Exactly, Actually DMARC just let's you know what SPF records would already do 
on their own, but silently. By implementing DMARC records, you know who's 
trying to send mail "on your behalf" and I noticed that in the DMARC reports, 
this mailing list's server was one of them. In my case, SPF records limit who 
can send mail with a "from" mydomain.com And DMARC system let's me know who's 
sending such emails "without my consent" (= who's ignoring my spf records). I 
hope I'm making sense without getting too technical, but I guess there are many 
tech minded people in this list anyway. Le 2022-05-03 16:42, Joshua O'Keefe 
<[email protected]> a écrit : > > > > > > On May 3, 2022, at 7:09 AM, 
Cedric Amand <[email protected]> wrote: > > I did not investigate this much ; 
but I would look at the DMARC and « from » problems > DMARC is definitely one 
-- potentially the main -- issue here. If someone with a strict DMARC record 
submits a message to the list for broadcast, many list recipients will 
quarantine or reject the message unless the From: header is munged. > > > > 
Mailman has some potential mitigation strategies against this[1], none of which 
are great, but DMARC fundamentally broke the way email works by pinning its 
mechanism on the From: header.[2] > > > > [1] 
https://docs.mailman3.org/projects/mailman/en/latest/src/mailman/handlers/docs/dmarc-mitigations.html
 > > > > [2] RFC7489 §5 says, essentially: requiring trust in From: was the 
only way to make DMARC go. It doesn't actually justify doing so beyond saying 
(in §6.7) acceptance is a local decision. The RFC takes no responsibility for 
establishing a de facto status quo that is broken. >

Reply via email to