        </div>
      </div>
    </blockquote>
    <br>
    A 'conformance' section, similar to what RFC2049 is for MIME, would
    be nice, indeed ;-)<br>
    <br>
    <blockquote
cite=3D"mid:CAL0qLwYSTGhBixiOEyxnbQJ5O6h4F+0-8xiAAE7kvUUEnogkiQ@mail.gmai=
l.com"
      type=3D"cite">
      <div dir=3D"ltr">
        <div class=3D"gmail_extra">
          <div class=3D"gmail_quote">
            <blockquote class=3D"gmail_quote" style=3D"margin:0 0 0
              .8ex;border-left:1px #ccc solid;padding-left:1ex">
              <div bgcolor=3D"#FFFFFF" text=3D"#000000">
                <p> </p>
                <p>5.6.2. Determine Handling Policy<br>
                </p>
                <p>Bullet 6 in combination with the introduction text
                  might give the impression that the receiver MUST
                  always follow the policy as published by the Domain
                  Owner. Suggestion to replace the text:<br>
                </p>
                <blockquote>
                  <p>6. Apply policy. Emails that fail the DMARC
                    mechanism check are disposed of in accordance with
                    the discovered DMARC policy of the Domain Owner. See
                    Section 5.3 <br>
                  </p>
                </blockquote>
                <p>with:<br>
                </p>
                <blockquote>
                  <p>6. Apply policy. Emails that fail the DMARC
                    mechanism SHOULD be disposed of in accordance with
                    the discovered DMARC policy of the Domain Owner. See
                    Section 5.3 <br>
                  </p>
                </blockquote>
              </div>
            </blockquote>
            <div>Section 5 itself already has the equivalent of that
              SHOULD, followed by a "MAY deviate" based on local policy.
              <br>
            </div>
          </div>
        </div>
      </div>
    </blockquote>
    <br>
    OK.<br>
    <br>
    <blockquote
cite=3D"mid:CAL0qLwYSTGhBixiOEyxnbQJ5O6h4F+0-8xiAAE7kvUUEnogkiQ@mail.gmai=
l.com"
      type=3D"cite">
      <div dir=3D"ltr">
        <div class=3D"gmail_extra">
          <div class=3D"gmail_quote">
            <blockquote class=3D"gmail_quote" style=3D"margin:0 0 0
              .8ex;border-left:1px #ccc solid;padding-left:1ex">
              <div bgcolor=3D"#FFFFFF" text=3D"#000000">
                <blockquote>
                  <p> </p>
                </blockquote>
                <p>5.6.3. Policy Discovery.<br>
                </p>
                <p>This paragraph states that:<br>
                </p>
                <blockquote>
                  <p>If the RFC5322.From domain does not exist in the
                    DNS, Mail Receivers SHOULD direct the receiving SMTP
                    server to reject the message. The choice of
                    mechanism for such rejection and the implications of
                    those choices are discussed in Section 9.3.<br>
                  </p>
                </blockquote>
                <p>Although this might be common practice (either by
                  default MTA settings, or by configuration parameters
                  set by many mail operators), I believe this
                  informational RFC about DMARC cannot use normative
                  language here to decribe what must be done with mail
                  with a domain that is not present in DNS.<br>
                </p>
              </div>
            </blockquote>
            <div>This has been brought up before.=C2=A0 I think consensus=
 has
              landed on the idea that this is an acceptable thing to say
              because it applies only to operators that are choosing to
              be DMARC participants.=C2=A0 Moreover, the SHOULD ultimatel=
y
              enables you to make the choice for yourself if you think
              bouncing mail from non-existent domains would be
              destructive.=C2=A0 And this is what DMARC operators have be=
en
              doing for a while now, so I'll also fall back to noting
              that this specific effort is documenting current
              practice.=C2=A0 If the working group wants to make a differ=
ent
              statement, it can crack this topic open if and when it
              starts work on a version of DMARC along the Standards
              Track.<br>
            </div>
          </div>
        </div>
      </div>
    </blockquote>
    <br>
    This has been discussed in the recent thread 'Jim Fenton's review of
    -04', no need to redo this discussion.<br>
    <br>
    <blockquote
cite=3D"mid:CAL0qLwYSTGhBixiOEyxnbQJ5O6h4F+0-8xiAAE7kvUUEnogkiQ@mail.gmai=
l.com"
      type=3D"cite">
      <div dir=3D"ltr">
        <div class=3D"gmail_extra">
          <div class=3D"gmail_quote">
            <div><br>
            </div>
            <blockquote class=3D"gmail_quote" style=3D"margin:0 0 0
              .8ex;border-left:1px #ccc solid;padding-left:1ex">
              <div bgcolor=3D"#FFFFFF" text=3D"#000000">
                <p> </p>
                <p>5.7 Last sentence:<br>
                </p>
                <blockquote>
                  <p>Mail Receivers SHOULD also implement reporting
                    instructions of DMARC in place of any extensions to
                    SPF or DKIM that might enable such reporting.<br>
                  </p>
                </blockquote>
                <p>Not sure what this means. But it seems to me DMARC
                  cannot claim priority over other options/extensions in
                  other IETF protocols.<br>
                </p>
              </div>
            </blockquote>
            <div>This is another spot where the SHOULD gives the
              operator the choice to do both if it wishes.=C2=A0 I can't
              remember off the top of my head what the use case is here,
              but essentially the absence of a request for DKIM or SPF
              reporting (as developed by the MARF working group some
              time ago) should not preclude DMARC reporting, nor should
              their presence interfere with DMARC reporting.<br>
            </div>
          </div>
        </div>
      </div>
    </blockquote>
    <br>
    Then, borrowing from your text, may I suggest the following text:<br>
    <br>
    <blockquote>"Mail Receivers SHOULD implement reporting instructions
      of DMARC, even in the absence of a request for DKIM or SPF
      reporting [MARF]. Furthermore, the presence of such requests
      SHOULD NOT interfere with DMARC reporting."<br>
    </blockquote>
    <br>
    And as a general statement: thanks for all the work, Murray!<br>
    <br>
    /rolf<br>
    <br>
  </body>
</html>

--------------060606070207000000070807--



From nobody Tue Dec 30 05:40:03 2014
Return-Path: <MHammer@ag.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 729D71A00B0 for <dmarc@ietfa.amsl.com>; Tue, 30 Dec 2014 05:40:01 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.002
X-Spam-Level: 
X-Spam-Status: No, score=-0.002 tagged_above=-999 required=5 tests=[BAYES_40=-0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id z9lEZ-thCjte for <dmarc@ietfa.amsl.com>; Tue, 30 Dec 2014 05:39:59 -0800 (PST)
Received: from agwhqht.amgreetings.com (agwhqht.amgreetings.com [207.58.192.4]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A1E8C1A00AA for <dmarc@ietf.org>; Tue, 30 Dec 2014 05:39:59 -0800 (PST)
Received: from USCLES544.agna.amgreetings.com ([fe80::f5de:4c30:bc26:d70a]) by USCLES532.agna.amgreetings.com ([::1]) with mapi id 14.03.0210.002;  Tue, 30 Dec 2014 08:39:58 -0500
From: "MH Michael Hammer (5304)" <MHammer@ag.com>
To: "dcrocker@bbiw.net" <dcrocker@bbiw.net>, "dmarc@ietf.org" <dmarc@ietf.org>
Thread-Topic: [dmarc-ietf] Jim Fenton's review of -04
Thread-Index: AQHQG9L/KxUX7EmxxEmD4981Pp72RJycGGUAgAKKnwCAACqBgIAAcEYAgAB1yoCAAGibgIAAEk8AgAFZIoCAACS1AIAFEfLwgABqHYD//7D7doAAcJ+AgAAOh4D//7YBQIAAV8cA//+tbZAADasRgAAWSYkA
Date: Tue, 30 Dec 2014 13:39:58 +0000
Message-ID: <CE39F90A45FF0C49A1EA229FC9899B0525F54C20@USCLES544.agna.amgreetings.com>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <2397001.Fx3SqMl5ZI@scott-latitude-e6320> <CAL0qLwakLdWhHW+JbfQ=LO9yPSSOB=fH_oyLNMpGRPS_EAuudg@mail.gmail.com> <3004337.MAocVZ5Co9@scott-latitude-e6320> <CAL0qLwYqmVZdW_XivU0=Vr7itDvfw_0+qm7dthN9nJYXDZK2bg@mail.gmail.com> <66CEE14F-375D-4FE9-9485-6DFE58911E54@kitterman.com> <CE39F90A45FF0C49A1EA229FC9899B0525F5323E@USCLES544.agna.amgreetings.com> <54A183EB.6080508@dcrocker.net> <01PGOJ9M6F5E00005K@mauve.mrochek.com> <19D0C566-275F-474B-B823-B7D79CACD8C7@kitterman.com> <54A1AC4B.2050500@dcrocker.net> <CE39F90A45FF0C49A1EA229FC9899B0525F535AA@USCLES544.agna.amgreetings.com> <A9FDF340-7BF5-4FF4-A7C2-616E90AE988D@kitterman.com> <CE39F90A45FF0C49A1EA229FC9899B0525F535D6@USCLES544.agna.amgreetings.com> <54A1CE4F.2040303@dcrocker.net>
In-Reply-To: <54A1CE4F.2040303@dcrocker.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.144.15.221]
x-kse-antivirus-interceptor-info: scan successful
x-kse-antivirus-info: Clean
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/U8IAOq2D7vKb9bVS0TOT-ofvuvU
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 30 Dec 2014 13:40:01 -0000

> -----Original Message-----
> From: dmarc [mailto:dmarc-bounces@ietf.org] On Behalf Of Dave Crocker
> Sent: Monday, December 29, 2014 4:58 PM
> To: dmarc@ietf.org
> Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
>=20
> On 12/29/2014 12:32 PM, MH Michael Hammer (5304) wrote:
> > I suppose it's ultimately another example of local policy.
>=20
> Depends on what that means.
>=20
> The rule within the protocol needs to be -- and is -- mechanical and
> universal: In order to apply DMARC policy, you must first obtain an
> authenticated (or, described more usefully, 'authorized') domain name tha=
t
> is aligned with the From: field domain.
>=20
> A protocol that treats an initial, temporary error as producing a permane=
nt
> error is a pretty fragile protocol, in a networking environment.  As such=
,
> DMARC should at least strongly recommend retries, in the case of no passe=
s
> and at least one temp fail.
>=20

The choices offered were tempfail and allow retry or don't apply DMARC poli=
cy. I was expressing a preference for tempfail which ultimately would degra=
de to a permfail after whatever number of retries the sending system has se=
t.=20

Mike


From nobody Tue Dec 30 06:38:48 2014
Return-Path: <MHammer@ag.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 145481A00C5 for <dmarc@ietfa.amsl.com>; Tue, 30 Dec 2014 06:38:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level: 
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YAfdBG33Zuot for <dmarc@ietfa.amsl.com>; Tue, 30 Dec 2014 06:38:45 -0800 (PST)
Received: from agwhqht.amgreetings.com (agwhqht.amgreetings.com [207.58.192.41]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 847891A00BF for <dmarc@ietf.org>; Tue, 30 Dec 2014 06:38:45 -0800 (PST)
Received: from USCLES544.agna.amgreetings.com ([fe80::f5de:4c30:bc26:d70a]) by USCLES531.agna.amgreetings.com ([::1]) with mapi id 14.03.0210.002;  Tue, 30 Dec 2014 09:38:44 -0500
From: "MH Michael Hammer (5304)" <MHammer@ag.com>
To: Steven M Jones <smj@crash.com>, "dmarc@ietf.org" <dmarc@ietf.org>
Thread-Topic: [dmarc-ietf] Jim Fenton's review of -04
Thread-Index: AQHQG9L/KxUX7EmxxEmD4981Pp72RJycGGUAgAKKnwCAACqBgIAAcEYAgAB1yoCAAGibgIAAEk8AgAFZIoCAACS1AIAFEfLwgABqHYD//7D7doAAcJ+AgAAOh4D//7YBQIAAV8cA//+tbZAADb2LgAAWYFiw
Date: Tue, 30 Dec 2014 14:38:44 +0000
Message-ID: <CE39F90A45FF0C49A1EA229FC9899B0525F54D30@USCLES544.agna.amgreetings.com>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <2397001.Fx3SqMl5ZI@scott-latitude-e6320> <CAL0qLwakLdWhHW+JbfQ=LO9yPSSOB=fH_oyLNMpGRPS_EAuudg@mail.gmail.com> <3004337.MAocVZ5Co9@scott-latitude-e6320> <CAL0qLwYqmVZdW_XivU0=Vr7itDvfw_0+qm7dthN9nJYXDZK2bg@mail.gmail.com> <66CEE14F-375D-4FE9-9485-6DFE58911E54@kitterman.com> <CE39F90A45FF0C49A1EA229FC9899B0525F5323E@USCLES544.agna.amgreetings.com> <54A183EB.6080508@dcrocker.net> <01PGOJ9M6F5E00005K@mauve.mrochek.com> <19D0C566-275F-474B-B823-B7D79CACD8C7@kitterman.com> <54A1AC4B.2050500@dcrocker.net> <CE39F90A45FF0C49A1EA229FC9899B0525F535AA@USCLES544.agna.amgreetings.com> <A9FDF340-7BF5-4FF4-A7C2-616E90AE988D@kitterman.com> <CE39F90A45FF0C49A1EA229FC9899B0525F535D6@USCLES544.agna.amgreetings.com> <54A1CECB.7010309@crash.com>
In-Reply-To: <54A1CECB.7010309@crash.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.144.15.221]
x-kse-antivirus-interceptor-info: scan successful
x-kse-antivirus-info: Clean
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/2rxV5SFnBU8TAFSWvpwLWt8ycQM
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 30 Dec 2014 14:38:47 -0000

> -----Original Message-----
> From: dmarc [mailto:dmarc-bounces@ietf.org] On Behalf Of Steven M Jones
> Sent: Monday, December 29, 2014 5:00 PM
> To: dmarc@ietf.org
> Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
>=20
> On 12/29/2014 12:32 PM, MH Michael Hammer (5304) wrote:
> >
> >> -----Original Message-----
> >> From: dmarc [mailto:dmarc-bounces@ietf.org] On Behalf Of Scott
> >> Kitterman [...] I think the only two reasonable choices are defer and
> >> see what happens on retry or to treat it as DMARC none and press on
> >> with other checks.
> >>
> > I suppose it's ultimately another example of local policy.  I feel like=
 a
> DMARC "none" opens the door to abuse (I'm thinking of abused financials f=
or
> example). How easily can an abuser induce temporary failures for DNS for =
a
> given host/domain? I'd prefer a recommendation of "defer and retry" rathe=
r
> than a fail open (DMARC none).
>=20
> Is this a point where the phrase "documenting existing common practice"
> should guide us? That sounded a lot like recommending a practice versus
> documenting...
>=20

The first question is whether this is a matter of local policy. If the answ=
er is yes (Which I believe and invoke King Canute), then anything written I=
S a recommendation (even if it is only documenting what "We" - for some def=
inition of "we" - believe is existing common practice. Personally I don't b=
elieve it IS existing common practice if we look at the number of validator=
s implementing (vs percentage of mail it is applied to). We know, or should=
 know, that many implementers on the validation side are struggling with im=
plementing local policy for things like white listing. I have not seen any =
data to indicate that tempfail on temporary DNS failures is truly an existi=
ng common practice.

So we are back to "What do we believe validators should do when encounterin=
g temporary failures?" For an implementation such as DMARC I prefer tempfai=
l which is fail closed rather than DMARC none which is fail open. Based on =
visibility into our own mail streams and DMARC reporting, this particular c=
ase represents (for our domains) a very low number on an absolute basis /pe=
rcentage of mail that I view it as generally a corner case of an edge case.=
 Others may have different data.

Mike


From nobody Tue Dec 30 08:02:01 2014
Return-Path: <dhc@dcrocker.net>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 586DD1A01EC for <dmarc@ietfa.amsl.com>; Tue, 30 Dec 2014 08:01:59 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id k-ZCVbC2Mo0m for <dmarc@ietfa.amsl.com>; Tue, 30 Dec 2014 08:01:52 -0800 (PST)
Received: from sbh17.songbird.com (sbh17.songbird.com [72.52.113.17]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B387A1A01E1 for <dmarc@ietf.org>; Tue, 30 Dec 2014 08:01:52 -0800 (PST)
Received: from [192.168.6.2] (ip-64-134-16-147.public.wayport.net [64.134.16.147]) (authenticated bits=0) by sbh17.songbird.com (8.13.8/8.13.8) with ESMTP id sBUG1egO031480 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT); Tue, 30 Dec 2014 08:01:44 -0800
Message-ID: <54A2CC60.6090503@dcrocker.net>
Date: Tue, 30 Dec 2014 08:01:36 -0800
From: Dave Crocker <dhc@dcrocker.net>
Organization: Brandenburg InternetWorking
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Thunderbird/31.3.0
MIME-Version: 1.0
To: "MH Michael Hammer (5304)" <MHammer@ag.com>, Steven M Jones <smj@crash.com>, "dmarc@ietf.org" <dmarc@ietf.org>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <2397001.Fx3SqMl5ZI@scott-latitude-e6320> <CAL0qLwakLdWhHW+JbfQ=LO9yPSSOB=fH_oyLNMpGRPS_EAuudg@mail.gmail.com> <3004337.MAocVZ5Co9@scott-latitude-e6320> <CAL0qLwYqmVZdW_XivU0=Vr7itDvfw_0+qm7dthN9nJYXDZK2bg@mail.gmail.com> <66CEE14F-375D-4FE9-9485-6DFE58911E54@kitterman.com> <CE39F90A45FF0C49A1EA229FC9899B0525F5323E@USCLES544.agna.amgreetings.com> <54A183EB.6080508@dcrocker.net> <01PGOJ9M6F5E00005K@mauve.mrochek.com> <19D0C566-275F-474B-B823-B7D79CACD8C7@kitterman.com> <54A1AC4B.2050500@dcrocker.net> <CE39F90A45FF0C49A1EA229FC9899B0525F535AA@USCLES544.agna.amgreetings.com> <A9FDF340-7BF5-4FF4-A7C2-616E90AE988D@kitterman.com> <CE39F90A45FF0C49A1EA229FC9899B0525F535D6@USCLES544.agna.amgreetings.com> <54A1CECB.7010309@crash.com> <CE39F90A45FF0C49A1EA229FC9899B0525F54D30@USCLES544.agna.amgreetings.com>
In-Reply-To: <CE39F90A45FF0C49A1EA229FC9899B0525F54D30@USCLES544.agna.amgreetings.com>
Content-Type: text/plain; charset=windows-1252
Content-Transfer-Encoding: 8bit
X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.0 (sbh17.songbird.com [72.52.113.66]); Tue, 30 Dec 2014 08:01:44 -0800 (PST)
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/b4zG4Rw9I0hgYXaY2jXVEiz9ywQ
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: dcrocker@bbiw.net
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 30 Dec 2014 16:01:59 -0000

On 12/30/2014 6:38 AM, MH Michael Hammer (5304) wrote:
> he first question is whether this is a matter of local policy. If the
> answer is yes (Which I believe and invoke King Canute), then anything
> written IS a recommendation (even if it is only documenting what "We"
> - for some definition of "we" - believe is existing common practice.


Documenting common practice is fine for a document seeking to be a BCP.

For a document specifying a protocol, it is best to be simpler and more
definitive.

     Define the boundaries of the protocol.  Try to put everything in
terms of MUST or MUST NOT.  Allows SHOULD [NOT] when it is understood
that some exceptions by knowledgeable actors can reasonably be
tolerated.  Include MAY (MAY NOT isn't really meaningful IMO) to permit
benign flexibility that the community consider plausibly useful.

But discussion of what an actor might do outside of the boundaries of
the protocol really are outside of the protocol.

Especially in the context of DMARC, most references to "local policy"
have tended to serve to blur the demarcation between what is inside the
protocol and what is outside.

What is really meant, when we say "local policy" for DMARC is:

     Outside of the DMARC spec, you can do what you want.

     This is, of course, a tautology, but we keep talking as if it isn't.

DMARC has a pretty simple model.

     If you are a domain owner participating in DMARC, you publish an
associated record and state your desires.  If you are a receiver
participating in DMARC, you attend to that record, after performing some
tests on the message.

     The tests are also pretty simple, at the level of DMARC.  We have
discussed them at length.  Since they involve some sequencing, we've had
some fun getting the exact language right, but none of that has been a
debate about the actual algorithm; it's strictly wordsmithing.

     So DMARC's conditions for asserting the requests by a domain owner
are crisp and simple.

What is inherently fuzzy is how to handle a temporary failure.  Unlike a
transport-level timeout, the handling of temporary failures at the
application level often are a matter taste.

(Note that some of the original Arpanet specs including guidance such as
"wait for something to change".  So guidance can indeed be fuzzy.)

It might help to distinguish between the detection of a temporary
failure versus what to do in the event of a temp failure.

     The occurrence of a temporary failure is objective and needs to be
specified within the protocol.  We need to state what qualifies as a
temp fail and then simply label it as such.

     For the /handling/ of a temp fail, we need to decide whether a
DMARC participant is obligated to try again versus obligated /not/ to
try again.  The nature of 'conformance' we might specify can be nicely
distinguished by choosing one of MUST, SHOULD or MAY, possibly with some
justification text.

After that, any discussion of possible receiver actions moves into the
realm of BCP operational preferences.  As long as the text is clear that
this all really is outside the protocol and rather moves into local
preferences for how to use DMARC within the local system, that's fine.

Instead of saying 'local policies' or 'local overrides', we ought to
help ourr clarity by saying something like "ad hoc, non-DMARC policies"
or the like.

That is, 'local policy' means 'independent of the DMARC specification.'


d/

-- 
Dave Crocker
Brandenburg InternetWorking
bbiw.net


From nobody Tue Dec 30 13:15:23 2014
Return-Path: <franck@peachymango.org>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A19DD1A8700 for <dmarc@ietfa.amsl.com>; Tue, 30 Dec 2014 13:15:17 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level: 
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jevVHM26TJxp for <dmarc@ietfa.amsl.com>; Tue, 30 Dec 2014 13:15:11 -0800 (PST)
Received: from mx-out-1.zmailcloud.com (01.zmailcloud.com [192.198.85.104]) by ietfa.amsl.com (Postfix) with ESMTP id 3078A1A86F5 for <dmarc@ietf.org>; Tue, 30 Dec 2014 13:15:10 -0800 (PST)
Received: from smtp.01.com (smtp.01.com [10.10.0.43]) by mx-out-1.zmailcloud.com (Postfix) with ESMTP id 89CA05648AF; Tue, 30 Dec 2014 15:15:09 -0600 (CST)
Received: from localhost (localhost [127.0.0.1]) by smtp-out-1.01.com (Postfix) with ESMTP id 80B16A0294; Tue, 30 Dec 2014 15:15:09 -0600 (CST)
X-Virus-Scanned: amavisd-new at smtp-out-1.01.com
Received: from smtp.01.com ([127.0.0.1]) by localhost (smtp-out-1.01.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id j1367mSJhx-t; Tue, 30 Dec 2014 15:15:09 -0600 (CST)
Received: from smtp.01.com (localhost [127.0.0.1]) by smtp-out-1.01.com (Postfix) with ESMTP id 5E79EA03B3; Tue, 30 Dec 2014 15:15:08 -0600 (CST)
DKIM-Filter: OpenDKIM Filter v2.8.4 smtp-out-1.01.com 5E79EA03B3
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=peachymango.org; s=61F775A4-4A7F-11E4-A6BB-61E3068E35F6; t=1419974108; bh=qY4xhok/QbxygQeYsYY+ZTMotU8PBZQyoXaxppD/DyI=; h=Content-Type:Mime-Version:Subject:From:Date: Content-Transfer-Encoding:Message-Id:To; b=lfO0dYuOfZ9LuJAV3XckeI3BFSwBelgt4/4d/IhaKDWVZgJIySg4mEESs/pazUo8O GBHiGtz1OfX5Rb+7CDAeQo2d5kl3p5hbkCspLQP6sCQM4OLxScua6DxIaw+HrioShe Ll5jOH0N9LDllPsmx//14exV9y9c1fcyCghfh11g=
Received: from localhost (localhost [127.0.0.1]) by smtp-out-1.01.com (Postfix) with ESMTP id 46241A03AA; Tue, 30 Dec 2014 15:15:08 -0600 (CST)
X-Virus-Scanned: amavisd-new at smtp-out-1.01.com
Received: from smtp.01.com ([127.0.0.1]) by localhost (smtp-out-1.01.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id ngIC1uGisSos; Tue, 30 Dec 2014 15:15:08 -0600 (CST)
Received: from [10.0.0.6] (c-67-180-100-98.hsd1.ca.comcast.net [67.180.100.98]) by smtp-out-1.01.com (Postfix) with ESMTPSA id 9C2A4A0294; Tue, 30 Dec 2014 15:15:07 -0600 (CST)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
From: Franck Martin <franck@peachymango.org>
In-Reply-To: <WM!7841aefa9125a852351409a73d36dc1248d88f41493fffb0dde547e3da5cbabfa81319867b9cf4f4cd5db3f58b2e7881!@asav-3.01.com>
Date: Tue, 30 Dec 2014 13:15:06 -0800
Content-Transfer-Encoding: quoted-printable
Message-Id: <717587E3-3B83-4B2D-868C-F28E2FCF1691@peachymango.org>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <2397001.Fx3SqMl5ZI@scott-latitude-e6320> <CAL0qLwakLdWhHW+JbfQ=LO9yPSSOB=fH_oyLNMpGRPS_EAuudg@mail.gmail.com> <3004337.MAocVZ5Co9@scott-latitude-e6320> <CAL0qLwYqmVZdW_XivU0=Vr7itDvfw_0+qm7dthN9nJYXDZK2bg@mail.gmail.com> <66CEE14F-375D-4FE9-9485-6DFE58911E54@kitterman.com> <CE39F90A45FF0C49A1EA229FC9899B0525F5323E@USCLES544.agna.amgreetings.com> <54A183EB.6080508@dcrocker.net> <01PGOJ9M6F5E00005K@mauve.mrochek.com> <19D0C566-275F-474B-B823-B7D79CACD8C7@kitterman.com> <54A1AC4B.2050500@dcrocker.net> <CE39F90A45FF0C49A1EA229FC9899B0525F535AA@USCLES544.agna.amgreetings.com> <A9FDF340-7BF5-4FF4-A7C2-616E90AE988D@kitterman.com> <CE39F90A45FF0C49A1EA229FC9899B0525F535D6@USCLES544.agna.amgreetings.com> <54A1CE4F.2040303@dcrocker.net> <CE39F90A45FF0C49A1EA229FC9899B0525F54C20@USCLES544.agna.amgreetings.com> <WM!7841aefa9125a852351409a73d36dc1248d88f41493fffb0dde547e3da5cbabfa81319867b9cf4f4cd5db3f58b2e7 881!@asa v-3.01.com>
To: "MH Michael Hammer (5304)" <MHammer@ag.com>
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/Wq_4TMP7Ibyr9T2OT-70ZxbqIUM
Cc: "dmarc@ietf.org" <dmarc@ietf.org>, Dave Crocker <dcrocker@bbiw.net>
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 30 Dec 2014 21:15:18 -0000

> On Dec 30, 2014, at 5:39 AM, MH Michael Hammer (5304) <MHammer@ag.com> =
wrote:
>=20
>=20
>=20
>> -----Original Message-----
>> From: dmarc [mailto:dmarc-bounces@ietf.org] On Behalf Of Dave Crocker
>> Sent: Monday, December 29, 2014 4:58 PM
>> To: dmarc@ietf.org
>> Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
>>=20
>> On 12/29/2014 12:32 PM, MH Michael Hammer (5304) wrote:
>>> I suppose it's ultimately another example of local policy.
>>=20
>> Depends on what that means.
>>=20
>> The rule within the protocol needs to be -- and is -- mechanical and
>> universal: In order to apply DMARC policy, you must first obtain an
>> authenticated (or, described more usefully, 'authorized') domain name =
that
>> is aligned with the From: field domain.
>>=20
>> A protocol that treats an initial, temporary error as producing a =
permanent
>> error is a pretty fragile protocol, in a networking environment.  As =
such,
>> DMARC should at least strongly recommend retries, in the case of no =
passes
>> and at least one temp fail.
>>=20
>=20
> The choices offered were tempfail and allow retry or don't apply DMARC =
policy. I was expressing a preference for tempfail which ultimately =
would degrade to a permfail after whatever number of retries the sending =
system has set.=20
>=20
+1


From nobody Wed Dec 31 20:36:22 2014
Return-Path: <superuser@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5D6611A1B2C for <dmarc@ietfa.amsl.com>; Wed, 31 Dec 2014 20:36:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.701
X-Spam-Level: 
X-Spam-Status: No, score=0.701 tagged_above=-999 required=5 tests=[BAYES_50=0.8, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BMqAUoDBt4P6 for <dmarc@ietfa.amsl.com>; Wed, 31 Dec 2014 20:36:19 -0800 (PST)
Received: from mail-wi0-x22e.google.com (mail-wi0-x22e.google.com [IPv6:2a00:1450:400c:c05::22e]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 71DE51A1B36 for <dmarc@ietf.org>; Wed, 31 Dec 2014 20:36:18 -0800 (PST)
Received: by mail-wi0-f174.google.com with SMTP id h11so26298582wiw.13 for <dmarc@ietf.org>; Wed, 31 Dec 2014 20:36:17 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=vVUBHmvh/FxdOOBy2loGcVloDmOHGWzGMARbdWxPt0o=; b=fd81loG6E8Sl0yxstMFsBwc4gbbyUVhVHkzoUKFl2OJ2G2SX20PT+Fl1IU8muFT1Xw 4U188PKDm4HdQeZzXgVQi0Y10P23X2LnU0JCx4nszj13gJLW4vMG6TwtdoRtAcnFDukG /uq7MgMOKRXzpKtf8PmwkPWjYhA1vmNpAh2+gvNgaAfTwO4stM5qQotpmiBEsF0wLnIC 2/B5X7a+PW3vu9JkKxzlCNa7wZeGHN8mfZL8k7DGBtGW22NOs+oTA9jqAjNNo0OFKSUI NB/yelolj4b6UKcqh0EnwmPJKP7Z5tY1TNUmSGA58uzh+xSZ7lYT/4HTV0bMRsXLgWWe TibA==
MIME-Version: 1.0
X-Received: by 10.194.62.76 with SMTP id w12mr137428842wjr.5.1420086977286; Wed, 31 Dec 2014 20:36:17 -0800 (PST)
Received: by 10.27.204.198 with HTTP; Wed, 31 Dec 2014 20:36:17 -0800 (PST)
In-Reply-To: <54A1D5C1.9030505@sonnection.nl>
References: <CAL0qLwYOtQe0RLfPmO6TjoJv4CUKUoiRV=uzi29ip70_OZ9p3A@mail.gmail.com> <5463ECBD.9030703@sonnection.nl> <CAL0qLwYSTGhBixiOEyxnbQJ5O6h4F+0-8xiAAE7kvUUEnogkiQ@mail.gmail.com> <54A1D5C1.9030505@sonnection.nl>
Date: Wed, 31 Dec 2014 20:36:17 -0800
Message-ID: <CAL0qLwYm+cgsvu-jiW953A21CYMdGLe_howC9K7D4U-1wts0oA@mail.gmail.com>
From: "Murray S. Kucherawy" <superuser@gmail.com>
To: "<R.E.Sonneveld@sonnection.nl>" <R.E.Sonneveld@sonnection.nl>
Content-Type: multipart/alternative; boundary=047d7ba977a4d4d8ca050b8fc30b
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/NXaXJI5ggVbO7mQRLmrWJqWoWCw
Cc: "dmarc@ietf.org" <dmarc@ietf.org>
Subject: Re: [dmarc-ietf] draft-kucherawy-dmarc-base updated (-06)
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 01 Jan 2015 04:36:21 -0000

--047d7ba977a4d4d8ca050b8fc30b
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

On Mon, Dec 29, 2014 at 2:29 PM, Rolf E. Sonneveld <
R.E.Sonneveld@sonnection.nl> wrote:

>
>
>     3.1.3 Flow diagram
>>
>> The box titled 'User Mailbox' could give the impression that there's onl=
y
>> one choice for delivery. However, quarantining can be done without deliv=
ery
>> to a mailbox. I'd suggest to label this box 'rMDA'.
>>
> That's already done in -08.
>
>
> OK. Well, it's MDA, but that's OK. One typo in the diagram. When:
>
>  "sMTA" is the sending
>    MTA, and "rMTA" is the receiving MTA.
>
>
> is correct, the box in the diagram should be labelled 'sMTA', not 'oMTA'.
>

Fixed.


>
>
>
>>   The part within parentheses of step 6:
>>
>>   6. Recipient transport service conducts SPF and DKIM authentication
>> checks by passing the necessary data to their respective modules, each o=
f
>> which require queries to the Author Domain=E2=80=99s DNS data (when iden=
tifiers are
>> aligned; see below).
>>
>>
>> might indicate that SPF and DKIM authentication checks need not be
>> performed when identifiers are not aligned. However, for sake of reporti=
ng,
>> SPF and DKIM authentication checks will in general always be done, or am=
 I
>> missing something?
>>
>
>  I can envision a DMARC implementation that skips SPF or DKIM checks if
> the corresponding identifiers are not aligned, because they won't be
> interesting to DMARC in that case.
>
>
> Whether or not to generate reports in the case of non-alignment is not
> clear from the text, or am I missing something? Par. 3.1.3:
>
>     8.  If a policy is found, it is combined with the Author's domain and
>        the SPF and DKIM results to produce a DMARC policy result (a
>        "pass" or "fail"), and can optionally cause one of two kinds of
>        reports to be generated (not shown).
>
>
> and par. 6.2 goes right into the format of reports, not the conditions
> under which a report is to be sent.
>

Added an item at the end of the bullet list in 3.1.3.



>
>
>
>
>    5.7 Last sentence:
>>
>> Mail Receivers SHOULD also implement reporting instructions of DMARC in
>> place of any extensions to SPF or DKIM that might enable such reporting.
>>
>> Not sure what this means. But it seems to me DMARC cannot claim priority
>> over other options/extensions in other IETF protocols.
>>
> This is another spot where the SHOULD gives the operator the choice to do
> both if it wishes.  I can't remember off the top of my head what the use
> case is here, but essentially the absence of a request for DKIM or SPF
> reporting (as developed by the MARF working group some time ago) should n=
ot
> preclude DMARC reporting, nor should their presence interfere with DMARC
> reporting.
>
>
> Then, borrowing from your text, may I suggest the following text:
>
> "Mail Receivers SHOULD implement reporting instructions of DMARC, even in
> the absence of a request for DKIM or SPF reporting [MARF]. Furthermore, t=
he
> presence of such requests SHOULD NOT interfere with DMARC reporting."
>
>
Done, with slight changes.

>
> And as a general statement: thanks for all the work, Murray!
>

Anything to get this thing put to bed!

-MSK

--047d7ba977a4d4d8ca050b8fc30b
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">On Mon, Dec 29, 2014 at 2:29 PM, Rolf E. Sonneveld <span d=
ir=3D"ltr">&lt;<a href=3D"mailto:R.E.Sonneveld@sonnection.nl" target=3D"_bl=
ank">R.E.Sonneveld@sonnection.nl</a>&gt;</span> wrote:<br><div class=3D"gma=
il_extra"><div class=3D"gmail_quote"><blockquote class=3D"gmail_quote" styl=
e=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
 =20
   =20
 =20
  <br><div bgcolor=3D"#FFFFFF" text=3D"#000000"><span class=3D""><br>
    <blockquote type=3D"cite">
      <div dir=3D"ltr">
        <div class=3D"gmail_extra">
          <div class=3D"gmail_quote">
            <blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;bo=
rder-left:1px #ccc solid;padding-left:1ex">
              <div bgcolor=3D"#FFFFFF" text=3D"#000000">
                <p> </p>
                <p>3.1.3 Flow diagram<br>
                </p>
                <p>The box titled &#39;User Mailbox&#39; could give the
                  impression that there&#39;s only one choice for delivery.
                  However, quarantining can be done without delivery to
                  a mailbox. I&#39;d suggest to label this box &#39;rMDA&#3=
9;.<br>
                </p>
              </div>
            </blockquote>
            <div>That&#39;s already done in -08.<br>
            </div>
          </div>
        </div>
      </div>
    </blockquote>
    <br></span>
    OK. Well, it&#39;s MDA, but that&#39;s OK. One typo in the diagram. Whe=
n:<br>
    <br>
    <blockquote type=3D"cite">
      <pre>&quot;sMTA&quot; is the sending
   MTA, and &quot;rMTA&quot; is the receiving MTA.</pre>
    </blockquote>
    <br>
    is correct, the box in the diagram should be labelled &#39;sMTA&#39;, n=
ot
    &#39;oMTA&#39;.<span class=3D""><br></span></div></blockquote><div><br>=
</div><div>Fixed.<br>=C2=A0<br></div><blockquote class=3D"gmail_quote" styl=
e=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div bg=
color=3D"#FFFFFF" text=3D"#000000"><span class=3D"">
    <br>
    <blockquote type=3D"cite">
      <div dir=3D"ltr">
        <div class=3D"gmail_extra">
          <div class=3D"gmail_quote">
            <div>=C2=A0<br>
            </div>
            <blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;bo=
rder-left:1px #ccc solid;padding-left:1ex">
              <div bgcolor=3D"#FFFFFF" text=3D"#000000">
                <p> </p>
                <p>The part within parentheses of step 6:<br>
                </p>
                <p> </p>
                <blockquote type=3D"cite">=C2=A06. Recipient transport serv=
ice
                  conducts SPF and DKIM authentication checks by passing
                  the necessary data to their respective modules, each
                  of which require queries to the Author Domain=E2=80=99s D=
NS
                  data (when identifiers are aligned; see below).</blockquo=
te>
                <br>
                might indicate that SPF and DKIM authentication checks
                need not be performed when identifiers are not aligned.
                However, for sake of reporting, SPF and DKIM
                authentication checks will in general always be done, or
                am I missing something?<br>
              </div>
            </blockquote>
            <div><br>
            </div>
            <div>I can envision a DMARC implementation that skips SPF or
              DKIM checks if the corresponding identifiers are not
              aligned, because they won&#39;t be interesting to DMARC in
              that case.<br>
            </div>
          </div>
        </div>
      </div>
    </blockquote>
    <br></span>
    Whether or not to generate reports in the case of non-alignment is
    not clear from the text, or am I missing something? Par. 3.1.3:<br>
    <br>
    <blockquote type=3D"cite">
      <pre>   8.  If a policy is found, it is combined with the Author&#39;=
s domain and
       the SPF and DKIM results to produce a DMARC policy result (a
       &quot;pass&quot; or &quot;fail&quot;), and can optionally cause one =
of two kinds of
       reports to be generated (not shown).</pre>
    </blockquote>
    <br>
    and par. 6.2 goes right into the format of reports, not the
    conditions under which a report is to be sent.<span class=3D""><br></sp=
an></div></blockquote><div><br></div><div>Added an item at the end of the b=
ullet list in 3.1.3.<br><br>=C2=A0<br></div><blockquote class=3D"gmail_quot=
e" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">=
<br><div bgcolor=3D"#FFFFFF" text=3D"#000000"><span class=3D"">
    </span><span class=3D""><br>
    <br>
    <blockquote type=3D"cite">
      <div dir=3D"ltr">
        <div class=3D"gmail_extra">
          <div class=3D"gmail_quote">
            <div><br>
            </div>
            <blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;bo=
rder-left:1px #ccc solid;padding-left:1ex">
              <div bgcolor=3D"#FFFFFF" text=3D"#000000">
                <p> </p>
                <p>5.7 Last sentence:<br>
                </p>
                <blockquote>
                  <p>Mail Receivers SHOULD also implement reporting
                    instructions of DMARC in place of any extensions to
                    SPF or DKIM that might enable such reporting.<br>
                  </p>
                </blockquote>
                <p>Not sure what this means. But it seems to me DMARC
                  cannot claim priority over other options/extensions in
                  other IETF protocols.<br>
                </p>
              </div>
            </blockquote>
            <div>This is another spot where the SHOULD gives the
              operator the choice to do both if it wishes.=C2=A0 I can&#39;=
t
              remember off the top of my head what the use case is here,
              but essentially the absence of a request for DKIM or SPF
              reporting (as developed by the MARF working group some
              time ago) should not preclude DMARC reporting, nor should
              their presence interfere with DMARC reporting.<br>
            </div>
          </div>
        </div>
      </div>
    </blockquote>
    <br></span>
    Then, borrowing from your text, may I suggest the following text:<br>
    <br>
    <blockquote>&quot;Mail Receivers SHOULD implement reporting instruction=
s
      of DMARC, even in the absence of a request for DKIM or SPF
      reporting [MARF]. Furthermore, the presence of such requests
      SHOULD NOT interfere with DMARC reporting.&quot;<br></blockquote></di=
v></blockquote><div><br></div><div>Done, with slight changes. <br></div><bl=
ockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #=
ccc solid;padding-left:1ex"><div bgcolor=3D"#FFFFFF" text=3D"#000000"><bloc=
kquote>
    </blockquote>
    <br>
    And as a general statement: thanks for all the work, Murray!<span class=
=3D"HOEnZb"><font color=3D"#888888"><br></font></span></div></blockquote><d=
iv><br></div><div>Anything to get this thing put to bed!<br><br></div><div>=
-MSK <br></div></div><br></div></div>

--047d7ba977a4d4d8ca050b8fc30b--


From nobody Wed Dec 31 20:43:12 2014
Return-Path: <superuser@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 23D7D1A1B36 for <dmarc@ietfa.amsl.com>; Wed, 31 Dec 2014 20:43:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.599
X-Spam-Level: 
X-Spam-Status: No, score=-0.599 tagged_above=-999 required=5 tests=[BAYES_05=-0.5, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0vqXcyHhh2yI for <dmarc@ietfa.amsl.com>; Wed, 31 Dec 2014 20:43:07 -0800 (PST)
Received: from mail-we0-x22e.google.com (mail-we0-x22e.google.com [IPv6:2a00:1450:400c:c03::22e]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 66C761A1B2C for <dmarc@ietf.org>; Wed, 31 Dec 2014 20:43:07 -0800 (PST)
Received: by mail-we0-f174.google.com with SMTP id k48so3099639wev.19 for <dmarc@ietf.org>; Wed, 31 Dec 2014 20:43:06 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=nDIALiNVfxq5hk+jtEXg/5zGGdGbMd1/olK8RsxxvFk=; b=KIj+kplkWj/Kgb+OwyUVPPMCtFW2Wr4VwzLtNzbRWqzVbYXtoYejtDXcrzThy2SajK kiyjV4lk9UhFmHLtPy6d4Jd/2sHdQp4I9xhY3hRln1U37GbQvPdY5yF8AptQU26ntqW5 nDoZTjwTVeNntywzv1gdW+asbPmYCVFpTv1UK7NjRZFhykL297EwL541HNXG5SlShLxP tLSfT98FjG7YSCGezPAIvv/DWhHvxkbZ/mlh66dflMLWO8/PZyOfulRr/y1WrdlYoj2m Hm48jy39Yt3rE8pU27lMvG2TGi4aoirvPaOTKmjtoo2tSJuJjLvBTdzqUDY9Fpp/Uozx xfhg==
MIME-Version: 1.0
X-Received: by 10.180.85.33 with SMTP id e1mr118738615wiz.61.1420087386208; Wed, 31 Dec 2014 20:43:06 -0800 (PST)
Received: by 10.27.204.198 with HTTP; Wed, 31 Dec 2014 20:43:06 -0800 (PST)
In-Reply-To: <31BA1A25-D64B-4FA6-B4F5-1AD2342C35DA@kitterman.com>
References: <CAL0qLwZSn+CXG0CGS54gAEemEc=6qSkNkKyjNi646EKqCj8+rw@mail.gmail.com> <2397001.Fx3SqMl5ZI@scott-latitude-e6320> <CAL0qLwakLdWhHW+JbfQ=LO9yPSSOB=fH_oyLNMpGRPS_EAuudg@mail.gmail.com> <3004337.MAocVZ5Co9@scott-latitude-e6320> <CAL0qLwYqmVZdW_XivU0=Vr7itDvfw_0+qm7dthN9nJYXDZK2bg@mail.gmail.com> <66CEE14F-375D-4FE9-9485-6DFE58911E54@kitterman.com> <CE39F90A45FF0C49A1EA229FC9899B0525F5323E@USCLES544.agna.amgreetings.com> <54A183EB.6080508@dcrocker.net> <01PGOJ9M6F5E00005K@mauve.mrochek.com> <19D0C566-275F-474B-B823-B7D79CACD8C7@kitterman.com> <54A1AC4B.2050500@dcrocker.net> <31BA1A25-D64B-4FA6-B4F5-1AD2342C35DA@kitterman.com>
Date: Wed, 31 Dec 2014 20:43:06 -0800
Message-ID: <CAL0qLwaiQh=eg-QxD9hXe00uK+xxrWaKgfW1Rb8=SjYWhwwbMg@mail.gmail.com>
From: "Murray S. Kucherawy" <superuser@gmail.com>
To: Scott Kitterman <sklist@kitterman.com>
Content-Type: multipart/alternative; boundary=f46d04428074347ee2050b8fdcfb
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/AfG5xKcK9b2qtDeHB56Bismqe2g
Cc: "dmarc@ietf.org" <dmarc@ietf.org>
Subject: Re: [dmarc-ietf] Jim Fenton's review of -04
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 01 Jan 2015 04:43:10 -0000

--f46d04428074347ee2050b8fdcfb
Content-Type: text/plain; charset=UTF-8

OK, seriously, I hope I don't have to crack this open again.  Conflict
review is slated for the 1/8 telechat, and a flurry of last minute edits
might not sit well with the IESG.  We need to leave actual work, as much as
at all possible, to the WG, and not to hacking on the ISE version.

Diffs to -09 which will be in -10 within the next few days:
http://blackops.org/~msk/dmarc/diff.html

-MSK


On Mon, Dec 29, 2014 at 11:38 AM, Scott Kitterman <sklist@kitterman.com>
wrote:

> On December 29, 2014 2:32:27 PM EST, Dave Crocker <dhc@dcrocker.net>
> wrote:
> >On 12/29/2014 10:40 AM, Scott Kitterman wrote:
> >TO:
> >>> >
> >DMARC evaluation can only complete and yield a "pass" result when one
> >of the underlying authentication mechanisms passes for an aligned
> >identifier.  If neither passes and one or both of them failed due to
> >>> >a
> >temporary error, the Receiver evaluating the message is also unable
> >>> >to
> >conclude that the DMARC mechanism had a permanent failure and thereby
> >can apply the advertised DMARC policy.
> >>> >
> >>> >This looks good to me.
> >> Shouldn't it be cannot apply the advertised DMARC policy?
> >
> >Actually, no, but I also was confused.  It took me some serious effort
> >to decide that the current wording was correct.  And a spec should not
> >require that sort of linguistic diligence, IMO.
> >
> >Looks like a small change can make your form correct...
> >
> >So I suggest:
> >
> >     DMARC evaluation can only yield a "pass" result after one
> >of the underlying authentication mechanisms passes for an aligned
> >identifier. If neither passes and one or both of them fails due to a
> >temporary error, the Receiver evaluating the message is unable to
> >conclude that the DMARC mechanism had a permanent failure; they
> >therefore cannot (yet) apply the advertised DMARC policy.
> >
> >d/
>
> I think that's better. I'd prefer to leave out the parenthetical yet as I
> think it raises ambiguity rather than reduces it.
>
> Scott K
>
> _______________________________________________
> dmarc mailing list
> dmarc@ietf.org
> https://www.ietf.org/mailman/listinfo/dmarc
>

--f46d04428074347ee2050b8fdcfb
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>OK, seriously, I hope I don&#39;t have to crack this =
open again.=C2=A0 Conflict review is slated for the 1/8 telechat, and a flu=
rry of last minute edits might not sit well with the IESG.=C2=A0 We need to=
 leave actual work, as much as at all possible, to the WG, and not to hacki=
ng on the ISE version.<br><br>Diffs to -09 which will be in -10 within the =
next few days: <a href=3D"http://blackops.org/~msk/dmarc/diff.html">http://=
blackops.org/~msk/dmarc/diff.html</a><br><br></div>-MSK<br><br></div><div c=
lass=3D"gmail_extra"><br><div class=3D"gmail_quote">On Mon, Dec 29, 2014 at=
 11:38 AM, Scott Kitterman <span dir=3D"ltr">&lt;<a href=3D"mailto:sklist@k=
itterman.com" target=3D"_blank">sklist@kitterman.com</a>&gt;</span> wrote:<=
br><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left=
:1px #ccc solid;padding-left:1ex"><div class=3D"HOEnZb"><div class=3D"h5">O=
n December 29, 2014 2:32:27 PM EST, Dave Crocker &lt;<a href=3D"mailto:dhc@=
dcrocker.net">dhc@dcrocker.net</a>&gt; wrote:<br>
&gt;On 12/29/2014 10:40 AM, Scott Kitterman wrote:<br>
&gt;TO:<br>
&gt;&gt;&gt; &gt;<br>
&gt;DMARC evaluation can only complete and yield a &quot;pass&quot; result =
when one<br>
&gt;of the underlying authentication mechanisms passes for an aligned<br>
&gt;identifier.=C2=A0 If neither passes and one or both of them failed due =
to<br>
&gt;&gt;&gt; &gt;a<br>
&gt;temporary error, the Receiver evaluating the message is also unable<br>
&gt;&gt;&gt; &gt;to<br>
&gt;conclude that the DMARC mechanism had a permanent failure and thereby<b=
r>
&gt;can apply the advertised DMARC policy.<br>
&gt;&gt;&gt; &gt;<br>
&gt;&gt;&gt; &gt;This looks good to me.<br>
&gt;&gt; Shouldn&#39;t it be cannot apply the advertised DMARC policy?<br>
&gt;<br>
&gt;Actually, no, but I also was confused.=C2=A0 It took me some serious ef=
fort<br>
&gt;to decide that the current wording was correct.=C2=A0 And a spec should=
 not<br>
&gt;require that sort of linguistic diligence, IMO.<br>
&gt;<br>
&gt;Looks like a small change can make your form correct...<br>
&gt;<br>
&gt;So I suggest:<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0DMARC evaluation can only yield a &quot;pass&quot; =
result after one<br>
&gt;of the underlying authentication mechanisms passes for an aligned<br>
&gt;identifier. If neither passes and one or both of them fails due to a<br=
>
&gt;temporary error, the Receiver evaluating the message is unable to<br>
&gt;conclude that the DMARC mechanism had a permanent failure; they<br>
&gt;therefore cannot (yet) apply the advertised DMARC policy.<br>
&gt;<br>
&gt;d/<br>
<br>
</div></div>I think that&#39;s better. I&#39;d prefer to leave out the pare=
nthetical yet as I think it raises ambiguity rather than reduces it.<br>
<br>
Scott K<br>
<div class=3D"HOEnZb"><div class=3D"h5"><br>
_______________________________________________<br>
dmarc mailing list<br>
<a href=3D"mailto:dmarc@ietf.org">dmarc@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/dmarc" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/dmarc</a><br>
</div></div></blockquote></div><br></div>

--f46d04428074347ee2050b8fdcfb--


From nobody Wed Dec 31 22:34:35 2014
Return-Path: <weihaw@google.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 045111A006C for <dmarc@ietfa.amsl.com>; Wed, 31 Dec 2014 22:30:52 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.388
X-Spam-Level: 
X-Spam-Status: No, score=-1.388 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LGG36TcaX3aN for <dmarc@ietfa.amsl.com>; Wed, 31 Dec 2014 22:30:48 -0800 (PST)
Received: from mail-ig0-x22a.google.com (mail-ig0-x22a.google.com [IPv6:2607:f8b0:4001:c05::22a]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F08441A0068 for <dmarc@ietf.org>; Wed, 31 Dec 2014 22:30:47 -0800 (PST)
Received: by mail-ig0-f170.google.com with SMTP id r2so15509019igi.5 for <dmarc@ietf.org>; Wed, 31 Dec 2014 22:30:46 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:references:from:date:message-id:subject:to:cc :content-type; bh=hhJC0v672GQK4SBgF5X4LglcBZHPF9QACJ8eMslwH3k=; b=Yfmpm+PhV3ZyzUJ+/oh12Cc3ZBR7J4ph1GbfTfFm8MFp87XkRBvaQd2kNiiQjI9S7G GUiBLqWjqosYUyGrVVq+zFOJb8QUEjDwbhTenCvbxz8zJsHGIVbxZjTo6CLEmxkE6q5f zIy41277Sg7sDGCvd3XRjnObOkYC5TqARRWa/jwQKJWZPoMHIrYMu2RTHGMP2E6Kw8Ux KDwy2AhPADWVrUT1GVoPCRAxbGEdiBBTthQLhq+UDmb8U7Bty67/1xbMKTtnWGDj3R3w Jh5wVMfdWac9P9ZTKSddPGqj+DS0V0+5yUa3lKopV147aWvhwDEpDOTh/nw0BHahAoeV IHwA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:references:from:date:message-id :subject:to:cc:content-type; bh=hhJC0v672GQK4SBgF5X4LglcBZHPF9QACJ8eMslwH3k=; b=QqaAq7VbLbus9Z7IeO4nb4UOKxNvVnVjkmYswAAx8jGCvyJ5f5V6YOdj14HVmhfjg9 oW8oBGwR2bHjkP80V8tT872AwMPmE2Qs9TFukJqC8F0eDSr/0Bssybz2bdrKYTcl1vNv hzTkLf1wp16ItDNjRrYb+VTtr9k9q2hPDtlixjd5y6DVwpeyMmQr9NzuUXjOFLp8mrDN ySyVN79ftQwmf8ddoDG5F8LMD/32qGSt7UlqDQyjqYnRnqPDdhrzIXmP948zAl0g9FyI MIe1KNYPCmCAGQqnCZ7fz16BKu2RhtaacDCEv+myj3l+Z/G6WT72nkOubsusRQVM1uS5 xzOg==
X-Gm-Message-State: ALoCoQniWEt8kB6IkbMiyZTR0qGoC7Qr5Sg9fsHZ72dp+dFa/YYAYsGXh2V+A9Sl05n7yoSV3ruk
X-Received: by 10.50.30.3 with SMTP id o3mr12813816igh.44.1420093846815; Wed, 31 Dec 2014 22:30:46 -0800 (PST)
MIME-Version: 1.0
References: <CAL0qLwYOtQe0RLfPmO6TjoJv4CUKUoiRV=uzi29ip70_OZ9p3A@mail.gmail.com> <5463ECBD.9030703@sonnection.nl> <CAL0qLwYSTGhBixiOEyxnbQJ5O6h4F+0-8xiAAE7kvUUEnogkiQ@mail.gmail.com> <54A1D5C1.9030505@sonnection.nl> <CAL0qLwYm+cgsvu-jiW953A21CYMdGLe_howC9K7D4U-1wts0oA@mail.gmail.com>
From: Wei Chuang <weihaw@google.com>
Date: Thu, 01 Jan 2015 06:30:30 +0000
Message-ID: <CAAFsWK35A4KvE9D02G+qbX5J4eFu69mzu_khk7V1a+XAeMBfPQ@mail.gmail.com>
To: "Murray S. Kucherawy" <superuser@gmail.com>,  "<R.E.Sonneveld@sonnection.nl>" <R.E.Sonneveld@sonnection.nl>
Content-Type: multipart/alternative; boundary=e89a8f83941f49ba5c050b915d85
Archived-At: http://mailarchive.ietf.org/arch/msg/dmarc/mZtRDoQAGRB0r40hSWpH-w8QRbw
Cc: "dmarc@ietf.org" <dmarc@ietf.org>
Subject: Re: [dmarc-ietf] draft-kucherawy-dmarc-base updated (-06)
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 01 Jan 2015 06:30:53 -0000

--e89a8f83941f49ba5c050b915d85
Content-Type: text/plain; charset=ISO-8859-1

ni


On Wed, Dec 31, 2014, 8:36 PM Murray S. Kucherawy <superuser@gmail.com>
wrote:

> On Mon, Dec 29, 2014 at 2:29 PM, Rolf E. Sonneveld <
> R.E.Sonneveld@sonnection.nl> wrote:
>
>>
>>
>>     3.1.3 Flow diagram
>>>
>>> The box titled 'User Mailbox' could give the impression that there's
>>> only one choice for delivery. However, quarantining can be done without
>>> delivery to a mailbox. I'd suggest to label this box 'rMDA'.
>>>
>> That's already done in -08.
>>
>>
>> OK. Well, it's MDA, but that's OK. One typo in the diagram. When:
>>
>>  "sMTA" is the sending
>>    MTA, and "rMTA" is the receiving MTA.
>>
>>
>> is correct, the box in the diagram should be labelled 'sMTA', not 'oMTA'.
>>
>
> Fixed.
>
>
>>
>>
>>
>>>   The part within parentheses of step 6:
>>>
>>>   6. Recipient transport service conducts SPF and DKIM authentication
>>> checks by passing the necessary data to their respective modules, each of
>>> which require queries to the Author Domain's DNS data (when identifiers are
>>> aligned; see below).
>>>
>>>
>>> might indicate that SPF and DKIM authentication checks need not be
>>> performed when identifiers are not aligned. However, for sake of reporting,
>>> SPF and DKIM authentication checks will in general always be done, or am I
>>> missing something?
>>>
>>
>>  I can envision a DMARC implementation that skips SPF or DKIM checks if
>> the corresponding identifiers are not aligned, because they won't be
>> interesting to DMARC in that case.
>>
>>
>> Whether or not to generate reports in the case of non-alignment is not
>> clear from the text, or am I missing something? Par. 3.1.3:
>>
>>     8.  If a policy is found, it is combined with the Author's domain and
>>        the SPF and DKIM results to produce a DMARC policy result (a
>>        "pass" or "fail"), and can optionally cause one of two kinds of
>>        reports to be generated (not shown).
>>
>>
>> and par. 6.2 goes right into the format of reports, not the conditions
>> under which a report is to be sent.
>>
>
> Added an item at the end of the bullet list in 3.1.3.
>
>
>
>>
>>
>>
>>
>>    5.7 Last sentence:
>>>
>>> Mail Receivers SHOULD also implement reporting instructions of DMARC in
>>> place of any extensions to SPF or DKIM that might enable such reporting.
>>>
>>> Not sure what this means. But it seems to me DMARC cannot claim priority
>>> over other options/extensions in other IETF protocols.
>>>
>> This is another spot where the SHOULD gives the operator the choice to do
>> both if it wishes.  I can't remember off the top of my head what the use
>> case is here, but essentially the absence of a request for DKIM or SPF
>> reporting (as developed by the MARF working group some time ago) should not
>> preclude DMARC reporting, nor should their presence interfere with DMARC
>> reporting.
>>
>>
>> Then, borrowing from your text, may I suggest the following text:
>>
>> "Mail Receivers SHOULD implement reporting instructions of DMARC, even in
>> the absence of a request for DKIM or SPF reporting [MARF]. Furthermore, the
>> presence of such requests SHOULD NOT interfere with DMARC reporting."
>>
>>
> Done, with slight changes.
>
>>
>> And as a general statement: thanks for all the work, Murray!
>>
>
> Anything to get this thing put to bed!
>
> -MSK
>
> _______________________________________________
> dmarc mailing list
> dmarc@ietf.org
> https://www.ietf.org/mailman/listinfo/dmarc
>

--e89a8f83941f49ba5c050b915d85
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<p dir=3D"ltr">ni</p>
<br><br><div class=3D"gmail_quote">On Wed, Dec 31, 2014, 8:36 PM&nbsp;Murra=
y S. Kucherawy &lt;<a href=3D"mailto:superuser@gmail.com">superuser@gmail.c=
om</a>&gt; wrote:<br><blockquote class=3D"gmail_quote" style=3D"margin:0 0 =
0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir=3D"ltr">On Mon=
, Dec 29, 2014 at 2:29 PM, Rolf E. Sonneveld <span dir=3D"ltr">&lt;<a href=
=3D"mailto:R.E.Sonneveld@sonnection.nl" target=3D"_blank">R.E.Sonneveld@son=
nection.nl</a>&gt;</span> wrote:<br></div><div dir=3D"ltr"><div class=3D"gm=
ail_extra"><div class=3D"gmail_quote"><blockquote class=3D"gmail_quote" sty=
le=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
 =20
   =20
 =20
  <br><div bgcolor=3D"#FFFFFF" text=3D"#000000"><span><br>
    <blockquote type=3D"cite">
      <div dir=3D"ltr">
        <div class=3D"gmail_extra">
          <div class=3D"gmail_quote">
            <blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;bo=
rder-left:1px #ccc solid;padding-left:1ex">
              <div bgcolor=3D"#FFFFFF" text=3D"#000000">
                <p> </p>
                <p>3.1.3 Flow diagram<br>
                </p>
                <p>The box titled &#39;User Mailbox&#39; could give the
                  impression that there&#39;s only one choice for delivery.
                  However, quarantining can be done without delivery to
                  a mailbox. I&#39;d suggest to label this box &#39;rMDA&#3=
9;.<br>
                </p>
              </div>
            </blockquote>
            <div>That&#39;s already done in -08.<br>
            </div>
          </div>
        </div>
      </div>
    </blockquote>
    <br></span>
    OK. Well, it&#39;s MDA, but that&#39;s OK. One typo in the diagram. Whe=
n:<br>
    <br>
    <blockquote type=3D"cite">
      <pre>&quot;sMTA&quot; is the sending
   MTA, and &quot;rMTA&quot; is the receiving MTA.</pre>
    </blockquote>
    <br>
    is correct, the box in the diagram should be labelled &#39;sMTA&#39;, n=
ot
    &#39;oMTA&#39;.<span><br></span></div></blockquote><div><br></div></div=
></div></div><div dir=3D"ltr"><div class=3D"gmail_extra"><div class=3D"gmai=
l_quote"><div>Fixed.<br>&nbsp;<br></div></div></div></div><div dir=3D"ltr">=
<div class=3D"gmail_extra"><div class=3D"gmail_quote"><blockquote class=3D"=
gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-=
left:1ex"><div bgcolor=3D"#FFFFFF" text=3D"#000000"><span>
    <br>
    <blockquote type=3D"cite">
      <div dir=3D"ltr">
        <div class=3D"gmail_extra">
          <div class=3D"gmail_quote">
            <div>&nbsp;<br>
            </div>
            <blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;bo=
rder-left:1px #ccc solid;padding-left:1ex">
              <div bgcolor=3D"#FFFFFF" text=3D"#000000">
                <p> </p>
                <p>The part within parentheses of step 6:<br>
                </p>
                <p> </p>
                <blockquote type=3D"cite">&nbsp;6. Recipient transport serv=
ice
                  conducts SPF and DKIM authentication checks by passing
                  the necessary data to their respective modules, each
                  of which require queries to the Author Domain&rsquo;s DNS
                  data (when identifiers are aligned; see below).</blockquo=
te>
                <br>
                might indicate that SPF and DKIM authentication checks
                need not be performed when identifiers are not aligned.
                However, for sake of reporting, SPF and DKIM
                authentication checks will in general always be done, or
                am I missing something?<br>
              </div>
            </blockquote>
            <div><br>
            </div>
            <div>I can envision a DMARC implementation that skips SPF or
              DKIM checks if the corresponding identifiers are not
              aligned, because they won&#39;t be interesting to DMARC in
              that case.<br>
            </div>
          </div>
        </div>
      </div>
    </blockquote>
    <br></span>
    Whether or not to generate reports in the case of non-alignment is
    not clear from the text, or am I missing something? Par. 3.1.3:<br>
    <br>
    <blockquote type=3D"cite">
      <pre>   8.  If a policy is found, it is combined with the Author&#39;=
s domain and
       the SPF and DKIM results to produce a DMARC policy result (a
       &quot;pass&quot; or &quot;fail&quot;), and can optionally cause one =
of two kinds of
       reports to be generated (not shown).</pre>
    </blockquote>
    <br>
    and par. 6.2 goes right into the format of reports, not the
    conditions under which a report is to be sent.<span><br></span></div></=
blockquote><div><br></div></div></div></div><div dir=3D"ltr"><div class=3D"=
gmail_extra"><div class=3D"gmail_quote"><div>Added an item at the end of th=
e bullet list in 3.1.3.<br><br>&nbsp;<br></div></div></div></div><div dir=
=3D"ltr"><div class=3D"gmail_extra"><div class=3D"gmail_quote"><blockquote =
class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid=
;padding-left:1ex"><br><div bgcolor=3D"#FFFFFF" text=3D"#000000"><span>
    </span><span><br>
    <br>
    <blockquote type=3D"cite">
      <div dir=3D"ltr">
        <div class=3D"gmail_extra">
          <div class=3D"gmail_quote">
            <div><br>
            </div>
            <blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;bo=
rder-left:1px #ccc solid;padding-left:1ex">
              <div bgcolor=3D"#FFFFFF" text=3D"#000000">
                <p> </p>
                <p>5.7 Last sentence:<br>
                </p>
                <blockquote>
                  <p>Mail Receivers SHOULD also implement reporting
                    instructions of DMARC in place of any extensions to
                    SPF or DKIM that might enable such reporting.<br>
                  </p>
                </blockquote>
                <p>Not sure what this means. But it seems to me DMARC
                  cannot claim priority over other options/extensions in
                  other IETF protocols.<br>
                </p>
              </div>
            </blockquote>
            <div>This is another spot where the SHOULD gives the
              operator the choice to do both if it wishes.&nbsp; I can&#39;=
t
              remember off the top of my head what the use case is here,
              but essentially the absence of a request for DKIM or SPF
              reporting (as developed by the MARF working group some
              time ago) should not preclude DMARC reporting, nor should
              their presence interfere with DMARC reporting.<br>
            </div>
          </div>
        </div>
      </div>
    </blockquote>
    <br></span>
    Then, borrowing from your text, may I suggest the following text:<br>
    <br>
    <blockquote>&quot;Mail Receivers SHOULD implement reporting instruction=
s
      of DMARC, even in the absence of a request for DKIM or SPF
      reporting [MARF]. Furthermore, the presence of such requests
      SHOULD NOT interfere with DMARC reporting.&quot;<br></blockquote></di=
v></blockquote><div><br></div></div></div></div><div dir=3D"ltr"><div class=
=3D"gmail_extra"><div class=3D"gmail_quote"><div>Done, with slight changes.=
 <br></div></div></div></div><div dir=3D"ltr"><div class=3D"gmail_extra"><d=
iv class=3D"gmail_quote"><blockquote class=3D"gmail_quote" style=3D"margin:=
0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div bgcolor=3D"#FF=
FFFF" text=3D"#000000"><blockquote>
    </blockquote>
    <br>
    And as a general statement: thanks for all the work, Murray!<span><font=
 color=3D"#888888"><br></font></span></div></blockquote><div><br></div></di=
v></div></div><div dir=3D"ltr"><div class=3D"gmail_extra"><div class=3D"gma=
il_quote"><div>Anything to get this thing put to bed!<br><br></div><div>-MS=
K <br></div></div><br></div></div>
______________________________<u></u>_________________<br>
dmarc mailing list<br>
<a href=3D"mailto:dmarc@ietf.org" target=3D"_blank">dmarc@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/dmarc" target=3D"_blank">h=
ttps://www.ietf.org/mailman/<u></u>listinfo/dmarc</a><br>
</blockquote></div>

--e89a8f83941f49ba5c050b915d85--

