On Thursday, March 28, 2013 10:56 PM [GMT+1=CET],Tim Draegen wrote:

> On Mar 28, 2013, at 5:36 PM, Al Iverson <[email protected]>
> wrote: 
> > On Thu, Mar 28, 2013 at 4:18 PM, J. Gomez <[email protected]>
> > wrote: 
> > > Will DMARC make it hard for outsourced marketing mail operations?
> > > 
> > > I just got this email (which is not spam, I subscribed to this
> > > marketing material) in which RFC5321.MailFrom and RFC5322.From
> > > are obviously not in allignment, which is understandable as the
> > > sending party (the outsourced marketing company) will want to
> > > handle themselves the bounces for that email campaign, but
> > > nontheless the RFC5322.From address has to be a subdomain of
> > > microsoft.com to give it "authenticity" in the eyes of the final
> > > recipient as it's the RFC5322.From address what the recipient's
> > > MUA will display to the user.        
> > 
> > Hard? From a technical perspective, no. There are other challenges,
> > though. - DMARC is new, not everybody knows about it or is prepared
> > to, or knowledgeable enough to implement it.
> > - The outsource provider (hi!) is typically dealing with (only)
> > marketing people at the client. This is not the DMARC-savvy
> > department. It's hard to make the case to the marketing people from
> > outside. What works better is that the security people inside the
> > client organization drive it home sideways, then we help to
> > implement 
> > it.
> > - Adjusting the configuration on the outsource provider side isn't
> > hard. But the client is in the driver's seat, not the provider. The
> > client would need to choose to put some proper bits in DNS to allow
> > a 
> > DKIM signature that properly aligns with the PRA, then request that
> > the provider update this configuration.
> 
> Hi J. Gomez,
> 
> Adding to Al's list, I'd add "Yes".  There are quite a few outsourced
> marketing email providers that serve customers that do not have the
> ability or desire to go mucking with DNS to "do it right".  
> 
> Serving those customers is hard because they really want their domain
> in the "From:" header, and until registrar and email service
> providers partner to make it easier, DMARC will likely remain beyond
> the reach of said customers.   
> 
> Back to your example, though.  A large company that wants DMARC would
> likely delegate sub-domains for outsourced marketing providers to
> manage themselves.  As Al said, controls that can be applied at the
> email domain level are relatively new, and getting organizations to
> incorporate this into their practices takes time (and effort!).    


Thanks Tim for your insights on this issue.

Another outsourced email marketing approach is to use non-client-related 
domains for both RFC5321.MailFrom and RFC5322.From. This way the outsourced 
marketing company gets full access to make DNS customizations and therefore the 
ability to easily get "Pass-results" for both SPF and DKIM, which also would 
imply an easy "Pass-result" for DMARC if they chose to implement DMARC.

However, as DMARC ultimate purpose is to protect the brand of the sender, this 
outsourced email marketing approach renders DMARC not that useful as the sender 
is not using the client's brand domain in either RFC5321.MailFrom nor 
RFC5322.From.

Consider for example this email (not spam, I subscribed to it) advertising some 
SSL certificate products from Thawte. It seems they are using a company named 
"rSys3" as their outsourced email marketing provider, which just use the 
client's name ("thawte") as a subdomain of their own domain 
("thawte.rsys3.com") for both RFC5321.MailFrom and RFC5322.From, and only in 
the "Reply-To:" address they point to the thawte.com domain.

=====================sample outsourced email marketing email 
begins======================
 Return-Path: <[email protected]>
 X-Original-To: [email protected]
 Delivered-To: [email protected]
 Received-SPF: pass (thawte.rsys3.com: 12.130.136.47 is authorized to use 
'[email protected]' in 'mfrom' identity 
  (mechanism 'ip4:12.130.136.0/22' matched)) receiver=mta.example.com; 
identity=mfrom; envelope-from="[email protected]"; 
  helo=om-thawte.rsys3.com; client-ip=12.130.136.47
 Received: from om-thawte.rsys3.com (om-thawte.rsys3.com [12.130.136.47])
  by mta.example.com (Postfix) with ESMTP id A9F89C6A
  for <[email protected]>; Wed, 27 Mar 2013 08:02:37 +0100 (CET)
 DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; s=responsys; d=rsys3.com;
  h=MIME-Version:Content-Type:Date:From:Reply-To:Subject:To:Message-ID; 
[email protected];
  bh=uLBQ69hdunDmvRob0Dz1ADlk1O4=;
  b=Vdj7UvgZ5VLDzQ8MEKK4cb/oFxCF7bEXsBKlxKQdDkeEoxXVamSWDVBOACTCPMeJB1nzz97EEhQc
    dKVEooG6pOCIgcghO3floRDCUuyXqU2PXbh2cLBRo9t1kfA1QyyF3hH8QlpLaVftsg0fQ+XADYp1
    W2sLyrj1KlB5eIMani0=
 DomainKey-Signature: a=rsa-sha1; c=nofws; q=dns; s=responsys; d=rsys3.com;
  b=LofjjZg6YGdyZc4H5BDDK8S/5Crl8MPu0xiR+peKmLtOSpSYbwx5FjYK0sxeM2F0I+u+qYZ/tHK5
    KMxcZQsmikrf+KUIp7eo+XVODgWqi17RZojqzaGFh1Zgbnr6ypqWQ9tXVmEktClL8t+mX0WoNA7U
    3HsX18qrLN5Epa6Q0pc=;
 Received: by om-thawte.rsys3.com id haacp0162isf for <[email protected]>; 
Wed, 27 Mar 2013 00:02:35 -0700 (envelope-from <[email protected]>)
 MIME-Version: 1.0
 Content-Type: multipart/mixed; boundary="----msg_border"
 Date: Wed, 27 Mar 2013 00:02:35 -0700
 From: "Thawte Digital Certificates" <[email protected]>
 Reply-To: "Thawte Digital Certificates" <[email protected]>
 Subject: =?UTF-8?B?RG93bmxvYWQgVGhhd3Rl4oCZcyB3aGl0ZXBhcGVyIG9uIHRoZSBo?=
  =?UTF-8?B?aXN0b3J5IG9mIFNTTCBlbmNyeXB0aW9uIGFuZCB3aW4gYW4gOEdCIFVTQg==?=
 X-cid: thaw.1055.1
 X-sgxh1: iLiLxgHtLJhQJhu
 To: [email protected]
 Message-ID: <[email protected]>
======================sample outsourced email marketing email 
ends=========================


This approach does indeed fully authenticate the sender, but it is highly 
unlikely that such a sender ("rsys3.com") would be in the recipient's (or the 
recipient's mailbox provider's) domain whitelist, so all that successful 
authentications could be moot in the end for practical purposes.

Also, this approach is highly suspicious to receivers, as the advertised 
brand's domain is absent from both RFC5321.MailFrom and RFC5322.From, see for 
example this comment: 
http://proxy.org/forum/lounge/1799-email-adbrite-rsys3-com-phishing.html

My guess here is that the outsourced email marketing company had such a hard 
time getting hold of someone technical at it's client (to get them to customize 
some resource records in the client's DNS), that they just took the shortcut 
approach of using their own domain for both RFC5321.MailFrom and RFC5322.From 
in order to secure a Pass-result for both SPF and DKIM. Your opinions?

Regards,

J. Gomez


_______________________________________________
dmarc-discuss mailing list
[email protected]
http://www.dmarc.org/mailman/listinfo/dmarc-discuss

NOTE: Participating in this list means you agree to the DMARC Note Well terms 
(http://www.dmarc.org/note_well.html)

Reply via email to