
From nobody Wed Apr  1 00:06:56 2020
Return-Path: <noreply@ietf.org>
X-Original-To: dmarc@ietf.org
Delivered-To: dmarc@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id AA62A3A0E55; Wed,  1 Apr 2020 00:06:54 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
From: Qin Wu via Datatracker <noreply@ietf.org>
To: <ops-dir@ietf.org>
Cc: draft-ietf-dmarc-psd.all@ietf.org, last-call@ietf.org, dmarc@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.123.1
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <158572481464.30894.8037097234628362447@ietfa.amsl.com>
Reply-To: Qin Wu <bill.wu@huawei.com>
Date: Wed, 01 Apr 2020 00:06:54 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/Hh5rdFObLgDEPCYU161icx-RIj4>
Subject: [dmarc-ietf] Opsdir last call review of draft-ietf-dmarc-psd-08
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 01 Apr 2020 07:06:55 -0000

Reviewer: Qin Wu
Review result: Ready

I have reviewed this document as part of the Operational directorate's ongoing
effort to review all IETF documents being processed by the IESG.  These
comments were written with the intent of improving the operational aspects of
the IETF drafts. Comments that are not addressed in last call may be included
in AD reviews during the IESG review.  Document editors and WG chairs should
treat these comments just like any other last call comments.

This document defines DMARC (Domain-based Message Authentication, Reporting,
and Conformance) extension to enable DMARC functionality for Public Suffix
Domains. It allows operators of Public Suffix Domains (PSDs) to express policy
at the level of the PSD that covers all organizational domains that do not
explicitly publish DMARC records.

Major issue:
Not found

Minor issue:
This document provide two registries, one is update of DMARC Tag Registry with
one new element, requested from IANA, the other is DMARC PSD registry
maintained by [psddmarc.org] and following IANA registry style, I see one is
standard registry, the other is non-standard registry, it is not clear to me
non-standard registry should be discussed in this document, which introduce
confusion, if we keep both, I am wondering why section 6 still requests to add
an element to standard registry, which functionality we add is experimental,
which functionality is not.

Second related question, this draft updates informational RFC7489 with
additional components and rules, should the front page of this Experimental RFC
reflect this or not? Nits: Section 1 Somewhere subdommains is used, somewhere
sub-dommains is used, please be consistent. Section 3.5 said: "Specifically,
this is
   not a mechanism to provide feedback addresses (RUA/RUF) when an
   Organizational Domain has declined to do so.
"
Should a reference be added to RUA/RUF, RUA/RUF needs to be expanded or add
abbreviation section in the terminology section.

Section 3.2
 OLD TEXT:
"
If the 'np' tag is absent, the policy specified by the "sp" tag (if the 'sp'
tag is present) or the policy specified by the "p" tag, if the 'sp' tag is not
present, MUST be applied for non-existent subdomains. " NEW TEXT: " If the 'np'
tag is absent, the policy specified by the "sp" tag (if the 'sp' tag is
present) or the policy specified by the "p" tag( if the 'sp' tag is not present
and ‘p’tag is present), MUST be applied for non-existent subdomains. " Section
3.2 Change section 3.2 title from "3.2.  Section 6.3 General Record Format" To
3.2.  Changes in Section 6.3 "General Record Format" Similar changes can be
applicable to other places.



From nobody Wed Apr  1 09:42:09 2020
Return-Path: <johnl@iecc.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6B1EA3A12D6 for <dmarc@ietfa.amsl.com>; Wed,  1 Apr 2020 09:42:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.85
X-Spam-Level: 
X-Spam-Status: No, score=-1.85 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.25, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1536-bit key) header.d=iecc.com header.b=tjjXmFo7; dkim=pass (1536-bit key) header.d=taugh.com header.b=WANqMwZT
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vkZEZnjZcPaC for <dmarc@ietfa.amsl.com>; Wed,  1 Apr 2020 09:42:05 -0700 (PDT)
Received: from gal.iecc.com (gal.iecc.com [IPv6:2001:470:1f07:1126:0:43:6f73:7461]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CB4F23A12D3 for <dmarc@ietf.org>; Wed,  1 Apr 2020 09:42:04 -0700 (PDT)
Received: (qmail 8459 invoked from network); 1 Apr 2020 16:42:03 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=iecc.com; h=date:message-id:from:to:cc:subject:in-reply-to:mime-version:content-type:content-transfer-encoding; s=2109.5e84c45b.k2004; bh=7ETEO2mJedKmKTHwyrVlsi2CSUtvp9xABuObiJ0t5rI=; b=tjjXmFo7wxDnw3aIMQ6M4heovCz01G0yEKqcxBcGZWUevxxP9QilpUlZk80ItR+QE27nyh2Hgarm1ZiWeZa5srNUzAoECnLXSFOyKQMzykSgmpey4+ggvACdfDqd37rd+oALnRIsmfdZeexWO2q7FSGQIKKl/7LMTQZmNiIudcPCctU/Zm7BmqI+V/bJG+ph17iN11zV82cxHrlTjEPNDeCLmfIQbd+zOOcyTK9No3N8V6KPocSQTNn5bM2rOpdi
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=taugh.com; h=date:message-id:from:to:cc:subject:in-reply-to:mime-version:content-type:content-transfer-encoding; s=2109.5e84c45b.k2004; bh=7ETEO2mJedKmKTHwyrVlsi2CSUtvp9xABuObiJ0t5rI=; b=WANqMwZTaum5nx4OLM1u2aSoUqS6EPfqG+E5da3dHeV4tBVMAXY1xziYbtFS723uwOTq8zKI8LrLlVsoABg5UyRAB5rEj2NLSWn6VQhHg/5ei2AWzupMpQpQBJW8fDgTh8Th4XuBnt9kEuEVfx059gh6RGSh/zzR6yw3/7AkKsJaJkkvBNZDSIA82gsBgBeP3mZ7/Jy3i9q+wCCgzAGmG30yCVGm5EosoFa7DU70fFlL+ykFg4EdcxlG4ekcU2ho
Received: from ary.qy ([IPv6:2001:470:1f07:1126::78:696d:6170]) by imap.iecc.com ([IPv6:2001:470:1f07:1126::78:696d:6170]) with ESMTP via TCP6; 01 Apr 2020 16:42:03 -0000
Received: by ary.qy (Postfix, from userid 501) id 70DDF16DE877; Wed,  1 Apr 2020 12:42:02 -0400 (EDT)
Date: 1 Apr 2020 12:42:02 -0400
Message-Id: <20200401164203.70DDF16DE877@ary.qy>
From: "John Levine" <johnl@taugh.com>
To: dmarc@ietf.org
Cc: rfc@arcsin.de
In-Reply-To: <f35ff802-eed7-0c8a-a1f1-14f764f96760@arcsin.de>
Organization: Taughannock Networks
X-Headerized: yes
Mime-Version: 1.0
Content-type: text/plain; charset=utf-8
Content-transfer-encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/ThFP5d08AjiC_xO_aBiAa70QEZA>
Subject: Re: [dmarc-ietf] Definition of "value" in RFC8601
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 01 Apr 2020 16:42:08 -0000

In article <f35ff802-eed7-0c8a-a1f1-14f764f96760@arcsin.de> you write:
>"If the authserv-id is UTF-8, then it might be UTF-8"

Yes.

>This seems equivalent to
>
>> authserv-id = sub-domain *("." sub-domain)
>>    ; Where sub-domain is imported from 6531 for
>>    ; any mail

No, it's 6531 for EAI messages, and 5321 for ASCII messages.

EAI and ASCII mail are separate mail streams. The component that is
parsing the A-R header had better know ahead of time whether your
system is treating them separately.

Since 6531 is a strict superset of 5321, if your system handles EAI
messages (many still don't) then you can treat them all as EAI, give
or take issues with forwarding messages with A-R headers to non-ASCII
recipients.


From nobody Wed Apr  1 10:53:09 2020
Return-Path: <rfc@arcsin.de>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4BA083A14E8 for <dmarc@ietfa.amsl.com>; Wed,  1 Apr 2020 10:53:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level: 
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=arcsin.de
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xHCKfK546ioR for <dmarc@ietfa.amsl.com>; Wed,  1 Apr 2020 10:53:05 -0700 (PDT)
Received: from sigil.arcsin.de (sigil.arcsin.de [46.38.233.110]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 45BE73A14D7 for <dmarc@ietf.org>; Wed,  1 Apr 2020 10:53:04 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=arcsin.de; h= content-language:content-type:content-type:in-reply-to :mime-version:date:date:message-id:from:from:references:subject :subject:x-amavis-category; s=dkim01; t=1585763580; x= 1587577981; bh=dLwgFu4Gp/5Px83EzDSr6uKTIYnw0brEWUFNHPxqSPs=; b=t zvsjjb6SJqH2zaKoxIzV0P7D3pDWUpbvZPTcP/O8Fu5CIcqmajUns7TedsHNKbks 2dTEg9eAn/t9h8Xw+uFzRXmQe5X7T+xOqzP2wTc51/S+M+dv4tbuxVDi4fMYzJIy iyidlWga+rrO2pF72qSTrsOqx/5q6U90EL8x+LWikM=
X-Amavis-Category: sigil.arcsin.de; category=CleanTag
To: dmarc@ietf.org
References: <20200401164203.70DDF16DE877@ary.qy>
From: Damian Lukowski <rfc@arcsin.de>
Message-ID: <d57068dc-e966-e5c4-ba52-d9528fbb22c5@arcsin.de>
Date: Wed, 1 Apr 2020 19:52:34 +0200
MIME-Version: 1.0
In-Reply-To: <20200401164203.70DDF16DE877@ary.qy>
Content-Type: multipart/alternative; boundary="------------CA006EAA50D62346AA070F94"
Content-Language: en-US
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/iiJgJEWrWeC68vBp_x_J3yKz1rA>
Subject: Re: [dmarc-ietf] Definition of "value" in RFC8601
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 01 Apr 2020 17:53:08 -0000

This is a multi-part message in MIME format.
--------------CA006EAA50D62346AA070F94
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 7bit


>> This seems equivalent to
>>> authserv-id = sub-domain *("." sub-domain)
>>>    ; Where sub-domain is imported from 6531 for
>>>    ; any mail
> No, it's 6531 for EAI messages, and 5321 for ASCII messages.

If they are not equivalent, there must be a counterexample in which a
parser with

> authserv-id = sub-domain *("." sub-domain)
>    ; Where sub-domain is imported from 6531 for
>    ; any mail
and another parser with

> authserv-id = sub-domain *("." sub-domain)
>    ; Where sub-domain is imported from 5321 for ASCII mail
>    ; and 6531 for EAI mail.

, given identical input, disagree on the validity of the A-R header of
that input. Can you please show an example?

> EAI and ASCII mail are separate mail streams. The component that is
> parsing the A-R header had better know ahead of time whether your
> system is treating them separately.

Can you elaborate on this paragraph? Know what ahead of time? It sounds
like you agree, that the validity of an A-R header does depend on
external factors, not solely on the A-R content.


--------------CA006EAA50D62346AA070F94
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
  </head>
  <body>
    <div class="moz-cite-prefix"><br>
    </div>
    <blockquote type="cite"
      cite="mid:20200401164203.70DDF16DE877@ary.qy">
      <blockquote type="cite" style="color: #000000;">
        <pre class="moz-quote-pre" wrap="">This seems equivalent to
</pre>
        <blockquote type="cite" style="color: #000000;">
          <pre class="moz-quote-pre" wrap="">authserv-id = sub-domain *("." sub-domain)
   ; Where sub-domain is imported from 6531 for
   ; any mail
</pre>
        </blockquote>
      </blockquote>
      <pre class="moz-quote-pre" wrap="">No, it's 6531 for EAI messages, and 5321 for ASCII messages.
</pre>
    </blockquote>
    <p>If they are not equivalent, there must be a counterexample in
      which a parser with</p>
    <p>
      <blockquote type="cite">
        <pre class="moz-quote-pre" wrap="">authserv-id = sub-domain *("." sub-domain)
   ; Where sub-domain is imported from 6531 for
   ; any mail</pre>
      </blockquote>
      and another parser with</p>
    <p>
      <blockquote type="cite">
        <pre class="moz-quote-pre" wrap="">authserv-id = sub-domain *("." sub-domain)
   ; Where sub-domain is imported from 5321 for ASCII mail
   ; and 6531 for EAI mail.
</pre>
      </blockquote>
    </p>
    <p>, given identical input, disagree on the validity of the A-R
      header of that input. Can you please show an example?<br>
    </p>
    <blockquote type="cite"
      cite="mid:20200401164203.70DDF16DE877@ary.qy">
      <pre class="moz-quote-pre" wrap="">EAI and ASCII mail are separate mail streams. The component that is
parsing the A-R header had better know ahead of time whether your
system is treating them separately.</pre>
    </blockquote>
    <p>Can you elaborate on this paragraph? Know what ahead of time? It
      sounds like you agree, that the validity of an A-R header does
      depend on external factors, not solely on the A-R content.<br>
    </p>
  </body>
</html>

--------------CA006EAA50D62346AA070F94--


From nobody Wed Apr  1 13:29:32 2020
Return-Path: <johnl@iecc.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BF25B3A07D6 for <dmarc@ietfa.amsl.com>; Wed,  1 Apr 2020 13:29:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.85
X-Spam-Level: 
X-Spam-Status: No, score=-1.85 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.25, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1536-bit key) header.d=iecc.com header.b=DA090oIH; dkim=pass (1536-bit key) header.d=taugh.com header.b=y19rbHIX
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Q7P4BhgNqQ9R for <dmarc@ietfa.amsl.com>; Wed,  1 Apr 2020 13:29:26 -0700 (PDT)
Received: from gal.iecc.com (gal.iecc.com [IPv6:2001:470:1f07:1126:0:43:6f73:7461]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C83513A07C2 for <dmarc@ietf.org>; Wed,  1 Apr 2020 13:29:25 -0700 (PDT)
Received: (qmail 58987 invoked from network); 1 Apr 2020 20:29:23 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=iecc.com; h=date:message-id:from:to:cc:subject:in-reply-to:mime-version:content-type:content-transfer-encoding; s=e669.5e84f9a3.k2004; bh=fnsnws3QpoJzZcF1thyCq++IS9awiquRj2a/Cw+W7as=; b=DA090oIHPXqdf5Cmvv2v3ge0QOh+GenqXFlr+iNWrNQ4f3Ot8M68mdqvnluE8flnRiS+EedmcX3d8YkrG3wVdwgF7+/QH6ijsVISxWIRyb+dYvRfwzr19e1VUnWVj2SPzxsjzTYnrAWo7hUUec5btmj3tMDN9KTQRbBjletG/g6IAkcNzgzhdlJxBlLfzHsXQS9wB458MAzEgMpugZNUx6hxu7Z0IPdwonz8UT6gtb6wXunY3XGn2AxdeGEFlX0r
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=taugh.com; h=date:message-id:from:to:cc:subject:in-reply-to:mime-version:content-type:content-transfer-encoding; s=e669.5e84f9a3.k2004; bh=fnsnws3QpoJzZcF1thyCq++IS9awiquRj2a/Cw+W7as=; b=y19rbHIX/GSib5SgtRyIfNxggGRi8h1vaS8ovp0z+DnrxLvxPnVl7LF6iwm/bD7mUycy8g0okrfyFkuQJD7epqdi3qNlXbmBeb9MhSLYHe3zIwOKNW6BIffir/gGWMjg+qZ17v7nhexkneMlIYP1IVzAEDH7vS3pTtQi7Gj3fsc/ttfYobnYjWkI7DhwLi2D0FYzAOjeK9T/xA7snt82sql3lT83162bhVgQO6dXkBFiiH4g/JaEZcjjFkj/gGdr
Received: from ary.qy ([IPv6:2001:470:1f07:1126::78:696d:6170]) by imap.iecc.com ([IPv6:2001:470:1f07:1126::78:696d:6170]) with ESMTP via TCP6; 01 Apr 2020 20:29:23 -0000
Received: by ary.qy (Postfix, from userid 501) id 5828B16E2E06; Wed,  1 Apr 2020 16:29:22 -0400 (EDT)
Date: 1 Apr 2020 16:29:22 -0400
Message-Id: <20200401202923.5828B16E2E06@ary.qy>
From: "John Levine" <johnl@taugh.com>
To: dmarc@ietf.org
Cc: rfc@arcsin.de
In-Reply-To: <d57068dc-e966-e5c4-ba52-d9528fbb22c5@arcsin.de>
Organization: Taughannock Networks
X-Headerized: yes
Mime-Version: 1.0
Content-type: text/plain; charset=utf-8
Content-transfer-encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/01ne7K-tzmOYYPc2Cc-JLo0hE04>
Subject: Re: [dmarc-ietf] Definition of "value" in RFC8601
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 01 Apr 2020 20:29:31 -0000

In article <d57068dc-e966-e5c4-ba52-d9528fbb22c5@arcsin.de> you write:
>> authserv-id = sub-domain *("." sub-domain)
>>    ; Where sub-domain is imported from 5321 for ASCII mail
>>    ; and 6531 for EAI mail.
>
>, given identical input, disagree on the validity of the A-R header of
>that input. Can you please show an example?

It's the one you found.  If the authserv-id has a non-ASCII UTF-8 character,
it's invalid under 5321 and valid under 6531.

>> EAI and ASCII mail are separate mail streams. The component that is
>> parsing the A-R header had better know ahead of time whether your
>> system is treating them separately.
>
>Can you elaborate on this paragraph? Know what ahead of time? It sounds
>like you agree, that the validity of an A-R header does depend on
>external factors, not solely on the A-R content.

Right.  ASCII mail and EAI mail are handled as separate streams, even if
they share a mail server.  See this old blog post of mine:

https://jl.ly/Email/i18n3.html

R's,
John


From nobody Wed Apr  1 13:44:02 2020
Return-Path: <rfc@arcsin.de>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 98E993A0862 for <dmarc@ietfa.amsl.com>; Wed,  1 Apr 2020 13:44:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level: 
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=arcsin.de
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pERfKB43wbKc for <dmarc@ietfa.amsl.com>; Wed,  1 Apr 2020 13:43:58 -0700 (PDT)
Received: from scalar.arcsin.de (scalar.arcsin.de [185.162.250.16]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AA01C3A0805 for <dmarc@ietf.org>; Wed,  1 Apr 2020 13:43:57 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=arcsin.de; h= content-transfer-encoding:content-language:content-type :content-type:in-reply-to:mime-version:date:date:message-id:from :from:references:subject:subject:x-amavis-category; s=dkim01; t= 1585773831; x=1587588232; bh=5EgSFrym1mG9wkMgUXhPMa68yO6qwM1almF lc/jCYdY=; b=NUc/ohxjyGusBlg8vXELIUAsfivpzLfmVNaEuqqGj8raFDvb0zA nPrWxAUQ8umsBnIVizYIYvNUDMou0euAjfsue2Np9exXEh/RilWwWVIfr/SyoxQX 95Er93k4djp0lpR33Ns0c2+fowD7rEEmxd+b/JvIBdJwepw3etWMUzTQ=
X-Amavis-Category: scalar.arcsin.de; category=CleanTag
To: dmarc@ietf.org
References: <20200401202923.5828B16E2E06@ary.qy>
From: Damian Lukowski <rfc@arcsin.de>
Message-ID: <5c650beb-f0b7-5cae-3070-b7005dec9dbe@arcsin.de>
Date: Wed, 1 Apr 2020 22:44:32 +0200
MIME-Version: 1.0
In-Reply-To: <20200401202923.5828B16E2E06@ary.qy>
Content-Type: text/plain; charset=utf-8
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/lQwqHZFU5HtQsooVNwGUFNFchNo>
Subject: Re: [dmarc-ietf] Definition of "value" in RFC8601
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 01 Apr 2020 20:44:01 -0000

> It's the one you found.  If the authserv-id has a non-ASCII UTF-8 character,
> it's invalid under 5321 and valid under 6531.

I thought we established that as soon as the authserv-id has non-ASCII
UTF-8 characters, the mail is automatically - by definition - a 6531 mail:

> As a close approximation, any message which has an x80 bit set in a
> character in the header is an EAI message.



> Right.  ASCII mail and EAI mail are handled as separate streams, even if
> they share a mail server.  See this old blog post of mine:

I'll look into it.


From nobody Wed Apr  1 14:05:54 2020
Return-Path: <johnl@iecc.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2353E3A0900 for <dmarc@ietfa.amsl.com>; Wed,  1 Apr 2020 14:05:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.849
X-Spam-Level: 
X-Spam-Status: No, score=-1.849 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.25, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1536-bit key) header.d=iecc.com header.b=pmELtJ9K; dkim=pass (1536-bit key) header.d=taugh.com header.b=HKPhoEs8
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PtIS4aKdM1JF for <dmarc@ietfa.amsl.com>; Wed,  1 Apr 2020 14:05:51 -0700 (PDT)
Received: from gal.iecc.com (gal.iecc.com [IPv6:2001:470:1f07:1126:0:43:6f73:7461]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6D7003A08FD for <dmarc@ietf.org>; Wed,  1 Apr 2020 14:05:51 -0700 (PDT)
Received: (qmail 65062 invoked from network); 1 Apr 2020 21:05:50 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=iecc.com; h=date:message-id:from:to:cc:subject:in-reply-to:mime-version:content-type:content-transfer-encoding; s=fe24.5e85022e.k2004; bh=c/Tqh5TdUhTr56C4XBOc7kqcOGLSdUPIbPmQ2IrFxp4=; b=pmELtJ9KQYb9JWm/majCjzPHTrDRqP+M+X3f/Tb7hmuv/3A+mfOHqZsjQ5xVOQLoOK1EDwQWos9grlj5auJ3urZoGuikkfFMRen0q/GO2XyCXwSpiSupC1BKjsmYBqiJBv87/f8YZrbmv/b6b8lXFbxazllR/S8LGYaRMBkMtKWC1+jNqwQGISQ9DH+bgBk196J0LYBrHDUG7J+OPzuk4SUAIKOnkpspvYHwJm7t7yK0xewmswuLImzN1dXwilAt
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=taugh.com; h=date:message-id:from:to:cc:subject:in-reply-to:mime-version:content-type:content-transfer-encoding; s=fe24.5e85022e.k2004; bh=c/Tqh5TdUhTr56C4XBOc7kqcOGLSdUPIbPmQ2IrFxp4=; b=HKPhoEs8RVMBIjlLr19LSPSWA1Pb7AjYTnvjhsxElLcKiVEvb36JuYb1sfgNcxJ9ijxFloV9pzxsU+S6EWORk8qY2Te6ni9pAaUHUODmLo8o4do6sbclOfoPb2qTV6oRn61SIYA6Kq5r7EQQw4kx8RmeYEHBdeHdw0oUn3LdNuYQm97whJ6S5IbZoo1JM8OcO8nkqYruvue1jelmgwPagdFt22mMlEvKXCgQiAlX97fTKKm4kL041r2jPEsYK2j4
Received: from ary.qy ([IPv6:2001:470:1f07:1126::78:696d:6170]) by imap.iecc.com ([IPv6:2001:470:1f07:1126::78:696d:6170]) with ESMTP via TCP6; 01 Apr 2020 21:05:49 -0000
Received: by ary.qy (Postfix, from userid 501) id AFA6C16E323F; Wed,  1 Apr 2020 17:05:49 -0400 (EDT)
Date: 1 Apr 2020 17:05:49 -0400
Message-Id: <20200401210549.AFA6C16E323F@ary.qy>
From: "John Levine" <johnl@taugh.com>
To: dmarc@ietf.org
Cc: rfc@arcsin.de
In-Reply-To: <5c650beb-f0b7-5cae-3070-b7005dec9dbe@arcsin.de>
Organization: Taughannock Networks
X-Headerized: yes
Mime-Version: 1.0
Content-type: text/plain; charset=utf-8
Content-transfer-encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/i7fVYOqptJ_AlCpSlD4I5n2g0v4>
Subject: Re: [dmarc-ietf] Definition of "value" in RFC8601
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 01 Apr 2020 21:05:53 -0000

In article <5c650beb-f0b7-5cae-3070-b7005dec9dbe@arcsin.de> you write:
>> It's the one you found.  If the authserv-id has a non-ASCII UTF-8 character,
>> it's invalid under 5321 and valid under 6531.
>
>I thought we established that as soon as the authserv-id has non-ASCII
>UTF-8 characters, the mail is automatically - by definition - a 6531 mail:

Sorry if it seemed like I said that.  It's either a potentially valid
EAI message or a definitely invalid ASCII message.  If your system
doesn't handle EAI mail, it's invalid.  If there are bytes with the
high bit set but they're not a UTF-8 sequence, or they're not a UTF-8
character allowed in an authserv-id it's invalid even if you handle
EAI.

R's,
John


From nobody Wed Apr  1 14:25:55 2020
Return-Path: <rfc@arcsin.de>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EF6353A0A15 for <dmarc@ietfa.amsl.com>; Wed,  1 Apr 2020 14:25:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level: 
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=arcsin.de
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6yMCoDvq7Q9h for <dmarc@ietfa.amsl.com>; Wed,  1 Apr 2020 14:25:52 -0700 (PDT)
Received: from scalar.arcsin.de (scalar.arcsin.de [185.162.250.16]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0151E3A0A1C for <dmarc@ietf.org>; Wed,  1 Apr 2020 14:25:51 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=arcsin.de; h= content-transfer-encoding:content-language:content-type :content-type:in-reply-to:mime-version:date:date:message-id:from :from:references:subject:subject:x-amavis-category; s=dkim01; t= 1585776349; x=1587590750; bh=MZYCE8SoHNS0JJ8o5F6Ns8jNJDYeJ9dBUKE fp8EQWC4=; b=f5LzjjUysPDd5tAGC0iLV0USKg53+MLPsqz4yjK4OnB66+HpYzD FcHihzAeHovymgKUqTRbW5Mtb/FSlWz26ofA6inJ2NMPUnISxGQBJD742tjwQCo1 gOn1W+rSFQb4SJxN61Ex0D+F7RPKyUxdje/LFy80mwNs3i5l0nHRCNcE=
X-Amavis-Category: scalar.arcsin.de; category=CleanTag
To: dmarc@ietf.org
References: <20200401210549.AFA6C16E323F@ary.qy>
From: Damian Lukowski <rfc@arcsin.de>
Message-ID: <4013d967-852c-e299-0973-03ba21db5c55@arcsin.de>
Date: Wed, 1 Apr 2020 23:26:30 +0200
MIME-Version: 1.0
In-Reply-To: <20200401210549.AFA6C16E323F@ary.qy>
Content-Type: text/plain; charset=utf-8
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/rEFUGu5dEoIC6waZaGylqSlf03A>
Subject: Re: [dmarc-ietf] Definition of "value" in RFC8601
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 01 Apr 2020 21:25:54 -0000

>>> It's the one you found.  If the authserv-id has a non-ASCII UTF-8 character,
>>> it's invalid under 5321 and valid under 6531.
>>
>> I thought we established that as soon as the authserv-id has non-ASCII
>> UTF-8 characters, the mail is automatically - by definition - a 6531 mail:
> 
> Sorry if it seemed like I said that.  It's either a potentially valid
> EAI message or a definitely invalid ASCII message.  If your system
> doesn't handle EAI mail, it's invalid.

Ok, that is definitely an external factor, isn't it? The information, if
the system which processed the email, handles EAI, is not contained
within the A-R header. Is the information even available in the DATA
portion of an SMTP transaction? Can one look inside an .eml file and
decide if that email has been processed by an EAI capable system?

> If there are bytes with the
> high bit set but they're not a UTF-8 sequence, or they're not a UTF-8
> character allowed in an authserv-id it's invalid even if you handle
> EAI.

That part is fine, because this is decidable from the A-R header itself.


From nobody Wed Apr  1 16:10:12 2020
Return-Path: <rfc@arcsin.de>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B59BC3A12BD for <dmarc@ietfa.amsl.com>; Wed,  1 Apr 2020 16:10:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level: 
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=arcsin.de
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WTBZoqNq__FK for <dmarc@ietfa.amsl.com>; Wed,  1 Apr 2020 16:10:08 -0700 (PDT)
Received: from scalar.arcsin.de (scalar.arcsin.de [185.162.250.16]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 823973A12B9 for <dmarc@ietf.org>; Wed,  1 Apr 2020 16:10:07 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=arcsin.de; h= content-transfer-encoding:content-language:content-type :content-type:in-reply-to:mime-version:date:date:message-id:from :from:references:subject:subject:x-amavis-category; s=dkim01; t= 1585782605; x=1587597006; bh=W/6GkNH7mgSQCe95jrI7oTkGxLIjO+bwnj4 CICJSfkg=; b=oC8HfiexY5cA1a9g4pk+4dZg4Ztu4EIGMwKWcp1cUYrCgmhgwaH GGTUYghYHIZlhdgCw3ac8GFGpIiuFAA7RJpMewIU3FZAG+a89Z9b9aNMwxXaPxcP hC7p03OZrnOPgSU/BbhJOx+zHwer8XaWbbc9/p8/FdQ2zbQGSaoQXaNI=
X-Amavis-Category: scalar.arcsin.de; category=CleanTag
To: dmarc@ietf.org
References: <20200401210549.AFA6C16E323F@ary.qy> <4013d967-852c-e299-0973-03ba21db5c55@arcsin.de>
From: Damian Lukowski <rfc@arcsin.de>
Message-ID: <6b4c7533-ebee-796b-e00e-a2bb4075081f@arcsin.de>
Date: Thu, 2 Apr 2020 01:10:46 +0200
MIME-Version: 1.0
In-Reply-To: <4013d967-852c-e299-0973-03ba21db5c55@arcsin.de>
Content-Type: text/plain; charset=utf-8
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/V6wbY-St_GqAXCjZk0jCNAU795Y>
Subject: Re: [dmarc-ietf] Definition of "value" in RFC8601
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 01 Apr 2020 23:10:11 -0000

>>> It's the one you found.  If the authserv-id has a non-ASCII UTF-8 character,
>>> it's invalid under 5321 and valid under 6531.
>> I thought we established that as soon as the authserv-id has non-ASCII
>> UTF-8 characters, the mail is automatically - by definition - a 6531 mail:
> Sorry if it seemed like I said that.  It's either a potentially valid
> EAI message or a definitely invalid ASCII message.  If your system
> doesn't handle EAI mail, it's invalid.

Let's say the system is capable of handling EAI mail. RC6531 sec 3.6:

> An SMTPUTF8-aware SMTP client or server
> that requires accurate knowledge of whether a message is
> internationalized needs to parse all message header fields ...

If I understand the section and your new authserv-id definition
correctly, an EAI capable system can process plain-ASCII messages, such
that with then definition of

> authserv-id = sub-domain *("." sub-domain)
>    ; Where sub-domain is imported from 5321 for ASCII mail
>    ; and 6531 for EAI mail.

, sub-domain comes from RFC5321.

If that is so, then this looks to me like a dependency cycle.

To decide for an authserv-id whether to pull sub-domain from 5321 or
6531, one needs to know if the message is internationalized. But to
obtain that information, one must have parsed all message header fields,
per 6531 sec 3.6, including A-R, that is still waiting to be parsed.


From nobody Wed Apr  1 16:18:00 2020
Return-Path: <johnl@iecc.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EA3283A0C0C for <dmarc@ietfa.amsl.com>; Wed,  1 Apr 2020 16:17:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.849
X-Spam-Level: 
X-Spam-Status: No, score=-1.849 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.25, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1536-bit key) header.d=iecc.com header.b=n7CmbvcT; dkim=pass (1536-bit key) header.d=taugh.com header.b=SfrQadKp
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Cn2ugpc4nbps for <dmarc@ietfa.amsl.com>; Wed,  1 Apr 2020 16:17:56 -0700 (PDT)
Received: from gal.iecc.com (gal.iecc.com [IPv6:2001:470:1f07:1126:0:43:6f73:7461]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C561B3A0C0A for <dmarc@ietf.org>; Wed,  1 Apr 2020 16:17:54 -0700 (PDT)
Received: (qmail 87754 invoked from network); 1 Apr 2020 23:17:53 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=iecc.com; h=date:message-id:from:to:cc:subject:in-reply-to:mime-version:content-type:content-transfer-encoding; s=156c8.5e852121.k2004; bh=p/zPCxlfYo38JB2nyZu/4tkTtTdWdvZ1yfTr+iz4gmk=; b=n7CmbvcTU4EP//fKd7VXMdFtjBFFp1xFjv8U9qPbjtEU5vGt0tzIwSLeh1pK3Trc2RBtIPfvXmsFbvM9cq1U0hXZFoCa1+3TO8NlouL5VYxU7Lr8HOy3ZD62Mqsj3DD90uuTEBej9I3bU0vqnQ2tyPO+o05tLeRSoCQJgYVPcEzXmZCFL6H+OatjpUIzJ2mfkCIxQJ9xSETRXRpLjp2tcpnQY6Hg197blC0ZQbeuf7k94RKpqcHMyum2jrOxtADG
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=taugh.com; h=date:message-id:from:to:cc:subject:in-reply-to:mime-version:content-type:content-transfer-encoding; s=156c8.5e852121.k2004; bh=p/zPCxlfYo38JB2nyZu/4tkTtTdWdvZ1yfTr+iz4gmk=; b=SfrQadKplfjllfyhYid0jVYF5voMiLnk6lHGZDaq2uC5P5Wl+iaqfOhjPy/KVGk02LR2OdxNa/MiarG9a5qe5rsfKYjHuoQzHKaqu8ZRcIeYRugjndq5PQ8w8/k5HwW8GsuR+y1MDztAU2VR1rBKPHl3pXiUfJCFDLpOFuSrZU8rDUM9N+T7WBcHt1xK8+Zyn4wJTqNgc4qqnvE5S9ZrHnGza/BeOfXso4yWO9yzDDTK4k2KoVvckM/7Caczkw0k
Received: from ary.qy ([IPv6:2001:470:1f07:1126::78:696d:6170]) by imap.iecc.com ([IPv6:2001:470:1f07:1126::78:696d:6170]) with ESMTP via TCP6; 01 Apr 2020 23:17:52 -0000
Received: by ary.qy (Postfix, from userid 501) id D56F316E3E38; Wed,  1 Apr 2020 19:17:52 -0400 (EDT)
Date: 1 Apr 2020 19:17:52 -0400
Message-Id: <20200401231752.D56F316E3E38@ary.qy>
From: "John Levine" <johnl@taugh.com>
To: dmarc@ietf.org
Cc: rfc@arcsin.de
In-Reply-To: <4013d967-852c-e299-0973-03ba21db5c55@arcsin.de>
Organization: Taughannock Networks
X-Headerized: yes
Mime-Version: 1.0
Content-type: text/plain; charset=utf-8
Content-transfer-encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/wL9PdxdKekHt9FbiPKblQfXzycM>
Subject: Re: [dmarc-ietf] Definition of "value" in RFC8601
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 01 Apr 2020 23:17:58 -0000

In article <4013d967-852c-e299-0973-03ba21db5c55@arcsin.de> you write:
>Ok, that is definitely an external factor, isn't it? The information, if
>the system which processed the email, handles EAI, is not contained
>within the A-R header. Is the information even available in the DATA
>portion of an SMTP transaction? Can one look inside an .eml file and
>decide if that email has been processed by an EAI capable system?

Maybe.  The EAI flag is sent on the MAIL TO command.  See RFC 6531,
sec 3.4.  If the recipient system adds the usual Received: header, it
should include a "WITH UTF8SMTP" or "WITH UTF8SMTPS" clause.

I have no idea what's in a .eml file, since the only spec I've seen for 
it is whatever some version of Outlook does.

R's,
John


From nobody Wed Apr  1 17:32:16 2020
Return-Path: <johnl@iecc.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8A36B3A15DD for <dmarc@ietfa.amsl.com>; Wed,  1 Apr 2020 17:32:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.849
X-Spam-Level: 
X-Spam-Status: No, score=-1.849 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.25, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1536-bit key) header.d=iecc.com header.b=HV0hSfxc; dkim=pass (1536-bit key) header.d=taugh.com header.b=po+hDJdp
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GHzyGk4PK2Hh for <dmarc@ietfa.amsl.com>; Wed,  1 Apr 2020 17:32:13 -0700 (PDT)
Received: from gal.iecc.com (gal.iecc.com [IPv6:2001:470:1f07:1126:0:43:6f73:7461]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CF7CD3A15DA for <dmarc@ietf.org>; Wed,  1 Apr 2020 17:32:12 -0700 (PDT)
Received: (qmail 99231 invoked from network); 2 Apr 2020 00:32:11 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=iecc.com; h=date:message-id:from:to:cc:subject:in-reply-to:mime-version:content-type:content-transfer-encoding; s=1839d.5e85328b.k2004; bh=R5AdRUg/Hpk189kNnwWz4Nsa8Ui96M3HkHlrOJkkrA0=; b=HV0hSfxcTsKiLSJFxRb2Ekpz8BaEYOKXUq+SvFWZAPK36XbK+O9FDZr6RCM/7KnX8T6eRfV1SucqISmgtZehsnCgxKMWwX+gPONamAR7lBywW2Dk3FOHwYR4Xs2nYMN+pTMdvCT99GbS+Tygl+0Ktqx6aOsk5oe8b0JaP4Y9NcgvN9k0lASam3c35B/QhGoCciDTYOCtiqezfCPdV+fH1piAXF4z51KzbUXAIfgJ3eqLeDvF2EhHDLUTTM5alC3a
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=taugh.com; h=date:message-id:from:to:cc:subject:in-reply-to:mime-version:content-type:content-transfer-encoding; s=1839d.5e85328b.k2004; bh=R5AdRUg/Hpk189kNnwWz4Nsa8Ui96M3HkHlrOJkkrA0=; b=po+hDJdpFQ4A3QWsl8cghzN+OkRKhLCwS4xG7KgXPNpYoSAuxRc0fq7xCKXT3GZNXJ+Am5s/Y0Tum0FVzziK/kZLP4FtOhAgzfQoNpqzMFoNQ4rlMmxBVLWayz4n6yO5xjGOVa+2y9dcrEGzOEC4prbagURHBZtEqCFd/fSSpv+zWnfweDXXTJ0rVhSAiIv+eriFmG6hmPlbqjbdoQKTpa4iBFHsOVzqghi+CuFEyycc2+FGSZnADoM1oz3rLMQB
Received: from ary.qy ([IPv6:2001:470:1f07:1126::78:696d:6170]) by imap.iecc.com ([IPv6:2001:470:1f07:1126::78:696d:6170]) with ESMTP via TCP6; 02 Apr 2020 00:32:11 -0000
Received: by ary.qy (Postfix, from userid 501) id 0B8AA16E4B5A; Wed,  1 Apr 2020 20:32:10 -0400 (EDT)
Date: 1 Apr 2020 20:32:10 -0400
Message-Id: <20200402003211.0B8AA16E4B5A@ary.qy>
From: "John Levine" <johnl@taugh.com>
To: dmarc@ietf.org
Cc: rfc@arcsin.de
In-Reply-To: <6b4c7533-ebee-796b-e00e-a2bb4075081f@arcsin.de>
Organization: Taughannock Networks
X-Headerized: yes
Mime-Version: 1.0
Content-type: text/plain; charset=utf-8
Content-transfer-encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/f_5vXBYvn8yqJ0ucELEpkR9C614>
Subject: Re: [dmarc-ietf] Definition of "value" in RFC8601
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 02 Apr 2020 00:32:15 -0000

In article <6b4c7533-ebee-796b-e00e-a2bb4075081f@arcsin.de> you write:
>To decide for an authserv-id whether to pull sub-domain from 5321 or
>6531, one needs to know if the message is internationalized. But to
>obtain that information, one must have parsed all message header fields,
>per 6531 sec 3.6, including A-R, that is still waiting to be parsed.

In systems that keep ASCII and EAI mail separate, that info will be in
the metadata, whether it arrived in an SMTP session with the SMTPUTF8
option.





From nobody Wed Apr  1 18:05:13 2020
Return-Path: <superuser@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4C08B3A07BC; Wed,  1 Apr 2020 18:05:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level: 
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4HJh65QJfIEW; Wed,  1 Apr 2020 18:05:09 -0700 (PDT)
Received: from mail-vs1-xe31.google.com (mail-vs1-xe31.google.com [IPv6:2607:f8b0:4864:20::e31]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7E4083A07B6; Wed,  1 Apr 2020 18:05:09 -0700 (PDT)
Received: by mail-vs1-xe31.google.com with SMTP id x206so1245628vsx.5; Wed, 01 Apr 2020 18:05:09 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=8XvWPwmbBKQT+oI985760Xhqv/Ws+iddhNeBt/lriTQ=; b=LuE5Y7MzjuEGEBlrXbMSakYR891aP3zzYlcBWFl33wc2GjyFMD2LBd89BosUzLyH+0 2vwuHq3lxN2HmPWYAEEt6O++QNljMGx/pqQ8ouydo4CP0UNl1u1ukzl+3zg6blUcK0Ss eTck99TkhI7lrcq49cbBxl2VZ57rBMSDeowD2n1cyH29msFl2zTS8QxPQdLxDrYdbOpK wvlJanx7WXHIq8/pqKQCNo/wK73xidzbG5S3HvqH2JKjsy+0/AWcnErE9+FIQ/4UXzZI 2h2f2MnJONAGiMuJIjJ0VwUyBlPrGEb//dZknrNejxE5aN7IU2Ckt+r2XHfYaYEfnhhB Ws2Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=8XvWPwmbBKQT+oI985760Xhqv/Ws+iddhNeBt/lriTQ=; b=mig42+AlwM0wufmgP4rSLM/Fa2UGTNUx+dz013684G2xGvXrwX8taoaMd4TBSrxw2A bZsgBLfhFu4qSvUWupfKy2GA2QDrV8LdDnnkSEkAPQfrbG4UWVfA7E5fY+V+qkX0Urr+ /CWlyDkvH8D9rvXB2GQNDW7jUGZuovIIpj0vzdX2apBT92WGB73WJBcP9mfqT6ilkM4/ Y3dLTxcdgomiuFI8p5l5BKYaJvISnB8d9PQ3xBEeXtmB2SZOjNL09jJadbwmPkMSrez1 oGWCufvZaO9qy5SdmyY5Rki3lbRGo6K6L+1h4jbC9jgjC1dmWGySEmI9Xi/Vu6X7YVL5 vPDg==
X-Gm-Message-State: AGi0PuZ/xLF35LekBpE7NKTg4oZQYC9ru2sAnNCMx/pzZv3EGBQsy13o XWjOZawsqmNxaCkW6iNDk1j/RPd20KGzAiYjXqE=
X-Google-Smtp-Source: APiQypLWPT9qWkhbcAHdSwRMFBrE3/S6h46YxVsQJg0THFxDE6Dd+2I5rPMWkhRklIgct9+HQToMAyBELPUwqGWPcAk=
X-Received: by 2002:a67:f4d5:: with SMTP id s21mr480427vsn.8.1585789508261; Wed, 01 Apr 2020 18:05:08 -0700 (PDT)
MIME-Version: 1.0
References: <158572481464.30894.8037097234628362447@ietfa.amsl.com>
In-Reply-To: <158572481464.30894.8037097234628362447@ietfa.amsl.com>
From: "Murray S. Kucherawy" <superuser@gmail.com>
Date: Wed, 1 Apr 2020 18:04:57 -0700
Message-ID: <CAL0qLwbU9U7m=+DYMu8Zbe9iviAWDPdJq0dCoaRGzKxHF+ANJA@mail.gmail.com>
To: Qin Wu <bill.wu@huawei.com>
Cc: ops-dir@ietf.org, draft-ietf-dmarc-psd.all@ietf.org, last-call@ietf.org,  IETF DMARC WG <dmarc@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000541bc505a2446433"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/HOYRmVaPXfJmxeItQwu4YuwXy4U>
Subject: Re: [dmarc-ietf] Opsdir last call review of draft-ietf-dmarc-psd-08
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 02 Apr 2020 01:05:12 -0000

--000000000000541bc505a2446433
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

On the process questions raised:

On Wed, Apr 1, 2020 at 12:06 AM Qin Wu via Datatracker <noreply@ietf.org>
wrote:

> Minor issue:
> This document provide two registries, one is update of DMARC Tag Registry
> with
> one new element, requested from IANA, the other is DMARC PSD registry
> maintained by [psddmarc.org] and following IANA registry style, I see one
> is
> standard registry, the other is non-standard registry, it is not clear to
> me
> non-standard registry should be discussed in this document, which introdu=
ce
> confusion, if we keep both, I am wondering why section 6 still requests t=
o
> add
> an element to standard registry, which functionality we add is
> experimental,
> which functionality is not.
>

It's helpful here, I think, that the IANA Considerations section includes
the IANA stuff, and an Appendix contains the other stuff.  I don't think
this is particularly confusing; the two are well-separated.

Second related question, this draft updates informational RFC7489 with
> additional components and rules, should the front page of this
> Experimental RFC
> reflect this or not? Nits: Section 1 Somewhere subdommains is used,
> somewhere
> sub-dommains is used, please be consistent. Section 3.5 said:
> "Specifically,
> this is
>    not a mechanism to provide feedback addresses (RUA/RUF) when an
>    Organizational Domain has declined to do so.
> "
> Should a reference be added to RUA/RUF, RUA/RUF needs to be expanded or a=
dd
> abbreviation section in the terminology section.
>

This is an experiment to see if RFC7489 should be augmented, i.e., is the
experiment described here useful to DMARC?  If it turns out it is not, then
saying this updated the base specification wouldn't be such a good thing.
If it turns out that it is, then the DMARCbis work (which is about to start
up) will incorporate the experiment such that it becomes permanent.

Section 3.2
>  OLD TEXT:
> "
> If the 'np' tag is absent, the policy specified by the "sp" tag (if the
> 'sp'
> tag is present) or the policy specified by the "p" tag, if the 'sp' tag i=
s
> not
> present, MUST be applied for non-existent subdomains. " NEW TEXT: " If th=
e
> 'np'
> tag is absent, the policy specified by the "sp" tag (if the 'sp' tag is
> present) or the policy specified by the "p" tag( if the 'sp' tag is not
> present
> and =E2=80=98p=E2=80=99tag is present), MUST be applied for non-existent =
subdomains. "
> Section
> 3.2 Change section 3.2 title from "3.2.  Section 6.3 General Record
> Format" To
> 3.2.  Changes in Section 6.3 "General Record Format" Similar changes can =
be
> applicable to other places.
>

I'll leave this bit to the authors and co-chairs to resolve.

-MSK

--000000000000541bc505a2446433
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>On the process questions raised:<br></div><br><div cl=
ass=3D"gmail_quote"><div dir=3D"ltr" class=3D"gmail_attr">On Wed, Apr 1, 20=
20 at 12:06 AM Qin Wu via Datatracker &lt;<a href=3D"mailto:noreply@ietf.or=
g">noreply@ietf.org</a>&gt; wrote:<br></div><blockquote class=3D"gmail_quot=
e" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204)=
;padding-left:1ex">Minor issue:<br>
This document provide two registries, one is update of DMARC Tag Registry w=
ith<br>
one new element, requested from IANA, the other is DMARC PSD registry<br>
maintained by [<a href=3D"http://psddmarc.org" rel=3D"noreferrer" target=3D=
"_blank">psddmarc.org</a>] and following IANA registry style, I see one is<=
br>
standard registry, the other is non-standard registry, it is not clear to m=
e<br>
non-standard registry should be discussed in this document, which introduce=
<br>
confusion, if we keep both, I am wondering why section 6 still requests to =
add<br>
an element to standard registry, which functionality we add is experimental=
,<br>
which functionality is not.<br></blockquote><div><br></div><div>It&#39;s he=
lpful here, I think, that the IANA Considerations section includes the IANA=
 stuff, and an Appendix contains the other stuff.=C2=A0 I don&#39;t think t=
his is particularly confusing; the two are well-separated.</div><div> <br><=
/div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;bo=
rder-left:1px solid rgb(204,204,204);padding-left:1ex">
Second related question, this draft updates informational RFC7489 with<br>
additional components and rules, should the front page of this Experimental=
 RFC<br>
reflect this or not? Nits: Section 1 Somewhere subdommains is used, somewhe=
re<br>
sub-dommains is used, please be consistent. Section 3.5 said: &quot;Specifi=
cally,<br>
this is<br>
=C2=A0 =C2=A0not a mechanism to provide feedback addresses (RUA/RUF) when a=
n<br>
=C2=A0 =C2=A0Organizational Domain has declined to do so.<br>
&quot;<br>
Should a reference be added to RUA/RUF, RUA/RUF needs to be expanded or add=
<br>
abbreviation section in the terminology section.<br></blockquote><div><br><=
/div><div>This is an experiment to see if RFC7489 should be augmented, i.e.=
, is the experiment described here useful to DMARC?=C2=A0 If it turns out i=
t is not, then saying this updated the base specification wouldn&#39;t be s=
uch a good thing. If it turns out that it is, then the DMARCbis work (which=
 is about to start up) will incorporate the experiment such that it becomes=
 permanent.<br></div><div> <br></div><blockquote class=3D"gmail_quote" styl=
e=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);paddin=
g-left:1ex">
Section 3.2<br>
=C2=A0OLD TEXT:<br>
&quot;<br>
If the &#39;np&#39; tag is absent, the policy specified by the &quot;sp&quo=
t; tag (if the &#39;sp&#39;<br>
tag is present) or the policy specified by the &quot;p&quot; tag, if the &#=
39;sp&#39; tag is not<br>
present, MUST be applied for non-existent subdomains. &quot; NEW TEXT: &quo=
t; If the &#39;np&#39;<br>
tag is absent, the policy specified by the &quot;sp&quot; tag (if the &#39;=
sp&#39; tag is<br>
present) or the policy specified by the &quot;p&quot; tag( if the &#39;sp&#=
39; tag is not present<br>
and =E2=80=98p=E2=80=99tag is present), MUST be applied for non-existent su=
bdomains. &quot; Section<br>
3.2 Change section 3.2 title from &quot;3.2.=C2=A0 Section 6.3 General Reco=
rd Format&quot; To<br>
3.2.=C2=A0 Changes in Section 6.3 &quot;General Record Format&quot; Similar=
 changes can be<br>
applicable to other places.<br></blockquote><div><br></div><div>I&#39;ll le=
ave this bit to the authors and co-chairs to resolve.</div><div><br></div><=
div>-MSK<br></div></div></div>

--000000000000541bc505a2446433--


From nobody Thu Apr  2 03:21:49 2020
Return-Path: <scott@kitterman.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 298F63A0F4C; Thu,  2 Apr 2020 03:21:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level: 
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=neutral reason="invalid (unsupported algorithm ed25519-sha256)" header.d=kitterman.com header.b=CR07IcwS; dkim=pass (2048-bit key) header.d=kitterman.com header.b=NZ2Jm3Yf
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id G0sSf9xENKoN; Thu,  2 Apr 2020 03:21:45 -0700 (PDT)
Received: from interserver.kitterman.com (interserver.kitterman.com [64.20.48.66]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 45D3C3A0F4A; Thu,  2 Apr 2020 03:21:44 -0700 (PDT)
Received: from interserver.kitterman.com (interserver.kitterman.com [IPv6:2604:a00:6:1039:225:90ff:feaa:b169]) by interserver.kitterman.com (Postfix) with ESMTPS id CCF71F8026C; Thu,  2 Apr 2020 06:21:43 -0400 (EDT)
DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/simple; d=kitterman.com; i=@kitterman.com; q=dns/txt; s=201903e; t=1585822903; h=from : to : cc : subject : date : message-id : in-reply-to : references : mime-version : content-transfer-encoding : content-type : from; bh=elwtJdcI0sj6iWF7A9KynSc0+TEwt2eMSns9FMSoEOM=; b=CR07IcwSbSLB5VEXv2vyooocIFzbBzvV3n80uTrxjeP60UldKrEsskxeOcL/AHPBGJP3+ mhHpz2P2FXeg0KICg==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kitterman.com; i=@kitterman.com; q=dns/txt; s=201903r; t=1585822903; h=from : to : cc : subject : date : message-id : in-reply-to : references : mime-version : content-transfer-encoding : content-type : from; bh=elwtJdcI0sj6iWF7A9KynSc0+TEwt2eMSns9FMSoEOM=; b=NZ2Jm3YfLx5wO3jXu60/43+VtD0i6GiB5xpHctz2fyndOO81/Md+Wkz0TuFCgLFgulquj pWwUl/mU+fz/YRqOu8aMWn43qhGG+dqbb5jJf7dYXHwCAlVomOastUcNLKGvw/0xYVlEiUe SgcdF9e4zlRxKJ0Rt/8dAUIEeSY3pjiYarESK8cJHHgHQZHoL92AGdpW5f0RjW40bxFYSc7 hbcX6xkZesnxHakrPstFO/bo83Ofp+EQOsur+16pXvPoDAr+MfPEzGTTN33gISNHtJWxBGx FxXFBPheU3/fRE1en37ezRksCVxziit86lsX1RMdWghMO+RZs6RoG6SydtHQ==
Received: from sk-desktop.localnet (static-72-81-252-22.bltmmd.fios.verizon.net [72.81.252.22]) by interserver.kitterman.com (Postfix) with ESMTP id 7909AF800E7; Thu,  2 Apr 2020 06:21:43 -0400 (EDT)
From: Scott Kitterman <scott@kitterman.com>
To: dmarc@ietf.org
Cc: "Murray S. Kucherawy" <superuser@gmail.com>, Qin Wu <bill.wu@huawei.com>,  last-call@ietf.org, ops-dir@ietf.org, draft-ietf-dmarc-psd.all@ietf.org
Date: Thu, 02 Apr 2020 06:20:29 -0400
Message-ID: <2100110.1RVLOuU0sI@sk-desktop>
In-Reply-To: <CAL0qLwbU9U7m=+DYMu8Zbe9iviAWDPdJq0dCoaRGzKxHF+ANJA@mail.gmail.com>
References: <158572481464.30894.8037097234628362447@ietfa.amsl.com> <CAL0qLwbU9U7m=+DYMu8Zbe9iviAWDPdJq0dCoaRGzKxHF+ANJA@mail.gmail.com>
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain; charset="UTF-8"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/t8EUys_0kqabmGKlfCH0Ez913-4>
Subject: Re: [dmarc-ietf] Opsdir last call review of draft-ietf-dmarc-psd-08
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 02 Apr 2020 10:21:47 -0000

On Wednesday, April 1, 2020 9:04:57 PM EDT Murray S. Kucherawy wrote:
> On Wed, Apr 1, 2020 at 12:06 AM Qin Wu via Datatracker <noreply@ietf.org>
> wrote:
=2E..

Since I'm the draft author, I'll weigh in:

> Section 3.2
>=20
> >  OLD TEXT:
> > "
> > If the 'np' tag is absent, the policy specified by the "sp" tag (if the
> > 'sp'
> > tag is present) or the policy specified by the "p" tag, if the 'sp' tag=
 is
> > not
> > present, MUST be applied for non-existent subdomains. " NEW TEXT: " If =
the
> > 'np'
> > tag is absent, the policy specified by the "sp" tag (if the 'sp' tag is
> > present) or the policy specified by the "p" tag( if the 'sp' tag is not
> > present
> > and =E2=80=98p=E2=80=99tag is present), MUST be applied for non-existen=
t subdomains. "

The current text is crafted to define the new tag the same way that the=20
existing tags are defined.  I would prefer not to be novel about 'np'.  I t=
hink=20
this would be better as a working group input for DMARCbis to consider=20
rewording how all the tag definitions are constructed.  In this case I thin=
k=20
consistency is important.

> > Section  3.2
> > Change section 3.2 title from "3.2.  Section 6.3 General Record Format"=
=20
> > To
> > 3.2.  Changes in Section 6.3 "General Record Format"
>>
> > Similar changes can be  applicable to other places.

I have no problem with this proposed change.  I think it improves clarity.
>=20
> I'll leave this bit to the authors and co-chairs to resolve.
>=20
> -MSK

That's my thought.  I'll wait for the co-chairs before taking any actions t=
o=20
update the draft.

Scott K



From nobody Thu Apr  2 08:34:17 2020
Return-Path: <seth@sethblank.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C887C3A15BE for <dmarc@ietfa.amsl.com>; Thu,  2 Apr 2020 08:34:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level: 
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=sethblank-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7SNvcZr5XWCR for <dmarc@ietfa.amsl.com>; Thu,  2 Apr 2020 08:34:13 -0700 (PDT)
Received: from mail-oi1-x230.google.com (mail-oi1-x230.google.com [IPv6:2607:f8b0:4864:20::230]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CE20D3A1765 for <dmarc@ietf.org>; Thu,  2 Apr 2020 08:33:47 -0700 (PDT)
Received: by mail-oi1-x230.google.com with SMTP id w2so3147255oic.5 for <dmarc@ietf.org>; Thu, 02 Apr 2020 08:33:47 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sethblank-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=sej0Zj/72Lx87ZDm8Dr74F5AfrRl/dM+A9vBpYPtPgA=; b=ftRKrHx85JkmaNsMeNM8N7u+/ww/IRhykA7PecIsXf3N7hvSfwCORHU4ILJ5pY3Foh lYmZ4FPCkpMvbjlPMXxgZBL3QAFnJg5EE7bDcsCAQleKxWnOJF8c6CJwL7udLCONNxz1 AhNjpPFPFz9S08MIP/02k5YMW7y0zL75lTdM938vUDqgPAobE9+83GHeXUMdf3SuZdph lLtDgbtQRdVjx/P4Dn7jSRqxVzQIfYPuvupyMQ1Oix5r9Q8jkqIKr7wJxMHf9zlgGsSm G9FlOXDY0suc2w7VOrxE2K7ibaAbn7SfBvpQ+liytLEKHVRCQerbLuyH/3M36mN7U6Jg 4xFw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=sej0Zj/72Lx87ZDm8Dr74F5AfrRl/dM+A9vBpYPtPgA=; b=Y4X2q7cVUQY6eEu1OgBVyrl0NTRZqhLarkIxUxP6J1T+BtRx5EZ9LA6yu2GzE0yI1e Mgs4hgnfzubxQf7wX/iNu7XbLGBzqjiMugFMEiHupy0JHRFL7BW3/DYpSQCwCU/ijNGF IU5K6GNsPgLbE296fexWWlccjueVd1S/MrJsQB+nlKDryIhLvxVuAcrVjLezULl8kzqb ajs7Eh57NtJjUzzi3icB1mxMu50a5qke7gq+uU4yIUx193PLnqYRY2M8Z3V0WPuu/KHY z5SesvbtO1sG07vqVckW/+MtbRT6SfGLNjULGy6Iml71gauF02bwAhOXaNfyuxytI7za iLsA==
X-Gm-Message-State: AGi0PubqngoXKitWgeEt5SM2gh/mp0cPIkFfn2M7fKZd6bPmz0CY2bec 2D/Q3d3lAA6hJcDvxDk1WN9u2rvjOKsSD1B/CtY9LA==
X-Google-Smtp-Source: APiQypL0RaBGOV6TR9HM3DGGNZuZ6YFsvr2ipFjLhfyKo821y9HWx50pe+I6M/Cm/13LSG6bAXbzbciVM+QFwx8sc1k=
X-Received: by 2002:aca:4fc3:: with SMTP id d186mr2501365oib.171.1585841626419;  Thu, 02 Apr 2020 08:33:46 -0700 (PDT)
MIME-Version: 1.0
References: <158572481464.30894.8037097234628362447@ietfa.amsl.com> <CAL0qLwbU9U7m=+DYMu8Zbe9iviAWDPdJq0dCoaRGzKxHF+ANJA@mail.gmail.com> <2100110.1RVLOuU0sI@sk-desktop>
In-Reply-To: <2100110.1RVLOuU0sI@sk-desktop>
From: Seth Blank <seth@sethblank.com>
Date: Thu, 2 Apr 2020 08:33:30 -0700
Message-ID: <CAD2i3WO_bdq6QLp7dyc6MmL_FKVN69BGJ01zAE47ncPULaPGSQ@mail.gmail.com>
To: Scott Kitterman <scott@kitterman.com>, IETF DMARC WG <dmarc@ietf.org>
Cc: "Murray S. Kucherawy" <superuser@gmail.com>, Qin Wu <bill.wu@huawei.com>,  last-call@ietf.org, ops-dir@ietf.org, draft-ietf-dmarc-psd.all@ietf.org
Content-Type: multipart/alternative; boundary="000000000000d1176805a2508637"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/BwAFcdDl9Jd1zQJDhzk7w8zF_Q4>
Subject: Re: [dmarc-ietf] Opsdir last call review of draft-ietf-dmarc-psd-08
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 02 Apr 2020 15:34:15 -0000

--000000000000d1176805a2508637
Content-Type: text/plain; charset="UTF-8"

On Thu, Apr 2, 2020 at 3:21 AM Scott Kitterman <scott@kitterman.com> wrote:

> That's my thought.  I'll wait for the co-chairs before taking any actions
> to
> update the draft.
>

Scott, please prepare a new version of the I-D based upon your comments,
but don't post it until IETF Last Call finishes and all other feedback, if
any, has been folded in.

Seth, as co-Chair

--000000000000d1176805a2508637
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr">On Thu, Apr 2, 2020 at 3:21 AM Scott Kitt=
erman &lt;<a href=3D"mailto:scott@kitterman.com">scott@kitterman.com</a>&gt=
; wrote:<br></div><div class=3D"gmail_quote"><blockquote class=3D"gmail_quo=
te" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204=
);padding-left:1ex">That&#39;s my thought.=C2=A0 I&#39;ll wait for the co-c=
hairs before taking any actions to <br>
update the draft.<br></blockquote><div><br></div><div>Scott, please prepare=
 a new version of the I-D based upon your comments, but don&#39;t post it u=
ntil IETF Last Call finishes and all other feedback, if any, has been folde=
d in.</div><div><br></div><div>Seth, as co-Chair</div></div></div>

--000000000000d1176805a2508637--


From nobody Thu Apr  2 11:49:06 2020
Return-Path: <scott@kitterman.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 075923A0C0A; Thu,  2 Apr 2020 11:48:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level: 
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=neutral reason="invalid (unsupported algorithm ed25519-sha256)" header.d=kitterman.com header.b=QuhLg5cn; dkim=pass (2048-bit key) header.d=kitterman.com header.b=ZGX8nGPA
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id czKi6wbagRfe; Thu,  2 Apr 2020 11:48:56 -0700 (PDT)
Received: from interserver.kitterman.com (interserver.kitterman.com [64.20.48.66]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 26C9F3A0BCB; Thu,  2 Apr 2020 11:48:56 -0700 (PDT)
Received: from interserver.kitterman.com (interserver.kitterman.com [64.20.48.66]) by interserver.kitterman.com (Postfix) with ESMTPS id CBB9DF8026C; Thu,  2 Apr 2020 14:48:54 -0400 (EDT)
DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/simple; d=kitterman.com; i=@kitterman.com; q=dns/txt; s=201903e; t=1585853334; h=from : to : cc : subject : date : message-id : in-reply-to : references : mime-version : content-transfer-encoding : content-type : from; bh=x5uQ9WIG425PDHL8G77FEsacka+E2nUSsniLEuS9k+M=; b=QuhLg5cnjHgPobdxg1LqYTKOAOHdWDp4RgFiUMpeI5VjLDB4okC9TLag4JFkGWhVIBVgC FLpgHey+jbrdEpmAQ==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kitterman.com; i=@kitterman.com; q=dns/txt; s=201903r; t=1585853334; h=from : to : cc : subject : date : message-id : in-reply-to : references : mime-version : content-transfer-encoding : content-type : from; bh=x5uQ9WIG425PDHL8G77FEsacka+E2nUSsniLEuS9k+M=; b=ZGX8nGPASCmeZDW/DJo/TGL/OhxbQ71AXHh8q5wlhnurizylAvq/kGnFHvQIWefOuPiCv XMGqlejJFveXdJ6ZTiHwlA6sdCcejVV32eisLjZVBkUrCSfnD4bd2Dar7HeM2ZkqGBOZwZ+ ASH4NuiNza0r3dVI1e8jwybByhUN5j8cAALd1xB6y0kOeG6P6WTE6RKDx4IdmkRCHdqqeVN 2oFJsGzPBgaY+ti4rMN6PgBV5P3decrQTYUOUB3kRMJcHpML4HR9D+9cmNJAxShE68umeM+ 6d89yqMnuGLYiCbQXA2UDcVkX/B68pQzRjj/Pnwy3yNxR+ztjyV0Kya5wjLg==
Received: from sk-desktop.localnet (static-72-81-252-22.bltmmd.fios.verizon.net [72.81.252.22]) by interserver.kitterman.com (Postfix) with ESMTP id 8D842F80042; Thu,  2 Apr 2020 14:48:54 -0400 (EDT)
From: Scott Kitterman <scott@kitterman.com>
To: last-call@ietf.org
Cc: Seth Blank <seth@sethblank.com>, IETF DMARC WG <dmarc@ietf.org>, ops-dir@ietf.org, draft-ietf-dmarc-psd.all@ietf.org, "Murray S. Kucherawy" <superuser@gmail.com>, Qin Wu <bill.wu@huawei.com>
Date: Thu, 02 Apr 2020 14:48:54 -0400
Message-ID: <1904862.B7rBbPpL6e@sk-desktop>
In-Reply-To: <CAD2i3WO_bdq6QLp7dyc6MmL_FKVN69BGJ01zAE47ncPULaPGSQ@mail.gmail.com>
References: <158572481464.30894.8037097234628362447@ietfa.amsl.com> <2100110.1RVLOuU0sI@sk-desktop> <CAD2i3WO_bdq6QLp7dyc6MmL_FKVN69BGJ01zAE47ncPULaPGSQ@mail.gmail.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 7Bit
Content-Type: text/plain; charset="us-ascii"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/j1Ks5cJcCPJGyyCegxuQoI7MlvQ>
Subject: Re: [dmarc-ietf] [Last-Call] Opsdir last call review of draft-ietf-dmarc-psd-08
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 02 Apr 2020 18:48:58 -0000

On Thursday, April 2, 2020 11:33:30 AM EDT Seth Blank wrote:
> On Thu, Apr 2, 2020 at 3:21 AM Scott Kitterman <scott@kitterman.com> wrote:
> > That's my thought.  I'll wait for the co-chairs before taking any actions
> > to
> > update the draft.
> 
> Scott, please prepare a new version of the I-D based upon your comments,
> but don't post it until IETF Last Call finishes and all other feedback, if
> any, has been folded in.
> 
> Seth, as co-Chair

Done.  The updated version (XML, text, and rfcdiff) can be found in the WG 
GitHub repository [1].

Scott K

[1] https://github.com/ietf-dmarc-wg/draft-ietf-dmarc-psd




From nobody Thu Apr  2 16:00:28 2020
Return-Path: <blong@google.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B5F053A1BBB for <dmarc@ietfa.amsl.com>; Thu,  2 Apr 2020 16:00:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -17.598
X-Spam-Level: 
X-Spam-Status: No, score=-17.598 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, ENV_AND_HDR_SPF_MATCH=-0.5, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5, USER_IN_DEF_SPF_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=google.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id we2N6By70E2r for <dmarc@ietfa.amsl.com>; Thu,  2 Apr 2020 16:00:24 -0700 (PDT)
Received: from mail-vs1-xe34.google.com (mail-vs1-xe34.google.com [IPv6:2607:f8b0:4864:20::e34]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BA98B3A1BB3 for <dmarc@ietf.org>; Thu,  2 Apr 2020 16:00:24 -0700 (PDT)
Received: by mail-vs1-xe34.google.com with SMTP id o3so3756098vsd.4 for <dmarc@ietf.org>; Thu, 02 Apr 2020 16:00:24 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=8CEkjPUfst48h9Msnipp9bXfOkpF+EojlY0Jt2Vhjfo=; b=m9OjycTTbfuSdwetiquA+/MHLZYQZONpbQKesCHWoTVyhi9mJ0xO1cTg7GqKKqtgxE MLykmQyghKMyPnRkziJN6q/VrF1Uw2zxp0YsbHE0H0kDrEgOvq/Ko1JtaU/AtA0riwIm 8tBiMrUKtYvzHk1In+JQBaq0Q9AU6+Hc1i9ibv6LCqfnFFRnLRlqok71CBVrXixmKpzK 59ejlPW6z7tL1rwwd2G04LIE3e21jab8IVNINk1cIvY3+ZYUVc5i9JL7qfpDd8Rsm2aN KpRe0jh5wS9yExf4VUuBOWG31PYil4AjcXL0nkIwIXwyZx/DbfuRlLUKPuCXm6rGGOOY W/aQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=8CEkjPUfst48h9Msnipp9bXfOkpF+EojlY0Jt2Vhjfo=; b=fLJ8oUE5YpX6knZsGvt3722fB/rFDUO0nO2s5t33rfTqQgVr6XovDeT95oAoeJXNMw d4f1XrFblfvRwqAjzJ54uZ4HVoHSQRGZjVweIXo/WrXnGAU2CR5ds798cuDExnEb+WV1 iZAKO4o70/Rnx3ielo5DCwFAY7BZishvITiPT2SBVjMeGBbF6bbFz6Fi26QaXjZsWDw9 wJFoQi7sDX/AAXNMe2vhdHEWTLiwMXfvt2rHDTKtacGb3jbtS+CA5X5Uab7sE0SnHAMA HIG6/rajCgdLanLNy76E+39IHKohTCCSOieJxSMBIA/97CPBwan6tRffP6QW736K97Bu JdkQ==
X-Gm-Message-State: AGi0Pua2glh9Ro5icCN6+g+r7mYUD+TkOeNbSWNRnc98Qv2lgx4ttpcB OJYs/VqOY0eVMNC75Fxtp11AQoP0wrm6uJ4UZ0xC
X-Google-Smtp-Source: APiQypIroqlB2vcZRO7FtBREaEMiCnnLaJwAhpRjCuTV/+rGlZh2J03ezXyUreHp4q1JAz9qvxOWJOFRSLAUVI/VTjw=
X-Received: by 2002:a67:7d93:: with SMTP id y141mr4043243vsc.124.1585868423214;  Thu, 02 Apr 2020 16:00:23 -0700 (PDT)
MIME-Version: 1.0
References: <6b4c7533-ebee-796b-e00e-a2bb4075081f@arcsin.de> <20200402003211.0B8AA16E4B5A@ary.qy>
In-Reply-To: <20200402003211.0B8AA16E4B5A@ary.qy>
From: Brandon Long <blong@google.com>
Date: Thu, 2 Apr 2020 16:00:10 -0700
Message-ID: <CABa8R6tJXk=-kFRKJaZCMeoS9-2ea-KnpeN1wLVs4E8Jm5z=MA@mail.gmail.com>
To: John Levine <johnl@taugh.com>
Cc: IETF DMARC WG <dmarc@ietf.org>, Damian Lukowski <rfc@arcsin.de>
Content-Type: multipart/alternative; boundary="0000000000000741f405a256c405"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/sTOqlyP9XLtNOmrdFwXCMpkW-aQ>
Subject: Re: [dmarc-ietf] Definition of "value" in RFC8601
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 02 Apr 2020 23:00:27 -0000

--0000000000000741f405a256c405
Content-Type: text/plain; charset="UTF-8"

On Wed, Apr 1, 2020 at 5:32 PM John Levine <johnl@taugh.com> wrote:

> In article <6b4c7533-ebee-796b-e00e-a2bb4075081f@arcsin.de> you write:
> >To decide for an authserv-id whether to pull sub-domain from 5321 or
> >6531, one needs to know if the message is internationalized. But to
> >obtain that information, one must have parsed all message header fields,
> >per 6531 sec 3.6, including A-R, that is still waiting to be parsed.
>
> In systems that keep ASCII and EAI mail separate, that info will be in
> the metadata, whether it arrived in an SMTP session with the SMTPUTF8
> option.
>

Does anyone implement it that way?

We just upgraded our parser to handle EAI mail, and the parser returns
requested data
in UTF8, decoding 5322 mail or going straight from 6532 mail as necessary,
with
specific accessors needing to know what the possible encodings could be.
We then check
when we go to send mail whether we should specify SMTPUTF8 on the output..
as for input...

We see plenty of mail transferred without SMTPUTF8 that contains UTF8 (or
other
8-bit characters, but the majority of that became UTF8 probably close to a
decade ago), and we
just handle it.

Unfortunately, everybody thinks they can just make their own emali messages
because its a text-like
format, and they're very often wrong.

Brandon

--0000000000000741f405a256c405
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr"><br></div><br><div class=3D"gmail_quote">=
<div dir=3D"ltr" class=3D"gmail_attr">On Wed, Apr 1, 2020 at 5:32 PM John L=
evine &lt;<a href=3D"mailto:johnl@taugh.com">johnl@taugh.com</a>&gt; wrote:=
<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8=
ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">In article &lt;=
<a href=3D"mailto:6b4c7533-ebee-796b-e00e-a2bb4075081f@arcsin.de" target=3D=
"_blank">6b4c7533-ebee-796b-e00e-a2bb4075081f@arcsin.de</a>&gt; you write:<=
br>
&gt;To decide for an authserv-id whether to pull sub-domain from 5321 or<br=
>
&gt;6531, one needs to know if the message is internationalized. But to<br>
&gt;obtain that information, one must have parsed all message header fields=
,<br>
&gt;per 6531 sec 3.6, including A-R, that is still waiting to be parsed.<br=
>
<br>
In systems that keep ASCII and EAI mail separate, that info will be in<br>
the metadata, whether it arrived in an SMTP session with the SMTPUTF8<br>
option.<br></blockquote><div><br></div><div>Does anyone implement it that w=
ay?</div><div><br></div><div>We just upgraded our parser to handle EAI mail=
, and the parser returns requested data</div><div>in UTF8, decoding 5322 ma=
il or going straight from 6532 mail as necessary, with</div><div>specific a=
ccessors needing to know what the possible encodings could be.=C2=A0 We the=
n check</div><div>when we go to send mail whether we should specify SMTPUTF=
8 on the output.. as for input...</div><div><br>We see plenty of mail trans=
ferred without SMTPUTF8 that contains UTF8 (or other</div><div>8-bit charac=
ters, but the majority of that became UTF8 probably close to a decade ago),=
 and we</div><div>just handle it.</div><div><br></div><div>Unfortunately, e=
verybody thinks they can just make their own emali messages because its a t=
ext-like</div><div>format, and they&#39;re very often wrong.</div><div><br>=
</div><div>Brandon=C2=A0</div></div></div>

--0000000000000741f405a256c405--


From nobody Thu Apr  2 17:10:58 2020
Return-Path: <johnl@taugh.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 21F803A08F8 for <dmarc@ietfa.amsl.com>; Thu,  2 Apr 2020 17:10:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level: 
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1536-bit key) header.d=iecc.com header.b=N1kjSBYA; dkim=pass (1536-bit key) header.d=taugh.com header.b=jMnUDMn7
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id e6VLPXhsrOyb for <dmarc@ietfa.amsl.com>; Thu,  2 Apr 2020 17:10:40 -0700 (PDT)
Received: from gal.iecc.com (gal.iecc.com [IPv6:2001:470:1f07:1126:0:43:6f73:7461]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D420E3A08ED for <dmarc@ietf.org>; Thu,  2 Apr 2020 17:10:39 -0700 (PDT)
Received: (qmail 59674 invoked from network); 3 Apr 2020 00:10:37 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=iecc.com; h=date:message-id:from:to:cc:subject:in-reply-to:references:mime-version:content-type:user-agent; s=e917.5e867efc.k2004; i=johnl-iecc.com@submit.iecc.com; bh=Ru71ZcURM9aZhBNmaqjQG8y/vmtyROGAW4wUu4WtJag=; b=N1kjSBYAbj+kxyDAYQG4aynfVzv6U64WzE3jF27j8y9RFVEGJnJrCK5Nl2CU/ebfFnMTJwC0y3YAjkWbmERlac0SW2UuP5H0yQe7SnqcxtD1xqbDqAK8rIrS23dcoRp33KoHB99oOS31SPLem40vrKanSPqBiodUfVqJ52vT+kMmCrx+ULQcmu1BiuufMPorjhsnVeQsxJaLTNMDLJtwoYzt/QF5IZxX94r1eE+U95LerqkHo3QzhSjo1BcEycOL
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=taugh.com; h=date:message-id:from:to:cc:subject:in-reply-to:references:mime-version:content-type:user-agent; s=e917.5e867efc.k2004; olt=johnl-iecc.com@submit.iecc.com; bh=Ru71ZcURM9aZhBNmaqjQG8y/vmtyROGAW4wUu4WtJag=; b=jMnUDMn77YRQCHWt3+87u1iwBN+BZFnA/m4Dcqa+tfOHWeAXYYFFIGZcbHCV9MTPqZVtNjtI04hKU7GsQ/fDy7w5Gf8LfV/028Oj6UOt8z/4BGUulFCGZTAcj/wDXGmjsdHnu6UDay793yN65QhuWRuSRjtVS6dqw4OqoUKK4z7pt0D9DoPBgRZZiXDUnQGRqxBA2gfFCDxVRiwHa+vPGIsVRwEjF7bx4nHsbrrPxnw1RB9wv5YHBPdvCjKpLTjw
Received: from localhost ([IPv6:2001:470:1f07:1126::78:696d:6170]) by imap.iecc.com ([IPv6:2001:470:1f07:1126::78:696d:6170]) with ESMTPSA (TLS1.3 ECDHE-RSA AES-256-GCM AEAD, johnl@iecc.com) via TCP6; 03 Apr 2020 00:10:36 -0000
Date: 2 Apr 2020 20:10:36 -0400
Message-ID: <alpine.OSX.2.22.407.2004022009360.35755@ary.qy>
From: "John R Levine" <johnl@taugh.com>
To: "Brandon Long" <blong@google.com>
Cc: "IETF DMARC WG" <dmarc@ietf.org>
In-Reply-To: <CABa8R6tJXk=-kFRKJaZCMeoS9-2ea-KnpeN1wLVs4E8Jm5z=MA@mail.gmail.com>
References: <6b4c7533-ebee-796b-e00e-a2bb4075081f@arcsin.de> <20200402003211.0B8AA16E4B5A@ary.qy> <CABa8R6tJXk=-kFRKJaZCMeoS9-2ea-KnpeN1wLVs4E8Jm5z=MA@mail.gmail.com>
User-Agent: Alpine 2.22 (OSX 407 2020-02-09)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII; format=flowed
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/d_Embvp_mGNZhhS2en5z-1eHJQE>
Subject: Re: [dmarc-ietf] Definition of "value" in RFC8601
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 Apr 2020 00:10:51 -0000

>> In systems that keep ASCII and EAI mail separate, that info will be in
>> the metadata, whether it arrived in an SMTP session with the SMTPUTF8
>> option.
>
> Does anyone implement it that way?

I have no idea.  I don't in my code either.

> Unfortunately, everybody thinks they can just make their own emali messages
> because its a text-like format, and they're very often wrong.

Surely you're aware that 50% of all programmers are of below average 
skill.

Regards,
John Levine, johnl@taugh.com, Taughannock Networks, Trumansburg NY
Please consider the environment before reading this e-mail. https://jl.ly


From nobody Thu Apr  2 17:18:42 2020
Return-Path: <johnl@iecc.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B5FCB3A093F for <dmarc@ietfa.amsl.com>; Thu,  2 Apr 2020 17:18:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.85
X-Spam-Level: 
X-Spam-Status: No, score=-1.85 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.25, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1536-bit key) header.d=iecc.com header.b=EYeULZR3; dkim=pass (1536-bit key) header.d=taugh.com header.b=al0FjPyp
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cF6LGooQrwd5 for <dmarc@ietfa.amsl.com>; Thu,  2 Apr 2020 17:18:03 -0700 (PDT)
Received: from gal.iecc.com (gal.iecc.com [IPv6:2001:470:1f07:1126:0:43:6f73:7461]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0B03A3A094A for <dmarc@ietf.org>; Thu,  2 Apr 2020 17:17:22 -0700 (PDT)
Received: (qmail 60973 invoked from network); 3 Apr 2020 00:17:20 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=iecc.com; h=date:message-id:from:to:cc:subject:in-reply-to:mime-version:content-type:content-transfer-encoding; s=ee2b.5e868090.k2004; bh=SYNKw65IuoxnsWH9mj0qNxiRmBAIJFpkGKyzgiQe3a0=; b=EYeULZR3Aa12zXgEOYjR6tEfvDWsVvKUa0WgV9kpsjN2Egh2qEjZKxa0C+0tFvu8y2JIZ15BCYDjfGL3tQiRk6uhBPLl9+NZmL+Sv1WIj0krvZpevxZHHs6WL7wfbbCaGlx73UoBxEDhNqBMMN8JpaoHhfSmL8RaSpuB7Iff6r52GMgRdc3fFa5iCR8OhIWwtsjypbGi6+QeYVFRYKqFfDub5uaNCOAephLEMTfJoVs91H1Ca905dXQpCnbFyCST
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=taugh.com; h=date:message-id:from:to:cc:subject:in-reply-to:mime-version:content-type:content-transfer-encoding; s=ee2b.5e868090.k2004; bh=SYNKw65IuoxnsWH9mj0qNxiRmBAIJFpkGKyzgiQe3a0=; b=al0FjPyp+rbII6QWPqyrKqFlF/SmJyRs1LjmK/ycmmV3qQ5UzGfZ8WuiHy10+g6dPMo9PAHp51nZ9BUMomK5/F3Cb5MwBTd88pd+yixTBlrObBrYYugVEM9vDimE/o9fH6zkbmQGy4xTLlnWxHUMnQoUxVI6RfXkJeBXqs9AZEeHkTiS55Sux9XKPo7qVMnco+NuUEHdGGA0eBZh5if049BJRHj4hqNE7nibAnE3bRgEXdaEwgWHrjtpG6SqNOIc
Received: from ary.qy ([IPv6:2001:470:1f07:1126::78:696d:6170]) by imap.iecc.com ([IPv6:2001:470:1f07:1126::78:696d:6170]) with ESMTP via TCP6; 03 Apr 2020 00:17:19 -0000
Received: by ary.qy (Postfix, from userid 501) id 8DC9D16F0CF0; Thu,  2 Apr 2020 20:17:18 -0400 (EDT)
Date: 2 Apr 2020 20:17:18 -0400
Message-Id: <20200403001719.8DC9D16F0CF0@ary.qy>
From: "John Levine" <johnl@taugh.com>
To: dmarc@ietf.org
Cc: scott@kitterman.com
In-Reply-To: <1904862.B7rBbPpL6e@sk-desktop>
Organization: Taughannock Networks
X-Headerized: yes
Mime-Version: 1.0
Content-type: text/plain; charset=utf-8
Content-transfer-encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/HV6A4dyuPP1iyxo66WCzZn43nm0>
Subject: Re: [dmarc-ietf] [Last-Call] Opsdir last call review of draft-ietf-dmarc-psd-08
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 Apr 2020 00:18:24 -0000

In article <1904862.B7rBbPpL6e@sk-desktop> you write:
>> Scott, please prepare a new version of the I-D based upon your comments,
>> but don't post it until IETF Last Call finishes and all other feedback, if
>> any, has been folded in.
>> 
>> Seth, as co-Chair
>
>Done.  The updated version (XML, text, and rfcdiff) can be found in the WG 
>GitHub repository [1].

Internet drafts are intended to be cheap and plentiful.  I'd encourage you to
post what you have.  If it needs further tweaks and another posted version
or two, that's not a big deal.

R's,
John


From nobody Fri Apr  3 09:10:26 2020
Return-Path: <rfc@arcsin.de>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F00183A1A36 for <dmarc@ietfa.amsl.com>; Fri,  3 Apr 2020 09:10:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level: 
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=arcsin.de
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id L1LH0ywimqpU for <dmarc@ietfa.amsl.com>; Fri,  3 Apr 2020 09:10:22 -0700 (PDT)
Received: from sigil.arcsin.de (sigil.arcsin.de [46.38.233.110]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9920F3A1A05 for <dmarc@ietf.org>; Fri,  3 Apr 2020 09:10:14 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=arcsin.de; h= content-language:content-type:content-type:mime-version:date :date:message-id:subject:subject:from:from:x-amavis-category; s= dkim01; t=1585930211; x=1587744612; bh=fdEP2Av6SKktwCMn3xMchUjrs d0A4puC/owwqPXyvgo=; b=F1fTL/2gN3Pbt2AutgCD9Q3BzW7+QQ+xdC6nT4u4K pXp2SegcFl6zEU6SLJWDaU0mK7Plj+wbrSGot6q0fu90s7oNsQ8pFQN/WIQTw/ZD EVRbY+3QhbK4dV5F8u+9RcAFoFWVlA15U/3jIQzh3+kDbcneyI5rkuwKyY6D+vCl tc=
X-Amavis-Category: sigil.arcsin.de; category=CleanTag
From: Damian Lukowski <rfc@arcsin.de>
Autocrypt: addr=damian.lukowski@credativ.de; prefer-encrypt=mutual; keydata= mQENBFBpf4EBCADX2KZo3C61n0ZMslgS/4a8rvylTXKQTtalxzHXRrV11ksNR8gtVsxRPBTd lwcNnEgADLatuHLZ63ks1T1ePHKDa8zQtCqmvbYAtoKMm8lB91VlSkxcO5gEObU29uud37QB s26wzZ35uS3jvtgSFijeI3ukLYsMh2EPa4MdzRojVXBXaTiDmU4mw+ei3P9g/NjlD48R2qr8 ATC1hu8LZ1ln/1BZ579uIjVbtyHeRNTcBQCMdo0KU8/ax6zP1GGSuJiMk4QvO7LCx0NzjcOV DXzWFT5OBK0KYacaDqIvOFNot/E+lVl5B66t3/4cGfzpCaWwGwXcRKgqotcDwn7YVE4dABEB AAG0LURhbWlhbiBMdWtvd3NraSA8ZGFtaWFuLmx1a293c2tpQGNyZWRhdGl2LmRlPokBOAQT AQIAIgUCUGl/gQIbAwYLCQgHAwIGFQgCCQoLBBYCAwECHgECF4AACgkQyMoDfzgSmvQ+cwgA ghoIZUHSUfsDaFAI4dmEbO4XFshUj5h/GDMT67vTF1pHlt19Rv+QUuXdQCCO7EVYqzC0TOro zZk4ckwHixWrkjsumbF3OlYc9bevL63ohXu3qclVFU+Vl3vIOmigV+FA50xKcdJw1zWqki8N p8wbTIsI8F1BQtDo1Ix5MS/aDWyc4VvzNRuKet1VXtGoQedVI5cU1heHYqFZdTafHXVodxF+ hd59rGvWTXeIHMBnI5+UlReOHmFGhF5efyqJIkCLNRnnYg9RaPyLTIlw2suotEle82b7n2tg /hOEegp620zjPmyiVZjvFFD1nUoeGnWHMjJWrKCb9p8QP3rV7UwzErkBDQRQaX+BAQgAszVi k9XvjuXcRerQELFjWLS129X1zhNShunC5Bp1FghtnbmdwPIT6Ep7VhEFSB+43PX7raR8dzvY FmDV6WlH9cimWV/3c3LSJr41tzzyObrnj/cjBzzMYjS2Ls5ficU8lp1+nNyN1Ns0YB4VWwpC zSGsHTaUbIVv1e82216Lvp80ektbGm2vra7aLac6ZKM0/wtuephHZn2w6xUJRADMo79Dxzjz iXr1Eg5YCvO2TIu305eq2Mgshbq9F429JJs4iKiGOdanBlVwtklP0LkM6s2Az2ahgprnbgZD NwshFb5oP9GGTBlzTSkxzHJIx1CVkofyApOtm90Rn8/Peme4iQARAQABiQEfBBgBAgAJBQJQ aX+BAhsMAAoJEMjKA384Epr0sy8IANUKmPlMYzTh61WXNHDcFF0w9jmgx8zrICtdnGG8J1Uf jCVnwsS3YGfeMVVIiecfkEDsrtwun9iij99pUeo9YAbqZlMXRQ19GPq+AdDrWSc1kX4QlV8l 7vzhUMw5Nj74OJQWGEkxtV1fVYs0MEyN7hqQG5TCOANKItzTmNaCHadHsSUjU6LKFzu4q6Wb Vophv18+PVBBr/Hiu9Kt0P3OBAkuoWPzgGdXh6bXstffO6jsNM1/kA1YW0I4khx8OCd5lNgq 3ij3hMZo9Z8dTBzTD5bFlKf3uzzNXl3YQbTs4+zl00QMG1HQJu6abazC5VXAvoLtXHdC+9HP nFVi+roC++Y=
To: dmarc@ietf.org
Message-ID: <e2bd3117-2217-1206-0c0c-f06a35d49dca@arcsin.de>
Date: Fri, 3 Apr 2020 18:09:44 +0200
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="------------5EB62139E98E18D557E76293"
Content-Language: en-US
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/Pf83FTxwy0qsoBRwuYfqzUEe6jY>
Subject: [dmarc-ietf] Spirit of RFC8601 section 5 for invalid A-R headers
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 Apr 2020 16:10:24 -0000

This is a multi-part message in MIME format.
--------------5EB62139E98E18D557E76293
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 7bit

RFC8601 sec 5 states:

> any MTA conforming to
> this specification MUST delete any discovered instance of this header
> field that claims, by virtue of its authentication service
> identifier, to have been added within its trust boundary but that did
> not come directly from another trusted MTA.

In my opinion, a header that does not conform to the specified
authres-header-field in the RFC, is not an Authentication-Results
header, has no authentication service identifier, and as such cannot
claim anything in the context of the RFC. So suppose there is a mail
system with an UTF-8-non-ASCII authserv-id. When creating its own A-R
headers, it puts the authserv-id into quotes, because it cannot use it
without them, as discussed in the separate thread.

What should the system do with an A-R header of an inbound message that
incorporates the system's authentication service identifier without
using quotes, but that otherwise would be syntactically correct?

Again in my opinion, the system needs to keep the header, but what is
the RFCs intention?


--------------5EB62139E98E18D557E76293
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: 7bit

<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=UTF-8">
  </head>
  <body>
    <p>RFC8601 sec 5 states:</p>
    <p>
      <blockquote type="cite">
        <pre class="newpage">any MTA conforming to
this specification MUST delete any discovered instance of this header
field that claims, by virtue of its authentication service
identifier, to have been added within its trust boundary but that did
not come directly from another trusted MTA.</pre>
      </blockquote>
    </p>
    <p>In my opinion, a header that does not conform to the specified
      authres-header-field in the RFC, is not an Authentication-Results
      header, has no authentication service identifier, and as such
      cannot claim anything in the context of the RFC. So suppose there
      is a mail system with an UTF-8-non-ASCII authserv-id. When
      creating its own A-R headers, it puts the authserv-id into quotes,
      because it cannot use it without them, as discussed in the
      separate thread.</p>
    <p>What should the system do with an A-R header of an inbound
      message that incorporates the system's authentication service
      identifier without using quotes, but that otherwise would be
      syntactically correct?<br>
    </p>
    <p>Again in my opinion, the system needs to keep the header, but
      what is the RFCs intention?<br>
    </p>
  </body>
</html>

--------------5EB62139E98E18D557E76293--


From nobody Fri Apr  3 12:59:49 2020
Return-Path: <blong@google.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7A2C53A0746 for <dmarc@ietfa.amsl.com>; Fri,  3 Apr 2020 12:59:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -17.599
X-Spam-Level: 
X-Spam-Status: No, score=-17.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, ENV_AND_HDR_SPF_MATCH=-0.5, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5, USER_IN_DEF_SPF_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=google.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qVmiVrLA77_X for <dmarc@ietfa.amsl.com>; Fri,  3 Apr 2020 12:59:45 -0700 (PDT)
Received: from mail-vs1-xe2e.google.com (mail-vs1-xe2e.google.com [IPv6:2607:f8b0:4864:20::e2e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CBB043A074B for <dmarc@ietf.org>; Fri,  3 Apr 2020 12:59:45 -0700 (PDT)
Received: by mail-vs1-xe2e.google.com with SMTP id w14so5757042vsf.7 for <dmarc@ietf.org>; Fri, 03 Apr 2020 12:59:45 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=itVulPW9TYmryHuB9mdJN9iRK8tXVl3FR/vPOQBo3AQ=; b=tvpO98yt10Q3p53ofUD7dIglRmi9GvjtunnP0pLIjbOkut4+EAEUp9X97d/1FSSCnI QaZSS/P+u90BOeM6DAU9O0gHFSI8PizuBcM8s9vqPd7zCMKwA+8xnUerHrmkLnlArxhl Z1+TATSy+UcD8QZl73cjkeF5R2+54vfui6E+NoQzS8xeS9x7R7uyA4QPfaocMhH7C1Eb /OMjTvvNLLmPbGGwUvMma7TSrRwfFSeotxiy1jWC7129+5oJb5aofUuLm/tempBgoUHk nHWDWAPYcBroEX0Zxhe9aTfh+VeOi5VpM26r/1TdOh5HjpBHyKdC1bjeL8oPot3ax8YR jtqw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=itVulPW9TYmryHuB9mdJN9iRK8tXVl3FR/vPOQBo3AQ=; b=ZTdz91qO/KQDInr4iQNhgNo6O4RLseAWyxjmB6QEh1+ihIrHXVdYyVp3rJAMLrIVsV rMG3GkznkNnSOcdC9howa/KagtaMhtwUXqAr6fVZiHBZsx0LgcI1UE1Rzl4FrPJAW5Nj 5paXLfba6y98H3tgdCxtizOjbA1lGeHz+CR3WjjOlkHOVtK+7pa0vKTJ8u0hg9ftRvaD INvP88K/r4fmT81FBEvDRFk1K5NX7nz7zTLQvZJ1T4N5HmWdNTwh7OcMHWxWfaBFPo/T d40qOEb33bguZugzuZpYsMSvAlnJzGjDOve7RC32nRToyV/khG97Y/JTeIuLscBRVqei DBPw==
X-Gm-Message-State: AGi0PuYA0Z7EfEc/dN+BqRhbASXaPw7DWdwAUUzdgwrPh7QjZDZiZNky AkgSH7pjztCZb71oGOMY6T81YrL0Yn/F30Xi84hOtdY=
X-Google-Smtp-Source: APiQypKo9pzQAJgeRh/it6pnNUzfaa38XxcN3rBXiu5EGd0ucHUEBQT0oDut7ydqzqldPO/IRdr8Gmcu0G+YDmMNr/I=
X-Received: by 2002:a67:2ed2:: with SMTP id u201mr8353700vsu.209.1585943984266;  Fri, 03 Apr 2020 12:59:44 -0700 (PDT)
MIME-Version: 1.0
References: <e2bd3117-2217-1206-0c0c-f06a35d49dca@arcsin.de>
In-Reply-To: <e2bd3117-2217-1206-0c0c-f06a35d49dca@arcsin.de>
From: Brandon Long <blong@google.com>
Date: Fri, 3 Apr 2020 12:59:31 -0700
Message-ID: <CABa8R6sbHLfkzHD4gaPBxQbgNy57J1eLXt2sPyAfaTYAY3tG-Q@mail.gmail.com>
To: Damian Lukowski <rfc@arcsin.de>
Cc: IETF DMARC WG <dmarc@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000d13f0c05a2685bf5"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/6QcERvEsuaoUL3GG0YO3Z3ejkJw>
Subject: Re: [dmarc-ietf] Spirit of RFC8601 section 5 for invalid A-R headers
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 Apr 2020 19:59:48 -0000

--000000000000d13f0c05a2685bf5
Content-Type: text/plain; charset="UTF-8"

I can see there being an issue here if the inbound smtp server that would
normally remove existing AuthRes headers for its admd before adding its own
uses a different algorithm than any downstream systems used.

In particular, theoretically the inbound smtp server may use software from
a different source than the spam system or the clients which consume this
header.

In practice, I don't know how common it is for clients to consume this
header.

Also, any mis-handling should be treated as a bug.

The system should remove the quotes when comparing, and should also do any
decoding to get the admds into the same format.

Brandon

On Fri, Apr 3, 2020 at 9:10 AM Damian Lukowski <rfc@arcsin.de> wrote:

> RFC8601 sec 5 states:
>
> any MTA conforming to
> this specification MUST delete any discovered instance of this header
> field that claims, by virtue of its authentication service
> identifier, to have been added within its trust boundary but that did
> not come directly from another trusted MTA.
>
> In my opinion, a header that does not conform to the specified
> authres-header-field in the RFC, is not an Authentication-Results header,
> has no authentication service identifier, and as such cannot claim anything
> in the context of the RFC. So suppose there is a mail system with an
> UTF-8-non-ASCII authserv-id. When creating its own A-R headers, it puts the
> authserv-id into quotes, because it cannot use it without them, as
> discussed in the separate thread.
>
> What should the system do with an A-R header of an inbound message that
> incorporates the system's authentication service identifier without using
> quotes, but that otherwise would be syntactically correct?
>
> Again in my opinion, the system needs to keep the header, but what is the
> RFCs intention?
> _______________________________________________
> dmarc mailing list
> dmarc@ietf.org
> https://www.ietf.org/mailman/listinfo/dmarc
>

--000000000000d13f0c05a2685bf5
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">I can see there being an issue here if the inbound smtp se=
rver that would normally remove existing AuthRes headers for its admd befor=
e adding its own uses a different algorithm than any downstream systems use=
d.<div><br></div><div>In particular, theoretically the inbound smtp server =
may use software from a different=C2=A0source than the spam system or the c=
lients which consume this header.</div><div><br></div><div>In practice, I d=
on&#39;t know how common it is for clients to consume this header.</div><di=
v><br></div><div>Also, any mis-handling should be treated as a bug.</div><d=
iv><br></div><div>The system=C2=A0should remove the quotes when comparing, =
and should also do any decoding to get the admds into the same format.</div=
><div><br></div><div>Brandon</div></div><br><div class=3D"gmail_quote"><div=
 dir=3D"ltr" class=3D"gmail_attr">On Fri, Apr 3, 2020 at 9:10 AM Damian Luk=
owski &lt;<a href=3D"mailto:rfc@arcsin.de">rfc@arcsin.de</a>&gt; wrote:<br>=
</div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;b=
order-left:1px solid rgb(204,204,204);padding-left:1ex">
 =20

   =20
 =20
  <div>
    <p>RFC8601 sec 5 states:</p>
    <p>
      </p><blockquote type=3D"cite">
        <pre>any MTA conforming to
this specification MUST delete any discovered instance of this header
field that claims, by virtue of its authentication service
identifier, to have been added within its trust boundary but that did
not come directly from another trusted MTA.</pre>
      </blockquote>
    <p></p>
    <p>In my opinion, a header that does not conform to the specified
      authres-header-field in the RFC, is not an Authentication-Results
      header, has no authentication service identifier, and as such
      cannot claim anything in the context of the RFC. So suppose there
      is a mail system with an UTF-8-non-ASCII authserv-id. When
      creating its own A-R headers, it puts the authserv-id into quotes,
      because it cannot use it without them, as discussed in the
      separate thread.</p>
    <p>What should the system do with an A-R header of an inbound
      message that incorporates the system&#39;s authentication service
      identifier without using quotes, but that otherwise would be
      syntactically correct?<br>
    </p>
    <p>Again in my opinion, the system needs to keep the header, but
      what is the RFCs intention?<br>
    </p>
  </div>

_______________________________________________<br>
dmarc mailing list<br>
<a href=3D"mailto:dmarc@ietf.org" target=3D"_blank">dmarc@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/dmarc" rel=3D"noreferrer" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/dmarc</a><br>
</blockquote></div>

--000000000000d13f0c05a2685bf5--


From nobody Fri Apr  3 13:02:16 2020
Return-Path: <blong@google.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EF5B03A090F for <dmarc@ietfa.amsl.com>; Fri,  3 Apr 2020 13:02:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -17.599
X-Spam-Level: 
X-Spam-Status: No, score=-17.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, ENV_AND_HDR_SPF_MATCH=-0.5, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5, USER_IN_DEF_SPF_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=google.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RhvBQkqZ4y9N for <dmarc@ietfa.amsl.com>; Fri,  3 Apr 2020 13:02:13 -0700 (PDT)
Received: from mail-vs1-xe36.google.com (mail-vs1-xe36.google.com [IPv6:2607:f8b0:4864:20::e36]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B33873A08F9 for <dmarc@ietf.org>; Fri,  3 Apr 2020 13:02:13 -0700 (PDT)
Received: by mail-vs1-xe36.google.com with SMTP id e138so5720440vsc.11 for <dmarc@ietf.org>; Fri, 03 Apr 2020 13:02:13 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=qdW1mXQhkOVn5IuQRgFLXThnTM6v2WvEi/Py8Di0oCE=; b=ld9Coll260nYa1j0wFjHNdRvkayXBASIEpy8YReQJeBTOzv/52AJYzUwlAxz9nPlUJ uCWF1TPV74MzBoT/RDYB8xDBZcgik2p+f98yKrw8laGFTal3GvDKOBsoHqprjoYG8um2 nlv7/BpnCccSDmfo+VQcfQxZaPvdE6RYZaFMp13CHwx8Zgwpor3S4y8rZ1WRKKdH/ieK hxdNfndPfXbeuNz4snQk7hpySXOXV7FsWSp9ZpATmt8BN2HQJ7x7cwr0OvDTz6M8e8e5 iKubK1WVwE/njfHqUwoX2GVcFZvHR87E5tTeyf+rgrNgMt/Smr5KTyC0AT+UTd0jYmRp auKQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=qdW1mXQhkOVn5IuQRgFLXThnTM6v2WvEi/Py8Di0oCE=; b=r3weqlXG5P1/E/lkDRjnr1hoxZ56+nbvUSDlSBjX1Ffd0OAsclNg7+TNBSOIS+hBjQ SohtITt/WZlJJdYZx9x9tGFKgHLSv3EIpGwsR8qUZODHci1dEf6Daeky2TAFO7KDJeRJ ihQrdSBdsI7QAwQjM+Xdo7QUnlGy/McHj0UQqwqgx8eLP8VSJfRQIUwsvQRKVFZOo3pW JbgRe+MgeT0G+V3v+AwfEpuFfMTM6phcFCx1siW2wxPGRVqpXj2a5e8ITS62l/XY7p6r DONx8tuyrCAAIBkS92mhrDY7m0ifDXn2brnh9c+nYUgH0g2ng019JPFG9TjrEVaDEpKJ oJLQ==
X-Gm-Message-State: AGi0PubE43dSCmfuWIxY+CxaOovB3YCskKno13InLBKl3RfyoK3mXSQ8 JPZkmn1pz5sNiX7rZIHK8TQ04eicA/w5KSOZssnt
X-Google-Smtp-Source: APiQypKRWvznPK0R9IR545mrbm0m1Qq0Z6J6FaPxFXY9LEdOLQ9GKRyS4Yweq+hDx4XfF4KrKBLoQPMLgckoiLbok64=
X-Received: by 2002:a67:2ed2:: with SMTP id u201mr8365348vsu.209.1585944132284;  Fri, 03 Apr 2020 13:02:12 -0700 (PDT)
MIME-Version: 1.0
References: <6b4c7533-ebee-796b-e00e-a2bb4075081f@arcsin.de> <20200402003211.0B8AA16E4B5A@ary.qy> <CABa8R6tJXk=-kFRKJaZCMeoS9-2ea-KnpeN1wLVs4E8Jm5z=MA@mail.gmail.com> <alpine.OSX.2.22.407.2004022009360.35755@ary.qy>
In-Reply-To: <alpine.OSX.2.22.407.2004022009360.35755@ary.qy>
From: Brandon Long <blong@google.com>
Date: Fri, 3 Apr 2020 13:01:58 -0700
Message-ID: <CABa8R6uKeDq5HLCh-XsL8bnjkrvvGXrLSY=qveVaYyzp2jt35A@mail.gmail.com>
To: John R Levine <johnl@taugh.com>
Cc: IETF DMARC WG <dmarc@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000a3e9c705a26864a7"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/7SCyhr1D0_zlYhMM0Qfax5gU11I>
Subject: Re: [dmarc-ietf] Definition of "value" in RFC8601
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 Apr 2020 20:02:15 -0000

--000000000000a3e9c705a26864a7
Content-Type: text/plain; charset="UTF-8"

On Thu, Apr 2, 2020 at 5:10 PM John R Levine <johnl@taugh.com> wrote:

> >> In systems that keep ASCII and EAI mail separate, that info will be in
> >> the metadata, whether it arrived in an SMTP session with the SMTPUTF8
> >> option.
> >
> > Does anyone implement it that way?
>
> I have no idea.  I don't in my code either.
>
> > Unfortunately, everybody thinks they can just make their own emali
> messages
> > because its a text-like format, and they're very often wrong.
>
> Surely you're aware that 50% of all programmers are of below average
> skill.
>

Clearly.  But it goes beyond that, even programmers who are of above
average skill
aren't expected to be knowledgeable about all of the sharp edges they can
run into.

Brandon

--000000000000a3e9c705a26864a7
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr"><br></div><br><div class=3D"gmail_quote">=
<div dir=3D"ltr" class=3D"gmail_attr">On Thu, Apr 2, 2020 at 5:10 PM John R=
 Levine &lt;<a href=3D"mailto:johnl@taugh.com">johnl@taugh.com</a>&gt; wrot=
e:<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0=
.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">&gt;&gt; In s=
ystems that keep ASCII and EAI mail separate, that info will be in<br>
&gt;&gt; the metadata, whether it arrived in an SMTP session with the SMTPU=
TF8<br>
&gt;&gt; option.<br>
&gt;<br>
&gt; Does anyone implement it that way?<br>
<br>
I have no idea.=C2=A0 I don&#39;t in my code either.<br>
<br>
&gt; Unfortunately, everybody thinks they can just make their own emali mes=
sages<br>
&gt; because its a text-like format, and they&#39;re very often wrong.<br>
<br>
Surely you&#39;re aware that 50% of all programmers are of below average <b=
r>
skill.<br></blockquote><div><br></div><div>Clearly.=C2=A0 But it goes beyon=
d that, even programmers who are of above average skill</div><div>aren&#39;=
t expected to be knowledgeable about all of the sharp edges they can run in=
to.</div><div><br></div><div>Brandon=C2=A0</div></div></div>

--000000000000a3e9c705a26864a7--


From nobody Fri Apr  3 13:05:32 2020
Return-Path: <johnl@iecc.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C41623A0935 for <dmarc@ietfa.amsl.com>; Fri,  3 Apr 2020 13:05:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.85
X-Spam-Level: 
X-Spam-Status: No, score=-1.85 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.25, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1536-bit key) header.d=iecc.com header.b=k3OZQuLu; dkim=pass (1536-bit key) header.d=taugh.com header.b=kdQBqHEs
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UaYsVOt75iNT for <dmarc@ietfa.amsl.com>; Fri,  3 Apr 2020 13:05:28 -0700 (PDT)
Received: from gal.iecc.com (gal.iecc.com [IPv6:2001:470:1f07:1126:0:43:6f73:7461]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 499323A092E for <dmarc@ietf.org>; Fri,  3 Apr 2020 13:05:28 -0700 (PDT)
Received: (qmail 74265 invoked from network); 3 Apr 2020 20:05:27 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=iecc.com; h=date:message-id:from:to:cc:subject:in-reply-to:mime-version:content-type:content-transfer-encoding; s=12217.5e879707.k2004; bh=EH4rDwl7+tI6OLIKuajkELLu1nMujxj/ZsAJqkOj0AA=; b=k3OZQuLuXKVMGLg9Zymtmo/BHD+ddC5TjCouJp+t6qbGff2oOjV/RuHDKwWoHi2LdC5ZYfWZdNOzo1XmCIWeS3w0yCB8hGTej7XhkRUdl9I6QrbMkJbvIDjRBkBisBzjm5939ewgpmmKa9OLVCd2mDZ+xBmIBkCmW43d3xTquO06pL+Vs1AqPs/R6BwiteksIzphnFcD2KDdflnceUJk5vGn0aL6xSNXaV+W/aYweBr9nkMxnfNkSmh4fHjcCKYZ
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=taugh.com; h=date:message-id:from:to:cc:subject:in-reply-to:mime-version:content-type:content-transfer-encoding; s=12217.5e879707.k2004; bh=EH4rDwl7+tI6OLIKuajkELLu1nMujxj/ZsAJqkOj0AA=; b=kdQBqHEsXpLGzaZQ5ZytY/5e6NGWbnXnQTp0bi0ouxU1YOt9NhcIX+O9YQ9iGueNcjMwivHE5mgTldOA5sHDEIgu4qNJpYymyzX22xBLuy3iunpmoqVVyuaEf6LTWn97dlgS9DlI561fd6vuE+nZurISpjhZ2rQgX7apgZiWl2GCgKeuLDJVQ/HK6llEDOSk+ywDZD3DHTpFEp7JsTH45aZiCmmWMUi23zw+hy+GluOLFDntbH1Ml3z32XpQgaaa
Received: from ary.qy ([IPv6:2001:470:1f07:1126::78:696d:6170]) by imap.iecc.com ([IPv6:2001:470:1f07:1126::78:696d:6170]) with ESMTP via TCP6; 03 Apr 2020 20:05:26 -0000
Received: by ary.qy (Postfix, from userid 501) id DDAD616FC9A3; Fri,  3 Apr 2020 16:05:26 -0400 (EDT)
Date: 3 Apr 2020 16:05:26 -0400
Message-Id: <20200403200526.DDAD616FC9A3@ary.qy>
From: "John Levine" <johnl@taugh.com>
To: dmarc@ietf.org
Cc: rfc@arcsin.de
In-Reply-To: <e2bd3117-2217-1206-0c0c-f06a35d49dca@arcsin.de>
Organization: Taughannock Networks
X-Headerized: yes
Mime-Version: 1.0
Content-type: text/plain; charset=utf-8
Content-transfer-encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/f32FGKquFmSr2IZkpDVw3sk8SZ0>
Subject: Re: [dmarc-ietf] Spirit of RFC8601 section 5 for invalid A-R headers
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 Apr 2020 20:05:30 -0000

In article <e2bd3117-2217-1206-0c0c-f06a35d49dca@arcsin.de> you write:
>> this specification MUST delete any discovered instance of this header
>> field that claims, by virtue of its authentication service
>> identifier, to have been added within its trust boundary but that did
>> not come directly from another trusted MTA.
>
>In my opinion, a header that does not conform to the specified
>authres-header-field in the RFC, is not an Authentication-Results
>header, has no authentication service identifier, and as such cannot
>claim anything in the context of the RFC. ...

Honestly, it doesn't matter.  The only A-R headers you can trust are
the ones that your own system added, and the point of that text is
that you should delete ones that look like yours but that you didn't
add.

We leave other people's A-R headers in case they might be useful to
do forensics, and we have a slightly different version of them in
ARC chains which again are only trustworthy if you know who added
the ARC seals.

R's,
John


From nobody Fri Apr  3 13:09:43 2020
Return-Path: <johnl@iecc.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9A8FD3A094C for <dmarc@ietfa.amsl.com>; Fri,  3 Apr 2020 13:09:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.85
X-Spam-Level: 
X-Spam-Status: No, score=-1.85 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.25, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1536-bit key) header.d=iecc.com header.b=s/Au50Z8; dkim=pass (1536-bit key) header.d=taugh.com header.b=Gx7W2WrL
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dVUZ19dDYm8A for <dmarc@ietfa.amsl.com>; Fri,  3 Apr 2020 13:09:39 -0700 (PDT)
Received: from gal.iecc.com (gal.iecc.com [IPv6:2001:470:1f07:1126:0:43:6f73:7461]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3AC6A3A0934 for <dmarc@ietf.org>; Fri,  3 Apr 2020 13:09:38 -0700 (PDT)
Received: (qmail 74829 invoked from network); 3 Apr 2020 20:09:38 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=iecc.com; h=date:message-id:from:to:cc:subject:in-reply-to:mime-version:content-type:content-transfer-encoding; s=1244a.5e879802.k2004; bh=EkzAJ6UlNf1pTcEKC77AwiM8YAKbAcISp4+nkl1WDO4=; b=s/Au50Z8KOpdHEQQX+RiLzxapPwXX+z4C2go+q7+FnUTDq1Z9Nw3nexG9pOaYmmr3zipTFTlpBBjmhw7v8re8bvC1AZB6dJuPd43xSwjdl3GjAUiWkwq5Ngaq7kCSBckunnFP8xnvEYHiNm158JfmpDV1TVeZ0ABQ+xGpIJLXtbeC/ui5l7uIVAfyBIAV4OkpEYMNIvURVnsO6y7+YtWxzBrt/pj06x0AOJuO929E7sCJmUNCEBnLBsuclrDtFXo
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=taugh.com; h=date:message-id:from:to:cc:subject:in-reply-to:mime-version:content-type:content-transfer-encoding; s=1244a.5e879802.k2004; bh=EkzAJ6UlNf1pTcEKC77AwiM8YAKbAcISp4+nkl1WDO4=; b=Gx7W2WrL/VKXplr48w/UKoV+MYIKERnOaUiwn5wi+BFxWB5EDKMvyu5ummts1XQqTr2/9Xjw/mPib+dRnScUEjtIAwkj5k/tWj40hmZ1JTqn83xGWNlKg+d0j/v9Mc9fuyOqsQ0284CFjgCp+H5HnWkF43O5/50Rte31tEZTjPzUuJVjaI/d//RS4+eKD8kVOT8hkE9R1Zuj38087oFnodB7h47TjTL0L03ek+ZtTmA8qDXgYpNNLMQRgtJ9kpwu
Received: from ary.qy ([IPv6:2001:470:1f07:1126::78:696d:6170]) by imap.iecc.com ([IPv6:2001:470:1f07:1126::78:696d:6170]) with ESMTP via TCP6; 03 Apr 2020 20:09:37 -0000
Received: by ary.qy (Postfix, from userid 501) id AAFD716FCA1B; Fri,  3 Apr 2020 16:09:37 -0400 (EDT)
Date: 3 Apr 2020 16:09:37 -0400
Message-Id: <20200403200937.AAFD716FCA1B@ary.qy>
From: "John Levine" <johnl@taugh.com>
To: dmarc@ietf.org
Cc: blong@google.com
In-Reply-To: <CABa8R6sbHLfkzHD4gaPBxQbgNy57J1eLXt2sPyAfaTYAY3tG-Q@mail.gmail.com>
Organization: Taughannock Networks
X-Headerized: yes
Mime-Version: 1.0
Content-type: text/plain; charset=utf-8
Content-transfer-encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/f740_G-Cos2TcvKtg451cJWC4So>
Subject: Re: [dmarc-ietf] Spirit of RFC8601 section 5 for invalid A-R headers
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 Apr 2020 20:09:42 -0000

In article <CABa8R6sbHLfkzHD4gaPBxQbgNy57J1eLXt2sPyAfaTYAY3tG-Q@mail.gmail.com> you write:
>In practice, I don't know how common it is for clients to consume this
>header.

They have to if they're adding ARC seals on the way out.  Other than
that I don't have much idea either.  On my system my mailing list software
looks at it them to decide how much DMARC hackery to do but again I don't
know how common that is.

Since the point of the text is that you can only trust your own A-R
headers, presumably the code that adds them and that consumes them are
at least partly under the same management so I'd think they could agree
on their quoting practices.

R's,
John





From nobody Fri Apr  3 13:19:08 2020
Return-Path: <kurta@drkurt.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ADFA43A09FB for <dmarc@ietfa.amsl.com>; Fri,  3 Apr 2020 13:19:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level: 
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=drkurt.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3syVgXaIjEGF for <dmarc@ietfa.amsl.com>; Fri,  3 Apr 2020 13:19:05 -0700 (PDT)
Received: from mail-il1-x12e.google.com (mail-il1-x12e.google.com [IPv6:2607:f8b0:4864:20::12e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3208C3A09FA for <dmarc@ietf.org>; Fri,  3 Apr 2020 13:19:04 -0700 (PDT)
Received: by mail-il1-x12e.google.com with SMTP id k29so8613226ilg.0 for <dmarc@ietf.org>; Fri, 03 Apr 2020 13:19:04 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=drkurt.com; s=20130612; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=Cfp0wajwaft+9Hab905hOPsfEYyiVf21KNzwa7sRZ6U=; b=VNWkq6hEOm2k8jv7xyp+s6q8tDrciRtGdhixfQ4SI/y+lORIUzRJrTzQldDL0iZE0Q aL5KfGvanV/Hp1Ra3S0jikY3+cwQSwsk6gjob+prbxKEDiCw5kXn1cjanstF3S526qQT HtENwSWT543uXj5ZSJ4JGxf5xaRowABNeOH+g=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=Cfp0wajwaft+9Hab905hOPsfEYyiVf21KNzwa7sRZ6U=; b=EfZ9iKXJxWmlWaHkipKJvLW+89V5BYY/mTWMQwK6hne3aRONG5LYycAdHU4g4JO8mq KLYpYRNwrpye1FEBqHiq4tt4W06qQY29GqNG9XdplqQS/gxhj97KDJmJ1wHVOfIlxTtO P3WUjW88aM9HozitWW7tVdYsKxGLtljRqZETO4eRDKgqfQMvZ/Ae8+/vEfUC/+CZsO8d CeAVYgYZsWJbM9mVGHzjHxBQCu1ikCu1qwgyntIzMMZLMX+Aq4ZvMVzbe6rfs7V4iAex Bc5IWaFQq9WsFk0avgHOpFFLDaJ23dhOxyV5yt4xFthw2eaqreWanqh8zpiFvzobjD0H VtUw==
X-Gm-Message-State: AGi0Pub34DSi/tHyQajLvzheDcmxPNklVfa8HhjO7W+nQXFSx6/ZlSqg WiO/nEdnuAf1KQtCQg9hs7Ma+vFgskFaFQ05WgYOKQ==
X-Google-Smtp-Source: APiQypKfO5bVCZVFZLjYhIktDJJBDmmuttj6yWcPuLKYCxmSY/bRkNLU585qEnQDRKrBoUkSMvc95v/vI9mdkvn68q4=
X-Received: by 2002:a92:db04:: with SMTP id b4mr10344230iln.120.1585945144101;  Fri, 03 Apr 2020 13:19:04 -0700 (PDT)
MIME-Version: 1.0
References: <CABa8R6sbHLfkzHD4gaPBxQbgNy57J1eLXt2sPyAfaTYAY3tG-Q@mail.gmail.com> <20200403200937.AAFD716FCA1B@ary.qy>
In-Reply-To: <20200403200937.AAFD716FCA1B@ary.qy>
From: "Kurt Andersen (b)" <kboth@drkurt.com>
Date: Fri, 3 Apr 2020 13:18:52 -0700
Message-ID: <CABuGu1okw4AD1tjEOe9GAJR+dpbTWB+RojKPZn7VatU1NXzCyg@mail.gmail.com>
To: John Levine <johnl@taugh.com>
Cc: "dmarc@ietf.org" <dmarc@ietf.org>, Brandon Long <blong@google.com>
Content-Type: multipart/alternative; boundary="000000000000f2a16e05a268a081"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/czAp5dcB9EN-XHRjJ-EFoSHpf5M>
Subject: Re: [dmarc-ietf] Spirit of RFC8601 section 5 for invalid A-R headers
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 Apr 2020 20:19:07 -0000

--000000000000f2a16e05a268a081
Content-Type: text/plain; charset="UTF-8"

On Fri, Apr 3, 2020 at 1:09 PM John Levine <johnl@taugh.com> wrote:

> In article <
> CABa8R6sbHLfkzHD4gaPBxQbgNy57J1eLXt2sPyAfaTYAY3tG-Q@mail.gmail.com> you
> write:
> >In practice, I don't know how common it is for clients to consume this
> >header.
>
> They have to if they're adding ARC seals on the way out.
>

Only if the ADMD's particular implementation to pass through the
information from incoming perimeter system to outgoing perimeter system
happens to utilize the A-R header(s) for the purpose of conveying that
information.

--Kurt

--000000000000f2a16e05a268a081
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr">On Fri, Apr 3, 2020 at 1:09 PM John Levin=
e &lt;<a href=3D"mailto:johnl@taugh.com">johnl@taugh.com</a>&gt; wrote:<br>=
</div><div class=3D"gmail_quote"><blockquote class=3D"gmail_quote" style=3D=
"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-le=
ft:1ex">In article &lt;<a href=3D"mailto:CABa8R6sbHLfkzHD4gaPBxQbgNy57J1eLX=
t2sPyAfaTYAY3tG-Q@mail.gmail.com" target=3D"_blank">CABa8R6sbHLfkzHD4gaPBxQ=
bgNy57J1eLXt2sPyAfaTYAY3tG-Q@mail.gmail.com</a>&gt; you write:<br>
&gt;In practice, I don&#39;t know how common it is for clients to consume t=
his<br>
&gt;header.<br>
<br>
They have to if they&#39;re adding ARC seals on the way out.=C2=A0 <br></bl=
ockquote><div><br></div><div>Only if the ADMD&#39;s particular implementati=
on to pass through the information from incoming perimeter system to outgoi=
ng perimeter system happens to utilize the A-R header(s) for the purpose of=
 conveying that information.</div><div><br></div><div>--Kurt</div></div></d=
iv>

--000000000000f2a16e05a268a081--


From nobody Fri Apr  3 13:30:14 2020
Return-Path: <johnl@taugh.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 107DB3A0A45 for <dmarc@ietfa.amsl.com>; Fri,  3 Apr 2020 13:30:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level: 
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1536-bit key) header.d=iecc.com header.b=h9pIxL2u; dkim=pass (1536-bit key) header.d=taugh.com header.b=TQsBXmL2
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lFsEZ2UfxPpm for <dmarc@ietfa.amsl.com>; Fri,  3 Apr 2020 13:30:11 -0700 (PDT)
Received: from gal.iecc.com (gal.iecc.com [IPv6:2001:470:1f07:1126:0:43:6f73:7461]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 553B13A0A42 for <dmarc@ietf.org>; Fri,  3 Apr 2020 13:30:11 -0700 (PDT)
Received: (qmail 79685 invoked from network); 3 Apr 2020 20:30:10 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=iecc.com; h=date:message-id:from:to:cc:subject:in-reply-to:references:mime-version:content-type:user-agent; s=1373f.5e879cd2.k2004; i=johnl-iecc.com@submit.iecc.com; bh=bVI4QqtqZeE9rGwhZWkA8ehb4cUpau3n39dqNEo5RyE=; b=h9pIxL2uP1TiZM7DA2BVPAoYWMWSCqZBHQFEVcf7Y0H6TbDWpScgRYPZPMjW4DWvXE3Py/ErYhMtC+f/jX1/djn5CbIgwfpKFfyG7BEhXfsimfuH1S3jr5s7zlCF3Kl2x3N8Mol2IIgU1zlktNbLTKIo1KzYzXOXBTO0vF1SjxJv9hfHEN5+iU8D8z9uQjNwRMkcnRgOeAAONJbSBvkzC5pAjH7+K3YwOCiKTX5+1p9IJwVCYp3xn4gijAm15xJP
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=taugh.com; h=date:message-id:from:to:cc:subject:in-reply-to:references:mime-version:content-type:user-agent; s=1373f.5e879cd2.k2004; olt=johnl-iecc.com@submit.iecc.com; bh=bVI4QqtqZeE9rGwhZWkA8ehb4cUpau3n39dqNEo5RyE=; b=TQsBXmL25pOxMS//shFrzoaxcehXJOUKtelzHwKSZL+5Bk4M9irNf1WUuM35z1Y9el9jU9oADpWsKOgqOVoH37IaHcQirItJ4YVBaeHBRQLbiDHhSokTI5ND20/XRhG6RvESB9dLenF7Tzle12laRnq3znhVDJhz/T+EkjvD5DZcgGyzcflNC7DWEbQL17ujr9ohonMi9pjDtl6agaPsZl6nkOrg+28QrticeAsRvnKoLQTAArjXQUZ43lcfnXi0
Received: from localhost ([IPv6:2001:470:1f07:1126::78:696d:6170]) by imap.iecc.com ([IPv6:2001:470:1f07:1126::78:696d:6170]) with ESMTPSA (TLS1.3 ECDHE-RSA AES-256-GCM AEAD, johnl@iecc.com) via TCP6; 03 Apr 2020 20:30:09 -0000
Date: 3 Apr 2020 16:30:09 -0400
Message-ID: <alpine.OSX.2.22.407.2004031629030.42355@ary.qy>
From: "John R Levine" <johnl@taugh.com>
To: "Kurt Andersen (b)" <kboth@drkurt.com>
Cc: "dmarc@ietf.org" <dmarc@ietf.org>, "Brandon Long" <blong@google.com>
In-Reply-To: <CABuGu1okw4AD1tjEOe9GAJR+dpbTWB+RojKPZn7VatU1NXzCyg@mail.gmail.com>
References: <CABa8R6sbHLfkzHD4gaPBxQbgNy57J1eLXt2sPyAfaTYAY3tG-Q@mail.gmail.com> <20200403200937.AAFD716FCA1B@ary.qy> <CABuGu1okw4AD1tjEOe9GAJR+dpbTWB+RojKPZn7VatU1NXzCyg@mail.gmail.com>
User-Agent: Alpine 2.22 (OSX 407 2020-02-09)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII; format=flowed
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/5cHp5FiTozwxp6fZyxAyJtxiQQM>
Subject: Re: [dmarc-ietf] Spirit of RFC8601 section 5 for invalid A-R headers
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 Apr 2020 20:30:13 -0000

>>> In practice, I don't know how common it is for clients to consume this
>>> header.
>>
>> They have to if they're adding ARC seals on the way out.
>
> Only if the ADMD's particular implementation to pass through the
> information from incoming perimeter system to outgoing perimeter system
> happens to utilize the A-R header(s) for the purpose of conveying that
> information.

It would seem pretty perverse to create an AAR header with exactly the 
same info as the AR header by ignoring the AR header.  But whatever.

Regards,
John Levine, johnl@taugh.com, Taughannock Networks, Trumansburg NY
Please consider the environment before reading this e-mail. https://jl.ly


From nobody Fri Apr  3 13:41:54 2020
Return-Path: <rfc@arcsin.de>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 50C283A0A38 for <dmarc@ietfa.amsl.com>; Fri,  3 Apr 2020 13:41:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level: 
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=arcsin.de
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Apt4TeBrjZ8Y for <dmarc@ietfa.amsl.com>; Fri,  3 Apr 2020 13:41:43 -0700 (PDT)
Received: from scalar.arcsin.de (scalar.arcsin.de [185.162.250.16]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 816CF3A0A79 for <dmarc@ietf.org>; Fri,  3 Apr 2020 13:41:43 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=arcsin.de; h= content-transfer-encoding:content-language:content-type :content-type:in-reply-to:mime-version:date:date:message-id:from :from:references:subject:subject:x-amavis-category; s=dkim01; t= 1585946500; x=1587760901; bh=sEAS8xQWRc41rC3i3dxwHVmgiK6dLgYwOpa d2h/Ui2Y=; b=w5iBndTTXJvtMhu6xeA55JQL0NrQS9/0qfhj387pF9J0ydjBP2f XLndPnupdB10GAndzeT+70TokjWQBVxwjK6mlHppjxwhRmUaZQ2w9moUSC59nTmW FJkSY1WP84XZgsRdxkBy5NYUYlirgp8h3HbX+0DF/x3VjdmDL7AUcfSc=
X-Amavis-Category: scalar.arcsin.de; category=CleanTag
To: dmarc@ietf.org
References: <e2bd3117-2217-1206-0c0c-f06a35d49dca@arcsin.de> <CABa8R6sbHLfkzHD4gaPBxQbgNy57J1eLXt2sPyAfaTYAY3tG-Q@mail.gmail.com>
From: Damian Lukowski <rfc@arcsin.de>
Message-ID: <0fbab9d5-d00e-42ff-3059-8cb269ff1591@arcsin.de>
Date: Fri, 3 Apr 2020 22:42:23 +0200
MIME-Version: 1.0
In-Reply-To: <CABa8R6sbHLfkzHD4gaPBxQbgNy57J1eLXt2sPyAfaTYAY3tG-Q@mail.gmail.com>
Content-Type: text/plain; charset=utf-8
Content-Language: en-US
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/f1BgbH38hL4QnpckzNBlk3CaNMM>
Subject: Re: [dmarc-ietf] Spirit of RFC8601 section 5 for invalid A-R headers
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 Apr 2020 20:41:45 -0000

> The system should remove the quotes when comparing, and should also do
> any decoding to get the admds into the same format.

My question's intent was not particularly about the quotes and UTF-8, I
just chose it, because the syntactically invalid version looks more
legit than the syntactically valid one. Assume some plain-ASCII
examples. A mail system with own authservid of domain.tld receives mail
with:

> Authentication-Results: domain.tld; spf=pass smtp.mailfrom=x@y.z

Needs to be removed? Clearly yes.

> Authentication-Results: otherdomain.tld; spf=pass smtp.mailfrom=x@y.z

Needs to be removed? Clearly no.

> Authentication-Results: {garbage}

Needs to be removed? I say no.

> Authentication-Results: domain.tld, spf=pass smtp.mailfrom=x@y.z

Needs to be removed? I say no.

> Authentication-Results: domain.tld; {garbage}

Needs to be removed? I say no.

> Authentication-Results: "domain.tld"; {garbage}

Needs to be removed? I say no.

> Authentication-Results: "domain.tld"; spf=pass smtp.mailfrom=x@y.z

Needs to be removed? Yes.


From nobody Fri Apr  3 13:53:20 2020
Return-Path: <rfc@arcsin.de>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D07313A0AB3 for <dmarc@ietfa.amsl.com>; Fri,  3 Apr 2020 13:53:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level: 
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=arcsin.de
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ScqHwASSAHtN for <dmarc@ietfa.amsl.com>; Fri,  3 Apr 2020 13:53:17 -0700 (PDT)
Received: from scalar.arcsin.de (scalar.arcsin.de [185.162.250.16]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C1F643A0AAD for <dmarc@ietf.org>; Fri,  3 Apr 2020 13:53:16 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=arcsin.de; h= content-transfer-encoding:content-language:content-type :content-type:in-reply-to:mime-version:date:date:message-id:from :from:references:subject:subject:x-amavis-category; s=dkim01; t= 1585947194; x=1587761595; bh=Ri3mykdd2xiN0Ix+1U+S2fyva4eLyaX0D5+ P/AG8gpw=; b=gnbJgRy6Lzl6rZZAs+bFfPYuxHNH4ItTiQI0waynqYyVOnA4XBI fjPTU6YoBgoBdmHKDeNje8LBei6LdfLTRL7QJbEA3XlRRW40avgiOuV8l3IdOlVa dMwmyaMPvRWXUTnzAHLcx5jab7zd+b1Yn85wh5reFOONPWEl96KbuGsM=
X-Amavis-Category: scalar.arcsin.de; category=CleanTag
To: dmarc@ietf.org
References: <20200403200526.DDAD616FC9A3@ary.qy>
From: Damian Lukowski <rfc@arcsin.de>
Message-ID: <cbda91cc-ef04-84d6-e6af-4f69c24a368b@arcsin.de>
Date: Fri, 3 Apr 2020 22:53:57 +0200
MIME-Version: 1.0
In-Reply-To: <20200403200526.DDAD616FC9A3@ary.qy>
Content-Type: text/plain; charset=utf-8
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/VX6EqH639d_pImdWDSiwG4Myz1E>
Subject: Re: [dmarc-ietf] Spirit of RFC8601 section 5 for invalid A-R headers
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 Apr 2020 20:53:19 -0000

> Honestly, it doesn't matter.  The only A-R headers you can trust are
> the ones that your own system added, and the point of that text is
> that you should delete ones that look like yours but that you didn't
> add.

How can a MUST not matter? My personal interest in this area is what
needs to be done according to the specification, which unfortunately
uses a metaphoric verb for the condition of the MUST.


From nobody Sun Apr  5 18:10:49 2020
Return-Path: <noreply@ietf.org>
X-Original-To: dmarc@ietf.org
Delivered-To: dmarc@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id AABE83A0A8B; Sun,  5 Apr 2020 18:10:31 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: Dale Worley via Datatracker <noreply@ietf.org>
To: <gen-art@ietf.org>
Cc: dmarc@ietf.org, draft-ietf-dmarc-psd.all@ietf.org, last-call@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.124.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <158613543159.15216.5517593808552135017@ietfa.amsl.com>
Reply-To: Dale Worley <worley@ariadne.com>
Date: Sun, 05 Apr 2020 18:10:31 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/0SG2-c3BnOakafKWnseuMKXBVIE>
Subject: [dmarc-ietf] Genart last call review of draft-ietf-dmarc-psd-08
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 06 Apr 2020 01:10:32 -0000

Reviewer: Dale Worley
Review result: Ready with Issues

I am the assigned Gen-ART reviewer for this draft.  The General Area
Review Team (Gen-ART) reviews all IETF documents being processed by
the IESG for the IETF Chair.  Please treat these comments just like
any other last call comments.

For more information, please see the FAQ at

<https://trac.ietf.org/trac/gen/wiki/GenArtfaq>.

Document:  review-draft-ietf-dmarc-psd-08
Reviewer:  Dale R. Worley
Review Date:  2020-04-05
IETF LC End Date:  2020-04-08
IESG Telechat date:  not known

* Summary:

       This draft is on the right track but has open issues, described
       in the review.

* Major issues:

The privacy concerns described in section 4 are written as if there is
no certainty that the mechanisms described in the document properly
mitigate them.  So the document appears to be incomplete.  OTOH, since
this is an Experimental RFC, such mitigation isn't necessary if there
is commitment to do so later.  In that case, the section should
explicitly state that these are open issues and that there is an
intention of revising the document to mitigate them.

The text suggests that a mail receiver(?) that does DMARC processing
has knowledge of all PSDs.  This seems a priori unlikely and even
impossible to implement.  So this ought to be either explained at the
appropriate place or resolved technically.

* Minor issues:

The document has the (common) editorial problem that it is written by
people who are deeply familiar with the subject, and it's difficult to
read if one doesn't share that familiarity.  This is particularly
significant because DMARC is an e-mail facility that (ideally) will
affect all e-mail that is sent, so the target audience really should
be anyone who has a basic understanding of e-mail.  Three particular
elements of this are:

- It would be very helpful if the Introduction could state, in a few
  sentences, the purpose and operation of DMARC, thus informing the
  reader of the framework whose deficiencies this document attempts to
  address.  In particular, one shouldn't have to read the DMARC RFCs
  to be able to read this document and understand its general import.

- The "experiment" appendixes are unclear about what the experiments
  actually are:  what questions they are to answer, what actions will
  be taken, how the results will be evaluated.  Starting each appendix
  with an overview paragraph would be helpful.

- Forward references should be minimized so that a reader can
  understand the document in one pass.

As a derivative of the first of these elements, the terminology used
for the properties of domain names is not clearly defined.  In
particular, where does a registration "occur"?  The only term for
which I think the general audience possesses an unambiguous definition
is "the registered domain name", e.g. ietf.org.  Now I *think* its PSD
is ".org", but it might be "ietf.org", and I don't know whether the
registration of ietf.org "occurs" at ietf.org or .org.  Further points
I didn't understand are pointed out in the review of the
Abstract and Introduction.

* Nits/editorial comments: 

Abstract

I'm having quite a bit of difficulty figuring out exactly what the
Abstract means.  I'm sure that the working group clearly understands
what is meant, but the writing is just loose enough that I can't fix
the meaning.  To raise the immediate questions:

   DMARC (Domain-based Message Authentication, Reporting, and
   Conformance) is a scalable mechanism by which a mail-originating
   organization can express domain-level policies and preferences for
   message validation, disposition, and reporting, that a mail-receiving
   organization can use to improve mail handling.

This sentence is quite good, as it introduces what DMARC is all about.

   The design of DMARC
   presumes that domain names represent either nodes in the tree below
   which registrations occur, or nodes where registrations have
   occurred; it does not permit a domain name to have both of these
   properties simultaneously.

You want to make clear here that "registration" means "domain name
ownership registration" (which is what section 2.2 says).  Otherwise
it leaves open that there is some sort of DMARC registration that you
might intend, until the reader gets to section 2.2.

There's an ambiguity regarding "where" a registration happens.  E.g.,
does the registration of "ietf.org" "occur at" "ietf.org" or "occur
at" "org"?  It's possible that this could be simplified/disambiguated
by not using this term, but instead phrasing this in terms of domain
names that "are registered", and the allowed relationships between
them.

And it appears certain that there are DNS nodes where registrations
are only done *above* that node, e.g. "datatracker.ietf.org", which
this sentence (if taken literally) says is not permitted by DMARC.  Is
the property you want to declare "one node where registrations are
done cannot exist below another node where registrations are done"?

Or perhaps domain names like "datatracker.ietf.org" are of no interest
to DMARC because DMARC is never applied to messages for which that is
the relevant address?

   Since its deployment in 2015, use of
   DMARC has shown a clear need for the ability to express policy for
   these domains as well.

This sentence doesn't make it clear what "these domains" refers to.

   Domains at which registrations can occur are referred to as Public
   Suffix Domains (PSDs).  This document describes an extension to DMARC
   to enable DMARC functionality for PSDs.

It would probably be clearer to use "domain name ownership
registrations" again here.

This sentence suggests that the registration of "ietf.org" "occurs at"
"org" and so "org" is a PSD.

   This document also seeks to address implementations that consider a
   domain on a public Suffix list to be ineligible for DMARC
   enforcement.

This suggests that implementations believe that they know of all PSDs,
so they can "consider them ineligible for DMARC enforcement".  But
it's hard to imagine that that they can know that they know of all
PSDs.

An additional point, and I'm not sure how valuable this is, would be
to clarify "I'm holding an e-mail message in my hands.  What do I do
next?", that is, What address in the message is the domain whose DMARC
information is applied to the message?  And what indeed does DMARC
processing do to a message?  For most of the sentences of the
Abstract, this is not important, but it leaves the effect of the last
sentence unclear, as "DMARC is not enforced on messages whose *sender*
is in a PSD" is quite a bit different from "DMARC is not enforced on
messages whose *recipient* is in a PSD".  (Section 3.3 suggests that
the address in the From header of the message is the one that is used
for DMARC processing.)

It's unclear what exactly is the contents of a "public suffix list".
Naively, it appears that it is the list of domain names under which
names can be registered, but the text uses the term in the plural, so
there must be some additional structure.

Also, it seems there are some significant privacy matters addressed by
this document, and it's probably worth adding a sentence to notify the
reader of that.

1.  Introduction

A number of the questions about the Abstract apply to the Introduction
as well.  But generally, since e-mail is a subject that every reader
has a basic knowledge of, it would be useful to write the introduction
so that one did not have to have a knowledge of the DMARC architecture
to understand the introduction.

   "gov.example" publishes the following DMARC record:

   "v=DMARC1; p=reject; rua=mailto:dmarc@dmarc.service.gov.example"

   at

   _dmarc.gov.example.

Even better would be this aid to people who don't already know DMARC
implementation:

   "gov.example" publishes the following DMARC DNS record:

   _dmarc.gov.example.  TXT \
	"v=DMARC1; p=reject; rua=mailto:dmarc@dmarc.service.gov.example"

--

   the non-existent organizational domain of @tax.gov.example

I suspect you mean "t4x.gov.example" here.

   This document provides a simple extension to DMARC [RFC7489] to
   allow [...]

This sentence lists 4 important items, each of which is fairly long,
which together are the summary of the whole document, so it might be
useful to break this into a bullet-list.

2.  Terminology and Definitions

   In many cases the public portion of the DNS tree is [...]

What does "the public portion" mean?  I'm guessing it means "the names
not available for private registration", but you should be unambiguous
here.

   They are not available for private
   registration.  In many cases the public portion of the DNS tree is
   more than one level deep.

It seems like these two sentences are redundant and the flow of the
paragraph would be better if they were removed. ... Actually once they
are removed, it reveals that the next two sentences largely duplicate
the first two sentences of the paragraph.

   2.3.  Longest PSD

   The longest PSD is the Organizational Domain with one label removed.

   2.4.  Organizational Domain

   The term Organizational Domains is defined in DMARC [RFC7489]
   Section 3.2.

2.4 should be moved ahead of 2.3 to avoid a forward-reference.  But it
would be really helpful if the definition of Organizational Domain was
either summarized here or completely copied from RFC7489.  In
particular, if Organizational Domain is not the same as registered
domain name, that should be flagged.

   2.5.  Public Suffix Operator (PSO)

   A Public Suffix Operator manages operations within its PSD.

Better to explicitly define the possession relationship explicitly:

   A Public Suffix Operator is an organization which manages
   operations within a PSD, particularly the DNS records published for
   names at and under that domain name.

--

   2.6.  PSO Controlled Domain Names

   PSO Controlled Domain Names are names in the DNS that are managed by
   a PSO and are not available for use as Organizational Domains.
   Depending on PSD policy, these will have one (e.g., ".com") or more
   (e.g., ".co.uk") name components.

The second sentence is odd; is it useful?  Is it just to say "PSO
Controlled Domain Names may have one or more components."?

   3.1.  General Updates

   References to "Domain Owners" also apply to PSOs.

This change really ought to be localized to a specific textual change
somewhere in RFC 7489, in the say way that the other changes are
specific amendments to the DMARC algorithm.

   3.2.  Section 6.3 General Record Format

These section titles are difficult to read.  At first I thought there
was some typographical problem.  But you could clarify this as "3.2.
Updates to Section 6.3.  General Record Format".  Similarly for the
other subsections of section 3.

3.3.  Section 6.5.  Domain Owner Actions

   The mechanism for doing so is one of the
   experimental elements of this document.

I think that what this means is that the whole document is an
experimental "mechanism for doing so".  If so, I think it could be
better phrased

   This document is an experimental mechanism for doing so.

--

   3.4.  Section 6.6.1.  Extract Author Domain

   [...] when the domain name extracted by the receiver (from the
   RFC5322.From) is on the public suffix list used by the receiver.

This touches the question above about what a public suffix list is,
and how there can be more than one of them.  But without that
knowledge, it's hard to see which PSL is "used" by the receiver of the
message.

Also, it's not clear to me how *this* document creates a capability
which applies to domains that are on the PSL.  E.g., if an "np" is
defined for ".org", it applies to (that is, affects processing of
e-mail from) any "X.org" that doesn't have its own DMARC records.  But
I don't see how an "np" tag for ".org" affects processing of messages
from "example@org".

   3.5.  Section 6.6.3.  Policy Discovery

      (discussed in the experiment description
      (Appendix A))

Given that this text is nominally an update to the text of RFC 7489,
you want to disambiguate the binding of "Appendix A":

      (discussed in the experiment description
      ([this document] Appendix A))

   3.6.  Section 7.  DMARC Feedback

   See Section 4 of this document for discussion of Privacy
   Considerations.

Similarly to section 3.5, but also clarifying the scope of "privacy
considerations":

   See Section 4 of [this document] for discussion of Privacy
   Considerations for PSD DMARC.

   4.  Privacy Considerations

   The Privacy Considerations of [RFC7489] apply to this document.

This could be clarified as

   Additionally, the Privacy Considerations of [RFC7489] apply to the
   mechanisms described by this document.

--

   Providing feedback reporting to PSOs can, in some cases, create
   leakage of information outside of an organization to the PSO.

"outside" probably isn't the word you want to use here, as it is
easier to read "outside" as giving the original location of
"information" than to read "outside" as giving the direction of
"leakage".  Perhaps

   Providing feedback reporting to PSOs can, in some cases, create
   leakage of information out of an organization to the PSO of its
   domain name.

--

   To minimize this potential concern,
   PSD DMARC feedback is best limited to Aggregate Reports.  [...]

   [...] any Feedback Reporting related to multi-
   organizational PSDs ought to be limited to non-existent domains
   except in cases where the reporter knows that PSO requires use of
   DMARC.

I can't see where in the document that these principles are turned
into MUST statements that ensure the privacy issues are solved.

   The experiment is to evaluate different possible approaches.

Calling this an "experiment" suggests that these is an intended series
of actions whose result will answer the listed questions.  But there
doesn't seem to be any such actions listed.  The description makes it
sound like what is intended is continuing discussions in the working
group, but that wouldn't be an "experiment".

A.2.  Non-Existent Subdomain Policy

Similar questions arise for this section.  The second paragraph
suggests that the experiment is to see whether the "np" tag is
successful.

   There are also
   suggestions that it would be more generally useful for DMARC.

What does "it" refer to?  (Does it mean "this ability"?)

Appendix B.  DMARC PSD Registry Examples

In this appendix, it appears that the contents of the experiment are
clear in the authors' minds, but there is no summary at the top that
states what the experimental facilities are and the "big picture" into
which they fit.

Appendix C.  Implementations

   C.1.  Authheaders Module

What e-mail MTA is Authheaders an extension for?

[END]




From nobody Mon Apr  6 08:55:38 2020
Return-Path: <vesely@tana.it>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 402803A0B49 for <dmarc@ietfa.amsl.com>; Mon,  6 Apr 2020 08:55:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.12
X-Spam-Level: 
X-Spam-Status: No, score=-2.12 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1152-bit key) header.d=tana.it
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DUbZtyIIaHf8 for <dmarc@ietfa.amsl.com>; Mon,  6 Apr 2020 08:55:17 -0700 (PDT)
Received: from wmail.tana.it (wmail.tana.it [62.94.243.226]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 341F73A0B22 for <dmarc@ietf.org>; Mon,  6 Apr 2020 08:55:08 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=tana.it; s=delta; t=1586188506; bh=wgUEq4Hb3+3EPtSmABe+PzotnI5GCoXPSuC9Ws+JDN4=; l=2473; h=To:References:From:Date:In-Reply-To; b=DDHpSmtNlEup8VlrcSzlPDCufZTHbJvnp9sgov2lOklPjZRV7KnZOr7qdsjsAftth duk16J1ROTcHI+WQ6aAls034xZ7XIwpVWIqLH0M0WPwuTGkJFluQmwzWqLTITcpnGF mKMIod4NsD0HgJzdhwkjN3eILQmaYukm00She+YXIDe3hf1xoRwmZwqkOuKyX
Authentication-Results: tana.it; auth=pass (details omitted)
Received: from [172.25.197.111] (pcale.tana [172.25.197.111]) (AUTH: CRAM-MD5 uXDGrn@SYT0/k, TLS: TLS1.2, 128bits, ECDHE_RSA_AES_128_GCM_SHA256) by wmail.tana.it with ESMTPSA id 00000000005DC056.000000005E8B50DA.00000BA8; Mon, 06 Apr 2020 17:55:06 +0200
To: dmarc@ietf.org
References: <e2bd3117-2217-1206-0c0c-f06a35d49dca@arcsin.de> <CABa8R6sbHLfkzHD4gaPBxQbgNy57J1eLXt2sPyAfaTYAY3tG-Q@mail.gmail.com> <0fbab9d5-d00e-42ff-3059-8cb269ff1591@arcsin.de>
From: Alessandro Vesely <vesely@tana.it>
Message-ID: <7084d678-ce11-fa3f-8b59-67e46da841f7@tana.it>
Date: Mon, 6 Apr 2020 17:55:06 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.6.0
MIME-Version: 1.0
In-Reply-To: <0fbab9d5-d00e-42ff-3059-8cb269ff1591@arcsin.de>
Content-Type: text/plain; charset=utf-8
Content-Language: en-US
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/fybtPjDE2jOEAOCMArS7KUEWHOg>
Subject: Re: [dmarc-ietf] Spirit of RFC8601 section 5 for invalid A-R headers
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 06 Apr 2020 15:55:20 -0000

On Fri 03/Apr/2020 22:42:23 +0200 Damian Lukowski wrote:
>> The system should remove the quotes when comparing, and should also do
>> any decoding to get the admds into the same format.
> 
> My question's intent was not particularly about the quotes and UTF-8, I
> just chose it, because the syntactically invalid version looks more
> legit than the syntactically valid one. Assume some plain-ASCII
> examples. A mail system with own authservid of domain.tld receives mail
> with:


My system, my rules:


>> Authentication-Results: domain.tld; spf=pass smtp.mailfrom=x@y.z
> 
> Needs to be removed? Clearly yes.


Yes, and log it.


>> Authentication-Results: otherdomain.tld; spf=pass smtp.mailfrom=x@y.z
> 
> Needs to be removed? Clearly no.


Rename the header field to Old-Authentication-Results anyway.


>> Authentication-Results: {garbage}
> 
> Needs to be removed? I say no.


Rename the header field to Old-Authentication-Results anyway.


>> Authentication-Results: domain.tld, spf=pass smtp.mailfrom=x@y.z
> 
> Needs to be removed? I say no.


Yes, and log it.


>> Authentication-Results: domain.tld; {garbage}
> 
> Needs to be removed? I say no.


Yes, and log it.


>> Authentication-Results: "domain.tld"; {garbage}
> 
> Needs to be removed? I say no.
> 
>> Authentication-Results: "domain.tld"; spf=pass smtp.mailfrom=x@y.z
> 
> Needs to be removed? Yes.


Both cases are renamed to Old-Authentication-Results anyway.  The part that
would log it, however, doesn't recognize the quotes (I'm going to fix it now)
and intermittently removes the header.

Note that some tools, e.g. Thunderbird DKIM-Verifier[*] can be configured to
either "Read Authentication-Results header" or not.  Hence is makes sense to
rename all on entry.

Note2: even if a tool accepted a list of trusted authserv-id's, consider a MUA
simultaneously accessing two mailboxes, at example.com and example.org, say.
Of course you would configure the tool to trust both of their authserv-id
(which is already beyond what an average user is willing to configure).  Then,
a malicious party can send you a message at your @example.com address, bearing
a faked Authentication-Results by example.org.  Should the tool trust it?


jm2c
Ale
-- 

[*]
https://www.reddit.com/r/Thunderbird/comments/5nheej/is_it_possible_to_make_thunderbird_display_the/
(The "Edit 2" is bogus, but the previous edit describes the point well.)


























From nobody Mon Apr  6 10:22:23 2020
Return-Path: <tjw.ietf@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 96E9F3A0B14 for <dmarc@ietfa.amsl.com>; Mon,  6 Apr 2020 10:22:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level: 
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LyrEf4PmfmJp for <dmarc@ietfa.amsl.com>; Mon,  6 Apr 2020 10:22:09 -0700 (PDT)
Received: from mail-ot1-x332.google.com (mail-ot1-x332.google.com [IPv6:2607:f8b0:4864:20::332]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 88EBB3A0B0C for <dmarc@ietf.org>; Mon,  6 Apr 2020 10:22:09 -0700 (PDT)
Received: by mail-ot1-x332.google.com with SMTP id l23so153147otf.3 for <dmarc@ietf.org>; Mon, 06 Apr 2020 10:22:09 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=RRMxtb1si+gqF4f0BolhUhB6X4hTWgNY9OyKiQ3O7j4=; b=ubPqa9Sulz+rwb8AN43I4QC2oe4LGwxrzWyURwzGGV8rkZXNCcv12pl0bwPRVPpNkU 46EyfOZlY+Sv3jGhw7NldDdDaL8cDqCBGw3aDyIH7cJzEI5s1vZZYggwwoZk5AmemN34 Nl4ufaqXTZdnrJiJBZagikHUqbbHawEylQUzP41OshPghls0Ypgt8CbWDRGz39ECdY9J tbM8JTCYbk490BfMn9+wz7VHiH5Zr5NieGKthjShtRQZ+f8R7KqG77DYuseWNletoyLd aopvo0r0t6dpRED5xS3o8eExpINJQmUXI//XkUMZQzsv+YXrS64N3gJ7E0NNR7Q3ed7G DJig==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=RRMxtb1si+gqF4f0BolhUhB6X4hTWgNY9OyKiQ3O7j4=; b=XoSPoFH+IoFRsjpY1ZwJ3HIuxXGqmf1Q+pPjrXnyCaaL2EQv2tt/xI/PaC8XYoSCpx XYjDwUHC7box5Ti5T/uDO5NbLPQQrvNJHBdR++nxa5UIl2SymteCLhOYOc+Nq8Ss3d30 WItcm5eEZ3GOKoDr9T55utmaE3kscHGEahmGZW31oGJYpoaAKPZftpfOgCV+/SWruCx/ m5sA/rh/bW4Bi5uGB/H/5ri1s1aP9Wi3drUg538XWFnESP2XYlSNP3CPtCiFQPW3q6uG 9NzuOLJ+BbxXlh9zKwHLz0hJuxAL5NvfcHw38M7JPVUvmV46veMZHOE6W6LaJoE5we4V BHsA==
X-Gm-Message-State: AGi0PubAdtL7q+xHcoc+l/ZS0m7lrNK7HF0i3s/3J53S1beZCgzSY8Zd 7+Q7QdP88h/joWDgiZ5PeC9CWKIhDxkymDhA0tD1trvD
X-Google-Smtp-Source: APiQypJ5KySzOMmU9KQ/c5+BV8TF8wXwxeHOHVEqBQz5mGXmsQQmt8ZeqzdBT5rvfhHTJ1LMOJFzaWnL8XdqN31eq8o=
X-Received: by 2002:a9d:1988:: with SMTP id k8mr129540otk.4.1586193728532; Mon, 06 Apr 2020 10:22:08 -0700 (PDT)
MIME-Version: 1.0
References: <158619357716.2395.9626087376923274203@ietfa.amsl.com>
In-Reply-To: <158619357716.2395.9626087376923274203@ietfa.amsl.com>
From: Tim Wicinski <tjw.ietf@gmail.com>
Date: Mon, 6 Apr 2020 13:21:56 -0400
Message-ID: <CADyWQ+HKt5opYUaKjGCCFrB2+4BAXrHOC+x+BS2WZVZp20v6Vg@mail.gmail.com>
To: IETF DMARC WG <dmarc@ietf.org>
Cc: "Murray S. Kucherawy" <superuser@gmail.com>, Elizabeth Zwicky <zwicky@verizonmedia.com>
Content-Type: multipart/alternative; boundary="000000000000bbf4dc05a2a2810e"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/TcdeF_v6hix5RYmepvbQXra5Zrs>
Subject: Re: [dmarc-ietf] New Version Notification for draft-kucherawy-dmarc-dmarcbis-01.txt
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 06 Apr 2020 17:22:12 -0000

--000000000000bbf4dc05a2a2810e
Content-Type: text/plain; charset="UTF-8"

Updates to draft-kucherawy-dmarc-dmarcbis


    updated IANA Considerations to reflect new DNS Underscore Registry
https://trac.ietf.org/trac/dmarc/ticket/36

    Moved xml schema to own versioned document

    Fixed internal cross reference issue

    Edits to escape _ properly

    Fixed references to RFC6651

    Updated Obsolete References https://trac.ietf.org/trac/dmarc/ticket/35


I also pulled the ABNF out into its own file, and I've been looking at a
few of the tickets

around updating the ABNF, and how we could validate it.   This led to a
long discussion with

Mr. Levine about a better way to track external references to ABNF objects.

There are several tickets related to ABNF and several related to the XML,
and that's before

we go through the document itself.


the XML schema has several issues in the issue tracker, and it seemed to
make sense to pull it out so it can also be referenced by others.  Very
useful discussions with Mr.  Vesely and Mr. Levine on versioning the XML
schema and some of the open issues



https://github.com/moonshiner/draft-kucherawy-dmarc-dmarcbis

On Mon, Apr 6, 2020 at 1:19 PM <internet-drafts@ietf.org> wrote:

>
> A new version of I-D, draft-kucherawy-dmarc-dmarcbis-01.txt
> has been successfully submitted by Tim Wicinski and posted to the
> IETF repository.
>
> Name:           draft-kucherawy-dmarc-dmarcbis
> Revision:       01
> Title:          Domain-based Message Authentication, Reporting, and
> Conformance (DMARC)
> Document date:  2020-04-06
> Group:          Individual Submission
> Pages:          73
> URL:
> https://www.ietf.org/internet-drafts/draft-kucherawy-dmarc-dmarcbis-01.txt
> Status:
> https://datatracker.ietf.org/doc/draft-kucherawy-dmarc-dmarcbis/
> Htmlized:
> https://tools.ietf.org/html/draft-kucherawy-dmarc-dmarcbis-01
> Htmlized:
> https://datatracker.ietf.org/doc/html/draft-kucherawy-dmarc-dmarcbis
> Diff:
> https://www.ietf.org/rfcdiff?url2=draft-kucherawy-dmarc-dmarcbis-01
>
> Abstract:
>    Domain-based Message Authentication, Reporting, and Conformance
>    (DMARC) is a scalable mechanism by which a mail-originating
>    organization can express domain-level policies and preferences for
>    message validation, disposition, and reporting, that a mail-receiving
>    organization can use to improve mail handling.
>
>    Originators of Internet Mail need to be able to associate reliable
>    and authenticated domain identifiers with messages, communicate
>    policies about messages that use those identifiers, and report about
>    mail using those identifiers.  These abilities have several benefits:
>    Receivers can provide feedback to Domain Owners about the use of
>    their domains; this feedback can provide valuable insight about the
>    management of internal operations and the presence of external domain
>    name abuse.
>
>    DMARC does not produce or encourage elevated delivery privilege of
>    authenticated email.  DMARC is a mechanism for policy distribution
>    that enables increasingly strict handling of messages that fail
>    authentication checks, ranging from no action, through altered
>    delivery, up to message rejection.
>
>    This document obsoletes RFC 7489.
>
>
>
>
> Please note that it may take a couple of minutes from the time of
> submission
> until the htmlized version and diff are available at tools.ietf.org.
>
> The IETF Secretariat
>
>
>

--000000000000bbf4dc05a2a2810e
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div class=3D"gmail_default" style=3D"">





<p class=3D"gmail-p1" style=3D"font-family:&quot;Helvetica Neue&quot;;margi=
n:0px;font-variant-numeric:normal;font-variant-east-asian:normal;font-stret=
ch:normal;font-size:15.7px;line-height:normal"><br></p><p class=3D"gmail-p1=
" style=3D"font-family:&quot;Helvetica Neue&quot;;margin:0px;font-variant-n=
umeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:=
15.7px;line-height:normal"><br></p><p class=3D"gmail-p1" style=3D"margin:0p=
x;font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:n=
ormal;line-height:normal"><font face=3D"Helvetica Neue"><span style=3D"font=
-size:15.7px">Updates</span></font><span class=3D"gmail-Apple-converted-spa=
ce" style=3D"font-family:&quot;Helvetica Neue&quot;;font-size:15.7px">=C2=
=A0to</span>=C2=A0draft-kucherawy-dmarc-dmarcbis</p>
<p class=3D"gmail-p2" style=3D"font-family:&quot;Helvetica Neue&quot;;margi=
n:0px;font-variant-numeric:normal;font-variant-east-asian:normal;font-stret=
ch:normal;font-size:15.7px;line-height:normal;min-height:18px"><br></p>
<p class=3D"gmail-p1" style=3D"font-family:&quot;Helvetica Neue&quot;;margi=
n:0px;font-variant-numeric:normal;font-variant-east-asian:normal;font-stret=
ch:normal;font-size:15.7px;line-height:normal"><span class=3D"gmail-Apple-c=
onverted-space">=C2=A0 =C2=A0 </span>updated IANA Considerations to reflect=
 new DNS Underscore Registry <a href=3D"https://trac.ietf.org/trac/dmarc/ti=
cket/36">https://trac.ietf.org/trac/dmarc/ticket/36</a></p>
<p class=3D"gmail-p1" style=3D"font-family:&quot;Helvetica Neue&quot;;margi=
n:0px;font-variant-numeric:normal;font-variant-east-asian:normal;font-stret=
ch:normal;font-size:15.7px;line-height:normal"><span class=3D"gmail-Apple-c=
onverted-space">=C2=A0 =C2=A0 </span>Moved xml schema to own versioned docu=
ment</p>
<p class=3D"gmail-p1" style=3D"font-family:&quot;Helvetica Neue&quot;;margi=
n:0px;font-variant-numeric:normal;font-variant-east-asian:normal;font-stret=
ch:normal;font-size:15.7px;line-height:normal"><span class=3D"gmail-Apple-c=
onverted-space">=C2=A0 =C2=A0 </span>Fixed internal cross reference issue</=
p>
<p class=3D"gmail-p1" style=3D"font-family:&quot;Helvetica Neue&quot;;margi=
n:0px;font-variant-numeric:normal;font-variant-east-asian:normal;font-stret=
ch:normal;font-size:15.7px;line-height:normal"><span class=3D"gmail-Apple-c=
onverted-space">=C2=A0 =C2=A0 </span>Edits to escape _ properly</p>
<p class=3D"gmail-p1" style=3D"font-family:&quot;Helvetica Neue&quot;;margi=
n:0px;font-variant-numeric:normal;font-variant-east-asian:normal;font-stret=
ch:normal;font-size:15.7px;line-height:normal"><span class=3D"gmail-Apple-c=
onverted-space">=C2=A0 =C2=A0 </span>Fixed references to RFC6651</p>
<p class=3D"gmail-p1" style=3D"font-family:&quot;Helvetica Neue&quot;;margi=
n:0px;font-variant-numeric:normal;font-variant-east-asian:normal;font-stret=
ch:normal;font-size:15.7px;line-height:normal"><span class=3D"gmail-Apple-c=
onverted-space">=C2=A0 =C2=A0 </span>Updated Obsolete References <a href=3D=
"https://trac.ietf.org/trac/dmarc/ticket/35">https://trac.ietf.org/trac/dma=
rc/ticket/35</a></p>
<p class=3D"gmail-p2" style=3D"font-family:&quot;Helvetica Neue&quot;;margi=
n:0px;font-variant-numeric:normal;font-variant-east-asian:normal;font-stret=
ch:normal;font-size:15.7px;line-height:normal;min-height:18px"><br></p>
<p class=3D"gmail-p1" style=3D"font-family:&quot;Helvetica Neue&quot;;margi=
n:0px;font-variant-numeric:normal;font-variant-east-asian:normal;font-stret=
ch:normal;font-size:15.7px;line-height:normal">I also pulled the ABNF out i=
nto its own file, and I&#39;ve been looking at a few of the tickets</p>
<p class=3D"gmail-p1" style=3D"font-family:&quot;Helvetica Neue&quot;;margi=
n:0px;font-variant-numeric:normal;font-variant-east-asian:normal;font-stret=
ch:normal;font-size:15.7px;line-height:normal">around updating the ABNF, an=
d how we could validate it. <span class=3D"gmail-Apple-converted-space">=C2=
=A0 </span>This led to a long discussion with</p>
<p class=3D"gmail-p1" style=3D"font-family:&quot;Helvetica Neue&quot;;margi=
n:0px;font-variant-numeric:normal;font-variant-east-asian:normal;font-stret=
ch:normal;font-size:15.7px;line-height:normal">Mr. Levine about a better wa=
y to track external references to ABNF objects.<span class=3D"gmail-Apple-c=
onverted-space">=C2=A0</span></p>
<p class=3D"gmail-p1" style=3D"font-family:&quot;Helvetica Neue&quot;;margi=
n:0px;font-variant-numeric:normal;font-variant-east-asian:normal;font-stret=
ch:normal;font-size:15.7px;line-height:normal">There are several tickets re=
lated to ABNF and several related to the XML, and that&#39;s before</p>
<p class=3D"gmail-p1" style=3D"font-family:&quot;Helvetica Neue&quot;;margi=
n:0px;font-variant-numeric:normal;font-variant-east-asian:normal;font-stret=
ch:normal;font-size:15.7px;line-height:normal">we go through the document i=
tself.<span class=3D"gmail-Apple-converted-space">=C2=A0</span></p>
<p class=3D"gmail-p2" style=3D"font-family:&quot;Helvetica Neue&quot;;margi=
n:0px;font-variant-numeric:normal;font-variant-east-asian:normal;font-stret=
ch:normal;font-size:15.7px;line-height:normal;min-height:18px"><br></p>
<p class=3D"gmail-p1" style=3D"font-family:&quot;Helvetica Neue&quot;;margi=
n:0px;font-variant-numeric:normal;font-variant-east-asian:normal;font-stret=
ch:normal;font-size:15.7px;line-height:normal">the XML schema has several i=
ssues in the issue tracker, and it seemed to make sense to pull it out so i=
t can also be referenced by others.<span class=3D"gmail-Apple-converted-spa=
ce">=C2=A0 </span>Very useful discussions with Mr.<span class=3D"gmail-Appl=
e-converted-space">=C2=A0 </span>Vesely and Mr. Levine on versioning the XM=
L schema and some of the open issues</p>
<p class=3D"gmail-p2" style=3D"font-family:&quot;Helvetica Neue&quot;;margi=
n:0px;font-variant-numeric:normal;font-variant-east-asian:normal;font-stret=
ch:normal;font-size:15.7px;line-height:normal;min-height:18px"><br></p>
<p class=3D"gmail-p2" style=3D"font-family:&quot;Helvetica Neue&quot;;margi=
n:0px;font-variant-numeric:normal;font-variant-east-asian:normal;font-stret=
ch:normal;font-size:15.7px;line-height:normal;min-height:18px"><br></p>
<p class=3D"gmail-p1" style=3D"font-family:&quot;Helvetica Neue&quot;;margi=
n:0px;font-variant-numeric:normal;font-variant-east-asian:normal;font-stret=
ch:normal;font-size:15.7px;line-height:normal"><a href=3D"https://github.co=
m/moonshiner/draft-kucherawy-dmarc-dmarcbis">https://github.com/moonshiner/=
draft-kucherawy-dmarc-dmarcbis</a></p></div></div><br><div class=3D"gmail_q=
uote"><div dir=3D"ltr" class=3D"gmail_attr">On Mon, Apr 6, 2020 at 1:19 PM =
&lt;<a href=3D"mailto:internet-drafts@ietf.org">internet-drafts@ietf.org</a=
>&gt; wrote:<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px=
 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><br=
>
A new version of I-D, draft-kucherawy-dmarc-dmarcbis-01.txt<br>
has been successfully submitted by Tim Wicinski and posted to the<br>
IETF repository.<br>
<br>
Name:=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0draft-kucherawy-dmarc-dmarcbi=
s<br>
Revision:=C2=A0 =C2=A0 =C2=A0 =C2=A001<br>
Title:=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 Domain-based Message Authenticatio=
n, Reporting, and Conformance (DMARC)<br>
Document date:=C2=A0 2020-04-06<br>
Group:=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 Individual Submission<br>
Pages:=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 73<br>
URL:=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 <a href=3D"https://www.ietf.o=
rg/internet-drafts/draft-kucherawy-dmarc-dmarcbis-01.txt" rel=3D"noreferrer=
" target=3D"_blank">https://www.ietf.org/internet-drafts/draft-kucherawy-dm=
arc-dmarcbis-01.txt</a><br>
Status:=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0<a href=3D"https://datatracker.iet=
f.org/doc/draft-kucherawy-dmarc-dmarcbis/" rel=3D"noreferrer" target=3D"_bl=
ank">https://datatracker.ietf.org/doc/draft-kucherawy-dmarc-dmarcbis/</a><b=
r>
Htmlized:=C2=A0 =C2=A0 =C2=A0 =C2=A0<a href=3D"https://tools.ietf.org/html/=
draft-kucherawy-dmarc-dmarcbis-01" rel=3D"noreferrer" target=3D"_blank">htt=
ps://tools.ietf.org/html/draft-kucherawy-dmarc-dmarcbis-01</a><br>
Htmlized:=C2=A0 =C2=A0 =C2=A0 =C2=A0<a href=3D"https://datatracker.ietf.org=
/doc/html/draft-kucherawy-dmarc-dmarcbis" rel=3D"noreferrer" target=3D"_bla=
nk">https://datatracker.ietf.org/doc/html/draft-kucherawy-dmarc-dmarcbis</a=
><br>
Diff:=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0<a href=3D"https://www.ietf.o=
rg/rfcdiff?url2=3Ddraft-kucherawy-dmarc-dmarcbis-01" rel=3D"noreferrer" tar=
get=3D"_blank">https://www.ietf.org/rfcdiff?url2=3Ddraft-kucherawy-dmarc-dm=
arcbis-01</a><br>
<br>
Abstract:<br>
=C2=A0 =C2=A0Domain-based Message Authentication, Reporting, and Conformanc=
e<br>
=C2=A0 =C2=A0(DMARC) is a scalable mechanism by which a mail-originating<br=
>
=C2=A0 =C2=A0organization can express domain-level policies and preferences=
 for<br>
=C2=A0 =C2=A0message validation, disposition, and reporting, that a mail-re=
ceiving<br>
=C2=A0 =C2=A0organization can use to improve mail handling.<br>
<br>
=C2=A0 =C2=A0Originators of Internet Mail need to be able to associate reli=
able<br>
=C2=A0 =C2=A0and authenticated domain identifiers with messages, communicat=
e<br>
=C2=A0 =C2=A0policies about messages that use those identifiers, and report=
 about<br>
=C2=A0 =C2=A0mail using those identifiers.=C2=A0 These abilities have sever=
al benefits:<br>
=C2=A0 =C2=A0Receivers can provide feedback to Domain Owners about the use =
of<br>
=C2=A0 =C2=A0their domains; this feedback can provide valuable insight abou=
t the<br>
=C2=A0 =C2=A0management of internal operations and the presence of external=
 domain<br>
=C2=A0 =C2=A0name abuse.<br>
<br>
=C2=A0 =C2=A0DMARC does not produce or encourage elevated delivery privileg=
e of<br>
=C2=A0 =C2=A0authenticated email.=C2=A0 DMARC is a mechanism for policy dis=
tribution<br>
=C2=A0 =C2=A0that enables increasingly strict handling of messages that fai=
l<br>
=C2=A0 =C2=A0authentication checks, ranging from no action, through altered=
<br>
=C2=A0 =C2=A0delivery, up to message rejection.<br>
<br>
=C2=A0 =C2=A0This document obsoletes RFC 7489.<br>
<br>
<br>
<br>
<br>
Please note that it may take a couple of minutes from the time of submissio=
n<br>
until the htmlized version and diff are available at <a href=3D"http://tool=
s.ietf.org" rel=3D"noreferrer" target=3D"_blank">tools.ietf.org</a>.<br>
<br>
The IETF Secretariat<br>
<br>
<br>
</blockquote></div>

--000000000000bbf4dc05a2a2810e--


From nobody Tue Apr  7 00:09:13 2020
Return-Path: <rfc@arcsin.de>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 680AB3A17E6 for <dmarc@ietfa.amsl.com>; Tue,  7 Apr 2020 00:09:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level: 
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=arcsin.de
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id t6_bT0mj7wXX for <dmarc@ietfa.amsl.com>; Tue,  7 Apr 2020 00:09:09 -0700 (PDT)
Received: from scalar.arcsin.de (scalar.arcsin.de [185.162.250.16]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3989E3A17E2 for <dmarc@ietf.org>; Tue,  7 Apr 2020 00:09:07 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=arcsin.de; h= content-transfer-encoding:content-language:content-type :content-type:in-reply-to:mime-version:date:date:message-id:from :from:references:subject:subject:x-amavis-category; s=dkim01; t= 1586243342; x=1588057743; bh=9KA/8YL7Mgeb9Uq9rVVhn/LgOITRxddO4fP R6Ou/jhI=; b=I1FzhsYTvB7kUQqdTfBQMG+ikvAd09pOcj8K2dm6PikNhqqCybp Ig+Xru9XCNdo/uNBMDsLseLNb/sCeKpURlPcZOD5lWgSJkGXISCRZaF15mqXnLVU 6Otm5irqDehFVKJrmiydOsFpaR/3YMtfTfpS5PeXMJQk9JidTM3R1g+A=
X-Amavis-Category: scalar.arcsin.de; category=CleanTag
To: dmarc@ietf.org
References: <e2bd3117-2217-1206-0c0c-f06a35d49dca@arcsin.de> <CABa8R6sbHLfkzHD4gaPBxQbgNy57J1eLXt2sPyAfaTYAY3tG-Q@mail.gmail.com> <0fbab9d5-d00e-42ff-3059-8cb269ff1591@arcsin.de> <7084d678-ce11-fa3f-8b59-67e46da841f7@tana.it>
From: Damian Lukowski <rfc@arcsin.de>
Message-ID: <13fd0dec-d02b-b5ca-cee8-a405d891dced@arcsin.de>
Date: Tue, 7 Apr 2020 09:09:01 +0200
MIME-Version: 1.0
In-Reply-To: <7084d678-ce11-fa3f-8b59-67e46da841f7@tana.it>
Content-Type: text/plain; charset=utf-8
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/l0sz_i-LPiyH1wKw_t34jp1juEk>
Subject: Re: [dmarc-ietf] Spirit of RFC8601 section 5 for invalid A-R headers
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 07 Apr 2020 07:09:11 -0000

>>> Authentication-Results: domain.tld, spf=pass smtp.mailfrom=x@y.z
>>
>> Needs to be removed? I say no.
> 
> 
> Yes, and log it.

Please notice the comma instead of the semicolon, it wasn't a typo.
Would you still remove it?

>>> Authentication-Results: domain.tld; {garbage}
>>
>> Needs to be removed? I say no.
> 
> Yes, and log it.

Interesting, you suggest to parse "lazily", i.e. as soon as a token
looks like an authserv-id, treat it as such.

> Both cases are renamed to Old-Authentication-Results anyway.  The part that
> would log it, however, doesn't recognize the quotes (I'm going to fix it now)
> and intermittently removes the header.

I wanted to object that the RFC does not allow to tamper with "innocent"
headers, but it actually does not forbid it. That said, I could even
remove previous A-R headers altogether and be RFC compliant, so a lazy
evaluation parser can be compliant as well.

Thanks.

> Note that some tools, e.g. Thunderbird DKIM-Verifier[*] can be configured to
> either "Read Authentication-Results header" or not.  Hence is makes sense to
> rename all on entry.
> 
> Note2: even if a tool accepted a list of trusted authserv-id's, consider a MUA
> simultaneously accessing two mailboxes, at example.com and example.org, say.
> Of course you would configure the tool to trust both of their authserv-id
> (which is already beyond what an average user is willing to configure).  Then,
> a malicious party can send you a message at your @example.com address, bearing
> a faked Authentication-Results by example.org.  Should the tool trust it?

Wouldn't a trust-list per mailbox solve the issue, instead of a global
trust-list?


From nobody Tue Apr  7 01:48:00 2020
Return-Path: <vesely@tana.it>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CAAA83A192B for <dmarc@ietfa.amsl.com>; Tue,  7 Apr 2020 01:47:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.12
X-Spam-Level: 
X-Spam-Status: No, score=-2.12 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1152-bit key) header.d=tana.it
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YUHCHeQ_rC8r for <dmarc@ietfa.amsl.com>; Tue,  7 Apr 2020 01:47:56 -0700 (PDT)
Received: from wmail.tana.it (wmail.tana.it [62.94.243.226]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 99AC93A18C1 for <dmarc@ietf.org>; Tue,  7 Apr 2020 01:47:56 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=tana.it; s=delta; t=1586249274; bh=/zG9ksMY263dRgRI+6gOFqZatlnfthv05svqDB4WGPw=; l=2594; h=To:References:From:Date:In-Reply-To; b=BgRyV455OWWczhJZLL09p5a/j9a9YFKBCkR5AtvlviZqDfacw7Pk7q/NLPBvdoddA 0TvUoGKDXgMq+SinevKXb63KF/rYVce8wKyn86mC48nawqjdAUpDCCoHmI9dYgl6K9 hRmJlWm4oz23QXvKKjrtECxvXGmSkkC4NPzExtLyeeN25esNnFjPVzhTuRwdD
Authentication-Results: tana.it; auth=pass (details omitted)
Received: from [172.25.197.111] (pcale.tana [172.25.197.111]) (AUTH: CRAM-MD5 uXDGrn@SYT0/k, TLS: TLS1.2, 128bits, ECDHE_RSA_AES_128_GCM_SHA256) by wmail.tana.it with ESMTPSA id 00000000005DC02A.000000005E8C3E3A.000037D2; Tue, 07 Apr 2020 10:47:54 +0200
To: dmarc@ietf.org
References: <e2bd3117-2217-1206-0c0c-f06a35d49dca@arcsin.de> <CABa8R6sbHLfkzHD4gaPBxQbgNy57J1eLXt2sPyAfaTYAY3tG-Q@mail.gmail.com> <0fbab9d5-d00e-42ff-3059-8cb269ff1591@arcsin.de> <7084d678-ce11-fa3f-8b59-67e46da841f7@tana.it> <13fd0dec-d02b-b5ca-cee8-a405d891dced@arcsin.de>
From: Alessandro Vesely <vesely@tana.it>
Message-ID: <8a487e6d-fcc8-fdb6-eaba-074641c70d03@tana.it>
Date: Tue, 7 Apr 2020 10:47:54 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.6.0
MIME-Version: 1.0
In-Reply-To: <13fd0dec-d02b-b5ca-cee8-a405d891dced@arcsin.de>
Content-Type: text/plain; charset=us-ascii
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/HtmkdZlGkMbeg2CxU2abAR6nALo>
Subject: Re: [dmarc-ietf] Spirit of RFC8601 section 5 for invalid A-R headers
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 07 Apr 2020 08:47:59 -0000

On Tue 07/Apr/2020 09:09:01 +0200 Damian Lukowski wrote:
>>>> Authentication-Results: domain.tld, spf=pass smtp.mailfrom=x@y.z
>>>
>>> Needs to be removed? I say no.
>> 
>> 
>> Yes, and log it.
> 
> Please notice the comma instead of the semicolon, it wasn't a typo.
> Would you still remove it?


If I can lazily (or sloppily) identify it as an authserv-id, so can do other
tools too.


>> Both cases are renamed to Old-Authentication-Results anyway.  The part that
>> would log it, however, doesn't recognize the quotes (I'm going to fix it now)
>> and intermittently removes the header.
> 
> I wanted to object that the RFC does not allow to tamper with "innocent"
> headers, but it actually does not forbid it. That said, I could even
> remove previous A-R headers altogether and be RFC compliant, so a lazy
> evaluation parser can be compliant as well.


IMHO that's the simplest approach.  By renaming (otherwise obscuring) instead
of deleting you still leave room for debugging and forensics.


>> Note2: even if a tool accepted a list of trusted authserv-id's, consider a MUA
>> simultaneously accessing two mailboxes, at example.com and example.org, say.
>> Of course you would configure the tool to trust both of their authserv-id
>> (which is already beyond what an average user is willing to configure).  Then,
>> a malicious party can send you a message at your @example.com address, bearing
>> a faked Authentication-Results by example.org.  Should the tool trust it?
> 
> Wouldn't a trust-list per mailbox solve the issue, instead of a global
> trust-list?


Per-mailbox lists might seem to do it.  However, consider, in the above
scenario, making the decision to forward some or all of your @example.org
traffic to your example.com mailbox, directly from example.org server.  Now
you'd want to trust example.org A-Rs even when they arrive through example.com.
 The only easy way that I see to accomplish that is to instruct example.com to
whitelist example.org's A-R; if example.com admins trust example.org, that is:

   For simplicity and maximum security, a border MTA could remove all
   instances of this header field on mail crossing into its trust
   boundary.  However, this may conflict with the desire to access
   authentication results performed by trusted external service
   providers.  [...]  A more robust border
   MTA could allow a specific list of authenticating MTAs whose
   information is to be admitted, removing the header field originating
   from all others.
                         https://tools.ietf.org/html/rfc8601#section-5


Best
Ale
-- 


























From nobody Tue Apr  7 03:43:57 2020
Return-Path: <vesely@tana.it>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 38A983A1AEC for <dmarc@ietfa.amsl.com>; Tue,  7 Apr 2020 03:43:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.12
X-Spam-Level: 
X-Spam-Status: No, score=-2.12 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1152-bit key) header.d=tana.it
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id syx7iWFQv0nU for <dmarc@ietfa.amsl.com>; Tue,  7 Apr 2020 03:43:54 -0700 (PDT)
Received: from wmail.tana.it (wmail.tana.it [62.94.243.226]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 958D83A1AEE for <dmarc@ietf.org>; Tue,  7 Apr 2020 03:43:54 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=tana.it; s=delta; t=1586256232; bh=qPcDQmo/BR61WyMwNRvczoGQJty1sG0QTZf8p8M48ck=; l=2284; h=To:References:From:Date:In-Reply-To; b=C0YRyT5iiaeEiZQG0OcE0/IYtedjctiWy9IJ8o98YbTYwcC7xgcylNKNjgUrBIM4l Y6mvRh26YJr7GDf+zN1yOL5PkeqOokUQTZDk7o5oLWS4Xw6fZAiXDIsQ6Die9ovEaG Nz/+Ydfn1UKjRJOmY/+xqk4MHI3UQhHRG87jN3wR8AM5XVI/3Pc0SG9tWTulr
Authentication-Results: tana.it; auth=pass (details omitted)
Received: from [172.25.197.111] (pcale.tana [172.25.197.111]) (AUTH: CRAM-MD5 uXDGrn@SYT0/k, TLS: TLS1.2, 128bits, ECDHE_RSA_AES_128_GCM_SHA256) by wmail.tana.it with ESMTPSA id 00000000005DC056.000000005E8C5968.000046E3; Tue, 07 Apr 2020 12:43:52 +0200
To: dmarc@ietf.org
References: <158619357716.2395.9626087376923274203@ietfa.amsl.com> <CADyWQ+HKt5opYUaKjGCCFrB2+4BAXrHOC+x+BS2WZVZp20v6Vg@mail.gmail.com>
From: Alessandro Vesely <vesely@tana.it>
Message-ID: <3b7a0c04-5d6e-7483-c5b3-ff0faa2cd632@tana.it>
Date: Tue, 7 Apr 2020 12:43:52 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.6.0
MIME-Version: 1.0
In-Reply-To: <CADyWQ+HKt5opYUaKjGCCFrB2+4BAXrHOC+x+BS2WZVZp20v6Vg@mail.gmail.com>
Content-Type: text/plain; charset=utf-8
Content-Language: en-US
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/gEoLu8lk1O4FTuOQ2chcagd5dAE>
Subject: Re: [dmarc-ietf] New Version Notification for draft-kucherawy-dmarc-dmarcbis-01.txt
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 07 Apr 2020 10:43:56 -0000

On Mon 06/Apr/2020 19:21:56 +0200 Tim Wicinski wrote:
> Updates to draft-kucherawy-dmarc-dmarcbis
> [...]
> On Mon, Apr 6, 2020 at 1:19 PM <internet-drafts@ietf.org> wrote:
> [...]
>> Htmlized: https://tools.ietf.org/html/draft-kucherawy-dmarc-dmarcbis-01


I took a look at the new doc's diffs, and found a few nits:


*RFC3986 instead of RFC7208*

In some places this was wrongly replaced.  I found:

- In relaxed mode, the [RFC3986]-authenticated domain
- [RFC3986], which can authenticate both the domain
- when a message fails both [RFC3986] and [RFC6376]


*RFC3986 instead of URI*

The following snippet is quite unreadable:

   When a Mail Receiver discovers a DMARC policy in the DNS, and the
   Organizational Domain at which that record was discovered is not
   identical to the Organizational Domain of the host part of the
   authority component of a [RFC3986] specified in the "rua" or "ruf"
   tag, the following verification steps are to be taken:

Would "The component of a URI ([RFC3986]) specified in..." be better?


*Semicolon in the version tag*

DMARC records follow the extensible "tag-value" syntax for DNS-based key
records defined in DKIM, which says:

   Note that WSP is allowed anywhere around tags.  In particular, any
   WSP after the "=" and any WSP before the terminating ";" is not part
   of the value; however, WSP inside the value is significant.
                       https://tools.ietf.org/html/rfc6376#section-3.2

This seems to imply that "v = DMARC1 ;" (with spaces) is valid.  In addition, a
tag is specified as:

   tag-spec  =  [FWS] tag-name [FWS] "=" [FWS] tag-value [FWS]

That is, without a trailing semicolon.  So it sound confusing to insist on the
semicolon, as in «a tag of "v=DMARC1;"», «containing at least "v=DMARC1;"», and

   *  The version of DMARC being used is "DMARC1" ("v=DMARC1;")


*Repeated URIs*

Sometimes URIs are redundantly repeated in parentheses.  I found:

   common one is maintained by the Mozilla Foundation and made public at
   http://publicsuffix.org (http://publicsuffix.org).

      From: "user@example.org via Bug Tracker" support@example.com
      (mailto:support@example.com)

and

   an informal industry consortium: DMARC.org (see http://dmarc.org
   (http://dmarc.org)).


jm2c
Ale
-- 






















From nobody Thu Apr  9 08:05:04 2020
Return-Path: <noreply@ietf.org>
X-Original-To: dmarc@ietf.org
Delivered-To: dmarc@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id BB86D3A0943; Thu,  9 Apr 2020 08:04:54 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: Sandra Murphy via Datatracker <noreply@ietf.org>
To: <secdir@ietf.org>
Cc: dmarc@ietf.org, draft-ietf-dmarc-psd.all@ietf.org, last-call@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.125.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <158644469471.21209.9811712342867228933@ietfa.amsl.com>
Reply-To: Sandra Murphy <sandy@tislabs.com>
Date: Thu, 09 Apr 2020 08:04:54 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/RRpf0tbNuJfIZZ8RnOkO3hLH3to>
Subject: [dmarc-ietf] Secdir last call review of draft-ietf-dmarc-psd-08
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Apr 2020 15:04:55 -0000

Reviewer: Sandra Murphy
Review result: Has Nits

This is a secdir review of draft-ietf-dmarc-psd-08 (DMARC (Domain-based Message
Authentication, Reporting, and Conformance) Extension For PSDs (Public Suffix
Domains))

I have reviewed this document as part of the security directorate's ongoing
effort to review all IETF documents being processed by the IESG.  These
comments were written primarily for the benefit of the security area directors.
Document editors and WG chairs should treat these comments just like any other
last call comments.

This document presents an extension to DMARC for Public Suffix Domains (PSD)
(and their operators (PSO)), which are domains that are not organizational
domains and are not subject to DMARC processing.  In DMARC, these PSD domains
can not publish policy or receive feedback for subdomains.  The extension
allows PSDs to express policy for organizational domain that are not themselves
implementing policy.  It also provides a new tag that covers non-existing
subdomains.

I find the document to be well written and well laid out (even in the face of a
few comments below).

Note:  I am not conversant with DMARC and have only read the underlying
normative references to the extent necessary to review this document.  Consider
the source in reading these comments.

The security considerations section states that it does not change the security
considerations of the base DMARC specification RFC7489.  That is common in
extensions to existing protocols.  But the authors, to their credit, note that
this extension increases some of the risks identified in the security
considerations of rFC7489.  I wish more authors of extensions to existing
protocols did similar analysis.

The security considerations section points in particular to Section 12.5 of
RFC7489, which describes the risks of external reporting addresses.  Section 4
of this document describes the privacy concerns of feedback reports leaking
information outside an organizational domain.  Section 12.5 of RFC7489 of
RFC7489 points to a verification mechanism in Section 7.1 of RFC7489.  Section
7.1 presents a detailed procedure to verify that a feedback reporting address
is safe to report to, particularly for rua or ruf tags.  Question to the
authors:  has the correctness of that procedure in the presence of this
extension been considered?  I can't tell.

Some wordsmithing comments:

Section 4.1 page 9

   o  Multi-organization PSDs (e.g., ".com") that do not mandate DMARC
      usage: Privacy risks for Organizational Domains that have not
      deployed DMARC within such PSDs are significant.  For non-DMARC
      Organizational Domains, all DMARC feedback will be directed to the
      PSO.  PSD DMARC is opt-out (by publishing a DMARC record at the
      Organizational Domain level) vice opt-in, which would be the more
      desirable characteristic.  This means that any non-DMARC
      organizational domain would have its feedback reports redirected
      to the PSO.  The content of such reports, particularly for
      existing domains, is privacy sensitive.

The sentences
                                                          "For non-DMARC
      Organizational Domains, all DMARC feedback will be directed to the
      PSO.
and
                                "This means that any non-DMARC
      organizational domain would have its feedback reports redirected
      to the PSO."
seem to say the same thing.  Are they redundant?  Or is there a difference
there that I am not seeing?

Section A page 11

              If the experiment shows that PSD DMARC solves a real
   problem and can be used at a large scale, the results could prove to
   be useful in removing constraints outside of the IETF that would
   permit broader deployment.

I would read "removing constraints ... that would permit broader deployment" as
meaning constraints that permit deployment are being removed.  The "that" would
in ordinary reading refer to "contraints".  I think the intended meaning is
"removing constraints ... where those constraints hamper broader deployment" or
"removing constraints ... thereby permitting broader deployment"

And I'm not sure whether "outside of the IETF" means that the removing occurs
outside the IETF or that the constraints exist outside the IETF.  I suspect
both, but I don't know that it makes much difference.

Section A.1 page 12

This section concerns the privacy concerns arising from the external reporting
described in Section 4.1.  In Section 4.1, the privacy risk exists for
"non-DMARC organizational domains" under a multi-organizational PSD (presumably
PSD DMARC participating, right?) that does not mandate DMARC usage for its
registrants.

Section A.1 states that knowing which PSDs do not present this risk would be
beneficial and describes an experiment to produce that knowledge.

Desirable attributes for such a mechanism includes the following:

   o  List PSDs that either mandate DMARC for their registrants or for
      which all lower level domains are controlled by the PSO and that
      the relevant PSO has indicated a desire for the PSD to participate
      in PSD DMARC

I get the "mandate DMARC" part - the risk exists in the case the PSD does not
mandate DMARC - if the PSD mandates DMARC, it does not produce the privacy risk.

I do not get the next part:
                                                               or for
      which all lower level domains are controlled by the PSO and that
      the relevant PSO has indicated a desire for the PSD to participate
      in PSD DMARC"

I do not see how the desire of the PSO that the PSD should participate in PSD
DMARC would help alleviate the privacy risk for the PSD's registrant
organizational domains.  In the first place, what does the PSO's desire got to
do with alleviating risk?  In the second place, this mechanism is supposed to
produce a list of PSDs that do not produce the risk.  The risk in Section 4.1
assumes (or so I thought) that the PSD participates in PSD DMARC.  So if the
PSD is not participating in PSD DMARC, then it is therefore not producing risk,
but it obeys the PSO desire, then the PSD becomes in the category of producing
the risk, not alleviating risk.

I suspect I am just confused here.

--Sandy Murphy



From nobody Thu Apr  9 12:54:22 2020
Return-Path: <toddmherr@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7D69A3A0D12; Thu,  9 Apr 2020 12:54:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.087
X-Spam-Level: 
X-Spam-Status: No, score=-2.087 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WR7rJ5WuDdfK; Thu,  9 Apr 2020 12:54:16 -0700 (PDT)
Received: from mail-ua1-x92e.google.com (mail-ua1-x92e.google.com [IPv6:2607:f8b0:4864:20::92e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6056D3A0D0C; Thu,  9 Apr 2020 12:54:16 -0700 (PDT)
Received: by mail-ua1-x92e.google.com with SMTP id o14so437982uat.13; Thu, 09 Apr 2020 12:54:16 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=cdDwdDANnFtMMko1tWuxOAyblzuzcBUj4HcMEs+pQlw=; b=TymQRT8IiwSJ5M8neN1J+a8eyzlv/V3140wBWXniW1MJW+f7VLL7Z6BomXo6/0YiaF JuLE68UX6U0S/y6yPBjl40XFU/4rNFuzSskio5BOq4YTsNBZd7IWfWioM5hu+eB5/g4Y hjbcY8Ok+EyoeIiPabW+dP9nwXO+P/E2+hdtMpdRQxjYXLuhQ1OxJOhQ1z97yBaalALp uYi2GZ3XNPoV/L6vPnb74t1j4u0WRErpUzyBTFH1N7UuajTPzfYn6M9KlCI1Y7WNT3NU O3PNZCnSbxTZ/LJrJ73ovXH+eIkO36/cOftqmEmDoYXwJNqLOFzAaIJmEFpF8+CVZZZo h1Cw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=cdDwdDANnFtMMko1tWuxOAyblzuzcBUj4HcMEs+pQlw=; b=k7Wur1t9IyilGocU6BBnQX1m/M6ldJ1TKxVmhGiPDSwQP0MvLdRKuIwaJM3PBWfLqJ y43oUNNCCY4/XlTD9WvvR61q6MrffrJjFgAjDjVNS1s9rOnmwZ49K4NUnt/VJJeQWDL9 Pprm49racY2eT0bhBOeqC7d/hi2rbUg66mkPPq+/sdL/yakJ+jINVooFn8OrwBd4paLS ewVt6MC6VECG4ZPjRUbFYB7D3QXUk8ZOzaXrfwumlhE2d2utwZXiaDVCcTsGbmA6O+FX kcvf+YX3AbEgC3y/wCPmh7UvTDl4saOaIdsRCxzapf2WVYymIhemqp0V25gOKnz3911M pR/Q==
X-Gm-Message-State: AGi0PuZ4SzN7Qby1RYhLjxmyOLPm+uT3UbJTawmir3x8SzOGDJWr0x2A Ip/5M2HJ2b7d8uQcZOSY1brg0XNVposi/NXRiJ9ncVAB+MI=
X-Google-Smtp-Source: APiQypJdq8c9AbJzxN5687LrzTl8uahIr2ZyolWNsQPxmTHnqKlkyGt9ZkM0H19M6m40tAoaTg0eLfMmMskVTmw8SNA=
X-Received: by 2002:a9f:2102:: with SMTP id 2mr700517uab.41.1586462055243; Thu, 09 Apr 2020 12:54:15 -0700 (PDT)
MIME-Version: 1.0
References: <158613543159.15216.5517593808552135017@ietfa.amsl.com>
In-Reply-To: <158613543159.15216.5517593808552135017@ietfa.amsl.com>
From: Todd Herr <toddmherr@gmail.com>
Date: Thu, 9 Apr 2020 15:54:02 -0400
Message-ID: <CA+Wg=gt1SMO0n9pLOY_CKemEHimr+mnWCpNcoJWq+Da9Np7UuA@mail.gmail.com>
To: Dale Worley <worley@ariadne.com>
Cc: gen-art@ietf.org, last-call@ietf.org, dmarc <dmarc@ietf.org>,  draft-ietf-dmarc-psd.all@ietf.org
Content-Type: multipart/alternative; boundary="00000000000040a80105a2e0fb29"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/kWNHLp-DIHLjeRNbe2dmBVjko48>
Subject: Re: [dmarc-ietf] Genart last call review of draft-ietf-dmarc-psd-08
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Apr 2020 19:54:21 -0000

--00000000000040a80105a2e0fb29
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Having reviewed the comments, I'm wondering if perhaps the following draft
rewrite of the Abstract section might be a first step to address many of
the points raised?

*AbstractDMARC (Domain-based Message Authentication, Reporting, and
Conformance) is a scalable mechanism by which a mail-originating
organization can express domain-level policies and preferences for message
validation, disposition, and reporting, that a mail-receiving organization
can use to improve mail handling.  *

*The original design of DMARC applies only to domains that are registered
with a domain name registrar (called =E2=80=9COrganizational Domains=E2=80=
=9D in RFC 7489)
and nodes in the tree below Organizational Domains. Organizational Domains
are themselves nodes in the tree below domain names reserved for
registration, with the latter commonly referred to as =E2=80=9CTop Level Do=
mains=E2=80=9D
(TLDs) (e.g., =E2=80=98.com=E2=80=99, =E2=80=98.co.uk <http://co.uk>=E2=80=
=99, etc.), although in this
document they will be referred to as Public Suffix Domains (PSDs).*

*Since its deployment in 2015, use of DMARC has shown a clear need for the
ability to express policy for PSDs. This document describes an extension to
DMARC to enable DMARC functionality for PSDs.*

*RFC 7489 describes an algorithm for a mail-receiving organization to use
in determining the Organizational Domain of an inbound mail message, and
this algorithm recommends the use of a =E2=80=9Cpublic suffix list=E2=80=9D=
 (PSL), with the
most common one maintained by the Mozilla Foundation and made public at
<http://publicsuffix.org/ <http://publicsuffix.org/>>. Use of such a PSL by
a mail-receiving organization will be required in order to discover and
apply any DMARC policy declared by a PSD.*

*This document also seeks to address implementations that consider a domain
on a public Suffix list to be ineligible for DMARC*


On Sun, Apr 5, 2020 at 9:11 PM Dale Worley via Datatracker <noreply@ietf.or=
g>
wrote:

> Reviewer: Dale Worley
> Review result: Ready with Issues
>
> I am the assigned Gen-ART reviewer for this draft.  The General Area
> Review Team (Gen-ART) reviews all IETF documents being processed by
> the IESG for the IETF Chair.  Please treat these comments just like
> any other last call comments.
>
> For more information, please see the FAQ at
>
> <https://trac.ietf.org/trac/gen/wiki/GenArtfaq>.
>
> Document:  review-draft-ietf-dmarc-psd-08
> Reviewer:  Dale R. Worley
> Review Date:  2020-04-05
> IETF LC End Date:  2020-04-08
> IESG Telechat date:  not known
>
> * Summary:
>
>        This draft is on the right track but has open issues, described
>        in the review.
>
> * Major issues:
>
> The privacy concerns described in section 4 are written as if there is
> no certainty that the mechanisms described in the document properly
> mitigate them.  So the document appears to be incomplete.  OTOH, since
> this is an Experimental RFC, such mitigation isn't necessary if there
> is commitment to do so later.  In that case, the section should
> explicitly state that these are open issues and that there is an
> intention of revising the document to mitigate them.
>
> The text suggests that a mail receiver(?) that does DMARC processing
> has knowledge of all PSDs.  This seems a priori unlikely and even
> impossible to implement.  So this ought to be either explained at the
> appropriate place or resolved technically.
>
> * Minor issues:
>
> The document has the (common) editorial problem that it is written by
> people who are deeply familiar with the subject, and it's difficult to
> read if one doesn't share that familiarity.  This is particularly
> significant because DMARC is an e-mail facility that (ideally) will
> affect all e-mail that is sent, so the target audience really should
> be anyone who has a basic understanding of e-mail.  Three particular
> elements of this are:
>
> - It would be very helpful if the Introduction could state, in a few
>   sentences, the purpose and operation of DMARC, thus informing the
>   reader of the framework whose deficiencies this document attempts to
>   address.  In particular, one shouldn't have to read the DMARC RFCs
>   to be able to read this document and understand its general import.
>
> - The "experiment" appendixes are unclear about what the experiments
>   actually are:  what questions they are to answer, what actions will
>   be taken, how the results will be evaluated.  Starting each appendix
>   with an overview paragraph would be helpful.
>
> - Forward references should be minimized so that a reader can
>   understand the document in one pass.
>
> As a derivative of the first of these elements, the terminology used
> for the properties of domain names is not clearly defined.  In
> particular, where does a registration "occur"?  The only term for
> which I think the general audience possesses an unambiguous definition
> is "the registered domain name", e.g. ietf.org.  Now I *think* its PSD
> is ".org", but it might be "ietf.org", and I don't know whether the
> registration of ietf.org "occurs" at ietf.org or .org.  Further points
> I didn't understand are pointed out in the review of the
> Abstract and Introduction.
>
> * Nits/editorial comments:
>
> Abstract
>
> I'm having quite a bit of difficulty figuring out exactly what the
> Abstract means.  I'm sure that the working group clearly understands
> what is meant, but the writing is just loose enough that I can't fix
> the meaning.  To raise the immediate questions:
>
>    DMARC (Domain-based Message Authentication, Reporting, and
>    Conformance) is a scalable mechanism by which a mail-originating
>    organization can express domain-level policies and preferences for
>    message validation, disposition, and reporting, that a mail-receiving
>    organization can use to improve mail handling.
>
> This sentence is quite good, as it introduces what DMARC is all about.
>
>    The design of DMARC
>    presumes that domain names represent either nodes in the tree below
>    which registrations occur, or nodes where registrations have
>    occurred; it does not permit a domain name to have both of these
>    properties simultaneously.
>
> You want to make clear here that "registration" means "domain name
> ownership registration" (which is what section 2.2 says).  Otherwise
> it leaves open that there is some sort of DMARC registration that you
> might intend, until the reader gets to section 2.2.
>
> There's an ambiguity regarding "where" a registration happens.  E.g.,
> does the registration of "ietf.org" "occur at" "ietf.org" or "occur
> at" "org"?  It's possible that this could be simplified/disambiguated
> by not using this term, but instead phrasing this in terms of domain
> names that "are registered", and the allowed relationships between
> them.
>
> And it appears certain that there are DNS nodes where registrations
> are only done *above* that node, e.g. "datatracker.ietf.org", which
> this sentence (if taken literally) says is not permitted by DMARC.  Is
> the property you want to declare "one node where registrations are
> done cannot exist below another node where registrations are done"?
>
> Or perhaps domain names like "datatracker.ietf.org" are of no interest
> to DMARC because DMARC is never applied to messages for which that is
> the relevant address?
>
>    Since its deployment in 2015, use of
>    DMARC has shown a clear need for the ability to express policy for
>    these domains as well.
>
> This sentence doesn't make it clear what "these domains" refers to.
>
>    Domains at which registrations can occur are referred to as Public
>    Suffix Domains (PSDs).  This document describes an extension to DMARC
>    to enable DMARC functionality for PSDs.
>
> It would probably be clearer to use "domain name ownership
> registrations" again here.
>
> This sentence suggests that the registration of "ietf.org" "occurs at"
> "org" and so "org" is a PSD.
>
>    This document also seeks to address implementations that consider a
>    domain on a public Suffix list to be ineligible for DMARC
>    enforcement.
>
> This suggests that implementations believe that they know of all PSDs,
> so they can "consider them ineligible for DMARC enforcement".  But
> it's hard to imagine that that they can know that they know of all
> PSDs.
>
> An additional point, and I'm not sure how valuable this is, would be
> to clarify "I'm holding an e-mail message in my hands.  What do I do
> next?", that is, What address in the message is the domain whose DMARC
> information is applied to the message?  And what indeed does DMARC
> processing do to a message?  For most of the sentences of the
> Abstract, this is not important, but it leaves the effect of the last
> sentence unclear, as "DMARC is not enforced on messages whose *sender*
> is in a PSD" is quite a bit different from "DMARC is not enforced on
> messages whose *recipient* is in a PSD".  (Section 3.3 suggests that
> the address in the From header of the message is the one that is used
> for DMARC processing.)
>
> It's unclear what exactly is the contents of a "public suffix list".
> Naively, it appears that it is the list of domain names under which
> names can be registered, but the text uses the term in the plural, so
> there must be some additional structure.
>
> Also, it seems there are some significant privacy matters addressed by
> this document, and it's probably worth adding a sentence to notify the
> reader of that.
>
> 1.  Introduction
>
> A number of the questions about the Abstract apply to the Introduction
> as well.  But generally, since e-mail is a subject that every reader
> has a basic knowledge of, it would be useful to write the introduction
> so that one did not have to have a knowledge of the DMARC architecture
> to understand the introduction.
>
>    "gov.example" publishes the following DMARC record:
>
>    "v=3DDMARC1; p=3Dreject; rua=3Dmailto:dmarc@dmarc.service.gov.example"
>
>    at
>
>    _dmarc.gov.example.
>
> Even better would be this aid to people who don't already know DMARC
> implementation:
>
>    "gov.example" publishes the following DMARC DNS record:
>
>    _dmarc.gov.example.  TXT \
>         "v=3DDMARC1; p=3Dreject; rua=3Dmailto:dmarc@dmarc.service.gov.exa=
mple"
>
> --
>
>    the non-existent organizational domain of @tax.gov.example
>
> I suspect you mean "t4x.gov.example" here.
>
>    This document provides a simple extension to DMARC [RFC7489] to
>    allow [...]
>
> This sentence lists 4 important items, each of which is fairly long,
> which together are the summary of the whole document, so it might be
> useful to break this into a bullet-list.
>
> 2.  Terminology and Definitions
>
>    In many cases the public portion of the DNS tree is [...]
>
> What does "the public portion" mean?  I'm guessing it means "the names
> not available for private registration", but you should be unambiguous
> here.
>
>    They are not available for private
>    registration.  In many cases the public portion of the DNS tree is
>    more than one level deep.
>
> It seems like these two sentences are redundant and the flow of the
> paragraph would be better if they were removed. ... Actually once they
> are removed, it reveals that the next two sentences largely duplicate
> the first two sentences of the paragraph.
>
>    2.3.  Longest PSD
>
>    The longest PSD is the Organizational Domain with one label removed.
>
>    2.4.  Organizational Domain
>
>    The term Organizational Domains is defined in DMARC [RFC7489]
>    Section 3.2.
>
> 2.4 should be moved ahead of 2.3 to avoid a forward-reference.  But it
> would be really helpful if the definition of Organizational Domain was
> either summarized here or completely copied from RFC7489.  In
> particular, if Organizational Domain is not the same as registered
> domain name, that should be flagged.
>
>    2.5.  Public Suffix Operator (PSO)
>
>    A Public Suffix Operator manages operations within its PSD.
>
> Better to explicitly define the possession relationship explicitly:
>
>    A Public Suffix Operator is an organization which manages
>    operations within a PSD, particularly the DNS records published for
>    names at and under that domain name.
>
> --
>
>    2.6.  PSO Controlled Domain Names
>
>    PSO Controlled Domain Names are names in the DNS that are managed by
>    a PSO and are not available for use as Organizational Domains.
>    Depending on PSD policy, these will have one (e.g., ".com") or more
>    (e.g., ".co.uk") name components.
>
> The second sentence is odd; is it useful?  Is it just to say "PSO
> Controlled Domain Names may have one or more components."?
>
>    3.1.  General Updates
>
>    References to "Domain Owners" also apply to PSOs.
>
> This change really ought to be localized to a specific textual change
> somewhere in RFC 7489, in the say way that the other changes are
> specific amendments to the DMARC algorithm.
>
>    3.2.  Section 6.3 General Record Format
>
> These section titles are difficult to read.  At first I thought there
> was some typographical problem.  But you could clarify this as "3.2.
> Updates to Section 6.3.  General Record Format".  Similarly for the
> other subsections of section 3.
>
> 3.3.  Section 6.5.  Domain Owner Actions
>
>    The mechanism for doing so is one of the
>    experimental elements of this document.
>
> I think that what this means is that the whole document is an
> experimental "mechanism for doing so".  If so, I think it could be
> better phrased
>
>    This document is an experimental mechanism for doing so.
>
> --
>
>    3.4.  Section 6.6.1.  Extract Author Domain
>
>    [...] when the domain name extracted by the receiver (from the
>    RFC5322.From) is on the public suffix list used by the receiver.
>
> This touches the question above about what a public suffix list is,
> and how there can be more than one of them.  But without that
> knowledge, it's hard to see which PSL is "used" by the receiver of the
> message.
>
> Also, it's not clear to me how *this* document creates a capability
> which applies to domains that are on the PSL.  E.g., if an "np" is
> defined for ".org", it applies to (that is, affects processing of
> e-mail from) any "X.org" that doesn't have its own DMARC records.  But
> I don't see how an "np" tag for ".org" affects processing of messages
> from "example@org".
>
>    3.5.  Section 6.6.3.  Policy Discovery
>
>       (discussed in the experiment description
>       (Appendix A))
>
> Given that this text is nominally an update to the text of RFC 7489,
> you want to disambiguate the binding of "Appendix A":
>
>       (discussed in the experiment description
>       ([this document] Appendix A))
>
>    3.6.  Section 7.  DMARC Feedback
>
>    See Section 4 of this document for discussion of Privacy
>    Considerations.
>
> Similarly to section 3.5, but also clarifying the scope of "privacy
> considerations":
>
>    See Section 4 of [this document] for discussion of Privacy
>    Considerations for PSD DMARC.
>
>    4.  Privacy Considerations
>
>    The Privacy Considerations of [RFC7489] apply to this document.
>
> This could be clarified as
>
>    Additionally, the Privacy Considerations of [RFC7489] apply to the
>    mechanisms described by this document.
>
> --
>
>    Providing feedback reporting to PSOs can, in some cases, create
>    leakage of information outside of an organization to the PSO.
>
> "outside" probably isn't the word you want to use here, as it is
> easier to read "outside" as giving the original location of
> "information" than to read "outside" as giving the direction of
> "leakage".  Perhaps
>
>    Providing feedback reporting to PSOs can, in some cases, create
>    leakage of information out of an organization to the PSO of its
>    domain name.
>
> --
>
>    To minimize this potential concern,
>    PSD DMARC feedback is best limited to Aggregate Reports.  [...]
>
>    [...] any Feedback Reporting related to multi-
>    organizational PSDs ought to be limited to non-existent domains
>    except in cases where the reporter knows that PSO requires use of
>    DMARC.
>
> I can't see where in the document that these principles are turned
> into MUST statements that ensure the privacy issues are solved.
>
>    The experiment is to evaluate different possible approaches.
>
> Calling this an "experiment" suggests that these is an intended series
> of actions whose result will answer the listed questions.  But there
> doesn't seem to be any such actions listed.  The description makes it
> sound like what is intended is continuing discussions in the working
> group, but that wouldn't be an "experiment".
>
> A.2.  Non-Existent Subdomain Policy
>
> Similar questions arise for this section.  The second paragraph
> suggests that the experiment is to see whether the "np" tag is
> successful.
>
>    There are also
>    suggestions that it would be more generally useful for DMARC.
>
> What does "it" refer to?  (Does it mean "this ability"?)
>
> Appendix B.  DMARC PSD Registry Examples
>
> In this appendix, it appears that the contents of the experiment are
> clear in the authors' minds, but there is no summary at the top that
> states what the experimental facilities are and the "big picture" into
> which they fit.
>
> Appendix C.  Implementations
>
>    C.1.  Authheaders Module
>
> What e-mail MTA is Authheaders an extension for?
>
> [END]
>
>
>
> _______________________________________________
> dmarc mailing list
> dmarc@ietf.org
> https://www.ietf.org/mailman/listinfo/dmarc
>


--=20
Todd Herr

--00000000000040a80105a2e0fb29
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr"><div class=3D"gmail_default" style=3D"fon=
t-family:tahoma,sans-serif;font-size:small">Having reviewed the comments, I=
&#39;m wondering if perhaps the following draft rewrite of the Abstract sec=
tion might be a first step to address many of the points raised?</div><div =
class=3D"gmail_default" style=3D"font-family:tahoma,sans-serif;font-size:sm=
all"><br></div><div class=3D"gmail_default" style=3D"font-family:tahoma,san=
s-serif;font-size:small"><div style=3D"margin-left:40px"><font size=3D"2"><=
b style=3D"font-weight:normal" id=3D"gmail-docs-internal-guid-fce386d9-7fff=
-dc67-41b0-42892eeba272"><p dir=3D"ltr" style=3D"line-height:1.4568;margin-=
top:0pt;margin-bottom:8pt"><span style=3D"font-family:Arial;color:rgb(0,0,0=
);background-color:transparent;font-weight:400;font-style:normal;font-varia=
nt:normal;text-decoration:none;vertical-align:baseline;white-space:pre-wrap=
">Abstract</span></p><p dir=3D"ltr" style=3D"line-height:1.38;margin-top:0p=
t;margin-bottom:0pt"><span style=3D"font-family:Arial;color:rgb(0,0,0);back=
ground-color:transparent;font-weight:400;font-style:normal;font-variant:nor=
mal;text-decoration:none;vertical-align:baseline;white-space:pre-wrap">DMAR=
C (Domain-based Message Authentication, Reporting, and Conformance) is a sc=
alable mechanism by which a mail-originating organization can express domai=
n-level policies and preferences for message validation, disposition, and r=
eporting, that a mail-receiving organization can use to improve mail handli=
ng.=C2=A0=C2=A0</span></p></b></font><br><font size=3D"2"><b style=3D"font-=
weight:normal" id=3D"gmail-docs-internal-guid-fce386d9-7fff-dc67-41b0-42892=
eeba272"><p dir=3D"ltr" style=3D"line-height:1.38;margin-top:0pt;margin-bot=
tom:0pt"><span style=3D"font-family:Arial;color:rgb(0,0,0);background-color=
:transparent;font-weight:400;font-style:normal;font-variant:normal;text-dec=
oration:none;vertical-align:baseline;white-space:pre-wrap">The original des=
ign of DMARC applies only to domains that are registered with a domain name=
 registrar (called =E2=80=9COrganizational Domains=E2=80=9D in RFC 7489) an=
d nodes in the tree below Organizational Domains. Organizational Domains ar=
e themselves nodes in the tree below domain names reserved for registration=
, with the latter commonly referred to as =E2=80=9CTop Level Domains=E2=80=
=9D (TLDs) (e.g., =E2=80=98.com=E2=80=99, =E2=80=98.<a href=3D"http://co.uk=
">co.uk</a>=E2=80=99, etc.), although in this document they will be referre=
d to as Public Suffix Domains (PSDs).</span></p></b></font><br><font size=
=3D"2"><b style=3D"font-weight:normal" id=3D"gmail-docs-internal-guid-fce38=
6d9-7fff-dc67-41b0-42892eeba272"><p dir=3D"ltr" style=3D"line-height:1.38;m=
argin-top:0pt;margin-bottom:0pt"><span style=3D"font-family:Arial;color:rgb=
(0,0,0);background-color:transparent;font-weight:400;font-style:normal;font=
-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pr=
e-wrap">Since its deployment in 2015, use of DMARC has shown a clear need f=
or the ability to express policy for PSDs. This document describes an exten=
sion to DMARC to enable DMARC functionality for PSDs.</span></p></b></font>=
<br><font size=3D"2"><b style=3D"font-weight:normal" id=3D"gmail-docs-inter=
nal-guid-fce386d9-7fff-dc67-41b0-42892eeba272"><p dir=3D"ltr" style=3D"line=
-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style=3D"font-family:A=
rial;color:rgb(0,0,0);background-color:transparent;font-weight:400;font-sty=
le:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;=
white-space:pre-wrap">RFC 7489 describes an algorithm for a mail-receiving =
organization to use in determining the Organizational Domain of an inbound =
mail message, and this algorithm recommends the use of a =E2=80=9Cpublic su=
ffix list=E2=80=9D (PSL), with the most common one maintained by the Mozill=
a Foundation and made public at &lt;</span><a href=3D"http://publicsuffix.o=
rg/" style=3D"text-decoration:none"><span style=3D"font-family:Arial;color:=
rgb(17,85,204);background-color:transparent;font-weight:400;font-style:norm=
al;font-variant:normal;text-decoration:underline;vertical-align:baseline;wh=
ite-space:pre-wrap">http://publicsuffix.org/</span></a><span style=3D"font-=
family:Arial;color:rgb(0,0,0);background-color:transparent;font-weight:400;=
font-style:normal;font-variant:normal;text-decoration:none;vertical-align:b=
aseline;white-space:pre-wrap">&gt;. Use of such a PSL by a mail-receiving o=
rganization will be required in order to discover and apply any DMARC polic=
y declared by a PSD.</span></p></b></font><br><font size=3D"2"><b style=3D"=
font-weight:normal" id=3D"gmail-docs-internal-guid-fce386d9-7fff-dc67-41b0-=
42892eeba272"><p dir=3D"ltr" style=3D"line-height:1.38;margin-top:0pt;margi=
n-bottom:0pt"><span style=3D"font-family:Arial;color:rgb(0,0,0);background-=
color:transparent;font-weight:400;font-style:normal;font-variant:normal;tex=
t-decoration:none;vertical-align:baseline;white-space:pre-wrap">This docume=
nt also seeks to address implementations that consider a domain on a public=
 Suffix list to be ineligible for DMARC</span></p></b></font></div><br clas=
s=3D"gmail-Apple-interchange-newline"></div></div><br><div class=3D"gmail_q=
uote"><div dir=3D"ltr" class=3D"gmail_attr">On Sun, Apr 5, 2020 at 9:11 PM =
Dale Worley via Datatracker &lt;<a href=3D"mailto:noreply@ietf.org">noreply=
@ietf.org</a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote" style=
=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding=
-left:1ex">Reviewer: Dale Worley<br>
Review result: Ready with Issues<br>
<br>
I am the assigned Gen-ART reviewer for this draft.=C2=A0 The General Area<b=
r>
Review Team (Gen-ART) reviews all IETF documents being processed by<br>
the IESG for the IETF Chair.=C2=A0 Please treat these comments just like<br=
>
any other last call comments.<br>
<br>
For more information, please see the FAQ at<br>
<br>
&lt;<a href=3D"https://trac.ietf.org/trac/gen/wiki/GenArtfaq" rel=3D"norefe=
rrer" target=3D"_blank">https://trac.ietf.org/trac/gen/wiki/GenArtfaq</a>&g=
t;.<br>
<br>
Document:=C2=A0 review-draft-ietf-dmarc-psd-08<br>
Reviewer:=C2=A0 Dale R. Worley<br>
Review Date:=C2=A0 2020-04-05<br>
IETF LC End Date:=C2=A0 2020-04-08<br>
IESG Telechat date:=C2=A0 not known<br>
<br>
* Summary:<br>
<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0This draft is on the right track but has open is=
sues, described<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0in the review.<br>
<br>
* Major issues:<br>
<br>
The privacy concerns described in section 4 are written as if there is<br>
no certainty that the mechanisms described in the document properly<br>
mitigate them.=C2=A0 So the document appears to be incomplete.=C2=A0 OTOH, =
since<br>
this is an Experimental RFC, such mitigation isn&#39;t necessary if there<b=
r>
is commitment to do so later.=C2=A0 In that case, the section should<br>
explicitly state that these are open issues and that there is an<br>
intention of revising the document to mitigate them.<br>
<br>
The text suggests that a mail receiver(?) that does DMARC processing<br>
has knowledge of all PSDs.=C2=A0 This seems a priori unlikely and even<br>
impossible to implement.=C2=A0 So this ought to be either explained at the<=
br>
appropriate place or resolved technically.<br>
<br>
* Minor issues:<br>
<br>
The document has the (common) editorial problem that it is written by<br>
people who are deeply familiar with the subject, and it&#39;s difficult to<=
br>
read if one doesn&#39;t share that familiarity.=C2=A0 This is particularly<=
br>
significant because DMARC is an e-mail facility that (ideally) will<br>
affect all e-mail that is sent, so the target audience really should<br>
be anyone who has a basic understanding of e-mail.=C2=A0 Three particular<b=
r>
elements of this are:<br>
<br>
- It would be very helpful if the Introduction could state, in a few<br>
=C2=A0 sentences, the purpose and operation of DMARC, thus informing the<br=
>
=C2=A0 reader of the framework whose deficiencies this document attempts to=
<br>
=C2=A0 address.=C2=A0 In particular, one shouldn&#39;t have to read the DMA=
RC RFCs<br>
=C2=A0 to be able to read this document and understand its general import.<=
br>
<br>
- The &quot;experiment&quot; appendixes are unclear about what the experime=
nts<br>
=C2=A0 actually are:=C2=A0 what questions they are to answer, what actions =
will<br>
=C2=A0 be taken, how the results will be evaluated.=C2=A0 Starting each app=
endix<br>
=C2=A0 with an overview paragraph would be helpful.<br>
<br>
- Forward references should be minimized so that a reader can<br>
=C2=A0 understand the document in one pass.<br>
<br>
As a derivative of the first of these elements, the terminology used<br>
for the properties of domain names is not clearly defined.=C2=A0 In<br>
particular, where does a registration &quot;occur&quot;?=C2=A0 The only ter=
m for<br>
which I think the general audience possesses an unambiguous definition<br>
is &quot;the registered domain name&quot;, e.g. <a href=3D"http://ietf.org"=
 rel=3D"noreferrer" target=3D"_blank">ietf.org</a>.=C2=A0 Now I *think* its=
 PSD<br>
is &quot;.org&quot;, but it might be &quot;<a href=3D"http://ietf.org" rel=
=3D"noreferrer" target=3D"_blank">ietf.org</a>&quot;, and I don&#39;t know =
whether the<br>
registration of <a href=3D"http://ietf.org" rel=3D"noreferrer" target=3D"_b=
lank">ietf.org</a> &quot;occurs&quot; at <a href=3D"http://ietf.org" rel=3D=
"noreferrer" target=3D"_blank">ietf.org</a> or .org.=C2=A0 Further points<b=
r>
I didn&#39;t understand are pointed out in the review of the<br>
Abstract and Introduction.<br>
<br>
* Nits/editorial comments: <br>
<br>
Abstract<br>
<br>
I&#39;m having quite a bit of difficulty figuring out exactly what the<br>
Abstract means.=C2=A0 I&#39;m sure that the working group clearly understan=
ds<br>
what is meant, but the writing is just loose enough that I can&#39;t fix<br=
>
the meaning.=C2=A0 To raise the immediate questions:<br>
<br>
=C2=A0 =C2=A0DMARC (Domain-based Message Authentication, Reporting, and<br>
=C2=A0 =C2=A0Conformance) is a scalable mechanism by which a mail-originati=
ng<br>
=C2=A0 =C2=A0organization can express domain-level policies and preferences=
 for<br>
=C2=A0 =C2=A0message validation, disposition, and reporting, that a mail-re=
ceiving<br>
=C2=A0 =C2=A0organization can use to improve mail handling.<br>
<br>
This sentence is quite good, as it introduces what DMARC is all about.<br>
<br>
=C2=A0 =C2=A0The design of DMARC<br>
=C2=A0 =C2=A0presumes that domain names represent either nodes in the tree =
below<br>
=C2=A0 =C2=A0which registrations occur, or nodes where registrations have<b=
r>
=C2=A0 =C2=A0occurred; it does not permit a domain name to have both of the=
se<br>
=C2=A0 =C2=A0properties simultaneously.<br>
<br>
You want to make clear here that &quot;registration&quot; means &quot;domai=
n name<br>
ownership registration&quot; (which is what section 2.2 says).=C2=A0 Otherw=
ise<br>
it leaves open that there is some sort of DMARC registration that you<br>
might intend, until the reader gets to section 2.2.<br>
<br>
There&#39;s an ambiguity regarding &quot;where&quot; a registration happens=
.=C2=A0 E.g.,<br>
does the registration of &quot;<a href=3D"http://ietf.org" rel=3D"noreferre=
r" target=3D"_blank">ietf.org</a>&quot; &quot;occur at&quot; &quot;<a href=
=3D"http://ietf.org" rel=3D"noreferrer" target=3D"_blank">ietf.org</a>&quot=
; or &quot;occur<br>
at&quot; &quot;org&quot;?=C2=A0 It&#39;s possible that this could be simpli=
fied/disambiguated<br>
by not using this term, but instead phrasing this in terms of domain<br>
names that &quot;are registered&quot;, and the allowed relationships betwee=
n<br>
them.<br>
<br>
And it appears certain that there are DNS nodes where registrations<br>
are only done *above* that node, e.g. &quot;<a href=3D"http://datatracker.i=
etf.org" rel=3D"noreferrer" target=3D"_blank">datatracker.ietf.org</a>&quot=
;, which<br>
this sentence (if taken literally) says is not permitted by DMARC.=C2=A0 Is=
<br>
the property you want to declare &quot;one node where registrations are<br>
done cannot exist below another node where registrations are done&quot;?<br=
>
<br>
Or perhaps domain names like &quot;<a href=3D"http://datatracker.ietf.org" =
rel=3D"noreferrer" target=3D"_blank">datatracker.ietf.org</a>&quot; are of =
no interest<br>
to DMARC because DMARC is never applied to messages for which that is<br>
the relevant address?<br>
<br>
=C2=A0 =C2=A0Since its deployment in 2015, use of<br>
=C2=A0 =C2=A0DMARC has shown a clear need for the ability to express policy=
 for<br>
=C2=A0 =C2=A0these domains as well.<br>
<br>
This sentence doesn&#39;t make it clear what &quot;these domains&quot; refe=
rs to.<br>
<br>
=C2=A0 =C2=A0Domains at which registrations can occur are referred to as Pu=
blic<br>
=C2=A0 =C2=A0Suffix Domains (PSDs).=C2=A0 This document describes an extens=
ion to DMARC<br>
=C2=A0 =C2=A0to enable DMARC functionality for PSDs.<br>
<br>
It would probably be clearer to use &quot;domain name ownership<br>
registrations&quot; again here.<br>
<br>
This sentence suggests that the registration of &quot;<a href=3D"http://iet=
f.org" rel=3D"noreferrer" target=3D"_blank">ietf.org</a>&quot; &quot;occurs=
 at&quot;<br>
&quot;org&quot; and so &quot;org&quot; is a PSD.<br>
<br>
=C2=A0 =C2=A0This document also seeks to address implementations that consi=
der a<br>
=C2=A0 =C2=A0domain on a public Suffix list to be ineligible for DMARC<br>
=C2=A0 =C2=A0enforcement.<br>
<br>
This suggests that implementations believe that they know of all PSDs,<br>
so they can &quot;consider them ineligible for DMARC enforcement&quot;.=C2=
=A0 But<br>
it&#39;s hard to imagine that that they can know that they know of all<br>
PSDs.<br>
<br>
An additional point, and I&#39;m not sure how valuable this is, would be<br=
>
to clarify &quot;I&#39;m holding an e-mail message in my hands.=C2=A0 What =
do I do<br>
next?&quot;, that is, What address in the message is the domain whose DMARC=
<br>
information is applied to the message?=C2=A0 And what indeed does DMARC<br>
processing do to a message?=C2=A0 For most of the sentences of the<br>
Abstract, this is not important, but it leaves the effect of the last<br>
sentence unclear, as &quot;DMARC is not enforced on messages whose *sender*=
<br>
is in a PSD&quot; is quite a bit different from &quot;DMARC is not enforced=
 on<br>
messages whose *recipient* is in a PSD&quot;.=C2=A0 (Section 3.3 suggests t=
hat<br>
the address in the From header of the message is the one that is used<br>
for DMARC processing.)<br>
<br>
It&#39;s unclear what exactly is the contents of a &quot;public suffix list=
&quot;.<br>
Naively, it appears that it is the list of domain names under which<br>
names can be registered, but the text uses the term in the plural, so<br>
there must be some additional structure.<br>
<br>
Also, it seems there are some significant privacy matters addressed by<br>
this document, and it&#39;s probably worth adding a sentence to notify the<=
br>
reader of that.<br>
<br>
1.=C2=A0 Introduction<br>
<br>
A number of the questions about the Abstract apply to the Introduction<br>
as well.=C2=A0 But generally, since e-mail is a subject that every reader<b=
r>
has a basic knowledge of, it would be useful to write the introduction<br>
so that one did not have to have a knowledge of the DMARC architecture<br>
to understand the introduction.<br>
<br>
=C2=A0 =C2=A0&quot;gov.example&quot; publishes the following DMARC record:<=
br>
<br>
=C2=A0 =C2=A0&quot;v=3DDMARC1; p=3Dreject; rua=3Dmailto:<a href=3D"mailto:d=
marc@dmarc.service.gov.example" target=3D"_blank">dmarc@dmarc.service.gov.e=
xample</a>&quot;<br>
<br>
=C2=A0 =C2=A0at<br>
<br>
=C2=A0 =C2=A0_dmarc.gov.example.<br>
<br>
Even better would be this aid to people who don&#39;t already know DMARC<br=
>
implementation:<br>
<br>
=C2=A0 =C2=A0&quot;gov.example&quot; publishes the following DMARC DNS reco=
rd:<br>
<br>
=C2=A0 =C2=A0_dmarc.gov.example.=C2=A0 TXT \<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &quot;v=3DDMARC1; p=3Dreject; rua=3Dmailto:<a h=
ref=3D"mailto:dmarc@dmarc.service.gov.example" target=3D"_blank">dmarc@dmar=
c.service.gov.example</a>&quot;<br>
<br>
--<br>
<br>
=C2=A0 =C2=A0the non-existent organizational domain of @tax.gov.example<br>
<br>
I suspect you mean &quot;t4x.gov.example&quot; here.<br>
<br>
=C2=A0 =C2=A0This document provides a simple extension to DMARC [RFC7489] t=
o<br>
=C2=A0 =C2=A0allow [...]<br>
<br>
This sentence lists 4 important items, each of which is fairly long,<br>
which together are the summary of the whole document, so it might be<br>
useful to break this into a bullet-list.<br>
<br>
2.=C2=A0 Terminology and Definitions<br>
<br>
=C2=A0 =C2=A0In many cases the public portion of the DNS tree is [...]<br>
<br>
What does &quot;the public portion&quot; mean?=C2=A0 I&#39;m guessing it me=
ans &quot;the names<br>
not available for private registration&quot;, but you should be unambiguous=
<br>
here.<br>
<br>
=C2=A0 =C2=A0They are not available for private<br>
=C2=A0 =C2=A0registration.=C2=A0 In many cases the public portion of the DN=
S tree is<br>
=C2=A0 =C2=A0more than one level deep.<br>
<br>
It seems like these two sentences are redundant and the flow of the<br>
paragraph would be better if they were removed. ... Actually once they<br>
are removed, it reveals that the next two sentences largely duplicate<br>
the first two sentences of the paragraph.<br>
<br>
=C2=A0 =C2=A02.3.=C2=A0 Longest PSD<br>
<br>
=C2=A0 =C2=A0The longest PSD is the Organizational Domain with one label re=
moved.<br>
<br>
=C2=A0 =C2=A02.4.=C2=A0 Organizational Domain<br>
<br>
=C2=A0 =C2=A0The term Organizational Domains is defined in DMARC [RFC7489]<=
br>
=C2=A0 =C2=A0Section 3.2.<br>
<br>
2.4 should be moved ahead of 2.3 to avoid a forward-reference.=C2=A0 But it=
<br>
would be really helpful if the definition of Organizational Domain was<br>
either summarized here or completely copied from RFC7489.=C2=A0 In<br>
particular, if Organizational Domain is not the same as registered<br>
domain name, that should be flagged.<br>
<br>
=C2=A0 =C2=A02.5.=C2=A0 Public Suffix Operator (PSO)<br>
<br>
=C2=A0 =C2=A0A Public Suffix Operator manages operations within its PSD.<br=
>
<br>
Better to explicitly define the possession relationship explicitly:<br>
<br>
=C2=A0 =C2=A0A Public Suffix Operator is an organization which manages<br>
=C2=A0 =C2=A0operations within a PSD, particularly the DNS records publishe=
d for<br>
=C2=A0 =C2=A0names at and under that domain name.<br>
<br>
--<br>
<br>
=C2=A0 =C2=A02.6.=C2=A0 PSO Controlled Domain Names<br>
<br>
=C2=A0 =C2=A0PSO Controlled Domain Names are names in the DNS that are mana=
ged by<br>
=C2=A0 =C2=A0a PSO and are not available for use as Organizational Domains.=
<br>
=C2=A0 =C2=A0Depending on PSD policy, these will have one (e.g., &quot;.com=
&quot;) or more<br>
=C2=A0 =C2=A0(e.g., &quot;.<a href=3D"http://co.uk" rel=3D"noreferrer" targ=
et=3D"_blank">co.uk</a>&quot;) name components.<br>
<br>
The second sentence is odd; is it useful?=C2=A0 Is it just to say &quot;PSO=
<br>
Controlled Domain Names may have one or more components.&quot;?<br>
<br>
=C2=A0 =C2=A03.1.=C2=A0 General Updates<br>
<br>
=C2=A0 =C2=A0References to &quot;Domain Owners&quot; also apply to PSOs.<br=
>
<br>
This change really ought to be localized to a specific textual change<br>
somewhere in RFC 7489, in the say way that the other changes are<br>
specific amendments to the DMARC algorithm.<br>
<br>
=C2=A0 =C2=A03.2.=C2=A0 Section 6.3 General Record Format<br>
<br>
These section titles are difficult to read.=C2=A0 At first I thought there<=
br>
was some typographical problem.=C2=A0 But you could clarify this as &quot;3=
.2.<br>
Updates to Section 6.3.=C2=A0 General Record Format&quot;.=C2=A0 Similarly =
for the<br>
other subsections of section 3.<br>
<br>
3.3.=C2=A0 Section 6.5.=C2=A0 Domain Owner Actions<br>
<br>
=C2=A0 =C2=A0The mechanism for doing so is one of the<br>
=C2=A0 =C2=A0experimental elements of this document.<br>
<br>
I think that what this means is that the whole document is an<br>
experimental &quot;mechanism for doing so&quot;.=C2=A0 If so, I think it co=
uld be<br>
better phrased<br>
<br>
=C2=A0 =C2=A0This document is an experimental mechanism for doing so.<br>
<br>
--<br>
<br>
=C2=A0 =C2=A03.4.=C2=A0 Section 6.6.1.=C2=A0 Extract Author Domain<br>
<br>
=C2=A0 =C2=A0[...] when the domain name extracted by the receiver (from the=
<br>
=C2=A0 =C2=A0RFC5322.From) is on the public suffix list used by the receive=
r.<br>
<br>
This touches the question above about what a public suffix list is,<br>
and how there can be more than one of them.=C2=A0 But without that<br>
knowledge, it&#39;s hard to see which PSL is &quot;used&quot; by the receiv=
er of the<br>
message.<br>
<br>
Also, it&#39;s not clear to me how *this* document creates a capability<br>
which applies to domains that are on the PSL.=C2=A0 E.g., if an &quot;np&qu=
ot; is<br>
defined for &quot;.org&quot;, it applies to (that is, affects processing of=
<br>
e-mail from) any &quot;X.org&quot; that doesn&#39;t have its own DMARC reco=
rds.=C2=A0 But<br>
I don&#39;t see how an &quot;np&quot; tag for &quot;.org&quot; affects proc=
essing of messages<br>
from &quot;example@org&quot;.<br>
<br>
=C2=A0 =C2=A03.5.=C2=A0 Section 6.6.3.=C2=A0 Policy Discovery<br>
<br>
=C2=A0 =C2=A0 =C2=A0 (discussed in the experiment description<br>
=C2=A0 =C2=A0 =C2=A0 (Appendix A))<br>
<br>
Given that this text is nominally an update to the text of RFC 7489,<br>
you want to disambiguate the binding of &quot;Appendix A&quot;:<br>
<br>
=C2=A0 =C2=A0 =C2=A0 (discussed in the experiment description<br>
=C2=A0 =C2=A0 =C2=A0 ([this document] Appendix A))<br>
<br>
=C2=A0 =C2=A03.6.=C2=A0 Section 7.=C2=A0 DMARC Feedback<br>
<br>
=C2=A0 =C2=A0See Section 4 of this document for discussion of Privacy<br>
=C2=A0 =C2=A0Considerations.<br>
<br>
Similarly to section 3.5, but also clarifying the scope of &quot;privacy<br=
>
considerations&quot;:<br>
<br>
=C2=A0 =C2=A0See Section 4 of [this document] for discussion of Privacy<br>
=C2=A0 =C2=A0Considerations for PSD DMARC.<br>
<br>
=C2=A0 =C2=A04.=C2=A0 Privacy Considerations<br>
<br>
=C2=A0 =C2=A0The Privacy Considerations of [RFC7489] apply to this document=
.<br>
<br>
This could be clarified as<br>
<br>
=C2=A0 =C2=A0Additionally, the Privacy Considerations of [RFC7489] apply to=
 the<br>
=C2=A0 =C2=A0mechanisms described by this document.<br>
<br>
--<br>
<br>
=C2=A0 =C2=A0Providing feedback reporting to PSOs can, in some cases, creat=
e<br>
=C2=A0 =C2=A0leakage of information outside of an organization to the PSO.<=
br>
<br>
&quot;outside&quot; probably isn&#39;t the word you want to use here, as it=
 is<br>
easier to read &quot;outside&quot; as giving the original location of<br>
&quot;information&quot; than to read &quot;outside&quot; as giving the dire=
ction of<br>
&quot;leakage&quot;.=C2=A0 Perhaps<br>
<br>
=C2=A0 =C2=A0Providing feedback reporting to PSOs can, in some cases, creat=
e<br>
=C2=A0 =C2=A0leakage of information out of an organization to the PSO of it=
s<br>
=C2=A0 =C2=A0domain name.<br>
<br>
--<br>
<br>
=C2=A0 =C2=A0To minimize this potential concern,<br>
=C2=A0 =C2=A0PSD DMARC feedback is best limited to Aggregate Reports.=C2=A0=
 [...]<br>
<br>
=C2=A0 =C2=A0[...] any Feedback Reporting related to multi-<br>
=C2=A0 =C2=A0organizational PSDs ought to be limited to non-existent domain=
s<br>
=C2=A0 =C2=A0except in cases where the reporter knows that PSO requires use=
 of<br>
=C2=A0 =C2=A0DMARC.<br>
<br>
I can&#39;t see where in the document that these principles are turned<br>
into MUST statements that ensure the privacy issues are solved.<br>
<br>
=C2=A0 =C2=A0The experiment is to evaluate different possible approaches.<b=
r>
<br>
Calling this an &quot;experiment&quot; suggests that these is an intended s=
eries<br>
of actions whose result will answer the listed questions.=C2=A0 But there<b=
r>
doesn&#39;t seem to be any such actions listed.=C2=A0 The description makes=
 it<br>
sound like what is intended is continuing discussions in the working<br>
group, but that wouldn&#39;t be an &quot;experiment&quot;.<br>
<br>
A.2.=C2=A0 Non-Existent Subdomain Policy<br>
<br>
Similar questions arise for this section.=C2=A0 The second paragraph<br>
suggests that the experiment is to see whether the &quot;np&quot; tag is<br=
>
successful.<br>
<br>
=C2=A0 =C2=A0There are also<br>
=C2=A0 =C2=A0suggestions that it would be more generally useful for DMARC.<=
br>
<br>
What does &quot;it&quot; refer to?=C2=A0 (Does it mean &quot;this ability&q=
uot;?)<br>
<br>
Appendix B.=C2=A0 DMARC PSD Registry Examples<br>
<br>
In this appendix, it appears that the contents of the experiment are<br>
clear in the authors&#39; minds, but there is no summary at the top that<br=
>
states what the experimental facilities are and the &quot;big picture&quot;=
 into<br>
which they fit.<br>
<br>
Appendix C.=C2=A0 Implementations<br>
<br>
=C2=A0 =C2=A0C.1.=C2=A0 Authheaders Module<br>
<br>
What e-mail MTA is Authheaders an extension for?<br>
<br>
[END]<br>
<br>
<br>
<br>
_______________________________________________<br>
dmarc mailing list<br>
<a href=3D"mailto:dmarc@ietf.org" target=3D"_blank">dmarc@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/dmarc" rel=3D"noreferrer" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/dmarc</a><br>
</blockquote></div><br clear=3D"all"><br>-- <br><div dir=3D"ltr" class=3D"g=
mail_signature"><div dir=3D"ltr"><div><div dir=3D"ltr"><div><div dir=3D"ltr=
"><span style=3D"font-family:tahoma,sans-serif">Todd Herr<br></span></div><=
/div></div></div></div></div></div>

--00000000000040a80105a2e0fb29--


From nobody Thu Apr  9 13:36:34 2020
Return-Path: <superuser@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DDA953A0DDF; Thu,  9 Apr 2020 13:36:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.087
X-Spam-Level: 
X-Spam-Status: No, score=-2.087 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sGVX7YzIu-QP; Thu,  9 Apr 2020 13:36:20 -0700 (PDT)
Received: from mail-vs1-xe2d.google.com (mail-vs1-xe2d.google.com [IPv6:2607:f8b0:4864:20::e2d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B29C13A0FB6; Thu,  9 Apr 2020 13:35:58 -0700 (PDT)
Received: by mail-vs1-xe2d.google.com with SMTP id h189so110311vsc.13; Thu, 09 Apr 2020 13:35:58 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=msbmiiaKTT/+t1DfFqpYCSgWnUV33m2GnQDvvNPkhxM=; b=TJh0MFWEr9Ehdv5ucIXcPQ05Tg1yK6tIBUTgjJ/xcIKuPBcXhOrNRorNFrF82DUWAo 6RVYwnvO3G9s93KYvZyOjUmIAKR+FpALLV2k60+Ol+W+ZhrsbwHx8oFU8YtPD/Pd2lHJ Fj4IYqdFhX4mRWeMMtzoe8rXzoSLP/6TGCh162QlUznF8+6es08p3Yi0zgidqKpExFU2 1EX0bgOMe+/n5gjLrJ5Dw84EdDvZCtByhPgX/JbJs6UQwU+Tyvq9xgkJ7iPI6DM695dy 1coWTcOmWDonu4J2q6csTzqFXpzaDBaj+nrVVxUgFBOiPAsI6eRfE5sqHPnVZ2kHu1Sa JyEQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=msbmiiaKTT/+t1DfFqpYCSgWnUV33m2GnQDvvNPkhxM=; b=L6yuwlNLi9AeYSwuFjt07kMckmGP8N3X9AF60fP73Ii+WdneBlqeDFElocaDFQwTT9 ZMfJgCSZnc7RhOCsKMLS7LPL51/d8Y7cbTxJ62a3E0CSbZcAIrTPlUktw1GvAsDxisHV 35qEQ1psjOMUjE0RMaTg5oh8W+bHLuY255Iyz7kN/5xK0bHtyNO/hvZLkDc4uxuxonIb X+8HVI/up2RLF3wHBz33T195XJ2zUvtA4i7OAnRG3m6oPvNuD+fZRTRES5jTa0Q3wdvj uCzbKhCW61gx1Iq3K7IMO/eGLGFi6rNQGcfgo6oxA5sZf448b+gFcOmjqOORvmiNhSq9 rxew==
X-Gm-Message-State: AGi0PuZOqzckirOHXoqWbzqfFIlHUGpA6FE6B3a/X/PZGXCEuXfpQf6H xjqshjaf9PFfd8NKQhO4t5Mw6JjuESy6viLtcsQ=
X-Google-Smtp-Source: APiQypJ/AnJrh9NjjQ9+SJldt+6LGfvWjqL/j3gnKWfzFQ6i7qTJy0MmD02pDqkJ/cNxTa8j6swBGMVCZBDP1OtX0dY=
X-Received: by 2002:a67:804a:: with SMTP id b71mr1524595vsd.175.1586464557329;  Thu, 09 Apr 2020 13:35:57 -0700 (PDT)
MIME-Version: 1.0
References: <158613543159.15216.5517593808552135017@ietfa.amsl.com> <CA+Wg=gt1SMO0n9pLOY_CKemEHimr+mnWCpNcoJWq+Da9Np7UuA@mail.gmail.com>
In-Reply-To: <CA+Wg=gt1SMO0n9pLOY_CKemEHimr+mnWCpNcoJWq+Da9Np7UuA@mail.gmail.com>
From: "Murray S. Kucherawy" <superuser@gmail.com>
Date: Thu, 9 Apr 2020 13:35:45 -0700
Message-ID: <CAL0qLwbpSLCqe05ctGfHRS3NCH+XN51-XKYt376avf5i19JJUA@mail.gmail.com>
To: Todd Herr <toddmherr@gmail.com>
Cc: Dale Worley <worley@ariadne.com>, General Area Review Team <gen-art@ietf.org>, dmarc <dmarc@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000006376a405a2e190b6"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/2mziPpyMZGNOK72gKuxALKH5LBg>
Subject: Re: [dmarc-ietf] Genart last call review of draft-ietf-dmarc-psd-08
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Apr 2020 20:36:27 -0000

--0000000000006376a405a2e190b6
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

(Reducing Ccs)

That seems like it paints a much clearer picture, which is what Dale was
after.  A great start!

On Thu, Apr 9, 2020 at 12:54 PM Todd Herr <toddmherr@gmail.com> wrote:

> Having reviewed the comments, I'm wondering if perhaps the following draf=
t
> rewrite of the Abstract section might be a first step to address many of
> the points raised?
>
> *AbstractDMARC (Domain-based Message Authentication, Reporting, and
> Conformance) is a scalable mechanism by which a mail-originating
> organization can express domain-level policies and preferences for messag=
e
> validation, disposition, and reporting, that a mail-receiving organizatio=
n
> can use to improve mail handling.  *
>
> *The original design of DMARC applies only to domains that are registered
> with a domain name registrar (called =E2=80=9COrganizational Domains=E2=
=80=9D in RFC 7489)
> and nodes in the tree below Organizational Domains. Organizational Domain=
s
> are themselves nodes in the tree below domain names reserved for
> registration, with the latter commonly referred to as =E2=80=9CTop Level =
Domains=E2=80=9D
> (TLDs) (e.g., =E2=80=98.com=E2=80=99, =E2=80=98.co.uk <http://co.uk>=E2=
=80=99, etc.), although in this
> document they will be referred to as Public Suffix Domains (PSDs).*
>
> *Since its deployment in 2015, use of DMARC has shown a clear need for th=
e
> ability to express policy for PSDs. This document describes an extension =
to
> DMARC to enable DMARC functionality for PSDs.*
>
> *RFC 7489 describes an algorithm for a mail-receiving organization to use
> in determining the Organizational Domain of an inbound mail message, and
> this algorithm recommends the use of a =E2=80=9Cpublic suffix list=E2=80=
=9D (PSL), with the
> most common one maintained by the Mozilla Foundation and made public at
> <http://publicsuffix.org/ <http://publicsuffix.org/>>. Use of such a PSL =
by
> a mail-receiving organization will be required in order to discover and
> apply any DMARC policy declared by a PSD.*
>
> *This document also seeks to address implementations that consider a
> domain on a public Suffix list to be ineligible for DMARC*
>
>
> On Sun, Apr 5, 2020 at 9:11 PM Dale Worley via Datatracker <
> noreply@ietf.org> wrote:
>
>> Reviewer: Dale Worley
>> Review result: Ready with Issues
>>
>> I am the assigned Gen-ART reviewer for this draft.  The General Area
>> Review Team (Gen-ART) reviews all IETF documents being processed by
>> the IESG for the IETF Chair.  Please treat these comments just like
>> any other last call comments.
>>
>> For more information, please see the FAQ at
>>
>> <https://trac.ietf.org/trac/gen/wiki/GenArtfaq>.
>>
>> Document:  review-draft-ietf-dmarc-psd-08
>> Reviewer:  Dale R. Worley
>> Review Date:  2020-04-05
>> IETF LC End Date:  2020-04-08
>> IESG Telechat date:  not known
>>
>> * Summary:
>>
>>        This draft is on the right track but has open issues, described
>>        in the review.
>>
>> * Major issues:
>>
>> The privacy concerns described in section 4 are written as if there is
>> no certainty that the mechanisms described in the document properly
>> mitigate them.  So the document appears to be incomplete.  OTOH, since
>> this is an Experimental RFC, such mitigation isn't necessary if there
>> is commitment to do so later.  In that case, the section should
>> explicitly state that these are open issues and that there is an
>> intention of revising the document to mitigate them.
>>
>> The text suggests that a mail receiver(?) that does DMARC processing
>> has knowledge of all PSDs.  This seems a priori unlikely and even
>> impossible to implement.  So this ought to be either explained at the
>> appropriate place or resolved technically.
>>
>> * Minor issues:
>>
>> The document has the (common) editorial problem that it is written by
>> people who are deeply familiar with the subject, and it's difficult to
>> read if one doesn't share that familiarity.  This is particularly
>> significant because DMARC is an e-mail facility that (ideally) will
>> affect all e-mail that is sent, so the target audience really should
>> be anyone who has a basic understanding of e-mail.  Three particular
>> elements of this are:
>>
>> - It would be very helpful if the Introduction could state, in a few
>>   sentences, the purpose and operation of DMARC, thus informing the
>>   reader of the framework whose deficiencies this document attempts to
>>   address.  In particular, one shouldn't have to read the DMARC RFCs
>>   to be able to read this document and understand its general import.
>>
>> - The "experiment" appendixes are unclear about what the experiments
>>   actually are:  what questions they are to answer, what actions will
>>   be taken, how the results will be evaluated.  Starting each appendix
>>   with an overview paragraph would be helpful.
>>
>> - Forward references should be minimized so that a reader can
>>   understand the document in one pass.
>>
>> As a derivative of the first of these elements, the terminology used
>> for the properties of domain names is not clearly defined.  In
>> particular, where does a registration "occur"?  The only term for
>> which I think the general audience possesses an unambiguous definition
>> is "the registered domain name", e.g. ietf.org.  Now I *think* its PSD
>> is ".org", but it might be "ietf.org", and I don't know whether the
>> registration of ietf.org "occurs" at ietf.org or .org.  Further points
>> I didn't understand are pointed out in the review of the
>> Abstract and Introduction.
>>
>> * Nits/editorial comments:
>>
>> Abstract
>>
>> I'm having quite a bit of difficulty figuring out exactly what the
>> Abstract means.  I'm sure that the working group clearly understands
>> what is meant, but the writing is just loose enough that I can't fix
>> the meaning.  To raise the immediate questions:
>>
>>    DMARC (Domain-based Message Authentication, Reporting, and
>>    Conformance) is a scalable mechanism by which a mail-originating
>>    organization can express domain-level policies and preferences for
>>    message validation, disposition, and reporting, that a mail-receiving
>>    organization can use to improve mail handling.
>>
>> This sentence is quite good, as it introduces what DMARC is all about.
>>
>>    The design of DMARC
>>    presumes that domain names represent either nodes in the tree below
>>    which registrations occur, or nodes where registrations have
>>    occurred; it does not permit a domain name to have both of these
>>    properties simultaneously.
>>
>> You want to make clear here that "registration" means "domain name
>> ownership registration" (which is what section 2.2 says).  Otherwise
>> it leaves open that there is some sort of DMARC registration that you
>> might intend, until the reader gets to section 2.2.
>>
>> There's an ambiguity regarding "where" a registration happens.  E.g.,
>> does the registration of "ietf.org" "occur at" "ietf.org" or "occur
>> at" "org"?  It's possible that this could be simplified/disambiguated
>> by not using this term, but instead phrasing this in terms of domain
>> names that "are registered", and the allowed relationships between
>> them.
>>
>> And it appears certain that there are DNS nodes where registrations
>> are only done *above* that node, e.g. "datatracker.ietf.org", which
>> this sentence (if taken literally) says is not permitted by DMARC.  Is
>> the property you want to declare "one node where registrations are
>> done cannot exist below another node where registrations are done"?
>>
>> Or perhaps domain names like "datatracker.ietf.org" are of no interest
>> to DMARC because DMARC is never applied to messages for which that is
>> the relevant address?
>>
>>    Since its deployment in 2015, use of
>>    DMARC has shown a clear need for the ability to express policy for
>>    these domains as well.
>>
>> This sentence doesn't make it clear what "these domains" refers to.
>>
>>    Domains at which registrations can occur are referred to as Public
>>    Suffix Domains (PSDs).  This document describes an extension to DMARC
>>    to enable DMARC functionality for PSDs.
>>
>> It would probably be clearer to use "domain name ownership
>> registrations" again here.
>>
>> This sentence suggests that the registration of "ietf.org" "occurs at"
>> "org" and so "org" is a PSD.
>>
>>    This document also seeks to address implementations that consider a
>>    domain on a public Suffix list to be ineligible for DMARC
>>    enforcement.
>>
>> This suggests that implementations believe that they know of all PSDs,
>> so they can "consider them ineligible for DMARC enforcement".  But
>> it's hard to imagine that that they can know that they know of all
>> PSDs.
>>
>> An additional point, and I'm not sure how valuable this is, would be
>> to clarify "I'm holding an e-mail message in my hands.  What do I do
>> next?", that is, What address in the message is the domain whose DMARC
>> information is applied to the message?  And what indeed does DMARC
>> processing do to a message?  For most of the sentences of the
>> Abstract, this is not important, but it leaves the effect of the last
>> sentence unclear, as "DMARC is not enforced on messages whose *sender*
>> is in a PSD" is quite a bit different from "DMARC is not enforced on
>> messages whose *recipient* is in a PSD".  (Section 3.3 suggests that
>> the address in the From header of the message is the one that is used
>> for DMARC processing.)
>>
>> It's unclear what exactly is the contents of a "public suffix list".
>> Naively, it appears that it is the list of domain names under which
>> names can be registered, but the text uses the term in the plural, so
>> there must be some additional structure.
>>
>> Also, it seems there are some significant privacy matters addressed by
>> this document, and it's probably worth adding a sentence to notify the
>> reader of that.
>>
>> 1.  Introduction
>>
>> A number of the questions about the Abstract apply to the Introduction
>> as well.  But generally, since e-mail is a subject that every reader
>> has a basic knowledge of, it would be useful to write the introduction
>> so that one did not have to have a knowledge of the DMARC architecture
>> to understand the introduction.
>>
>>    "gov.example" publishes the following DMARC record:
>>
>>    "v=3DDMARC1; p=3Dreject; rua=3Dmailto:dmarc@dmarc.service.gov.example=
"
>>
>>    at
>>
>>    _dmarc.gov.example.
>>
>> Even better would be this aid to people who don't already know DMARC
>> implementation:
>>
>>    "gov.example" publishes the following DMARC DNS record:
>>
>>    _dmarc.gov.example.  TXT \
>>         "v=3DDMARC1; p=3Dreject; rua=3Dmailto:dmarc@dmarc.service.gov.ex=
ample"
>>
>> --
>>
>>    the non-existent organizational domain of @tax.gov.example
>>
>> I suspect you mean "t4x.gov.example" here.
>>
>>    This document provides a simple extension to DMARC [RFC7489] to
>>    allow [...]
>>
>> This sentence lists 4 important items, each of which is fairly long,
>> which together are the summary of the whole document, so it might be
>> useful to break this into a bullet-list.
>>
>> 2.  Terminology and Definitions
>>
>>    In many cases the public portion of the DNS tree is [...]
>>
>> What does "the public portion" mean?  I'm guessing it means "the names
>> not available for private registration", but you should be unambiguous
>> here.
>>
>>    They are not available for private
>>    registration.  In many cases the public portion of the DNS tree is
>>    more than one level deep.
>>
>> It seems like these two sentences are redundant and the flow of the
>> paragraph would be better if they were removed. ... Actually once they
>> are removed, it reveals that the next two sentences largely duplicate
>> the first two sentences of the paragraph.
>>
>>    2.3.  Longest PSD
>>
>>    The longest PSD is the Organizational Domain with one label removed.
>>
>>    2.4.  Organizational Domain
>>
>>    The term Organizational Domains is defined in DMARC [RFC7489]
>>    Section 3.2.
>>
>> 2.4 should be moved ahead of 2.3 to avoid a forward-reference.  But it
>> would be really helpful if the definition of Organizational Domain was
>> either summarized here or completely copied from RFC7489.  In
>> particular, if Organizational Domain is not the same as registered
>> domain name, that should be flagged.
>>
>>    2.5.  Public Suffix Operator (PSO)
>>
>>    A Public Suffix Operator manages operations within its PSD.
>>
>> Better to explicitly define the possession relationship explicitly:
>>
>>    A Public Suffix Operator is an organization which manages
>>    operations within a PSD, particularly the DNS records published for
>>    names at and under that domain name.
>>
>> --
>>
>>    2.6.  PSO Controlled Domain Names
>>
>>    PSO Controlled Domain Names are names in the DNS that are managed by
>>    a PSO and are not available for use as Organizational Domains.
>>    Depending on PSD policy, these will have one (e.g., ".com") or more
>>    (e.g., ".co.uk") name components.
>>
>> The second sentence is odd; is it useful?  Is it just to say "PSO
>> Controlled Domain Names may have one or more components."?
>>
>>    3.1.  General Updates
>>
>>    References to "Domain Owners" also apply to PSOs.
>>
>> This change really ought to be localized to a specific textual change
>> somewhere in RFC 7489, in the say way that the other changes are
>> specific amendments to the DMARC algorithm.
>>
>>    3.2.  Section 6.3 General Record Format
>>
>> These section titles are difficult to read.  At first I thought there
>> was some typographical problem.  But you could clarify this as "3.2.
>> Updates to Section 6.3.  General Record Format".  Similarly for the
>> other subsections of section 3.
>>
>> 3.3.  Section 6.5.  Domain Owner Actions
>>
>>    The mechanism for doing so is one of the
>>    experimental elements of this document.
>>
>> I think that what this means is that the whole document is an
>> experimental "mechanism for doing so".  If so, I think it could be
>> better phrased
>>
>>    This document is an experimental mechanism for doing so.
>>
>> --
>>
>>    3.4.  Section 6.6.1.  Extract Author Domain
>>
>>    [...] when the domain name extracted by the receiver (from the
>>    RFC5322.From) is on the public suffix list used by the receiver.
>>
>> This touches the question above about what a public suffix list is,
>> and how there can be more than one of them.  But without that
>> knowledge, it's hard to see which PSL is "used" by the receiver of the
>> message.
>>
>> Also, it's not clear to me how *this* document creates a capability
>> which applies to domains that are on the PSL.  E.g., if an "np" is
>> defined for ".org", it applies to (that is, affects processing of
>> e-mail from) any "X.org" that doesn't have its own DMARC records.  But
>> I don't see how an "np" tag for ".org" affects processing of messages
>> from "example@org".
>>
>>    3.5.  Section 6.6.3.  Policy Discovery
>>
>>       (discussed in the experiment description
>>       (Appendix A))
>>
>> Given that this text is nominally an update to the text of RFC 7489,
>> you want to disambiguate the binding of "Appendix A":
>>
>>       (discussed in the experiment description
>>       ([this document] Appendix A))
>>
>>    3.6.  Section 7.  DMARC Feedback
>>
>>    See Section 4 of this document for discussion of Privacy
>>    Considerations.
>>
>> Similarly to section 3.5, but also clarifying the scope of "privacy
>> considerations":
>>
>>    See Section 4 of [this document] for discussion of Privacy
>>    Considerations for PSD DMARC.
>>
>>    4.  Privacy Considerations
>>
>>    The Privacy Considerations of [RFC7489] apply to this document.
>>
>> This could be clarified as
>>
>>    Additionally, the Privacy Considerations of [RFC7489] apply to the
>>    mechanisms described by this document.
>>
>> --
>>
>>    Providing feedback reporting to PSOs can, in some cases, create
>>    leakage of information outside of an organization to the PSO.
>>
>> "outside" probably isn't the word you want to use here, as it is
>> easier to read "outside" as giving the original location of
>> "information" than to read "outside" as giving the direction of
>> "leakage".  Perhaps
>>
>>    Providing feedback reporting to PSOs can, in some cases, create
>>    leakage of information out of an organization to the PSO of its
>>    domain name.
>>
>> --
>>
>>    To minimize this potential concern,
>>    PSD DMARC feedback is best limited to Aggregate Reports.  [...]
>>
>>    [...] any Feedback Reporting related to multi-
>>    organizational PSDs ought to be limited to non-existent domains
>>    except in cases where the reporter knows that PSO requires use of
>>    DMARC.
>>
>> I can't see where in the document that these principles are turned
>> into MUST statements that ensure the privacy issues are solved.
>>
>>    The experiment is to evaluate different possible approaches.
>>
>> Calling this an "experiment" suggests that these is an intended series
>> of actions whose result will answer the listed questions.  But there
>> doesn't seem to be any such actions listed.  The description makes it
>> sound like what is intended is continuing discussions in the working
>> group, but that wouldn't be an "experiment".
>>
>> A.2.  Non-Existent Subdomain Policy
>>
>> Similar questions arise for this section.  The second paragraph
>> suggests that the experiment is to see whether the "np" tag is
>> successful.
>>
>>    There are also
>>    suggestions that it would be more generally useful for DMARC.
>>
>> What does "it" refer to?  (Does it mean "this ability"?)
>>
>> Appendix B.  DMARC PSD Registry Examples
>>
>> In this appendix, it appears that the contents of the experiment are
>> clear in the authors' minds, but there is no summary at the top that
>> states what the experimental facilities are and the "big picture" into
>> which they fit.
>>
>> Appendix C.  Implementations
>>
>>    C.1.  Authheaders Module
>>
>> What e-mail MTA is Authheaders an extension for?
>>
>> [END]
>>
>>
>>
>> _______________________________________________
>> dmarc mailing list
>> dmarc@ietf.org
>> https://www.ietf.org/mailman/listinfo/dmarc
>>
>
>
> --
> Todd Herr
>

--0000000000006376a405a2e190b6
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">(Reducing Ccs)<br><br>That seems like it paints a much cle=
arer picture, which is what Dale was after.=C2=A0 A great start!<br></div><=
br><div class=3D"gmail_quote"><div dir=3D"ltr" class=3D"gmail_attr">On Thu,=
 Apr 9, 2020 at 12:54 PM Todd Herr &lt;<a href=3D"mailto:toddmherr@gmail.co=
m">toddmherr@gmail.com</a>&gt; wrote:<br></div><blockquote class=3D"gmail_q=
uote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,2=
04);padding-left:1ex"><div dir=3D"ltr"><div dir=3D"ltr"><div class=3D"gmail=
_default" style=3D"font-family:tahoma,sans-serif;font-size:small">Having re=
viewed the comments, I&#39;m wondering if perhaps the following draft rewri=
te of the Abstract section might be a first step to address many of the poi=
nts raised?</div><div class=3D"gmail_default" style=3D"font-family:tahoma,s=
ans-serif;font-size:small"><br></div><div class=3D"gmail_default" style=3D"=
font-family:tahoma,sans-serif;font-size:small"><div style=3D"margin-left:40=
px"><font size=3D"2"><b style=3D"font-weight:normal" id=3D"gmail-m_-8174332=
386094668950gmail-docs-internal-guid-fce386d9-7fff-dc67-41b0-42892eeba272">=
<p dir=3D"ltr" style=3D"line-height:1.4568;margin-top:0pt;margin-bottom:8pt=
"><span style=3D"font-family:Arial;color:rgb(0,0,0);background-color:transp=
arent;font-weight:400;font-style:normal;font-variant:normal;text-decoration=
:none;vertical-align:baseline;white-space:pre-wrap">Abstract</span></p><p d=
ir=3D"ltr" style=3D"line-height:1.38;margin-top:0pt;margin-bottom:0pt"><spa=
n style=3D"font-family:Arial;color:rgb(0,0,0);background-color:transparent;=
font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;=
vertical-align:baseline;white-space:pre-wrap">DMARC (Domain-based Message A=
uthentication, Reporting, and Conformance) is a scalable mechanism by which=
 a mail-originating organization can express domain-level policies and pref=
erences for message validation, disposition, and reporting, that a mail-rec=
eiving organization can use to improve mail handling.=C2=A0=C2=A0</span></p=
></b></font><br><font size=3D"2"><b style=3D"font-weight:normal" id=3D"gmai=
l-m_-8174332386094668950gmail-docs-internal-guid-fce386d9-7fff-dc67-41b0-42=
892eeba272"><p dir=3D"ltr" style=3D"line-height:1.38;margin-top:0pt;margin-=
bottom:0pt"><span style=3D"font-family:Arial;color:rgb(0,0,0);background-co=
lor:transparent;font-weight:400;font-style:normal;font-variant:normal;text-=
decoration:none;vertical-align:baseline;white-space:pre-wrap">The original =
design of DMARC applies only to domains that are registered with a domain n=
ame registrar (called =E2=80=9COrganizational Domains=E2=80=9D in RFC 7489)=
 and nodes in the tree below Organizational Domains. Organizational Domains=
 are themselves nodes in the tree below domain names reserved for registrat=
ion, with the latter commonly referred to as =E2=80=9CTop Level Domains=E2=
=80=9D (TLDs) (e.g., =E2=80=98.com=E2=80=99, =E2=80=98.<a href=3D"http://co=
.uk" target=3D"_blank">co.uk</a>=E2=80=99, etc.), although in this document=
 they will be referred to as Public Suffix Domains (PSDs).</span></p></b></=
font><br><font size=3D"2"><b style=3D"font-weight:normal" id=3D"gmail-m_-81=
74332386094668950gmail-docs-internal-guid-fce386d9-7fff-dc67-41b0-42892eeba=
272"><p dir=3D"ltr" style=3D"line-height:1.38;margin-top:0pt;margin-bottom:=
0pt"><span style=3D"font-family:Arial;color:rgb(0,0,0);background-color:tra=
nsparent;font-weight:400;font-style:normal;font-variant:normal;text-decorat=
ion:none;vertical-align:baseline;white-space:pre-wrap">Since its deployment=
 in 2015, use of DMARC has shown a clear need for the ability to express po=
licy for PSDs. This document describes an extension to DMARC to enable DMAR=
C functionality for PSDs.</span></p></b></font><br><font size=3D"2"><b styl=
e=3D"font-weight:normal" id=3D"gmail-m_-8174332386094668950gmail-docs-inter=
nal-guid-fce386d9-7fff-dc67-41b0-42892eeba272"><p dir=3D"ltr" style=3D"line=
-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style=3D"font-family:A=
rial;color:rgb(0,0,0);background-color:transparent;font-weight:400;font-sty=
le:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;=
white-space:pre-wrap">RFC 7489 describes an algorithm for a mail-receiving =
organization to use in determining the Organizational Domain of an inbound =
mail message, and this algorithm recommends the use of a =E2=80=9Cpublic su=
ffix list=E2=80=9D (PSL), with the most common one maintained by the Mozill=
a Foundation and made public at &lt;</span><a href=3D"http://publicsuffix.o=
rg/" style=3D"text-decoration:none" target=3D"_blank"><span style=3D"font-f=
amily:Arial;color:rgb(17,85,204);background-color:transparent;font-weight:4=
00;font-style:normal;font-variant:normal;text-decoration:underline;vertical=
-align:baseline;white-space:pre-wrap">http://publicsuffix.org/</span></a><s=
pan style=3D"font-family:Arial;color:rgb(0,0,0);background-color:transparen=
t;font-weight:400;font-style:normal;font-variant:normal;text-decoration:non=
e;vertical-align:baseline;white-space:pre-wrap">&gt;. Use of such a PSL by =
a mail-receiving organization will be required in order to discover and app=
ly any DMARC policy declared by a PSD.</span></p></b></font><br><font size=
=3D"2"><b style=3D"font-weight:normal" id=3D"gmail-m_-8174332386094668950gm=
ail-docs-internal-guid-fce386d9-7fff-dc67-41b0-42892eeba272"><p dir=3D"ltr"=
 style=3D"line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style=3D=
"font-family:Arial;color:rgb(0,0,0);background-color:transparent;font-weigh=
t:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-a=
lign:baseline;white-space:pre-wrap">This document also seeks to address imp=
lementations that consider a domain on a public Suffix list to be ineligibl=
e for DMARC</span></p></b></font></div><br></div></div><br><div class=3D"gm=
ail_quote"><div dir=3D"ltr" class=3D"gmail_attr">On Sun, Apr 5, 2020 at 9:1=
1 PM Dale Worley via Datatracker &lt;<a href=3D"mailto:noreply@ietf.org" ta=
rget=3D"_blank">noreply@ietf.org</a>&gt; wrote:<br></div><blockquote class=
=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rg=
b(204,204,204);padding-left:1ex">Reviewer: Dale Worley<br>
Review result: Ready with Issues<br>
<br>
I am the assigned Gen-ART reviewer for this draft.=C2=A0 The General Area<b=
r>
Review Team (Gen-ART) reviews all IETF documents being processed by<br>
the IESG for the IETF Chair.=C2=A0 Please treat these comments just like<br=
>
any other last call comments.<br>
<br>
For more information, please see the FAQ at<br>
<br>
&lt;<a href=3D"https://trac.ietf.org/trac/gen/wiki/GenArtfaq" rel=3D"norefe=
rrer" target=3D"_blank">https://trac.ietf.org/trac/gen/wiki/GenArtfaq</a>&g=
t;.<br>
<br>
Document:=C2=A0 review-draft-ietf-dmarc-psd-08<br>
Reviewer:=C2=A0 Dale R. Worley<br>
Review Date:=C2=A0 2020-04-05<br>
IETF LC End Date:=C2=A0 2020-04-08<br>
IESG Telechat date:=C2=A0 not known<br>
<br>
* Summary:<br>
<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0This draft is on the right track but has open is=
sues, described<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0in the review.<br>
<br>
* Major issues:<br>
<br>
The privacy concerns described in section 4 are written as if there is<br>
no certainty that the mechanisms described in the document properly<br>
mitigate them.=C2=A0 So the document appears to be incomplete.=C2=A0 OTOH, =
since<br>
this is an Experimental RFC, such mitigation isn&#39;t necessary if there<b=
r>
is commitment to do so later.=C2=A0 In that case, the section should<br>
explicitly state that these are open issues and that there is an<br>
intention of revising the document to mitigate them.<br>
<br>
The text suggests that a mail receiver(?) that does DMARC processing<br>
has knowledge of all PSDs.=C2=A0 This seems a priori unlikely and even<br>
impossible to implement.=C2=A0 So this ought to be either explained at the<=
br>
appropriate place or resolved technically.<br>
<br>
* Minor issues:<br>
<br>
The document has the (common) editorial problem that it is written by<br>
people who are deeply familiar with the subject, and it&#39;s difficult to<=
br>
read if one doesn&#39;t share that familiarity.=C2=A0 This is particularly<=
br>
significant because DMARC is an e-mail facility that (ideally) will<br>
affect all e-mail that is sent, so the target audience really should<br>
be anyone who has a basic understanding of e-mail.=C2=A0 Three particular<b=
r>
elements of this are:<br>
<br>
- It would be very helpful if the Introduction could state, in a few<br>
=C2=A0 sentences, the purpose and operation of DMARC, thus informing the<br=
>
=C2=A0 reader of the framework whose deficiencies this document attempts to=
<br>
=C2=A0 address.=C2=A0 In particular, one shouldn&#39;t have to read the DMA=
RC RFCs<br>
=C2=A0 to be able to read this document and understand its general import.<=
br>
<br>
- The &quot;experiment&quot; appendixes are unclear about what the experime=
nts<br>
=C2=A0 actually are:=C2=A0 what questions they are to answer, what actions =
will<br>
=C2=A0 be taken, how the results will be evaluated.=C2=A0 Starting each app=
endix<br>
=C2=A0 with an overview paragraph would be helpful.<br>
<br>
- Forward references should be minimized so that a reader can<br>
=C2=A0 understand the document in one pass.<br>
<br>
As a derivative of the first of these elements, the terminology used<br>
for the properties of domain names is not clearly defined.=C2=A0 In<br>
particular, where does a registration &quot;occur&quot;?=C2=A0 The only ter=
m for<br>
which I think the general audience possesses an unambiguous definition<br>
is &quot;the registered domain name&quot;, e.g. <a href=3D"http://ietf.org"=
 rel=3D"noreferrer" target=3D"_blank">ietf.org</a>.=C2=A0 Now I *think* its=
 PSD<br>
is &quot;.org&quot;, but it might be &quot;<a href=3D"http://ietf.org" rel=
=3D"noreferrer" target=3D"_blank">ietf.org</a>&quot;, and I don&#39;t know =
whether the<br>
registration of <a href=3D"http://ietf.org" rel=3D"noreferrer" target=3D"_b=
lank">ietf.org</a> &quot;occurs&quot; at <a href=3D"http://ietf.org" rel=3D=
"noreferrer" target=3D"_blank">ietf.org</a> or .org.=C2=A0 Further points<b=
r>
I didn&#39;t understand are pointed out in the review of the<br>
Abstract and Introduction.<br>
<br>
* Nits/editorial comments: <br>
<br>
Abstract<br>
<br>
I&#39;m having quite a bit of difficulty figuring out exactly what the<br>
Abstract means.=C2=A0 I&#39;m sure that the working group clearly understan=
ds<br>
what is meant, but the writing is just loose enough that I can&#39;t fix<br=
>
the meaning.=C2=A0 To raise the immediate questions:<br>
<br>
=C2=A0 =C2=A0DMARC (Domain-based Message Authentication, Reporting, and<br>
=C2=A0 =C2=A0Conformance) is a scalable mechanism by which a mail-originati=
ng<br>
=C2=A0 =C2=A0organization can express domain-level policies and preferences=
 for<br>
=C2=A0 =C2=A0message validation, disposition, and reporting, that a mail-re=
ceiving<br>
=C2=A0 =C2=A0organization can use to improve mail handling.<br>
<br>
This sentence is quite good, as it introduces what DMARC is all about.<br>
<br>
=C2=A0 =C2=A0The design of DMARC<br>
=C2=A0 =C2=A0presumes that domain names represent either nodes in the tree =
below<br>
=C2=A0 =C2=A0which registrations occur, or nodes where registrations have<b=
r>
=C2=A0 =C2=A0occurred; it does not permit a domain name to have both of the=
se<br>
=C2=A0 =C2=A0properties simultaneously.<br>
<br>
You want to make clear here that &quot;registration&quot; means &quot;domai=
n name<br>
ownership registration&quot; (which is what section 2.2 says).=C2=A0 Otherw=
ise<br>
it leaves open that there is some sort of DMARC registration that you<br>
might intend, until the reader gets to section 2.2.<br>
<br>
There&#39;s an ambiguity regarding &quot;where&quot; a registration happens=
.=C2=A0 E.g.,<br>
does the registration of &quot;<a href=3D"http://ietf.org" rel=3D"noreferre=
r" target=3D"_blank">ietf.org</a>&quot; &quot;occur at&quot; &quot;<a href=
=3D"http://ietf.org" rel=3D"noreferrer" target=3D"_blank">ietf.org</a>&quot=
; or &quot;occur<br>
at&quot; &quot;org&quot;?=C2=A0 It&#39;s possible that this could be simpli=
fied/disambiguated<br>
by not using this term, but instead phrasing this in terms of domain<br>
names that &quot;are registered&quot;, and the allowed relationships betwee=
n<br>
them.<br>
<br>
And it appears certain that there are DNS nodes where registrations<br>
are only done *above* that node, e.g. &quot;<a href=3D"http://datatracker.i=
etf.org" rel=3D"noreferrer" target=3D"_blank">datatracker.ietf.org</a>&quot=
;, which<br>
this sentence (if taken literally) says is not permitted by DMARC.=C2=A0 Is=
<br>
the property you want to declare &quot;one node where registrations are<br>
done cannot exist below another node where registrations are done&quot;?<br=
>
<br>
Or perhaps domain names like &quot;<a href=3D"http://datatracker.ietf.org" =
rel=3D"noreferrer" target=3D"_blank">datatracker.ietf.org</a>&quot; are of =
no interest<br>
to DMARC because DMARC is never applied to messages for which that is<br>
the relevant address?<br>
<br>
=C2=A0 =C2=A0Since its deployment in 2015, use of<br>
=C2=A0 =C2=A0DMARC has shown a clear need for the ability to express policy=
 for<br>
=C2=A0 =C2=A0these domains as well.<br>
<br>
This sentence doesn&#39;t make it clear what &quot;these domains&quot; refe=
rs to.<br>
<br>
=C2=A0 =C2=A0Domains at which registrations can occur are referred to as Pu=
blic<br>
=C2=A0 =C2=A0Suffix Domains (PSDs).=C2=A0 This document describes an extens=
ion to DMARC<br>
=C2=A0 =C2=A0to enable DMARC functionality for PSDs.<br>
<br>
It would probably be clearer to use &quot;domain name ownership<br>
registrations&quot; again here.<br>
<br>
This sentence suggests that the registration of &quot;<a href=3D"http://iet=
f.org" rel=3D"noreferrer" target=3D"_blank">ietf.org</a>&quot; &quot;occurs=
 at&quot;<br>
&quot;org&quot; and so &quot;org&quot; is a PSD.<br>
<br>
=C2=A0 =C2=A0This document also seeks to address implementations that consi=
der a<br>
=C2=A0 =C2=A0domain on a public Suffix list to be ineligible for DMARC<br>
=C2=A0 =C2=A0enforcement.<br>
<br>
This suggests that implementations believe that they know of all PSDs,<br>
so they can &quot;consider them ineligible for DMARC enforcement&quot;.=C2=
=A0 But<br>
it&#39;s hard to imagine that that they can know that they know of all<br>
PSDs.<br>
<br>
An additional point, and I&#39;m not sure how valuable this is, would be<br=
>
to clarify &quot;I&#39;m holding an e-mail message in my hands.=C2=A0 What =
do I do<br>
next?&quot;, that is, What address in the message is the domain whose DMARC=
<br>
information is applied to the message?=C2=A0 And what indeed does DMARC<br>
processing do to a message?=C2=A0 For most of the sentences of the<br>
Abstract, this is not important, but it leaves the effect of the last<br>
sentence unclear, as &quot;DMARC is not enforced on messages whose *sender*=
<br>
is in a PSD&quot; is quite a bit different from &quot;DMARC is not enforced=
 on<br>
messages whose *recipient* is in a PSD&quot;.=C2=A0 (Section 3.3 suggests t=
hat<br>
the address in the From header of the message is the one that is used<br>
for DMARC processing.)<br>
<br>
It&#39;s unclear what exactly is the contents of a &quot;public suffix list=
&quot;.<br>
Naively, it appears that it is the list of domain names under which<br>
names can be registered, but the text uses the term in the plural, so<br>
there must be some additional structure.<br>
<br>
Also, it seems there are some significant privacy matters addressed by<br>
this document, and it&#39;s probably worth adding a sentence to notify the<=
br>
reader of that.<br>
<br>
1.=C2=A0 Introduction<br>
<br>
A number of the questions about the Abstract apply to the Introduction<br>
as well.=C2=A0 But generally, since e-mail is a subject that every reader<b=
r>
has a basic knowledge of, it would be useful to write the introduction<br>
so that one did not have to have a knowledge of the DMARC architecture<br>
to understand the introduction.<br>
<br>
=C2=A0 =C2=A0&quot;gov.example&quot; publishes the following DMARC record:<=
br>
<br>
=C2=A0 =C2=A0&quot;v=3DDMARC1; p=3Dreject; rua=3Dmailto:<a href=3D"mailto:d=
marc@dmarc.service.gov.example" target=3D"_blank">dmarc@dmarc.service.gov.e=
xample</a>&quot;<br>
<br>
=C2=A0 =C2=A0at<br>
<br>
=C2=A0 =C2=A0_dmarc.gov.example.<br>
<br>
Even better would be this aid to people who don&#39;t already know DMARC<br=
>
implementation:<br>
<br>
=C2=A0 =C2=A0&quot;gov.example&quot; publishes the following DMARC DNS reco=
rd:<br>
<br>
=C2=A0 =C2=A0_dmarc.gov.example.=C2=A0 TXT \<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 &quot;v=3DDMARC1; p=3Dreject; rua=3Dmailto:<a h=
ref=3D"mailto:dmarc@dmarc.service.gov.example" target=3D"_blank">dmarc@dmar=
c.service.gov.example</a>&quot;<br>
<br>
--<br>
<br>
=C2=A0 =C2=A0the non-existent organizational domain of @tax.gov.example<br>
<br>
I suspect you mean &quot;t4x.gov.example&quot; here.<br>
<br>
=C2=A0 =C2=A0This document provides a simple extension to DMARC [RFC7489] t=
o<br>
=C2=A0 =C2=A0allow [...]<br>
<br>
This sentence lists 4 important items, each of which is fairly long,<br>
which together are the summary of the whole document, so it might be<br>
useful to break this into a bullet-list.<br>
<br>
2.=C2=A0 Terminology and Definitions<br>
<br>
=C2=A0 =C2=A0In many cases the public portion of the DNS tree is [...]<br>
<br>
What does &quot;the public portion&quot; mean?=C2=A0 I&#39;m guessing it me=
ans &quot;the names<br>
not available for private registration&quot;, but you should be unambiguous=
<br>
here.<br>
<br>
=C2=A0 =C2=A0They are not available for private<br>
=C2=A0 =C2=A0registration.=C2=A0 In many cases the public portion of the DN=
S tree is<br>
=C2=A0 =C2=A0more than one level deep.<br>
<br>
It seems like these two sentences are redundant and the flow of the<br>
paragraph would be better if they were removed. ... Actually once they<br>
are removed, it reveals that the next two sentences largely duplicate<br>
the first two sentences of the paragraph.<br>
<br>
=C2=A0 =C2=A02.3.=C2=A0 Longest PSD<br>
<br>
=C2=A0 =C2=A0The longest PSD is the Organizational Domain with one label re=
moved.<br>
<br>
=C2=A0 =C2=A02.4.=C2=A0 Organizational Domain<br>
<br>
=C2=A0 =C2=A0The term Organizational Domains is defined in DMARC [RFC7489]<=
br>
=C2=A0 =C2=A0Section 3.2.<br>
<br>
2.4 should be moved ahead of 2.3 to avoid a forward-reference.=C2=A0 But it=
<br>
would be really helpful if the definition of Organizational Domain was<br>
either summarized here or completely copied from RFC7489.=C2=A0 In<br>
particular, if Organizational Domain is not the same as registered<br>
domain name, that should be flagged.<br>
<br>
=C2=A0 =C2=A02.5.=C2=A0 Public Suffix Operator (PSO)<br>
<br>
=C2=A0 =C2=A0A Public Suffix Operator manages operations within its PSD.<br=
>
<br>
Better to explicitly define the possession relationship explicitly:<br>
<br>
=C2=A0 =C2=A0A Public Suffix Operator is an organization which manages<br>
=C2=A0 =C2=A0operations within a PSD, particularly the DNS records publishe=
d for<br>
=C2=A0 =C2=A0names at and under that domain name.<br>
<br>
--<br>
<br>
=C2=A0 =C2=A02.6.=C2=A0 PSO Controlled Domain Names<br>
<br>
=C2=A0 =C2=A0PSO Controlled Domain Names are names in the DNS that are mana=
ged by<br>
=C2=A0 =C2=A0a PSO and are not available for use as Organizational Domains.=
<br>
=C2=A0 =C2=A0Depending on PSD policy, these will have one (e.g., &quot;.com=
&quot;) or more<br>
=C2=A0 =C2=A0(e.g., &quot;.<a href=3D"http://co.uk" rel=3D"noreferrer" targ=
et=3D"_blank">co.uk</a>&quot;) name components.<br>
<br>
The second sentence is odd; is it useful?=C2=A0 Is it just to say &quot;PSO=
<br>
Controlled Domain Names may have one or more components.&quot;?<br>
<br>
=C2=A0 =C2=A03.1.=C2=A0 General Updates<br>
<br>
=C2=A0 =C2=A0References to &quot;Domain Owners&quot; also apply to PSOs.<br=
>
<br>
This change really ought to be localized to a specific textual change<br>
somewhere in RFC 7489, in the say way that the other changes are<br>
specific amendments to the DMARC algorithm.<br>
<br>
=C2=A0 =C2=A03.2.=C2=A0 Section 6.3 General Record Format<br>
<br>
These section titles are difficult to read.=C2=A0 At first I thought there<=
br>
was some typographical problem.=C2=A0 But you could clarify this as &quot;3=
.2.<br>
Updates to Section 6.3.=C2=A0 General Record Format&quot;.=C2=A0 Similarly =
for the<br>
other subsections of section 3.<br>
<br>
3.3.=C2=A0 Section 6.5.=C2=A0 Domain Owner Actions<br>
<br>
=C2=A0 =C2=A0The mechanism for doing so is one of the<br>
=C2=A0 =C2=A0experimental elements of this document.<br>
<br>
I think that what this means is that the whole document is an<br>
experimental &quot;mechanism for doing so&quot;.=C2=A0 If so, I think it co=
uld be<br>
better phrased<br>
<br>
=C2=A0 =C2=A0This document is an experimental mechanism for doing so.<br>
<br>
--<br>
<br>
=C2=A0 =C2=A03.4.=C2=A0 Section 6.6.1.=C2=A0 Extract Author Domain<br>
<br>
=C2=A0 =C2=A0[...] when the domain name extracted by the receiver (from the=
<br>
=C2=A0 =C2=A0RFC5322.From) is on the public suffix list used by the receive=
r.<br>
<br>
This touches the question above about what a public suffix list is,<br>
and how there can be more than one of them.=C2=A0 But without that<br>
knowledge, it&#39;s hard to see which PSL is &quot;used&quot; by the receiv=
er of the<br>
message.<br>
<br>
Also, it&#39;s not clear to me how *this* document creates a capability<br>
which applies to domains that are on the PSL.=C2=A0 E.g., if an &quot;np&qu=
ot; is<br>
defined for &quot;.org&quot;, it applies to (that is, affects processing of=
<br>
e-mail from) any &quot;X.org&quot; that doesn&#39;t have its own DMARC reco=
rds.=C2=A0 But<br>
I don&#39;t see how an &quot;np&quot; tag for &quot;.org&quot; affects proc=
essing of messages<br>
from &quot;example@org&quot;.<br>
<br>
=C2=A0 =C2=A03.5.=C2=A0 Section 6.6.3.=C2=A0 Policy Discovery<br>
<br>
=C2=A0 =C2=A0 =C2=A0 (discussed in the experiment description<br>
=C2=A0 =C2=A0 =C2=A0 (Appendix A))<br>
<br>
Given that this text is nominally an update to the text of RFC 7489,<br>
you want to disambiguate the binding of &quot;Appendix A&quot;:<br>
<br>
=C2=A0 =C2=A0 =C2=A0 (discussed in the experiment description<br>
=C2=A0 =C2=A0 =C2=A0 ([this document] Appendix A))<br>
<br>
=C2=A0 =C2=A03.6.=C2=A0 Section 7.=C2=A0 DMARC Feedback<br>
<br>
=C2=A0 =C2=A0See Section 4 of this document for discussion of Privacy<br>
=C2=A0 =C2=A0Considerations.<br>
<br>
Similarly to section 3.5, but also clarifying the scope of &quot;privacy<br=
>
considerations&quot;:<br>
<br>
=C2=A0 =C2=A0See Section 4 of [this document] for discussion of Privacy<br>
=C2=A0 =C2=A0Considerations for PSD DMARC.<br>
<br>
=C2=A0 =C2=A04.=C2=A0 Privacy Considerations<br>
<br>
=C2=A0 =C2=A0The Privacy Considerations of [RFC7489] apply to this document=
.<br>
<br>
This could be clarified as<br>
<br>
=C2=A0 =C2=A0Additionally, the Privacy Considerations of [RFC7489] apply to=
 the<br>
=C2=A0 =C2=A0mechanisms described by this document.<br>
<br>
--<br>
<br>
=C2=A0 =C2=A0Providing feedback reporting to PSOs can, in some cases, creat=
e<br>
=C2=A0 =C2=A0leakage of information outside of an organization to the PSO.<=
br>
<br>
&quot;outside&quot; probably isn&#39;t the word you want to use here, as it=
 is<br>
easier to read &quot;outside&quot; as giving the original location of<br>
&quot;information&quot; than to read &quot;outside&quot; as giving the dire=
ction of<br>
&quot;leakage&quot;.=C2=A0 Perhaps<br>
<br>
=C2=A0 =C2=A0Providing feedback reporting to PSOs can, in some cases, creat=
e<br>
=C2=A0 =C2=A0leakage of information out of an organization to the PSO of it=
s<br>
=C2=A0 =C2=A0domain name.<br>
<br>
--<br>
<br>
=C2=A0 =C2=A0To minimize this potential concern,<br>
=C2=A0 =C2=A0PSD DMARC feedback is best limited to Aggregate Reports.=C2=A0=
 [...]<br>
<br>
=C2=A0 =C2=A0[...] any Feedback Reporting related to multi-<br>
=C2=A0 =C2=A0organizational PSDs ought to be limited to non-existent domain=
s<br>
=C2=A0 =C2=A0except in cases where the reporter knows that PSO requires use=
 of<br>
=C2=A0 =C2=A0DMARC.<br>
<br>
I can&#39;t see where in the document that these principles are turned<br>
into MUST statements that ensure the privacy issues are solved.<br>
<br>
=C2=A0 =C2=A0The experiment is to evaluate different possible approaches.<b=
r>
<br>
Calling this an &quot;experiment&quot; suggests that these is an intended s=
eries<br>
of actions whose result will answer the listed questions.=C2=A0 But there<b=
r>
doesn&#39;t seem to be any such actions listed.=C2=A0 The description makes=
 it<br>
sound like what is intended is continuing discussions in the working<br>
group, but that wouldn&#39;t be an &quot;experiment&quot;.<br>
<br>
A.2.=C2=A0 Non-Existent Subdomain Policy<br>
<br>
Similar questions arise for this section.=C2=A0 The second paragraph<br>
suggests that the experiment is to see whether the &quot;np&quot; tag is<br=
>
successful.<br>
<br>
=C2=A0 =C2=A0There are also<br>
=C2=A0 =C2=A0suggestions that it would be more generally useful for DMARC.<=
br>
<br>
What does &quot;it&quot; refer to?=C2=A0 (Does it mean &quot;this ability&q=
uot;?)<br>
<br>
Appendix B.=C2=A0 DMARC PSD Registry Examples<br>
<br>
In this appendix, it appears that the contents of the experiment are<br>
clear in the authors&#39; minds, but there is no summary at the top that<br=
>
states what the experimental facilities are and the &quot;big picture&quot;=
 into<br>
which they fit.<br>
<br>
Appendix C.=C2=A0 Implementations<br>
<br>
=C2=A0 =C2=A0C.1.=C2=A0 Authheaders Module<br>
<br>
What e-mail MTA is Authheaders an extension for?<br>
<br>
[END]<br>
<br>
<br>
<br>
_______________________________________________<br>
dmarc mailing list<br>
<a href=3D"mailto:dmarc@ietf.org" target=3D"_blank">dmarc@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/dmarc" rel=3D"noreferrer" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/dmarc</a><br>
</blockquote></div><br clear=3D"all"><br>-- <br><div dir=3D"ltr"><div dir=
=3D"ltr"><div><div dir=3D"ltr"><div><div dir=3D"ltr"><span style=3D"font-fa=
mily:tahoma,sans-serif">Todd Herr<br></span></div></div></div></div></div><=
/div></div>
</blockquote></div>

--0000000000006376a405a2e190b6--


From nobody Thu Apr  9 14:04:42 2020
Return-Path: <kurta@drkurt.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C92133A0E83 for <dmarc@ietfa.amsl.com>; Thu,  9 Apr 2020 14:04:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.088
X-Spam-Level: 
X-Spam-Status: No, score=-2.088 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=drkurt.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lKE2wL5-1tqb for <dmarc@ietfa.amsl.com>; Thu,  9 Apr 2020 14:04:37 -0700 (PDT)
Received: from mail-il1-x134.google.com (mail-il1-x134.google.com [IPv6:2607:f8b0:4864:20::134]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CD3A83A0E7E for <dmarc@ietf.org>; Thu,  9 Apr 2020 14:04:37 -0700 (PDT)
Received: by mail-il1-x134.google.com with SMTP id p13so106446ilp.3 for <dmarc@ietf.org>; Thu, 09 Apr 2020 14:04:37 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=drkurt.com; s=20130612; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=HfODZfzH1vNOUq2d9Z5QHP7U5mvYvCmSDvHLGdv9XkY=; b=BPnGceJhMBKq/eB5QJWpFtleGriLjqE9oweXREbr9C1V5qXqG8cfmV49gUhC+kV4IG VwHWlzVhM1LxNSJFpJn87JeqSjHS3QAglUrwNxNItE3fwRJsnVY+hd3CRF1IwFyrTRaF 8Ho6W/wU39gVFXbrYo5P9L85DJCv7BEYvmzjU=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=HfODZfzH1vNOUq2d9Z5QHP7U5mvYvCmSDvHLGdv9XkY=; b=CQHMaQDCY5us93hNn2PpSVc3UvT8CaiO/h8FBiaEHzou8C79nXo13Nj/Z5PugzCARh M2qAsNWeAvfTzJC9SStnz+vFK5ZacVn+Puh5qs8f6f/7KgXGEHJeCJyECTDhbKHgYh1u e5woHGo4xsmF7oaBNZxkO74MLhaGEieWDJ/514y+BX/KOtZ5pBXAptyGY4IYLYbk3yn5 WbEthSzgcdNMwla6kdTfV2Z6Dkg5G5+r6lOFdHKFpPd/U0ycJGAjxoQdCHcjHwjdDRhb uyMdy0uISCsgvzGgFzhOkYfWRZFAwQJHFRmUG42udzKpBJgk7E9gbnH+FWbOJyC2yYOk oipQ==
X-Gm-Message-State: AGi0Puar98c0OiS8y9Rl7/0gmep9lJEDx35FmtNqcWhWWWLZQZqU9xKi XRt/m3C45DzgKbwFCGweLiZEgZgKsS8QZSivckUTSA==
X-Google-Smtp-Source: APiQypLj2xK2esJYg6UaJMRA7nJP6/oZzbaLFdd7XnS1k9H8VSUGmj8kZSYXpFXf8HRT2qMNQwj53NuEwqzK1z2GKdw=
X-Received: by 2002:a92:db04:: with SMTP id b4mr1813287iln.120.1586466277029;  Thu, 09 Apr 2020 14:04:37 -0700 (PDT)
MIME-Version: 1.0
References: <158613543159.15216.5517593808552135017@ietfa.amsl.com> <CA+Wg=gt1SMO0n9pLOY_CKemEHimr+mnWCpNcoJWq+Da9Np7UuA@mail.gmail.com> <CAL0qLwbpSLCqe05ctGfHRS3NCH+XN51-XKYt376avf5i19JJUA@mail.gmail.com>
In-Reply-To: <CAL0qLwbpSLCqe05ctGfHRS3NCH+XN51-XKYt376avf5i19JJUA@mail.gmail.com>
From: "Kurt Andersen (b)" <kboth@drkurt.com>
Date: Thu, 9 Apr 2020 14:04:22 -0700
Message-ID: <CABuGu1rekWo3mRkK_OpRksYNrSmPaFHD6k1_K=a7a_Sx7aMhBQ@mail.gmail.com>
To: "Murray S. Kucherawy" <superuser@gmail.com>
Cc: Todd Herr <toddmherr@gmail.com>, dmarc <dmarc@ietf.org>,  General Area Review Team <gen-art@ietf.org>, Dale Worley <worley@ariadne.com>
Content-Type: multipart/alternative; boundary="000000000000e41ee005a2e1f607"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/4OHYkvBRhzEib2hsBim2zoht_ns>
Subject: Re: [dmarc-ietf] Genart last call review of draft-ietf-dmarc-psd-08
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Apr 2020 21:04:40 -0000

--000000000000e41ee005a2e1f607
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

On Thu, Apr 9, 2020 at 1:36 PM Murray S. Kucherawy <superuser@gmail.com>
wrote:

>
> That seems like it paints a much clearer picture, which is what Dale was
> after.  A great start!
>
> On Thu, Apr 9, 2020 at 12:54 PM Todd Herr <toddmherr@gmail.com> wrote:
>
>> Having reviewed the comments, I'm wondering if perhaps the following
>> draft rewrite of the Abstract section might be a first step to address m=
any
>> of the points raised?
>>
>> *AbstractDMARC (Domain-based Message Authentication, Reporting, and
>> Conformance) is a scalable mechanism by which a mail-originating
>> organization can express domain-level policies and preferences for messa=
ge
>> validation, disposition, and reporting, that a mail-receiving organizati=
on
>> can use to improve mail handling.  *
>>
>> *The original design of DMARC applies only to domains that are registere=
d
>> with a domain name registrar (called =E2=80=9COrganizational Domains=E2=
=80=9D in RFC 7489)
>> and nodes in the tree below Organizational Domains. Organizational Domai=
ns
>> are themselves nodes in the tree below domain names reserved for
>> registration, with the latter commonly referred to as =E2=80=9CTop Level=
 Domains=E2=80=9D
>> (TLDs) (e.g., =E2=80=98.com=E2=80=99, =E2=80=98.co.uk <http://co..uk>=E2=
=80=99, etc.), although in this
>> document they will be referred to as Public Suffix Domains (PSDs).*
>>
>> *Since its deployment in 2015, use of DMARC has shown a clear need for
>> the ability to express policy for PSDs. This document describes an
>> extension to DMARC to enable DMARC functionality for PSDs.*
>>
>> *RFC 7489 describes an algorithm for a mail-receiving organization to us=
e
>> in determining the Organizational Domain of an inbound mail message, and
>> this algorithm recommends the use of a =E2=80=9Cpublic suffix list=E2=80=
=9D (PSL), with the
>> most common one maintained by the Mozilla Foundation and made public at
>> <http://publicsuffix.org/ <http://publicsuffix.org/>>. Use of such a PSL=
 by
>> a mail-receiving organization will be required in order to discover and
>> apply any DMARC policy declared by a PSD.*
>>
>> *This document also seeks to address implementations that consider a
>> domain on a public Suffix list to be ineligible for DMARC*
>>
>
I have two concerns with the proposed abstract:

   1. ".co.uk" is not a TLD. TLDs are single label domains - there are
   ccTLDs and gTLDs.
   2. The invocation of the PSL compounds the issue that was raised by Dave
   Crocker. How DMARC (RFC 7489) determines the organizational domain is
   orthogonal to this proposal which simply calls for a conditional additio=
nal
   check at the "org - 1" level. I recommend striking the penultimate
   paragraph in the proposal.

--Kurt

--000000000000e41ee005a2e1f607
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div class=3D"gmail_quote"><div dir=3D"ltr" class=3D"gmail=
_attr">On Thu, Apr 9, 2020 at 1:36 PM Murray S. Kucherawy &lt;<a href=3D"ma=
ilto:superuser@gmail.com">superuser@gmail.com</a>&gt; wrote:<br></div><bloc=
kquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:=
1px solid rgb(204,204,204);padding-left:1ex"><div dir=3D"ltr"><br>That seem=
s like it paints a much clearer picture, which is what Dale was after.=C2=
=A0 A great start!<br></div><br><div class=3D"gmail_quote"><div dir=3D"ltr"=
 class=3D"gmail_attr">On Thu, Apr 9, 2020 at 12:54 PM Todd Herr &lt;<a href=
=3D"mailto:toddmherr@gmail.com" target=3D"_blank">toddmherr@gmail.com</a>&g=
t; wrote:<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0p=
x 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div d=
ir=3D"ltr"><div dir=3D"ltr"><div style=3D"font-family:tahoma,sans-serif;fon=
t-size:small">Having reviewed the comments, I&#39;m wondering if perhaps th=
e following draft rewrite of the Abstract section might be a first step to =
address many of the points raised?</div><div style=3D"font-family:tahoma,sa=
ns-serif;font-size:small"><br></div><div style=3D"font-family:tahoma,sans-s=
erif;font-size:small"><div style=3D"margin-left:40px"><font size=3D"2"><b s=
tyle=3D"font-weight:normal" id=3D"gmail-m_-8287216144552149699gmail-m_-8174=
332386094668950gmail-docs-internal-guid-fce386d9-7fff-dc67-41b0-42892eeba27=
2"><p dir=3D"ltr" style=3D"line-height:1.4568;margin-top:0pt;margin-bottom:=
8pt"><span style=3D"font-family:Arial;color:rgb(0,0,0);background-color:tra=
nsparent;font-weight:400;font-style:normal;font-variant:normal;text-decorat=
ion:none;vertical-align:baseline;white-space:pre-wrap">Abstract</span></p><=
p dir=3D"ltr" style=3D"line-height:1.38;margin-top:0pt;margin-bottom:0pt"><=
span style=3D"font-family:Arial;color:rgb(0,0,0);background-color:transpare=
nt;font-weight:400;font-style:normal;font-variant:normal;text-decoration:no=
ne;vertical-align:baseline;white-space:pre-wrap">DMARC (Domain-based Messag=
e Authentication, Reporting, and Conformance) is a scalable mechanism by wh=
ich a mail-originating organization can express domain-level policies and p=
references for message validation, disposition, and reporting, that a mail-=
receiving organization can use to improve mail handling.=C2=A0=C2=A0</span>=
</p></b></font><br><font size=3D"2"><b style=3D"font-weight:normal" id=3D"g=
mail-m_-8287216144552149699gmail-m_-8174332386094668950gmail-docs-internal-=
guid-fce386d9-7fff-dc67-41b0-42892eeba272"><p dir=3D"ltr" style=3D"line-hei=
ght:1.38;margin-top:0pt;margin-bottom:0pt"><span style=3D"font-family:Arial=
;color:rgb(0,0,0);background-color:transparent;font-weight:400;font-style:n=
ormal;font-variant:normal;text-decoration:none;vertical-align:baseline;whit=
e-space:pre-wrap">The original design of DMARC applies only to domains that=
 are registered with a domain name registrar (called =E2=80=9COrganizationa=
l Domains=E2=80=9D in RFC 7489) and nodes in the tree below Organizational =
Domains. Organizational Domains are themselves nodes in the tree below doma=
in names reserved for registration, with the latter commonly referred to as=
 =E2=80=9CTop Level Domains=E2=80=9D (TLDs) (e.g., =E2=80=98.com=E2=80=99, =
=E2=80=98.<a href=3D"http://co..uk" target=3D"_blank">co.uk</a>=E2=80=99, e=
tc.), although in this document they will be referred to as Public Suffix D=
omains (PSDs).</span></p></b></font><br><font size=3D"2"><b style=3D"font-w=
eight:normal" id=3D"gmail-m_-8287216144552149699gmail-m_-817433238609466895=
0gmail-docs-internal-guid-fce386d9-7fff-dc67-41b0-42892eeba272"><p dir=3D"l=
tr" style=3D"line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style=
=3D"font-family:Arial;color:rgb(0,0,0);background-color:transparent;font-we=
ight:400;font-style:normal;font-variant:normal;text-decoration:none;vertica=
l-align:baseline;white-space:pre-wrap">Since its deployment in 2015, use of=
 DMARC has shown a clear need for the ability to express policy for PSDs. T=
his document describes an extension to DMARC to enable DMARC functionality =
for PSDs.</span></p></b></font><br><font size=3D"2"><b style=3D"font-weight=
:normal" id=3D"gmail-m_-8287216144552149699gmail-m_-8174332386094668950gmai=
l-docs-internal-guid-fce386d9-7fff-dc67-41b0-42892eeba272"><p dir=3D"ltr" s=
tyle=3D"line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style=3D"f=
ont-family:Arial;color:rgb(0,0,0);background-color:transparent;font-weight:=
400;font-style:normal;font-variant:normal;text-decoration:none;vertical-ali=
gn:baseline;white-space:pre-wrap">RFC 7489 describes an algorithm for a mai=
l-receiving organization to use in determining the Organizational Domain of=
 an inbound mail message, and this algorithm recommends the use of a =E2=80=
=9Cpublic suffix list=E2=80=9D (PSL), with the most common one maintained b=
y the Mozilla Foundation and made public at &lt;</span><a href=3D"http://pu=
blicsuffix.org/" style=3D"text-decoration:none" target=3D"_blank"><span sty=
le=3D"font-family:Arial;color:rgb(17,85,204);background-color:transparent;f=
ont-weight:400;font-style:normal;font-variant:normal;text-decoration:underl=
ine;vertical-align:baseline;white-space:pre-wrap">http://publicsuffix.org/<=
/span></a><span style=3D"font-family:Arial;color:rgb(0,0,0);background-colo=
r:transparent;font-weight:400;font-style:normal;font-variant:normal;text-de=
coration:none;vertical-align:baseline;white-space:pre-wrap">&gt;. Use of su=
ch a PSL by a mail-receiving organization will be required in order to disc=
over and apply any DMARC policy declared by a PSD.</span></p></b></font><br=
><font size=3D"2"><b style=3D"font-weight:normal" id=3D"gmail-m_-8287216144=
552149699gmail-m_-8174332386094668950gmail-docs-internal-guid-fce386d9-7fff=
-dc67-41b0-42892eeba272"><p dir=3D"ltr" style=3D"line-height:1.38;margin-to=
p:0pt;margin-bottom:0pt"><span style=3D"font-family:Arial;color:rgb(0,0,0);=
background-color:transparent;font-weight:400;font-style:normal;font-variant=
:normal;text-decoration:none;vertical-align:baseline;white-space:pre-wrap">=
This document also seeks to address implementations that consider a domain =
on a public Suffix list to be ineligible for DMARC</span></p></b></font></d=
iv></div></div></div></blockquote></div></blockquote><div><br></div><div di=
r=3D"ltr">I have two concerns with the proposed abstract:<div><ol><li>&quot=
;.<a href=3D"http://co.uk">co.uk</a>&quot; is not a TLD. TLDs are single la=
bel domains - there are ccTLDs and gTLDs.</li><li>The invocation of the PSL=
 compounds the issue that was raised by Dave Crocker. How DMARC (RFC 7489) =
determines the organizational domain is orthogonal to this proposal which s=
imply calls for a conditional additional check at the &quot;org - 1&quot; l=
evel. I recommend striking the penultimate paragraph in the proposal.</li><=
/ol></div></div><div>--Kurt=C2=A0</div></div></div>

--000000000000e41ee005a2e1f607--


From nobody Thu Apr  9 16:09:39 2020
Return-Path: <johnl@iecc.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 036333A12CA for <dmarc@ietfa.amsl.com>; Thu,  9 Apr 2020 16:09:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.852
X-Spam-Level: 
X-Spam-Status: No, score=-1.852 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.248, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1536-bit key) header.d=iecc.com header.b=W/pdj5K5; dkim=pass (1536-bit key) header.d=taugh.com header.b=JpetNRHz
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WGDB5tfxoFSN for <dmarc@ietfa.amsl.com>; Thu,  9 Apr 2020 16:09:35 -0700 (PDT)
Received: from gal.iecc.com (gal.iecc.com [IPv6:2001:470:1f07:1126:0:43:6f73:7461]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6FEE23A12C9 for <dmarc@ietf.org>; Thu,  9 Apr 2020 16:09:35 -0700 (PDT)
Received: (qmail 3492 invoked from network); 9 Apr 2020 23:09:34 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=iecc.com; h=date:message-id:from:to:cc:subject:in-reply-to:mime-version:content-type:content-transfer-encoding; s=d9f.5e8fab2e.k2004; bh=F8ar9fiXFLqQgWz3BLVeWiECivOFp9OqRCCudjVXsL4=; b=W/pdj5K56eDI7xb8lclXOOB/EInseLqUa2Ss2B6pLyLw/TCw6c/AbjVPsMU4lO1hE7ztdmS+qN/CThbFmd/y5aEMFyiAbq5lbtfN+jAN+27AGx6aNxT7tg9cbjJ05q6mSF10eDsI1Gzyzd5se7zsRlleP1EucwYhBRy0tRAMXN4R/J3o55x3eUqgIfr89yG05/g65hlHUjAWBcDIGVOby1lIWj5sTsW+Z51zzhGVlkA1dDkUSxQ0egLSgXadGpmh
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=taugh.com; h=date:message-id:from:to:cc:subject:in-reply-to:mime-version:content-type:content-transfer-encoding; s=d9f.5e8fab2e.k2004; bh=F8ar9fiXFLqQgWz3BLVeWiECivOFp9OqRCCudjVXsL4=; b=JpetNRHznp358XLVwpfauwenGJ03S1eF9DB6zP9JILT6kT8chpgZZpnJwGO5OgzZJXoQvX1ym4+0mDVaRn0g0jhx0JfI8sL1+vH5JUS+mLzJ/W1Q3E2o0xa1PfhKDSY6LOViRhUqAaB98/dZEoRVx3CBsmNIsegnP4sHS+cC7fbbn2AfuFiedMfkt+/eqGa4rhUver6Q1ZaPZNIH7wbYVVZhuZQ5QCzo9+fCAqeAcIa7GgTaXGWxgGjZ8WpN/BaX
Received: from ary.qy ([IPv6:2001:470:1f07:1126::78:696d:6170]) by imap.iecc.com ([IPv6:2001:470:1f07:1126::78:696d:6170]) with ESMTP via TCP6; 09 Apr 2020 23:09:33 -0000
Received: by ary.qy (Postfix, from userid 501) id E0CBD17638B4; Thu,  9 Apr 2020 19:09:33 -0400 (EDT)
Date: 9 Apr 2020 19:09:33 -0400
Message-Id: <20200409230933.E0CBD17638B4@ary.qy>
From: "John Levine" <johnl@taugh.com>
To: dmarc@ietf.org
Cc: kboth@drkurt.com
In-Reply-To: <CABuGu1rekWo3mRkK_OpRksYNrSmPaFHD6k1_K=a7a_Sx7aMhBQ@mail.gmail.com>
Organization: Taughannock Networks
X-Headerized: yes
Mime-Version: 1.0
Content-type: text/plain; charset=utf-8
Content-transfer-encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/h7tLGg6Ji42HBg-xsMrJngsqjTA>
Subject: Re: [dmarc-ietf] Genart last call review of draft-ietf-dmarc-psd-08
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Apr 2020 23:09:37 -0000

In article <CABuGu1rekWo3mRkK_OpRksYNrSmPaFHD6k1_K=a7a_Sx7aMhBQ@mail.gmail.com> you write:
>   1. ".co.uk" is not a TLD. TLDs are single label domains - there are
>   ccTLDs and gTLDs.

Right.

>   2. The invocation of the PSL compounds the issue that was raised by Dave
>   Crocker. How DMARC (RFC 7489) determines the organizational domain is
>   orthogonal to this proposal which simply calls for a conditional additional
>   check at the "org - 1" level. I recommend striking the penultimate
>   paragraph in the proposal.

I'd suggest weasel wording it to say that the domain above an org
domain is often known as a public suffix domain, which typically
delegates the org domains below it to a unrelated parties.  This spec
allows public suffix domains to publish policies to supplant those of
their child org domains ...

I agree we should stay as far from mentioning the PSL and its specific
implementation as possible.  Who knows, someday people might get
around to trying my dbound in DNS implementation instead.

R's,
John


From nobody Fri Apr 10 06:39:04 2020
Return-Path: <toddmherr@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 329D93A0B13 for <dmarc@ietfa.amsl.com>; Fri, 10 Apr 2020 06:38:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.087
X-Spam-Level: 
X-Spam-Status: No, score=-2.087 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id C2Qwweqx0Log for <dmarc@ietfa.amsl.com>; Fri, 10 Apr 2020 06:38:53 -0700 (PDT)
Received: from mail-vs1-xe31.google.com (mail-vs1-xe31.google.com [IPv6:2607:f8b0:4864:20::e31]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BB9C33A0AEE for <dmarc@ietf.org>; Fri, 10 Apr 2020 06:38:52 -0700 (PDT)
Received: by mail-vs1-xe31.google.com with SMTP id b5so1333546vsb.1 for <dmarc@ietf.org>; Fri, 10 Apr 2020 06:38:52 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=LzRGr+mhMwkD0/LI/ZXPRixza9rQ5Klu6Th50UCUSkI=; b=TDgE/iXGJr1b1MkX74B6CpCf++MNeGOnjuPVqyxa61C7cKHNMsT0GozKAJQIDKP8kh 2FatB+U70gRjyqF3jkyxZQ+/KY7q3w/7HRzoevqdcp47sZTUKvU0OVqWQHedfMjo068C ok562CEouMWs5dNgPlTf7wfFaD/JtDKreYjNWnbMvFwrfh8fXjcqNrF8ClsHpD4KIFhH gn6N67zVhGLkOb5kk9zeDYSaxY5KybOea1a53tNcN1/nuLx72Tbce7DrQ2E9U+/h3plA nG/InQp8SP+Xy9u7L++rpt63dfdzP1jcw1KXWi2I/TX4vhbig77Hq24c56PDbu+l/rgg rzGQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=LzRGr+mhMwkD0/LI/ZXPRixza9rQ5Klu6Th50UCUSkI=; b=X092EAw80keo1O6jqxY6WCY05pc6wFle0b95g+H9+GDwJOHbwpTfgIvXB3ARdnG+U/ z5MjaYx7VgoagnMDLKVQv2FX0vlkXJ/YLQpQUCyVl+z3AxoLsU6Zq3AcdxArI+A4DGgD Cd+oMsyanRV6aHFZh8EUtRdIyVqn4ARxxu8RSaHEHUZVW8188wMRlwwjgffqAD3AQc4h RMB+c1h+/WnrrP4MXzhM7voOC7wX1wqZuSTeRPk2aIGHw41e3EhlDqFSWo9UkHCnLFho TUAM55G+dvg+wczdj1IYT7UUnEsVY1hcpz22tUuhXZO70CqGY1BWyvQKZD1eqCtCFZym UPYA==
X-Gm-Message-State: AGi0PuYhWH98NtaPeG6gyObH9Mk6bRcWGIITgRyQnWSAFdf9WHSifsE/ urXIwkyLhZfBWtqi+dRz6cJk55qf4ypNVWN9diSfiQcOP4o=
X-Google-Smtp-Source: APiQypJxE+UafMNAe/w1h4aInHYCTyPAh3byRsv2TXvX81SNkhTrxWS02UEd6D+tss9rRkF8us5WbksUUS8lq1OSae8=
X-Received: by 2002:a05:6102:1043:: with SMTP id h3mr2203325vsq.39.1586525931527;  Fri, 10 Apr 2020 06:38:51 -0700 (PDT)
MIME-Version: 1.0
References: <CABuGu1rekWo3mRkK_OpRksYNrSmPaFHD6k1_K=a7a_Sx7aMhBQ@mail.gmail.com> <20200409230933.E0CBD17638B4@ary.qy>
In-Reply-To: <20200409230933.E0CBD17638B4@ary.qy>
From: Todd Herr <toddmherr@gmail.com>
Date: Fri, 10 Apr 2020 09:38:40 -0400
Message-ID: <CA+Wg=gsS0U-cW8TAFhJw9yQrCP7K-8gjGGDhg1sighiBc5JrgQ@mail.gmail.com>
To: John Levine <johnl@taugh.com>
Cc: dmarc <dmarc@ietf.org>, kboth@drkurt.com
Content-Type: multipart/alternative; boundary="0000000000009363fa05a2efdaa1"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/tma28WkM_dgOLM7vjrzAZ3cPx3I>
Subject: Re: [dmarc-ietf] Genart last call review of draft-ietf-dmarc-psd-08
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 10 Apr 2020 13:39:02 -0000

--0000000000009363fa05a2efdaa1
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

On Thu, Apr 9, 2020 at 7:09 PM John Levine <johnl@taugh.com> wrote:

> In article <CABuGu1rekWo3mRkK_OpRksYNrSmPaFHD6k1_K=3D
> a7a_Sx7aMhBQ@mail.gmail.com> you write:
> >   1. ".co.uk" is not a TLD. TLDs are single label domains - there are
> >   ccTLDs and gTLDs.
>
> Right.
>

I don't disagree, but what I was going for here was some level of
consistency with section 3.2 of RFC 7489, which reads in part:

   1.  Acquire a "public suffix" list, i.e., a list of DNS domain names
       reserved for registrations.  Some country Top-Level Domains
       (TLDs) make specific registration requirements, e.g., the United
       Kingdom places company registrations under ".co.uk"; other TLDs
       such as ".com" appear in the IANA registry of top-level DNS
       domains.  A public suffix list is the union of all of these.
       Appendix A.6.1
<https://tools.ietf.org/html/rfc7489#appendix-A.6.1> contains some
discussion about obtaining a public
       suffix list.


The point of the paragraph in question wasn't to define TLDs (or PSDs) but
rather to better define "domain names reserved for registration".


>
> >   2. The invocation of the PSL compounds the issue that was raised by
> Dave
> >   Crocker. How DMARC (RFC 7489) determines the organizational domain is
> >   orthogonal to this proposal which simply calls for a conditional
> additional
> >   check at the "org - 1" level. I recommend striking the penultimate
> >   paragraph in the proposal.
>
> I'd suggest weasel wording it to say that the domain above an org
> domain is often known as a public suffix domain, which typically
> delegates the org domains below it to a unrelated parties.  This spec
> allows public suffix domains to publish policies to supplant those of
> their child org domains ...
>
> I agree we should stay as far from mentioning the PSL and its specific
> implementation as possible.  Who knows, someday people might get
> around to trying my dbound in DNS implementation instead.
>

Dale twice in his comments expresses doubt that it's possible for anyone to
know all PSDs; the mention of a specific PSL in the abstract was an attempt
to answer those doubts.

The second paragraph could be rewritten as

*The original design of DMARC applies only to domains that are registered
with a domain name registrar (called =E2=80=9COrganizational Domains=E2=80=
=9D in RFC 7489)
and nodes in the tree below Organizational Domains. Organizational Domains
are themselves nodes in the tree below domain names reserved for
registration, the latter of which will be referred to as Public Suffix
Domains (PSDs) in this document.*

But how to address Dale's concerns about how one knows all PSDs?

--=20
Todd Herr

--0000000000009363fa05a2efdaa1
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr" class=3D"gmail_attr">On Thu, Apr 9, 2020 =
at 7:09 PM John Levine &lt;<a href=3D"mailto:johnl@taugh.com">johnl@taugh.c=
om</a>&gt; wrote:<br></div><div class=3D"gmail_quote"><blockquote class=3D"=
gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(20=
4,204,204);padding-left:1ex">In article &lt;CABuGu1rekWo3mRkK_OpRksYNrSmPaF=
HD6k1_K=3D<a href=3D"mailto:a7a_Sx7aMhBQ@mail.gmail.com" target=3D"_blank">=
a7a_Sx7aMhBQ@mail.gmail.com</a>&gt; you write:<br>
&gt;=C2=A0 =C2=A01. &quot;.<a href=3D"http://co.uk" rel=3D"noreferrer" targ=
et=3D"_blank">co.uk</a>&quot; is not a TLD. TLDs are single label domains -=
 there are<br>
&gt;=C2=A0 =C2=A0ccTLDs and gTLDs.<br>
<br>
Right.<br></blockquote><div><br></div><div><div class=3D"gmail_default" sty=
le=3D"font-family:tahoma,sans-serif;font-size:small">I don&#39;t disagree, =
but what I was going for here was some level of consistency with section 3.=
2 of RFC 7489, which reads in part:</div><div class=3D"gmail_default" style=
=3D"font-family:tahoma,sans-serif;font-size:small"><br></div><div class=3D"=
gmail_default" style=3D"font-family:tahoma,sans-serif;font-size:small"><pre=
 class=3D"gmail-newpage" style=3D"font-size:13.3333px;margin-top:0px;margin=
-bottom:0px;break-before:page;color:rgb(0,0,0);font-style:normal;font-varia=
nt-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing=
:normal;text-align:start;text-indent:0px;text-transform:none;word-spacing:0=
px;text-decoration-style:initial;text-decoration-color:initial">   1.  Acqu=
ire a &quot;public suffix&quot; list, i.e., a list of DNS domain names
       reserved for registrations.  Some country Top-Level Domains
       (TLDs) make specific registration requirements, e.g., the United
       Kingdom places company registrations under &quot;.<a href=3D"http://=
co.uk">co.uk</a>&quot;; other TLDs
       such as &quot;.com&quot; appear in the IANA registry of top-level DN=
S
       domains.  A public suffix list is the union of all of these.
       <a href=3D"https://tools.ietf.org/html/rfc7489#appendix-A.6.1">Appen=
dix A.6.1</a> contains some discussion about obtaining a public
       suffix list.</pre></div><div class=3D"gmail_default" style=3D"font-f=
amily:tahoma,sans-serif;font-size:small"><br></div><div class=3D"gmail_defa=
ult" style=3D"font-family:tahoma,sans-serif;font-size:small">The point of t=
he paragraph in question wasn&#39;t to define TLDs (or PSDs) but rather to =
better define &quot;domain names reserved for registration&quot;.<br></div>=
=C2=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0=
.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
<br>
&gt;=C2=A0 =C2=A02. The invocation of the PSL compounds the issue that was =
raised by Dave<br>
&gt;=C2=A0 =C2=A0Crocker. How DMARC (RFC 7489) determines the organizationa=
l domain is<br>
&gt;=C2=A0 =C2=A0orthogonal to this proposal which simply calls for a condi=
tional additional<br>
&gt;=C2=A0 =C2=A0check at the &quot;org - 1&quot; level. I recommend striki=
ng the penultimate<br>
&gt;=C2=A0 =C2=A0paragraph in the proposal.<br>
<br>
I&#39;d suggest weasel wording it to say that the domain above an org<br>
domain is often known as a public suffix domain, which typically<br>
delegates the org domains below it to a unrelated parties.=C2=A0 This spec<=
br>
allows public suffix domains to publish policies to supplant those of<br>
their child org domains ...<br>
<br>
I agree we should stay as far from mentioning the PSL and its specific<br>
implementation as possible.=C2=A0 Who knows, someday people might get<br>
around to trying my dbound in DNS implementation instead.<br></blockquote><=
div><br></div><div>Dale twice in his comments expresses doubt that it&#39;s=
 possible for anyone to know all PSDs; the mention of a specific PSL in the=
 abstract was an attempt to answer those doubts.</div><div><br></div><div s=
tyle=3D"font-family:tahoma,sans-serif;font-size:small" class=3D"gmail_defau=
lt">The second paragraph could be rewritten as <br></div><div style=3D"font=
-family:tahoma,sans-serif;font-size:small" class=3D"gmail_default"><br></di=
v><div style=3D"font-family:tahoma,sans-serif;font-size:small;margin-left:4=
0px" class=3D"gmail_default"><span class=3D"gmail-im"><font size=3D"2"><b s=
tyle=3D"font-weight:normal" id=3D"gmail-m_6856871369714550287gmail-m_-82872=
16144552149699gmail-m_-8174332386094668950gmail-docs-internal-guid-fce386d9=
-7fff-dc67-41b0-42892eeba272"><span style=3D"font-family:Arial;color:rgb(0,=
0,0);background-color:transparent;font-weight:400;font-style:normal;font-va=
riant:normal;text-decoration:none;vertical-align:baseline;white-space:pre-w=
rap">The original design of DMARC applies only to domains that are register=
ed with a domain name registrar (called =E2=80=9COrganizational Domains=E2=
=80=9D in RFC 7489) and nodes in the tree below Organizational Domains. Org=
anizational Domains are themselves nodes in the tree below domain names res=
erved for registration, the latter of which will be referred to as Public S=
uffix Domains (PSDs) in this document.</span></b></font></span></div><div s=
tyle=3D"font-family:tahoma,sans-serif;font-size:small;margin-left:40px" cla=
ss=3D"gmail_default"><span class=3D"gmail-im"><font size=3D"2"><b style=3D"=
font-weight:normal" id=3D"gmail-m_6856871369714550287gmail-m_-8287216144552=
149699gmail-m_-8174332386094668950gmail-docs-internal-guid-fce386d9-7fff-dc=
67-41b0-42892eeba272"><span style=3D"font-family:Arial;color:rgb(0,0,0);bac=
kground-color:transparent;font-weight:400;font-style:normal;font-variant:no=
rmal;text-decoration:none;vertical-align:baseline;white-space:pre-wrap"><br=
></span></b></font></span></div><div style=3D"font-family:tahoma,sans-serif=
;font-size:small" class=3D"gmail_default">But how to address Dale&#39;s con=
cerns about how one knows all PSDs?</div><br></div>-- <br><div dir=3D"ltr" =
class=3D"gmail_signature"><div dir=3D"ltr"><div><div dir=3D"ltr"><div><div =
dir=3D"ltr"><span style=3D"font-family:tahoma,sans-serif">Todd Herr<br></sp=
an><br></div></div></div></div></div></div></div>

--0000000000009363fa05a2efdaa1--


From nobody Fri Apr 10 06:49:29 2020
Return-Path: <sklist@kitterman.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4FE353A0AE2 for <dmarc@ietfa.amsl.com>; Fri, 10 Apr 2020 06:49:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level: 
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_FAIL=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=neutral reason="invalid (unsupported algorithm ed25519-sha256)" header.d=kitterman.com header.b=NScqng3A; dkim=pass (2048-bit key) header.d=kitterman.com header.b=mplnyRa5
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iLy38azMoH2N for <dmarc@ietfa.amsl.com>; Fri, 10 Apr 2020 06:49:26 -0700 (PDT)
Received: from interserver.kitterman.com (interserver.kitterman.com [IPv6:2604:a00:6:1039:225:90ff:feaa:b169]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 927AA3A0ADE for <dmarc@ietf.org>; Fri, 10 Apr 2020 06:49:26 -0700 (PDT)
Received: from interserver.kitterman.com (interserver.kitterman.com [64.20.48.66]) by interserver.kitterman.com (Postfix) with ESMTPS id 212DEF80272 for <dmarc@ietf.org>; Fri, 10 Apr 2020 09:49:25 -0400 (EDT)
DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/simple; d=kitterman.com; i=@kitterman.com; q=dns/txt; s=201903e; t=1586526565; h=from : to : subject : date : message-id : in-reply-to : references : mime-version : content-transfer-encoding : content-type : from; bh=fn347Itap1GS3w/xs8uYRYWcht5QN2umpnc6BBVI2Ao=; b=NScqng3AzfYmxARuGw3AKEZb2crKV1EnLW5aaG6+EeoWP46McW6DuMZHe+nyFr82dOIYb IDuiSSDDlzDrTveAA==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kitterman.com; i=@kitterman.com; q=dns/txt; s=201903r; t=1586526565; h=from : to : subject : date : message-id : in-reply-to : references : mime-version : content-transfer-encoding : content-type : from; bh=fn347Itap1GS3w/xs8uYRYWcht5QN2umpnc6BBVI2Ao=; b=mplnyRa5q2pJ8A2hbIezC80vqrnktuoJVKJCcsDW7bMbfaMO7p8DK1G6kQAKDkOydvg8X ns75KUYa2B8Ebk350vc0mHe4IPeqOTvdkm1Tm0p6oqb3wZ3JVyRidWScOxZ4qMzp5I2oXN3 vrSkmFps3KagQLdy2otQ1/tsT2CuIKZlBvjakjaXpJTghnPR3SV8d0WEKDQYWHH8MrvCk63 CLUUVT/0N87C/909SFr68v2MKIL0mvASRmaXR6BOomw3M0wYIkgOg8UN7gDe2pTQmfGoEdt Q61VmXeuUE3fgWxBHsOMPEkLfZLSynsBsJeCBVu58oJGFtgc7ky6sKWT2e4w==
Received: from sk-desktop.localnet (static-72-81-252-22.bltmmd.fios.verizon.net [72.81.252.22]) by interserver.kitterman.com (Postfix) with ESMTP id E7CF4F801E9 for <dmarc@ietf.org>; Fri, 10 Apr 2020 09:49:24 -0400 (EDT)
From: Scott Kitterman <sklist@kitterman.com>
To: dmarc@ietf.org
Date: Fri, 10 Apr 2020 09:49:24 -0400
Message-ID: <3377169.EuQdDTRyQv@sk-desktop>
In-Reply-To: <CA+Wg=gsS0U-cW8TAFhJw9yQrCP7K-8gjGGDhg1sighiBc5JrgQ@mail.gmail.com>
References: <CABuGu1rekWo3mRkK_OpRksYNrSmPaFHD6k1_K=a7a_Sx7aMhBQ@mail.gmail.com> <20200409230933.E0CBD17638B4@ary.qy> <CA+Wg=gsS0U-cW8TAFhJw9yQrCP7K-8gjGGDhg1sighiBc5JrgQ@mail.gmail.com>
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain; charset="UTF-8"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/9CY0BWxwRWoGV_IouqZH90URjfE>
Subject: Re: [dmarc-ietf] Genart last call review of draft-ietf-dmarc-psd-08
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 10 Apr 2020 13:49:28 -0000

On Friday, April 10, 2020 9:38:40 AM EDT Todd Herr wrote:
> On Thu, Apr 9, 2020 at 7:09 PM John Levine <johnl@taugh.com> wrote:
> > In article <CABuGu1rekWo3mRkK_OpRksYNrSmPaFHD6k1_K=3D
> >=20
> > a7a_Sx7aMhBQ@mail.gmail.com> you write:
> > >   1. ".co.uk" is not a TLD. TLDs are single label domains - there are
> > >   ccTLDs and gTLDs.
> >=20
> > Right.
>=20
> I don't disagree, but what I was going for here was some level of
> consistency with section 3.2 of RFC 7489, which reads in part:
>=20
>    1.  Acquire a "public suffix" list, i.e., a list of DNS domain names
>        reserved for registrations.  Some country Top-Level Domains
>        (TLDs) make specific registration requirements, e.g., the United
>        Kingdom places company registrations under ".co.uk"; other TLDs
>        such as ".com" appear in the IANA registry of top-level DNS
>        domains.  A public suffix list is the union of all of these.
>        Appendix A.6.1
> <https://tools.ietf.org/html/rfc7489#appendix-A.6.1> contains some
> discussion about obtaining a public
>        suffix list.
>=20
>=20
> The point of the paragraph in question wasn't to define TLDs (or PSDs) but
> rather to better define "domain names reserved for registration".
>=20
> > >   2. The invocation of the PSL compounds the issue that was raised by
> >=20
> > Dave
> >=20
> > >   Crocker. How DMARC (RFC 7489) determines the organizational domain =
is
> > >   orthogonal to this proposal which simply calls for a conditional
> >=20
> > additional
> >=20
> > >   check at the "org - 1" level. I recommend striking the penultimate
> > >   paragraph in the proposal.
> >=20
> > I'd suggest weasel wording it to say that the domain above an org
> > domain is often known as a public suffix domain, which typically
> > delegates the org domains below it to a unrelated parties.  This spec
> > allows public suffix domains to publish policies to supplant those of
> > their child org domains ...
> >=20
> > I agree we should stay as far from mentioning the PSL and its specific
> > implementation as possible.  Who knows, someday people might get
> > around to trying my dbound in DNS implementation instead.
>=20
> Dale twice in his comments expresses doubt that it's possible for anyone =
to
> know all PSDs; the mention of a specific PSL in the abstract was an attem=
pt
> to answer those doubts.
>=20
> The second paragraph could be rewritten as
>=20
> *The original design of DMARC applies only to domains that are registered
> with a domain name registrar (called =E2=80=9COrganizational Domains=E2=
=80=9D in RFC 7489)
> and nodes in the tree below Organizational Domains. Organizational Domains
> are themselves nodes in the tree below domain names reserved for
> registration, the latter of which will be referred to as Public Suffix
> Domains (PSDs) in this document.*
>=20
> But how to address Dale's concerns about how one knows all PSDs?

To the extent this is a problem, it's RFC 7489's problem.  This document=20
leverages it's existing definitions.  That's intentional.  While the curren=
t=20
RFC 7489 definitions aren't ideal, as an extension to that work, I don't th=
ink=20
it make sense to try and fix it here.  That's work for 7489bis.

Scott K



From nobody Fri Apr 10 08:21:42 2020
Return-Path: <kurta@drkurt.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BA22D3A0825 for <dmarc@ietfa.amsl.com>; Fri, 10 Apr 2020 08:21:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level: 
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=drkurt.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gX83UBSEk_mR for <dmarc@ietfa.amsl.com>; Fri, 10 Apr 2020 08:21:38 -0700 (PDT)
Received: from mail-il1-x131.google.com (mail-il1-x131.google.com [IPv6:2607:f8b0:4864:20::131]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0A54C3A0822 for <dmarc@ietf.org>; Fri, 10 Apr 2020 08:21:37 -0700 (PDT)
Received: by mail-il1-x131.google.com with SMTP id i75so2073904ild.13 for <dmarc@ietf.org>; Fri, 10 Apr 2020 08:21:37 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=drkurt.com; s=20130612; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=zxVe4HbWa6tSrU7mumBHxS3duPeUdbVCfdrrn+huhjI=; b=XRa1o/sdPI4XRgzKqhpUHbIwS4gQCoP1ZFAMDb6hhhKFGqfR51KQ5YuIQf+ROkv09S 5wFKHE9CRO6hVJYerKT+XL5chISvVSaGnwIO/NvFI5L18M5AgwZ/mxyR6VDllh0M9L6f ekHzaQbs/8SnYv8qlQIZbq0mBBtn3lzi3caIA=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=zxVe4HbWa6tSrU7mumBHxS3duPeUdbVCfdrrn+huhjI=; b=DC4sCCsP4h8CNEoHtHlIbvloRHYKLxWpZMzFppNDLM28Pb04wffgTFtuBi1Q3RMcdU UUlqoYpYtC+Z0LcALgdSzLFeho2aHtXgSAusW+y+dDVraMS1yWfTGk7fotCNbepkC9SU 67DV/6Js9bPbmmUCDrO5PgTiA2BRlnYrDVOBWYLQ6tSab3r/cEhPlEtziMSrlC6H/9bm Blvrh1eQDLlct4wmNNjaAxnRpFMaFqImOkwaKl3ZzJkItkhzR7WzhJ2Zm1USMq2RjHdm G479hYAQO8bZZOSF4nLypxW49Zfa1L9zq5oWrBopyT0k5ypP9Fq6qs7hjX1zsFU29xDF s/HA==
X-Gm-Message-State: AGi0PuaA4j90cO43MNk9ZDu9z0xroqYStbEEgrmgWAdcoLvUxzJB5jHx yWgYi/ZkAvsfccyCHVRpuK1IcIZS4Cav7AgZ5t7gyrvG+XE=
X-Google-Smtp-Source: APiQypLHZye1fkU6j9TIN7dfZ9l3YzeOf9p7q5GHq2bPlmwQe/MKBJIbtcdm+/wzADSTW9piUXYH/FuZmQD/uJPZKQw=
X-Received: by 2002:a92:c787:: with SMTP id c7mr1848296ilk.120.1586532096104;  Fri, 10 Apr 2020 08:21:36 -0700 (PDT)
MIME-Version: 1.0
References: <CABuGu1rekWo3mRkK_OpRksYNrSmPaFHD6k1_K=a7a_Sx7aMhBQ@mail.gmail.com> <20200409230933.E0CBD17638B4@ary.qy> <CA+Wg=gsS0U-cW8TAFhJw9yQrCP7K-8gjGGDhg1sighiBc5JrgQ@mail.gmail.com> <3377169.EuQdDTRyQv@sk-desktop>
In-Reply-To: <3377169.EuQdDTRyQv@sk-desktop>
From: "Kurt Andersen (b)" <kboth@drkurt.com>
Date: Fri, 10 Apr 2020 08:21:21 -0700
Message-ID: <CABuGu1o3QSJk-uebs8VtKCjh4fRzjgrixZWFRZuwJCbNXTYE-w@mail.gmail.com>
To: Scott Kitterman <sklist@kitterman.com>
Cc: "dmarc@ietf.org" <dmarc@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000038d1205a2f14ae9"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/miDoWMwi-CR_hayQTRaNqVOcj6w>
Subject: Re: [dmarc-ietf] Genart last call review of draft-ietf-dmarc-psd-08
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 10 Apr 2020 15:21:40 -0000

--000000000000038d1205a2f14ae9
Content-Type: text/plain; charset="UTF-8"

On Fri, Apr 10, 2020 at 6:49 AM Scott Kitterman <sklist@kitterman.com>
wrote:

> On Friday, April 10, 2020 9:38:40 AM EDT Todd Herr wrote:
> >
> > I don't disagree, but what I was going for here was some level of
> > consistency with section 3.2 of RFC 7489. . .
>

And it needs to stay entirely in RFC7489 :-)


> > Dale twice in his comments expresses doubt that it's possible for anyone
> to
> > know all PSDs; the mention of a specific PSL in the abstract was an
> attempt
> > to answer those doubts.
>
> > But how to address Dale's concerns about how one knows all PSDs?
>
> To the extent this is a problem, it's RFC 7489's problem.  This document
> leverages it's existing definitions.  That's intentional.  While the
> current
> RFC 7489 definitions aren't ideal, as an extension to that work, I don't
> think
> it make sense to try and fix it here.  That's work for 7489bis.


Agreed. Dale's concern is a non sequitur. We can always invoke the ghost of
DBOUND-past :-D

--Kurt

--000000000000038d1205a2f14ae9
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr">On Fri, Apr 10, 2020 at 6:49 AM Scott Kit=
terman &lt;<a href=3D"mailto:sklist@kitterman.com">sklist@kitterman.com</a>=
&gt; wrote:<br></div><div class=3D"gmail_quote"><blockquote class=3D"gmail_=
quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,=
204);padding-left:1ex">On Friday, April 10, 2020 9:38:40 AM EDT Todd Herr w=
rote:<br>
&gt; <br>
&gt; I don&#39;t disagree, but what I was going for here was some level of<=
br>
&gt; consistency with section 3.2 of RFC 7489. . .<br></blockquote><div><br=
></div><div>And it needs to stay entirely in RFC7489 :-)</div><div>=C2=A0</=
div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;bor=
der-left:1px solid rgb(204,204,204);padding-left:1ex">
&gt; Dale twice in his comments expresses doubt that it&#39;s possible for =
anyone to<br>
&gt; know all PSDs; the mention of a specific PSL in the abstract was an at=
tempt<br>
&gt; to answer those doubts.<br><br>
&gt; But how to address Dale&#39;s concerns about how one knows all PSDs?<b=
r>
<br>
To the extent this is a problem, it&#39;s RFC 7489&#39;s problem.=C2=A0 Thi=
s document <br>
leverages it&#39;s existing definitions.=C2=A0 That&#39;s intentional.=C2=
=A0 While the current <br>
RFC 7489 definitions aren&#39;t ideal, as an extension to that work, I don&=
#39;t think <br>
it make sense to try and fix it here.=C2=A0 That&#39;s work for 7489bis.</b=
lockquote><div><br></div><div>Agreed. Dale&#39;s concern is a non sequitur.=
 We can always invoke the ghost of DBOUND-past :-D</div><div><br></div><div=
>--Kurt=C2=A0</div></div></div>

--000000000000038d1205a2f14ae9--


From nobody Fri Apr 10 08:50:27 2020
Return-Path: <tjw.ietf@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DEA293A02BC for <dmarc@ietfa.amsl.com>; Fri, 10 Apr 2020 08:50:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level: 
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rv25GNvlQvLW for <dmarc@ietfa.amsl.com>; Fri, 10 Apr 2020 08:50:24 -0700 (PDT)
Received: from mail-il1-x135.google.com (mail-il1-x135.google.com [IPv6:2607:f8b0:4864:20::135]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 182673A017E for <dmarc@ietf.org>; Fri, 10 Apr 2020 08:50:23 -0700 (PDT)
Received: by mail-il1-x135.google.com with SMTP id t11so2219644ils.1 for <dmarc@ietf.org>; Fri, 10 Apr 2020 08:50:23 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=joOx824SabF1gQs/A2ZEifdi1z5gxVAAnmbkKXJLFPc=; b=BbpGwNRf0csKkBExu0cuuhzl0owvq0k4o280WrRdtywqsjIaSFBvhL6bSeoiNE5YDy CsSDAOaIaF5xPjkzrnPKHJqPBmoH4dyYgRVx2SS/JDg2xWPuzTUaoEowaRAZP6p7Xvnn MjC6yMJ6lTcmyMxoFjRc7Fx1zORuW8D+qsX4/JvgSmVTuIiBwv3jvrhnn+9taXNMsPje EeCUO14t37vcgxLP69yQV9iQ08GfknwoVURuMYdcfr3BO4C7nSEYwDrZrHe1LXh171Yu gWnfbHce5C8T5PsHnP90Coks9LpLlvB6dLNgN4XwrW0Ydcd2l2xO/vaSPhHHe9hLPJ04 MhuA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=joOx824SabF1gQs/A2ZEifdi1z5gxVAAnmbkKXJLFPc=; b=JZN/chcpJJVID6tLR4qI0TtnCSYcH1ddr4K50XrtLBSlH7YoY9neX5zGI9xKrgT6bL JY1FM5AOd6kdhZjH950D+5vgPS0oQdk+8Ie+9zeVOtokJimzwI5KG42n0R6eBghWvjY1 dFHVR1T6Q5AsY1XSSMgXByDUg1E2jsyxULG5p0UYVwtuTiF5cWRTRFxGvdXITN6Zbmi5 P0T5UK8uUUJPPE7oWbqRN/pMXP+LPlargTK2r6vdEuUIKugQ6JoQw3dirLazk9Ukfm0g yvrIHxXUlsUp9T9S0WgRiPcWTg/rh8venoy7BmwcFh6Axwx7DZVueCCQJZ28sYqga/F1 aQFg==
X-Gm-Message-State: AGi0PuardGNiLCTh4f2tFVwhjDocBkYrJd8DXW0iUgvwN0Lfx0gqOK2j LaSEMLxZgxjm2tUrmsZD7oLmovqfWEGpvgX0qac=
X-Google-Smtp-Source: APiQypKKv+RwvTJU56qxeI5qUrhjsGIqspF/WZ6EcV9uCr6TTLijBxxVfcTwQMiHRTvL672FoRWIhPP/5jFnVxcTJ6Y=
X-Received: by 2002:a05:6e02:60f:: with SMTP id t15mr5447130ils.277.1586533823121;  Fri, 10 Apr 2020 08:50:23 -0700 (PDT)
MIME-Version: 1.0
References: <CABuGu1rekWo3mRkK_OpRksYNrSmPaFHD6k1_K=a7a_Sx7aMhBQ@mail.gmail.com> <20200409230933.E0CBD17638B4@ary.qy> <CA+Wg=gsS0U-cW8TAFhJw9yQrCP7K-8gjGGDhg1sighiBc5JrgQ@mail.gmail.com> <3377169.EuQdDTRyQv@sk-desktop> <CABuGu1o3QSJk-uebs8VtKCjh4fRzjgrixZWFRZuwJCbNXTYE-w@mail.gmail.com>
In-Reply-To: <CABuGu1o3QSJk-uebs8VtKCjh4fRzjgrixZWFRZuwJCbNXTYE-w@mail.gmail.com>
From: Tim Wicinski <tjw.ietf@gmail.com>
Date: Fri, 10 Apr 2020 11:50:11 -0400
Message-ID: <CADyWQ+EXPAMWXNQrgkbx=skKOHN-j+QicCser1rTg1anwPwonw@mail.gmail.com>
To: "Kurt Andersen (b)" <kboth@drkurt.com>
Cc: Scott Kitterman <sklist@kitterman.com>, "dmarc@ietf.org" <dmarc@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000f38e8a05a2f1b0c3"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/XawK12G7cZjrpDckHfxwQiMYWSQ>
Subject: Re: [dmarc-ietf] Genart last call review of draft-ietf-dmarc-psd-08
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 10 Apr 2020 15:50:26 -0000

--000000000000f38e8a05a2f1b0c3
Content-Type: text/plain; charset="UTF-8"

Agree with John/Scott/Kurt on keeping this in 7489 and trying to weasel
word around it for now.

I tried to reference 8499 thinking we'd done the right thing in there, and
Kurt pointed
out the error of my ways.

We should take an item to really sort this out in 7489bis.

and John has heard me on several occasions appreciating the simplicity in
https://www.ietf.org/archive/id/draft-levine-dbound-dns-03.txt

tim


On Fri, Apr 10, 2020 at 11:21 AM Kurt Andersen (b) <kboth@drkurt.com> wrote:

> On Fri, Apr 10, 2020 at 6:49 AM Scott Kitterman <sklist@kitterman.com>
> wrote:
>
>> On Friday, April 10, 2020 9:38:40 AM EDT Todd Herr wrote:
>> >
>> > I don't disagree, but what I was going for here was some level of
>> > consistency with section 3.2 of RFC 7489. . .
>>
>
> And it needs to stay entirely in RFC7489 :-)
>
>
>> > Dale twice in his comments expresses doubt that it's possible for
>> anyone to
>> > know all PSDs; the mention of a specific PSL in the abstract was an
>> attempt
>> > to answer those doubts.
>>
>> > But how to address Dale's concerns about how one knows all PSDs?
>>
>> To the extent this is a problem, it's RFC 7489's problem.  This document
>> leverages it's existing definitions.  That's intentional.  While the
>> current
>> RFC 7489 definitions aren't ideal, as an extension to that work, I don't
>> think
>> it make sense to try and fix it here.  That's work for 7489bis.
>
>
> Agreed. Dale's concern is a non sequitur. We can always invoke the ghost
> of DBOUND-past :-D
>
> --Kurt
> _______________________________________________
> dmarc mailing list
> dmarc@ietf.org
> https://www.ietf.org/mailman/listinfo/dmarc
>

--000000000000f38e8a05a2f1b0c3
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div class=3D"gmail_default" style=3D"font-family:monospac=
e">Agree with=C2=A0John/Scott/Kurt on keeping this in 7489 and trying to we=
asel word around it for now.=C2=A0</div><div class=3D"gmail_default" style=
=3D"font-family:monospace"><br></div><div class=3D"gmail_default" style=3D"=
font-family:monospace">I tried to reference 8499 thinking we&#39;d done the=
 right thing in there, and Kurt pointed</div><div class=3D"gmail_default" s=
tyle=3D"font-family:monospace">out the error of my ways.=C2=A0</div><div cl=
ass=3D"gmail_default" style=3D"font-family:monospace"><br></div><div class=
=3D"gmail_default" style=3D"font-family:monospace">We should take an item t=
o really sort this out in 7489bis.=C2=A0</div><div class=3D"gmail_default" =
style=3D"font-family:monospace"><br></div><div class=3D"gmail_default" styl=
e=3D"font-family:monospace">and John has heard me on several occasions=C2=
=A0appreciating the simplicity in</div><div class=3D"gmail_default" style=
=3D"font-family:monospace"><a href=3D"https://www.ietf.org/archive/id/draft=
-levine-dbound-dns-03.txt" style=3D"font-family:Arial,Helvetica,sans-serif"=
>https://www.ietf.org/archive/id/draft-levine-dbound-dns-03.txt</a></div><d=
iv class=3D"gmail_default" style=3D"font-family:monospace"><br></div><div c=
lass=3D"gmail_default" style=3D"font-family:monospace">tim</div><div class=
=3D"gmail_default" style=3D"font-family:monospace">=C2=A0</div></div><br><d=
iv class=3D"gmail_quote"><div dir=3D"ltr" class=3D"gmail_attr">On Fri, Apr =
10, 2020 at 11:21 AM Kurt Andersen (b) &lt;<a href=3D"mailto:kboth@drkurt.c=
om">kboth@drkurt.com</a>&gt; wrote:<br></div><blockquote class=3D"gmail_quo=
te" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204=
);padding-left:1ex"><div dir=3D"ltr"><div dir=3D"ltr">On Fri, Apr 10, 2020 =
at 6:49 AM Scott Kitterman &lt;<a href=3D"mailto:sklist@kitterman.com" targ=
et=3D"_blank">sklist@kitterman.com</a>&gt; wrote:<br></div><div class=3D"gm=
ail_quote"><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.=
8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">On Friday, Apr=
il 10, 2020 9:38:40 AM EDT Todd Herr wrote:<br>
&gt; <br>
&gt; I don&#39;t disagree, but what I was going for here was some level of<=
br>
&gt; consistency with section 3.2 of RFC 7489. . .<br></blockquote><div><br=
></div><div>And it needs to stay entirely in RFC7489 :-)</div><div>=C2=A0</=
div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;bor=
der-left:1px solid rgb(204,204,204);padding-left:1ex">
&gt; Dale twice in his comments expresses doubt that it&#39;s possible for =
anyone to<br>
&gt; know all PSDs; the mention of a specific PSL in the abstract was an at=
tempt<br>
&gt; to answer those doubts.<br><br>
&gt; But how to address Dale&#39;s concerns about how one knows all PSDs?<b=
r>
<br>
To the extent this is a problem, it&#39;s RFC 7489&#39;s problem.=C2=A0 Thi=
s document <br>
leverages it&#39;s existing definitions.=C2=A0 That&#39;s intentional.=C2=
=A0 While the current <br>
RFC 7489 definitions aren&#39;t ideal, as an extension to that work, I don&=
#39;t think <br>
it make sense to try and fix it here.=C2=A0 That&#39;s work for 7489bis.</b=
lockquote><div><br></div><div>Agreed. Dale&#39;s concern is a non sequitur.=
 We can always invoke the ghost of DBOUND-past :-D</div><div><br></div><div=
>--Kurt=C2=A0</div></div></div>
_______________________________________________<br>
dmarc mailing list<br>
<a href=3D"mailto:dmarc@ietf.org" target=3D"_blank">dmarc@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/dmarc" rel=3D"noreferrer" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/dmarc</a><br>
</blockquote></div>

--000000000000f38e8a05a2f1b0c3--


From nobody Fri Apr 10 09:33:18 2020
Return-Path: <johnl@iecc.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B2C4B3A0842 for <dmarc@ietfa.amsl.com>; Fri, 10 Apr 2020 09:33:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.852
X-Spam-Level: 
X-Spam-Status: No, score=-1.852 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.248, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1536-bit key) header.d=iecc.com header.b=P/e+ICn4; dkim=pass (1536-bit key) header.d=taugh.com header.b=KsFKbEng
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lzzZNSMxSUfg for <dmarc@ietfa.amsl.com>; Fri, 10 Apr 2020 09:33:15 -0700 (PDT)
Received: from gal.iecc.com (gal.iecc.com [IPv6:2001:470:1f07:1126:0:43:6f73:7461]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 96D913A07A2 for <dmarc@ietf.org>; Fri, 10 Apr 2020 09:33:15 -0700 (PDT)
Received: (qmail 77076 invoked from network); 10 Apr 2020 16:33:13 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=iecc.com; h=date:message-id:from:to:cc:subject:in-reply-to:mime-version:content-type:content-transfer-encoding; s=12d10.5e909fc9.k2004; bh=UuN7ldh1NhqHqumbMKVJX3vmqG4nmbKXB2XfrogctmI=; b=P/e+ICn4GTmLBqHmMrU4Q56Hgm2lUZZ0Y9Lryh3HZ8owF8l6HgLjEemj5wDG2qs8jBPki2DB1iziytymoXKMXMfhJNOZcEfF0XLz15s3qBtGLc1YeDjuimCJNfFFhRMBE4cSanVDYK3Cpi11TLn1nPh4VjONSJYc+FwV5zm+HRIZ9jnbl76H05a1qHtw+qKNMB3LqRsGQ807i0SS0PuJTiyPlWK6FCZccmAbVIZgzHYFGc6dGT4/ufnWceig7dyO
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=taugh.com; h=date:message-id:from:to:cc:subject:in-reply-to:mime-version:content-type:content-transfer-encoding; s=12d10.5e909fc9.k2004; bh=UuN7ldh1NhqHqumbMKVJX3vmqG4nmbKXB2XfrogctmI=; b=KsFKbEng5ZQUEN6jAE1mQ+Jm+nQ4Id/ltQ7IUUTuswhdFy9Wk0B+jM9CrBjAKt+EewBh2TNULWXNx8cRxXCwwbzbUtoQMmU+LKQMxQfZ9rip1acU3uxtccHEweoAgm/V8DrAXE68aZUKiVpmk1zP4T0WXKdPj/Kk/Z3mfQd6FlB7HiwfxXKKkcxaE7TflVMZKAQ2G4OQuZaWR9UjnhD792gBttSz+M/uplCWiM6atGHFDKZTa+II6MubXAjZ/yuc
Received: from ary.qy ([IPv6:2001:470:1f07:1126::78:696d:6170]) by imap.iecc.com ([IPv6:2001:470:1f07:1126::78:696d:6170]) with ESMTP via TCP6; 10 Apr 2020 16:33:13 -0000
Received: by ary.qy (Postfix, from userid 501) id 850961769BE6; Fri, 10 Apr 2020 12:33:13 -0400 (EDT)
Date: 10 Apr 2020 12:33:13 -0400
Message-Id: <20200410163313.850961769BE6@ary.qy>
From: "John Levine" <johnl@taugh.com>
To: dmarc@ietf.org
Cc: toddmherr@gmail.com
In-Reply-To: <CA+Wg=gsS0U-cW8TAFhJw9yQrCP7K-8gjGGDhg1sighiBc5JrgQ@mail.gmail.com>
Organization: Taughannock Networks
X-Headerized: yes
Mime-Version: 1.0
Content-type: text/plain; charset=utf-8
Content-transfer-encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/YzUEZB_n8x5-69z8jctf4hFuXNc>
Subject: Re: [dmarc-ietf] Genart last call review of draft-ietf-dmarc-psd-08
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 10 Apr 2020 16:33:18 -0000

>Dale twice in his comments expresses doubt that it's possible for anyone to
>know all PSDs; the mention of a specific PSL in the abstract was an attempt
>to answer those doubts.

This kind of stuff drives me nuts since it suggests the reviewer isn't
familiar with all of the other stuff that has the same issue.

Plan A:

This is essentially the same problem that affects browser supercookies
or signing wildcard SSL certificates, both of which have been in
production for many years.  It's not a new problem, there are
approximate solutions and it doesn't have to be perfect to be useful.

Plan B:

Major rewrite: Define PSD as Policy Super Domain.  Say that the PSD is
defined as the domain one up from the Org domain, see RFC 7489, full
stop.  Do not offer any other suggestions about how to find it, do not
mention the PSL -- you've already got the org domain, one snip and
you're done.  Take out all of the public suffix stuff.

If you want, you can add another informative paragraph that says that
Policy Super Domains often have legal or contractual relationships
with their child org domains so this can be useful to express policies
intended to apply to all of their org domains, perhaps with shorter
versions of the .bank or .gov.uk examples, but don't go very far,
since it's not part of the definition and especially don't mention the
PSL or use the phrase public suffix.

I'd suggest plan B since people will otherwise be complaining about
the PSL forever, even though we're already stuck with it for org domains.

R's,
John


From nobody Fri Apr 10 09:34:13 2020
Return-Path: <johnl@iecc.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 56FBE3A089C for <dmarc@ietfa.amsl.com>; Fri, 10 Apr 2020 09:34:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.852
X-Spam-Level: 
X-Spam-Status: No, score=-1.852 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.248, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1536-bit key) header.d=iecc.com header.b=eSjv5ISh; dkim=pass (1536-bit key) header.d=taugh.com header.b=rtrxxqOq
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BLSivQt5zRDf for <dmarc@ietfa.amsl.com>; Fri, 10 Apr 2020 09:34:11 -0700 (PDT)
Received: from gal.iecc.com (gal.iecc.com [IPv6:2001:470:1f07:1126:0:43:6f73:7461]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 069223A087B for <dmarc@ietf.org>; Fri, 10 Apr 2020 09:34:10 -0700 (PDT)
Received: (qmail 77247 invoked from network); 10 Apr 2020 16:34:10 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=iecc.com; h=date:message-id:from:to:cc:subject:in-reply-to:mime-version:content-type:content-transfer-encoding; s=12dbd.5e90a002.k2004; bh=90DVv1qWcPHsPmW00IiyjKskFNPXKxRpkLirJQ2xm8c=; b=eSjv5IShTyfh0kSgyaZIjejSt98npbLrdHoTCyO0sA8V+VacGDpn9REQKbcmJXRJmvZg0wttquSk8vZ7bKnP7wwqvrO59LY+cJgROzeVnwzjp7MLHZwk+fYJ8cE1XcFoKHsn8EPZ1ESVmKztmLPNgMHmfpFBMAkAOSdidhB5QHr6aTqWl5Xy5o25xAPD71XTmSITE8pSeSFUer7DlQ4sfPwkEjBkpQmnBBosAohkr14fFAbO0syR7fI9wAj62FMc
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=taugh.com; h=date:message-id:from:to:cc:subject:in-reply-to:mime-version:content-type:content-transfer-encoding; s=12dbd.5e90a002.k2004; bh=90DVv1qWcPHsPmW00IiyjKskFNPXKxRpkLirJQ2xm8c=; b=rtrxxqOqhMF47LAZYSG2+/E2hhLz4xVeO/sdtbjNQ9Zq7GyPuYtDK/nfnklmfwSoM7EhAipeKMN+PZuAsJh9mh/VaMyIQedvmhU8GYK8PN1ziP9qcqgz93ws+rTRwCKAPrUQjfOoKA5Z7lbMvwkf4s9bTAco0GN6SUb8cK94GNjhu2+g9N6BaigAZclWPJxomMQOsCKwHnnG11FO4HLYU0hWWy3rdpHo4iyvqWIIOe+Ezz995yF9eqLw7osnY46d
Received: from ary.qy ([IPv6:2001:470:1f07:1126::78:696d:6170]) by imap.iecc.com ([IPv6:2001:470:1f07:1126::78:696d:6170]) with ESMTP via TCP6; 10 Apr 2020 16:34:09 -0000
Received: by ary.qy (Postfix, from userid 501) id B0AE81769C14; Fri, 10 Apr 2020 12:34:09 -0400 (EDT)
Date: 10 Apr 2020 12:34:09 -0400
Message-Id: <20200410163409.B0AE81769C14@ary.qy>
From: "John Levine" <johnl@taugh.com>
To: dmarc@ietf.org
Cc: tjw.ietf@gmail.com
In-Reply-To: <CADyWQ+EXPAMWXNQrgkbx=skKOHN-j+QicCser1rTg1anwPwonw@mail.gmail.com>
Organization: Taughannock Networks
X-Headerized: yes
Mime-Version: 1.0
Content-type: text/plain; charset=utf-8
Content-transfer-encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/vNN7V5hk7cbp6PeRYesu-fNKn3o>
Subject: Re: [dmarc-ietf] Genart last call review of draft-ietf-dmarc-psd-08
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 10 Apr 2020 16:34:12 -0000

In article <CADyWQ+EXPAMWXNQrgkbx=skKOHN-j+QicCser1rTg1anwPwonw@mail.gmail.com> you write:
>-=-=-=-=-=-
>
>Agree with John/Scott/Kurt on keeping this in 7489 and trying to weasel
>word around it for now.

So how about renaming it Policy Super Domain (PSD)?

R's,
John


From nobody Fri Apr 10 09:45:18 2020
Return-Path: <tjw.ietf@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A949F3A08EC for <dmarc@ietfa.amsl.com>; Fri, 10 Apr 2020 09:45:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level: 
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xrCe5aJoYYJL for <dmarc@ietfa.amsl.com>; Fri, 10 Apr 2020 09:45:15 -0700 (PDT)
Received: from mail-il1-x133.google.com (mail-il1-x133.google.com [IPv6:2607:f8b0:4864:20::133]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7883C3A08E8 for <dmarc@ietf.org>; Fri, 10 Apr 2020 09:45:15 -0700 (PDT)
Received: by mail-il1-x133.google.com with SMTP id d2so1962618ilc.0 for <dmarc@ietf.org>; Fri, 10 Apr 2020 09:45:15 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=bOKHEVYFAV0dU5qVTNNxa4Xj5587+/+nmzMohpxOjs4=; b=CQc/bBuz/p6qL8ZpgMqCuqloXhmbWqeN9IPOhswbhtLzG8Uiv37KDuW4X3i5SzPdcL cz3o1humV0pRtaxVlTPSjdRIFfXTMRLCwhU6+05f/690tGVM0uIGY4JrOmeX8mRfXanP TaotrvLV0Js53oK08EggtUNO/bkNm6knpfKbqAw/A4b/GClH/Qz8veWdpLOgSmUvNq2G z/vLbpCdQxRH4cpi+kwpJmwiX9BxXbBXaB/0AMZC8H0hvqiIiFff/5lyVXAHuYuRBI9I /1kycrsYIScUzH2/zqqCjk0aMGxGVlRA0fuBLSOHhq7vUTvgvofu9NU4E+oJRRKHXGWp /0pA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=bOKHEVYFAV0dU5qVTNNxa4Xj5587+/+nmzMohpxOjs4=; b=cx/9fg7OSP8I/JzYw7eddedU+91x63BFLWX2OI5+4/OOS7QiL+4utjasL1TcfIx9/R tlKg1PdsavheGEK+IDdkQLl/g8B7GOoPdVL4zawNlLz5m3tPPzwPjWP3pnbYVLS7FS48 qrKQidMyvefK4eHMNXsU4z0tgPAHiOyiJOl07SyWC6eqv1dm9ePOtF9u6C3ka12xLgKU yU0PUIBVflM2l28W2c1xyEBsk1uY1KZdWfVU4h1+lI6S71w4f2kT7kSwXCaBwoeuwgZr fx3TfgTbSIJQemqxWniIkKOxSrYltTq03MnrPPPfd6/gdSO7+hRwOuaTx0qSqw0Qq6Zt s2LQ==
X-Gm-Message-State: AGi0PuaqQimwWpp2345S7BHfhTQSYRU/wYd3LURskp5s6lSoooXwaxIv fGP6tFJchP0KRmBxTZ7EP06TQk0+EC8oos6BU88=
X-Google-Smtp-Source: APiQypIHkGQuN4W57jMSATme4vzcsszwFDtfZmnOEbGKdfyaQofSUd1rxukIeOliQ7/y1IegL9DkawSvA29kk2e+OjI=
X-Received: by 2002:a92:bbc4:: with SMTP id x65mr6262112ilk.82.1586537114687;  Fri, 10 Apr 2020 09:45:14 -0700 (PDT)
MIME-Version: 1.0
References: <CADyWQ+EXPAMWXNQrgkbx=skKOHN-j+QicCser1rTg1anwPwonw@mail.gmail.com> <20200410163409.B0AE81769C14@ary.qy>
In-Reply-To: <20200410163409.B0AE81769C14@ary.qy>
From: Tim Wicinski <tjw.ietf@gmail.com>
Date: Fri, 10 Apr 2020 12:45:03 -0400
Message-ID: <CADyWQ+FAt7P7DXDXXtfOmS2ED=QLmFAMu==k7Vtt7CZVwb6E-w@mail.gmail.com>
To: John Levine <johnl@taugh.com>
Cc: IETF DMARC WG <dmarc@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000024dcbd05a2f27574"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/rhWR3bGfUTp3_qZOJBvZjV2Ytms>
Subject: Re: [dmarc-ietf] Genart last call review of draft-ietf-dmarc-psd-08
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 10 Apr 2020 16:45:17 -0000

--00000000000024dcbd05a2f27574
Content-Type: text/plain; charset="UTF-8"

That works for me.  I noticed Wikipedia has an entry for
https://en.wikipedia.org/wiki/Second-level_domain

and I remember seeing a spreadsheet of all the second level domains that
ccTLD registries offer,
and it was quite lengthy. (Longer than the list in Wikipedia)

tim


On Fri, Apr 10, 2020 at 12:34 PM John Levine <johnl@taugh.com> wrote:

> In article <CADyWQ+EXPAMWXNQrgkbx=
> skKOHN-j+QicCser1rTg1anwPwonw@mail.gmail.com> you write:
> >-=-=-=-=-=-
> >
> >Agree with John/Scott/Kurt on keeping this in 7489 and trying to weasel
> >word around it for now.
>
> So how about renaming it Policy Super Domain (PSD)?
>
> R's,
> John
>

--00000000000024dcbd05a2f27574
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div class=3D"gmail_default" style=3D"font-family:monospac=
e"><br></div><div class=3D"gmail_default" style=3D"font-family:monospace">T=
hat works for me.=C2=A0 I noticed Wikipedia has an entry for=C2=A0</div><di=
v class=3D"gmail_default" style=3D"font-family:monospace"><a href=3D"https:=
//en.wikipedia.org/wiki/Second-level_domain">https://en.wikipedia.org/wiki/=
Second-level_domain</a><br></div><div class=3D"gmail_default" style=3D"font=
-family:monospace"><br></div><div class=3D"gmail_default" style=3D"font-fam=
ily:monospace">and I remember seeing a spreadsheet of all the second level =
domains that ccTLD registries offer,</div><div class=3D"gmail_default" styl=
e=3D"font-family:monospace">and it was quite lengthy. (Longer than the list=
 in Wikipedia)</div><div class=3D"gmail_default" style=3D"font-family:monos=
pace"><br></div><div class=3D"gmail_default" style=3D"font-family:monospace=
">tim</div><div class=3D"gmail_default" style=3D"font-family:monospace"><br=
></div></div><br><div class=3D"gmail_quote"><div dir=3D"ltr" class=3D"gmail=
_attr">On Fri, Apr 10, 2020 at 12:34 PM John Levine &lt;<a href=3D"mailto:j=
ohnl@taugh.com">johnl@taugh.com</a>&gt; wrote:<br></div><blockquote class=
=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rg=
b(204,204,204);padding-left:1ex">In article &lt;CADyWQ+EXPAMWXNQrgkbx=3D<a =
href=3D"mailto:skKOHN-j%2BQicCser1rTg1anwPwonw@mail.gmail.com" target=3D"_b=
lank">skKOHN-j+QicCser1rTg1anwPwonw@mail.gmail.com</a>&gt; you write:<br>
&gt;-=3D-=3D-=3D-=3D-=3D-<br>
&gt;<br>
&gt;Agree with John/Scott/Kurt on keeping this in 7489 and trying to weasel=
<br>
&gt;word around it for now.<br>
<br>
So how about renaming it Policy Super Domain (PSD)?<br>
<br>
R&#39;s,<br>
John<br>
</blockquote></div>

--00000000000024dcbd05a2f27574--


From nobody Fri Apr 10 09:57:11 2020
Return-Path: <kurta@drkurt.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7CF183A0927 for <dmarc@ietfa.amsl.com>; Fri, 10 Apr 2020 09:57:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level: 
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=drkurt.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nYpnfBya1xZn for <dmarc@ietfa.amsl.com>; Fri, 10 Apr 2020 09:57:07 -0700 (PDT)
Received: from mail-il1-x12f.google.com (mail-il1-x12f.google.com [IPv6:2607:f8b0:4864:20::12f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CF0E83A090D for <dmarc@ietf.org>; Fri, 10 Apr 2020 09:57:07 -0700 (PDT)
Received: by mail-il1-x12f.google.com with SMTP id f16so2356740ilj.9 for <dmarc@ietf.org>; Fri, 10 Apr 2020 09:57:07 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=drkurt.com; s=20130612; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=mXwrhAsi9juWoW/xzIAMFnihKqKf0Kjs1JDW2A5w19k=; b=JqeVmWeFK3fnSPF2TjPWOJAMz5OkYsXdCdSsYWPatHctrzDk1r+RY8YwEt9hZFCn7r WZ2K9H6rRiRKG1uNOHykU6tXxeXaK/Mdedw7UDO4vGgNVIXs9FnPbPGSuRWEGpNeWiWB 2bZolAO+z2oMCLWhdNOeopP6chXqYenZda89c=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=mXwrhAsi9juWoW/xzIAMFnihKqKf0Kjs1JDW2A5w19k=; b=H3VwFYAAsZePm+86s8nFaCaDYF3GUmMDmVZYVRkbbA8mSNoP3/+yfvin0n+ZxSGmVL dxRWz4Wkg7W/3cplvcftB89rHn81TscXNX3tknz5G5K7YxfZ4BtMD70FLDcMm7ULN2Hc jetR26t8m4F/6R7RTHU4bCtat33hzRjKQUWnPXUFMowSvK0iZRwOQrBcX2Iw8xAjVFwX DX2PI1+vkSRE9h31ZIVRJQzk362CRQD7O8XiIsHng2DddzfjyUSVb/vxaAI8E8q2h/n9 1RWShM9E6DhrL0ff6iGgBAUG3pG5OPYzBPdnLq7Zv0Z9aZY1r3mYrxTgNL9tCYSJyDK/ tjwg==
X-Gm-Message-State: AGi0Pua7y+ql2+5rUQkdqF6PqG+MdZqQ7TeI+lrFhSC1Vj4ZT7NKpQn4 v172l9Gf4J0qjkAA0CEm8mvnJOel+eugiW2M14bjZQ==
X-Google-Smtp-Source: APiQypLukpjIrgZWBzJx4hTzbQ0ChLzkLtIePBvCMEZ5xVtDlaLN4Mg+UdBnXo95opa5OcpeFRRmjnDjvyIdgf4dHfY=
X-Received: by 2002:a92:d20e:: with SMTP id y14mr6152533ily.104.1586537826840;  Fri, 10 Apr 2020 09:57:06 -0700 (PDT)
MIME-Version: 1.0
References: <CADyWQ+EXPAMWXNQrgkbx=skKOHN-j+QicCser1rTg1anwPwonw@mail.gmail.com> <20200410163409.B0AE81769C14@ary.qy>
In-Reply-To: <20200410163409.B0AE81769C14@ary.qy>
From: "Kurt Andersen (b)" <kboth@drkurt.com>
Date: Fri, 10 Apr 2020 09:56:52 -0700
Message-ID: <CABuGu1rUMBAjgvL2CtPiXQG=qjJDEk2avsfhyWB0ixn58+aw2w@mail.gmail.com>
To: John Levine <johnl@taugh.com>
Cc: "dmarc@ietf.org" <dmarc@ietf.org>, tjw ietf <tjw.ietf@gmail.com>
Content-Type: multipart/alternative; boundary="000000000000978dd305a2f29fc9"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/HjMMy_YysoOnjRGvxlu0A4RDGxM>
Subject: Re: [dmarc-ietf] Genart last call review of draft-ietf-dmarc-psd-08
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 10 Apr 2020 16:57:10 -0000

--000000000000978dd305a2f29fc9
Content-Type: text/plain; charset="UTF-8"

On Fri, Apr 10, 2020 at 9:34 AM John Levine <johnl@taugh.com> wrote:

> In article <CADyWQ+EXPAMWXNQrgkbx=
> skKOHN-j+QicCser1rTg1anwPwonw@mail.gmail.com> you write:
> >-=-=-=-=-=-
> >
> >Agree with John/Scott/Kurt on keeping this in 7489 and trying to weasel
> >word around it for now.
>
> So how about renaming it Policy Super Domain (PSD)?
>

Works for me.

--Kurt

--000000000000978dd305a2f29fc9
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr">On Fri, Apr 10, 2020 at 9:34 AM John Levi=
ne &lt;<a href=3D"mailto:johnl@taugh.com">johnl@taugh.com</a>&gt; wrote:<br=
></div><div class=3D"gmail_quote"><blockquote class=3D"gmail_quote" style=
=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding=
-left:1ex">In article &lt;CADyWQ+EXPAMWXNQrgkbx=3D<a href=3D"mailto:skKOHN-=
j%2BQicCser1rTg1anwPwonw@mail.gmail.com" target=3D"_blank">skKOHN-j+QicCser=
1rTg1anwPwonw@mail.gmail.com</a>&gt; you write:<br>
&gt;-=3D-=3D-=3D-=3D-=3D-<br>
&gt;<br>
&gt;Agree with John/Scott/Kurt on keeping this in 7489 and trying to weasel=
<br>
&gt;word around it for now.<br>
<br>
So how about renaming it Policy Super Domain (PSD)?<br></blockquote><div><b=
r></div><div>Works for me.</div><div><br></div><div>--Kurt=C2=A0</div></div=
></div>

--000000000000978dd305a2f29fc9--


From nobody Fri Apr 10 11:21:22 2020
Return-Path: <johnl@taugh.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6E4393A0CD8 for <dmarc@ietfa.amsl.com>; Fri, 10 Apr 2020 11:21:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level: 
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1536-bit key) header.d=iecc.com header.b=hWsT6dNw; dkim=pass (1536-bit key) header.d=taugh.com header.b=kGrXH5cY
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MRcL52kR4BLd for <dmarc@ietfa.amsl.com>; Fri, 10 Apr 2020 11:21:13 -0700 (PDT)
Received: from gal.iecc.com (gal.iecc.com [IPv6:2001:470:1f07:1126:0:43:6f73:7461]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 005133A0C74 for <dmarc@ietf.org>; Fri, 10 Apr 2020 11:21:09 -0700 (PDT)
Received: (qmail 96025 invoked from network); 10 Apr 2020 18:21:08 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=iecc.com; h=date:message-id:from:to:cc:subject:in-reply-to:references:mime-version:content-type:user-agent; s=17717.5e90b914.k2004; i=johnl-iecc.com@submit.iecc.com; bh=+uOvN5Cn9qMRBd/Oc41mUO70naz3kyAT50oXfrNBHP4=; b=hWsT6dNwRP71yXugkDWppFWLKAA1LhBtVJKibhUqt0bBc6FrtRLcoyLVLHDIxdymdnXAN3zmgkbFKiDFdT4uoV/69m0Bwaq0iKI44beIAyY2OmtM57Sy29SLytffDmgW9E1pUdtuweY12hyl5DrF4BK4XCmcDnUVaIxnDzyGolpGBeaJhZF7K516SX5eqcwB4WKud5qYWw1IgeRfaWZUs3Mv3xcqnwxwrlahcndh7Cjh2UvWUJHkXt0JY92AnwSL
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=taugh.com; h=date:message-id:from:to:cc:subject:in-reply-to:references:mime-version:content-type:user-agent; s=17717.5e90b914.k2004; olt=johnl-iecc.com@submit.iecc.com; bh=+uOvN5Cn9qMRBd/Oc41mUO70naz3kyAT50oXfrNBHP4=; b=kGrXH5cYlj+7eP0viHBsNEvVj1zlRL+kdaF9i5CtBQDW5aUIMzWS/NJrX7jx17VA4knxq8WlM/8Wj+GDTBmnsU7AysCiQWoEJ9Uzw3ScrQSZZ7JCFZJ7QM25bV6RKDg2CxsY5xyfamOneE2fAjjngpdUOJH7owCTmIIvzAVLj7gvA4to8ffN0PLCLjzf9gESHN43vjphKoMesPEzmVykVvHxlpllGT1hVo49dw/qFzE9oZpOvr7Qf/o3qj1Hv2QU
Received: from localhost ([IPv6:2001:470:1f07:1126::78:696d:6170]) by imap.iecc.com ([IPv6:2001:470:1f07:1126::78:696d:6170]) with ESMTPSA (TLS1.3 ECDHE-RSA AES-256-GCM AEAD, johnl@iecc.com) via TCP6; 10 Apr 2020 18:21:08 -0000
Date: 10 Apr 2020 14:21:07 -0400
Message-ID: <alpine.OSX.2.22.407.2004101412550.84760@ary.qy>
From: "John R Levine" <johnl@taugh.com>
To: "Tim Wicinski" <tjw.ietf@gmail.com>
Cc: "IETF DMARC WG" <dmarc@ietf.org>
In-Reply-To: <CADyWQ+FAt7P7DXDXXtfOmS2ED=QLmFAMu==k7Vtt7CZVwb6E-w@mail.gmail.com>
References: <CADyWQ+EXPAMWXNQrgkbx=skKOHN-j+QicCser1rTg1anwPwonw@mail.gmail.com> <20200410163409.B0AE81769C14@ary.qy> <CADyWQ+FAt7P7DXDXXtfOmS2ED=QLmFAMu==k7Vtt7CZVwb6E-w@mail.gmail.com>
User-Agent: Alpine 2.22 (OSX 407 2020-02-09)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII; format=flowed
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/nZ1eh1wXNCM3tU8w-Vv4ccbC4Og>
Subject: Re: [dmarc-ietf] Genart last call review of draft-ietf-dmarc-psd-08
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 10 Apr 2020 18:21:22 -0000

> and I remember seeing a spreadsheet of all the second level domains that
> ccTLD registries offer,
> and it was quite lengthy. (Longer than the list in Wikipedia)

Per the PSL, there's at over 5800, there are ccTLDs including AU US CA JP 
that have second and third level and a few fourth level registration 
points. The less we say about this mess, the better.

I realize it's late in the process but I think the draft would benefit by 
moving the examples in sec 1 to an appendix and replace it with something 
bland that just says PSD == Org-1.

Regards,
John Levine, johnl@taugh.com, Taughannock Networks, Trumansburg NY
Please consider the environment before reading this e-mail. https://jl.ly

PS: pvt.k12.ma.us


From nobody Fri Apr 10 19:34:18 2020
Return-Path: <johnl@taugh.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 681AF3A15A1 for <dmarc@ietfa.amsl.com>; Fri, 10 Apr 2020 19:34:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level: 
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1536-bit key) header.d=iecc.com header.b=cQqcdk9B; dkim=pass (1536-bit key) header.d=taugh.com header.b=rP0cwvV5
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Vs4tl-cM3UHe for <dmarc@ietfa.amsl.com>; Fri, 10 Apr 2020 19:34:06 -0700 (PDT)
Received: from gal.iecc.com (gal.iecc.com [IPv6:2001:470:1f07:1126:0:43:6f73:7461]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 750DA3A15A0 for <dmarc@ietf.org>; Fri, 10 Apr 2020 19:34:06 -0700 (PDT)
Received: (qmail 31735 invoked from network); 11 Apr 2020 02:34:04 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=iecc.com; h=date:message-id:from:to:cc:subject:mime-version:content-type:user-agent; s=7bf5.5e912c9c.k2004; i=johnl-iecc.com@submit.iecc.com; bh=oeWwFAEsN99VJASyZOi3bAklrXrKFnpjPMS93m1viVU=; b=cQqcdk9BHzco9FW5WnPr7r/26b8cCQ/UxqynrJvyNB+TfaElZmL2a6gZsamHXPPJLh8dObpgRIjNOM8rCt8nKWhxAcMjDtfeV5T8C6hZ7DH3qP6xQ6jIpJ5lkS/IQa4oO7V0t9bqLymMpAr0LBbDfytox7M2P6Ai1wfQh3PplP277AumYWnLrmHSfKFOXpX1HvUaeXwf4YkACrFwaiT7PcqW1BGg07IdRAowfuBemcSC4CtPrWCT1S6wa/21NUvj
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=taugh.com; h=date:message-id:from:to:cc:subject:mime-version:content-type:user-agent; s=7bf5.5e912c9c.k2004; olt=johnl-iecc.com@submit.iecc.com; bh=oeWwFAEsN99VJASyZOi3bAklrXrKFnpjPMS93m1viVU=; b=rP0cwvV5LWK+/xLhhzDUTx055Y1xS47vhlACAeAJoy06iQDa2c55ZAa8TzmBZYMTYelF5kp1W69A/MYjN1sYZeZ7FlX/TeauG81DrMqQnxlOIoXrQHFhVCYGnZtNnnOMIfVPJIihtZRGTOqS8s527OhoOX35qDAnzJJ1O851qQnDNSVaDHg9p17h8JCgiPIoXdh5j+bzql5OPJyUFPjtMeywNjvThgcFF/dQT96zuBpdXi2Txhp1R02Af/6B4E5j
Received: from localhost ([IPv6:2001:470:1f07:1126::78:696d:6170]) by imap.iecc.com ([IPv6:2001:470:1f07:1126::78:696d:6170]) with ESMTPSA (TLS1.3 ECDHE-RSA AES-256-GCM AEAD, johnl@iecc.com) via TCP6; 11 Apr 2020 02:34:04 -0000
Date: 10 Apr 2020 22:34:04 -0400
Message-ID: <alpine.OSX.2.22.407.2004102225540.88858@ary.qy>
From: "John R Levine" <johnl@taugh.com>
To: "IETF DMARC WG" <dmarc@ietf.org>, dnsop@ietf.org
Cc: "Tim Wicinski" <tjw.ietf@gmail.com>
User-Agent: Alpine 2.22 (OSX 407 2020-02-09)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII; format=flowed
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/XiLGAbUg7HUJwp-khXt0_ZT-ly0>
Subject: [dmarc-ietf] Refreshed DNS dbound draft and code
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 11 Apr 2020 02:34:09 -0000

I made some twiddles to my dbound-in-dns library and updated the I-D to 
match.

Code: https://github.com/jrlevine/bound

I-D: https://datatracker.ietf.org/doc/draft-levine-dbound-dns/

I added some more records to the DNS zone so now I believe that by careful 
abuse of DNS wildcards, in most cases it will find the closest boundary 
(aka public suffic) and DMARC orgznizational domain for a domain with one 
or two DNS queries no matter how far down the tree the name is and how 
many intermediate boundaries may exist.  A zone that describes all the 
boundaries in the Mozilla PSL uses 16,000 DNS records which doesn't seem 
excessive.

Regards,
John Levine, johnl@taugh.com, Taughannock Networks, Trumansburg NY
Please consider the environment before reading this e-mail. https://jl.ly


From nobody Tue Apr 14 02:55:19 2020
Return-Path: <vesely@tana.it>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 884F23A0953 for <dmarc@ietfa.amsl.com>; Tue, 14 Apr 2020 02:55:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.12
X-Spam-Level: 
X-Spam-Status: No, score=-2.12 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1152-bit key) header.d=tana.it
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XJHhu-JS4nI0 for <dmarc@ietfa.amsl.com>; Tue, 14 Apr 2020 02:55:16 -0700 (PDT)
Received: from wmail.tana.it (wmail.tana.it [62.94.243.226]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9F1543A0952 for <dmarc@ietf.org>; Tue, 14 Apr 2020 02:55:16 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=tana.it; s=delta; t=1586858113; bh=mcIueDMLl3PH5hE2h7bOy0GTdiZF81fI3RyPPQjLuxs=; l=2298; h=To:References:From:Date:In-Reply-To; b=ArTLD8SL2+SkSVjdLfGgeHNHsk/EgOMVA/QBo/Xs0VNgvuteKnR3ACvlKS7clzuYK +WLVALROiUN0LH17lYKiBNlINLLgqqwnyrrcBtMf0Geaq2GcNJzLHyGXNM8xE2fvYl /92Iugo70mLbniZvSiDQhSE9Et2+Ao2iaJNmeTyv8aenIfTDabgQhy+0wfXQ5
Authentication-Results: tana.it; auth=pass (details omitted)
Received: from [172.25.197.111] (pcale.tana [172.25.197.111]) (AUTH: CRAM-MD5 uXDGrn@SYT0/k, TLS: TLS1.2, 128bits, ECDHE_RSA_AES_128_GCM_SHA256) by wmail.tana.it with ESMTPSA id 00000000005DC056.000000005E958880.00001D25; Tue, 14 Apr 2020 11:55:12 +0200
To: dmarc@ietf.org
References: <CABuGu1rekWo3mRkK_OpRksYNrSmPaFHD6k1_K=a7a_Sx7aMhBQ@mail.gmail.com> <20200409230933.E0CBD17638B4@ary.qy> <CA+Wg=gsS0U-cW8TAFhJw9yQrCP7K-8gjGGDhg1sighiBc5JrgQ@mail.gmail.com>
From: Alessandro Vesely <vesely@tana.it>
Message-ID: <38319f95-e5a5-476f-f029-86315ed655f2@tana.it>
Date: Tue, 14 Apr 2020 11:55:12 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.6.0
MIME-Version: 1.0
In-Reply-To: <CA+Wg=gsS0U-cW8TAFhJw9yQrCP7K-8gjGGDhg1sighiBc5JrgQ@mail.gmail.com>
Content-Type: text/plain; charset=us-ascii
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/FC-OHvXKFwvamuAEg74uy8Keta4>
Subject: Re: [dmarc-ietf] Genart last call review of draft-ietf-dmarc-psd-08
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 14 Apr 2020 09:55:18 -0000

On Fri 10/Apr/2020 15:38:40 +0200 Todd Herr wrote:
> On Thu, Apr 9, 2020 at 7:09 PM John Levine <johnl@taugh.com> wrote:
>> In article <CABuGu1rekWo3mRkK_OpRksYNrSmPaFHD6k1_Ka7a_Sx7aMhBQ@mail.gmail.com> you write:
>>>   1. ".co.uk" is not a TLD. TLDs are single label domains - there are
>>>   ccTLDs and gTLDs.
>>
>> Right.
>>
> 
> I don't disagree, but what I was going for here was some level of
> consistency with section 3.2 of RFC 7489, which reads in part:
> 
>    1.  Acquire a "public suffix" list, i.e., a list of DNS domain names
>        reserved for registrations.  Some country Top-Level Domains
>        (TLDs) make specific registration requirements, e.g., the United
>        Kingdom places company registrations under ".co.uk";


That text says TLD .uk made decision so and so.  It doesn't imply that .co.uk
is somehow to be considered a TLD.

That wikipedia page is questionable.
https://en.wikipedia.org/wiki/Talk:Second-level_domain


> The point of the paragraph in question wasn't to define TLDs (or PSDs) but
> rather to better define "domain names reserved for registration".


Right.


>>> 2. The invocation of the PSL compounds the issue that was raised by
>>> Dave Crocker. How DMARC (RFC 7489) determines the organizational domain
>>> is orthogonal to this proposal which simply calls for a conditional
>>> additional check at the "org - 1" level. I recommend striking the
>>> penultimate paragraph in the proposal.>>
>> I'd suggest weasel wording it to say that the domain above an org
>> domain is often known as a public suffix domain, which typically
>> delegates the org domains below it to a unrelated parties.  This spec
>> allows public suffix domains to publish policies to supplant those of
>> their child org domains ...


+1


>> I agree we should stay as far from mentioning the PSL and its specific
>> implementation as possible.  Who knows, someday people might get
>> around to trying my dbound in DNS implementation instead.


Nevertheless, the concept of *Public Suffix* is independent of its only known
implementation (and of some acceptations of the term "public").  It is the
concept that 7489bis is going to craft.  I propose to stick to the term Public
Suffix, whatever its future definition is going to be.


jm2c
Ale
-- 
















From nobody Wed Apr 15 19:32:53 2020
Return-Path: <worley@alum.mit.edu>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DA3CE3A0973 for <dmarc@ietfa.amsl.com>; Wed, 15 Apr 2020 19:32:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.985
X-Spam-Level: 
X-Spam-Status: No, score=-0.985 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.248, SPF_HELO_NONE=0.001, SPF_SOFTFAIL=0.665, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=comcastmailservice.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jM0VJZ5Uu8mZ for <dmarc@ietfa.amsl.com>; Wed, 15 Apr 2020 19:32:36 -0700 (PDT)
Received: from resqmta-ch2-05v.sys.comcast.net (resqmta-ch2-05v.sys.comcast.net [IPv6:2001:558:fe21:29:69:252:207:37]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6A75C3A095C for <dmarc@ietf.org>; Wed, 15 Apr 2020 19:32:36 -0700 (PDT)
Received: from resomta-ch2-11v.sys.comcast.net ([69.252.207.107]) by resqmta-ch2-05v.sys.comcast.net with ESMTP id Ou68jPuVy9yxwOuKRj9iQo; Thu, 16 Apr 2020 02:32:35 +0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=comcastmailservice.net; s=20180828_2048; t=1587004355; bh=brH5qSPbLLHZ016EMbKbw5yKMAu9ClbLe8dg3449ARw=; h=Received:Received:Received:Received:From:To:Subject:Date: Message-ID; b=Hmv/xb3bYwbHb7I554Kr3It+TZGkBW5SVLNoQM3Mp6eYEB+bb5FmjdEOE3yzVgbtX MDhWz5VaDto990oWNFpyizGeWsXA94oYsbWu5ypwpEOtcwjS3RC3OQguQHf7hE0MB0 NZZ65tSeQB+lcfyYDaQZPnGOS/mFGwg1KAPwx0UuRcPYT2ihcApL1ize94qi/iHojM 7SuzfETxxONptj7QEJP5HDa4ra+h4PwX4rI/PamX1U386L/EpxlSrQCpxjEK8HFcLq CnqxPglWTStJ2QZYyrqIeHpic2NMrtc3xFBhL29OATDdFkp+0l2riv2YJ1wGKnq4AW BGVwhh6Mi5bdw==
Received: from hobgoblin.ariadne.com ([IPv6:2601:192:4a00:430:222:fbff:fe91:d396]) by resomta-ch2-11v.sys.comcast.net with ESMTPA id OuKPjjxshByhMOuKQjhuMB; Thu, 16 Apr 2020 02:32:35 +0000
X-Xfinity-VMeta: sc=-100.00;st=legit
Received: from hobgoblin.ariadne.com (hobgoblin.ariadne.com [127.0.0.1]) by hobgoblin.ariadne.com (8.14.7/8.14.7) with ESMTP id 03G2WXIV012486; Wed, 15 Apr 2020 22:32:33 -0400
Received: (from worley@localhost) by hobgoblin.ariadne.com (8.14.7/8.14.7/Submit) id 03G2WWQb012483; Wed, 15 Apr 2020 22:32:32 -0400
X-Authentication-Warning: hobgoblin.ariadne.com: worley set sender to worley@alum.mit.edu using -f
From: worley@ariadne.com (Dale R. Worley)
To: Todd Herr <toddmherr@gmail.com>
Cc: gen-art@ietf.org, last-call@ietf.org, dmarc@ietf.org, draft-ietf-dmarc-psd.all@ietf.org
In-Reply-To: <CA+Wg=gt1SMO0n9pLOY_CKemEHimr+mnWCpNcoJWq+Da9Np7UuA@mail.gmail.com> (toddmherr@gmail.com)
Sender: worley@ariadne.com (Dale R. Worley)
Date: Wed, 15 Apr 2020 22:32:32 -0400
Message-ID: <873694nosf.fsf@hobgoblin.ariadne.com>
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/6UzaLkG2ZIzlXFpEvWIwvKPWB3M>
Subject: Re: [dmarc-ietf] Genart last call review of draft-ietf-dmarc-psd-08
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 16 Apr 2020 02:32:47 -0000

Todd Herr <toddmherr@gmail.com> writes:
> Having reviewed the comments, I'm wondering if perhaps the following draft
> rewrite of the Abstract section might be a first step to address many of
> the points raised?

I heartily endorse the sentiment behind this.  I think there are some
minor improvements that could be made, as I've noted below.

One point is that much of this information might be better put into the
Introduction, and only a skeleton of it put into the Abstract.  But as
they say, you write the Introduction after you've written the body of
the work, and you write the Abstract after you write the Introduction.

> *AbstractDMARC (Domain-based Message Authentication, Reporting, and
> Conformance) is a scalable mechanism by which a mail-originating
> organization can express domain-level policies and preferences for message
> validation, disposition, and reporting, that a mail-receiving organization
> can use to improve mail handling.  *
>
> *The original design of DMARC applies only to domains that are registered
> with a domain name registrar (called "Organizational Domains" in RFC 7489)
> and nodes in the tree below Organizational Domains. Organizational Domains
> are themselves nodes in the tree below domain names reserved for
> registration, with the latter commonly referred to as "Top Level Domains"
> (TLDs) (e.g., '.com', '.co.uk <http://co.uk>', etc.), although in this
> document they will be referred to as Public Suffix Domains (PSDs).*

In some way it would be useful to flag that RFC 7489 is the base DMARC
RFC.  Otherwise, the reader must just infer that, or look up the RFC.

There's also a point which seems to be very general, as it shows up in
RFC 7489 section 3.2:  all the text refers to a "domain" without
explaining *what* domain is extracted from the message under
consideration to determine the policy that applies to the message.  My
belief is that this is the From header in the message, but I've never
seen this stated.  So e.g.

"The original design of DMARC applies only to messages with From
addresses containing domain names that are registered ..."

This paragraph uses the phrase "domain names reserved for registration",
but I've not heard that term used in descriptions of the DNS.  And I
would expect say that "ietf.org" is "reserved for registration", not
"org" -- though I've never heard the phrase "reserved for registration".
The phrase that seems obvious to me is "domain names under which domain
names are registered, commonly referred to as 'Top Level Domains'...",
but that's somewhat awkward.

And Kurt Andersen notes that while .co.uk is clearly intended as one of
these domain names, it isn't, strictly speaking, a TLD.

> *Since its deployment in 2015, use of DMARC has shown a clear need for the
> ability to express policy for PSDs. This document describes an extension to
> DMARC to enable DMARC functionality for PSDs.*

I'm not sure, but I suspect this could be clarified as "policy for PSDs,
and by inheritance, for domains under PSDs for which no explicit policy
is published." -- My belief is that nobody cares about mail claiming to
come from "person@org", but it's important to have a policy that
applies to "person@areallylongstringoflettersfoobarbaz.org", inherited
from "org".

> *RFC 7489 describes an algorithm for a mail-receiving organization to use
> in determining the Organizational Domain of an inbound mail message, and
> this algorithm recommends the use of a "public suffix list" (PSL), with the
> most common one maintained by the Mozilla Foundation and made public at
> <http://publicsuffix.org/ <http://publicsuffix.org/>>. Use of such a PSL by
> a mail-receiving organization will be required in order to discover and
> apply any DMARC policy declared by a PSD.*

I don't know if this is useful, but I would suggest changing
"determining the Organizational Domain of an inbound mail message" to
"deriving from the domain name of the From address of an inbound mail
message the Organizational Domain to be used for DMARC processing".

> *This document also seeks to address implementations that consider a domain
> on a public Suffix list to be ineligible for DMARC*

I think you are very close to an Abstract/Introduction that is clearly
comprehensible to people who are not familiar with DMARC.

Dale


From nobody Wed Apr 15 19:45:32 2020
Return-Path: <scott@kitterman.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 957E63A09B9; Wed, 15 Apr 2020 19:45:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level: 
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=neutral reason="invalid (unsupported algorithm ed25519-sha256)" header.d=kitterman.com header.b=QlnrUgqo; dkim=pass (2048-bit key) header.d=kitterman.com header.b=EhTmCFyb
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rGmGLhGNQPrB; Wed, 15 Apr 2020 19:45:04 -0700 (PDT)
Received: from interserver.kitterman.com (interserver.kitterman.com [64.20.48.66]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 07C213A09B4; Wed, 15 Apr 2020 19:45:03 -0700 (PDT)
Received: from interserver.kitterman.com (interserver.kitterman.com [64.20.48.66]) by interserver.kitterman.com (Postfix) with ESMTPS id CF068F80279; Wed, 15 Apr 2020 22:44:57 -0400 (EDT)
DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/simple; d=kitterman.com; i=@kitterman.com; q=dns/txt; s=201903e; t=1587005097; h=from : to : cc : subject : date : message-id : in-reply-to : references : mime-version : content-transfer-encoding : content-type : from; bh=3UYc+yYx1V1F9UVavHPKXBPQw8mgshHuDzZyMoNJck8=; b=QlnrUgqomzB8VWE2i1kYP994wl43gBk+I6Uqw1isoWKFzym5IW3WaW2H4ElyLCZADTwxx E0KC9kYHxCA2fuTAg==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kitterman.com; i=@kitterman.com; q=dns/txt; s=201903r; t=1587005097; h=from : to : cc : subject : date : message-id : in-reply-to : references : mime-version : content-transfer-encoding : content-type : from; bh=3UYc+yYx1V1F9UVavHPKXBPQw8mgshHuDzZyMoNJck8=; b=EhTmCFybN7KzTOH0LuT4lHH7S737PUb7lOwX02KVTYX7eswCNp0PPlFbfZrPB9q/+4BFO 8KuORynsiTn+U0PBUpLdhI1A3XFzjAKSKvttxKj5jWllVfzjaXPD/10QUT1k/rOtF4bIOoK QAhFYdMCwk8Hz0v0W64haCGZEPrd8nUqptyKHlzCQgIatJkXnEH57CCI4qXkf92ArkvKjEB er1CvHeRFjTXj2L/2RSHGwvFxFzsbFffXjdmUJ9ksZYN9qsTgsVk1eoaNyMZnz5n6UKFz3N wLmX/A1YzT12RLSug8TYstEhr5dkJQG7jGUS74HKP0x6dQz+XaBkt2e7soBA==
Received: from sk-desktop.localnet (static-72-81-252-22.bltmmd.fios.verizon.net [72.81.252.22]) by interserver.kitterman.com (Postfix) with ESMTP id 9902EF80024; Wed, 15 Apr 2020 22:44:57 -0400 (EDT)
From: Scott Kitterman <scott@kitterman.com>
To: dmarc@ietf.org, last-call@ietf.org
Cc: gen-art@ietf.org, draft-ietf-dmarc-psd.all@ietf.org
Date: Wed, 15 Apr 2020 22:44:57 -0400
Message-ID: <5104491.njhNTWfIiN@sk-desktop>
In-Reply-To: <873694nosf.fsf@hobgoblin.ariadne.com>
References: <873694nosf.fsf@hobgoblin.ariadne.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 7Bit
Content-Type: text/plain; charset="us-ascii"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/B4ALGXGFaAT1CRV9nqgo4AJ00QE>
Subject: Re: [dmarc-ietf] Genart last call review of draft-ietf-dmarc-psd-08
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 16 Apr 2020 02:45:11 -0000

On Wednesday, April 15, 2020 10:32:32 PM EDT Dale R. Worley wrote:
> Todd Herr <toddmherr@gmail.com> writes:
> > Having reviewed the comments, I'm wondering if perhaps the following draft
> > rewrite of the Abstract section might be a first step to address many of
> > the points raised?
> 
> I heartily endorse the sentiment behind this.  I think there are some
> minor improvements that could be made, as I've noted below.
> 
> One point is that much of this information might be better put into the
> Introduction, and only a skeleton of it put into the Abstract.  But as
> they say, you write the Introduction after you've written the body of
> the work, and you write the Abstract after you write the Introduction.
> 
> > *AbstractDMARC (Domain-based Message Authentication, Reporting, and
> > Conformance) is a scalable mechanism by which a mail-originating
> > organization can express domain-level policies and preferences for message
> > validation, disposition, and reporting, that a mail-receiving organization
> > can use to improve mail handling.  *
> > 
> > *The original design of DMARC applies only to domains that are registered
> > with a domain name registrar (called "Organizational Domains" in RFC 7489)
> > and nodes in the tree below Organizational Domains. Organizational Domains
> > are themselves nodes in the tree below domain names reserved for
> > registration, with the latter commonly referred to as "Top Level Domains"
> > (TLDs) (e.g., '.com', '.co.uk <http://co.uk>', etc.), although in this
> > document they will be referred to as Public Suffix Domains (PSDs).*
> 
> In some way it would be useful to flag that RFC 7489 is the base DMARC
> RFC.  Otherwise, the reader must just infer that, or look up the RFC.
> 
> There's also a point which seems to be very general, as it shows up in
> RFC 7489 section 3.2:  all the text refers to a "domain" without
> explaining *what* domain is extracted from the message under
> consideration to determine the policy that applies to the message.  My
> belief is that this is the From header in the message, but I've never
> seen this stated.  So e.g.
> 
> "The original design of DMARC applies only to messages with From
> addresses containing domain names that are registered ..."
> 
> This paragraph uses the phrase "domain names reserved for registration",
> but I've not heard that term used in descriptions of the DNS.  And I
> would expect say that "ietf.org" is "reserved for registration", not
> "org" -- though I've never heard the phrase "reserved for registration".
> The phrase that seems obvious to me is "domain names under which domain
> names are registered, commonly referred to as 'Top Level Domains'...",
> but that's somewhat awkward.
> 
> And Kurt Andersen notes that while .co.uk is clearly intended as one of
> these domain names, it isn't, strictly speaking, a TLD.
> 
> > *Since its deployment in 2015, use of DMARC has shown a clear need for the
> > ability to express policy for PSDs. This document describes an extension
> > to
> > DMARC to enable DMARC functionality for PSDs.*
> 
> I'm not sure, but I suspect this could be clarified as "policy for PSDs,
> and by inheritance, for domains under PSDs for which no explicit policy
> is published." -- My belief is that nobody cares about mail claiming to
> come from "person@org", but it's important to have a policy that
> applies to "person@areallylongstringoflettersfoobarbaz.org", inherited
> from "org".
> 
> > *RFC 7489 describes an algorithm for a mail-receiving organization to use
> > in determining the Organizational Domain of an inbound mail message, and
> > this algorithm recommends the use of a "public suffix list" (PSL), with
> > the
> > most common one maintained by the Mozilla Foundation and made public at
> > <http://publicsuffix.org/ <http://publicsuffix.org/>>. Use of such a PSL
> > by
> > a mail-receiving organization will be required in order to discover and
> > apply any DMARC policy declared by a PSD.*
> 
> I don't know if this is useful, but I would suggest changing
> "determining the Organizational Domain of an inbound mail message" to
> "deriving from the domain name of the From address of an inbound mail
> message the Organizational Domain to be used for DMARC processing".
> 
> > *This document also seeks to address implementations that consider a
> > domain
> > on a public Suffix list to be ineligible for DMARC*
> 
> I think you are very close to an Abstract/Introduction that is clearly
> comprehensible to people who are not familiar with DMARC.

Considering this is an extension to DMARC, I don't think that's the target 
audience.

Scott K



From nobody Wed Apr 15 20:31:57 2020
Return-Path: <seth@sethblank.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2C9AC3A0B3F for <dmarc@ietfa.amsl.com>; Wed, 15 Apr 2020 20:31:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level: 
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=sethblank-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xcKvs7PeCgYh for <dmarc@ietfa.amsl.com>; Wed, 15 Apr 2020 20:31:17 -0700 (PDT)
Received: from mail-oi1-x231.google.com (mail-oi1-x231.google.com [IPv6:2607:f8b0:4864:20::231]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5069C3A08E5 for <dmarc@ietf.org>; Wed, 15 Apr 2020 20:31:15 -0700 (PDT)
Received: by mail-oi1-x231.google.com with SMTP id j16so15486066oih.10 for <dmarc@ietf.org>; Wed, 15 Apr 2020 20:31:15 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sethblank-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=RXWj/NXSCYxgGvlTPqLqriVWnSpcf619P3GDaaXos6o=; b=mnuu3Kv5HCuupUw2XRxdSzQvKzuswT9jjXt20/kcd+Y7BL/ZRyuvJuX+5BvRJvfhU4 sUp7dcRuWcISCvnbQvUZUd7P0V/t+v8xAXCrQIiP91UVVe0erp7jfCQsNZW2k6s/b14m uz4xSg1DRZfTiyRdMTvLNNJXW2UW71uV1/0K22qRjARvG7S9Y8DIe5jC022ucZ4/lsza 1Kpx+D64rRVsU4Uwgcmp2/M34/NVo+LDIPWHB/3+P2myjsQFxpB9fRaYVnP3Wh4OA9eE rkO9zbgbnYAeRcoedJ4iakngc0JBMhVqc+UQLx/W/cIysnsgwaHpF3YyaXJsfNDuGhVh KFwQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=RXWj/NXSCYxgGvlTPqLqriVWnSpcf619P3GDaaXos6o=; b=Bl2t+j3iJayuFZ9+ildrnMoxftqU3QseQ2yHQFsVNXWtUK9wfMTqYsgnQPmBEvzn2R FceF5iRLbloK0jxjADayaABciZddBdc/PnrSdYu/k76q+/CvXfOIZ4WUZUkFg97sXBG8 vah54Mw95o43xXKIQOP0PKjLpDkBCnwQpmyEssUW6SKXHRONi/OG+gOz7mBjUuATkECj xmer9wqtH7PAzVnRebNy7VrHy6a2Em/fcGoCzy09cNFBYJz5O0S3wYm3yTYobEWRX0e/ DeBVRouLKXbnI33v/d/4sYWtqxDktunFh8d9bhu90MwNreTTcqKyOaJDd9bLNSNcxvEV oYsQ==
X-Gm-Message-State: AGi0PuYxpPSHZvZKGmZVRJlNQ7v453fRSAOCOOzk3r+4K6QCHDmfYy+s sRRUgUwFTMdbmWQRO61o7B3FxpXdIi1R3SJSjXtGNQ==
X-Google-Smtp-Source: APiQypIiwmmDqYNtmNVNNlAkrDfcJ3uN5kuPmrRsBk4lRBcUeqVYN277ScftKHQ7YOrMWE80/+j5WDh+CMiqMdTHOKc=
X-Received: by 2002:aca:31ce:: with SMTP id x197mr1687269oix.157.1587007875049;  Wed, 15 Apr 2020 20:31:15 -0700 (PDT)
MIME-Version: 1.0
References: <873694nosf.fsf@hobgoblin.ariadne.com> <5104491.njhNTWfIiN@sk-desktop>
In-Reply-To: <5104491.njhNTWfIiN@sk-desktop>
From: Seth Blank <seth@sethblank.com>
Date: Wed, 15 Apr 2020 20:30:59 -0700
Message-ID: <CAD2i3WNUQO5257Fy369+mcY19iToQTOvDXLF5jk7CKE92ZUZNA@mail.gmail.com>
To: Scott Kitterman <scott@kitterman.com>, IETF DMARC WG <dmarc@ietf.org>
Cc: last-call@ietf.org, gen-art@ietf.org, draft-ietf-dmarc-psd.all@ietf.org
Content-Type: multipart/alternative; boundary="000000000000a6008705a36010ab"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/xlTaPjtvDfWl5bV0z3B09U4DqlI>
Subject: Re: [dmarc-ietf] Genart last call review of draft-ietf-dmarc-psd-08
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 16 Apr 2020 03:31:23 -0000

--000000000000a6008705a36010ab
Content-Type: text/plain; charset="UTF-8"

On Wed, Apr 15, 2020 at 7:45 PM Scott Kitterman <scott@kitterman.com> wrote:

> > I think you are very close to an Abstract/Introduction that is clearly
> > comprehensible to people who are not familiar with DMARC.
>
> Considering this is an extension to DMARC, I don't think that's the target
> audience.
>

As an individual: everyone who reads the document stand-alone gets confused
by this lack of clarity (it's the common thread through all the last call
reviews so far), and a concise summary up top feels valuable both for this
evaluation process, and for any future consumers of the document. Whether
someone's familiar with DMARC or not, if they're reading this document,
what's the harm in spelling it out very clearly, especially if we have text
that we believe accomplishes this?

Seth

--000000000000a6008705a36010ab
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr"></div><div class=3D"gmail_quote"><div dir=
=3D"ltr" class=3D"gmail_attr">On Wed, Apr 15, 2020 at 7:45 PM Scott Kitterm=
an &lt;<a href=3D"mailto:scott@kitterman.com">scott@kitterman.com</a>&gt; w=
rote:</div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.=
8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
&gt; I think you are very close to an Abstract/Introduction that is clearly=
<br>
&gt; comprehensible to people who are not familiar with DMARC.<br>
<br>
Considering this is an extension to DMARC, I don&#39;t think that&#39;s the=
 target <br>
audience.<br></blockquote><div><br></div><div>As an individual: everyone wh=
o reads the document stand-alone gets confused by this lack of clarity (it&=
#39;s the common thread through all the last call reviews so far), and a co=
ncise summary up top feels valuable both for this evaluation process, and f=
or any future consumers of the document. Whether someone&#39;s familiar wit=
h DMARC or not, if they&#39;re reading this document, what&#39;s the harm i=
n spelling it out very clearly, especially if we have text that we believe =
accomplishes this?=C2=A0<br></div><div><br></div><div>Seth</div></div></div=
>

--000000000000a6008705a36010ab--


From nobody Wed Apr 15 20:39:26 2020
Return-Path: <superuser@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F127A3A0B9D; Wed, 15 Apr 2020 20:39:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level: 
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lBAQGGbSj0vR; Wed, 15 Apr 2020 20:39:23 -0700 (PDT)
Received: from mail-vk1-xa30.google.com (mail-vk1-xa30.google.com [IPv6:2607:f8b0:4864:20::a30]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 26BDD3A0B9B; Wed, 15 Apr 2020 20:39:23 -0700 (PDT)
Received: by mail-vk1-xa30.google.com with SMTP id s195so1527979vkb.11; Wed, 15 Apr 2020 20:39:23 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=2FD1KxDuquNkLhr3kr61HFLoMa/Dqp6S+mjBcP6sT2o=; b=f5tNjn3eaMjK89/jjkS94zVkbw5H5XRrDlvgI0ykhkOjYYL+aB4WSBey7COaIRPPcl uY6eF03dRIJI0aW75PJMwmmgK+wl8qh8l9RTVb8vjTA9BawnALHSaYJF3nxc7u/WJxxO XT8k+9WKo8qaOeKNV/l/DKV5XuuFKS5qfKmSxPebuQB4IACiXASoZ7/1NWI5hvx7B4+J 6BDYH90zgqZwLip+eYwlX2XgpGrRz/vV3QafBU6OYbi1wxdoVcy7DvVbR65kMUD4YuXH Ww+F1MEtp2Bd7DMFwkY+1T+YEpAEw/5c57iWxKuzkilflDgnBY7M8aok5Zcj99SsOizb r8gA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=2FD1KxDuquNkLhr3kr61HFLoMa/Dqp6S+mjBcP6sT2o=; b=A+o8XR25QFuRM0XHiTGkM2+tDZeSrpFoBOc93iB08xWL4g8IlOgNhlASmxNawFBaIR tZd9XhKHtbdGtezMM8bYNhZqOrTc27baHabse/aOVVW6xDhaBo2tweoqywTFyYqusTdd NCZE5pyyB9OF3jM1jx1PUiXuYpMBMMha+IpymOqAVFgMmj1M79xmoVyIRXbb6+md69vH aBGATLLqCmdmlDf6RKc4a1nIiJSFJtB23p3SUYzT812sefB/3D9U+SZANLfmTgZbYAJC /Rfc81qkUHg7092h6rxbMw+D+xmuRZLoBklXQ05pApjviBue2VEzvjVVO/a9XtcKvbVZ inew==
X-Gm-Message-State: AGi0Puaivc9CH3ntKi345UDrWNg20NbMcC67W5biOnQyv/3eTo0uGG5k 1WzSZry0jT01kNVCadFi5fK3VLRrmgmiB00fVIU=
X-Google-Smtp-Source: APiQypJELLpZD2j+Hxj7qb92tzxAwpw6bxHCdTs4slU3IZiv5v1RIywwNbvxeMZiNuI3MsL3dec+jSFA75uT9/7pgtk=
X-Received: by 2002:ac5:c3ce:: with SMTP id t14mr11823197vkk.60.1587008361893;  Wed, 15 Apr 2020 20:39:21 -0700 (PDT)
MIME-Version: 1.0
References: <873694nosf.fsf@hobgoblin.ariadne.com> <5104491.njhNTWfIiN@sk-desktop> <CAD2i3WNUQO5257Fy369+mcY19iToQTOvDXLF5jk7CKE92ZUZNA@mail.gmail.com>
In-Reply-To: <CAD2i3WNUQO5257Fy369+mcY19iToQTOvDXLF5jk7CKE92ZUZNA@mail.gmail.com>
From: "Murray S. Kucherawy" <superuser@gmail.com>
Date: Wed, 15 Apr 2020 20:39:11 -0700
Message-ID: <CAL0qLwb9CnCCUi0G4wX5fJ-F4-NOnakTNgcOyGAozZjo-po=Qg@mail.gmail.com>
To: Seth Blank <seth@sethblank.com>
Cc: Scott Kitterman <scott@kitterman.com>, IETF DMARC WG <dmarc@ietf.org>, last-call@ietf.org,  General Area Review Team <gen-art@ietf.org>, draft-ietf-dmarc-psd.all@ietf.org
Content-Type: multipart/alternative; boundary="000000000000aa926605a3602ddc"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/gJCURL8OqFQrjOmOv0ODio230nU>
Subject: Re: [dmarc-ietf] Genart last call review of draft-ietf-dmarc-psd-08
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 16 Apr 2020 03:39:25 -0000

--000000000000aa926605a3602ddc
Content-Type: text/plain; charset="UTF-8"

On Wed, Apr 15, 2020 at 8:31 PM Seth Blank <seth@sethblank.com> wrote:

> On Wed, Apr 15, 2020 at 7:45 PM Scott Kitterman <scott@kitterman.com>
> wrote:
>
>> > I think you are very close to an Abstract/Introduction that is clearly
>> > comprehensible to people who are not familiar with DMARC.
>>
>> Considering this is an extension to DMARC, I don't think that's the
>> target
>> audience.
>>
>
> As an individual: everyone who reads the document stand-alone gets
> confused by this lack of clarity (it's the common thread through all the
> last call reviews so far), and a concise summary up top feels valuable both
> for this evaluation process, and for any future consumers of the document.
> Whether someone's familiar with DMARC or not, if they're reading this
> document, what's the harm in spelling it out very clearly, especially if we
> have text that we believe accomplishes this?
>

+1.  If even a small number of people (and the GenART review itself might
be enough) thinks it's in need of this kind of improvement, I would be
surprised if the IESG sends it back to the working group for revision.  If
the goal is to get this thing published so people can start conducting the
experiment, putting the work in now can only help you.

-MSK

--000000000000aa926605a3602ddc
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr">On Wed, Apr 15, 2020 at 8:31 PM Seth Blan=
k &lt;<a href=3D"mailto:seth@sethblank.com">seth@sethblank.com</a>&gt; wrot=
e:<br></div><div class=3D"gmail_quote"><blockquote class=3D"gmail_quote" st=
yle=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padd=
ing-left:1ex"><div dir=3D"ltr"><div class=3D"gmail_quote"><div dir=3D"ltr" =
class=3D"gmail_attr">On Wed, Apr 15, 2020 at 7:45 PM Scott Kitterman &lt;<a=
 href=3D"mailto:scott@kitterman.com" target=3D"_blank">scott@kitterman.com<=
/a>&gt; wrote:</div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0=
px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
&gt; I think you are very close to an Abstract/Introduction that is clearly=
<br>
&gt; comprehensible to people who are not familiar with DMARC.<br>
<br>
Considering this is an extension to DMARC, I don&#39;t think that&#39;s the=
 target <br>
audience.<br></blockquote><div><br></div><div>As an individual: everyone wh=
o reads the document stand-alone gets confused by this lack of clarity (it&=
#39;s the common thread through all the last call reviews so far), and a co=
ncise summary up top feels valuable both for this evaluation process, and f=
or any future consumers of the document. Whether someone&#39;s familiar wit=
h DMARC or not, if they&#39;re reading this document, what&#39;s the harm i=
n spelling it out very clearly, especially if we have text that we believe =
accomplishes this? <br></div></div></div></blockquote><div><br></div>+1.=C2=
=A0 If even a small number of people (and the GenART review itself might be=
 enough) thinks it&#39;s in need of this kind of improvement, I would be su=
rprised if the IESG sends it back to the working group for revision.=C2=A0 =
If the goal is to get this thing published so people can start conducting t=
he experiment, putting the work in now can only help you.<br></div><div cla=
ss=3D"gmail_quote"><br></div>-MSK<br></div>

--000000000000aa926605a3602ddc--


From nobody Wed Apr 15 20:42:46 2020
Return-Path: <superuser@gmail.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DC2D23A0BB0; Wed, 15 Apr 2020 20:42:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level: 
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4LO4XK5GYD5L; Wed, 15 Apr 2020 20:42:39 -0700 (PDT)
Received: from mail-vs1-xe35.google.com (mail-vs1-xe35.google.com [IPv6:2607:f8b0:4864:20::e35]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7CB7A3A0B9B; Wed, 15 Apr 2020 20:42:39 -0700 (PDT)
Received: by mail-vs1-xe35.google.com with SMTP id g24so1517987vsp.8; Wed, 15 Apr 2020 20:42:39 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=ywLx5HsYQ+HvOAIghQfjc3K4xpP8kuBOlpNDQmxIDac=; b=BuoIAkfB2Rh6Y3cKUPO9Oz4PSDexf2wSQjhDct8K4K4NnZh/E6lgxJrQRMm41L9mOH 4q6d4LdXm1o4P8P5aqMkM/rckZAdoypGDKUbB8DaKoQgSyvWjAQDE4zWQ43JXMQ3wZaP jq2Q6bdirlJ4liO6LdDcs4UE+G1ZkMJHwipt8W7Kbp6ARI4dySxwe/gLvTFBDKn/LIFw kMov3Zhdb9QTyNuC3CUKKt8pF6x4yXq5hYqfbaWXfzvNyQxIkyuiZuVrBbGNYXp8Bm8Y NJ04wIFkA7utAyIZSSAS0vtyUJWL6Vr9o2QtNREFO/TkWhplmWXCX2+HLaZvLaGo6uba WYVw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=ywLx5HsYQ+HvOAIghQfjc3K4xpP8kuBOlpNDQmxIDac=; b=IdQdJd7nsdxZ8wfwvrvZaEdoD18oyCnPdd8IaQpZz2SWbZHBvVUjvuFBAc1QOe4oLL QX6mm03VZjNBHN/GFgXu2KTB0lEz9nMvX81vriIOvGfdAGT8hF6bt4v5VRvMYV056VLZ QJ91HMFFnrnVKDEf96wWSmPu9iiRp1HcfSz46tn0J/uBZ9b4QU0erfmE9FJx0s8eL9bp Yqqcr/3P6sKVanueDSOsfOkCcmpc0B9SItVcXi0QYi6/OI9XRcGp+XHUMtHyk8Vcrr+5 AUIWSD9SVrdr/5sd41yNL8aTnFICrDUtJpmmZxbxVKkhczVjCMcAlNhpk3/CY5ZQKrev DVrg==
X-Gm-Message-State: AGi0PuZTUGgeclpjLgKNd9UQEiF99QgaT5I9ulsseYkBeTK18515gIU9 Bn2Smi7AdEnvJXoQP1R8h9++7kH7OLXKYZCUYYY=
X-Google-Smtp-Source: APiQypIz5UhFXb+OTQ2TJbWh3c7x2RhF3b6AAT+KnhrODagSh5V8uKBGh5CghQ8PD1faN3oPyR9QQXM0H95IkYn5Tbw=
X-Received: by 2002:a67:7c44:: with SMTP id x65mr7379773vsc.52.1587008558343;  Wed, 15 Apr 2020 20:42:38 -0700 (PDT)
MIME-Version: 1.0
References: <873694nosf.fsf@hobgoblin.ariadne.com> <5104491.njhNTWfIiN@sk-desktop> <CAD2i3WNUQO5257Fy369+mcY19iToQTOvDXLF5jk7CKE92ZUZNA@mail.gmail.com> <CAL0qLwb9CnCCUi0G4wX5fJ-F4-NOnakTNgcOyGAozZjo-po=Qg@mail.gmail.com>
In-Reply-To: <CAL0qLwb9CnCCUi0G4wX5fJ-F4-NOnakTNgcOyGAozZjo-po=Qg@mail.gmail.com>
From: "Murray S. Kucherawy" <superuser@gmail.com>
Date: Wed, 15 Apr 2020 20:42:26 -0700
Message-ID: <CAL0qLwbSFTJU28f7Nm=7-R-6T6iNreb4M7eeSgA1rJwgPJGQ+g@mail.gmail.com>
To: Seth Blank <seth@sethblank.com>
Cc: Scott Kitterman <scott@kitterman.com>, IETF DMARC WG <dmarc@ietf.org>, last-call@ietf.org,  General Area Review Team <gen-art@ietf.org>, draft-ietf-dmarc-psd.all@ietf.org
Content-Type: multipart/alternative; boundary="000000000000602d8705a3603985"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/VfnErn0kiZm_ZOQGFroBI2skgic>
Subject: Re: [dmarc-ietf] Genart last call review of draft-ietf-dmarc-psd-08
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 16 Apr 2020 03:42:41 -0000

--000000000000602d8705a3603985
Content-Type: text/plain; charset="UTF-8"

Apologies:

On Wed, Apr 15, 2020 at 8:39 PM Murray S. Kucherawy <superuser@gmail.com>
wrote:

> +1.  If even a small number of people (and the GenART review itself might
> be enough) thinks it's in need of this kind of improvement, I would be
> surprised if the IESG sends it back to the working group for revision.  If
> the goal is to get this thing published so people can start conducting the
> experiment, putting the work in now can only help you.
>

*wouldn't

-MSK

--000000000000602d8705a3603985
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr">Apologies:<br><br>On Wed, Apr 15, 2020 at=
 8:39 PM Murray S. Kucherawy &lt;<a href=3D"mailto:superuser@gmail.com">sup=
eruser@gmail.com</a>&gt; wrote:<br></div><div class=3D"gmail_quote"><blockq=
uote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1p=
x solid rgb(204,204,204);padding-left:1ex"><div dir=3D"ltr">+1.=C2=A0 If ev=
en a small number of people (and the GenART review itself might be enough) =
thinks it&#39;s in need of this kind of improvement, I would be surprised i=
f the IESG sends it back to the working group for revision.=C2=A0 If the go=
al is to get this thing published so people can start conducting the experi=
ment, putting the work in now can only help you.<br></div></blockquote><div=
><br></div><div>*wouldn&#39;t <br></div><div><br></div><div>-MSK<br></div><=
/div></div>

--000000000000602d8705a3603985--


From nobody Wed Apr 15 20:43:55 2020
Return-Path: <scott@kitterman.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 861E93A0BB5; Wed, 15 Apr 2020 20:43:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level: 
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=neutral reason="invalid (unsupported algorithm ed25519-sha256)" header.d=kitterman.com header.b=ZXz0cR6n; dkim=pass (2048-bit key) header.d=kitterman.com header.b=HTdvVxrs
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1-B1Rdr9ttCd; Wed, 15 Apr 2020 20:43:53 -0700 (PDT)
Received: from interserver.kitterman.com (interserver.kitterman.com [64.20.48.66]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7D7843A0D16; Wed, 15 Apr 2020 20:43:44 -0700 (PDT)
Received: from interserver.kitterman.com (interserver.kitterman.com [64.20.48.66]) by interserver.kitterman.com (Postfix) with ESMTPS id CAC8CF80279; Wed, 15 Apr 2020 23:43:43 -0400 (EDT)
DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/simple; d=kitterman.com; i=@kitterman.com; q=dns/txt; s=201903e; t=1587008623; h=date : in-reply-to : references : mime-version : content-type : content-transfer-encoding : subject : to : cc : from : message-id : from; bh=AGeEE1pZPW/Lnb23YZ6BfuoIRc/NUNOTptzsq8VeG3c=; b=ZXz0cR6nbVVnqcKjPJ+shIRprk8EFJ1GhrGSrr8Z3xe5RytRuonAdn5tCJLiFlMO58rSx DI1V/M3SlmklEqXAA==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kitterman.com; i=@kitterman.com; q=dns/txt; s=201903r; t=1587008623; h=date : in-reply-to : references : mime-version : content-type : content-transfer-encoding : subject : to : cc : from : message-id : from; bh=AGeEE1pZPW/Lnb23YZ6BfuoIRc/NUNOTptzsq8VeG3c=; b=HTdvVxrsVq5GJhH1y8Gsnf9NdPm/drvIPiBo2Q23a7Ry8aUW2BU3tjoET+nqZ7I7qxPmL Aq5Hg0Ou234uZ+zP7fn97fkxvMIdCx5Jo3cvfdH1Z+bhZ7ZpEUTr3KUqk+djwIqux4W+FMe 6V782dSBAtNODi6nGhuHUZPejaNYT3Fayq+R6Gi8ojghPFwjGupDZecq7KlBkBwunOJFuAc Es1uy8aPEmi1JVCrm8zdYJL4p5czh4BSrDS/+urKyMAFkGp1ftQRVPPtYraEGy9o/z0ltIC WUx+dOJQeOIIsjIoZoY95oZ07pwrniMaTr0fxQ3AXM4XnILY77B9b+ce8blQ==
Received: from [192.168.1.184] (static-72-81-252-22.bltmmd.fios.verizon.net [72.81.252.22]) by interserver.kitterman.com (Postfix) with ESMTPSA id 74457F80024; Wed, 15 Apr 2020 23:43:43 -0400 (EDT)
Date: Thu, 16 Apr 2020 03:43:41 +0000
In-Reply-To: <CAD2i3WNUQO5257Fy369+mcY19iToQTOvDXLF5jk7CKE92ZUZNA@mail.gmail.com>
References: <873694nosf.fsf@hobgoblin.ariadne.com> <5104491.njhNTWfIiN@sk-desktop> <CAD2i3WNUQO5257Fy369+mcY19iToQTOvDXLF5jk7CKE92ZUZNA@mail.gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable
To: last-call@ietf.org,IETF DMARC WG <dmarc@ietf.org>
CC: gen-art@ietf.org,draft-ietf-dmarc-psd.all@ietf.org
From: Scott Kitterman <scott@kitterman.com>
Message-ID: <4666D39F-85F5-4AD2-A754-11FED0A5C169@kitterman.com>
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/jwm2zL8ivm-d8cQjXb9FjPuTc7w>
Subject: Re: [dmarc-ietf] [Last-Call] Genart last call review of draft-ietf-dmarc-psd-08
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 16 Apr 2020 03:43:55 -0000

On April 16, 2020 3:30:59 AM UTC, Seth Blank <seth@sethblank=2Ecom> wrote:
>On Wed, Apr 15, 2020 at 7:45 PM Scott Kitterman <scott@kitterman=2Ecom>
>wrote:
>
>> > I think you are very close to an Abstract/Introduction that is
>clearly
>> > comprehensible to people who are not familiar with DMARC=2E
>>
>> Considering this is an extension to DMARC, I don't think that's the
>target
>> audience=2E
>>
>
>As an individual: everyone who reads the document stand-alone gets
>confused
>by this lack of clarity (it's the common thread through all the last
>call
>reviews so far), and a concise summary up top feels valuable both for
>this
>evaluation process, and for any future consumers of the document=2E
>Whether
>someone's familiar with DMARC or not, if they're reading this document,
>what's the harm in spelling it out very clearly, especially if we have
>text
>that we believe accomplishes this?

Perhaps I'm too pessimistic, but I don't think it's possible to actually m=
ake this clear to anyone that isn't familiar with RFC 7489 without essentia=
lly turning this into a proto 7489bis=2E

If you want to add it and are confident we aren't diving into a deep, deep=
 hole, I don't strongly object=2E  Just let me know what to add=2E

Scott K


From nobody Thu Apr 16 07:29:44 2020
Return-Path: <johnl@iecc.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 057463A09A3 for <dmarc@ietfa.amsl.com>; Thu, 16 Apr 2020 07:29:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.852
X-Spam-Level: 
X-Spam-Status: No, score=-1.852 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.248, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1536-bit key) header.d=iecc.com header.b=ntCGjTDQ; dkim=pass (1536-bit key) header.d=taugh.com header.b=op9r1dfr
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id v1LFC24Dk100 for <dmarc@ietfa.amsl.com>; Thu, 16 Apr 2020 07:29:40 -0700 (PDT)
Received: from gal.iecc.com (gal.iecc.com [IPv6:2001:470:1f07:1126:0:43:6f73:7461]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6A5153A09A2 for <dmarc@ietf.org>; Thu, 16 Apr 2020 07:29:40 -0700 (PDT)
Received: (qmail 7696 invoked from network); 16 Apr 2020 14:29:39 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=iecc.com; h=date:message-id:from:to:cc:subject:in-reply-to:mime-version:content-type:content-transfer-encoding; s=1e0e.5e986bd3.k2004; bh=LcPTSSwxfKMAlAxk3rR66G8sw0hrr5s4qaGTxzZR6WE=; b=ntCGjTDQWAzBsYz4CR63jHwqdl7h1NDEOrULD5Os1/1mSTbjH3tieZbJZj0/W+Cr891Qv03lNcNZStFMmvbI6plsV018gwfupLpONSjVrAF40YqOoYzGLc71cz6E9P3B2E3Rtk8Z+fFUOCiQEyNJvUfwSgse99Vz71qPlZ1BtmhH8/gcd8ZF1IBUlUOA4Em+nC83jooAsN4tdBx8hr4Ulw7WOEjCJyxgEp2uTXB70ZNQatZKBjLNuMdKZviO5aAO
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=taugh.com; h=date:message-id:from:to:cc:subject:in-reply-to:mime-version:content-type:content-transfer-encoding; s=1e0e.5e986bd3.k2004; bh=LcPTSSwxfKMAlAxk3rR66G8sw0hrr5s4qaGTxzZR6WE=; b=op9r1dfrZJP1RamxmIYGyvrZ4zJNLmmGGrb+iOzpWs7IN9awnIkODq1PHg3UpedL7pW0hbrlXja7hZx1XVSRK94G1mgx8soWS+VNfukSeR1RnDumkVwMw0zk5gJQ+sOQzw96e3e54jU99SFmiwAPokBwik9e01M2OxAi+15+9BC+nH1cEe8MwtoWrv4eh5SigFW1klymETjcyCZKlqB/mH4594xCzB2b81Rv8UXW1nIXHaC6VNY9wDdefBv0JrJF
Received: from ary.qy ([IPv6:2001:470:1f07:1126::78:696d:6170]) by imap.iecc.com ([IPv6:2001:470:1f07:1126::78:696d:6170]) with ESMTP via TCP6; 16 Apr 2020 14:29:38 -0000
Received: by ary.qy (Postfix, from userid 501) id CCD9517E8F5E; Thu, 16 Apr 2020 10:29:38 -0400 (EDT)
Date: 16 Apr 2020 10:29:38 -0400
Message-Id: <20200416142938.CCD9517E8F5E@ary.qy>
From: "John Levine" <johnl@taugh.com>
To: dmarc@ietf.org
Cc: scott@kitterman.com
In-Reply-To: <4666D39F-85F5-4AD2-A754-11FED0A5C169@kitterman.com>
Organization: Taughannock Networks
X-Headerized: yes
Mime-Version: 1.0
Content-type: text/plain; charset=utf-8
Content-transfer-encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/vyTq262ZYerv9dqR-KqynbSS_3U>
Subject: Re: [dmarc-ietf] [Last-Call] Genart last call review of draft-ietf-dmarc-psd-08
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 16 Apr 2020 14:29:42 -0000

In article <4666D39F-85F5-4AD2-A754-11FED0A5C169@kitterman.com> you write:
>Perhaps I'm too pessimistic, but I don't think it's possible to actually make this clear to anyone that isn't familiar
>with RFC 7489 without essentially turning this into a proto 7489bis.

I agree.  Hence my suggestion last week to tear out all of the TLD
stuff or move it into an appendix and just say this is the name above
the Organizational domain which you can find into RFC 7489.

The reality is that any of the 8000 domains in the PSL could publish a
PSD record, and I would not want to try to explain to anyone in the
IESG why most of them are there.  So let's stay as far away from that
as possible.  Policy Super Domain, remember?

R's,
John


From nobody Thu Apr 16 12:21:19 2020
Return-Path: <kurta@drkurt.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 699E63A0EE2 for <dmarc@ietfa.amsl.com>; Thu, 16 Apr 2020 12:21:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level: 
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=drkurt.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Fdblkn0UDQIz for <dmarc@ietfa.amsl.com>; Thu, 16 Apr 2020 12:21:10 -0700 (PDT)
Received: from mail-il1-x132.google.com (mail-il1-x132.google.com [IPv6:2607:f8b0:4864:20::132]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 950F63A0ED9 for <dmarc@ietf.org>; Thu, 16 Apr 2020 12:21:10 -0700 (PDT)
Received: by mail-il1-x132.google.com with SMTP id z12so8023388ilb.10 for <dmarc@ietf.org>; Thu, 16 Apr 2020 12:21:10 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=drkurt.com; s=20130612; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=IOEq/3mCN1AitjqaDqxr19Pdjy08edrAuqu8dNlG+3M=; b=UE1u0M82+KyktBnmDjfduTxkJqphgjR6vxodBSi5IQdCyaaAm53t2/QH9vbc+OdrJE GOiFt0HSvOWLkg+cNt0mU+e/sO3yqkYgUOBz0UsCf+ZIhcgxgJAzTWDdn0rH/vm9FGWn Svt/pzp2ho3hV5+e5Fvv7Zt39/qSODU4+H4fk=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=IOEq/3mCN1AitjqaDqxr19Pdjy08edrAuqu8dNlG+3M=; b=pCu9n4EcV6CYGChrX8WYyzPhtt23GapOvK1FObMWLXeTGRLT0UEoHCijRUzqKletn0 n3oBuV1EV6NWxgwaSrtyEZYh8r5Xdl+aCZ5kwBprM00proYchR4SkelPQCNuWOO/7wPa zdlSS6O2dXeSAHrxv8l72NinAGuON7MX011LtF0OGASWS7RWonq/j98IQ6IUKe7deso1 wVFaxUli12TuClJm3v3DQPEGl8P2Dpkh0BUH9IkKnnYpM4L9Wpi2NjLOaSNLTmWm1l1A 4KW1kVeImZItaYnXDNRdFHFJDT9+sxt6l2jVxfJ8Rpoi/OCWcRtVP9WmzIljdTrXWcfb kdvQ==
X-Gm-Message-State: AGi0PuYu1blnR7+4Gw5veAwgObsFksdlNjTSycJTrHGA+Zr8NhFuYx8U mW+h0+vVdMBZMfe2GZaTnYyt6zQnkh9AyuWHoZudbgijBew=
X-Google-Smtp-Source: APiQypLWXpOiuhN39MwuFZQ7+tCJdyv+0fOLQtoJCjenedJjs+ZuzP3mfl6huB5xa2kVX3D4PEcHN5hLcdwqYMreKIA=
X-Received: by 2002:a92:7301:: with SMTP id o1mr12528152ilc.104.1587064869509;  Thu, 16 Apr 2020 12:21:09 -0700 (PDT)
MIME-Version: 1.0
References: <4666D39F-85F5-4AD2-A754-11FED0A5C169@kitterman.com> <20200416142938.CCD9517E8F5E@ary.qy>
In-Reply-To: <20200416142938.CCD9517E8F5E@ary.qy>
From: "Kurt Andersen (b)" <kboth@drkurt.com>
Date: Thu, 16 Apr 2020 12:20:51 -0700
Message-ID: <CABuGu1r5MZs8S8EtKQaaPRcm1RYxHrE=wm4yKrkFtd1m-c8oSA@mail.gmail.com>
To: John Levine <johnl@taugh.com>
Cc: "dmarc@ietf.org" <dmarc@ietf.org>, Scott Kitterman <scott@kitterman.com>
Content-Type: multipart/alternative; boundary="000000000000c875a405a36d55ea"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/dmh_iwbkZhjp15Pat6PgH75ZcDQ>
Subject: Re: [dmarc-ietf] [Last-Call] Genart last call review of draft-ietf-dmarc-psd-08
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 16 Apr 2020 19:21:18 -0000

--000000000000c875a405a36d55ea
Content-Type: text/plain; charset="UTF-8"

On Thu, Apr 16, 2020 at 7:29 AM John Levine <johnl@taugh.com> wrote:

> In article <4666D39F-85F5-4AD2-A754-11FED0A5C169@kitterman.com> you write:
> >Perhaps I'm too pessimistic, but I don't think it's possible to actually
> make this clear to anyone that isn't familiar
> >with RFC 7489 without essentially turning this into a proto 7489bis.
>
> I agree.  Hence my suggestion last week to tear out all of the TLD
> stuff or move it into an appendix and just say this is the name above
> the Organizational domain which you can find into RFC 7489.
>
> The reality is that any of the 8000 domains in the PSL could publish a
> PSD record, and I would not want to try to explain to anyone in the
> IESG why most of them are there.  So let's stay as far away from that
> as possible.  Policy Super Domain, remember?


 After an initial "that's too cutesy" reaction, I'm becoming more convinced
that John's suggestion ("policy super domain") might indeed be the right
sort of solution - along with clearly citing 7489 in the intro and abstract
("If you don't know what DMARC is, go read RFC 7489 before coming back
here." or similar).

--Kurt

--000000000000c875a405a36d55ea
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr">On Thu, Apr 16, 2020 at 7:29 AM John Levi=
ne &lt;<a href=3D"mailto:johnl@taugh.com">johnl@taugh.com</a>&gt; wrote:<br=
></div><div class=3D"gmail_quote"><blockquote class=3D"gmail_quote" style=
=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding=
-left:1ex">In article &lt;<a href=3D"mailto:4666D39F-85F5-4AD2-A754-11FED0A=
5C169@kitterman.com" target=3D"_blank">4666D39F-85F5-4AD2-A754-11FED0A5C169=
@kitterman.com</a>&gt; you write:<br>
&gt;Perhaps I&#39;m too pessimistic, but I don&#39;t think it&#39;s possibl=
e to actually make this clear to anyone that isn&#39;t familiar<br>
&gt;with RFC 7489 without essentially turning this into a proto 7489bis.<br=
>
<br>
I agree.=C2=A0 Hence my suggestion last week to tear out all of the TLD<br>
stuff or move it into an appendix and just say this is the name above<br>
the Organizational domain which you can find into RFC 7489.<br>
<br>
The reality is that any of the 8000 domains in the PSL could publish a<br>
PSD record, and I would not want to try to explain to anyone in the<br>
IESG why most of them are there.=C2=A0 So let&#39;s stay as far away from t=
hat<br>
as possible.=C2=A0 Policy Super Domain, remember?</blockquote><div><br></di=
v><div>=C2=A0After an initial &quot;that&#39;s too cutesy&quot; reaction, I=
&#39;m becoming more convinced that John&#39;s suggestion (&quot;policy sup=
er domain&quot;) might indeed be the right sort of solution - along with cl=
early citing 7489 in the intro and abstract (&quot;If you don&#39;t know wh=
at DMARC is, go read RFC 7489 before coming back here.&quot; or similar).</=
div><div><br></div><div>--Kurt=C2=A0</div></div></div>

--000000000000c875a405a36d55ea--


From nobody Tue Apr 21 09:11:17 2020
Return-Path: <scott@kitterman.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BC3E63A0D2D for <dmarc@ietfa.amsl.com>; Tue, 21 Apr 2020 09:11:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level: 
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_FAIL=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=neutral reason="invalid (unsupported algorithm ed25519-sha256)" header.d=kitterman.com header.b=ccqhmneG; dkim=pass (2048-bit key) header.d=kitterman.com header.b=pGorNkeu
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wDqivp9P23w4 for <dmarc@ietfa.amsl.com>; Tue, 21 Apr 2020 09:11:11 -0700 (PDT)
Received: from interserver.kitterman.com (interserver.kitterman.com [IPv6:2604:a00:6:1039:225:90ff:feaa:b169]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D0BD03A0D41 for <dmarc@ietf.org>; Tue, 21 Apr 2020 09:11:02 -0700 (PDT)
Received: from interserver.kitterman.com (interserver.kitterman.com [IPv6:2604:a00:6:1039:225:90ff:feaa:b169]) by interserver.kitterman.com (Postfix) with ESMTPS id 04D33F80308 for <dmarc@ietf.org>; Tue, 21 Apr 2020 12:11:01 -0400 (EDT)
DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/simple; d=kitterman.com; i=@kitterman.com; q=dns/txt; s=201903e; t=1587485460; h=from : to : subject : date : message-id : mime-version : content-transfer-encoding : content-type : from; bh=Zaw6TawD13DFS//fWxtmYwE74rRZflnKFHuGIXAywUk=; b=ccqhmneG7JYeeezmmswz5F5km1UhMGQxvHrV2PWkUV8AEuPVQhoorNEezWchU9gVD3sQ+ D70uHpFZCzOZPBNDg==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kitterman.com; i=@kitterman.com; q=dns/txt; s=201903r; t=1587485460; h=from : to : subject : date : message-id : mime-version : content-transfer-encoding : content-type : from; bh=Zaw6TawD13DFS//fWxtmYwE74rRZflnKFHuGIXAywUk=; b=pGorNkeuPpd6QMB8nI+6i3Q163gOwrXAoLUZbocG6kE2/NYb5ZmU48PjZO3/9xX9gag38 Ez1vVA4RaoInLBYXjsVJXT2V0UeUFh7mmW87Z4L8v80Krf17KronLgAr9Wowi/t7gfk4QVS W34ERs0U9Up0OW4bvIJBRyKcgZxhjb83l3yCQAN5B/l45LHeJiK6g0jv/I1IdadYDJ1uady alXcUymMi13fwIs/w86GWgCqAYAMlhLySrDgatBYgnOj9h28oh83ZvLr6OijZCk1i6e9UgC pIyHu20FbwssOSwYGpC5P7kDc+leV/OEXHoqfzy8TeyjJAjzMsUNfeSNiKlg==
Received: from sk-desktop.localnet (static-72-81-252-22.bltmmd.fios.verizon.net [72.81.252.22]) by interserver.kitterman.com (Postfix) with ESMTP id CD11BF800E7 for <dmarc@ietf.org>; Tue, 21 Apr 2020 12:11:00 -0400 (EDT)
From: Scott Kitterman <scott@kitterman.com>
To: dmarc@ietf.org
Date: Tue, 21 Apr 2020 12:11:00 -0400
Message-ID: <2656238.kvSPeydUtl@sk-desktop>
MIME-Version: 1.0
Content-Transfer-Encoding: 7Bit
Content-Type: text/plain; charset="us-ascii"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/o_WVQuGLdCZpXgNj0Su7Zrwrw8E>
Subject: [dmarc-ietf] Composition Kills: A Case Study of Email Sender Authentication
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 21 Apr 2020 16:11:14 -0000

There is probably protocol improvement work that should be done based on:

https://www.usenix.org/system/files/sec20fall_chen-jianjun_prepub_0.pdf

Scott K



From nobody Tue Apr 21 11:12:14 2020
Return-Path: <kurta@drkurt.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 98B943A0949 for <dmarc@ietfa.amsl.com>; Tue, 21 Apr 2020 11:12:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level: 
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=drkurt.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 29NNfaMpkz30 for <dmarc@ietfa.amsl.com>; Tue, 21 Apr 2020 11:12:08 -0700 (PDT)
Received: from mail-il1-x12b.google.com (mail-il1-x12b.google.com [IPv6:2607:f8b0:4864:20::12b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 800A83A0942 for <dmarc@ietf.org>; Tue, 21 Apr 2020 11:12:07 -0700 (PDT)
Received: by mail-il1-x12b.google.com with SMTP id w6so9943773ilg.1 for <dmarc@ietf.org>; Tue, 21 Apr 2020 11:12:07 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=drkurt.com; s=20130612; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=PPRUD0Rsy17eLdouzK/wKCCGN8abaOLGf9QKLCZJMno=; b=Huw7oni4726rarb9r7x9kVDeTMv2/cQN9iar4xnrMXVkm7kqQnRfZ5H1K+fQMxCKL4 9Xe/RDncXKS7toK3wVunGHhq839EcIIzwNqeURzOj4Oi+nknkpbzKJOd4XKGJVb07B9W Pd07KRK9p06npBsufachg4HPn4Yzy6Tz3+mZE=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=PPRUD0Rsy17eLdouzK/wKCCGN8abaOLGf9QKLCZJMno=; b=EcOzGSpcj4lE4r6N0TrHjVEkQXsB2tvMPNvrBxJAAemFwp7ZB35DLhM2ZHkjIPf+GC yUtyTiHpxCXLhcnKsMJDw5JVpvHn1x6SdDc7kkTNeZ4frMm9Umkk3/KHc8tDKOpTyYpy dSqJA0SGpAUPvbYMsPmWrBFVWZGGtZCQKKyHfkCP1kBgUVZLduJq+XOg6PSpQSDYdo7M 6RKrBkfDGobk+sHuE99tsCUqSUaSTmfXeNFa699lqbF/7Hw+8naPcrBHmXEPq2MDEAeu TAKlRsOpxzLiJys4uPvshqclFVTeuVWblEAu/iL8vxUcBIud79/UPpUirHMDGiPX7yc6 JYwA==
X-Gm-Message-State: AGi0PuYEgGm2w4O9ZAj9ZMYDhQswa/SW3cRfeFOr0mwTlC+mrXwELapO i86Sl8pl8wfOC9wz1RB1H2GpxYfiw4fDD3YVRTP1oCAO/Rwhyw==
X-Google-Smtp-Source: APiQypJlPGCN2RArMazBLXcYjESQzdOwUvFBlcibgGO85grK0J/ZE+iUZ8+DksZxgEf3wz9K/zulIlFJ8z/QwaWfIJI=
X-Received: by 2002:a92:d44b:: with SMTP id r11mr21818222ilm.120.1587492726276;  Tue, 21 Apr 2020 11:12:06 -0700 (PDT)
MIME-Version: 1.0
References: <2656238.kvSPeydUtl@sk-desktop>
In-Reply-To: <2656238.kvSPeydUtl@sk-desktop>
From: "Kurt Andersen (b)" <kboth@drkurt.com>
Date: Tue, 21 Apr 2020 11:11:47 -0700
Message-ID: <CABuGu1r1Yv5SdjErvicEVpd90Wg6SznDp1K58Pjz-9PXCy-ghA@mail.gmail.com>
To: Scott Kitterman <scott@kitterman.com>
Cc: "dmarc@ietf.org" <dmarc@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000008b3a505a3d0f406"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/B7X1ZLdjLA-7gd49gwUntSuqpLM>
Subject: Re: [dmarc-ietf] Composition Kills: A Case Study of Email Sender Authentication
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 21 Apr 2020 18:12:12 -0000

--00000000000008b3a505a3d0f406
Content-Type: text/plain; charset="UTF-8"

Extracting from the abstract of a paper in process by Casey Deccio (now
researching SPF at BYU, formerly at Cisco):

Our techniques elicit SPF and DMARC validation activity of the servers,
> while minimizing spam and perceived abuse. We find that only 25% of mail
> servers and less than half of domains deploy SPF validation. Of domains
> that perform SPF validation, 7.6% exhibit inconsistent validation behavior
> across mail servers. We also find that 75% of organizations with mail
> servers for popular domains share DNS infrastructure with up to tens of
> thousands of others.


Most of his focus has been on SPF but it would be useful to loop him into
the DMARCbis discussions.

--Kurt

On Tue, Apr 21, 2020 at 9:11 AM Scott Kitterman <scott@kitterman.com> wrote:

> There is probably protocol improvement work that should be done based on:
>
> https://www.usenix.org/system/files/sec20fall_chen-jianjun_prepub_0.pdf
>
> Scott K
>
>
> _______________________________________________
> dmarc mailing list
> dmarc@ietf.org
> https://www.ietf.org/mailman/listinfo/dmarc
>

--00000000000008b3a505a3d0f406
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Extracting from the abstract of a paper in process by Case=
y Deccio (now researching SPF at BYU, formerly at Cisco):<div><br></div><bl=
ockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-lef=
t:1px solid rgb(204,204,204);padding-left:1ex">Our techniques elicit SPF an=
d DMARC validation activity of the servers, while minimizing spam and perce=
ived abuse. We find that only 25% of mail servers and less than half of dom=
ains deploy SPF validation. Of domains that perform SPF validation, 7.6% ex=
hibit inconsistent validation behavior across mail servers. We also find th=
at 75% of organizations with mail servers for popular domains share DNS inf=
rastructure with up to tens of thousands of others.</blockquote><div><br></=
div><div>Most of his focus has been on SPF but it would be useful to loop h=
im into the DMARCbis discussions.</div><div><br></div><div>--Kurt</div></di=
v><br><div class=3D"gmail_quote"><div dir=3D"ltr" class=3D"gmail_attr">On T=
ue, Apr 21, 2020 at 9:11 AM Scott Kitterman &lt;<a href=3D"mailto:scott@kit=
terman.com">scott@kitterman.com</a>&gt; wrote:<br></div><blockquote class=
=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rg=
b(204,204,204);padding-left:1ex">There is probably protocol improvement wor=
k that should be done based on:<br>
<br>
<a href=3D"https://www.usenix.org/system/files/sec20fall_chen-jianjun_prepu=
b_0.pdf" rel=3D"noreferrer" target=3D"_blank">https://www.usenix.org/system=
/files/sec20fall_chen-jianjun_prepub_0.pdf</a><br>
<br>
Scott K<br>
<br>
<br>
_______________________________________________<br>
dmarc mailing list<br>
<a href=3D"mailto:dmarc@ietf.org" target=3D"_blank">dmarc@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/dmarc" rel=3D"noreferrer" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/dmarc</a><br>
</blockquote></div>

--00000000000008b3a505a3d0f406--


From nobody Tue Apr 21 11:23:48 2020
Return-Path: <johnl@iecc.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 982D13A0988 for <dmarc@ietfa.amsl.com>; Tue, 21 Apr 2020 11:23:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.85
X-Spam-Level: 
X-Spam-Status: No, score=-1.85 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.25, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1536-bit key) header.d=iecc.com header.b=PjcQTJvb; dkim=pass (1536-bit key) header.d=taugh.com header.b=ZbaXuEjT
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RqkOzBQ4VVfQ for <dmarc@ietfa.amsl.com>; Tue, 21 Apr 2020 11:23:44 -0700 (PDT)
Received: from gal.iecc.com (gal.iecc.com [IPv6:2001:470:1f07:1126:0:43:6f73:7461]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7F27A3A0C19 for <dmarc@ietf.org>; Tue, 21 Apr 2020 11:22:44 -0700 (PDT)
Received: (qmail 50436 invoked from network); 21 Apr 2020 18:22:42 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=iecc.com; h=date:message-id:from:to:cc:subject:in-reply-to:mime-version:content-type:content-transfer-encoding; s=c502.5e9f39f2.k2004; bh=Ki6kFOZU1oTr9qc9AwW8Lb/vvNxVsZCB+o0/+/kd2A8=; b=PjcQTJvbkPk15ivokqV1bjV0WunyERWnzPXsmfHRRqowE6Ntxi91Fvj9GyXRPXljmUOkZkBIpo32w6krmXQhrt2qQh18tgjLCXfNxgdLqmDtHLofNOFeMuVf71Z4u97zcYLIGccDyAaYnLdPRkWyakD8Tlk71R78YIL/sroN/DseL7/BGiRNPHTUoywk7c8EzVQxQDgbWZSY7fApchmOyggS5aBt93w/pZLuM7W7I8AJkWXIWj1RjdCCm5Rfv/g7
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=taugh.com; h=date:message-id:from:to:cc:subject:in-reply-to:mime-version:content-type:content-transfer-encoding; s=c502.5e9f39f2.k2004; bh=Ki6kFOZU1oTr9qc9AwW8Lb/vvNxVsZCB+o0/+/kd2A8=; b=ZbaXuEjTNGZnhbNUnk5dY94kpuVczbEQ6ksNb0RVR0QlMmjSBxQP2fjcTC7ztpvjEYuD5N7o6tK0DaGA+vIIqsDHg4I+EPIyX9CQ/6HFrI/VaBqb0Peksc1uAlPVmHehdchRT3pBSNWFX9LX3vTaCU3GrqAw0fV8lyruPaqj21IgC2/Ag+kO8qWZcZCn1BrgnnodK7Z7J1MLQYj2DoJ1Rt+3lgBxymCWwW8PBsTphGLSiPZrJdCz8brlr8G+lk5b
Received: from ary.qy ([IPv6:2001:470:1f07:1126::78:696d:6170]) by imap.iecc.com ([IPv6:2001:470:1f07:1126::78:696d:6170]) with ESMTP via TCP6; 21 Apr 2020 18:22:42 -0000
Received: by ary.qy (Postfix, from userid 501) id 15AEB181144D; Tue, 21 Apr 2020 14:22:41 -0400 (EDT)
Date: 21 Apr 2020 14:22:41 -0400
Message-Id: <20200421182242.15AEB181144D@ary.qy>
From: "John Levine" <johnl@taugh.com>
To: dmarc@ietf.org
Cc: scott@kitterman.com
In-Reply-To: <2656238.kvSPeydUtl@sk-desktop>
Organization: Taughannock Networks
X-Headerized: yes
Mime-Version: 1.0
Content-type: text/plain; charset=utf-8
Content-transfer-encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/4BgirbCChQafXdc8ACQ9X_-U6d8>
Subject: Re: [dmarc-ietf] Composition Kills: A Case Study of Email Sender Authentication
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 21 Apr 2020 18:23:47 -0000

In article <2656238.kvSPeydUtl@sk-desktop> you write:
>There is probably protocol improvement work that should be done based on:
>
>https://www.usenix.org/system/files/sec20fall_chen-jianjun_prepub_0.pdf

I didn't see any protocol issues other than the well known DKIM
multiple From: headers (the Doug Otis feature) and l=.  They certainly
did find a lot of implementation bugs, some of which I found pretty
surprising, like Gmail allowing and misinterpreting NUL characters in
DKIM signature headers.

This sounds like we need more test suites and perhaps more reminders
that when you're writing security software, being forgiving of other
people's bugs will backfire on you.

R's,
John


From nobody Tue Apr 21 18:22:04 2020
Return-Path: <worley@alum.mit.edu>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D00C13A090C for <dmarc@ietfa.amsl.com>; Tue, 21 Apr 2020 18:22:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.983
X-Spam-Level: 
X-Spam-Status: No, score=-0.983 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.25, SPF_HELO_NONE=0.001, SPF_SOFTFAIL=0.665, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=comcastmailservice.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cVo0DH7bms8o for <dmarc@ietfa.amsl.com>; Tue, 21 Apr 2020 18:21:59 -0700 (PDT)
Received: from resqmta-ch2-07v.sys.comcast.net (resqmta-ch2-07v.sys.comcast.net [IPv6:2001:558:fe21:29:69:252:207:39]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 583473A0902 for <dmarc@ietf.org>; Tue, 21 Apr 2020 18:21:58 -0700 (PDT)
Received: from resomta-ch2-11v.sys.comcast.net ([69.252.207.107]) by resqmta-ch2-07v.sys.comcast.net with ESMTP id R3t3jB4HND4wER45OjWs7r; Wed, 22 Apr 2020 01:21:58 +0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=comcastmailservice.net; s=20180828_2048; t=1587518518; bh=nVKfE6iwmi0q2OHWXdTyXfQpzpSnw5GPOHcqSzrKl3c=; h=Received:Received:Received:Received:From:To:Subject:Date: Message-ID; b=AnRPpNjMCaaywn98hTBelAav/Gt0H35tWeNCblnViEbhJIBMVf1OpqpyfNxZ7EZru TFP7MVtk6xsZ+ARDhFryF8apqBG3fu2SDnqjli/61fLgWjB0MOBY2/hI5p25x/Kbvs k+SSCMQtEaJQr14Cjg5hxaWoHPuee4qsmX6OUIy5wv3f8o5mLLh9Ndo1UIE3xjGikY ZNNgWR9KuusdxYHIjgePhiZGq6KJWAmFeS23BkBIOqZaxbeOmMwyMdb9M2k6s18K0J 53iYwXO4oxTlyub3oF9FTVTf+biUSySmHst6s2xGNz2MtPUhLgvy5yP7aWN+1rG+1/ cxQ2qUXpOi2jg==
Received: from hobgoblin.ariadne.com ([IPv6:2601:192:4a00:430:222:fbff:fe91:d396]) by resomta-ch2-11v.sys.comcast.net with ESMTPA id R45JjkMHVvcxUR45MjIrCj; Wed, 22 Apr 2020 01:21:57 +0000
X-Xfinity-VMeta: sc=-100.00;st=legit
Received: from hobgoblin.ariadne.com (hobgoblin.ariadne.com [127.0.0.1]) by hobgoblin.ariadne.com (8.14.7/8.14.7) with ESMTP id 03M1Lq0r017103; Tue, 21 Apr 2020 21:21:52 -0400
Received: (from worley@localhost) by hobgoblin.ariadne.com (8.14.7/8.14.7/Submit) id 03M1LpC2017092; Tue, 21 Apr 2020 21:21:51 -0400
X-Authentication-Warning: hobgoblin.ariadne.com: worley set sender to worley@alum.mit.edu using -f
From: worley@ariadne.com (Dale R. Worley)
To: Scott Kitterman <scott@kitterman.com>
Cc: last-call@ietf.org, dmarc@ietf.org, gen-art@ietf.org, draft-ietf-dmarc-psd.all@ietf.org
In-Reply-To: <4666D39F-85F5-4AD2-A754-11FED0A5C169@kitterman.com> (scott@kitterman.com)
Sender: worley@ariadne.com (Dale R. Worley)
Date: Tue, 21 Apr 2020 21:21:50 -0400
Message-ID: <871rogwc0h.fsf@hobgoblin.ariadne.com>
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/UI8DTrYQo7sdOR5ujC38stmP6jg>
Subject: Re: [dmarc-ietf] [Gen-art] [Last-Call] Genart last call review of draft-ietf-dmarc-psd-08
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 22 Apr 2020 01:22:01 -0000

Scott Kitterman <scott@kitterman.com> writes:
> [important discussion clipped for brevity]
> If you want to add it and are confident we aren't diving into a deep,
> deep hole, I don't strongly object.  Just let me know what to add.

Well, my review amounted to about 5 pages of ordinary text, and my
follow-up e-mail about a page and a half.  If I was unclear regarding
what I thought should be done to make the document clearer to the
unsophisticated reader, please get back to me so that I can improve my
review style.

Dale


From nobody Wed Apr 22 13:28:57 2020
Return-Path: <dhc@dcrocker.net>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5BF413A0915 for <dmarc@ietfa.amsl.com>; Wed, 22 Apr 2020 13:28:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.506
X-Spam-Level: 
X-Spam-Status: No, score=-2.506 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, HTML_OBFUSCATE_10_20=0.093, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id w3oZbJVeUwXM for <dmarc@ietfa.amsl.com>; Wed, 22 Apr 2020 13:28:50 -0700 (PDT)
Received: from simon.songbird.com (simon.songbird.com [72.52.113.5]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D1CD13A090E for <dmarc@ietf.org>; Wed, 22 Apr 2020 13:28:50 -0700 (PDT)
Received: from [192.168.1.67] (108-226-162-63.lightspeed.sntcca.sbcglobal.net [108.226.162.63]) (authenticated bits=0) by simon.songbird.com (8.14.4/8.14.4/Debian-4.1ubuntu1.1) with ESMTP id 03MKUcNc022887 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT) for <dmarc@ietf.org>; Wed, 22 Apr 2020 13:30:38 -0700
From: Dave Crocker <dhc@dcrocker.net>
Reply-To: dcrocker@bbiw.net
To: dmarc@ietf.org
References: <2656238.kvSPeydUtl@sk-desktop>
Organization: Brandenburg InternetWorking
Message-ID: <51be5654-94c4-38c6-8f6b-dca403d6680a@dcrocker.net>
Date: Wed, 22 Apr 2020 13:28:44 -0700
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:68.0) Gecko/20100101 Thunderbird/68.7.0
MIME-Version: 1.0
In-Reply-To: <2656238.kvSPeydUtl@sk-desktop>
Content-Type: multipart/alternative; boundary="------------0DF52F749A3E4F34FCD241FF"
Content-Language: en-US
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/c8Xg2k07Bex7-y8lE-TwMdsAaZ0>
Subject: Re: [dmarc-ietf] Composition Kills: A Case Study of Email Sender Authentication
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 22 Apr 2020 20:28:56 -0000

This is a multi-part message in MIME format.
--------------0DF52F749A3E4F34FCD241FF
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit

The paper concerns valid authentication and effective use of 
authenticated information.  That's an excellent goal.  The paper offers 
extensive technical analyses and empirical demonstrations of operational 
failures. Exercises like these are valuable and too infrequent.  Besides 
prompting specific repairs, work like this should motivate careful 
industry review of systems-level issues and standards-based documentation.

The paper does not adequately distinguish between claims of protocol 
design/specification errors, versus implementation errors, yet that 
distinction is essential.

The paper has a simplistic model of email anti-abuse processing and this 
distorts some of its analysis.  At the least, the paper needs to 
distinguish between theory and practice.

The paper has a flawed model of the role of recipient users in 
anti-abuse work and therefore the paper makes a basic error in its 
assessment of the importance of From: field validation.

The paper identifies a number of significant implementation deficiencies 
in various system.


Detailed comments:

> to authenticate the sender’s purported identity, as the basis for 
> displaying in email clients assurances of validity to userswhen they 
> read messages

That's a rather basic misunderstanding of how these mechanisms are 
actually used.


> In practice, attackers usually exploit SMTPby running their own email 
> servers or clients.

This is largely a non-sequitur.  It has built-in assumptions that aren't 
explained and are wrong with respect to any of the domain name-based 
protection mechanisms.  (And it isn't SMTP that is being exploited, per 
se. That's like saying that if I send a postal letter purporting to be 
the president of the United States, I've exploited the postal system. )


> SMTP’s design includes multiple “identities” when handling messages. 
Since this has been documented, they should cite it, for background.


> Both theMAIL FROMandFromheadersidentify the email sender, but they 
> have different meaningsin an SMTP conversation. The first represents 
> the user whotransmittedthe message, and is usually not displayed to 
> therecipient. 
It would be clearer and more helpful to say 'operator' or 'service 
provider' rather than 'user'.  A separate issue is whether their 
characterization of the differences between the two identifiers is valid 
in practice... The paper uses sender in a way that encourages confusion 
in the reader.  Especially since this is a technical paper, it should 
use language that carefully distinguishes roles, especially since 
terminology for making these distinctions is readily available.


> In addition, SMTP introduces multiple other sender identi-ties, such 
> as theHELOcommand,SenderandResent-Fromheaders.

I suspect that the failure to cite DKIM's d= field , until later, is a 
significant oversight.


> http://www.ietf.org/internet-drafts/draft-blank-ietf-bimi-00.txt

heh.  the URL isn't valid.  Should be:

https://www.ietf.org/archive/id/draft-blank-ietf-bimi-00.txt<https://datatracker.ietf.org/doc/draft-blank-ietf-bimi/>


> DKIM.DomainKeys Identified Mail (DKIM) uses cryp-tography to 
> authenticate senders...

I'm being too picky, right?  Formal DKIM semantics don't produce exactly 
that result.


> The general idea behind DKIM is to let senders sign parts ofmessages 
> so that receivers can validate them.
This is poorly written, wrong, or both.  'them' is ambiguous.  And the 
signing is to affix the d= value, not to validate any of the data that 
is part of the signature.


> it only need to have the same registered domain

Will typical readers understand what this means, in the context of this 
paper, since all of the domain name's components are 'registered'? It's 
not obvious what language would make the meaning clearer.


> If the email passes theDMARC verification, it enters the user’s inbox.

This is simply wrong.  It needs to place this phase of processing inside 
a complex filtering engine, which is the primary venue for using any of 
the mechanisms discussed in the paper.

> usually the MUA only displays theFromheader as the message sender.

These days, this isn't true either.  Most users only see the 
un-validated Display-Name.


> Thus, theFromheaderprovides the key identity relevant for gaining the 
> user’s trust

On its face, this seems a reasonable view.  In practice, it isn't.  Mail 
with obviously bogus email addresses in the rfc5322.From field are still 
effective for phishing, because what real users actually pay attention 
to is the body of the message and the identification information in it.  
That's why assertions about the display of validated source/author 
information to the end user are demonstrably wrong.


> Malicious usersof legitimate email providers exploit thefailure of 
> some email providers to perform sufficient valida-tion of emails 
> received from local MUAs. These attackers cansend emails with 
> spoofedFromheaders. The exploited emailproviders may automatically 
> attach DKIM signatures to theiroutgoing emails, enabling the attackers 
> to impersonate otherusers of the email provider

The writing of the paragraph's conclusion seems to be fundamentally 
misleading or wrong.  It seems to be saying that the DKIM signature will 
be for the domain in the From: field, which it won't.


> Security requirement.To achieve this goal,

I'm not sure exactly what goal they are referring to.


> (1) TheFromheader of the email thatSsends matches theauthenticated 
> username (other users ofScannot spoof Alice’saddress);


This requirement applies only in the presence of DMARC.


> (3) SPF/DKIM and DMARCcomponents inRconsistently authenticate the same 
> identifier


Except that SPF and DKIM are permitted to validate other identifiers, 
not just the one in the rfc5322.From field.


> This require-ment, although intuitive, implies a set of semantic 
> bindingrelations that every component in the email processing 
> chainmust respect.


This is imposing a requirement for deep, internal systems knowledge 
about features that are not, in fact, deeply embedded in email history 
or processing.  Arguably, the demand for having every component enforce 
this model is a basic mistake.

Rather the requirement is to prevent assumptions inside the system that 
serve to violate the policies needed at evaluation points.


 > robust principle

robustness

https://en.wikipedia.org/wiki/Robustness_principle


> be permissive in how they process malformed inputs


No, Postel did not direct accepting 'malformed' inputs.

And RFC 1122, Section 1.2.2 elaborated on this issue very helpfully:

> Software should be written to deal with every conceivable
> error, no matter how unlikely;


> 4.1 HELO/MAIL FROM confusion
This seems to imply that tightening is needed in DMARC, so that it uses 
an SPF domain that SPF has actually been validated? I think the issue is 
that SPF validation needs to inform DMARC what domain it has validated, 
rather than have DMARC decide which domain to fetch.


> SPF implementations treat “(any@legitimate.com” as anempty MAIL FROM 
> address, and thus forward the resultsof checking HELO to the DMARC 
> component, because thestring in the parentheses can be parsed as a 
> comment ac-cording to RFC 5322 [10]. Some DMARC 
> implementations,however, may take it as a normal non-empty address,


1. This issues goes away if SPF supplies DMARC the domain name, rather 
than DMARC having to fetch it

2. I doubt this otherwise needs changes to language in the DMARC spec, 
but it's worth making sure.


> 4.3 Authentication results injection


Another focus on what results are communicated and how.

The paper asserts that AR is used as DMARC input.  I suspect that is 
rarely, if ever, true.  Yes? No?


> Generally, we can divideFromheader-relatedprocessing into two phases: 
> 1) parsing a MIME message to extract the Fromheader; 


The rfc5322.From: field is independent of MIME. MIME pertains only to 
the body.


> Microsoft:disregarded our report (which included our pa-per and a 
> video5demoing theA10attack) because the threatsrely on social 
> engineering, which they view as outside thescope of security 
> vulnerabilities.


That's oddly impressive.


> Improving MUA display
...

> We note however that experiences with suchapproaches for promoting 
> HTTPS (via browsers displayingtrusted icons for websites with valid 
> TLS certificates) havedemonstrated the challenges of ensuring that 
> users correctlyinterpret the icons and do not get fooled by imposters


"Challenges" is incorrect.  "Failure to be useful" is more appropriate 
language.















-- 
Dave Crocker
Brandenburg InternetWorking
bbiw.net


--------------0DF52F749A3E4F34FCD241FF
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: 8bit

<html>
  <head>
    <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
  </head>
  <body>
    <div class="moz-cite-prefix">The paper concerns valid authentication
      and effective use of authenticated information.  That's an
      excellent goal.  The paper offers extensive technical analyses and
      empirical demonstrations of operational failures. Exercises like
      these are valuable and too infrequent.  Besides prompting specific
      repairs, work like this should motivate careful industry review of
      systems-level issues and standards-based documentation.<br>
    </div>
    <div class="moz-cite-prefix"><br>
    </div>
    <div class="moz-cite-prefix">The paper does not adequately
      distinguish between claims of protocol design/specification
      errors, versus implementation errors, yet that distinction is
      essential. <br>
    </div>
    <div class="moz-cite-prefix"><br>
    </div>
    <div class="moz-cite-prefix">The paper has a simplistic model of
      email anti-abuse processing and this distorts some of its
      analysis.  At the least, the paper needs to distinguish between
      theory and practice.  <br>
    </div>
    <div class="moz-cite-prefix"><br>
    </div>
    <div class="moz-cite-prefix">The paper has a flawed model of the
      role of recipient users in anti-abuse work and therefore the paper
      makes a basic error in its assessment of the importance of From:
      field validation.<br>
    </div>
    <div class="moz-cite-prefix"><br>
    </div>
    <div class="moz-cite-prefix">The paper identifies a number of
      significant implementation deficiencies in various system.</div>
    <div class="moz-cite-prefix"><br>
    </div>
    <div class="moz-cite-prefix"><br>
    </div>
    <p>Detailed comments:</p>
    <p> </p>
    <blockquote type="cite"><span style="left: 423.84px; top: 334.27px;
        font-size: 13.2835px; font-family: sans-serif; transform:
        scaleX(0.932692);">to authenticate the sender’s purported
        identity, as the basis </span><span style="left: 423.84px; top:
        350.21px; font-size: 13.2835px; font-family: sans-serif;
        transform: scaleX(0.925331);">for displaying in email clients
        assurances of validity to users</span><span style="left:
        423.361px; top: 366.15px; font-size: 13.2835px; font-family:
        sans-serif; transform: scaleX(0.883095);"> when they read
        messages</span></blockquote>
    <br>
    <p>That's a rather basic misunderstanding of how these mechanisms
      are actually used.</p>
    <p><br>
    </p>
    <p> </p>
    <blockquote type="cite"><span style="left: 79.2px; top: 818.148px;
        font-size: 14.6118px; font-family: sans-serif; transform:
        scaleX(0.926773);">In practice, attackers usually exploit SMTP</span><span
        style="left: 79.2px; top: 835.682px; font-size: 14.6118px;
        font-family: sans-serif; transform: scaleX(0.916348);">by
        running their own email servers or clients.</span></blockquote>
    <br>
    This is largely a non-sequitur.  It has built-in assumptions that
    aren't explained and are wrong with respect to any of the domain
    name-based protection mechanisms.  (And it isn't SMTP that is being
    exploited, per se. That's like saying that if I send a postal letter
    purporting to be the president of the United States, I've exploited
    the postal system. ) <br>
    <p><br>
    </p>
    <p> </p>
    <blockquote type="cite"><span style="left: 93.8124px; top:
        853.216px; font-size: 14.6118px; font-family: sans-serif;
        transform: scaleX(0.963148);">SMTP’s design includes multiple
        “identities” when han</span><span style="left: 79.2px; top:
        870.75px; font-size: 14.6118px; font-family: sans-serif;
        transform: scaleX(0.911387);">dling messages. </span></blockquote>
    Since this has been documented, they should cite it, for background.
    <p><br>
    </p>
    <p> </p>
    <blockquote type="cite"><span style="left: 79.2px; top: 870.75px;
        font-size: 14.6118px; font-family: sans-serif; transform:
        scaleX(0.911387);"> Both the</span><span style="left: 242.183px;
        top: 871.294px; font-size: 13.1506px; font-family: sans-serif;
        transform: scaleX(1.05334);">MAIL FROM</span><span style="left:
        323.34px; top: 870.75px; font-size: 14.6118px; font-family:
        sans-serif; transform: scaleX(0.896727);">and</span><span
        style="left: 349.844px; top: 871.294px; font-size: 13.1506px;
        font-family: sans-serif; transform: scaleX(1.02346);">From</span><span
        style="left: 385.859px; top: 870.75px; font-size: 14.6118px;
        font-family: sans-serif; transform: scaleX(0.858811);">headers</span><span
        style="left: 79.2px; top: 888.284px; font-size: 14.6118px;
        font-family: sans-serif; transform: scaleX(0.941665);">identify
        the email sender, but they have different meanings</span><span
        style="left: 79.2px; top: 905.82px; font-size: 14.6118px;
        font-family: sans-serif; transform: scaleX(0.914744);">in an
        SMTP conversation. The first represents the user who</span><span
        style="left: 79.2px; top: 923.485px; font-size: 14.6118px;
        font-family: sans-serif; transform: scaleX(0.922569);">transmitted</span><span
        style="left: 150.583px; top: 923.354px; font-size: 14.6118px;
        font-family: sans-serif; transform: scaleX(0.905791);">the
        message, and is usually not displayed to the</span><span
        style="left: 79.2px; top: 940.888px; font-size: 14.6118px;
        font-family: sans-serif; transform: scaleX(0.88748);">recipient.
      </span></blockquote>
    It would be clearer and more helpful to say 'operator' or 'service
    provider' rather than 'user'.  A separate issue is whether their
    characterization of the differences between the two identifiers is
    valid in practice... The paper uses sender in a way that encourages
    confusion in the reader.  Especially since this is a technical
    paper, it should use language that carefully distinguishes roles,
    especially since terminology for making these distinctions is
    readily available.
    <p><br>
    </p>
    <p> </p>
    <blockquote type="cite"><span style="left: 93.8124px; top:
        975.956px; font-size: 14.6118px; font-family: sans-serif;
        transform: scaleX(0.923888);">In addition, SMTP introduces
        multiple other sender identi-</span><span style="left: 79.2px;
        top: 993.49px; font-size: 14.6118px; font-family: sans-serif;
        transform: scaleX(0.870225);">ties, such as the</span><span
        style="left: 175.979px; top: 994.033px; font-size: 13.1506px;
        font-family: sans-serif; transform: scaleX(1.04051);">HELO</span><span
        style="left: 216.059px; top: 993.49px; font-size: 14.6118px;
        font-family: sans-serif; transform: scaleX(0.890339);">command,</span><span
        style="left: 282.046px; top: 994.033px; font-size: 13.1506px;
        font-family: sans-serif; transform: scaleX(1.05166);">Sender</span><span
        style="left: 328.825px; top: 993.49px; font-size: 14.6118px;
        font-family: sans-serif; transform: scaleX(0.89409);">and</span><span
        style="left: 353.943px; top: 994.033px; font-size: 13.1506px;
        font-family: sans-serif; transform: scaleX(1.03248);">Resent-From</span><span
        style="left: 79.2px; top: 1011.03px; font-size: 14.6118px;
        font-family: sans-serif; transform: scaleX(0.880455);">headers.</span></blockquote>
    <p>I suspect that the failure to cite DKIM's d= field , until later,
      is a significant oversight.</p>
    <p><br>
    </p>
    <p><span style="left: 555.781px; top: 1057.74px; font-size:
        16.3113px; font-family: sans-serif; transform:
        scaleX(0.967657);"> </span></p>
    <blockquote type="cite"><span style="left: 555.781px; top:
        1057.74px; font-size: 16.3113px; font-family: sans-serif;
        transform: scaleX(0.967657);"> <a class="moz-txt-link-freetext"
          href="http://www">http://www</a></span><span style="left:
        801.39px; top: 1057.48px; font-size: 16.3113px; font-family:
        sans-serif;">.</span><span style="left: 805.908px; top:
        1057.74px; font-size: 16.3113px; font-family: sans-serif;
        transform: scaleX(1.0187);">ietf</span><span style="left:
        828.086px; top: 1057.48px; font-size: 16.3113px; font-family:
        sans-serif;">.</span><span style="left: 832.603px; top:
        1057.74px; font-size: 16.3113px; font-family: sans-serif;
        transform: scaleX(0.942392);">org/internet-</span><span
        style="left: 555.781px; top: 1077.31px; font-size: 16.3113px;
        font-family: sans-serif; transform: scaleX(0.967161);">drafts/draft-blank-ietf-bimi-00</span><span
        style="left: 757.451px; top: 1077.05px; font-size: 16.3113px;
        font-family: sans-serif;">.</span><span style="left: 761.97px;
        top: 1077.31px; font-size: 16.3113px; font-family: sans-serif;
        transform: scaleX(0.977556);">txt</span></blockquote>
    <br>
    <p>heh.  the URL isn't valid.  Should be:</p>
    <p>   <a
        href="https://www.ietf.org/archive/id/draft-blank-ietf-bimi-00.txt">https://www.ietf.org/archive/id/draft-blank-ietf-bimi-00.txt</a><a
        href="https://datatracker.ietf.org/doc/draft-blank-ietf-bimi/"
        rel="noopener" class="result__url js-result-extras-url"><span
          class="result__url__full"></span></a></p>
    <div class="result__extras js-result-extras"> </div>
    <p><br>
      <span style="left: 555.781px; top: 1057.74px; font-size:
        16.3113px; font-family: sans-serif; transform:
        scaleX(0.967657);"></span><span style="left: 761.97px; top:
        1077.31px; font-size: 16.3113px; font-family: sans-serif;
        transform: scaleX(0.977556);"></span></p>
    <p> </p>
    <blockquote type="cite"><span style="left: 480.836px; top:
        464.021px; font-size: 14.6118px; font-family: sans-serif;
        transform: scaleX(1.15508);">DKIM.</span><span style="left:
        530.056px; top: 464.196px; font-size: 14.6118px; font-family:
        sans-serif; transform: scaleX(0.982308);">DomainKeys Identified
        Mail (DKIM) uses cryp-</span><span style="left: 466.224px; top:
        481.732px; font-size: 14.6118px; font-family: sans-serif;
        transform: scaleX(0.921372);">tography to authenticate
        senders...</span></blockquote>
    <br>
    I'm being too picky, right?  Formal DKIM semantics don't produce
    exactly that result.
    <p><br>
    </p>
    <p> </p>
    <blockquote type="cite"><span style="left: 465.771px; top:
        499.266px; font-size: 14.6118px; font-family: sans-serif;
        transform: scaleX(0.915929);">The general idea behind DKIM is to
        let senders sign parts of</span><span style="left: 466.224px;
        top: 516.8px; font-size: 14.6118px; font-family: sans-serif;
        transform: scaleX(0.852726);">messages so that receivers can
        validate them.</span></blockquote>
    This is poorly written, wrong, or both.  'them' is ambiguous.  And
    the signing is to affix the d= value, not to validate any of the
    data that is part of the signature.
    <p><br>
    </p>
    <p> </p>
    <blockquote type="cite"><span style="left: 79.2px; top: 509.255px;
        font-size: 14.6118px; font-family: sans-serif; transform:
        scaleX(0.970159);"> it only need to </span><span style="left:
        79.2px; top: 526.789px; font-size: 14.6118px; font-family:
        sans-serif; transform: scaleX(0.92433);">have the same
        registered domain</span></blockquote>
    <br>
    Will typical readers understand what this means, in the context of
    this paper, since all of the domain name's components are
    'registered'? It's not obvious what language would make the meaning
    clearer.
    <p><br>
    </p>
    <p> </p>
    <blockquote type="cite"><span style="left: 79.2px; top: 852.157px;
        font-size: 14.6118px; font-family: sans-serif; transform:
        scaleX(0.934132);">If the email passes the</span><span
        style="left: 79.2px; top: 869.691px; font-size: 14.6118px;
        font-family: sans-serif; transform: scaleX(0.933975);">DMARC
        verification, it enters the user’s inbox.</span></blockquote>
    <br>
    This is simply wrong.  It needs to place this phase of processing
    inside a complex filtering engine, which is the primary venue for
    using any of the mechanisms discussed in the paper.<br>
    <br>
    <p> </p>
    <blockquote type="cite"><span style="left: 176.224px; top: 993.49px;
        font-size: 14.6118px; font-family: sans-serif; transform:
        scaleX(0.927824);"> usually the MUA only displays the</span><span
        style="left: 79.2px; top: 1011.57px; font-size: 13.1506px;
        font-family: sans-serif; transform: scaleX(1.02346);">From</span><span
        style="left: 113.841px; top: 1011.03px; font-size: 14.6118px;
        font-family: sans-serif; transform: scaleX(0.883684);">header as
        the message sender.</span></blockquote>
    <br>
    These days, this isn't true either.  Most users only see the
    un-validated Display-Name.
    <p><br>
    </p>
    <blockquote type="cite"><span style="left: 113.841px; top:
        1011.03px; font-size: 14.6118px; font-family: sans-serif;
        transform: scaleX(0.883684);">Thus, the</span><span style="left:
        357.264px; top: 1011.57px; font-size: 13.1506px; font-family:
        sans-serif; transform: scaleX(1.02346);"> From</span><span
        style="left: 391.905px; top: 1011.03px; font-size: 14.6118px;
        font-family: sans-serif; transform: scaleX(0.882651);"> header</span><span
        style="left: 79.2px; top: 1028.56px; font-size: 14.6118px;
        font-family: sans-serif; transform: scaleX(0.917103);"> provides
        the key identity relevant for gaining the user’s trust</span></blockquote>
    <br>
    <p>On its face, this seems a reasonable view.  In practice, it
      isn't.  Mail with obviously bogus email addresses in the
      rfc5322.From field are still effective for phishing, because what
      real users actually pay attention to is the body of the message
      and the identification information in it.  That's why assertions
      about the display of validated source/author information to the
      end user are demonstrably wrong.</p>
    <p><br>
    </p>
    <p> </p>
    <blockquote type="cite"><span style="left: 480.836px; top:
        745.089px; font-size: 14.6118px; font-family: sans-serif;
        transform: scaleX(0.93748);">Malicious users</span><span
        style="left: 579.281px; top: 744.957px; font-size: 14.6118px;
        font-family: sans-serif; transform: scaleX(0.956482);">of
        legitimate email providers exploit the</span><span style="left:
        466.224px; top: 762.491px; font-size: 14.6118px; font-family:
        sans-serif; transform: scaleX(0.938111);">failure of some email
        providers to perform sufficient valida-</span><span style="left:
        466.224px; top: 780.027px; font-size: 14.6118px; font-family:
        sans-serif; transform: scaleX(0.889333);">tion of emails
        received from local MUAs. These attackers can</span><span
        style="left: 466.224px; top: 797.561px; font-size: 14.6118px;
        font-family: sans-serif; transform: scaleX(0.890495);">send
        emails with spoofed</span><span style="left: 616.817px; top:
        798.104px; font-size: 13.1506px; font-family: sans-serif;
        transform: scaleX(0.993924);">From</span><span style="left:
        650.295px; top: 797.561px; font-size: 14.6118px; font-family:
        sans-serif; transform: scaleX(0.903774);">headers. The exploited
        email</span><span style="left: 466.224px; top: 815.095px;
        font-size: 14.6118px; font-family: sans-serif; transform:
        scaleX(0.917769);">providers may automatically attach DKIM
        signatures to their</span><span style="left: 466.224px; top:
        832.629px; font-size: 14.6118px; font-family: sans-serif;
        transform: scaleX(0.903651);">outgoing emails, enabling the
        attackers to impersonate other</span><span style="left:
        466.224px; top: 850.163px; font-size: 14.6118px; font-family:
        sans-serif; transform: scaleX(0.910107);">users of the email
        provider</span></blockquote>
    <br>
    The writing of the paragraph's conclusion seems to be fundamentally
    misleading or wrong.  It seems to be saying that the DKIM signature
    will be for the domain in the From: field, which it won't.
    <p><br>
    </p>
    <p> </p>
    <blockquote type="cite"><span style="left: 480.836px; top:
        993.314px; font-size: 14.6118px; font-family: sans-serif;
        transform: scaleX(0.982986);">Security requirement.</span><span
        style="left: 621.132px; top: 993.49px; font-size: 14.6118px;
        font-family: sans-serif; transform: scaleX(0.899515);">To
        achieve this goal,</span></blockquote>
    <br>
    I'm not sure exactly what goal they are referring to.
    <p><br>
    </p>
    <p> </p>
    <blockquote type="cite"><span style="left: 78.7175px; top: 127.84px;
        font-size: 14.6118px; font-family: sans-serif; transform:
        scaleX(0.956713);">(1) The</span><span style="left: 128.094px;
        top: 128.383px; font-size: 13.1506px; font-family: sans-serif;
        transform: scaleX(1.02346);">From</span><span style="left:
        163.209px; top: 127.84px; font-size: 14.6118px; font-family:
        sans-serif; transform: scaleX(0.940328);">header of the email
        that</span><span style="left: 310.402px; top: 127.971px;
        font-size: 14.6118px; font-family: sans-serif;">S</span><span
        style="left: 322.384px; top: 127.84px; font-size: 14.6118px;
        font-family: sans-serif; transform: scaleX(0.871947);">sends
        matches the</span><span style="left: 79.2px; top: 145.374px;
        font-size: 14.6118px; font-family: sans-serif; transform:
        scaleX(0.861636);">authenticated username (other users of</span><span
        style="left: 303.21px; top: 145.505px; font-size: 14.6118px;
        font-family: sans-serif;">S</span><span style="left: 313.959px;
        top: 145.374px; font-size: 14.6118px; font-family: sans-serif;
        transform: scaleX(0.903235);">cannot spoof Alice’s</span><span
        style="left: 79.2px; top: 162.908px; font-size: 14.6118px;
        font-family: sans-serif; transform: scaleX(0.940676);">address);</span></blockquote>
    <p><br>
    </p>
    <p>This requirement applies only in the presence of DMARC.</p>
    <p><br>
    </p>
    <p> </p>
    <blockquote type="cite"><span style="left: 113.859px; top:
        180.442px; font-size: 14.6118px; font-family: sans-serif;
        transform: scaleX(0.992237);">(3) SPF/DKIM and DMARC</span><span
        style="left: 79.2px; top: 197.976px; font-size: 14.6118px;
        font-family: sans-serif; transform: scaleX(0.872748);">components
        in</span><span style="left: 166.437px; top: 198.107px;
        font-size: 14.6118px; font-family: sans-serif;">R</span><span
        style="left: 178.627px; top: 197.976px; font-size: 14.6118px;
        font-family: sans-serif; transform: scaleX(0.88487);">consistently
        authenticate the same identifier</span></blockquote>
    <p><br>
    </p>
    <p>Except that SPF and DKIM are permitted to validate other
      identifiers, not just the one in the rfc5322.From field.</p>
    <p><br>
    </p>
    <p> </p>
    <blockquote type="cite"><span style="left: 359.146px; top:
        253.069px; font-size: 14.6118px; font-family: sans-serif;
        transform: scaleX(0.9105);">This require-</span><span
        style="left: 79.2px; top: 270.603px; font-size: 14.6118px;
        font-family: sans-serif; transform: scaleX(0.956978);">ment,
        although intuitive, implies a set of semantic binding</span><span
        style="left: 79.2px; top: 288.137px; font-size: 14.6118px;
        font-family: sans-serif; transform: scaleX(0.898422);">relations
        that every component in the email processing chain</span><span
        style="left: 79.2px; top: 305.671px; font-size: 14.6118px;
        font-family: sans-serif; transform: scaleX(0.91391);">must
        respect.</span></blockquote>
    <p><br>
    </p>
    <p>This is imposing a requirement for deep, internal systems
      knowledge about features that are not, in fact, deeply embedded in
      email history or processing.  Arguably, the demand for having
      every component enforce this model is a basic mistake.</p>
    <p>Rather the requirement is to prevent assumptions inside the
      system that serve to violate the policies needed at evaluation
      points.</p>
    <p><br>
    </p>
    <p>&gt; robust principle</p>
    <p>robustness</p>
    <p><a class="moz-txt-link-freetext"
        href="https://en.wikipedia.org/wiki/Robustness_principle">https://en.wikipedia.org/wiki/Robustness_principle</a></p>
    <p><br>
    </p>
    <p> </p>
    <blockquote type="cite"><span style="left: 79.2px; top: 608.735px;
        font-size: 14.6118px; font-family: sans-serif; transform:
        scaleX(0.907687);">be permissive in how they process </span><span
        style="left: 79.2px; top: 626.269px; font-size: 14.6118px;
        font-family: sans-serif; transform: scaleX(0.971499);">malformed
        inputs</span></blockquote>
    <p><br>
    </p>
    <p>No, Postel did not direct accepting 'malformed' inputs.</p>
    <p>And RFC 1122, Section 1.2.2 elaborated on this issue very
      helpfully:</p>
    <p> </p>
    <blockquote type="cite">
      <pre class="newpage">Software should be written to deal with every conceivable
error, no matter how unlikely;</pre>
    </blockquote>
    <br>
    <p><br>
    </p>
    <p> </p>
    <blockquote type="cite"><span style="left: 79.2px; top: 464.657px;
        font-size: 14.6118px; font-family: sans-serif; transform:
        scaleX(1.02458);">4.1 HELO/MAIL FROM confusion</span></blockquote>
    This seems to imply that tightening is needed in DMARC, so that it
    uses an SPF domain that SPF has actually been validated? I think the
    issue is that SPF validation needs to inform DMARC what domain it
    has validated, rather than have DMARC decide which domain to fetch.
    <p><br>
    </p>
    <p> </p>
    <blockquote type="cite"><span style="left: 466.224px; top:
        110.306px; font-size: 14.6118px; font-family: sans-serif;
        transform: scaleX(0.930684);">SPF implementations treat “</span><span
        style="left: 635.614px; top: 111.08px; font-size: 14.6118px;
        font-family: monospace; transform: scaleX(0.828003);">(<a
          class="moz-txt-link-abbreviated"
          href="mailto:any@legitimate.com">any@legitimate.com</a></span><span
        style="left: 777.203px; top: 110.306px; font-size: 14.6118px;
        font-family: sans-serif; transform: scaleX(0.91544);">” as an</span><span
        style="left: 466.224px; top: 127.84px; font-size: 14.6118px;
        font-family: sans-serif; transform: scaleX(0.957018);">empty
        MAIL FROM address, and thus forward the results</span><span
        style="left: 466.224px; top: 145.374px; font-size: 14.6118px;
        font-family: sans-serif; transform: scaleX(0.926783);">of
        checking HELO to the DMARC component, because the</span><span
        style="left: 466.224px; top: 162.908px; font-size: 14.6118px;
        font-family: sans-serif; transform: scaleX(0.91391);">string in
        the parentheses can be parsed as a comment ac-</span><span
        style="left: 466.224px; top: 180.442px; font-size: 14.6118px;
        font-family: sans-serif; transform: scaleX(0.926691);">cording
        to RFC 5322 [10]. Some DMARC implementations,</span><span
        style="left: 466.224px; top: 197.976px; font-size: 14.6118px;
        font-family: sans-serif; transform: scaleX(0.873888);">however,
        may take it as a normal non-empty address,</span></blockquote>
    <p><br>
    </p>
    <p>1. This issues goes away if SPF supplies DMARC the domain name,
      rather than DMARC having to fetch it</p>
    <p>2. I doubt this otherwise needs changes to language in the DMARC
      spec, but it's worth making sure.</p>
    <p><br>
    </p>
    <p> </p>
    <blockquote type="cite"><span style="left: 466.224px; top:
        847.696px; font-size: 14.6118px; font-family: sans-serif;
        transform: scaleX(0.984156);">4.3 Authentication results
        injection</span></blockquote>
    <p><br>
    </p>
    <p>Another focus on what results are communicated and how.</p>
    <p>The paper asserts that AR is used as DMARC input.  I suspect that
      is rarely, if ever, true.  Yes? No?</p>
    <p><br>
    </p>
    <p> </p>
    <blockquote type="cite"><span style="left: 79.2px; top: 301.779px;
        font-size: 14.6118px; font-family: sans-serif; transform:
        scaleX(0.990111);">Generally, we can divide</span><span
        style="left: 310.835px; top: 302.323px; font-size: 13.1506px;
        font-family: sans-serif; transform: scaleX(1.02346);">From</span><span
        style="left: 346.433px; top: 301.779px; font-size: 14.6118px;
        font-family: sans-serif; transform: scaleX(0.903598);">header-related</span><span
        style="left: 79.2px; top: 319.314px; font-size: 14.6118px;
        font-family: sans-serif; transform: scaleX(0.91953);">processing
        into two phases: 1) parsing a MIME message to </span><span
        style="left: 79.2px; top: 336.848px; font-size: 14.6118px;
        font-family: sans-serif; transform: scaleX(0.878548);">extract
        the </span><span style="left: 142.463px; top: 337.392px;
        font-size: 13.1506px; font-family: sans-serif; transform:
        scaleX(0.982462);">From</span><span style="left: 175.462px; top:
        336.848px; font-size: 14.6118px; font-family: sans-serif;
        transform: scaleX(0.875612);"> header; </span></blockquote>
    <p><br>
    </p>
    <p>The rfc5322.From: field is independent of MIME. MIME pertains
      only to the body.</p>
    <p><br>
    </p>
    <p> </p>
    <blockquote type="cite"><span style="left: 480.836px; top:
        377.473px; font-size: 14.6118px; font-family: sans-serif;
        transform: scaleX(1.03906);">Microsoft:</span><span style="left:
        549.943px; top: 377.648px; font-size: 14.6118px; font-family:
        sans-serif; transform: scaleX(0.905964);">disregarded our report
        (which included our pa-</span><span style="left: 466.224px; top:
        395.182px; font-size: 14.6118px; font-family: sans-serif;
        transform: scaleX(0.891655);">per and a video</span><span
        style="left: 558.162px; top: 392.454px; font-size: 10.8127px;
        font-family: sans-serif;">5</span><span style="left: 567.961px;
        top: 395.182px; font-size: 14.6118px; font-family: sans-serif;
        transform: scaleX(0.892675);">demoing the</span><span
        style="left: 643.04px; top: 395.314px; font-size: 14.6118px;
        font-family: sans-serif;">A</span><span style="left: 651.967px;
        top: 399.951px; font-size: 10.8127px; font-family: sans-serif;
        transform: scaleX(0.901059);">10</span><span style="left:
        667.172px; top: 395.182px; font-size: 14.6118px; font-family:
        sans-serif; transform: scaleX(0.854362);">attack) because the
        threats</span><span style="left: 466.224px; top: 412.718px;
        font-size: 14.6118px; font-family: sans-serif; transform:
        scaleX(0.954425);">rely on social engineering, which they view
        as outside the</span><span style="left: 466.224px; top:
        430.252px; font-size: 14.6118px; font-family: sans-serif;
        transform: scaleX(0.921963);">scope of security vulnerabilities.</span></blockquote>
    <p><br>
    </p>
    <p>That's oddly impressive.</p>
    <p><br>
    </p>
    <p> </p>
    <blockquote type="cite"><span style="left: 93.8124px; top: 783.21px;
        font-size: 14.6118px; font-family: sans-serif; transform:
        scaleX(0.962909);">Improving MUA display</span></blockquote>
    ...
    <p> </p>
    <blockquote type="cite"><span style="left: 79.2px; top: 975.956px;
        font-size: 14.6118px; font-family: sans-serif; transform:
        scaleX(0.871725);">We note however that experiences with such</span><span
        style="left: 79.2px; top: 993.49px; font-size: 14.6118px;
        font-family: sans-serif; transform: scaleX(0.929225);">approaches
        for promoting HTTPS (via browsers displaying</span><span
        style="left: 79.2px; top: 1011.03px; font-size: 14.6118px;
        font-family: sans-serif; transform: scaleX(0.936617);">trusted
        icons for websites with valid TLS certificates) have</span><span
        style="left: 79.2px; top: 1028.56px; font-size: 14.6118px;
        font-family: sans-serif; transform: scaleX(0.897439);">demonstrated
        the challenges of ensuring that users correctly</span><span
        style="left: 79.2px; top: 1046.09px; font-size: 14.6118px;
        font-family: sans-serif; transform: scaleX(0.887305);">interpret
        the icons and do not get fooled by imposters</span></blockquote>
    <p><br>
    </p>
    <p>"Challenges" is incorrect.  "Failure to be useful" is more
      appropriate language.</p>
    <p><br>
    </p>
    <p><br>
    </p>
    <p><br>
    </p>
    <p><br>
    </p>
    <p><br>
    </p>
    <p><br>
    </p>
    <p><br>
    </p>
    <p><br>
    </p>
    <p><br>
    </p>
    <p><br>
    </p>
    <p><br>
    </p>
    <p><br>
    </p>
    <p><br>
    </p>
    <p><br>
    </p>
    <pre class="moz-signature" cols="72">-- 
Dave Crocker
Brandenburg InternetWorking
bbiw.net</pre>
  </body>
</html>

--------------0DF52F749A3E4F34FCD241FF--


From nobody Wed Apr 22 15:08:55 2020
Return-Path: <sklist@kitterman.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C26663A0C06 for <dmarc@ietfa.amsl.com>; Wed, 22 Apr 2020 15:08:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level: 
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=neutral reason="invalid (unsupported algorithm ed25519-sha256)" header.d=kitterman.com header.b=p0pJjaeJ; dkim=pass (2048-bit key) header.d=kitterman.com header.b=buX/k+by
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KnE4Xyned8di for <dmarc@ietfa.amsl.com>; Wed, 22 Apr 2020 15:08:40 -0700 (PDT)
Received: from interserver.kitterman.com (interserver.kitterman.com [64.20.48.66]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D4E753A0BFA for <dmarc@ietf.org>; Wed, 22 Apr 2020 15:08:40 -0700 (PDT)
Received: from interserver.kitterman.com (interserver.kitterman.com [64.20.48.66]) by interserver.kitterman.com (Postfix) with ESMTPS id 2660EF802BF for <dmarc@ietf.org>; Wed, 22 Apr 2020 18:08:38 -0400 (EDT)
DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/simple; d=kitterman.com; i=@kitterman.com; q=dns/txt; s=201903e; t=1587593318; h=from : to : subject : date : message-id : in-reply-to : references : mime-version : content-transfer-encoding : content-type : from; bh=WiiJEeK5WQ341n9KOmM6B5zvPLovpymC7EOdK4skl7M=; b=p0pJjaeJB5tlFWlTb2r2D9Za9LCb6Mk1qKcl8FnfPpTt+uIbDq3ffa/kUO+Pz57lZrIho 3PeJFIcuPbsXwGwDQ==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kitterman.com; i=@kitterman.com; q=dns/txt; s=201903r; t=1587593318; h=from : to : subject : date : message-id : in-reply-to : references : mime-version : content-transfer-encoding : content-type : from; bh=WiiJEeK5WQ341n9KOmM6B5zvPLovpymC7EOdK4skl7M=; b=buX/k+by/x32umpWUPNeZbE3PHq2HV3JVkKP7WtAOOxI1kHCQZdsJNGoTq7R7wc1uzXDo 8lgqo0j2nAa5tbOdH9j4ys4TJC/F6dMWx102c0eCp2WpxjQKPrbB0wLWBhO216d9V4x164m mQfe04NX2/2XQEKWBLOvExgKR11X0nzEQAqbB7F5+GAc29Ok0GpmeWcMzw3lt+JJf35zx8F xZnnyzG59imZL87V2TifB3XnASy0hH79v5WWhNhga4lAdmkNBfaYDpHll621uIawKhlHax/ esuEGlUSipjuFC3CvDH76vR+kiW8AZIGuHeTPN4gbwxxGKj0ryF281+/0jog==
Received: from sk-desktop.localnet (static-72-81-252-22.bltmmd.fios.verizon.net [72.81.252.22]) by interserver.kitterman.com (Postfix) with ESMTP id E80C5F800E7 for <dmarc@ietf.org>; Wed, 22 Apr 2020 18:08:37 -0400 (EDT)
From: Scott Kitterman <sklist@kitterman.com>
To: dmarc@ietf.org
Date: Wed, 22 Apr 2020 18:08:37 -0400
Message-ID: <5816941.mf8d9O40cs@sk-desktop>
In-Reply-To: <51be5654-94c4-38c6-8f6b-dca403d6680a@dcrocker.net>
References: <2656238.kvSPeydUtl@sk-desktop> <51be5654-94c4-38c6-8f6b-dca403d6680a@dcrocker.net>
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain; charset="UTF-8"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/RNznOb4iO3-qAFfoU68d2Evnxts>
Subject: Re: [dmarc-ietf] Composition Kills: A Case Study of Email Sender Authentication
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 22 Apr 2020 22:08:48 -0000

On Wednesday, April 22, 2020 4:28:44 PM EDT Dave Crocker wrote:
> > 4.1 HELO/MAIL FROM confusion
>=20
> This seems to imply that tightening is needed in DMARC, so that it uses
> an SPF domain that SPF has actually been validated? I think the issue is
> that SPF validation needs to inform DMARC what domain it has validated,
> rather than have DMARC decide which domain to fetch.

The standard authentication results header field will do this in the form o=
f:

Authentication-Results: mx.example.org; spf=3Dpass smtp.mailfrom=3Dexample.=
com

> > SPF implementations treat =E2=80=9C(any@legitimate.com=E2=80=9D as anem=
pty MAIL FROM
> > address, and thus forward the resultsof checking HELO to the DMARC
> > component, because thestring in the parentheses can be parsed as a
> > comment ac-cording to RFC 5322 [10]. Some DMARC
> > implementations,however, may take it as a normal non-empty address,
>=20
> 1. This issues goes away if SPF supplies DMARC the domain name, rather
> than DMARC having to fetch it
>=20
> 2. I doubt this otherwise needs changes to language in the DMARC spec,
> but it's worth making sure.

I agree it's worth making sure.  The input for DMARC from SPF/DKIM should a=
=20
both a result and a domain.

There is some inconsistency in how SPF verifiers report SPF results when us=
ing=20
HELO as a fallback for an null Mail From.  RFC 7208 section 2.4 is, IMO,=20
reasonably clear that for a null Mail From, the SPF 'Mail From' identity is=
=20
postmaster@[HELO], so it should be reported as an smtp.mailfrom=3D result, =
which=20
the paper claims is the threat vector.  I think they are wrong.  As long as=
=20
the input domain is checked and is in alignment for DMARC, there's no issue=
=20
there.

I tried their exact scenario with two of my domains and here's what the SPF=
=20
verifier reported:

Authentication-Results: mx.example.org; spf=3Dpass (sender SPF authorized)=
=20
smtp.mailfrom=3Dkitterman.com (client-ip=3D72.81.252.18; helo=3Dkitterman.o=
rg;=20
envelope-from=3D(scott@kitterman.com; receiver=3Dbogus1@kitterman.org)

While this is not ideal (for envelope-from=3D(scott@kitterman.com.  The str=
ing=20
should be quoted [per the 5322 CFWS definition], it shouldn't lead to any=20
confusion about the identity.

I figured out this is wrong and the example below is right per various RFCs=
,=20
but it took some investigation to dig it all back up.  A more thorough revi=
ew=20
by someone that knows more than me would surely be a good idea.

> > 4.3 Authentication results injection
>=20
> Another focus on what results are communicated and how.
>=20
> The paper asserts that AR is used as DMARC input.  I suspect that is
> rarely, if ever, true.  Yes? No?

=46or integration of open source components such as opendkim and opendmarc,=
 this=20
is the standard method of communicating results data between components (al=
so=20
true for communicating SPF results to opendmarc is you don't use its intern=
al=20
SPF implementation).

=46or what it's worth, I invested some time yesterday and today testing the=
=20
various open source components I maintain (pyspf, pyspf-milter, policyd-spf-
python, dkimpy, dkimpy-milter, and authres) and found some behaviors in the=
=20
cases they describe that is sub-optimal, I could not replicate any of the=20
security relevant issues they describe.  I did get some new test cases. ...

As an example, if the example they used is presented to the authres module =
as=20
the d=3D domain in for a DKIM verification, d=3Dlegitimate.com(.attacker.co=
m, it=20
returns d=3D"legitimate.com(.attacker.com" [note the quoting, which is corr=
ect=20
per the 5322 CFWS definition].  If it's parsing that, it fails to return a=
=20
domain at all, which is a bug, but doesn't cause the reported problem.

Scott K




From nobody Wed Apr 22 17:20:28 2020
Return-Path: <johnl@iecc.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6E2E93A0EB7 for <dmarc@ietfa.amsl.com>; Wed, 22 Apr 2020 17:20:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.85
X-Spam-Level: 
X-Spam-Status: No, score=-1.85 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.25, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1536-bit key) header.d=iecc.com header.b=bqijfj9P; dkim=pass (1536-bit key) header.d=taugh.com header.b=dj21EiDU
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id u3VIvrFcZpAM for <dmarc@ietfa.amsl.com>; Wed, 22 Apr 2020 17:20:23 -0700 (PDT)
Received: from gal.iecc.com (gal.iecc.com [IPv6:2001:470:1f07:1126:0:43:6f73:7461]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4F10D3A0EB5 for <dmarc@ietf.org>; Wed, 22 Apr 2020 17:20:23 -0700 (PDT)
Received: (qmail 13196 invoked from network); 23 Apr 2020 00:20:21 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=iecc.com; h=date:message-id:from:to:cc:subject:in-reply-to:mime-version:content-type:content-transfer-encoding; s=3389.5ea0df45.k2004; bh=Rb0Vho0eeN8qUfL3iMhTsf+A6uCsjoUROu2lwJDcr2k=; b=bqijfj9PmsjQHUTjP5aEUk3ozIBgMkbFuCo6vPcZrTNdh6B7QAjQixWm+hX1ILOXrzM3gj2Jjysq0hWHhHTwmIdERbHOEhD88hsBkHoirKTpZThiH1A6M0bABKJJmF0Y3xys+bOHLFGvqP0DlCHzI45L4jthYFtQmhJRkmL3Aqt8dpJ4LmpPdT6W2eCrXyPL4Cci0kgAq/+KjqDrSfG7EjFoQbJ4JkoWAAIUXW8VNY3htEqBbrOIt0fvhtsispu/
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=taugh.com; h=date:message-id:from:to:cc:subject:in-reply-to:mime-version:content-type:content-transfer-encoding; s=3389.5ea0df45.k2004; bh=Rb0Vho0eeN8qUfL3iMhTsf+A6uCsjoUROu2lwJDcr2k=; b=dj21EiDUU/GG4s11VcYiDeoSRZnWyFnZsyirjvrnynDkFSOnhzi39SLiVch5VozWo7mF3Q93JUXoZxhS2FoCOQ3J7OgjvfF/8U7SxXwZpSbfQWfZy/tkcTnCvg8jJ1QrVYIJ0uT+FkqnLY3XRH3ETHQi7hFB3wWXLcVrKsqioCHXRcc2RvhTTwM1HY/22ukB8raF3Ro2gj2EkFwQADCCuUs4xNuZte+gc6angItCfjo37lu2hankP6t08QL+VVI5
Received: from ary.qy ([IPv6:2001:470:1f07:1126::78:696d:6170]) by imap.iecc.com ([IPv6:2001:470:1f07:1126::78:696d:6170]) with ESMTP via TCP6; 23 Apr 2020 00:20:20 -0000
Received: by ary.qy (Postfix, from userid 501) id BAB07181BB09; Wed, 22 Apr 2020 20:20:20 -0400 (EDT)
Date: 22 Apr 2020 20:20:20 -0400
Message-Id: <20200423002020.BAB07181BB09@ary.qy>
From: "John Levine" <johnl@taugh.com>
To: dmarc@ietf.org
Cc: dcrocker@bbiw.net
In-Reply-To: <51be5654-94c4-38c6-8f6b-dca403d6680a@dcrocker.net>
Organization: Taughannock Networks
X-Headerized: yes
Mime-Version: 1.0
Content-type: text/plain; charset=utf-8
Content-transfer-encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/Ssutuh_ODZztyP3Jm2iRbGiTL8k>
Subject: Re: [dmarc-ietf] Composition Kills: A Case Study of Email Sender Authentication
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 23 Apr 2020 00:20:26 -0000

In article <51be5654-94c4-38c6-8f6b-dca403d6680a@dcrocker.net> you write:
>The paper has a simplistic model of email anti-abuse processing and this 
>distorts some of its analysis.  At the least, the paper needs to 
>distinguish between theory and practice.

Yup.

>> SPF implementations treat “(any@legitimate.com” as anempty MAIL FROM 
>> address, and thus forward the resultsof checking HELO to the DMARC 
>> component, because thestring in the parentheses can be parsed as a 
>> comment ac-cording to RFC 5322 [10]. Some DMARC 
>> implementations,however, may take it as a normal non-empty address,
>
>1. This issues goes away if SPF supplies DMARC the domain name, rather 
>than DMARC having to fetch it

Their assumptions about DMARC validators may be true in some cases but
not in general.  In OpenDMARC which is pretty widely used, the caller
tells the DMARC library what domain SPF checked, whether it was the
mail_from or helo, and what the result was.

>The paper asserts that AR is used as DMARC input.  I suspect that is 
>rarely, if ever, true.  Yes? No?

I'd say never.  To do DMARC rejects you have to do all of the
validation in the SMTP daemon, which is before anything has a chance
to create an A-R header.

>The rfc5322.From: field is independent of MIME. MIME pertains only to 
>the body.

The display name can be a MIME encoded word, but that has nothing to do with
parsing the MIME parts in the body of the message.

I'm still impressed at some of the really simple bugs they exploited,
like NUL characters in header fields.

R's,
John


From nobody Thu Apr 23 00:38:25 2020
Return-Path: <juri@sapienti-sat.org>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EC1EB3A164A for <dmarc@ietfa.amsl.com>; Thu, 23 Apr 2020 00:38:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level: 
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=sapienti-sat.org
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qFWNA6fzG6k7 for <dmarc@ietfa.amsl.com>; Thu, 23 Apr 2020 00:38:22 -0700 (PDT)
Received: from batleth.sapienti-sat.org (batleth.sapienti-sat.org [88.198.49.74]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1A5293A1648 for <dmarc@ietf.org>; Thu, 23 Apr 2020 00:38:21 -0700 (PDT)
Authentication-Results: batleth.sapienti-sat.org; arc=none; dkim=pass (2048-bit key; unprotected) header.d=sapienti-sat.org header.i=@sapienti-sat.org header.b=kGjTxwnz; dkim-atps=neutral
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=sapienti-sat.org; h=user-agent:message-id:references:in-reply-to:subject:subject :to:from:from:date:date:content-transfer-encoding:content-type :content-type:mime-version; s=dkim20170413; t=1587627499; bh=91Q JCjZfDPrxQbeLbLrXOc8VhwjNcpMz61PgqsqVxF4=; b=kGjTxwnzzekzwRVbk8q b046juDe9jVvZvmc9Jnp5PKa1iv2BaNTBG/JKcwsaoE89GTorJnZcx+EjAkcjrVw 5FYKLbvhpzvj51E8uEzUh3zWWwVAVf9NkQvmgZh/nWG06I/B8forXQAd/MjFyguQ ogWso0PFt+6GAnnKFJmBrDORIue3bDsFlHEBNy8w8UonqiCVVWwOwb3tD/e2sXO9 6Ei5p+S41JKH45zBBrQfJCXFmJLFpAkANuu2SfndtCpPAiBeHj27Gc+Ka+bifvMj aXbH9yJPEMZ1EzCWExoRU8rx/3Gkw7fBeU3KwWLKQol6P1YKKL8eJVHpFPZkRuqV qaw==
X-Virus-Scanned: Debian amavisd-new at sapienti-sat.org
Received: from www.sapienti-sat.org (localhost.localdomain [127.0.0.1]) by batleth.sapienti-sat.org (Postfix) with ESMTP id F015133E011B for <dmarc@ietf.org>; Thu, 23 Apr 2020 09:38:18 +0200 (CEST)
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Date: Thu, 23 Apr 2020 09:38:18 +0200
From: Juri Haberland <juri@sapienti-sat.org>
To: dmarc@ietf.org
In-Reply-To: <20200423002020.BAB07181BB09@ary.qy>
References: <20200423002020.BAB07181BB09@ary.qy>
Message-ID: <74a807f52a59fa87053fcc76aaa28a73@sapienti-sat.org>
X-Sender: juri@sapienti-sat.org
User-Agent: Roundcube Webmail/1.3.6
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/B_IZIrD_3GVkcz_W1iFogtvmO_o>
Subject: Re: [dmarc-ietf] Composition Kills: A Case Study of Email Sender Authentication
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 23 Apr 2020 07:38:24 -0000

On 2020-04-23 02:20, John Levine wrote:
> In article <51be5654-94c4-38c6-8f6b-dca403d6680a@dcrocker.net> you 
> write:

>> The paper asserts that AR is used as DMARC input.  I suspect that is
>> rarely, if ever, true.  Yes? No?
> 
> I'd say never.  To do DMARC rejects you have to do all of the
> validation in the SMTP daemon, which is before anything has a chance
> to create an A-R header.

Of course this is possible with the Milter protocol introduced by 
Sendmail and used also by Postfix. The mail traverses during the SMTP 
phase through different milters, e.g. a SPF milter, followed by a DKIM 
milter, and every milter injects an AR header with its results. The last 
milter is a DMARC milter that processes the AR headers and signals the 
SMTP daemon do either accept or reject the message. This is how OpenDKIM 
& OpenDMARC work together.

Other projects do it all in one milter (rspamd?)...


   Juri


From nobody Thu Apr 23 07:40:34 2020
Return-Path: <ned+dmarc@mrochek.com>
X-Original-To: dmarc@ietfa.amsl.com
Delivered-To: dmarc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1B5E73A092F for <dmarc@ietfa.amsl.com>; Thu, 23 Apr 2020 07:40:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level: 
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=mrochek.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wXTjFgfmIeyG for <dmarc@ietfa.amsl.com>; Thu, 23 Apr 2020 07:40:31 -0700 (PDT)
Received: from plum.mrochek.com (plum.mrochek.com [172.95.64.195]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0F3463A0934 for <dmarc@ietf.org>; Thu, 23 Apr 2020 07:40:30 -0700 (PDT)
Received: from dkim-sign.mauve.mrochek.com by mauve.mrochek.com (PMDF V6.1-1 #35243) id <01RK1EJPMIGW00452K@mauve.mrochek.com> for dmarc@ietf.org; Thu, 23 Apr 2020 07:35:27 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=mrochek.com; s=201712;  t=1587652527; bh=44AK+E4lMbuecGwcT7c7s9v7zj5H2bkGbxf3FA1P9pc=;  h=From:Cc:Date:Subject:In-reply-to:References:To:From; b=pAOPRB18uMEyZAAtincot8Zim6luw1FRC6lcx0EzSP+me65qx7V/MxToFsSyEjw+F 3xni6bZelaQJp0Yu05KjyhYVs1K+KVt3HZQX7mZA0WMBNPhbSwF9mIpahxjRJUHUy8 P1Sw+i4w0zpjQFLMBB0m0Q+5gAcL2xxAdNkPg/1Y=
MIME-version: 1.0
Content-transfer-encoding: 8BIT
Content-type: TEXT/PLAIN; charset=utf-8; Format=flowed
Received: from mauve.mrochek.com by mauve.mrochek.com (PMDF V6.1-1 #35243) id <01RK1DNIKXK0000059@mauve.mrochek.com> (original mail from NED@mauve.mrochek.com) for dmarc@ietf.org; Thu, 23 Apr 2020 07:35:25 -0700 (PDT)
From: ned+dmarc@mrochek.com
Cc: dmarc@ietf.org
Message-id: <01RK1EJO2TAW000059@mauve.mrochek.com>
Date: Thu, 23 Apr 2020 07:34:06 -0700 (PDT)
In-reply-to: "Your message dated Thu, 23 Apr 2020 09:38:18 +0200" <74a807f52a59fa87053fcc76aaa28a73@sapienti-sat.org>
References: <20200423002020.BAB07181BB09@ary.qy> <74a807f52a59fa87053fcc76aaa28a73@sapienti-sat.org>
To: Juri Haberland <juri@sapienti-sat.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmarc/VcgSrqcgOAFhFwdW1Fm1_-auWg4>
Subject: Re: [dmarc-ietf] Composition Kills: A Case Study of Email Sender Authentication
X-BeenThere: dmarc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Domain-based Message Authentication, Reporting, and Compliance \(DMARC\)" <dmarc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmarc>, <mailto:dmarc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmarc/>
List-Post: <mailto:dmarc@ietf.org>
List-Help: <mailto:dmarc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmarc>, <mailto:dmarc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 23 Apr 2020 14:40:33 -0000

> On 2020-04-23 02:20, John Levine wrote:
> > In article <51be5654-94c4-38c6-8f6b-dca403d6680a@dcrocker.net> you
> > write:

> >> The paper asserts that AR is used as DMARC input.  I suspect that is
> >> rarely, if ever, true.  Yes? No?
> >
> > I'd say never.  To do DMARC rejects you have to do all of the
> > validation in the SMTP daemon, which is before anything has a chance
> > to create an A-R header.

> Of course this is possible with the Milter protocol introduced by
> Sendmail and used also by Postfix. The mail traverses during the SMTP
> phase through different milters, e.g. a SPF milter, followed by a DKIM
> milter, and every milter injects an AR header with its results. The last
> milter is a DMARC milter that processes the AR headers and signals the
> SMTP daemon do either accept or reject the message. This is how OpenDKIM
> & OpenDMARC work together.

This is done all the time, and not just by Sendmail and Postfix.

> Other projects do it all in one milter (rspamd?)...

Yes, but when you do it all in one go it's more difficult to customize.

				Ned

