Skip to main content

Minutes interim-2020-dmarc-01: Thu 16:00
minutes-interim-2020-dmarc-01-202006111600-01

The information below is for an old version of the document.
Meeting Minutes Domain-based Message Authentication, Reporting & Conformance (dmarc) WG Snapshot
Title Minutes interim-2020-dmarc-01: Thu 16:00
State Active
Other versions plain text
Last updated 2020-06-12

minutes-interim-2020-dmarc-01-202006111600-01
DMARC WG Meeting - Interim 11 June 2020
Thursday, June 11, 2020, 16:00-17:00 UTC
Chairs: Seth Blank, Alexey Melnikov, Tim Wicinski

Webex: https://ietf.webex.com/ietf/j.php?MTID=me6b9c2bdf971f0ead8713b4a9c50c975
Jabber: dmarc@jabber.ietf.org

Etherpad:
https://etherpad.ietf.org:9009/p/notes-ietf-interim-2020-dmarc-01-dmarc?useMonospaceFont=true

 Agenda: (from
 https://datatracker.ietf.org/doc/agenda-interim-2020-dmarc-01-dmarc-01/)
## Agenda Bashing, Blue Sheets

## Recap of M3AAWG discussion preceding this interim session

##  Joint DMARC 2.0 Discussion (M3AAWG and IETF)

List of open DMARC issues:
https://trac.ietf.org/trac/dmarc/report/1

Notes
-----
* Reminder of IETF Note Well and IETF policies
* Attendees reminded to sign in
* Summary of M3AAWG Session
* What it means to do DMARC
* Discussion of p=none
* p=none without reporting means ecosystem issues
* Use of pct option; no consensus on its usefulness
* p=quarantine, pct=0 use case
* Ask for DMARC to require both SPF and DKIM pass
* Other failure reporting use cases or requests for changes
* Request for description of Scope of Work for DMARCbis project and how ARC
slots in (Dave Crocker) * Want to make sure DMARC spec is clear and that there
is better buy-in from IETF community than first rev * Work on list of open
issues (https://trac.ietf.org/trac/dmarc/report/1) * Discussion of what it
means to implement specific features * Work on three issues at any given time
so as not to overwhelm anyone * Want to address indirect mail flows as per WG
charter, perhaps fold ARC into DMARC * Request for Murray (scribe lost audio) *
Ensure that the new doc deals with the issues of mailing list breakage * Ensure
that it "passes muster" for IETF consensus * Barry Leiba - DMARC must deal with
mailing list breakage * Should ARC fold in to DMARC? Barry thinks perhaps not -
normative reference instead * Murray - Doesn't make sense to make ARC formal
part of DMARC, but rather make it authentication part * Operational issues
discussed at M3AAWG * p=quarantine, pct=0 * Jesse Thomspon - Could be rephrased
as formalizing header munging * Would be great to get all mailing lists to
munge by default * Maybe ARC could solve, but no guarantee that all mailing
lists support ARC (scribe lost audio) - so there is probably no end to the
munging necessity * Michiel van de Vis (Mimecast) - (scribe lost audio) * some
receivers change how they process messages if they see an enforcement level
policy, regardless of pct setting * they change the 5322.from to their own
domain when forwarding (munging) * affects DMARC reporting back to the original
sender (because the reports then go back to the munging receiver) * Autumn -
Common situation; mail to mailing list, message fails SPF and DKIM at terminal
destination * Header munging removes concern that message fails * Some
providers change headers when p=quarantine/reject * Some mailing list software
will only do this if configured to do so (and is sometimes, but not always
policy-sensitive) * p=quarantine, pct=0 allows senders to test what impact will
be seen from mailing lists by examining reports, looking for diffs from p=none
* Question from Seth - Is this a bug/feature in DMARC or friction in ecosystem
with how DMARC is handled? * Autumn - Friction, due to inconsistent application
across mailing lists; barrier to DMARC adoption * Question from Seth - If pct
were removed, but other method for requesting header munging were available,
would that be okay? * Autumn - Yes * Scott Kitterman - Challenge is that
"header munging not standardized, so discussing it in a standards body may not
be appropriate" * Unlikely that IETF would accept formalization, because there
may not be a way to do it "right" * Alexey - I hear what you're saying, but
perhaps at least getting rough consensus from group can drive change * Seth
requests Scott to create issue in Trac * Scott not sure what to put in the
issue * Kurt Andersen also not clear on content of issue * Discussion tabled
for chairs * Jan-Pieter Cornet - Something in spec to make sure senders not
send messages that break DMARC? * Kurt Andersen - How do we get
spammers/abusers to observe such restriction? * JPC - Point conceded * Seth -
recommend that discussion point be brought to IETF mailing list * Scott - If
rule is "Don't send mail that fails DMARC, that means no mail to mailing lists,
and so I'd delete my DMARC record" * Kurt - Forcing mailing lists to munge
headers will likely not achieve consensus * Discussion should continue on IETF
list * Dave Crocker * Need to have clarity on what the problem is; header
munging is a symptom of the problem * Let's be clear on the need, and then
figure out how to solve it * Hannu Aronsson * Multiple stakeholders have
problems with DMARC due to their roles as intermediaries in mail flow (e.g.
ISPs forwarding addresses at hosted domains, alumni and personal address
forwarding services, mailbox providers forwarding user emails) * How to solve
this problem in meaningful way? * Tonu Tammer * DMARC is about sender
authenticity, not integrity of content * Scaling down DKIM requirements to only
include headers, not body might solve this problem * Forensic reports * How to
strip them down and keep them useful * Autumn - Favors forensic reports, even
if stripped down. * Prefers full forensic reports, but recognizes privacy
concerns. * Large orgs benefit from forensic reports, especially if distributed
management of systems across orgs * From address is massive improvement on just
aggregate reporting * Jesse - Autumn explained issue well * Has same large org
problem that Autumn mentioned * DMARC vendors using SPF macro to glean
Return-Path address seems a kludge * Kurt Andersen * To Autumn - Should we be
more blatant in spec that forensic reports are whatever you're comfortable
sending, with list of items ranging from most useful to least useful? * Autumn
- Yes, and also forensic reports can be useful to provide to takedown vendors
for purposes of fighting abuse * Steve Jones (comment in Webex chat) * Reduced
RUF reports >> no RUF reports * Perhaps 2-3 degrees of redaction shown in DMARC
documentation in appendix or elsewhere in RFCs * Alex Brotman - Be nice if
DMARC had a requirement that SPF not be permissive (e.g., can't do DMARC with
+all) * Seth - Are you seeing operational issues? * Alex - Some spam issues,
but not really operational issues * Seth - Sounds like it's within WG charter,
but perhaps not part of DMARCbis * Kurt - Doesn't see how making DMARC more
complicated with truth table that constitutes pass will help things * Murray -
Might be part of DMARCbis, but Authentication-Results header doesn't currently
include SPF policy, so challenges exist to implement * Jim Fenton (scribe lost
audio, so unclear if below notes capture topic accurately) * Regarding topic of
DMARC alignment conflicts with RFC 5322 on the use of the From and Sender
header fields * If users can see domain in From: field, will they act on it? *
If they can't see it, reputation argument does not hold * Seth - What issue
should be in tracker; assigned to Jim to create it * Tim * SPF +all might be
better in a BCP than in DMARCbis * Discussion of when to have 108 vs. having
another interim session * Jan-Pieter Cornet * Is anyone tracking bounces that
come back from reports? Amount he's seeing is staggering (approximately 50%) *
Jesse - May be a symptom of reports being most useful during rollout;
speculates that domain owners may delete mailbox after rollout * Seth -
Recommend opening discussion on M3AAWG technical list

Blue Sheet
----------
1. Alexey Melnikov, Isode Ltd
2. Kurt Andersen, LinkedIn
3. Scott Kitterman, Kitterman Technical Services
4. Tim Wicinski,
5. Seth Blank, Valimail
6. Murray Kucherawy, Facebook
7. Todd Herr, Valimail
8. Dave Crocker, Brandenburg InternetWorking
9. Barry Leiba, FutureWei
10. Amelia Andersdotter, CENTR
11. Alex Brotman, Comcast
12. Mohammed Zaman, dmarcian
13. J. Trent Adams, The Force Awakens <3
14. Jan-Pieter Cornet, XS4ALL Internet
15. Andrei Robachevsky, ISOC
16. Carsten Bormann, TZI
17. Ulrich Wisser, Swedish Internet Foundation
18. Shuji SAKURABA, IIJ
19. Isamu Koga, IIJ
20. Jim Fenton, Altmode Networks
21. Jesse Thompson, University of Wisconsin-Madison
22. Hannu Aronsson, iki.fi
23. Steve Jones, DMARC.org / LinkedIn
24. Simon Tyler, Mimecast
25. Michiel van de Vis, Mimecast
26. Vlad-Marian Marian, Mimecast
27. Autumn Tyr-Salvia, Agari
28. Tim Vert, LookingGlass Cyber
29. Justin Frechette, iContact
30. Dan Malm, One.com
31. Shehzad Mirza, Global Cyber Alliance
32. Madeleine Hardt, Comcast
33. Yoshitaka Hirano, QUALITIA
34. Steve Webb, atmail PTY
35. Jeannine Bos, University of Wisconsin-Madison
36. Tim Draegen, dmarcian
37. Steve Atkins, Word to the Wise
38. Martin Flygenring, One.com
39. Arne Allisat, 1&1 Mail and Media GmbH
40. Harri Toivanen, iki.fi
41. Petri Koistinen, iki.fi
42. Vaughn Talbert, dmarcian
43. Ayachika Kitazaki, Softbank
44. Tomki Camp, dmarcian
45. Ernest McLeod, dmarcian
46. Mary Sohn, Shopify
47. Udeme Ukutt, LinkedIn
48. Masaki Kase, TwoFive
49. Adam Gall, Eastlink
50. Madeline McCaffrey, Valimail
51. Zachary Sverdrup, Zeta Global
52. Vittorio Bertola, Open-Xchange
53. Sebastian Uziuk, GetResponse
54. Marco Francechetti, Contactlab
55. Alwin de Bruin, dmarcian
56. John Bowers, dmarcian
57. Tobias Mayer, Cisco Systems
58. Matt Heffelfinger, GoDaddy.com
59. Zack Aab, Trendline Interactive
60. Nick Boyadjiev, Community Network Center, Inc.
61. Malcolm Waltz, LinkedIn
62. Alice Spencer, Ometria
63. Tõnu Tammer, CERT-EE
64. Joseph Rascoe, iContact
65. Sara Riganti, Contactlab
66. Scott Rose, NIST
67. Alessandro Vesely
68. Dirk Jan Koekkoek, Mimecast
69. Jon Marburger, Sharpspring
70. Ned Freed, Oracle
71. Elizabeth Bartlett, T-Mobile
72. Takahiko Suzuki, IIJ
73. Eline van der Vorm, dmarcian