OLIVIER HUREAU wrote on 2023-07-24 11:20:
 > c) There is a pattern of similar looking reports, which omit the <dkim>
element in the <auth_results> altogether and always report
<dkim>fail</dkim> in the policy result. I suspect a product, which makes
it a bit too easy to enable DMARC validation without also enabling DKIM
verification, but I wasn't able to identify the product yet.

[...]

According to XML definitions, the position cannot be swapped and theDKIMAuthResultType (if there is one) must appear before the SPFAuthResultType.
However, some reporter does not follow this implementation.

E.g: the no longer maintained Linkedin dmarc-sys :
https://github.com/LinkedInAttic/dmarc-msys/blob/master/dmarc_report.py#L240 
<https://github.com/LinkedInAttic/dmarc-msys/blob/master/dmarc_report.py#L240>where
 SPFAuthResultType appears before DKIMAuthResultType.

Are you talking about the same error?

Good catch. These are two different issues, though.

In the issue I mentioned, the mail receiver performs DMARC validation and sends an aggregate report, but does not perform DKIM verification even though the mail has a DKIM-Signature.

I think the following screenshot offers an explanation of what causes the issue:
<https://dmarcian.com/wp-content/uploads/2023/02/Cisco-ESA-Maal-Flow-Policies-update-defaults-1024x611.png>
The admin GUI of a mail gateway offers the option to deactivate DKIM verification (next to DKIM signing), thus some people click it by accident or by lack of understanding. Not an issue that can be fixed by the DMARC spec.

Regards,
Matt

_______________________________________________
dmarc mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to