On 1/20/21 2:56 PM, Murray S. Kucherawy wrote:
On Wed, Jan 20, 2021 at 1:21 PM Michael Thomas <[email protected] <mailto:[email protected]>> wrote:

    I just scanned through DMARC and I couldn't find any security
    requirements/mechanisms for the failure reports. I would think at the
    very least the receiver consuming the reports ought make certain that
    the report at the very least have either a valid DKIM signature or
    a SPF
    pass. Unauthenticated data is always the source of mischief, and I'm
    sure that there have to be attacks that are possible with
    unauthenticated reports. At the very least this should be a security
    consideration, and most likely should have some normative language to
    back it up.


I thought the usual rules about when you should or shouldn't trust a message ought to be applied, but I guess we never actually said that in the document.  We certainly could.


DKIM is pretty nebulous about what it's results should used for, but as an authentication mechanism for another protocol it seem like it would be good say that explicitly. In this case it's a little more complicated since the thing processing the reports is almost certainly not at the boundary MTA verifying signatures.


    Since I'm sort of new, it's been unclear to me whether whether
    having a
    new https transport mechanism is in scope or not -- it seems to
    come up
    pretty often -- but I'm not sure how people would propose to
    authenticate the report sending client. That seems to me to be a
    basic
    security requirement for any new delivery method. The problem here is
    there isn't a client certificate to determine where the report is
    coming
    from or any other identifying mechanism. An alternative might be
    to DKIM
    sign the report itself, but the long and short is that it would
    need to
    be addressed.


As I recall DMARC originally (in its pre-RFC versions) did have "https" as a supported scheme for "rua", but since nobody implemented it during the years DMARC was in development, it got dropped before publication.


So is it in scope or not? It's confusing if it's not because there seem to have been several open tickets about it.

Mike

_______________________________________________
dmarc mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to