On Wed 27/Jan/2021 17:17:38 +0100 John R Levine wrote:

While [loops are] a minor problem for aggregate reports, it can be a real problem for naive failure reports generators.  Juri reported he had to target a specific address, attributing the loop to a remote misconfiguration. However, if it is possible to screw up authentications, the probability to meet a loop is just its square, times the number of generators.

If the authentication is screwed up, sending a failure report is exactly the right thing to do.  That's what they're for.


Even if the screwed up message was a failure report itself?


I think we should close this.  DMARC is working the way it is supposed to, and people don't want to get reports about their reports, there are obvious ways to prevent them, like not sending unaligned reports,


Oh, there is a sentence in the current spec:

   Email streams carrying DMARC feedback data MUST conform to the DMARC
   mechanism, thereby resulting in an aligned "pass" (see Section 3.1).

As it stands, it's valid for both aggregate and failure reports. However, it happened to land on the aggregate-reporting I-D only.


or sending reports from a domain that doesn't get reports back.

That was one of the hints I proposed.  Your wording is better.  Added this:

3.3.  Transport

   Email streams carrying DMARC failure reports MUST conform to the
   DMARC mechanism, thereby resulting in an aligned "pass".  Special
   care must be taken for authentication, as failure to authenticate
   failure reports may result in mail loops.  Besides rate limiting,
   such loops can also be avoided by sending reports from a domain that
   doesn't get reports back.

Is that all right?


Best
Ale
--











_______________________________________________
dmarc mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to