On 6/10/2019 4:17 AM, Alessandro Vesely wrote:
On Sat 08/Jun/2019 18:49:03 +0200 Dave Crocker wrote:

Except that most users don't actually see that address because these days most
MUAs only display the display address.


We often came across this realization.  Since DMARC hinges on that field, I
think the spec should include some advice to MUA implementation.

A trust on first use (TOFU) approach would seem to be possible.  On getting the
same display name linked to a different domain part, a user would be required
to configure the MUA's behavior for this particular name / domain.

Does this subject deserve a ticket?


Don't you think we might repeat and come to the same conclusions regarding MUA considerations in this regard?

The primary concern would be 5322.From "Display" spoofing with the theoretical Multiple 5322.From headers potential exploit. A 2010 proof of concept list message example was showed it was possible to contain a valid DKIM signature and with a spoofed From display from "President Obama:"

http://mipassoc.org/pipermail/ietf-dkim/2010q4/014680.html

This created a long threaded discussion, and if I recall, the topic was repeated a few years later where I believe we had a consensus this was a "RFC5322 Boundary Layer" issue where the MSA/MDA or the backend would be better at handling the RFC5322 "validity" of an inbound message. It would be a good idea for receivers to do RFC5322 checking anyway instead of "passing the buck" to the many different MUA vendors including the many legacy MUAs people still enjoy today.

If any protocol guidance is necessary here, IMO, it would be to repeat the suggestion for RFC5322 validity/security checks SHOULD be done at the backend to better protect the MUA end users using different Offline, Online and Hybrids models of MUAs. An inbound message with multiple 5322.From headers SHOULD be invalided, rejected or discarded.


--
HLS


_______________________________________________
dmarc mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to