On 5/5/2015 11:24 PM, Scott Kitterman wrote:

No.  It's fundamentally different.

For SPF, the managers of an ADMD need to determine their authorized outbound
email architecture.  That's in the hands of the administrators.  For these
email list registration proposals it's the mailing list proclivities of every
single user.

Scott K

It is fundamentally the same problem both DMARC and SPF has and I might even suggest, it may be even worst for SPF.

With SPF, users also have "proclivities" to roam around and send mail from unknown, "unregistered" machines. I wouldn't say "every single user" have the same behavior of being list members but most people do travel, and may use different IP devices with POP3/IMAP/SMTP.

With SPF, you still have almost all the very large "public service" domains such hotmail.com, yahoo.com, aol.com, msn.com, etc, who have not yet figured out their "SPF network" in order to be very restrictive.

If any of these domains, all of a sudden, turned on the -ALL rejection switch, oh my, we will see a tremendous amount of complaining as well.

For the domains that have locked it down with the hard fail, -ALL policy, they have made a very strong public DNS statement about limiting who can send mail on their behalf, just like Yahoo.com did with DMARC who is now telling the world via their SPF and DMARC policies:

    I don't know from where my yahoo.com are sending mail from,
    but I want to tell you, they all must be signed exclusively
    by yahoo.com

Yes, these are very much the same problem and I don't believe its right to be demoting technically sound protocols for the same "registration' problem that SPF still has with a long term prospect for collecting the network of machines in order to be able to publish restrictive policies.

We have two basic technical proposals.

The first one, the DNS CALL method, I view, as the absolutely baseline, proof of concept method. It will work, we know it. Its already in practice. Just put the data there and it will work if you add the logic to your policy check. This follows RFC5585 DKIM Service Overview guidelines.

The 2nd one, has the same 3rd party signer authorization purpose, but has more work with required changed DKIM code. It uses an in-band double signature method. It is theoretically less secure, but the theory here is that the signer will have a basic idea of the list domains to passively register via the message -- a unknown registration problem, perhaps a little less because it seemingly bypasses getting the DNS administrator and DNS network department involved.

The proper engineering compromising solution SHOULD be to offer both.

The idea of having a SAM or Signature Authorization Method or as Doug calls it "Specific Advisory Method" tag in DMARC, is a sound technical IETF way of resolving this problem that is agnostic to all parties.

  sam=tpa      use a third party DNS lookup method
  sam=levine   use levine's double signature idea

Personally, I would use the DNS method only because its cheaper to get to this planet, but if we really think the levine bypass will work as well, add it too.

I am just saying lets not lump everyone into the same DNS publishing/registration problem the hotmail.com, yahoo.com, aol.com, msn.com domains have. Others will not.

--
HLS


_______________________________________________
dmarc mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to