Re: [dmarc-ietf] New proposed wording for p=quarantiine

2019-08-02 Thread Дилян Палаузов
Hello John, I am really saying, that some addresses, like majordomo@ , which send answer to each received and accepted message, have no capability to perform a form of “quarantine”. It does not matter, whether this is an edge case. Once it is clarified how to act in this case, the same

Re: [dmarc-ietf] New proposed wording for p=quarantiine

2019-08-02 Thread John Levine
In article <97b7d4320e77f9be84703677eba79686ec769f75.ca...@aegee.org> you write: >Hello John, > >the "... reject at SMTP level" is at least for messages, directed to an >address, which does not support the >concept of >quarantining. > >Please propose what shall a site do, receiving a message,

Re: [dmarc-ietf] New proposed wording for p=quarantiine

2019-08-02 Thread Дилян Палаузов
Hello John, the "... reject at SMTP level" is at least for messages, directed to an address, which does not support the concept of quarantining. Please propose what shall a site do, receiving a message, subject to quarantining, for an address, that does not support quarantining. Regards

Re: [dmarc-ietf] New proposed wording for p=quarantiine

2019-08-02 Thread John Levine
In article you write: >Current wording for p=quarantine > quarantine: The Domain Owner wishes to have email that fails the > DMARC mechanism check be treated by Mail Receivers as > suspicious. Depending on the capabilities of the Mail > Receiver, this can mean

Re: [dmarc-ietf] draft-ietf-dmarc-psd review

2019-08-02 Thread Scott Kitterman
Is silence concurrence? Comments inline. Please let me know how to proceed on updating the draft. I'd appreciate anyone else's feedback too. Scott K On Wednesday, July 31, 2019 8:28:17 PM EDT Murray S. Kucherawy wrote: > Thanks for this, much better. Some additional feedback. > > Please

[dmarc-ietf] New proposed wording for p=quarantiine

2019-08-02 Thread Дилян Палаузов
Current wording for p=quarantine quarantine: The Domain Owner wishes to have email that fails the DMARC mechanism check be treated by Mail Receivers as suspicious. Depending on the capabilities of the Mail Receiver, this can mean "place into spam folder",

[dmarc-ietf] Concerns for not Sending a Failure Report?

2019-08-02 Thread Дилян Палаузов
Hello, I just thougth once again on this. Some of the senders of aggregate reports offer free mailboxes. Aggregate reports show that emails from a host to a provider of free mailboxes sometimes do not validate DMARC. The one provider sending emails opens a free mailbox on the receiver and

Re: [dmarc-ietf] ESC for Failed DMARC Validation

2019-08-02 Thread Дилян Палаузов
Hello, these are already now two ESC: 2.7.30 and 5.7.30. X.7.30 means in both cases, that DMARC validation failed. For a domain with policy p=reject; pct=0 the mail is delivered (250 2.7.30), despite failed DMARCр and for a domain with p=reject; pct=100 when DMARC failed and the mail is

Re: [dmarc-ietf] ESC for Failed DMARC Validation

2019-08-02 Thread Murray S. Kucherawy
The wording you're using seems inconsistent to me. Specifically, you're saying that x.7.30 means one thing when attached to a 200-series reply, but the opposite when attached to a 500-series reply. I would prefer to see two separate codes if you're going to do this. But the bigger question is

Re: [dmarc-ietf] ESC for Failed DMARC Validation

2019-08-02 Thread Дилян Палаузов
Hello Murray, ESC X.7.20, X.7.21 and X.7.22 are glued to return code 550, while I propose an ESC, that works also with 250. Apart from this, X.7.20 and X.7.21 cannot be used instead of the proposed X.7.30: If a site sees a valid DKIM signature, and previous experience with the domain signing

Re: [dmarc-ietf] ESC for Failed DMARC Validation

2019-08-02 Thread Murray S. Kucherawy
On Fri, Aug 2, 2019 at 10:52 AM Дилян Палаузов wrote: > I mean an enhanced status code, as at > > https://www.iana.org/assignments/smtp-enhanced-status-codes/smtp-enhanced-status-codes.xhtml > . > RFC7372 registered some for exactly this purpose (though not specific to DMARC). Its Security

Re: [dmarc-ietf] Do is need a new ptype? Was Re: New authentication method, DNSWL

2019-08-02 Thread Murray S. Kucherawy
On Fri, Aug 2, 2019 at 3:00 AM Alessandro Vesely wrote: > Let me note that Section 3 of rfc8601, /The "iprev" Authentication Method/, > does not contain the term "policy". > Wow. I'm amazed I got away with that. But it is clear from the things in the registry that that's how you do it. My

Re: [dmarc-ietf] ESC for Failed DMARC Validation

2019-08-02 Thread Дилян Палаузов
Hello Alessandro, I mean an enhanced status code, as at https://www.iana.org/assignments/smtp-enhanced-status-codes/smtp-enhanced-status-codes.xhtml . Would you reply to messages failing DMARC with such a code, irrespective of whether the message was accepted or rejected? Are there privacy

Re: [dmarc-ietf] Do is need a new ptype? Was Re: New authentication method, DNSWL

2019-08-02 Thread Kurt Andersen (b)
On Fri, Aug 2, 2019 at 3:00 AM Alessandro Vesely wrote: > To stick with A-R semantics, it should have been named > tcp.ip, remote.ip or some such. > Note that RFC8617 section 10.2 ( https://tools.ietf.org/html/rfc8617#section-10.2) does add in an smtp.remote-ip method item. --Kurt

Re: [dmarc-ietf] ESC for Failed DMARC Validation

2019-08-02 Thread Alessandro Vesely
Hi Dilyan, I'm not clear if you refer to the "DSN" extension (rfc3461). In fact, positive DSNs contain the A-R header field, and so can inform the sender when a message is accepted although some of SPF/ DKIM/ DMARC failed. I don't send failure reports, as they look plenty of privacy risks.

[dmarc-ietf] DMARC and Redirecting Messages

2019-08-02 Thread Дилян Палаузов
Hello, current text in https://tools.ietf.org/html/rfc7489#section-6 (DMARC Policy): Since email streams can be complicated (due to forwarding, existing RFC5322.From domain-spoofing services, etc.), Mail Receivers MAY deviate from a Domain Owner's published policy during message

[dmarc-ietf] ESC for Failed DMARC Validation

2019-08-02 Thread Дилян Палаузов
Hello, why sites do not sent failure reports? Will a site, not sending failure report, be willing to use an Enhanced Status Code, to signal, that the DKIM/SPF implementations of the receiver and sender disagree? * * * New Enhanced Status Code for Failed DMARC Validation Code: X.7.30

Re: [dmarc-ietf] Reporting DMARC policy in A-R header fields

2019-08-02 Thread tjw ietf
+1 No hats From my high tech gadget > On Aug 2, 2019, at 02:23, Stan Kalisch wrote: > >> On Thu, Aug 1, 2019, at 11:14 PM, John Levine wrote: >> Catching up on my mail after a laptop disaster, ... >> >> In article <4600949.rz9u5RyGOV@l5580> you write: >> >I think comments should be

Re: [dmarc-ietf] New authentication method, DNSWL

2019-08-02 Thread Alessandro Vesely
On Fri 02/Aug/2019 08:18:20 +0200 Murray S. Kucherawy wrote: > On Thu, Aug 1, 2019 at 9:32 AM Alessandro Vesely wrote: > >> Let me narrate a use case. Courier-MTA can be configured to reject on >> SPF -all early in the SMTP dialogue, except if whitelisted. It writes SPF >> as well as dnswl

Re: [dmarc-ietf] Do is need a new ptype? Was Re: New authentication method, DNSWL

2019-08-02 Thread Alessandro Vesely
On Fri 02/Aug/2019 00:15:30 +0200 Scott Kitterman wrote: > Taking a step back, iprev uses the policy ptype. It's also based on local > interpretation of DNS data. Why doesn't policy work for dnswl just like for > iprev? Let me note that Section 3 of rfc8601, /The "iprev" Authentication

Re: [dmarc-ietf] Reporting DMARC policy in A-R header fields

2019-08-02 Thread Stan Kalisch
On Thu, Aug 1, 2019, at 11:14 PM, John Levine wrote: > Catching up on my mail after a laptop disaster, ... > > In article <4600949.rz9u5RyGOV@l5580> you write: > >I think comments should be free-form. If we want data that can be machine > >parsed, we should specify it. > > > >I think the above

Re: [dmarc-ietf] New authentication method, DNSWL

2019-08-02 Thread Murray S. Kucherawy
On Thu, Aug 1, 2019 at 9:32 AM Alessandro Vesely wrote: > Let me narrate a use case. Courier-MTA can be configured to reject on SPF > -all > early in the SMTP dialogue, except if whitelisted. It writes SPF as well > as > dnswl results in the header, but does not interpret the policy.ip. >