Below is my participant review of draft-ietf-dmarc-dmarcbis-15.  I
have two other change proposals that are more substantive and go
beyond "review comments", so I will post those separately for Todd to
track as issues and for further working group discussion.

— Section 1 —

   Abusive email often includes unauthorized and deceptive use of a
   domain name in the RFC5322.From header field.

This would benefit from a reference.  Maybe reword it this way, to set
up for subsequent uses?:

NEW
   Abusive email often includes unauthorized and deceptive use of a
   domain name in the “From” header field, defined in section 3.6.2
   of [RFC5322] and referred to as “RFC5322.From”.
END

   As with SPF and DKIM, DMARC classes results as "pass" or "fail".

I had to read this a few times to sort out the use of “classes” as a
verb (I was trying to parse it as a noun).  Maybe “classifies” or
“categorizes” instead?

   Therefore,
   reputation assessment of that stream by the mail-receiving
   organization is not encumbered by accounting for unauthorized use of
   that domain in the RFC5322.From field.

Does it make sense to put this in positive wording rather than negative, as:

NEW
   Therefore,
   reputation assessment of that stream by the mail-receiving
   organization can assume that the use of the domain in the RFC5322.From
   field is authorized.
END

— Section 2.4 —

   *  Attacks in the RFC5322.From header field, also known as "display
      name" attacks;

As it does deal with the addr-spec portion of RFC5322.From, maybe it
would be better this way?:

NEW
   *  Attacks in the display-name portion of the RFC5322.From header
      field, referred to as "display name attacks”;
END

— Section 3.2.3 —

   The term "owns"
   here indicates that the entity or organization being referenced holds
   the registration of that DNS domain.

Is holding the registration really the right angle?  If someone is
providing a service at example.org and gives out
barryleiba.example.org for my use, I could be the domain owner for
DMARC purposes, but I don’t “hold the registration”.  I might even
have complete control of the DMARC record for barryleiba.example.org.
Maybe “has legitimate control of the use of that DNS domain, most
often by holding its registration.” ?

— Section 4.2 —

   *  Of all the identifiers that are part of the message itself, this
      is the only one guaranteed to be present.

I think I would say “required”, rather than “guaranteed”.

   *  Many high-profile email sources, such as email service providers,
      require that the sending agent have authenticated before email can
      be generated.

“has” authenticated, for agreement with “the sending agent”.

   *  The absence of a single, properly formed RFC5322.From header field
      renders the message invalid.

I suggest:

NEW
   *  The absence of a single, properly formed RFC5322.From header field
      renders the message invalid — non-compliant with [RFC5322].
END

— Section 4.4.1 —

   DMARC requires Identifier Alignment based on the result of a DKIM
   authentication because a message can bear a valid signature

“based on” seems odd here.  Maybe:

NEW
   DMARC requires that Identifier Alignment be applied to the result of
   DKIM authentication because a message can bear a valid signature
END

— Section 4.4.2 —

   DMARC permits Identifier Alignment based on the result of an SPF
   authentication.  As with DKIM, Identifier Alignement can be either
   strict or relaxed.

Same comment as above.  Also, is “permits” right here?  Isn’t
alignment required either way — don’t we always have to make sure that
the authenticated MailFrom is aligned with the RFC5322.From?

— Section 5.5.2 —

I suggest adding more information here as follows:

ADD
   While it is possible to secure a DMARC pass verdict based on only SPF
   or DKIM, it is commonly accepted best practice to ensure that both
   authentication mechanisms are in place in order to guard against
   failure of just one of them.  This is particularly important because
   SPF will always fail in situations where mail is sent to a “forwarding”
   address offered by a school or other institution, where the address
   simply relays the message on to the recipients current “real” address.
   Many recipients use such addresses, and with SPF alone, and not DKIM,
   messages sent to such users will always produce DMARC fail.

   The Domain Owner SHOULD choose a DKIM-Signing domain (i.e., the
   d= domain in the DKIM-Signature header) that aligns with the Author
   Domain.
END

— Section 5.5.4 —

   Once SPF, DKIM, and the aggregate reports mailbox are all in place,
   it's time to publish a DMARC record.  For best results, Domain Owners
   SHOULD start with "p=none", with the rua tag containg a URI that
   references the mailbox created in the previous step.

I think this is a “should”, not a BCP 14 “SHOULD”.  And maybe
highlight the connection to the next section, as:

NEW
   Once SPF, DKIM, and the aggregate reports mailbox are all in place,
   it's time to publish a DMARC record.  For best results, Domain Owners
   should start with "p=none" (see Section 5.5.5), with the rua tag
   containg a URI that references the mailbox created in the previous step.
END

— Section 5.7.2 —

   5.  Conduct Identifier Alignment checks.  With authentication checks
       and policy discovery performed, the Mail Receiver checks to see
       if Authenticated Identifiers fall into alignment as described in
       Section 4.4.  If one or more of the Authenticated Identifiers
       align with the RFC5322.From domain, the message is considered to
       pass the DMARC mechanism check.  All other conditions
       (authentication failures, identifier mismatches) are considered
       to be DMARC mechanism check failures.

I find the last sentence to be confusing as part of the whole
paragraph, to the point where I’m not sure what it’s actually meant to
say.  If I have three DKIM sigs and an SPF check, the SPF check fails,
one of the DKIM signatures fails, and one of them is not aligned… but
the third DKIM signature validates and is aligned, then the DMARC
mechanism check passes (according to the third sentence).  What is the
fourth sentence trying to tell me here?

I worry that readers will think that those other failures make the
DMARC mechanism check fail, and bullet 6 gets a “fail”.

— Section 10.3 —

   *  Signing DNS records with DNSSEC [RFC4033], which enables
      recipients to detect and discard forged responses.

To differntiate what DNSSEC does and what, say, DoT and DoH do with
respect to response forging, I suggest this:

NEW
   *  Signing DNS records with DNSSEC [RFC4033], which enables
      recipients to verify the integrity of DNS data and detect
      and discard forged responses.
END

-- 
Barry

_______________________________________________
dmarc mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to