On 6/14/2019 5:58 PM, Дилян Палаузов wrote:
Hello Ken,

effectively I proposed handling p=reject and p=quarantine the same way.

..

Lets have an example for p=quaranite:
 majordomo@domain is an address where commands are sent and the software 
receiving the
 command always sends an answer, even if the command is unclear.  An email is 
sent
 to majordomo@domain.  The sending domain has published policy Quarantine.  
This address
 has no spam/junk folder attached to it.  The options for an email are:
  * reject the email during the SMTP dialog
  * accept the email and let majordomo send an answer to it
  * arrange a human to decide which emails to discard (handle an imaginary Spam 
folder for the account).

Oh I see your concern/point/proposal now.

Yes, I highlighted this basic issue in years past in regards to the handling semantics debates. Even with SPF, how -ALL (FAIL) was interpreted and handled was questioned. Some believed a -ALL FAIL policy is more like a quarantine because "no one actually rejects."

But overall, this would be an implementation consideration, not a protocol design consideration. The protocol is correct to have a handling semantics describing both ideas - reject and quarantine.

All we can do is highlight the existence of backend mail storage designs and legacy MUA protocol(s) that can not handle a quarantine safely. So at best, you can basically highlight the security design concerns and possible requirements to implement a quarantine concept.

There is much mail design history and evolution to consider. The concept of quarantine came with the integrated mail design premise that:

- The backend offers user folders or separate mail streams for normal in-box mail and quarantine, spam, junk mail separations. While this is common today for ESPs, this was not always the case for all backend designs. It was often proprietary in nature. No standard here unless we assume everyone using an "Microsoft Exchange" (MAPI) concept or IMAP which is not reality. This coincides with the premise,

- The broad range of online and offline MUAs all support the multi-folders provided by the backend. This is again not reality and not always the case.

I'll give you a perfect example -- POP3.

POP3 is a single mail stream pick up protocol standard. So for a backend that provides POP3 service available to its customers and for the user using MUA with POP3 support, the backend POP3 server MUST NOT merge any suspicious, spam, junk or quarantine mail with the user's normal in-box mail pick up stream.

While an advanced POP3 backend server can emulate a single stream consolidation of multi-user folders, it would a major security loop hole to expose POP3 users to quarantined mail merged into the user's pop3 mail stream. For this to work securely, this advanced POP3 server must assume the MUAs are advanced enough or users are advanced enough to write MUA scripts that will separate the single pop3 stream into spam, junk and quarantine folders again.

All we can do is highlight how "rejects" can be interpreted differently. After much discussion with SPF, while it didn't provide an specific example using POP3, it was generically described under Local Policy Considerations:

   https://tools.ietf.org/html/rfc7208#appendix-G.2

It should also be highlighted for DMARC-bis, if not already.

--
HLS


_______________________________________________
dmarc mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to