Don't quite get it, Scott. There is no DMARC record so the transaction would be "DMARC indeterminate" -- no DKIM signing policy.

If it did have a DMARC record, in order for this transaction to DMARC pass, it would require relaxed alignments for SPF and DKIM:

   adkim=r
   aspf=r

Correct?

subdomains has more inherent "trust" than having completely different main domains. The problem of course, DMARC excludes this legitimate 3rd party signer possibility in its protocol.

--
HLS

On 3/30/2015 2:35 PM, Scott Kitterman wrote:
I just ran across this one today in a third party non-spam email:

Return-Path: <[email protected]>
...
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed;
         d=email.mindbodyonline.com;
         h=from:to:reply-to:subject:mime-version:content-type; s=smtpapi;
...
Received: from o2.email.mindbodyonline.com (o2.email.mindbodyonline.com
[74.63.194.59])
...
From: "$CUSTOMER_FRIENDLY_NAME" <[email protected]>
To: $DELIVERY_ADDRESS
Reply-To: "$CUSTOMER_FRIENDLY_NAME" <$CUSTOMER_ADDRESS>

I know we've discussed this kind of thing before, but it's  the first time I've
noticed it in the wild (not that I've been looking really hard).  They don't
have a DMARC record published, so this may be in response to some other
driver, but it works for DMARC:

SPF passes and aligns
DKIM passes and aligns.

Since they are using their own 5322.From, there's no issue with third party
DMARC records.

Scott K

_______________________________________________
dmarc mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dmarc




_______________________________________________
dmarc mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to