On 1/21/2015 10:50 AM, Michael Jack Assels wrote:
On Tue, 20 Jan 2015 16:14:32 CST,
Franck Martin <[email protected]> wrote:

[...]
Your confusion on HELO is may be related to the fact that the
HELO string is only used when the MAIL-FROM: is empty?

There is some text here:
http://trac.tools.ietf.org/html/rfc7208#section-10.1.3

The HELO string is not evaluated all the time, it is more like
a fall back.

It's already been pointed out that
    http://trac.tools.ietf.org/html/rfc7208#section-2.3
RECOMMENDs checking the HELO string first; hence our confusion.

Implementators should know this would be a high DNS waste and overhead suggestion.

The optimized approach is to delay any DNS query applications and first capture the SMTP process field parameters to determine what augmented DNS applications apply, what needs be queried and calculated. For example, SMTP has offered guidance in this area for delaying the reverse-path (MAIL FROM) processing until the forward-path (RCPT TO) is known:

   SMTP Section 3.3 Mail Transactions

   .....

   Despite the apparent scope of this requirement, there are
   circumstances in which the acceptability of the reverse-path may
   not be determined until one or more forward-paths (in RCPT
   commands) can be examined.  In those cases, the server MAY
   reasonably accept the reverse-path (with a 250 reply) and then
   report problems after the forward-paths are received and
   examined.  Normally, failures produce 550 or 553 replies.

HELO/EHLO has historically been known to be incorrect for many reasons. At best, the receiver can perform a field syntax check including a required bracketed IP Domain literal check to make sure it matches the connection IP address before doing anything else and allowing the next SMTP state to continue.

The reality is that SMTP receivers are not going to know the DMARC status of an incoming anonymous client until the DATA payload is received. It doesn't need DMARC information for SPF -ALL rejection policies. SPF -ALL policy SHOULD be processed immediately before DATA. But I think DMARC wants you further delay SPF processing until DATA payload is received (for reporting reasons I suppose).

Since it can be potentially high overhead of getting a payload with no DMARC information, SPF receivers may not wait until DATA is received to process SPF.

Incidentally, SENDER-ID [1] resolve this DATA overhead potential issue with the SUBMITTER optimization [2] where the PRA (Purported Responsible Address) [3] was passed to the MAIL FROM state:

  MAIL FROM:<return-path> SUBMITTER=pra

This tells the SPF processor that the pra DOMAIN is the lookup domain.

DMARC can borrow from such ideas to pass the 5322 Author Domain (DMARC domain), and better yet even pass the policy as well to help optimized the receiver:

  MAIL FROM:<return-path>[ DMARC=author-domain[ DMARC.P=reject]]

This DMARC ESMTP idea would probably only work if there is a TRUST that the that payload is DKIM signed correctly using the problem 5322.From address.


--
HLS


[1] https://tools.ietf.org/html/rfc4406
[2] https://tools.ietf.org/html/rfc4405
[3] https://tools.ietf.org/html/rfc4407


_______________________________________________
dmarc mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to