On 6/14/2019 9:34 PM, [email protected] wrote:

The suggestion: provide guidelines on data integrity, which data
providers should follow.
Examples:
- raw SPF 'fail' should never result in DMARC-SPF 'pass'
- raw SPF 'pass' out of alignment with header_from should never result
in DMARC-SPF 'pass'
- raw DKIM not being shown should never result in DMARC-DKIM 'pass'
etc

I'm not saying that these situations don't occur for legitimate
reasons, but the DMARC result is a logical evaluation.  If the result
of that evaluation is other than the receiving system wants to apply,
then all of the correct evaluations should still be listed, but the
disposition can change, and local_policy explain.

Is this something which can be simply stated in the specification, or
would it belong solely in a 'DMARC XML generator BCP' document?

Reasons for sending reports?

What I think you are saying is:

If a domain's DMARC restrictive policy is going be overridden by local DMARC policy, then a DMARC report should be sent to the DMARC domain providing the DMARC technical reasons why DMARC failures were not rejected but instead accepted and passed to the user's eyeballs or quarantined?

I think I would interesting to know which DMARC receivers are accepting what are otherwise DMARC rejectable failures. A lawyer might be interested too, in the off chance an innocent user was damaged by the receiver's local DMARC policy. The DMARC domain did its part. The DMARC receiver did not. <g>

--
HLS


_______________________________________________
dmarc mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to