PRA was not donated to anyone.  Licensing terms for it was what blew up MARID.

It's not helpful here, let's move on.

Scott K

On August 4, 2023 2:01:14 PM UTC, Hector Santos 
<hsantos=40isdg....@dmarc.ietf.org> wrote:
>Overall, DMARCbis has a “SPF comes before DMARC” conflict where SPF can 
>“preempt” DMARC.  
>
>The implementation suggestion is leveraging an existing ESMTP extension 
>capability to obtain the DMARC policy at SMTP for one reason - to help DMARC 
>fit better with SMTP-level SPF processing.  Otherwise DMARC has an 
>implementation design presumption that SPF+DMARC will always be processed 
>together and this is not always true.   
>
>The SUBMITTER/PRA was a patented (donated to the IETF Trust) optimizer for the 
>payload version of SPF called SenderID by passing the extracted PRA “Purported 
>Responsible Address” with the reverse-path. I know this. Enable the ESMTP 
>extension and your receiver will see many transactions come in submitter 
>information.  So it is still being used.
>
>Does have both data points (Reverse-Path, PRA)  available at SMTP MAIL FROM 
>state help?   
>
>I was not thinking using it for SenderID (SPF is sufficient, long decided) but 
>using it for DMARC purposes.
>
>Currently,  my mailer has a SPF Reject Before Data out of the box logic.  To 
>support DMARC,  do I delay SPF rejection?   One way for me to support existing 
>operations and DMARCbis would be to get the DMARC policy, if any, to see if 
>there is an overriding “auth=dkim” tag or maybe a “p=none” thus overriding the 
>SPF reject at SMTP and continue with the payload transfer overhead where DKIM 
>can be evaluated.   
>
>That is basically it.  
>
>DMARC has an implicit design, "To be compliant with DMARC,  Receivers SHOULD 
>NOT reject with SPF before DMARC can be evaluated.”  It is predictably ignored 
>by many receivers, in particular by systems long existing with SPF and have 
>not put all their marbles in an DMARC yet. 
>
>Fortunately, DMARCbis already mentions the possibility for DMARC domains to be 
>aware of - SPF can be processed first and preempt any DMARC processing.  I 
>believe it is sufficient and there is no real need to go further with a 
>possible implementation note for adventurous explorers.
>
>Thanks
>
>—
>HLS
>
>
>
>> On Aug 4, 2023, at 5:27 AM, Alessandro Vesely <ves...@tana.it> wrote:
>> 
>> On Thu 03/Aug/2023 21:15:57 +0000 Murray S. Kucherawy wrote:
>>> On Thu, Aug 3, 2023 at 10:39 AM Hector Santos <hsan...@isdg.net 
>>> <mailto:hsan...@isdg.net>> wrote:
>>>> [...]
>>>> 
>>>> However, at present, the most plausible use-case appears to be the 
>>>> addition of delayed SPF rejection scenarios through DMARC evaluation. 
>>>> Essentially, SUBMITTER/PRA serves as an optimizer and a mechanism to 
>>>> soften the impact of SPF -ALL policies.
>> 
>> 
>> I agree with Mike about SUBMITTER/PRA.  However, while I disagree with 
>> Dave's proposal to use Sender: instead of From:, some kind of advice could 
>> still be derived therefrom.
>> 
>> 
>>>> The approach might work as follows:
>>>> 
>>>> - If SPF fails and the Submitter indicates p=reject, then reject (comes 
>>>> with its acceptable problems)
>>>> 
>>>> - If SPF fails, the Submitter specifies p=reject and auth=dkim, then
>>>> proceed to transfer the payload and evaluate DKIM
>>>> 
>>>> - If SPF fails and the Submitter signifies p=none, then continue with
>>>> payload transfer
>> 
>> 
>> That seems gratuitous (assuming Submitter=Sender:'s domain).  If I publish 
>> p=none but SPF -all it still means reject (up to whitelists) unless the 
>> receiver follows DMARC advice of disregarding SPF policy, but then that's 
>> based on From:, not Sender:.
>> 
>> 
>>>> - If SPF fails and the Submitter designates p=quarantine, then proceed
>>>> with payload transfer
>>>> 
>>>> SUBMITTER may help align SPF with its original DMARC purpose—combining
>>>> SPF+DKIM results while keeping with some level of optimization.
>>> Ah, interesting.
>>> I don't think this should go in the base document, since the research we
>>> did for RFC 6686 suggests that deployment of SUBMITTER, at least as of that
>>> document's publication, wasn't very broad.  However, if the size of the
>>> problem is substantial, and this solution turns out to be potentially
>>> effective, this might be fodder for the applicability statement or usage
>>> guidelines document that this WG has discussed producing in the past as a
>>> possible enhancement.
>>> Collecting some data and doing some experimentation would be really helpful
>>> toward determining the right path here, if any.
>> 
>> 
>> Evaluating Sender: doesn't help whitelisting rejection before DATA.
>> 
>> The message I'm replying to has:
>> 
>> Return-Path: <dmarc-boun...@ietf.org <mailto:dmarc-boun...@ietf.org>>
>> Sender: "dmarc" <dmarc-boun...@ietf.org <mailto:dmarc-boun...@ietf.org>>
>> 
>> To find the added value of Sender:, we'd be looking for a class of 
>> forwarders, not mailing lists, where these identifiers differ.
>> 
>> 
>> Best
>> Ale
>> -- 
>> 
>> 
>> 
>> 
>> 
>> 
>> 
>> _______________________________________________
>> dmarc mailing list
>> dmarc@ietf.org <mailto:dmarc@ietf.org>
>> https://www.ietf.org/mailman/listinfo/dmarc
>

_______________________________________________
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to