I'm of the opinion this goes back to Todd Herr's topic on the ARC ML (Topic: Simplifying the Decision to Trust an ARC Header Set) as to whether a validator trusts a sealer's results to be "true and correct".

With the method this is currently handled in adding of false DKIM results, how can a mail operator be expected to trust the assertion of the ARC set, if bogus information is inserted? I certainly would want accurate results if I was to start relying on theirs to decide whether or not to override failed DMARC dispositions.


On 12/11/2022 2:43 PM, Douglas Foster wrote:
ARC can prevent a message from being blocked by DMARC policy, but its usefulness is limited because the mailing list receives no feedback and munging is never suspended.

Outlook.com has a curious implementation of ARC.   Their servers apply an ARC signature to every message, asserting SPF PASS, DKIM PASS, and DMARC PASS, without regard to whether the message even has a DKIM signature.  It appears to me that they are trying to document and sign the original identifiers for a message, which actually seems like a desirable thing to do.  Since ARC only captures identifier information as an ancillary component of a test result, they must assert bogus test results to accomplish this result.

ARC should provide a way for any server to document the current state of identifiers, whether a test is performed or not. Better yet, a server which knows that it is making identity changes should be able to document before and after values in a single ARC set.

With this change, we have a way to integrate ARC and DMARC with feedback, in a way that begins solving the mailing list problem.

- The mailing list publishes a DMARC policy and signs outgoing messages with its domain.

- When an author domain's DMARC policy is a problem, the MLM munges the FROM address to its domain.  This also causes the list domain to receive aggregate reports on the munged messages.

- If the receiving system trusts the ARC data, it can reliably restore the From address to its unmunged value, using data from the ARC Set.   Then the unmunged message is delivered to the recipient user.   The disposition data of the aggregate report is used to communicate to the mailing list that the ARC data was trusted and the From address was unmunged.

- If the receiving system does not trust the ARC data, current behavior is unchanged.  The munged message passes DMARC based on the munged address, and the message is not obstructed by DMARC FAIL.

Doug



_______________________________________________
dmarc mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dmarc

_______________________________________________
dmarc mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dmarc

Reply via email to