On 6/3/2019 10:29 AM, Douglas E. Foster wrote:

So Sender Authentication needs to become mandatory:

  * Senders MUST implement SPF or DKIM,  and SHOULD implement both.
    Although the MX list becomes a default SPF list for those who do
    not publiish a policy.
  * MTAs MUST ensure that DKIM signatures remain verifiable.  If they
    are unwilling or uinable to do so, they should reject the message
    with a PermError.
  * Forwarders MUST either forward with breaking DKIM signatures,
    rewrite messages under their own identity, refuse the message, or
    discard the message as spam.
  * IETF MUST provide a way for intermediate systems (both spam
    filters and list fowarders) to insert content under their own
    signature, without breaking original signatures.    This will have
    implications for MUAs..

Sure it will be hard, but has this not been what you have been trying
to achieve for 15 years?  SPF and DKIM provided the enabling
technology, but they were deployed as sender options.

Hi Douglas,

It's ideal, but not the SMTP realities.

- In certain areas, some things are already "mandatory" depending on the business, for example, a Bank may be required by their auditor to use SPF Hard Fail -ALL policy in the same way a bank must be PCI compliant via the web which basically means SSL, session management and other security-related requirements.

- You can't enforce anything beyond legacy RFC821/5321 transactions under Port 25 SMTP operations. You can only raise the email bar with NON-PORT 25 operations like when using the Message Submission protocol (RFC6409) which is port 587. For example, the Extended SMTP (ESMTP) AUTH protocol is not required under Port 25. It is optional to implement and optional to use by the client. Under Port 587, ESMTP AUTH is a requirement among other things the receiver can enforce which are not required under port 25 operations.

- We can not have a mandate for DKIM POLICY because there is no official IETF standard here and even if there was, it would not be enforcible under Port 25. That's not the same as a domain having a restrictive policy, it fails and the receiver honors and rejects the mail. The Receiver can not enforce the sender to have a DKIM or any sort of policy above and beyond legacy SMTP port 25 operations. It can not reject a message on the basis the sender does not have SPF or DKIM or DMARC.

- Keep in mind, SPF Hard Failures are generally good enough and can be mutually exclusive of a restrictive DKIM Policy. For example, I just did some emailing with a bank which uses SPF -ALL (Hard Fail) but has no DKIM signature nor DMARC policy. For exclusive high value domains, an SPF -ALL is often good enough. Even if it had a DKIM/DMARC p=reject policy, how will that change a -ALL failure? Why would a bank override a SPF -ALL failure with with DMARC (or ARC) and raise the fussiness of the transaction? I am sure there is possible a scenario where a SPF -ALL defined IP is doing something different with the PAYLOAD and could fail a DKIM signature. But the reason you may see a domain with SPF -ALL and not DKIM is because it is good enough.

- Without port 25 operations, we would no longer be able to receive unsolicited messages from anyone, good or bad which is the blessing and the curse of standard SMTP port 25 operations.

The general rule of thumb for SMTP has been that for unsolicited mail from "unknown" addresses, authenticated and/or authorization is not required when targeting a local recipient or locally hosted domain. But for relaying mail (receiving a message to be routed, relayed to a remote target), some level of authentication is required and in the history of SMTP, that has been:

 - Having some form of an "Allow IP Relay" database/table.

Your network provider saves the connection IP in a table allowing for relay.

But as the roaming user problem began where the client's IP can change, an early method called POP B4 SMTP was common.

- POP b4 SMTP worked on the basis a MUA will generally pop first before sending email and this allowed a small temporary "Allow IP" window for the SMTP client to send mail. So the POP3 client connected to a host, the IP was saved while any new mail was picked up. If the MUA had mail to send out, the client IP would
   be known by the SMTP receiver and allow the client to relay mail.

This was a god-send for tech support before ESMTP AUTH came along and becamewide spread:

- ESMTP AUTH allows a way to login with ID and Password from anywhere. No IP required.

Since ESMTP AUTH is an extension for PORT 25, it is not requirement.

--
HLS


_______________________________________________
dmarc mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to