Hi, Murray,

On 12/24/2014 06:45 AM, Murray S. Kucherawy wrote:
Hi Rolf, getting back to your review (thanks for the nudge):

On Wed, Nov 12, 2014 at 6:26 PM, Rolf E. Sonneveld <[email protected] <mailto:[email protected]>> wrote:



    Abstract:

        This lack of cohesion has several effects: receivers have
        difficulty providing feedback to senders about authentication,
        senders therefore have difficulty evaluating their
        authentication deployments, and as a result neither is able to
        make effective use of existing authentication technology.


    This focuses on the reporting function of DMARC, leaving out the
    policy part of it.

    Suggested text:

        This lack of cohesion has several effects: senders have
        difficulty providing information about their use of an
        authentication policy and receivers have difficulty
        determining a disposition preferred by senders. Vice versa,
        mail receivers have difficulty providing feedback to senders
        about authentication, senders therefore have difficulty
        evaluating their authentication deployments, and as a result
        neither is able to make effective use of existing
        authentication technology.


The Abstract appears to have been rewritten since you reviewed it, so a straight text swap won't work anymore. The new text focuses on what's being provided, not what was missing. Do you want to take another run at it?

No need for it, the text of the Abstract in -09 is OK.


    Introduction:

        [...] mail receivers have tried to protect senders [...]


    Suggested:

        [...] mail receivers have tried to protect senders and their
        own users/customers [...]

This text no longer appears in the draft.

OK.

    Starting with "DMARC allows domain owners and receivers to
    collaborate by", the terms 'domain owners', 'receivers', 'senders'
    and 'SMTP receivers', 'Mail Receivers', 'mail receivers' are used
    throughout the document. I'd suggest to add a definition of the
    term ' Mail Senders' to the introduction part of chapter 3 and
    then use only the terms as defined in 3., throughout the document.
    Suggested text for the term Mail Sender:

      * Mail Sender: the sender of mail with a domain for which the
        Domain Owner may have published a DKIM public key and/or an
        SPF authentication record and/or a DMARC policy;


    (although we may want to not mention DKIM or SPF here).


It looks like that got cleared up; -08 has no reference to "Mail Sender".

OK.


    2.2 Out of Scope

    Add:

    o    cousin domain attacks

Covered in Section 2.4 of -08.

OK.

    3.1.2 Key Concepts

    Last sentence: add a reference to this 'other referenced material'.

Good idea; added.

Thanks.

    3.1.3 Flow diagram

    The box titled 'User Mailbox' could give the impression that
    there's only one choice for delivery. However, quarantining can be
    done without delivery to a mailbox. I'd suggest to label this box
    'rMDA'.

That's already done in -08.

OK. Well, it's MDA, but that's OK. One typo in the diagram. When:

"sMTA" is the sending
    MTA, and "rMTA" is the receiving MTA.

is correct, the box in the diagram should be labelled 'sMTA', not 'oMTA'.


    The part within parentheses of step 6:

     6. Recipient transport service conducts SPF and DKIM
    authentication checks by passing the necessary data to their
    respective modules, each of which require queries to the Author
    Domain’s DNS data (when identifiers are aligned; see below).

    might indicate that SPF and DKIM authentication checks need not be
    performed when identifiers are not aligned. However, for sake of
    reporting, SPF and DKIM authentication checks will in general
    always be done, or am I missing something?


I can envision a DMARC implementation that skips SPF or DKIM checks if the corresponding identifiers are not aligned, because they won't be interesting to DMARC in that case.

Whether or not to generate reports in the case of non-alignment is not clear from the text, or am I missing something? Par. 3.1.3:

    8.  If a policy is found, it is combined with the Author's domain and
        the SPF and DKIM results to produce a DMARC policy result (a
        "pass" or "fail"), and can optionally cause one of two kinds of
        reports to be generated (not shown).

and par. 6.2 goes right into the format of reports, not the conditions under which a report is to be sent.

    3.1.4.1 DKIM-authenticated Identifiers

    remove (or change) the 'Cousin Domain' example: it doesn't hold
    when a bad actor is signing the mail with d=cousindomain and
    RFC5322.From=localpart@cousindomain


It's not there in -08.

OK.


    4 Use of RFC5322.From

    Last bullet (The DMARC mechanism ...). It seems the other bullets
    provide reasons why RFC5322.From is chosen while the last one does
    not. It looks to me as a circular reasoning.

It's not there in -08.

OK.

    5.2 DMARC URIs

    It is not clear from the text what the report originator must do
    when the report payload exceeds the maximum size as indicated by
    the record. Should it not send anything, should it split up
    reports, should it notify the requester that there was a report
    exceeding the maximum size?


Section 6.2.2 in both versions explains what to do here.

OK.


    5.3 General Record Format

    adkim and aspf do not provide a list of all possible options (like
    is done for fo and p). Of course it is pretty obvious that for
    'strict' the 's' must be used, but it's not clear from the text.

They're there in -08.

Excellent.

    Next, the P: and pct: tags: they show that (in hindsight) the
    policy part and the reporting part of DMARC might have been better
    off, when they were defined in different specs. Now we need to
    complicate the text to say that the policy tag p: is required, but
    not for third-party reporting records. And for pct, that it "MUST
    NOT be applied to the DMARC-generated reports". Well, I believe
    this has been discussed before, no need to redo this discussion.

    I'd suggest to synchronize the short description of the tags in
    5.3 with the descriptions of the tags in the table of 10.4 (now
    different terminology is used here and there, for example
    Requested Mail Receiver policy (5.3) and Requested handling policy
    (10.4). Suggested text in 5.3 becomes then:
    [...]

Section 5.3 is meant to be verbose descriptions of each of the tags, while Section 10.4 is a set of short, terse descriptions with references to the places where the details can be found. We could add section numbers to the references found in 10.4 if you think that would be helpful.

    Further suggestion for the table in 10.4: reverse the order of 'p'
    and 'pct' as 'p' is first discussed in the text of 5.3, before 'pct'.


I see what you're after here, but as it is they're in alphabetical order, like a dictionary, and I think that makes for easier referencing.

Fair enough.

    Suggestion for 'ri': remove the normative language (MUST and
    SHOULD) as that might ask for a 'compliancy'  section. Instead,
    move these suggested values to the BCP document.

Well there is a normative component there, which is to say that anyone has to be able to produce at least daily reports. I think we have to at least say that. We (the IETF) seem to shy away from doing minimum compliance sections these days.

A 'conformance' section, similar to what RFC2049 is for MIME, would be nice, indeed ;-)

    5.6.2. Determine Handling Policy

    Bullet 6 in combination with the introduction text might give the
    impression that the receiver MUST always follow the policy as
    published by the Domain Owner. Suggestion to replace the text:

        6. Apply policy. Emails that fail the DMARC mechanism check
        are disposed of in accordance with the discovered DMARC policy
        of the Domain Owner. See Section 5.3

    with:

        6. Apply policy. Emails that fail the DMARC mechanism SHOULD
        be disposed of in accordance with the discovered DMARC policy
        of the Domain Owner. See Section 5.3

Section 5 itself already has the equivalent of that SHOULD, followed by a "MAY deviate" based on local policy.

OK.

    5.6.3. Policy Discovery.

    This paragraph states that:

        If the RFC5322.From domain does not exist in the DNS, Mail
        Receivers SHOULD direct the receiving SMTP server to reject
        the message. The choice of mechanism for such rejection and
        the implications of those choices are discussed in Section 9.3.

    Although this might be common practice (either by default MTA
    settings, or by configuration parameters set by many mail
    operators), I believe this informational RFC about DMARC cannot
    use normative language here to decribe what must be done with mail
    with a domain that is not present in DNS.

This has been brought up before. I think consensus has landed on the idea that this is an acceptable thing to say because it applies only to operators that are choosing to be DMARC participants. Moreover, the SHOULD ultimately enables you to make the choice for yourself if you think bouncing mail from non-existent domains would be destructive. And this is what DMARC operators have been doing for a while now, so I'll also fall back to noting that this specific effort is documenting current practice. If the working group wants to make a different statement, it can crack this topic open if and when it starts work on a version of DMARC along the Standards Track.

This has been discussed in the recent thread 'Jim Fenton's review of -04', no need to redo this discussion.


    5.7 Last sentence:

        Mail Receivers SHOULD also implement reporting instructions of
        DMARC in place of any extensions to SPF or DKIM that might
        enable such reporting.

    Not sure what this means. But it seems to me DMARC cannot claim
    priority over other options/extensions in other IETF protocols.

This is another spot where the SHOULD gives the operator the choice to do both if it wishes. I can't remember off the top of my head what the use case is here, but essentially the absence of a request for DKIM or SPF reporting (as developed by the MARF working group some time ago) should not preclude DMARC reporting, nor should their presence interfere with DMARC reporting.

Then, borrowing from your text, may I suggest the following text:

   "Mail Receivers SHOULD implement reporting instructions of DMARC,
   even in the absence of a request for DKIM or SPF reporting [MARF].
   Furthermore, the presence of such requests SHOULD NOT interfere with
   DMARC reporting."


And as a general statement: thanks for all the work, Murray!

/rolf

_______________________________________________
dmarc mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to