*DMARC Purpose*
I have no idea why anti-abuse should be deprecated as a purpose of DMARC.
 The whole need for authentication derives from the fact that bad actors
use fraudulent identifiers.   I am already performing abuse takedown based
on both incoming messages received and aggregate reports received.  If I
opted to request failure reports, it would most certainly be for the
purpose of anti-abuse takedowns.  I support the text of the introduction
over the disclaimer added later.

*Privacy - a real world example, from my aggregate reports*
I have at least three entities, one government agency and two vendors, that
use the following architecture:
- My user performs a transaction on the other organization's web server.
- The transaction is transmitted from the front-end web server to a
back-end transaction server using an email sent with my user's email
address.
- The transaction server accepts the unauthenticated message because it
comes from a trusted server.
- The transaction server sends an aggregate report to me that
documents their internal communication as an impersonation.

I have no idea what information is included in those messages, but if they
implement failure reporting as foolishly as they implement aggregate
reporting, they could release a lot of information that should at minimum
be considered company confidential.

Doug Foster





On Sat, Aug 23, 2025 at 8:21 PM Dotzero <dotz...@gmail.com> wrote:

>
>
> On Sat, Aug 23, 2025 at 6:52 PM Murray S. Kucherawy <superu...@gmail.com>
> wrote:
>
>> As promised, this is what Trent and I propose as a replacement to the
>> current Section 7, to enhance privacy considerations about failure reports
>> based on accumulated experience.
>>
>> Comments welcome, of course.  A diff is not provided as this is a
>> wholesale replacement, though there is clearly some text preserved from the
>> version currently in the datatracker.
>>
>> -MSK
>>
>> 7. Privacy Considerations
>>
>> The generation and transmission of DMARC failure reports (sometimes
>> referred to as "forensic reports") raise significant privacy concerns that
>> must be carefully considered before deployment.
>>
>> Given these factors, many large-scale providers limit or entirely disable
>> the generation of failure reports, preferring to rely on aggregate reports,
>> which provide statistical visibility without exposing sensitive content.
>> Operators that choose to enable failure reporting are strongly encouraged
>> to:
>>
>> * Limit the scope and duration of use to targeted diagnostic activities.
>> * Ensure that reporting URIs are carefully controlled and validated.
>> * Apply minimization techniques, such as redaction of message bodies and
>> header fields, to reduce sensitive data exposure.
>> * Always transmit reports only over secure channels.
>>
>> In summary, while DMARC failure reports can offer diagnostic value, the
>> associated privacy concerns have led many operators to restrict their use.
>> Aggregate reports remain the recommended mechanism for gaining visibility
>> into authentication results while preserving the confidentiality of
>> end-user communications.
>>
>> Particular privacy-specific issues are explored below.
>>
>> 7.1. Data Exposure Considerations
>>
>> Failure reports may include PII and non-public information (NPI) from
>> messages that fail to authenticate, since these reports may contain message
>> content as well as trace header fields. These reports may expose sender and
>> recipient identifiers (e.g. RFC5322.From addresses), and although the
>> [RFC6591] format used for failed-message reporting supports redaction,
>> failed-message reporting is capable of exposing the entire message to the
>> Report Consumer.  They may also expose PII, sensitive business data, or
>> other confidential communications to unintended recipients. Such exposure
>> can create regulatory, legal, and operational risks for both senders and
>> receivers.  Examples include product launches, termination notices for
>> employees, or calendar data.  Even innocuous-seeming failures (such as
>> malformed or “broken” calendar invitations) can result in the leakage of
>> private communications.
>>
>> Domain Owners requesting reports will receive information about mail
>> using their domain, but which they did not actually cause to be sent. This
>> might provide valuable insight into content used in abusive messages, but
>> it might also expose PII or NPI from messages mistakenly or accidentally
>> using the wrong sending domain.
>>
>> Information about the final destination of mail, where it might otherwise
>> be obscured by intermediate systems, may be exposed through a failure
>> report. A commonly cited example is exposure of members of mailing lists
>> when one list member sends messages to the list, and failure reports are
>> generated when that message is delivered to other list members. Those
>> failure reports would be sent to the Domain Owner of the list member
>> posting the message, or their delegated Report Consumer(s).
>>
>> Similarly, when message forwarding arrangements exist, Domain Owners
>> requesting reports may receive information about mail forwarded to domains
>> that were not originally part of their messages' recipient list. This means
>> that destinations previously unknown to the Domain Owner may now become
>> visible.
>>
>> 7.2. Report Recipients
>>
>> A DMARC Policy Record can specify that reports should be sent to a Report
>> Consumer operating on behalf of the Domain Owner. This might be done when
>> the Domain Owner contracts with an entity to monitor mail streams for
>> deliverability, performance issues, or abuse. Receipt of such data by third
>> parties may or may not be permitted by the Mail Receiver's privacy policy,
>> terms of use, et cetera. Domain Owners and Mail Receivers should both
>> review and understand whether their own internal policies constrain the use
>> and transmission of DMARC reporting.
>>
>> Some potential exists for Report Consumers to perform traffic analysis,
>> making it possible to obtain metadata about the Mail Receiver's traffic. In
>> addition to verifying compliance with policies, Mail Receivers need to
>> consider that before sending reports to a third party.
>>
>> Moreover, some implementers and consumers of failure reports have
>> attempted to use them for purposes such as deep threat hunting, malware
>> inspection, or content analysis. While technically feasible, such uses
>> exceed the scope of DMARC’s reporting intent and amplify privacy exposure
>> by treating user communications as telemetry data. DMARC reporting is
>> designed for authentication failure diagnostics, not for generalized
>> message content analysis.
>>
>> Operators have found that misconfigurations of the “ruf=” reporting URI
>> are relatively common, and when they occur, reports may be transmitted to
>> unintended parties.
>>
>> 7.3. Additional Damage
>>
>> The risks associated with failure reports are compounded by volume and
>> content distribution concerns. In high-volume domains, these reports may
>> propagate large amounts of spam, phishing messages, or malware samples,
>> inadvertently increasing the spread of abusive content.
>> _______________________________________________
>> dmarc mailing list -- dmarc@ietf.org
>> To unsubscribe send an email to dmarc-le...@ietf.org
>
>
>
> My first cut at this. Suggested changes and comments in ALL CAPS.
>
> 7. Privacy Considerations
>
> The generation and transmission of DMARC failure reports (sometimes
> referred to as "forensic reports") raise significant privacy concerns that
> must be carefully considered before deployment.
>
> Given these factors, many large-scale providers limit or entirely disable
> the generation of failure reports, preferring to rely on aggregate reports,
> which provide statistical visibility without exposing sensitive content.
> Operators that choose to enable failure reporting are strongly encouraged
> to:
>
> * Limit the scope and duration of use to targeted diagnostic activities.
> * Ensure that reporting URIs are carefully controlled and validated.
> * Apply minimization techniques, such as redaction of message bodies and
> header fields, to reduce sensitive data exposure.
> * Always transmit reports only over secure channels.
>
> In summary, while DMARC failure reports can offer diagnostic value, the
> associated privacy concerns have led many operators to restrict their use.
> Aggregate reports remain the recommended mechanism for gaining visibility
> into authentication results while preserving the confidentiality of
> end-user communications.
>
> Particular privacy-specific issues are explored below.
>
> 7.1. Data Exposure Considerations
>
> Failure reports may include PII and non-public information (NPI) from
> messages that fail to authenticate, since these reports may contain message
> content as well as trace header fields. These reports may expose sender and
> recipient identifiers (e.g. RFC5322.From addresses), and although the
> [RFC6591] format used for failed-message reporting supports redaction,
> failed-message reporting is capable of exposing the entire message to the
> Report Consumer.  They may also expose PII, sensitive business data, or
> other confidential communications to unintended recipients. Such exposure
> can create regulatory, legal, and operational risks for both senders and
> receivers.  Examples include product launches, termination notices for
> employees, or calendar data.  Even innocuous-seeming failures (such as
> malformed or “broken” calendar invitations) can result in the leakage of
> private communications.
>
> Domain Owners requesting reports will receive information about mail using
> their domain, but which they did not actually cause to be sent. This might
> provide valuable insight into content used in abusive messages, but it
> might also expose PII or NPI from messages mistakenly or accidentally using
> the wrong sending domain.
>
> Information about the final destination of mail, where it might otherwise
> be obscured by intermediate systems, may be exposed through a failure
> report. A commonly cited example is exposure of members of mailing lists
> when one list member sends messages to the list, and failure reports are
> generated when that message is delivered to other list members. Those
> failure reports would be sent to the Domain Owner of the list member
> posting the message, or their delegated Report Consumer(s).
>
> Similarly, when message forwarding arrangements exist, Domain Owners
> requesting reports may receive information about mail forwarded to domains
> that were not originally part of their messages' recipient list. This means
> that destinations previously unknown to the Domain Owner may now become
> visible.
>
> 7.2. Report Recipients
>
> A DMARC Policy Record can specify that reports should be sent to a Report
> Consumer operating on behalf of the Domain Owner. This might be done when
> the Domain Owner contracts with an entity to monitor mail streams for
> deliverability, performance issues, or abuse. Receipt of such data by third
> parties may or may not be permitted by the Mail Receiver's privacy policy,
> terms of use, et cetera. Domain Owners and Mail Receivers should both
> review and understand whether their own internal policies constrain the use
> and transmission of DMARC reporting.
>
> Some potential exists for Report Consumers to perform traffic analysis,
> making it possible to obtain metadata about the Mail Receiver's traffic. In
> addition to verifying compliance with policies, Mail Receivers need to
> consider that before sending reports to a third party.
>
> NOTE: I ABSOLUTELY DISAGREE THAT THE USE OF DMARC FAILURE REPORTS AS
> DESCRIBED BELOW IS BEYOND THE SCOPE OF DMARC'S REPORTING INTENT. I WAS THE
> FIRST PERSON TO PUBLISH A DMARC RECORD, EVEN BEFORE DMARC WAS MADE PUBLIC
> AND USED THE INFORMATION IN FAILURE REPORTS TO MITIGATE ABUSE IDENTIFIED IN
> THE REPORTS. IN PROVIDING TRAINING TO HUNDREDS OF PEOPLE THROUGH THE ONLINE
> TRUST ALLIANCE (NOW PART OF THE INTERNET SOCIETY) I DISCUSSED THESE SORTS
> OF TECHNIRUES GOING BACK TO 2011. THE STATEMENTS BELOW ARE FACTUAL
> MISREPRESENTATIONS. THE SECTION BELOW SHOULD BE DROPPED OR DRASTICALLY
> REWORKED.
>
> Moreover, some implementers and consumers of failure reports have
> attempted to use them for purposes such as deep threat hunting, malware
> inspection, or content analysis. While technically feasible, such uses
> exceed the scope of DMARC’s reporting intent and amplify privacy exposure
> by treating user communications as telemetry data. DMARC reporting is
> designed for authentication failure diagnostics, not for generalized
> message content analysis.
>
> Operators have found that misconfigurations of the “ruf=” reporting URI
> are relatively common, and when they occur, reports may be transmitted to
> unintended parties.
>
> 7.3. Additional Damage
>
> The risks associated with failure reports are compounded by volume and
> content distribution concerns. In high-volume domains, these reports may
> propagate large amounts of spam, phishing messages, or malware samples,
> inadvertently increasing the spread of abusive content. TO MITIGATE SUCH
> CONCERNS, THE FOLLOWING STEPS SHOULD BE CONSIDERED:
>
> BY REPORT PROVIDERS:
> *DEFANG URLS BY SUBSTITUTING HXXP FOR HTTP
> *REMOVE MALICIOUS ATTACHMENTS SUCH AS WORD DOCUMENTS OR PDFs.
>
> BY REPORT CONSUMERS:
> *ISOLATE MX SERVERS RECEIVING REPORTS FROM RECEIVING OTHER MAIL STREAMS
> *USE SANDBOXES IN EVALUATING FAILURE REPORTS
> *USE NETWORK SEGMENTATION
> *LIMIT ACCESS TO FAILURE REPORTS TO AUTHORIZED INDIVIDUALS WITH
> APPROPRIATE SECURITY TRAINING
>
> Michael Hammer
> _______________________________________________
> dmarc mailing list -- dmarc@ietf.org
> To unsubscribe send an email to dmarc-le...@ietf.org
>
_______________________________________________
dmarc mailing list -- dmarc@ietf.org
To unsubscribe send an email to dmarc-le...@ietf.org

Reply via email to