-
Notifications
You must be signed in to change notification settings - Fork 102
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Deprecate "dkim" authentication method for scenarios #1483
Comments
I'm not a DKIM/DMARC expert, therefor I suggest you ask David Verdin's point of view. He both knows very well Sympa and these protocols. @dverdin could you give Soji your point of view on these propositions? |
OK, I'll give it a try.
No. Sympa's DKIM verification works exactly as it is expected in the RFC: it checks whether the DKIM signature is valid or not. That's the essence of the RFC. DKIM has never been intended to be a user authentication mechanism.
Yes. However, that's a more important effort to perform than simply sending a fake message without signature. Most bots won't bother registering domains and sign messages.
I don't think it was ever intended for this. Having the "dkim" authentication level meant a little more confidence than smtp, because of the non message alteration described above. Also, when it was implemented 13 years ago, DKIM was less used, so most of the people having a DKIM DNS record had legal activity. At least "legal spam". DMARC could be used as a replacement of DKIM, but it does not give more information about the sender's identity. As DKIM, SPF and ARC, it is only a domain authentication mechanism, not a user authentication. Using DMARC supposes we have a front that creates the Authentication-Result headers based on SPF, DKM and DMARC. This front should do the rejection if the DMARC policy is "p=reject".
ARC verification adds a level of complexity because it supposes you have a reference of mail servers whose ARC headers you trust. That could be a new Sympa configuration file.
Yes, but it is not a important. S/MIME is not available in a web context either.
The upgrade process would certainly be a pain, yes.
The first point is probably a good idea. At least, it leaves the questions regarding DKIM to external systems better equiped to handles these RFC, such as Authentication-milter or Rspamd. I'm not sure what the second one means, but if it means using DMARC and ARC as authentication levels ins scenario, then it will need revisiting the way the scenarios work to allow more nuances in authentication results assessment. The idea is: if the message passes DMARC authentication, we still have no guarantee it was sent by the sender in the From: field. But if it does not pass DMARC authentication, depending on the DMARC policy, the message should be either rejected (p=reject) and it should be rejected by the mail front, mooderated (p=quarantine) with a warning similar to those provided by the antispam scenario or treated as smtp (p=none). The third point is wrong. You should not take the domain or identity into account while evaluating DKIM. That's DMARC'c job to do that. If you remove DKIM from scenarios, remove it completely.
Yes, as I wrote: Sympa is unlikely to be able to evaluate SPF, so it should user the Authentication-result headers of its mail front. |
Please read the document.
Such configuration file (why the file instead of parameter, besides) seems not useful. What I wrote is that the message that has been modified in forwarding could validate the ARC chain instead of validating the DKIM signature. Anyways I want to know: In the end, You think that the dkim authentication method is not helpful after all. Is it right? |
I wrote it.
What is the point of writing an answer if you don't read them ? I said that removing the dkim authentication level was a good idea. |
OK. I confirmed that this, dkim authentication method for scenarios, is one of the features that was only planned but not working properly. In these years, I have been working on fixing many of those things to make them really usable or removing them to cleanup code. I am happy to be able to remove this. Thank you for answer. |
The interpretation of DKIM signature verification results is left to each ADMD, but on Sympa, it seems to have originally recognized this as a useless feature. So we'd be better no longer to associate DKIM verification results with user credentials. Therefore, I withdraw the second and third of the three solutions I proposed in my first post. |
I submitted update in documentation: sympa-community/sympa-community.github.io#95 |
Expected Behavior
"dkim" authentication method for scenarios should be replaced with more effective feature.
Current Behavior
From:
field, it can partly be replaced by DMARC verification.dkim
method is available only with the formaer.dkim
method is valid or not.Possible Solution
dkim
method and make it an synonym ofsmtp
method.Add a new global option parameter to reflect the results of DKIM/DMARC/ARC verification to thesmtp
method (equivalent to thedkim
method) or not (same as thesmtp
method so far).Make DKIM verification more precise (consider signer domain or identity).It would be possible for Sympa to take on DMARC/ARC verification, however the results of verification at MTA could be used as well as the current ARC support.
Context
The text was updated successfully, but these errors were encountered: