Folks,

By way of trying to expand on the discussion about requirements for ARC to /exit/ Experimental status and enter standards status/document status...

Internet Mail is a global store-and-forward service with many independent operators. Most Internet Mail is subject to rather simple operational scenarios, because most Internet Mail travels between a very small number of very large operators. Their email exchanges essentially appear to be one-hop between originating provider and receiving provider. This statistical bias is misleading and creates a perception of straightforward operational behavior and requirement.

The full range of global email service has more operators and more handling complexity -- producing more interaction effects -- than the dominant environments demonstrate. Note that the expanded use of DMARC, into consumer-to-consumer mail, provides an unfortunate example of this effect: not many problems amongst the very large operators but very serious problems for some others, such as users of independent mailing lists.

ARC produces a /chain/ of signatures. There is essentially no operational experience doing this in real time in the operational Internet. We need to learn what dependencies and what fragilities are relevant to its use.

DKIM has demonstrated that a single signature can be broken by a number of existing handling scenarios, such as within some operational enterprises and through most mailing lists. It is therefore entirely plausible that sending a message through multiple, independent operators that are performing ARC signing will also produce breakage -- although the ARC design is explicitly intended to minimize this risk.

This is worth emphasizing: email is an essential infrastructure service and ad hoc expansion of the policy scope for DMARC -- another authentication-related mechanism -- has produced significant operational problems. While it is possible that ARC will not demonstrate such problematic effects, it is also possible that it will. We should approach this issue with due caution.

TIn terms of what it validates, the role of ARC signatures is quite different from the role of SPF or DKIM validations. The nature of this new role seems to be a form of 'transitive trust', which unfortunately is not encouraging: my understanding is that operational experience with mechanisms relying on transitive trust -- especially across multiple, independent administrations -- has been problematic.

Integration of new types of validation information into email filtering engines has a learning curve. So far, experience is with a tiny number of very large operators. This sort of activity is amenable to special-case, manual configuration, which unfortunately does not expand into general, large-scale operation for most/all operators in the global Internet.

Therefore, experimental experience with ARC needs to:

1. Demonstrate use across a 'significant' range of different email sending software, receiving software, mailing list packages, mailbox operators and mailing list operators.

     2. Demonstrate robust survival of ARC signatures.

     3. Demonstrate useful error reporting behaviors.

4. Demonstrate stable operational integration into mail filtering engines, subject to a 'significant' array of usage policies -- or demonstrate industry consensus on a small, stable set of policies.

(Vocabulary such as significant and robust and useful are intentionally vague. Or rather, intentionally subjective. Determining the specifics that will satisfy them is up to the working group and IETF management.)

When these demonstrations are made, it will be possible to write a usage BCP that has rich and useful guidance for those wishing to deploy ARC.

d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net

_______________________________________________
dmarc mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to