Minutes interim-2020-dmarc-01: Thu 16:00
minutes-interim-2020-dmarc-01-202006111600-00
The information below is for an old version of the document.
| Meeting Minutes | Domain-based Message Authentication, Reporting & Conformance (dmarc) WG Snapshot | |
|---|---|---|
| Title | Minutes interim-2020-dmarc-01: Thu 16:00 | |
| State | Active | |
| Other versions | markdown | |
| Last updated | 2020-06-12 |
minutes-interim-2020-dmarc-01-202006111600-00
DMARC WG Meeting - Interim 11 June 2020 Thursday, June 11, 2020, 16:00-17:00 UTC Chairs: Seth Blank, Alexey Melnikov, Tim Wicinski
Webex: https://ietf.webex.com/ietf/j.php?MTID=me6b9c2bdf971f0ead8713b4a9c50c975 Jabber: dmarc@jabber.ietf.org
Etherpad: https://etherpad.ietf.org:9009/p/notes-ietf-interim-2020-dmarc-01-dmarc?useMonospaceFont=true
Agenda: (from https://datatracker.ietf.org/doc/agenda-interim-2020-dmarc-01-dmarc-01/)
Agenda Bashing, Blue Sheets
Recap of M3AAWG discussion preceding this interim session
Joint DMARC 2.0 Discussion (M3AAWG and IETF)
List of open DMARC issues: https://trac.ietf.org/trac/dmarc/report/1
Notes
- Reminder of IETF Note Well and IETF policies
- Attendees reminded to sign in
- Summary of M3AAWG Session
- What it means to do DMARC
- Discussion of p=none
- p=none without reporting means ecosystem issues
- Use of pct option; no consensus on its usefulness
- p=quarantine, pct=0 use case
- Ask for DMARC to require both SPF and DKIM pass
- Other failure reporting use cases or requests for changes
- Request for description of Scope of Work for DMARCbis project and how ARC slots in (Dave Crocker)
- Want to make sure DMARC spec is clear and that there is better buy-in from IETF community than first rev
- Work on list of open issues (https://trac.ietf.org/trac/dmarc/report/1)
- Discussion of what it means to implement specific features
- Work on three issues at any given time so as not to overwhelm anyone
- Want to address indirect mail flows as per WG charter, perhaps fold ARC into DMARC
- Request for Murray (scribe lost audio)
- Ensure that the new doc deals with the issues of mailing list breakage
- Ensure that it "passes muster" for IETF consensus
- Barry Leiba - DMARC must deal with mailing list breakage
- Should ARC fold in to DMARC? Barry thinks perhaps not - normative reference instead
- Murray - Doesn't make sense to make ARC formal part of DMARC, but rather make it authentication part
- Operational issues discussed at M3AAWG
- p=quarantine, pct=0
- Jesse Thomspon - Could be rephrased as formalizing header munging
- Would be great to get all mailing lists to munge by default
- Maybe ARC could solve, but no guarantee that all mailing lists support ARC (scribe lost audio) - so there is probably no end to the munging necessity
- Michiel van de Vis (Mimecast) - (scribe lost audio)
- some receivers change how they process messages if they see an enforcement level policy, regardless of pct setting
- they change the 5322.from to their own domain when forwarding (munging)
- affects DMARC reporting back to the original sender (because the reports then go back to the munging receiver)
- Autumn - Common situation; mail to mailing list, message fails SPF and DKIM at terminal destination
- Header munging removes concern that message fails
- Some providers change headers when p=quarantine/reject
- Some mailing list software will only do this if configured to do so (and is sometimes, but not always policy-sensitive)
- p=quarantine, pct=0 allows senders to test what impact will be seen from mailing lists by examining reports, looking for diffs from p=none
- Question from Seth - Is this a bug/feature in DMARC or friction in ecosystem with how DMARC is handled?
- Autumn - Friction, due to inconsistent application across mailing lists; barrier to DMARC adoption
- Question from Seth - If pct were removed, but other method for requesting header munging were available, would that be okay?
- Autumn - Yes
- Scott Kitterman - Challenge is that "header munging not standardized, so discussing it in a standards body may not be appropriate"
- Unlikely that IETF would accept formalization, because there may not be a way to do it "right"
- Alexey - I hear what you're saying, but perhaps at least getting rough consensus from group can drive change
- Seth requests Scott to create issue in Trac
- Scott not sure what to put in the issue
- Kurt Andersen also not clear on content of issue
- Discussion tabled for chairs
- Jan-Pieter Cornet - Something in spec to make sure senders not send messages that break DMARC?
- Kurt Andersen - How do we get spammers/abusers to observe such restriction?
- JPC - Point conceded
- Seth - recommend that discussion point be brought to IETF mailing list
- Scott - If rule is "Don't send mail that fails DMARC, that means no mail to mailing lists, and so I'd delete my DMARC record"
- Kurt - Forcing mailing lists to munge headers will likely not achieve consensus
- Discussion should continue on IETF list
- Dave Crocker
- Need to have clarity on what the problem is; header munging is a symptom of the problem
- Let's be clear on the need, and then figure out how to solve it
- Hannu Aronsson
- Multiple stakeholders have problems with DMARC due to their roles as intermediaries in mail flow (e.g. ISPs forwarding addresses at hosted domains, alumni and personal address forwarding services, mailbox providers forwarding user emails)
- How to solve this problem in meaningful way?
- Tonu Tammer
- DMARC is about sender authenticity, not integrity of content
- Scaling down DKIM requirements to only include headers, not body might solve this problem
- Forensic reports
- How to strip them down and keep them useful
- Autumn - Favors forensic reports, even if stripped down.
- Prefers full forensic reports, but recognizes privacy concerns.
- Large orgs benefit from forensic reports, especially if distributed management of systems across orgs
- From address is massive improvement on just aggregate reporting
- Jesse - Autumn explained issue well
- Has same large org problem that Autumn mentioned
- DMARC vendors using SPF macro to glean Return-Path address seems a kludge
- Kurt Andersen
- To Autumn - Should we be more blatant in spec that forensic reports are whatever you're comfortable sending, with list of items ranging from most useful to least useful?
- Autumn - Yes, and also forensic reports can be useful to provide to takedown vendors for purposes of fighting abuse
- Steve Jones (comment in Webex chat)
- Reduced RUF reports >> no RUF reports
- Perhaps 2-3 degrees of redaction shown in DMARC documentation in appendix or elsewhere in RFCs
- Alex Brotman - Be nice if DMARC had a requirement that SPF not be permissive (e.g., can't do DMARC with +all)
- Seth - Are you seeing operational issues?
- Alex - Some spam issues, but not really operational issues
- Seth - Sounds like it's within WG charter, but perhaps not part of DMARCbis
- Kurt - Doesn't see how making DMARC more complicated with truth table that constitutes pass will help things
- Murray - Might be part of DMARCbis, but Authentication-Results header doesn't currently include SPF policy, so challenges exist to implement
- Jim Fenton (scribe lost audio, so unclear if below notes capture topic accurately)
- Regarding topic of DMARC alignment conflicts with RFC 5322 on the use of the From and Sender header fields
- If users can see domain in From: field, will they act on it?
- If they can't see it, reputation argument does not hold
- Seth - What issue should be in tracker; assigned to Jim to create it
- Tim
- SPF +all might be better in a BCP than in DMARCbis
- Discussion of when to have 108 vs. having another interim session
- Jan-Pieter Cornet
- Is anyone tracking bounces that come back from reports? Amount he's seeing is staggering (approximately 50%)
- Jesse - May be a symptom of reports being most useful during rollout; speculates that domain owners may delete mailbox after rollout
- Seth - Recommend opening discussion on M3AAWG technical list
Blue Sheet
- Alexey Melnikov, Isode Ltd
- Kurt Andersen, LinkedIn
- Scott Kitterman, Kitterman Technical Services
- Tim Wicinski,
- Seth Blank, Valimail
- Murray Kucherawy, Facebook
- Todd Herr, Valimail
- Dave Crocker, Brandenburg InternetWorking
- Barry Leiba, FutureWei
- Amelia Andersdotter, CENTR
- Alex Brotman, Comcast
- Mohammed Zaman, dmarcian
- J. Trent Adams, The Force Awakens <3
- Jan-Pieter Cornet, XS4ALL Internet
- Andrei Robachevsky, ISOC
- Carsten Bormann, TZI
- Ulrich Wisser, Swedish Internet Foundation
- Shuji SAKURABA, IIJ
- Isamu Koga, IIJ
- Jim Fenton, Altmode Networks
- Jesse Thompson, University of Wisconsin-Madison
- Hannu Aronsson, iki.fi
- Steve Jones, DMARC.org / LinkedIn
- Simon Tyler, Mimecast
- Michiel van de Vis, Mimecast
- Vlad-Marian Marian, Mimecast
- Autumn Tyr-Salvia, Agari
- Tim Vert, LookingGlass Cyber
- Justin Frechette, iContact
- Dan Malm, One.com
- Shehzad Mirza, Global Cyber Alliance
- Madeleine Hardt, Comcast
- Yoshitaka Hirano, QUALITIA
- Steve Webb, atmail PTY
- Jeannine Bos, University of Wisconsin-Madison
- Tim Draegen, dmarcian
- Steve Atkins, Word to the Wise
- Martin Flygenring, One.com
- Arne Allisat, 1&1 Mail and Media GmbH
- Harri Toivanen, iki.fi
- Petri Koistinen, iki.fi
- Vaughn Talbert, dmarcian
- Ayachika Kitazaki, Softbank
- Tomki Camp, dmarcian
- Ernest McLeod, dmarcian
- Mary Sohn, Shopify
- Udeme Ukutt, LinkedIn
- Masaki Kase, TwoFive
- Adam Gall, Eastlink
- Madeline McCaffrey, Valimail
- Zachary Sverdrup, Zeta Global
- Vittorio Bertola, Open-Xchange
- Sebastian Uziuk, GetResponse
- Marco Francechetti, Contactlab
- Alwin de Bruin, dmarcian
- John Bowers, dmarcian
- Tobias Mayer, Cisco Systems
- Matt Heffelfinger, GoDaddy.com
- Zack Aab, Trendline Interactive
- Nick Boyadjiev, Community Network Center, Inc.
- Malcolm Waltz, LinkedIn
- Alice Spencer, Ometria
- Tõnu Tammer, CERT-EE
- Joseph Rascoe, iContact
- Sara Riganti, Contactlab
- Scott Rose, NIST
- Alessandro Vesely
- Dirk Jan Koekkoek, Mimecast
- Jon Marburger, Sharpspring
- Ned Freed, Oracle
- Elizabeth Bartlett, T-Mobile
- Takahiko Suzuki, IIJ
- Eline van der Vorm, dmarcian