[ih] Various tests

Dave Crocker dhc at dcrocker.net
Sun Feb 11 08:36:30 PST 2024


On 2/11/2024 8:10 AM, Matt Mathis via Internet-history wrote:
> I'm under the impression that this is the problem that ARC is supposed to
> solve.

It is.  It is also complex and has had very limited uptake.



> The email intermediary, namely the list itself, can use ARC to
> certify that it confirmed the signatures on the earlier hops in the
> delivery path.

Besides the underlying complexity of the mechanism itself, it requires a 
new, and different, type of reputation analysis: Should statements of 
the ARC signer be believed?  And then it requires modifying the 
filtering engine to use this indirect vetting.



> It's been widely published that Google and Yahoo! Started requiring DMARC
> reports as of February 1st and that they would start statistically not
> deliver mail from domains not using DMARC.   (Yahoo provides mail service
> for at least 5 large ISPs)

That's not quite what they said they require:  they limited the 
requirement to bulk senders.


> It's amusing that they didn't require any specific DMARC actions, only that

DMARC effectively provides 3 functions:

 1. Validation of the From: email address domain name.  So, it is an
    added authentication semantic, claiming a degree of validation of
    the author's address.
 2. A requested handling of non-validating messages
 3. A reporting mechanism, for receivers to tell senders what they got,
    purporting to be from the sender's domain

The new operational requirement enforces function #1 on bulk senders.  
That's a pretty significant step, even without the other 2 functions.



> you turn on the reports; but once you have the reports, bugs and
> configuration problems become glaringly obvious;

When DMARC was being developed, my own reaction was the the reporting 
function would likely be the biggest benefit.  I haven't tracked this in 
detail, but I gather it's had some mixed results, though it probably 
does have the benefit you cite, during initial stages of using DMARC.



>   and once you fix them
> sammers forging email from your domain become glaringly obvious; and then
> when you change the disposition to quarantine (request that downstream MTAs
> treat signature violations as spam); the spammers go away.

No they don't.  They merelystop playing the game of spoofing the From: 
field.  And that game has never been always played, when sending spam.

First, note that users these days typically don't see the From: field 
email address and even when they see it it does not alter their 
susceptibility to spammy content.

Second, DMARC is useful because failures correlate with spam, not 
because spam has to spoof From: field addresses.

Finally, note that the From: field rewriting done by mailing lists 
demonstrates how easy it is to route around DMARC.



> Unless the email wizards missed something it appears that as DMARC rolls
> out we will have strong end-to-end cryptographic signatures of the ISP
> which authenticated the human originating every message.

It doesn't actually authenticate the author.  It authenticates the 
author's domain.  In shared environment -- statistically, that is all 
the email addresses in the world -- the semantic difference is significant.


d/

-- 
Dave Crocker
Brandenburg InternetWorking
bbiw.net
mast:@dcrocker at mastodon.social



More information about the Internet-history mailing list