On March 18, 2024 3:15:42 AM UTC, "Murray S. Kucherawy" <superu...@gmail.com> 
wrote:
>On Mon, Mar 18, 2024 at 1:08 PM Dotzero <dotz...@gmail.com> wrote:
>
>>
>> Add this to 11.1 Authentication Methods
>>>
>>>
>>> Both of the email authentication methods that underlie DMARC provide
>>> some assurance that an email was transmitted by an MTA which is
>>> authorized to do so. SPF policies map domain names to sets of
>>> authorized MTAs [ref to RFC 7208, section 11.4]. Verified DKIM
>>> signatures indicate that an email was transmitted by an MTA with
>>> access to a private key that matches the published DKIM key record.
>>>
>>> Whenever mail is sent, there is a risk that an overly permissive source
>>> may send mail which will receive a DMARC pass result that was not, in
>>> fact, authorized by the Domain Owner. These false positives may lead
>>> to issues when systems interpret DMARC pass results to indicate
>>> a message is in some way authentic. They also allow such unauthorized
>>> senders to evade the Domain Owner's requested message handling for
>>> authentication failures.
>>>
>>
>> I have a problem with this 2nd paragraph and believe it is factually
>> incorrect. The Domain Owner has in fact authorized the message(s) as a
>> result of an overly permissive approach. I would suggest that in fact any
>> resulting DMARC pass is technically NOT a false positive because it is
>> authorized by the overly permissive approach..
>>
>>
>It's a false positive in the sense that the result is not what the Domain
>Owner probably wanted to have happen.
>
>It is not a false positive in that the technology did exactly what it was
>supposed to do; i.e., this is not a bug.
>
>We should just be clear about this.
>
>-MSK, p11g

I agree.  I think John's proposed text is appropriate for this.

Scott K

_______________________________________________
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to