Barry Leiba wrote on 2023-06-10 01:50:
That's interesting and disturbing if it remains consistent.
Theoretically, DKIM should *never* fail when SPF succeeds, so if
that's happening it means there is:
1. bad signing software,
2. bad verifying software,
3. misconfiguration somewhere,
...or a combination of those three.

I would *really* like to see a current study of this, because I think
it's critical for the future viability of DMARC, whether or not we
accept the proposal to remove SPF.
Not a study, but some data points I've observed:

a) Signing with 3072-bit RSA leads to DKIM verification failures, because a popular mail gateway product (Cisco ESA) does not support RSA key lengths larger than 2048 bit.

b) Messages are generated by an automated system without a Date header and signed by a central MTA. An outgoing mail gateway then adds the missing Date header (Postfix option 'always_add_missing_headers'), thus invalidating the DKIM signature.

Such misconfigurations go unnoticed for years until someone checks the DMARC reports. While aggregate reports are incredibly helpful, it is still difficult to identify the cause of subtle DKIM failures. I'd wish that the <human_result> field would be filled by reporting software with the DKIM verification error message ('body hash did not verify', etc.) to aid with troubleshooting.

Contacting the report <email> or postmaster address has never worked for me: if they don't bounce, nobody replies.

c) There is a pattern of similar looking reports, which omit the <dkim> element in the <auth_results> altogether and always report <dkim>fail</dkim> in the policy result. I suspect a product, which makes it a bit too easy to enable DMARC validation without also enabling DKIM verification, but I wasn't able to identify the product yet.

Regards,
Matt

_______________________________________________
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to