On 2016-04-04, RW <rwmailli...@googlemail.com> wrote:
> On Mon, 4 Apr 2016 15:29:40 -0400
> Alex wrote:
>
>> >> >> Can someone help me understand why this auto-away message failed
>> >> >> the DMARC tests?
>> >> >>
>> >> >> http://pastebin.com/wXhxex92
>> >> >>
>> >> >> It looks like it passed through an AOL MX, yet SPF still
>> >> >> failed.
>> >> >
>> >> > It didn't fail SPF, it failed to pass because there's no envelope
>> >> > sender address.
>> >>
>> >> DMARC think in alignments. Authentication for SPF or DKIM (or both)
>> >> must be aligned with RFC5322.From.
>> >>
>> >> SPF bind RFC5321.MailFrom to an Entiry. For any
>> >> DeliveryStatusNotification or Autoresonder the RFC5321.MailFrom is
>> >> required to be empty. So SPF *never* could be aligned to
>> >> RFC5322.From for such messages.
>> >
>> > FWIW  automated replies are allowed to have a null address, but
>> > it's not required.
>> >
>> > The important thing is that this one didn't.
>> >
>> >> The only way to generate a DMARC=pass is DKIM. A domainowner has to
>> >> DKIM-sign DeliveryStatusNotification or Autoresonder in alignement
>> >> to the RFC5322.From.
>> >
>> > I assume the OP knows why it didn't pass DKIM since he specifically
>> > mentioned SPF.
>>
>> No, I really don't understand. I have a basic understanding of
>> DKIM/DMARC and understand it's dependent upon SPF, which is why I
>> mentioned that.
>>
>> If I recall, these are treated essentially as DSNs, correct? In these
>> cases, the From is null.z)/x
>
> What matters here is that the the envelope sender was empty rather than
> why it was empty.
>
> I'm assuming that you are using these rules:
>
> https://blog.laussat.de/2014/11/06/using-dmarc-in-spamassassin-native/
>
>
> meta DMARC_FAIL_REJECT !(DKIM_VALID_AU || SPF_PASS) &&
>  __DMARC_POLICY_REJECT
>
>  __DMARC_POLICY_REJECT comes from a dns look-up which says that the
> policy is to reject. The rule will then fire if neither  DKIM_VALID_AU
> nor SPF_PASS hit.
>
> SPF can't be  used here because there's no envelope sender, dkim
> passes but it's signed by mx.aol.com not by the domain in the
> header from address, so DKIM_VALID_AU doesn't get hit either.

These rules are broken, then. The default identifier alignment for
DMARC is relaxed, so mail with a valid DKIM signature from *.aol.com
should pass.

>> So ultimately who's at fault here for causing this to fail? AOL? What
>> should have been done to prevent it?
>
> AOL, I guess.

AOL is doing everything correctly.


Reply via email to