From: RW <rwmailli...@googlemail.com>
    
>On Fri, 5 May 2017 17:45:37 +0000
>David Jones wrote:

>> From: RW <rwmailli...@googlemail.com>
>>     
>> >On Fri, 5 May 2017 14:51:32 +0000
>> >David Jones wrote:  
>> 
>> >> >I know. I do not want to validate the envelope from with DKIM. I
>> >> >just want to know if the mail was DKIM-VALID signed by the DOMAIN
>> >> >used in the envelopefrom.    
>> >>   
>> >> >So the only thing I want with the envelop from is to extract the
>> >> >domain and test if the mail was DKIM signed (and valid) by that
>> >> >domain.    
>> >>   
>> >> >This tells me the envelope from is not some random spoofed
>> >> >address, but actually controlled by someone who handled the
>> >> >e-mail before it arrived at our mta.    
>> >> 
>> >> This actually would be a very useful rule/logic to add to SA:
>> >>   
>> >>https://blog.returnpath.com/why-passing-and-aligning-both-spf-and-dkim-is-key-to-email-deliverability/
>> >> 
>> 
>> >So what would be the point in running a separate DKIM test against
>> >the envelope if you are looking for alignment.  
>> 
>> I don't think this would be a separate DKIM test necessarily.  It
>> should be a combination of SPF_PASS + DKIM_VALID_AU + the
>> envelope-from matches the DKIM-signed domain.  This is basically
>> perfect DMARC alignment where the domain has "p=reject" and DMARC
>> would pass meaning the domain was not spoofed.

>Alignment of the two from address is needed in DMARC so that SPF can
>match on the same domain that the MUA displays (if it even does). It
>doesn't do anything for DKIM. 

Did you read that returnpath.com link above about DMARC passing if
SPF or DKIM passes and are aligned?  They know what they are doing
and I have seen this to be true in my own inbound mail based on
OpenDMARC headers.

>I don't seen why anyone one would want a form of whitelisting where a
>DKIM pass on a trusted domain would be ignored if there's no SPF
>pass.

Correct.  This is why I only add envelope-from domains to my
whitelist_auth list that is currently 2,595 entries.
    

Reply via email to