On Sun 11/Dec/2022 21:43:51 +0100 Douglas Foster wrote:
ARC can prevent a message from being blocked by DMARC policy, but its usefulness is limited because the mailing list receives no feedback and munging is never suspended.


There seems to be consensus to specify an unspecified type in aggregate reports that can be used to report ARC, BIMI, or whatever. This saves the WG the task to specify how to report ARC. However, it raises the question of how to determine report recipients.

Current aggregate reports provide for a *reported domain*. ARC provides for reporting one or more domains' identifiers, signed by a (different) domain.


Outlook.com has a curious implementation of ARC.   Their servers apply an ARC signature to every message, asserting SPF PASS, DKIM PASS, and DMARC PASS, without regard to whether the message even has a DKIM signature.  It appears to me that they are trying to document and sign the original identifiers for a message, which actually seems like a desirable thing to do.   Since ARC only captures identifier information as an ancillary component of a test result, they must assert bogus test results to accomplish this result.


s/curious/buggy/


ARC should provide a way for any server to document the current state of identifiers, whether a test is performed or not.  Better yet, a server which knows that it is making identity changes should be able to document before and after values in a single ARC set.


No test, no state to be reported.

A seal can be applied irrespective of changes. The AAR contents should be the results obtained on message reception, methinks.


With this change, we have a way to integrate ARC and DMARC with feedback, in a way that begins solving the mailing list problem.

- The mailing list publishes a DMARC policy and signs outgoing messages with its domain.

- When an author domain's DMARC policy is a problem, the MLM munges the FROM address to its domain.  This also causes the list domain to receive aggregate reports on the munged messages.

- If the receiving system trusts the ARC data, it can reliably restore the From address to its unmunged value, using data from the ARC Set.   Then the unmunged message is delivered to the recipient user.   The disposition data of the aggregate report is used to communicate to the mailing list that the ARC data was trusted and the From address was unmunged.


Restoring From: presents the same problem that Barry raised in the other list about removing DKIM signatures. That is, one must beware to act after any possible transparent forwarding has fired. To cover MUAs doing transparent forwarding, From: restoring must in turn be reversible.

The other problem is that every list saves the original From: in a different way, so restoring it is not straightforward.


- If the receiving system does not trust the ARC data, current behavior is unchanged.  The munged message passes DMARC based on the munged address, and the message is not obstructed by DMARC FAIL.


Trust should be granted by the message recipient, not the receiving system.


Best
Ale
--





_______________________________________________
dmarc mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to