Below is a number of “minor issues and editorial comments” on dmarcbis-30. I
have a larger issue regarding the draft as a whole that I have yet to write
up and will post separately.
Thanks for the review even though I disagree with a fair amount of it.
2.1 High level goals
--------------------
PSOs: Define this abbreviation on this first use. Since it’s talking about a
public suffix, “the domain” doesn’t seem sufficient, maybe “the domain or
suffix”.
Right.
Side note: I’m very dubious about the allowances for DMARC records to be
published by public suffixes since the PSO is much less likely to know the
usage of the domains under it, and whether a policy like Reject is
appropriate. But I suspect the WG decided to include the public suffix
policies so this would be a relitigation.
PSDs were originally invented for .BANK and .INSURANCE which know exactly
what their registrants' policy should be because it's in the contract.
Beyond that, since we're not using the static PSL any more, the PSD flag
fixes some uncommon cases where the tree walk would otherwise get a wrong
answer. We debated this at extreme length and it ain't gonna change now.
2.4 Out of scope
----------------
Entities other than domains: Public suffixes aren’t (necessarily) domains,
Of course they're domains. What else could they be? The things that are
out of scope are IP addresses, ASNs, magic tokens in the messages, stuff
like that.
4.2 Use of RFC5322.From
-----------------------
Second bullet: “most MUAs display some or all of the contents of that field”.
I find this becoming less and less true. Many MUAs that I use, including
Apple Mail (iOS) and Outlook, display only the Display Name, which is not
authenticated at all as pointed out much later (11.4).
Perhaps it should say "can display". I agree you're more likely to see
the comment in the From header than the domain these days.
authenticates the individual sender. So the recipient would just be guessing.
Last paragraph: I don’t see a profile of RFC5322.From in section 5.7.
It's in 5.7.1, From with more or less than one domain is out of scope.
4.5 Flow Diagram
----------------
This diagram and accompanying explanation doesn’t help me at all.
“Solid lines”: Dashed lines, maybe?
We should redraw this in SVG with an explanation of what the different
kinds of arrows are supposed to mean.
4.6 DNS Tree Walk
-----------------
Step 2 starts talking about the psd flag without telling what it is. It would
be much better if this discussion came after the flags and their meanings was
introduced.
I’m concerned that some (admittedly rare) public suffixes with multiple
components are not well served by this algorithm, such as pvt.k12.ma.us.
I happen to run the registry for seneca.ny.us, watkins-glen.ny.us and
other local places and it seems fine to me. Can you give some examples?
What happens if a domain that is not a public suffix publishes psd=y, either
accidentally or maliciously?
Its subdomains might get the wrong organizational domain. This seems to
me a self-inflicted wound.
Side note: I got well into this document before I realized that DMARC is
publishing an assertion of being a public suffix. Some mention of that
belongs back in the introduction.
A what? It's only using PSDs as a way to figure out the org domain. We
certainly don't expect other users of the PSL to switch.
4.7 DMARC policy discovery
--------------------------
Paragraph 3: “domain does not exist”: How is that determined, NXDOMAIN,
NODATA? What happens with SERVFAIL (e.g., DNSSEC problem) or no response? And
if a domain really doesn’t exist, isn’t that a reason to reject “with
prejudice”?
As it says later, error handling is up to you.
Paragraph 4 bullet 1: “syntactically valid”: It seems like there are a lot of
URIs with valid syntax that would not make sense here. What if someone
publishes [sip://example.org](sip://example.org) or
[gopher://example.org](gopher://example.org)?
Another self-inflicted wound, so we don't care. I believe the report
documents now say that only mailto: actually works. I proposed an https
method similar to what MTA-STS has but nobody was interested. Considering
how few people use https MTA-STS reports, it's hard to disagree.
Also, don’t a lot of these things that have to do with reporting belong
in one or both of those drafts (which I haven’t read yet)?
This is just what goes in the DMARC record. The other stuff is indeed in
the other drafts.
4.8 Organizational Domain Discovery
-----------------------------------
Paragraph 2, bullet 2: “DMARC mechanism does not apply”: What if there is a
PSO policy? Or is that covered by the tree walk? (I may have gotten lost
here)
Yes, it is covered by the tree walk. The PSD stuff is part of the tree
walk mechanism.
5\. Policy
----------
Paragraph 2: “A Domain Owner…may choose not to participate...by not
publishing an appropriate DNS TXT record”. But what if the PSO did? If they
disagree with that record, they do need to publish a TXT record of their own,
don’t they?
They do, but I don't think it's our job to referee arguments between
registries and their customers.
5.5.3 Setup a Mailbox…, 5.5.5, etc
----------------------------------
Does this belong in the reporting documents?
I think most of it does, perhaps replace with a sentence saying that the
details of report handling are in the other documents.
6\. DMARC Feedback
------------------
Again, I don’t think “feedback” is the best term here.
It's a decade too late to change it.
11.4 Display Name Attacks
-------------------------
This goes to one of the overarching concerns I have about DMARC. I am getting
lots of spam and phishing with plausible display names but obvious throwaway
addresses controlled by attackers. “Further exploration…needs to be
undertaken” is not a sufficient response IMO.
I think we should take this section out. There have been a lot of
discussions at M3 about what to do about display name attacks and nobody
has any idea beyond normal spam filtering.
11.5 Denial of DMARC Processing Attacks
---------------------------------------
Paragraph 3: Regarding multi-valued From, I thought these were out of scope.
They are not a “particular challenge” then.
Agreed.
A.3 Sender Header Field
-----------------------
I don’t recall any use of Sender by DomainKeys. Where I do remember it was in
Microsoft’s alternative to SPF, SenderID \[RFC4406\].
Look at RFC 4870. Domain Keys did use the sender if it's there. Sender
ID did too, along with a lame patent on the obvious way to pick the header
to use.
A.5 Issues with ADSP in Operation
---------------------------------
Maybe include an informative reference to \[RFC5617\] here.
As an author of the ADSP RFC, I would strongly suggest completely removing
everything about it. It was a bad idea and time has not improved it.
A.6 Organizational Domain Discovery Issues
------------------------------------------
It seems much safer to just point to RFC 7489 for a description of the PSL
method than to repeat it here, where a non-careful reader might think that
this is a recommended method.
Good idea.
??? Not Found
-------------
I expected to find some text at least recommending a rewriting strategy for
From addresses to be used by mailing lists and the like.
That would be extremely out of scope, not to mention something likely to
get the IESG to kick it back to us.
R's,
John
_______________________________________________
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc