On Nov 22, 2014, at 12:43 AM, Stephen J. Turnbull <[email protected]> wrote:

> Douglas Otis writes:
> 
>> There are serious concerns being ignored regarding email captured in
>> DMaRC feedback.  Things like Intuit invoices or mailing-list
>> conversations are being misdirected simply because DMaRC incorrectly
>> assumes a sender/recipient relationship when general use email
>> providers assert restrictive DMaRC policies.
> 
> So do you propose something like
> 
>    Author Domains which impose policies that can result in failure
>    reports being sent MUST have Terms of Service in which mailbox
>    users agree that content of messages which fail DMARC checks may
>    be forwarded to the Author Domain as part of failure reports.
>    This includes messages that they have originated which are
>    unauthorized according to the definition of DMARC.

Dear Stephen,

Consider invoices sent by Intuit on behalf of users who have an email address 
obtained in conjunction with their Internet access who are seeking financially 
related services.  These messages are not spoofing the source accurately 
indicated by Sender header fields as defined by RFC5322.  Why assume these 
entities assigned an email address by their access provider intended their 
service related messages be insecurely mis-directed to access providers instead 
of the intended recipients?

In the case of legitimate third-party services, these messages are not the 
property of the access provider. They are owned by the author assigned the 
email address seeking these services.  Failing DMaRC with a message that has a 
valid and reputable domain aligned with the Sender header field domain is 
unlikely malicious or in violation of any recognized protocol standard.  DMaRC 
related redirection of these valid and legitimate messages disrupts vital 
services, such as forwarding and use of third-party services in common use for 
decades.  The disruption of these services clearly indicates DMaRC is 
incompatible with SMTP by neglecting consideration for sender agents not 
aligned with the email-address provider.

Rather than issuing click through agreements to in essence say "All your email 
must represent direct transactions from the provider." they could offer users a 
friendly SMTP compatible and safe solution that provides MUA configurations 
that expose aligned Sender header fields in lieu of aligned From header fields. 
 This could be coupled with DMaRC record that offers this exception.  With a 
simple change, their customers are protected and afforded the agility SMTP 
normally allows.  This could be signaled by making specific authorizations such 
as those proposed in TPA-Label or by defining an a DMaRC assertion which 
indicates TP=PSS or TP=PSR for Sender header field strict and relaxed, or 
defines an excepted group syntax which safely permits a highly visible 
exception made using group syntax indicated with DMaRC assertions TP=G and 
perhaps combined with TP=PSR,G.
 
> Or however you say that in IETF-ese?
> 
>> DMaRC policies that require From header field alignment with the
>> sender inhibit the forwarding of email and dismiss Sender header
>> field contents as being potentially deceptive to justify ignoring
>> this field in the determination of direct "mail flows".
> 
> Isn't that backward?  DMARC focuses on From alignment *because* in
> typical MUA configurations Sender is not visible to the receiving
> user, and in any case would be unlikely to be useful in counteracting
> phishing and recommended-by-a-friend spam.  That is, I don't see how
> verifying Sender would be useful.  True, if you verify Intuit as the
> sender of mail on behalf of a billing company, the user seeing Intuit
> in Sender would likely come to an appropriate conclusion.  But if you
> verify example.com as Sender, the user doesn't know who they are, and
> in most cases I would expect them to simply ignore that information
> and rely on From and any clues in the message content.

DMaRC makes an erroneous assumption incompatible with SMTP in the case of user 
email accounts.  Besides, DMaRC can not prevent all spoofing and makes future 
improvement problematic.  It would be wrong to characterize Mailing-list 
traffic as being spam friendly or something most users are unable to recognize 
and properly handle.  Where the user sending a message is critical, they can be 
S/MIME or OpenPGP signed, but nevertheless these safer solutions are not 
recognized by DMaRC. 

>> However this often relied upon agility is seriously damaged by
>> DMaAC's short-cut of ignoring the defined role of the Sender header
>> field.
> 
> It's not a shortcut.  Sender has the wrong semantics for combatting
> phishing and recommended-by-friend spam.

We have handled a fair amount of DKIM related malicious traffic exploiting 
trivial spoofing DKIM permits.  This was giving users a false sense of security 
where the problem was clearly noted in the Won't Fix DKIM ticket 24 in May of 
2011.  It took until May of 2014 for a fix to be implemented by one of the 
world's largest providers.  Those following DKIM deployment documents along 
with those waiting to be published for DMaRC seem destine to ensure mistakes 
remain likely because logical processing errors are never admitted, given clear 
warning, or directly fixed without added overhead.  

A false sense of assurance remains a concern for SPF heavily exploited by 
Kelihos botnets, for example.  Neither SPF nor DKIM can be used to hold domains 
sending malicious email accountable because neither authenticates actual 
sources.  Authenticating the source by domain is the only practical way to 
combat phishing that remains impractical when using just DKIM or SPF.  
Misguided DMaRC requirements are attempting to force standardization on weak 
protocols destined to prolong abuse and associated damage.  Lawsuits related to 
abuse blocking often involve substantial sums where evidence must be rock solid.

>> this does not include redirecting accepted messages to destinations
>> neither specified by senders nor recipients.
> 
> This is not a problem restricted to DMARC.  Any protocol that involves
> forwarding a message to a third party (eg, the Sender field or
> Return-Path) raises this issue (eg, in the case of a typo in the
> recipient mailbox name).  It's true that DMARC seems designed to cause
> such problems.

DMaRC along with DKIM and SPF were carefully designed to avoid authenticating 
domains often well compensated for having sourced abuse.  Despite such an 
obvious defect in these plutocratic schemes, almost every related authorization 
reporting method erroneously includes Authentication in their title.  What is 
standing the the way of DANE deployment for both client and server?

Regards,
Douglas Otis
_______________________________________________
dmarc mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to