Hi Dilyan,

I'm not clear if you refer to the "DSN" extension (rfc3461).  In fact, positive
DSNs contain the A-R header field, and so can inform the sender when a message
is accepted although some of SPF/ DKIM/ DMARC failed.

I don't send failure reports, as they look plenty of privacy risks.  Perhaps
they could be sent to trusted sites only, but that way they'd lose generality.

It's unfortunate that FR seem to be the only means to tell unwanted failures
from real spam/ phishing successfully blocked by the protocol.  Perhaps that
distinction could be added to aggregate reports, even if it's not an exact 
science.


Best
Ale


On Fri 02/Aug/2019 18:00:11 +0200 Дилян Палаузов wrote:
> 
> why sites do not sent failure reports?
> 
> Will a site, not sending failure report, be willing to use an Enhanced Status 
> Code, to signal, that the DKIM/SPF
> implementations of the receiver and sender disagree?
> 
> * * * New Enhanced Status Code for Failed DMARC Validation
> 
> Code: X.7.30
> Assocaited basic status code: Any
> Description:  Used as partial substitution to failure reports, when DMARC 
> validation fails.  250 2.7.30 means, that the
> message was delivered, ordinary or as junk, despite failed DMARC validation. 
> 550 5.7.30 is used when the message is
> rejected, because the DMARC validation failed.  This status code is only 
> usefull, when the receiving site does not send
> failure reports.
> 
> Regards
>   Дилян

-- 







_______________________________________________
dmarc mailing list
dmarc@ietf.org
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to