On Mon 24/Oct/2022 22:30:06 +0200 Douglas Foster wrote:
If there is detailed ARC reporting, the only target should be the forwarder, as the message originator and domain owner are not parties to the ARC process. Consequently, ARC reporting cannot be part of the aggregate report going to the domain owner.

To send reports to the ARC domain owner, we will need a DNS token for them to request those reports.   This could be a new token in the DMARC policy record, if we can assume that forwarders would be willing to publish a DMARC policy to also obtain ARC reports.

Given the trust issues around ARC, I think only acceptance events should be reported to the ARC domain.

The message's domain owner can get a status of "accepted by local policy," with a code for ARC as the supporting reason.  This is equivalent to "redeemed" but less disruptive to installed base.  I see no reason to give him anything more.


A bank, say, can be interested in knowing who forwards its messages and whether they are trusted as forwarders. It is the very same kind of business that allows the bank to have feedback about affiliated forwarders —those whose public key is published in the bank's zone.

DMARC looks up records based on the domain in an email address, not on a signature's d=. BTW, the d= and authserv-id domains of an ARC set can well be three distinct domains.

Let's consider a message from someone@A, munged as someone@B, forwarded by C. The message contains various signatures and a long ARC chain. A report generator prepares a row where this message is aggregated according to the authentication status of the evaluated tokens. If we extend DMARC linearly, besides the address at _dmarc.B —the munged From: domain— we can include the same row in the report sent to the address found at _dmarc.C where C is the domain in Sender:, notwithstanding Appendix A3.

By the same token, we could consider _dmarc.A if there was an Author: domain pointing there. We can say that while From: defines message ownership, Author:, Sender, and possibly Resent-From: claim some interest in the message and the aligned authenticator(s). Or do we look up DMARC records at the d= domains?


Best
Ale
--





_______________________________________________
dmarc mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to