[mailop] DMARC with broken DKIM (was: Re: DMARC p=quarantine pct=0)

2018-04-09 Thread Leo Gaspard via mailop
On 04/09/2018 08:45 PM, Jesse Thompson wrote:> Kinda, yes.  Anyone
running a non-compliant list server should look to
> how other list servers are making themselves compliant.  Could be...
> 1) rewrite headers
> 2) not break DKIM
> 3) ARC?
> I don't want to be overly prescriptive (no one in academia likes to be
> told what to do) but rather to let people know that (a) change is coming
> and it isn't scary, and (b) here are some possible changes you can make
Slight topic change: We've seen email sent from email servers using
DMARC p=reject but with broken DKIM (basically relaying through sendgrid
but with some error in the DKIM DNS configuration, as far as I can
remember).

We handle an email forwarder that, usually, doesn't break DKIM, so DMARC
should be fine. Except when the source mail is DKIM-invalid and the only
thing that makes all the mail not to be rejected is SPF alignment, which
we cannot fix on our side.

What is there, as an email forwarder, that we could do to be compliant?
Currently our only guess is to rewrite headers when the email comes with
broken DKIM yet valid SPF, but even though it's OK for lists that's
unexpected from the user's point of view from forwarding services…

Or should we just reject these mails and tell the sender to do the
things properly? doesn't work well with the end users…

Sometimes I'm thinking DMARC should have enforced DKIM, and not allowed
to have only a match in {SPF, DKIM}, because it leads to issues like
broken-DKIM working-SPF domains not noticing things are wrong even
though they *are*…

___
mailop mailing list
mailop@mailop.org
https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop


Re: [mailop] DMARC with broken DKIM

2018-04-09 Thread Leo Gaspard via mailop
On 04/10/2018 01:04 AM, Brandon Long wrote:
> We've also seen various banks and other large companies who seem to
> specifically only
> use SPF with DMARC, as a way of disallowing forwarding, I guess.
> 
> With ARC, you can actually "pass" the SPF pass through the forwarder.
> 
> Not that there's anywhere near wide enough acceptance of ARC to make
> that your default.

Hmm, I seem to remember even Google (who IIRC pushed for ARC, but you
know better than me) doesn't open ARC to third-party forwarders? Also,
ARC requires a relationship of trust between the forwarder and the
forwarded-to, if I remember correctly? So that couldn't reasonably work
for us, as we redirect to a few thousands different domains, so
something that requires explicit agreement with each forwarded-party
would likely never work.

> Rewriting or rejecting.  I tend to favor rewriting, but arguments can be
> made both ways.  Assuming the
> forwarding service is something set up by the receiver, than they almost
> certainly would prefer to
> get the mail.
> 
> As for whether DMARC should have allowed SPF, there were several policy
> proposals based
> on DKIM directly that failed.  DMARC added three things to those, From
> header alignment, reportting
> and SPF.  Which of those made it more successful than the previous
> attempts, or was it just the parties
> involved in creating it, the timing, the need getting big enough... who
> knows.

Well, reporting and From header alignment make a lot of sense, I just
don't get why SPF. The aim of DMARC is to ensure a message originated
where it originated from, so what's the point in SPF when DKIM's
available? The only reason I could think of would be protection against
replay attacks, but that's taken care of by Message-Id and
de-duplication filters.

Well, anyway, that's wishful thinking on my part, unless there's a DMARC
v2 that disallows SPF-only and some major email provider drops support
for DMARC v1 in favor of v2 only there won't be any change, and that's
not really likely to happen any time soon, so…

> Brandon
> 
> On Mon, Apr 9, 2018 at 3:35 PM Leo Gaspard via mailop  <mailto:mailop@mailop.org>> wrote:
> 
> On 04/09/2018 08:45 PM, Jesse Thompson wrote:> Kinda, yes.  Anyone
> running a non-compliant list server should look to
> > how other list servers are making themselves compliant.  Could be...
> > 1) rewrite headers
> > 2) not break DKIM
> > 3) ARC?
> > I don't want to be overly prescriptive (no one in academia likes to be
> > told what to do) but rather to let people know that (a) change is
> coming
> > and it isn't scary, and (b) here are some possible changes you can
> make
> Slight topic change: We've seen email sent from email servers using
> DMARC p=reject but with broken DKIM (basically relaying through sendgrid
> but with some error in the DKIM DNS configuration, as far as I can
> remember).
> 
> We handle an email forwarder that, usually, doesn't break DKIM, so DMARC
> should be fine. Except when the source mail is DKIM-invalid and the only
> thing that makes all the mail not to be rejected is SPF alignment, which
> we cannot fix on our side.
> 
> What is there, as an email forwarder, that we could do to be compliant?
> Currently our only guess is to rewrite headers when the email comes with
> broken DKIM yet valid SPF, but even though it's OK for lists that's
> unexpected from the user's point of view from forwarding services…
> 
> Or should we just reject these mails and tell the sender to do the
> things properly? doesn't work well with the end users…
> 
> Sometimes I'm thinking DMARC should have enforced DKIM, and not allowed
> to have only a match in {SPF, DKIM}, because it leads to issues like
> broken-DKIM working-SPF domains not noticing things are wrong even
> though they *are*…
> 
> ___
> mailop mailing list
> mailop@mailop.org <mailto:mailop@mailop.org>
> https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop
> 

___
mailop mailing list
mailop@mailop.org
https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop


Re: [mailop] GDPR and SMTP in general

2018-05-25 Thread Leo Gaspard via mailop
On 05/25/2018 12:14 PM, Rolf E. Sonneveld wrote:
> Yes, dealing with exactly the same kind of problem(s). One of my
> customers asks me to sign for the fact that mail is encrypted when
> handling it. However, using standard MTA software, messages that are in
> the queue waiting to get delivered, are unencrypted. Am I forced to use
> disk encryption?

Just for the record, OpenSMTPD supports queue encryption with the `queue
encryption` option. I guess (hope?) other MTAs do support it too.

___
mailop mailing list
mailop@mailop.org
https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop


Re: [mailop] The utility of spam folders

2019-04-28 Thread Leo Gaspard via mailop
"Bill Cole"  writes:
> I know from doing it that limbo-free email can be done well enough
> (minimal bad mail being delivered or good mail being rejected) that
> paying users will come to prefer it over freemail-like service. That
> service model lacks significant economies of scale (and arguably has
> net diseconomies of scale,) but by the most objective metrics of value
> it is a better service model than that of the behemoths.

The current discussion about a mail failing DKIM-verification being
rejected by gmail and unsubscribing most gmail customers from this very
mailing list make me wonder whether limbo-free email is actually a good
idea: rejection of the mail will likely trigger the mailing lists'
automatic unsubscribing feature.

Which means that if either the ML's antispam lets a spam through or one
of the ML's legitimate email gets falsely spam-detected, then a
rejection will happen and the user will likely get unsubscribed from the
ML.

Am I missing something that would prevent such a scenario from occuring?

Cheers,
  Leo

___
mailop mailing list
mailop@mailop.org
https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop


Re: [mailop] Howto be a good mailop (best practice / insights wanted)

2019-05-10 Thread Leo Gaspard via mailop
Laura Atkins via mailop  writes:
> For victims of listbombing, COI isn’t an answer. In fact, much of the problem 
> with listbombing is COI mail.
>
> How do you propose to address that issue?

Captchas are a way to force the malicious subscriber to spend human or
computer time breaking it (if captchas can be broken).

As a consequence, it might make sense to just accept it is the case and
require a javascript-generated proof of work before accepting the
subscription.

This way the amount of computer time required can be more easily
modulated, and the human is not faced with a hard-to-answer captcha -- I
don't know how you feel, but as a user I'd much rather have my computer
spin for a few tens of seconds before sending the form (especially as it
can happen at the same time as I fill it) than have to fill in a
captcha.

___
mailop mailing list
mailop@mailop.org
https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop


Re: [mailop] Howto be a good mailop (best practice / insights wanted)

2019-05-10 Thread Leo Gaspard via mailop
Steve Atkins via mailop  writes:
>> On May 10, 2019, at 10:50 AM, Leo Gaspard via mailop  
>> wrote:
>> Laura Atkins via mailop  writes:
>>> For victims of listbombing, COI isn’t an answer. In fact, much of the 
>>> problem with listbombing is COI mail.
>>> 
>>> How do you propose to address that issue?
>> 
>> Captchas are a way to force the malicious subscriber to spend human or
>> computer time breaking it (if captchas can be broken).
>> 
>> As a consequence, it might make sense to just accept it is the case and
>> require a javascript-generated proof of work before accepting the
>> subscription.
>> 
>> This way the amount of computer time required can be more easily
>> modulated, and the human is not faced with a hard-to-answer captcha -- I
>> don't know how you feel, but as a user I'd much rather have my computer
>> spin for a few tens of seconds before sending the form (especially as it
>> can happen at the same time as I fill it) than have to fill in a
>> captcha.
>
> Bad people have access to much more, and much cheaper, compute resource
> than good people.
>
> There are other things wrong with your suggestion but that's
> a simple thing to think about first. It also generalizes to many other
> poorly thought through "just use proof of work to solve email problems!"
> ramblings.

I hope you didn't assume I was saying it's a good idea. I was *only*
saying it was a better idea than captchas, as an answer to Laura's
question.

And I stand by this statement: the effect on bad people is approximately
the same as the one captchas have (well… maybe a bit less efficient when
the captcha is strong enough for requiring a captcha relaying attack?
but I'm used to failing answering those captchas as a human too anyway,
so might as well have a 10min proof of work…), and the effects on good
people are much, much less painful than the ones captcha have.

Basically, captchas are a POW for malicious actors, and a dice the user
rolls for the normal user. When computers were unable to do basic OCR,
they were a good idea. Nowadays, the user gets more pain than the
malicious actors, for whom even 1/10 success rate is enough to get lots of
forms through without questions.

___
mailop mailing list
mailop@mailop.org
https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop


[mailop] Report as spam and mail forwarders: best practices?

2020-06-19 Thread Leo Gaspard via mailop
Hello all,

We handle an email forwarder. Recently, we have been having more and
more issues with people reporting forwarded emails as spam, that end up
(probably) deteriorating the reputation of our email servers.

We have already set up:
- an antispam, but some emails marked as spam are even to human eyes not
  obviously spams, and mostly depend on how the recipient feels about it
- SRS
- Addition of Delivered-To and X-Original-To headers
- Forwarding the email to abuse@ or spam@ will help us feed it to our
  antispam

Do you know of additional best practices we could do, to better help
training our antispam as well as hopefully redirect at least some of the
reputation loss to the actual sender of the email?

Thank you,
  Leo Gaspard

___
mailop mailing list
mailop@mailop.org
https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop


Re: [mailop] Report as spam and mail forwarders: best practices?

2020-06-19 Thread Leo Gaspard via mailop
Michael Peddemors via mailop  writes:
> Since every email client in the world can check multiple mailboxes, ISPs 
> and Telco's are starting to simply turn off 'remote forwarding', it is 
> an option for you of course.

Unfortunately, this is not really a reasonable course of action for us:
most people still just use their ISP's webmail, which rarely supports
checking multiple mailboxes and even if it did would require a
significant amount of configuration by the end-user… we already have
issues keeping up-to-date email addresses for all the users, as they
often forget to notify us changes, so getting them all to regularly
fetch emails from IMAP servers we'd setup sounds pretty much impossible.

> Which is why you should consider the spam protection as an integral part 
> of the email service, and not simply a 'pre-filtering' system, as this 
> way cases of "one man's spam is another man's reading material"..
>
> Let the customer make the final choice.. eg 'Click Allow/Block Sender'.

This sounds like a neat idea! however, there is an issue with it: adding
these links would break DKIM, and so we would have to rewrite the From
header for all emails… which sounds like a pretty bad UX downside. If
only there were a way to add a DKIM-unsigned mime block to the email,
that the UI would display as being obviously not-from-the-sender… it
could solve this issue maybe.

>> Do you know of additional best practices we could do, to better help
>> training our antispam as well as hopefully redirect at least some of the
>> reputation loss to the actual sender of the email?
>
> Never forward known spam ;)

Well… if only it were that easy :p

___
mailop mailing list
mailop@mailop.org
https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop


Re: [mailop] Report as spam and mail forwarders: best practices?

2020-06-24 Thread Leo Gaspard via mailop
We have, and also sometimes click on “unsubscribe” on emails people mark
as spam that get forwarded to us. This being said, maybe we missed a
feedback loop? I have just checked and found [1]; we'll subscribe to the
ones we missed that are listed there.

[1] 
https://help.returnpath.com/hc/en-us/articles/220221448-List-of-all-available-complaint-feedback-loops-FBLs-

Maybe one thing we should do, would be to automatically send an email to
people who click the spam button (as defined by reception on abuse@) to
tell them to instead forward the mail to spam@? but then it would come
at the risk of actually generating emails that people would see as spam,
so it doesn't sound that great…

Russell Clemings via mailop  writes:

> Have you at least signed up for all the feedback loops you can find? That
> seems to help with reputation and it also helps you track down and counsel
> users who think the spam button is the same thing as the delete button.
>
>
>
> On Fri, Jun 19, 2020 at 9:16 AM Leo Gaspard via mailop 
> wrote:
>
>> Michael Peddemors via mailop  writes:
>> > Since every email client in the world can check multiple mailboxes, ISPs
>> > and Telco's are starting to simply turn off 'remote forwarding', it is
>> > an option for you of course.
>>
>> Unfortunately, this is not really a reasonable course of action for us:
>> most people still just use their ISP's webmail, which rarely supports
>> checking multiple mailboxes and even if it did would require a
>> significant amount of configuration by the end-user… we already have
>> issues keeping up-to-date email addresses for all the users, as they
>> often forget to notify us changes, so getting them all to regularly
>> fetch emails from IMAP servers we'd setup sounds pretty much impossible.
>>
>> > Which is why you should consider the spam protection as an integral part
>> > of the email service, and not simply a 'pre-filtering' system, as this
>> > way cases of "one man's spam is another man's reading material"..
>> >
>> > Let the customer make the final choice.. eg 'Click Allow/Block Sender'.
>>
>> This sounds like a neat idea! however, there is an issue with it: adding
>> these links would break DKIM, and so we would have to rewrite the From
>> header for all emails… which sounds like a pretty bad UX downside. If
>> only there were a way to add a DKIM-unsigned mime block to the email,
>> that the UI would display as being obviously not-from-the-sender… it
>> could solve this issue maybe.
>>
>> >> Do you know of additional best practices we could do, to better help
>> >> training our antispam as well as hopefully redirect at least some of the
>> >> reputation loss to the actual sender of the email?
>> >
>> > Never forward known spam ;)
>>
>> Well… if only it were that easy :p
>>
>> ___
>> mailop mailing list
>> mailop@mailop.org
>> https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop
>>
>
>
> -- 
> ===
> Russell Clemings
> 
> ===
> ___
> mailop mailing list
> mailop@mailop.org
> https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop

___
mailop mailing list
mailop@mailop.org
https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop


Re: [mailop] Report as spam and mail forwarders: best practices?

2020-06-24 Thread Leo Gaspard via mailop
Atro Tossavainen via mailop  writes:
>> We handle an email forwarder. Recently, we have been having more and
>> more issues with people reporting forwarded emails as spam, that end up
>> (probably) deteriorating the reputation of our email servers.
>
> You could ask the good folks at iki.fi for tips. They've only been doing
> this for 25 years.

Will do, thank you!

___
mailop mailing list
mailop@mailop.org
https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop