On Wed 26/Apr/2023 13:21:33 +0200 Scott Kitterman wrote:
On April 26, 2023 8:08:39 AM UTC, Alessandro Vesely <[email protected]> wrote:
On Tue 25/Apr/2023 20:27:18 +0200 Scott Kitterman wrote:
My recollection is that a general formulation that I proposed had at least some traction out of both groups:

[some appropriate description] domains MUST NOT publish restrictive DMARC
policies due to interoperability issues

Leaving aside (for now) the question of what goes into [some appropriate description] and with the assumption that there will be some non-normative discussion to amplify whatever that is and probably give some indication about what domains might do to not be one of those domains, is there anyone who just can't live with that formulation of the situation?

Me, for one.  Because more than 98% of domains are going to fall into the 
description, however we word it, that statement makes the whole I-D 
nonsensical.  Cannot we just tell the problem without MUSTard?

In any case, using the complement of [some appropriate description] is 
certainly easier.  For example:

   Forcing authentication into Internet mail by publishing restrictive DMARC
   policies breaks some well established patterns of usage.  Publishing such
   policies is thus RECOMMENDED only for domains [in this other appropriate
   description].

Thanks.

I understand your objection to be that the proposed description of the 
interoperability problems would apply to too many domains, regardless of the 
modifier we might use.  Is that correct?


Nearly. Too many would be 40%. 98% is practically all. Indeed, we're talking of mailboxes used by humans...


I don't understand the technical issue associated with that objection.  I get 
that you feel the construction is too negative, but I don't have a sense you 
think it's inaccurate.  Focusing on the technical aspects of this, would you 
please help me understand what you think is technically incorrect about it?


Perhaps MUST NOT would have some sense if DMARC were breaking a well known protocol. The established patterns of usage we break are in turn breaking some other RFCs, aren't they?

Why would the applied workaround have less merit than the original hack, from a formal POV? I mean, if we stand by the letter of the protocols so much as to feel the need to say MUST NOT.


Best
Ale
--




_______________________________________________
dmarc mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to