On 12/9/20 11:07 AM, Alessandro Vesely wrote:
> We would like to close this ticket by Dec 23, two weeks from now, so please 
> get on it.
> 
> The ticket text is:
> 
>     It has been asked for a new report type (perhaps a subset of failure
>     reports) that provides minimal data from the email (specifically, the
>     initial ask is for the to: and from: email addresses only) in order to aid
>     identification of the email's destination (and hence, the owner who can
>     help with getting it authenticated) without providing other PII.
> 
>     This is a significant use case for large organizations, where the
>     departments or other sub-organizations run their own emailing
>     infrastructure. This has been specifically requested by multiple
>     universities.
> 
> 
> DMARC failure reporting is based on Authentication Failure Reporting Using 
> the Abuse Reporting Format (RFC 6591), which in turn is based on An 
> Extensible Format for Email Feedback Reports (RFC 5965).  DMARC adds five 
> fields for the second MIME part of the report.  The third part can be either 
> the full message of just the rfc822-headers.  The latter is defined in The 
> Multipart/Report Media Type for the Reporting of Mail System Administrative 
> Messages (RFC 6522), which mentions that Received: fields can also be useful 
> for diagnosing failures.  In any case, private data such as the local part of 
> email addresses can be redacted according to Redaction of Potentially 
> Sensitive Data from Mail Abuse Reports (RFC 6590).
> 
> In order to be useful, reports should contain enough data to discern whether 
> the failed message was abusive, and what stream does it belong to if it 
> wasn't.  Should DMARC Failure Reporting (our document) include some guidance 
> about what parts of the failed message to include and which ones to redact?

During our DMARC deployment (and even today) I was frustrated that I could see 
from aggregate reports that an ESP (or some other type of hosting provider 
whereby the IP address alone wasn't identifiable enough) was using our domain, 
but I didn't know who within our organization was a customer of the ESP.  
Ultimately, I wanted to reach out to the customer and set them up with a 
subdomain to use with the ESP so they could send branded and DMARC 
SPF&DKIM-aligned email.  Asking the ESP who they're allowing to use our domain 
was a dead-end because they considered that private customer information 
(irony!) and they're naturally inclined to make their customers happy by 
tolerating the use of the domain without complicating matters that may result 
in possibly losing the customer.

Forensic reports are a useful mechanism to find examples of these messages and 
subsequently track down the customer on our end.  Usually, seeing the local 
part of the address used in the From header (maybe coupled with the Subject) 
was enough information.  I did struggle with the needle-haystack problem with 
these reports.  It was challenging to find what I was looking for, and it was 
challenging to create a process for going through all of the reports in any 
meaningful way.  Perhaps I didn't really find the right tool for the job, or 
perhaps the problem wasn't large enough for me to justify finding/developing 
the right tool.

Alternatives:

- Assuming that all ESPs were cooperative to inquiries from domain owners, and 
there was a consistently-used internal identifier that could be referenced that 
doesn't directly disclose publicly identifiable information about the customer, 
then that might be all of the forensic information that I would need.  But fall 
back to From/Subject, otherwise.  

- SPF macros can be constructed such that the envelope information is sent back 
to the domain owner via DNS queries.  This tactic is handy only if there is 
something identifiable in the local part of the return path.  The downside to 
this tactic is that you're spraying unencrypted identifiable information across 
the internet.

I guess that I'm leaning towards encouraging redacted reports with some 
minimally identifiable information.  The reporters still have the option to not 
send reports (or redact however they see fit), and domain owners have the 
option to not request reports if they are concerned about privacy.  

The potential downside to not having failure reports at all is that potentially 
less secure/private mechanisms may be adopted due to demand (such as SPF 
macros, sketchy data warehousers, etc). 

I did purposefully ignore the use case for using DMARC failure reports to track 
direct domain abuse, which I assume is a valid use case and should be 
considered in more depth.  I just don't have a direct experience using that 
data in any meaningful way.  Perhaps it could be used in a way that articulates 
the *actual* amount of direct domain spoofing being used by malicious actors, 
as opposed to aggregate reports which only gives you IP addresses (which may be 
enough if cross referenced with reputation lists).  Obviously, if you rely on 
the full details of the failure report to build anti-spam heuristics, then you 
wouldn't want the reports redacted.  But if you are in that business, I assume 
that spam traps work better anyway.

>From the original ticket, I am failing to completely understand why "aid 
>identification of the email's destination" is more useful than identifying the 
>[true] origin.  I suppose it could be useful for organizations who want to 
>validate the use case (make sure they aren't sending unsolicited messages, 
>etc) before adding another server to SPF (without talking to them?).  That's 
>just not something we do, since we have a Holy Roman Empire and let people do 
>whatever they want with their own subdomains.

Jesse

_______________________________________________
dmarc mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to