On 7/7/2012 3:05 PM, Franck Martin wrote:
On 7/7/12 12:54 PM, "Alan Maitland"<[email protected]>  wrote:
On 7/7/2012 12:42 PM, Franck Martin wrote:
On Jul 7, 2012, at 11:09 AM, Alan Maitland wrote:


Franck,

Thank you for the additional and helpful data on flow.  I am really glad
to have read your post and learned that I was incorrect.

That being the case, then it seems that DMARC really does ride on other
existing services like SPF rather than being a replacement.  If so, then
fantastic news.

When someone on the list talked to not paying attention to valid SPF
-all constructs, the alarm bells started going off.  Sorry if I
overreacted.

If for no other reason than just isolation for testing and debugging
purposes in environments employing other existing protocols, the p=none
construct makes a whole lot of sense.


I need to be a bit more pedantic here :P

I spoke of SPF tests, not of SPF policy

And this is the point we are discussing and which is unclear.

Currently as it is written, DMARC will override the SPF policy part, not
the test.

May be an example:

I really appreciate your willingness to take the time to create the example, it helps a lot.


Example.com TXT "v=spf1 a:200.200.200.200 -all"
_dmarc.example.com TXT "v=DMARC1; p=none"

And you receive an email from 100.100.100.100

Mail From:<[email protected]>
From: [email protected]
No DKIM signature

The spf test fails. So DMARC does not even check the alignment with SPF.
p=none so DMARC passes the emails to other anti-spam filters

The SPF -all has been overridden by DMARC

But why? In the case above, you have a really clear and obvious case of an SPF publisher who specifically says "we operate example.com, if you receive a message claiming to be from example.com (in the Mail From:) from someplace other than 200.200.200.200, because I published a -all, you can presume it is absolutely trash, so waste no more time on it".

Of course, it is entirely up to a receiver to decide what they will do with a message which hard fails so obviously, but to simply pass it along, knowing it has failed such a basic SPF test seems entirely wrong and wasteful of downstream resources ("other anti-spam filters").


However if you do p=reject, then you get exactly the behavior as spf -all

How about something like p=rejectonfail which might act as a p=none if there is no failure or a soft fail while acting as a p=reject if there is indeed a failure?


Now, coming from the IP 200.200.200.200 the email
Mail From:<[email protected]>
From: [email protected]
No DKIM signature


SPF tests passes, DMARC kicks in, but alignment is not assured, so DMARC
test fails
p=none the message is still passed to other anti-spam filters

I'm not sure that I have any serious issue with this behavior, because the legitimate message from my domain is at least being passed along for delivery and presumably if it is not spam, it gets delivered.

That said, if the From: example.net email address is in the DMARC mix, perhaps there should be something like DNS TXT like "v=spf1 include:example.com -all" in example.net's host file if you going to judge from the From in some way...


But if you had p=reject, this email valid in the policy realm of SPF would
be rejected by DMARC

I think that I can understand that, which is why I suggested something like the p=rejectonfail idea.


This I think summarize currently the dilemma for people using spf -all

I may not be happy about it, but it makes sense to me now.


They can't use monitor mode, and they need to ensure alignment to get the
equivalent of spf -all with DMARC.

Now, currently there are about 4 implementations of DMARC on the receiving
side. I don't think any of these receiving sites have taken the SPF -all
seriously so far.

For instance, if you look at
http://spamassassin.apache.org/tests_3_3_x.html they don't categorize the
email as spam for a -all.


Looked at that page, though I'm not quite sure how best to read it. Really, the problem is that -all says nothing about the content of the message (e.g., the worst spammers on the planet could publish perfectly good SPF records), but it does indicate that the domain sending is authorized to send from a specific machine or set of machines and not from others representing themselves as MAIL FROM: [email protected].

So I think practically today -all does not matter (a few test emails could
verify it), but it is not a reason to not improve the spec if needed.

For those interested in domain name reputation protection, it does matter and there are quite a few SPF DNS TXT publishers out there.


Personally, I think we could benefit in clarifying the spec, that when
p=none for people that take the SPF -all seriously could reject the
message with a disposition of SPFALL, but I'm not sure practically it is
needed because I don't know who take the SPF -all seriously and to what
extent is this population. Anyone has information?


Agreed regarding the clarification on the spec. I pretty much assure you that any legitimate SPF publisher is very serious about SPF -all as meaning if it does not come from our published machines, it is not from us - which is pretty much the driving reason for most domain holders who publish an SPF DNS TXT record with the -all.

Perhaps my thought above might be useful in some way. Keep in mind, as a legitimate SPF publisher, my goal is to stop all messages being sent to others using domain names we hold which are being misused through being associated with machines we do not control, thereby threatening the reputation of the domain names we hold.

Again, Franck, thank you for your succinct and well presented example, it really does make the discussion process much easier.

Best,

Alan

_______________________________________________
dmarc-discuss mailing list
[email protected]
http://www.dmarc.org/mailman/listinfo/dmarc-discuss

NOTE: Participating in this list means you agree to the DMARC Note Well terms 
(http://www.dmarc.org/note_well.html)

Reply via email to