Re: DMARC failure in messages from this listserv

2024-02-20 Thread Rick Troth
> Last, but not least: for regular mailing I use Thunderbird. But for 
"un-spamming" I have to use web browser interface.


Same here:
This is a GMail account, and TBird works well, but the logic to tell 
GMail "this is not spam" is only via their web interface.


The problem is not (or is not entirely) a fault of LISTSERV nor of UA 
email.
The university provides this forum as a free service to the mainframe 
community.
But the point I want to make in this paragraph is: it's an arms race. 
Worse, it's getting more and more difficult for anything outside the 
space of what Google and Hotmail and Yahoo understand (and control) to 
engage in email. This is a driving factor in the migration of some of us 
(Lionel raised his hand weeks ago) to platforms such as Discord.


For my part, I'm interested in peering with sites which don't have an 
allergy to LISTSERV and things like it.
One thing I would ask the list manager(s): allow attachments. I could 
sign every message with PGP if only LISTSERV would not reject such posts.


-- R; <><


On 2/15/24 07:53, Radoslaw Skorupka wrote:
I am using Microsoft mail account (hotmail) and I observe similar 
problem. Many messages are sent to "unwanted" folder.
I don't know how to add IBM-MAIN to safe senders. The only thing I can 
do is manually add each address, message by message.
However it is not effective - a lot of manual work. I doubt MS service 
honour my requests.
Last, but not least: for regular mailing I use Thunderbird. But for 
"un-spamming" I have to use web browser interface.


BTW: I use this mail account almost only for IBM-MAIN and RACF-L.



--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: DMARC failure in messages from this listserv

2024-02-15 Thread Radoslaw Skorupka
I am using Microsoft mail account (hotmail) and I observe similar 
problem. Many messages are sent to "unwanted" folder.
I don't know how to add IBM-MAIN to safe senders. The only thing I can 
do is manually add each address, message by message.
However it is not effective - a lot of manual work. I doubt MS service 
honour my requests.
Last, but not least: for regular mailing I use Thunderbird. But for 
"un-spamming" I have to use web browser interface.


BTW: I use this mail account almost only for IBM-MAIN and RACF-L.

--
Radoslaw Skorupka
Lodz, Poland



W dniu 13.02.2024 o 20:19, Schmitt, Michael pisze:

Microsoft Exchange has started quarantining too many messages from this listserv as 
"phishing". It is several per day; one day there was 16.

Adding theibm-m...@listserv.ua.edu  address to the Safe Senders list doesn't work because 
of how the messages are sent "on behalf of" (i.e. the sender not the listserv).

The email support team tells me that the reason the filter is catching them is 
they have dmarc failure. One example is the message below. It failed with:

Authentication-Results: spf=pass (sender IP is 130.160.0.25)
  smtp.mailfrom=listserv.ua.edu; dkim=pass (signature was verified)
  header.d=UA.EDU;dmarc=fail action=none header.from=COX.NET;compauth=fail
  reason=001


But another message from the listserv passes:

Authentication-Results: spf=pass (sender IP is 130.160.0.25)
  smtp.mailfrom=listserv.ua.edu; dkim=pass (signature was verified)
  header.d=UA.EDU;dmarc=pass action=none
  header.from=LISTSERV.UA.EDU;compauth=pass reason=100


On the other hand, messages I send to the server have mixture of pass and fail, 
and they aren't getting quarantined.


Does anyone know if this is a problem originating before it hits 
listserv.ua.edu, or is it a problem in listserv.ua.edu?


The mail people are claiming it has to be fixed at the server end.




--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: DMARC failure in messages from this listserv

2024-02-13 Thread Phil Smith III
Michael Schmitt wrote, in part:
>Microsoft Exchange has started quarantining too many messages from

>this listserv as "phishing". It is several per day; one day there was 16.

 

My understanding of DMARC is incomplete, but here are some observations.

 

First, one of your examples had a header.from value of COX.NET; the other was 
LISTSERV.UA.EDU. Those are, like, different, and that field identifies the 
DMARC policy domain. Now, why one was COX.NET is a mystery to me. If you have 
the original note, it would be interesting to see the complete headers.

 

My first hypothesis was that because the domains were different, the one note 
failed because it was subject to different policy: when the COX.NET note came 
in, your mail system fetched the Cox DMARC policy and failed the note based on 
that, while it passed based on the UA.EDU (OK, LISTSERV.UA.EDU) policy.  
However, neither of those domains seems to have any DMARC published!  

 

Moving on, I see compauth=fail on the failed note. That field is the "composite 
authentication" result, and is presumably why it really failed. From 
https://www.itpromentor.com/anti-spoof-atp/:

"Composite authentication" or CompAuth for short, is essentially a confidence 
score or rating, which is applied to incoming messages. It takes into account 
the presence of explicit authentication records such as SPF, DKIM and DMARC, 
however, if no such records exist (or if not all of them exist), Microsoft will 
also apply some other intelligence, such as sender reputation, sender/recipient 
history, behavioral analysis, and other advanced techniques which add or 
subtract from the confidence in whether a message has been spoofed or not. 
Therefore, it is a "composite" of both explicit and implicit authentication, 
which determines whether a message is marked as spoofed, ultimately.

 

The way I think about DMARC (and compauth, as part of DMARC) is that it's kinda 
sniffing the note: "Hey, does the alleged sending domain have SPF info? DKIM? 
Do the headers all match?" - it's sort of like Bayesian spam filtering, only 
based on a combination of headers and external information. So it's like you 
judge your daughter's boyfriend based not on what he says (Bayesian content 
filtering) but on how he looks AND what others say about him. When you ask 
around and nobody's heard of him, you have no information-but that's a sort of 
information in and of itself. OK, I've tortured that metaphor enough!

 

I'm surmising that listserv.ua.edu does not have a bad reputation, but cox.net 
does (or at least, a worse one). Which makes sense: while ua.edu has students, 
and we know what THEY'RE like, they're unlikely to be spoofing/sending from 
listserv.ua.edu. But Cox has lots of customers, some of whom are going to be 
spammers. Any ISP has an intermittent reputation problem in terms of spam. And 
ISPs are going to find it hard to turn on DKIM, since they has no control over 
the sending clients (which must put the DKIM signature in the outgoing notes).

 

You also wrote:

>On the other hand, messages I send to the server have mixture of pass

>and fail, and they aren't getting quarantined.

 

"to the server"-to the list? To some other server? Not clear.

 

https://dmarc.org/overview/ is the canonical reference; 
https://datatracker.ietf.org/doc/html/rfc7489 is the primary RFC; and 
https://www.valimail.com/blog/understanding-email-authentication-headers/ seems 
pretty good, too.

 

I think the real key here is understanding where that COX.NET note came from, 
since that's the problem child. Headers from other failures would be 
interesting, too.

 

Are others seeing this problem? I'm not, but my mailboxes are hosted at Cox.


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


DMARC failure in messages from this listserv

2024-02-13 Thread Schmitt, Michael
Microsoft Exchange has started quarantining too many messages from this 
listserv as "phishing". It is several per day; one day there was 16.

Adding the IBM-MAIN@LISTSERV.UA.EDU address to the Safe Senders list doesn't 
work because of how the messages are sent "on behalf of" (i.e. the sender not 
the listserv).

The email support team tells me that the reason the filter is catching them is 
they have dmarc failure. One example is the message below. It failed with:

Authentication-Results: spf=pass (sender IP is 130.160.0.25)
 smtp.mailfrom=listserv.ua.edu; dkim=pass (signature was verified)
 header.d=UA.EDU;dmarc=fail action=none header.from=COX.NET;compauth=fail
 reason=001


But another message from the listserv passes:

Authentication-Results: spf=pass (sender IP is 130.160.0.25)
 smtp.mailfrom=listserv.ua.edu; dkim=pass (signature was verified)
 header.d=UA.EDU;dmarc=pass action=none
 header.from=LISTSERV.UA.EDU;compauth=pass reason=100


On the other hand, messages I send to the server have mixture of pass and fail, 
and they aren't getting quarantined.


Does anyone know if this is a problem originating before it hits 
listserv.ua.edu, or is it a problem in listserv.ua.edu?


The mail people are claiming it has to be fixed at the server end.

-Original Message-
From: IBM Mainframe Discussion List  On Behalf Of 
Joel C. Ewing
Sent: Monday, February 12, 2024 12:10 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Banks migrate from mainframes to AI-driven cloud tech




--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN