On 5/17/2015 2:29 PM, Hector Santos wrote:
Scanning and Reading DMARC reports, I see there are many reports from
an "OpenDMARC Filter" which includes testing for "dkim-adsp" and
"dkim-atps" protocols.  An example Auth-Res:

Authentication-Results: ****************.net;
  dkim=pass (1024-bit key; unprotected) header.d=ietf.org
[email protected] header.b=ftopcwZG;
  dkim=fail reason="signature verification failed" (1024-bit key;
unprotected) header.d=isdg.net
       [email protected] header.b=hi8lLzuw;
  dkim=fail reason="signature verification failed" (1024-bit key;
unprotected)
      header.d=beta.winserver.com [email protected]
header.b=mQTSS3bH;
  dkim-adsp=fail (unprotected policy); dkim-atps=neutral

The dkim-atps result is neutral because RFC6541 requires two tags to
be added to the DKIM-Signature in order to trigger the atps call:
'
     adps=author-domain;  atpsh=sha1;

Anticipating some future need to add "user tags" to the DKIM signing
engine:

# USER DEFINED TAGS:
#
# The UserTags are experimental. They are additonal signed "tag=value;"
# information added to the signed signature.  The tag MUST NOT conflict
# with an DKIM standard tag.

I was able to add the above user tags for outbound mail.  In theory,
those OpenDMARC Filter engines with DKIM-atps SHOULD find an atps
record for the ietg.org 3rd party list resigner, which we have for our
isdg.net zone file:

pq6xadozsi47rluiq5yohg2hy3mvjyoo._atps TXT    ( "v=atps01; d=ietf.org;" )

This is a test message to feed the OpenDmarc Filter Engines.


Got the report results from one and it still shows dkim-atps=neutral.

Authentication-Results: jacobrideout.net;
dkim=pass (1024-bit key; unprotected) header.d=ietf.org [email protected] header.b=Cy3wnoYE; dkim=fail reason="signature verification failed" (1024-bit key; unprotected) header.d=isdg.net [email protected] header.b=SdvOmLRx; dkim=fail reason="signature verification failed" (1024-bit key; unprotected) header.d=beta.winserver.com [email protected] header.b=YWq3W7JC;
 dkim-adsp=fail (unprotected policy); dkim-atps=neutral

I can't tell why it would fail, but here's the problem with ATPS-RFC6541, the version as an DKIM signature tag extension. The failure of the DKIM-signature d=isdg.net which has the extra "atps=" and "atpsh=" tags causes the verifier to see the signature as invalid and ignored as if it never existed.

So ATPS will not be activated because the resigner destroyed it.

This is why ATPS-Rev04 which was a ADSP extension works because the "atps=" tags would be off the policy record instead.

--
HLS


_______________________________________________
dmarc mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to