>Given that:
>
>  * Whitelisting mailing lists is really the only way to get DMARC to
>work with messages forwarded by lists.

I don¹t agree with the premise that this is something about which we need
to be concerned on this project.  Who gets phished via mailing lists?

#Chris's reply 
#
#  I want to put this to rest as much as you do. What is the expected behavior 
# for lists that are established versus ones that are new and unlisted to all
#  receivers. This is how a spammer could pose as a list and I see it as 
relevant .
#
#



>
>We all know that the "p=" parameter applies policy when either the SPF
>check or DKIM signature fails.  I'm suggesting that a "p2=' parameter
>be created to match a DKIM alignment and a SPF fail.  It is
>conceivable that a "p1=" parameter be created for occasions when the
>SPF aligns and DKIM fails.

There's a conflation in terms here.  When you say "aligns", you mean
"passes and aligns", correct?


# Chris's reply 
#
# Yes.  passes and aligns. 

Sent via BlackBerry from T-Mobile

-----Original Message-----
From: Murray Kucherawy <[email protected]>
Sender: [email protected]: Fri, 6 Jul 2012 14:30:07 
To: [email protected]<[email protected]>
Subject: Re: [dmarc-discuss] Proposal and discussion for "p1=" and
 "p2="parameters within DMARC

On 7/5/12 2:54 PM, "Chris Lamont Mankowski" <[email protected]>
wrote:

>Given that:
>
>  * Whitelisting mailing lists is really the only way to get DMARC to
>work with messages forwarded by lists.

I don¹t agree with the premise that this is something about which we need
to be concerned on this project.  Who gets phished via mailing lists?


>
>We all know that the "p=" parameter applies policy when either the SPF
>check or DKIM signature fails.  I'm suggesting that a "p2=' parameter
>be created to match a DKIM alignment and a SPF fail.  It is
>conceivable that a "p1=" parameter be created for occasions when the
>SPF aligns and DKIM fails.

There's a conflation in terms here.  When you say "aligns", you mean
"passes and aligns", correct?

>
>Considering that ADMDs with end users (Read: non-transactional) will
>likely only ever deploy "p=monitor" DMARC records, this proposal will
>will maintain compatibility with existing DMARC deployments.  Since
>I'm asking for new parameters to be adoped and defined, I'd suggest
>that  "p1=" and "p2=" parameters can appear in any order and will take
>precedent over a "p=" parameter.  A DKIM DNS record would then look
>something like this
>
>     % dig +short TXT _dmarc.example.com.
>     "v=DMARC1\; p=monitor\;p2=quarantine\;
>rua=mailto:[email protected]";
>
>It would appear this way in a zone file:
>
>  ; DMARC record for the domain example.com
>     _dmarc  IN TXT ( "v=DMARC1; p=monitor; p2=quarantine;"
>                      "rua=mailto:[email protected]"; )
>
>This change will require DKIM administrators to think about which
>policy they want applied, and will allow for a more flexible
>deployment overall.
>
>Lastly, I know that DMARC is not intended to be tied to SPF and DKIM
>directly, and suggest that "p1" be a validation of the envelope, and
>"p2" be validation of the body.  This would then allow "p=" to be
>defined as a combination of "p1" and "p2", or perhaps a forward
>looking "p*=" that would include a "p3=" if such a concept were to be
>created or exist.
>
>One idea for a "p3=" would be messages that are determined to come
>from a whitelisted mailing list.  Considering that each installation
>maintains their own lists of mailing list outbound IP (google groups,
>etc) it may be beneficial for an ADMD to tell the receiving MTA how to
>treat that message outside of standard handling.
>
>Thank you in advance for your constructive feedback.
>

We discussed this internally before the DMARC spec became public.  If any
particular technology DMARC supports can have either a "pass+align" or
"fail" result, then the cross product of DKIM and SPF means you have four
possibilities.  That's now p= through p3=.  Now suppose we adopted another
technology like TLS; now it's p= through p7=.  Obviously this won't scale.

Is the complexity this adds worth the use cases it's protecting?

-MSK


>


_______________________________________________
dmarc-discuss mailing list
[email protected]
http://www.dmarc.org/mailman/listinfo/dmarc-discuss

NOTE: Participating in this list means you agree to the DMARC Note Well terms 
(http://www.dmarc.org/note_well.html)

_______________________________________________
dmarc-discuss mailing list
[email protected]
http://www.dmarc.org/mailman/listinfo/dmarc-discuss

NOTE: Participating in this list means you agree to the DMARC Note Well terms 
(http://www.dmarc.org/note_well.html)

Reply via email to