On 11/01/2024 18:15, Todd Herr wrote:
On Thu, Jan 11, 2024 at 11:51 AM Damien Alexandre wrote:

https://datatracker.ietf.org/doc/html/rfc7489#section-6.6.1

"The case of a syntactically valid multi-valued RFC5322.From field
presents a particular challenge. The process in this case is to
apply the DMARC check using each of those domains found in the
RFC5322.From field as the Author Domain and apply the most strict
policy selected among the checks that fail.”
[...]

DMARCbis has rewritten these sections and has text that you may find
helpful.

  The declaration in Section 5.7.1 and elsewhere in this document that
  messages that do not contain precisely one RFC5322.From domain are
  outside the scope of this document exposes an attack vector that must
  be taken into consideration. >
  Because such messages are outside the scope of this document, an attacker
  can craft messages with multiple RFC5322.From domains, including the
  spoofed domain, in an effort to bypass DMARC validation and get the
  fraudulent message to be displayed by the victim's MUA with the spoofed
  domain successfully shown to the victim. In those cases where such messages
  are not rejected due to other reasons (for example, many such messages
  would violate RFC5322's requirement that there be precisely one From:
  header), care must be taken by the receiving MTA to recognize such messages
  as the threats they might be and handle them appropriately.


A sensible behavior for a signing filter would be to replace multi-valued From: lines with ones having the first mailbox only and the phrase "et al." added to the friendly name. The original multi-valued From: can be saved to Author:. (Adding this to my TODO list).


Best
Ale
--









_______________________________________________
dmarc mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to