For nearly 10+ years we have discussed the same basic design issues. Nothing has changed other than the fact it is DMARC, as it is currently written as the replacement protocol for a DKIM POLICY SSP/ADSP framework, is very lacking intentionally. We don't have enough of the advocates we once had, pushing the COMPLETE DKIM POLICY FRAMEWORK concept. Either they got tired walked away, they saw can't beat a dead horse or realize the people in "IETF control" were pushing other ideas that were not necessarily wrong, but they PUT barriers up to support the AUTHOR domain framework.

We will not move forward in a major way until the 3rd party SIGNATURE authorization methodology is worked out. It was a thorn on the side then and it continues to be a thorn on the side today.

We have quite a few RFCs related to DKIM signature methodologies and we never did properly resolved it (3rd party signers) because the key folks running the show were pushing a 3rd party TRUST methodology. They were militarily adamant about making sure the AUTHOR domain would not be dictating anything, hence the DKIM myth the AUTHOR DOMAIN was not related to the DKIM SIGNER AUTHENTICATION and AUTHORIZATION. That SEPARATION was impossible to ACHIEVE because the AUTHOR was a minimal hash binding requirement.

But today, the TRUST part has gone no where, i.e. VBR was the closest thing to a DKIM TRUST model (we support it, do you?). It was AUTHOR POLICY that has prevailed but DMARC crippled it by sticking with the same problems ADSP had.

Add 3rd party POLICY extensions and we will begin to get sensible software solutions again. We done it with ADSP/ATPS. So can large boys too with DMARC/ATPS. Add ATPS support or similar and we will begin to move forward with a framework for proper SOFTWARE CHANGE at the MLM.

Wasting too much time again. Just update ATPS for DMARC and get MURRY to support the idea and maybe we will get others to get it a try. But if he is going to continue to block it, talk negative about it, well, we have a technical marketing problem that is not representative of a good technical, plug and play, easier solution for DKIM SIGNATURE AUTHORIZATION PROTOCOL.

--
HLS

On 3/24/2015 4:38 PM, J. Gomez wrote:
On Tuesday, March 24, 2015 5:14 PM [GMT+1=CET], Stephen J. Turnbull wrote:

J. Gomez writes:

I think we are not talking about the same thing: when I said
"depends on DMARC's success", I meant "depends on DMARC's success
as an implemented technology in the real world", whereas it seems
you understood "depends on a successful DMARC check".

No, we are talking about the same thing.  What I am saying is that
DMARC is already a "success as an implemented technology in the real
world" by any reasonable standard, because it *does* work for exactly
the transactional mail flows you worry about.

I do not agree. As long a major ESPs downgrade p=reject to p=quarantine or even p=none on 
reception of email which fails DMARC checks from domains whose Owner has published 
p=reject, DMARC is little more than a reporting protocol as Vlatko Salaj has already said 
in another post to this list. Which is nice, but is not a "success as an implemented 
technology in the real world" for DMARC, because DMARC aims to be more than just a 
reporting tool.

I know for sure I will publish only p=none for my client's domains, and use 
DMARC only as a reporting tool, as long as DMARC's p=reject cannot be reliably 
relied on. But I would love to be able to reliably rely on DMARC's p=reject.

In fact, I think that if at the end of all this process we cannot find a way to 
make p=reject to be reliably relied on, then p=reject should be suppressed from 
the DMARC formal specification, as p=reject would effectively be equal to 
p=do-whatever-who-cares.

Regard,
J.Gomez

_______________________________________________
dmarc mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dmarc




_______________________________________________
dmarc mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to