At AOL we see this as well, and for now we're treating it as "they're still
figuring this DMARC thing out". If it's someone we have a regular
relationship with and it's not a blip, we'll reach out and ask what's up.
If it appears to be a serious issue - a domain getting heavily abused for
example - we'll also try and reach out.

We're not currently using it as a feature in our reputation systems, so not
taking your DMARC reports isn't going to impact your reputation here at AOL
(for now). We consider it bad form, but that's about it.

The @dmarc.org (and similar) reporting addresses make us giggle, but again
we're not holding that against anyone yet.

As for DoS via DMARC - that's one of the (many) reasons we don't do
forensic reporting. I can't tell you how many times we've seen small orgs
with no or misconfigured SPF being abused by spammers with horrible lists
that generate lots of bounces. We try to catch that before it's too bad for
the small org, but we've unintentionally crushed a mail server or three
because of this. What we haven't seen yet, and I'm not really sure it's
worth the trouble for the bad guys seeing that there are soo many easier
ways to cause trouble, is someone setting up a ton of domains that all send
reports to a victim/target. Of course, now that I've said that, someone
will do it tomorrow.

On Sat, Sep 10, 2016 at 12:53 PM, John Levine via dmarc-discuss <
dmarc-discuss@dmarc.org> wrote:

> >There's a semi-related issue I'm seeing. A number of domains have used
> >addresses @dmarc.org for their aggregate reports, and some report
> >generators have not implemented cross-domain reporting authorization
> >checks. This volume pales in comparison to the volume of spam directed
> >at the same reporting address, but is anybody else seeing this and
> >thinks it's a problem?
>
> I think you're just observing the truism that no good deed goes
> unpunished.  Perhaps you could treat it as lead generation, collect
> the reports and offer to sell advice to both the people sending them
> and the ones reported on to improve their DMARC setup.
>
>
> >> Do postmasters risk bad reputation if they continue to send DMARC
> reports?
> >
> >Another question a friendly large mailbox provider could possibly answer
> >for us... Has anybody asked Spamhaus to see if this is on their radar?
>
> I'm reasonably sure it is not.
>
> >That inspires another question -- has anybody seen a real-world abuse or
> >DoS involving DMARC reporting? There's a potential there, and I believe
> >we identified it in the security considerations in RFC7489, but is there
> >any indication this is a problem that needs more attention?
>
> Unless a really gigantic provider pointed their reports at you, it
> seems unlikely.  I've been collecting reports for a dozen domains
> since 2012 and the total number of aggregate reports since I've
> started is less than 100,000, failure reports less than 60,000.
>
> R's,
> John
> _______________________________________________
> dmarc-discuss mailing list
> dmarc-discuss@dmarc.org
> http://www.dmarc.org/mailman/listinfo/dmarc-discuss
>
> NOTE: Participating in this list means you agree to the DMARC Note Well
> terms (http://www.dmarc.org/note_well.html)
>



-- 
PAUL ROCK
Principal Software Engineer | AOL Mail
P: 703-265-5734 | C: 703-980-8380
AIM: paulsrock
22070 Broderick Dr.| Dulles, VA | 20166-9305
_______________________________________________
dmarc-discuss mailing list
dmarc-discuss@dmarc.org
http://www.dmarc.org/mailman/listinfo/dmarc-discuss

NOTE: Participating in this list means you agree to the DMARC Note Well terms 
(http://www.dmarc.org/note_well.html)

Reply via email to