On 1/26/21 12:29 PM, Todd Herr wrote:
On Tue, Jan 26, 2021 at 3:16 PM Michael Thomas <[email protected] <mailto:[email protected]>> wrote:

    Yes, DMARC reports are of value if you don't know all of the IP
    addresses that send on your behalf. Some have even written blog
    posts on the topic of using DMARC aggregate reports as a tool to
    audit one's authentication practices, by publishing a policy of
    p=none, collecting the reports, analyzing the data, fixing
    problems, iterate, iterate, iterate until one is ready to move on
    to the ultimate goal of p=reject.

    How do I know when I'm done though if I don't know the IP
    addresses who send on my behalf? Is it an actual forgery or is it
    Marsha in marketing using a outsourced email blaster?


Time.

Some industry experts have suggested that one budget twelve to eighteen months between first publishing a DMARC policy record and the hoped-for transition to p=reject. YMMV, and a lot depends on the types of messages that the organization sends, and their cadence. At the extreme end of more than a year would be larger companies doing seasonal or cyclical mailings, ones that maybe only market to certain customer segments once or twice per year, tops. The more one knows about one's mail flows and the better one's authentication practices before deploying DMARC, the shorter that time can be, but a year or more isn't unusual at all.

I don't see how time helps anything if I can't differentiate between our legitimate traffic and attacker traffic. All an attacker would need to do is send a mail cannon to mimic Marsha in Marketing every once in a while and the entire thing resets. If it is a requirement to know all of the legitimate IP addresses in order to make use of the reports as an indicator, the draft should be very explicit about that.

Mike

_______________________________________________
dmarc mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to