On Fri, Aug 29, 2025 at 2:28 PM Todd Herr <t...@someguyinva.com> wrote:

> On Fri, Aug 29, 2025 at 1:51 PM Alessandro Vesely <ves...@tana.it> wrote:
>
>> On Fri 29/Aug/2025 19:02:56 +0200 Dotzero wrote:
>> >
>> > I do have some thoughts on the use of message-id to identify the
>> original
>> > (intended) recipient of the rejected message. Only the originator of
>> the
>> > message could match the message-id back. This means any redaction of
>> PII
>> > protects privacy but still allows the originator of the message to do
>> analysis.
>> > I believe that any discussion of these types of approaches is better
>> left for a
>> > BCP.
>>
>>
>> I assume you're thinking this applies to the case where the reported
>> message
>> header was redacted in such a way as to hide any To:/Cc:/Bcc: values.  I
>> agree
>> using Message-Id: would be clever, allowing for heavy redaction —indeed,
>> one
>> could omit the third MIME part altogether.  But does anyone actually
>> redact the
>> reported message?
>>
>> Privacy aside, RFC 5965 provides for having "Original-Rcpt-To" fields in
>> message/feedback-report.  Linkedin uses them.  Currently,
>> Original-Rcpt-To's
>> are missing from the example in Appendix A.  I'll add some.
>>
>>
> I would be opposed to including Original-Rcpt-To in a DMARC failure
> report, due to the possibility of the scenario I described in a different
> thread:
>
> - A is the domain owner that published the DMARC policy and consumes
> reports
> - B is the entity sending email that makes unauthorized use of A's domain
> - C is the recipient of said email, an entity heretofore unknown to A
> - D is the report generator
>
> Any report generated by D that  is sent to A  and that contains any of C's
> PII creates a privacy concern for D and also by extension an exposure of
> that PII to A.
>
> DMARC failure reports are different from spam complaint feedback reports.
> For spam complaint feedback reports, there is a high degree of certainty
> that the recipient of the feedback report was responsible for generating
> the message being complained about, either because of the source IP or the
> DKIM signing domain. This means that the complainant's email address was
> known to the recipient of the feedback report prior to receiving the
> feedback report.
>
> With DMARC failure reports, we have much less certainty, because an
> authentication failure of a message authorized by the domain owner of the
> RFC5322.From header domain is indistinguishable from an authentication
> failure of a message that has not been authorized by the domain owner of
> the of the RFC5322.From header domain. Therefore, the report generator has
> no idea whether or not the intended recipient's email address was known to
> the domain owner, and so the intended recipient's email address should not
> be shared in the DMARC failure report.
>
> --
> Todd Herr
> Some Guy in VA LLC
> t...@someguyinva.com
> 703-220-4153
>

I've been thinking about the potential problem space you describe, Todd.
The question in my mind is whether the problem is the size of a slice of
bread, a loaf of bread or  the size of a bread truck. My experience
inclines me to believe this is not even a slice of bread. Ale points out in
many cases the account may not exist. Much of the mail involved is spam.
For the most part, when it involves a real recipient we are talking email
address and possibly name. How frequently do legitimate individuals or
organizations send email using a domain that is not their own? Very rarely.
I just don't see this issue at a scope or scale that even makes it a
rounding error.

The problem is with someone sending mail from a domain they don't have
permission to use.

Michael Hammer
_______________________________________________
dmarc mailing list -- dmarc@ietf.org
To unsubscribe send an email to dmarc-le...@ietf.org

Reply via email to