On Apr 26, 2014, at 4:40 PM, Franck Martin <[email protected]> wrote:

> I’m not sure the original email from Paul Scott, was about him running a 
> mailing lists, or something like this…
> 
> So I think, it was best to put aside the mailing list issue and help him to 
> solve his problem. Let’s focus on problem solving.
> 
> It seems he just forward emails from the internet to their customers to their 
> yahoo/gmail address via their personal domain he hosts … He should have 
> noticed these errors earlier (DKIM failing), but it may not have had the 
> level of visibility the yahoo/aol policy change brought.
> 
> There are a few well known large forwarders/hosting providers that breaks 
> DKIM when doing just a forwarding. DMARC is only highlighting them and 
> encouraging them to fix their infrastructure. DKIM is an IETF proposed 
> standard since 2007. Time the infrastructure be friendly with it.

Frank,

You are right on the mark. The situation has nothing to do with a mailing list, 
and were I running a mailing list neither DKIM nor DMARC would be an issue here.

What happens is that a user, say using Yahoo! Mail, sends an e-mail to someone 
whose domain I host (pretend it’s example.com), and that someone wishes their 
e-mail forwarded automatically to, say, Gmail. That is, [email protected] pens 
an e-mail to [email protected] who wishes to pick up mail on Gmail. In this 
case, the Gmail server rejects the forwarded mail from example.com, not on the 
basis of DKIM, but on the basis of Yahoo! mail DMARC policy. Straight away, 
this is a huge problem if one wishes the From: header to remain unchanged (a 
reasonable expectation). It means, as I understand it, that DMARC prevents such 
forwarding. I find this an unacceptable situation in a reasonable scenario.

Since the only solution to avoid the rejected mail seems to be modifying the 
original From: header — which I’ve reluctantly done -- to one that passes (or 
completely avoids) DMARC at the forwarded server, and applying a new Reply-To: 
header — assuming one didn't already exist, which you’d of course want to keep 
-- a totally new an unacceptable problem arises: If the original sender 
signed/encrypted the e-mail message, then modifying the From: header will cause 
their x.509 certificate to fail validation; the entity in the From: header does 
not match the certificate’s entity. This has nothing to do with DKIM, as some 
people seem to be suggesting.

I certainly understand the concept under which DMARC arose, but I have to say — 
unless I’m missing something — that the implementation is not very useful 
except in a very restricted scenario. When mail services used by the general 
public adopt DMARC, then something as simple as forwarding mail intact becomes 
an impossibility.

If there is a reasonable solution that I’ve overlooked, I’d appreciate 
someone’s input. Thanks.

Paul

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
dmarc-discuss mailing list
[email protected]
http://www.dmarc.org/mailman/listinfo/dmarc-discuss

NOTE: Participating in this list means you agree to the DMARC Note Well terms 
(http://www.dmarc.org/note_well.html)

Reply via email to