Hello,

First - Benjamin, Steve's post is not a coincidence - he and I had a
conversation about the specific issue I'm dealing with, which was super
helpful, and I suspect sparked this blog post. I wanted to get a few more
data points, which is why I posted here, but his blog post is indeed very
useful.

The specific use case that is driving me to look into this in detail is
this: I'm working with a government agency that is subject to the
operational directive 18-01 that requires their domains to be at DMARC
p=reject by mid-October this year. The specific set of mailings we're
having trouble with are sending email on behalf of a government database of
research information, where the subscribers are everyone from other
government employees to university and private business researchers to the
general public. From the subject lines I've seen, it looks like the content
is new research information matching a subscriber's saved search query. The
messages are being sent from Postfix, and they are fully aligned and pass
both SPF and now DKIM, but we are seeing a lot of failures through
forwarders, especially universities, in a much greater number than I see
from other high volume sending domains that are authenticated at this level.

I do not have access to any of the bounces or server logs, only the rua and
ruf data.

The admins for this system haven't historically worked very closely with
us. They knew they needed to set up authentication, so they first set up
SPF and moved the domain to p=quarantine. Then the postmaster for one of
the universities whose researchers use this information a lot complained to
them about messages in the spam folder, and they moved it back to p=none.
We got them to add DKIM, and then they moved it to p=reject. Then they
heard from other postmasters from yet other universities about messages
that weren't being received, so they've moved it back to p=none again.

Here's the headers they're signing: h=to:cc:from:subject:reply-to:Date

The forensic data samples I have show that a number of the messages that
fail seem to have injected different reply-to addresses, some of which
clearly belong to mailing lists. I suspect what's happened is that
researchers have subscribed their research group mailing lists to updates
on specific topics from the government database, and this is changing the
message in transit and breaking DKIM and DMARC.

To a certain degree, I know we can't perfectly control systems that change
messages and headers through lists and forwarders, but the number does seem
larger than usual - something like ~25% from forwarding servers, where a
similar volume sending domain from another part of the same agency that is
sending newsletter type content and not research data tends to see an ~8%
failure rate from forwarding servers. Also, I am sympathetic to the
research need and want to help as many of these messages get delivered as
possible, because I care about science.

What I'm thinking is that the situation might improve if they can stop
signing the reply-to: and possibly even the to: and cc: headers. Am I on
the right track? Any other recommendations?


Thanks,

Autumn Tyr-Salvia
tyrsalvia@gmail
atyrsalvia@agari

On Fri, Jul 20, 2018 at 8:02 AM, Kurt Andersen (b) <kb...@drkurt.com> wrote:

> On Thu, Jul 19, 2018 at 10:18 PM, Autumn Tyr-Salvia <tyrsal...@gmail.com>
> wrote:
>>
>>
>> ... I have lately had some customers with greater-than-usual issues
>> relating to ... messages that get forwarded, where the forwarding system is
>> changing headers to the point that they break DKIM
>>
>
> Aside from this being a great opportunity to employ ARC, can you tell us
> which headers were being munged by the forwarder(s) or is that info lost in
> the rejections?
>
> --Kurt
>
>
_______________________________________________
mailop mailing list
mailop@mailop.org
https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop

Reply via email to