17
Expand DMARC Options/Scoring
Idea shared by kevind - 5/10/2024 at 1:52 PM
Under Consideration
Currently you can enable DMARC for incoming mail and enter a single score if it's suspicious. But  that seems limited as there are quite a few DMARC results. Suggest the DMARC section be expanded to accomodate the many results:
  • DMARC: [none]
  • DMARC: [failed]
  • DMARC: [passed]
  • DMARC: [skipped] (multiple reasons)
Might make sense to provide a score for each of the above, and passed would be a negative number.

Google and Yahoo now require domains to have DMARC, so let's give SmarterMail the ability to do the same thing. If a spammer sends email with no DMARC, I want to reject or give it a high score. Thanks!

11 Replies

Reply to Thread
5
Yes, I have asked for this as well.  Ticket 2DD-2D39507C-0B13 from January
5
Yes, +1 let's vote this up.

Would be nice to set DMARC [passed]: -5
just like you can specify DKIM [Pass]: -5

Also, curious about the "_ARC: none" in the header. Not familiar with that.
4
Also, this feature would be nice for blocking spam from onmicrosoft.com domain as most of it doesn't have DMARC.

So when you see this line in SMTP:
DMARC Results: None (Domain: , Reason: No DMARC record found), Reason: No DMARC record found, Reject? False
You could assign it 10 to 20 points!
2
+1
Gabriele Maoret - Head of SysAdmins at SERSIS Currently manages 6 SmarterMail installations (1 in the cloud for SERSIS which provides services to a few hundred third-party email domains + 5 on-premise for customers who prefer to have their mail server in-house)
2
The SmarterMail implementation follows RFC 7489, which is a big problem, because the RFC leads people to make poor decisions.   It implies that Fail with p=Reject is always unwanted, which is false.   IETF wrote a whole RFC on the problem  (RFC 7960).    The RFC also implies that any other Fail is not actionable, which is also false.  

Since 95% of all domains lack a p=reject policy, ignoring No Policy and Fail with p=none will  leave you vulnerable to 95% of all detectable impersonation attacks.  A completely different approach is recommended.

  1. A message is authenticated if it has "Aligned SPF Pass" or "Aligned DKIM Pass".   This test can be applied to every message, using a default alignment rule of relaxed.    It is stupid to ignore this important information simply because the domain owner has not published a policy.   (This approach is predicted to jump your authentication rate to about 85% of all incoming messages.)   When this criteria is satisfied, it becomes safe to flag a Trusted Sender or a BIMI image, because impersonation has been ruled out (within the limits of the technology.)

  2. If a message cannot be authenticated, you are at risk of a malicious impersonation attack.  You either hope to luck that your content filtering will catch the malicious attackers, or you do the hard work of investigating the authentication failure.   I refuse to delegate my network security to strangers, so the stranger's DMARC policy has no impact on how I respond.   My commitment is to investigate EVERY authentication failure.

  3. Authentication failure is ALWAYS an ambiguous result.  You need to investigate the root cause to eliminate the ambiguity so that you will never have to do so again.    Two results are possible:

    1. The message originator is malicious, or otherwise unwanted, so you block the identifiers that represent the message originator.  Now you are protected even if the attacker uses a different attack technique.

    2. The message author is acceptable, so you create an alternate authentication rule that represents the acceptable entity.   
      1. A rule based on server name, verified with fcDNS, can provide proxy authentication for the accompanying "Mail From" address, mimicking the design of SPF.  
      2. A rule based on Mail From domain, verified by SPF or local policy, provides proxy authentication for the From address, mimicking the design of DMARC.
Because future messages will either be blocked by local blacklist policy or verified by local authentication policy, you never need to worry about this ambiguity again.

When the message is authenticated by local policy, the message should be given a custom header to indicate successful authentication.   Then SmarterMail can detect the custom header so that Trusted Sender and BIMI image features can be activated.

I had to build the alternate authentication rule structure using Declude and SQL, because you build long lists and  you are creating 3-attribute authentication rules (underlying identifier, verification result, and proxy authenticated identifier.)  

The implementation process was manageable because I had a good message review tool in my Barracuda appliance.   In the beginning, I let Declude flag the authentication results while relying on content filtering alone.   Then I investigated unauthenticated traffic after it was released to the user.   The process converged pretty quickly, at which point I was able to make authentication mandatory, with unauthenticated messages being sent to quarantine (never to Block!)

Authentication does not solve all problems.   I still have to contend with authenticated-but-unwanted messages, mostly from Gmail, that are sent from computer-generated accounts created for one-time use.   But it helps block most everything else. 

In the short term, what I want SmarterMail to do is to drop the "ALWAYS BLOCK ON FAIL" rule.   This will at least allow me to activate SmarterMail DMARC processing, s that I can take of Trusted Sender and BIMI when their standards-based design generates a PASS result.  But I will not turn it on anything that forces me to block wanted messages.


5
I think the best thing would be to have a (customizable) list of scores based on the result (DMARC result + domain DMARC policy setting), for example these:

DMARC Pass: 0 or whatever you want (also negative like -5 if you want)
DMARC Fail (policy "none"): 5 or whatever you want
DMARC Fail (policy "quarantine"): 10 or whatever you want
DMARC Fail (policy "reject"): 20 or whatever you want
DMARC not set/nonexistent: 5 or whatever value you want

If there are other possible combinations, they should be added
Gabriele Maoret - Head of SysAdmins at SERSIS Currently manages 6 SmarterMail installations (1 in the cloud for SERSIS which provides services to a few hundred third-party email domains + 5 on-premise for customers who prefer to have their mail server in-house)
4
If possible, I would ask SmarterTools to review this request and give us feedback on whether it is possible to implement it.

It would be very, very useful and I think it would greatly increase SmarterMail's ability to block SPAM.
Gabriele Maoret - Head of SysAdmins at SERSIS Currently manages 6 SmarterMail installations (1 in the cloud for SERSIS which provides services to a few hundred third-party email domains + 5 on-premise for customers who prefer to have their mail server in-house)
6
Yes, 12 votes!  Would be good to make this Under Consideration or In Progress.
2
Is there anyone who can tell us whether this is feasible or not and whether it will be considered?
Gabriele Maoret - Head of SysAdmins at SERSIS Currently manages 6 SmarterMail installations (1 in the cloud for SERSIS which provides services to a few hundred third-party email domains + 5 on-premise for customers who prefer to have their mail server in-house)
3
Zach Sylvester Replied
Employee Post
Hello, 

Thank you guys for the suggestion. I have submited this as a feature request in our system. We will keep you guys updated with the status of the feature request. 

Kind Regards, 
Zach Sylvester Software Developer SmarterTools Inc. www.smartertools.com
1
Zach,
Great – 15 votes!
Thanks!

Reply to Thread