Closed mindrunner closed 4 years ago
This is the headers if I catch this email on my server befor forwarding it to google.
Return-Path: <SRS0=oHsH=3G=fddkim.genesis-mining.com=bounces+4491982-1251-genesismining=domain.com@domain.com>
Delivered-To: mail@domain.com
Received: from mx0.domain.com
by mx0.domain.com with LMTP
id 0mRrB8PHIV5RBAUApw0tgQ
(envelope-from <SRS0=oHsH=3G=fddkim.genesis-mining.com=bounces+4491982-1251-genesismining=domain.com@domain.com>)
for <mail@domain.com>; Fri, 17 Jan 2020 14:42:11 +0000
Received: from localhost (localhost [127.0.0.1])
by mx0.domain.com (Postfix) with ESMTP id 103B25FF6C;
Fri, 17 Jan 2020 14:42:11 +0000 (UTC)
Received-SPF: Pass (mailfrom) identity=mailfrom; client-ip=198.37.146.36; helo=o24.email.freshdesk.com; envelope-from=bounces+4491982-1251-genesismining=domain.com@fddkim.genesis-mining.com; receiver=<UNKNOWN>
Authentication-Results: mx0.domain.com; dmarc=pass (p=reject dis=none) header.from=genesis-mining.com
ARC-Filter: OpenARC Filter v0.1.0 mx0.domain.com 2D4EE5FF60
Authentication-Results: mx0.domain.com; arc=none
ARC-Seal: i=1; a=rsa-sha256; d=domain.com; s=openarc; t=1579272130; cv=none;
b=Qpk9blS/lrqB7/qQ7Zszn0p5Y3Luvz9TA8LFJcPUlYBcxRPhMgz6YMyqKqh0KWdEC3pRLf+sSp/EMLVSo+mZ18TNfx+Ib1PYaoC7oRejVjmg9jww6gzY9KkRzrcUcrrCnN4QLM2xaOoQKvKWjBdLFDGRy9c/BEDlupsB+iBc1QZhnHQLtDJVfUkoVJpHE2gbJH9DJIheC4vrvDN7IWt/VJbFslpaYez6FxR7y7EAV37ngmVzRgUaR76QlAkOo8z0iRa3/BcibwuU8fYy8+cBnl07URkwHjBZNOpBdEbc0ULNm45l0Zl7I4t3g2jArzNEhU/VI2Jw7Y/tsbtuSjS4BA==
ARC-Message-Signature: i=1; a=rsa-sha256; d=domain.com; s=openarc;
t=1579272130; c=relaxed/simple;
bh=G1jl10xcSBAL/TUuxdTrNFAfIEiMaT1F0Vi+1LFlSI0=;
h=Received-SPF:DKIM-Signature:Received:Received:MIME-Version:
X-Received:Date:From:Reply-To:To:Message-ID:In-Reply-To:References:
Subject:Content-Type:Content-Transfer-Encoding:sent-on:X-SG-EID:
X-SG-ID; b=KTMTAuIb1s4rL0nYLU3tOHyu0q0uWe4RGCSTava0U2HNPbGrwRD1zdjgtVEDtN3yIFNdHFrvH1GoQb+PJsJrndUpKk5sjtAQc2iGludBKaSFpgX/WC8tmrVoQ5spMILYNveCnDdnltaB84QI6BgU3hl/cBoUx9zbE/F7TTckRzPXp01akiaUXG0+NwHbsBnbC3YeQspXQ1/pUqZsyr2KIhSgZwGFFpIokdrplLOEXGlqKAqouW1Twvzsuq5snoaqzcK2m+gfIexLlB6BufgVkJ1umWkH8JPnDLujCRFRwBVGHmPZxe2u9Kf9JqvyFSeDCuXVVVx7DA9wvGeaGItjRA==
ARC-Authentication-Results: i=1; mx0.domain.com; dkim=fail (1024-bit key; unprotected) header.d=genesis-mining.com header.i=@genesis-mining.com header.b=LE370jT7 reason="signature verification failed"; dkim-atps=neutral reason="signature verification failed"; arc=none
Authentication-Results: mx0.domain.com;
dkim=fail reason="signature verification failed" (1024-bit key; unprotected) header.d=genesis-mining.com header.i=@genesis-mining.com header.b="LE370jT7";
dkim-atps=neutral
Received: from o24.email.freshdesk.com (o24.email.freshdesk.com [198.37.146.36])
by mx0.domain.com (Postfix) with ESMTPS id 2D4EE5FF60
for <genesismining@domain.com>; Fri, 17 Jan 2020 14:42:09 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=genesis-mining.com;
h=mime-version:from:reply-to:to:in-reply-to:references:subject:content-type:content-transfer-encoding;
s=m1; bh=9jWVy/3n+NvGoACzM6X5cvL727CBBIJQXJvhbJ23Deo=; b=LE370jT
7MjCydMIXZRdIEL85RYu40DcSj2jaSPllKnP1NPLg+cUAjmX9BF0nup7CRrCzqy5
xaPyliF6srGCyhtrl+pgl4dkcdUN81ka7Gudn/Z5YfkkEpiPxGuOf6D3ubJ0NEf3
/pREmeKiDKfW+8w+vuW7OGmDjpwGJgDOsLFw=
Received: by filter1140p1las1.sendgrid.net with SMTP id filter1140p1las1-4184-5E21C7BE-25
2020-01-17 14:42:06.819452449 +0000 UTC m=+245683.755791493
Received: from freshdesk.com (mail-us3.freshemail.io [34.199.167.230])
by ismtpd0092p1iad2.sendgrid.net (SG) with ESMTP id bWiIGXEyRzyzWZghYC67rg
for <genesismining@domain.com>; Fri, 17 Jan 2020 14:42:06.721 +0000 (UTC)
MIME-Version: 1.0
X-Received: from ec2-54-152-41-238.compute-1.amazonaws.com (EHLO freshdesk.com) ([54.152.41.238])
by smtpout.freshdesk.com (Freshworks SMTP Server) with ESMTPA ID -1578458907.4
for <genesismining@domain.com>;
Fri, 17 Jan 2020 14:42:05 +0000 (UTC)
Date: Fri, 17 Jan 2020 14:42:07 +0000 (UTC)
Is that a configuration issue on their side? Is there any way for me to forward such faulty emails to Gmail? Or at least put them into a separate inbox somewhere?
At the moment, I am losing those mails without any notification. And the odd thing is, that this seem to never happen with EMails I do not want to receive, but only with Emails I DO want to receive (e.g. dhl.com, deutsche-post.de, genesis-mining.com, etc)
Deliver to a mailbox on your server. Poll the mailbox on your server with the Google Mail Fetcher.
ARC requires trust between the ARC signer and the recipient server before its useful. All an ARC seal says is that your domain created the ARC seal.
John Capo Tuffmail.com
On Fri, January 17, 2020 09:53, lukas wrote:
Is that a configuration issue on their side? Is there any way for me to forward such faulty emails to Gmail? Or at least put them into a separate inbox somewhere?
At the moment, I am losing those mails without any notification. And the odd thing is, that this seem to never happen with EMails I do not want to receive, but only with Emails I DO want to receive (e.g. dhl.com, deutsche-post.de, genesis-mining.com, etc)
-- You are receiving this because you are subscribed to this thread. Reply to this email directly or view it on GitHub: https://github.com/trusteddomainproject/OpenARC/issues/129#issuecomment-575657662
Poll the mailbox on your server with the Google Mail Fetcher.
Not an option. Have had this setup before and it sucks. Google has no option to configure the fetchmail frequency. Thus, sometimes a mail is delayed by 10 minutes or more. This is why I went for the forwarding setup.
ARC requires trust between the ARC signer and the recipient server before its useful.
So how do I create trust? Which problem is ARC actually solving then if not the forwarding-one?
On Fri, January 17, 2020 11:32, lukas wrote:
ARC requires trust between the ARC signer and the recipient server before its useful.
So how do I create trust. Which problem is ARC actually solving then if not the forwarding-one?
IMO, none.
John Capo Tuffmail.com
Ok, I am asking a slightly different question then:
Which problem is ARC actually trying to solve?
I think I have misunderstood something about ARC then...
On 2020-01-17 11:37, lukas wrote:
Ok, I am asking a slightly different question then:
Which problem is ARC actually trying to solve?
As I understand it, the intention is to solve the SPF forwarding problem and maybe busted DKIM signatures. But, unless Google trusts your ARC signature the message will not be accepted.
We forward boatloads of mail with valid DKIM signatures from domains that publish reject DMARC records to Google and it is accepted. Mail forwarded from domains publishing only SPF records and publiching reject DMARC records is rejected as it probably should be.
Maybe domains publishing a reject DMARC record without DKIM don't want their mail forwarded.
John Capo Tuffmail.com
My observation is still, that google does not reject all mails from a sender who has a reject-policy. Sometimes they are coming through. Most of the time marked as spam/scam, though.
Are you working for tuffmail? May I contact you in a private chat/email for some questions which are off-topic here?
On Fri, January 17, 2020 12:04, lukas wrote:
My observation is still, that google does not reject all mails from a sender who has a reject-policy. Sometimes they are coming through. Most of the time marked as spam/scam, though.
Are you working for tuffmail? May I contact you in a private chat/email for some questions which are off-topic here?
Yes, any time.
John
ARC provides a trustable means to assert a message's authentication status as seen by each handler in the chain; this does not automatically create a trust relationship between all parties who implement ARC in their message handling. Individual mail recipients decide whose assertions they trust, and that local policy and its effects on message handling have nothing to do with OpenARC.
Does that mean I have to make google trusting my mailserver to accept those emails?
Hi, Lukas,
sorry for the top-posting. I forwarded your question to Brandon Long from Google. He answered:
<Brandon>
Feel free to forward this with my email address.
The example doesn't have an authres header for the spf pass, so it
wasn't included in the aar header, so there's no way for us to
validate dmarc with our system. We could trust the dmarc=pass
itself, but don't currently. I assume this is some misconfig on
their part.
That said, we currently only trust a limited number of arc signers,
which doesn't include this one, so we wouldn't accept the arc
anyways. Figuring out how to know whether to trust any given arc
signer is TBD, that's why arc is experimental. Figuring out why
you're breaking the dkim signature would probably be better for now,
or using pop fetching for this case.
Also, the message shouldn't be lost, it should be rejected at smtp
time, and presumably your server should generate a bounce in that
case, not sure of to that srs address or the original sender.
Brandon
</Brandon>
Brandons mail address is in the cc of this message.
Regards, /rolf
On 17-01-2020 19:36, lukas wrote:
Does that mean I have to make google trusting my mailserver to accept those emails?
— You are receiving this because you are subscribed to this thread. Reply to this email directly, view it on GitHub https://github.com/trusteddomainproject/OpenARC/issues/129?email_source=notifications&email_token=AKB3YS7JYGI27Z35MND7TRTQ6H3C3A5CNFSM4KIJJJX2YY3PNVWWK3TUL52HS4DFVREXG43VMVBW63LNMVXHJKTDN5WW2ZLOORPWSZGOEJISSOI#issuecomment-575744313, or unsubscribe https://github.com/notifications/unsubscribe-auth/AKB3YS63JV24QMDIKSE3X73Q6H3C3ANCNFSM4KIJJJXQ.
Hi Rolf! Wow, that is insightful
sorry for the top-posting. I forwarded your question to Brandon Long from Google
No worries! That's really appreciated. :)
The example doesn't have an authres header for the spf pass, so it wasn't included in the aar header, so there's no way for us to validate dmarc with our system. We could trust the dmarc=pass itself, but don't currently. I assume this is some misconfig on their part.
I do not understand this part. Is that a misconfiguration on my side or on the original sender's side? What is aar
? What is authres
?
That said, we currently only trust a limited number of arc signers, which doesn't include this one, so we wouldn't accept the arc anyways.
That said, OpenArc is useless on my server, because noone trusts me anyways?
Figuring out how to know whether to trust any given arc signer is TBD, that's why arc is experimental.
It's been 3 years now.. Or 4? So what work is being done on this? Is this eventually gonna happen or are we waiting for a dead man?
Figuring out why you're breaking the dkim signature would probably be better for now
So am I breaking this? Most of the mails come through without a broken DKIM signature. Is that maybe some sort of zendesk-issue again? (https://github.com/trusteddomainproject/OpenARC/issues/126) Then I would say, it's a configuration issue on the sender's side, right?
or using pop fetching for this case.
It's not a secret that Googles pop fetching sucks for every-day use. It is good if you want to integrate a legacy account, but for mails which have to arrive instanty, this is useless.
Also, the message shouldn't be lost, it should be rejected at smtp time, and presumably your server should generate a bounce in that case, not sure of to that srs address or the original sender.
Yes, Gmail rejects it and bounces it back. Probably the original sender gets a bounce notification. But they do not care and have no clue anyways. It's me who wants to get the notification. How can I tell postfix
to hand a copy of the bounced message to me?
I've been struggling with a similar situation for several days now. (It would really be super convenient if Google gave any sort of diagnostic info here, or indeed if I could find any tool that would clearly analyze ARC headers.)
I noticed, though, that Google appears to be doing ARC validation on emails even when the DMARC record doesn't indicate p=reject
.
So my question is, if Google's aar
header says arc=pass; dmarc=fail
on this sort of message, does this mean that the ARC validation succeeded, and that it's bouncing other messages not due to any problem with our ARC headers, but just because we aren't a trusted intermediary?
The full ARC headers look like this:
Arc-Seal: i=2; a=rsa-sha256; t=1581538352; cv=pass; d=google.com; s=arc-20160816; b=EgZgksOvJoSFt/kHCR84bEfI59RmGg87Cip6YVC9ZXHEDFovDdyBoHqyALRvDfNo0/ pTYYe70DvEW2+vPO7RmSjMYciqdUxF42zlc4hsCqaQprl7mlWSLHzU5x/tq23KcVMF7x T1gojdS7/5ibXaBj2i7M+54x5WX9bvC3Qnk1Z6ciTcX0fMaqowF64YNsaWUvpGyTNYWD VFnxJMk2eXSr7yVWht0a1DijRjsDrdEtnd4ArLdFzgEy6tMcJXUGvW8SOTO+oBXpZapU 06KSOCbTTYtDXRVhdEPzyAO/Rf/kCyqiYoM7ljjG6ybaYlL2bhTYGPotEOSqnGsMRDSm yk/w==
Arc-Seal: i=1; cv=none; a=rsa-sha256; d=iris.washington.edu; s=default; t=1581538351; b=WifQ/vKCB7AOQNCzHr5DL/p2YovUX7pQDDB+oChr7R1lmNNuTWvxenqqG7udVX06JqrK8 R9UyFRB4DNmj+jbBWHT4FTx6AZfK0WsTrq2g7Va8XRcKQky9AmUUnXUMLSNf+0vDk4Azi/9 hQyCd+/EkFdgqL9v8O5DCSak8As2Zd4=
Arc-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@iris.washington.edu header.s=default header.b=NuUFqrKJ; dkim=fail header.i=@gmail.com header.s=20161025 header.b=erRanm81; arc=pass (i=1 dkim=pass dkdomain=gmail.com); spf=pass (google.com: domain of adam@iris.washington.edu designates 128.95.166.28 as permitted sender) smtp.mailfrom=adam@iris.washington.edu; dmarc=fail (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com
Arc-Authentication-Results: i=1; iris.washington.edu; dkim=pass header.d=gmail.com; arc=none; dmarc=none
Arc-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=to:date:message-id:subject:mime-version:content-transfer-encoding :from:dkim-signature:dkim-filter:dkim-signature:dkim-filter; bh=eC20HmzbMPm50ripBzOh7T5g0amfPaODvY3WjxrTPcc=; b=RJjnJBnuPKM3PbdArXBvS2YW/ioHBFLXkjOnxvJ/xexjTinAE1pP0EXULrE77T+ZyT IvgPWMV/P12ZOb//asZQN8cEYSqzZ/gawsDRwGfMu/7w7yyuz6ob5wIJfQWRxp2GUPEJ XDE9Ozb+mPF9aK1m7UgcxoKb2RBs7WLBFCcb5TXJcuWgFiK0QxwfROoWtfLj2nZXDIoZ u6SqBx77Zq/123P9dGUA9R6ifMReHAEPolfe5vf1uVU0n8xbKdTbYu3u4bB4An4jMv8c J8c8wKfSZKats4/z9ahw4XO5YiePNFp3lOqug0ElJJVFSapbD9T9oiPPcIs0fsQ5b3O1 ZlKA==
Arc-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=iris.washington.edu; s=default; t=1581538351; h=from : sender : reply-to : subject : date : message-id : to : cc : mime-version : content-type : content-transfer-encoding : references : list-id : list-help : list-unsubscribe : list-subscribe : list-post : list-owner : list-archive; bh=eC20HmzbMPm50ripBzOh7T5g0amfPaODvY3WjxrTPcc=; b=blQOqnI7IoLG3p6v/pWJo3oEezKOtIIo0gqw1kf3axAZEWUAorpxDcyAUfJjXwFC9Hhk5 rdszvTNWE0eC+idtG8MQZDj9oPP0Wu+YuaTl0hMTMJrt2G7haTSMgqh7W63G6PhF4ps6GtW DWTfS6/xIc1920mcm0ZYswyzgYwH8h8=
On Wed, Feb 12, 2020 at 12:55 PM Adam Clark notifications@github.com wrote:
So my question is, if Google's aar header says arc=pass; dmarc=fail on this sort of message, does this mean that the ARC validation succeeded, and that it's bouncing other messages not due to any problem with our ARC headers, but just because we aren't a trusted intermediary?
If they are bouncing "other messages" then presumably there is something about those messages they don't like. You are properly understanding header combo you cited. Note that ARC results are only part (if any) of the mix in determining the disposition of any message at any receiver.
--Kurt
On Sat, Jan 18, 2020 at 5:43 AM lukas notifications@github.com wrote:
It's been 3 years now.. Or 4? So what work is being done on this? Is this eventually gonna happen or are we waiting for a dead man?
Technically the ARC RFC was only published about 6 months ago. Based on that there is implementation work in the pipeline at a variety of MTA vendors and service providers (who have to remain unnamed for now).
--Kurt
If they are bouncing "other messages" then presumably there is something about those messages they don't like.
Presumably what they don't like is that the DMARC policy for the originating domain says to reject these messages. My understanding of ARC is that there are 3 possible reasons for this:
Since option 2 is the only one I have control over, I'm trying to figure out how to distinguish option 2 from option 3.
Since none of this resolves into a bug that needs to be fixed in OpenARC, I am closing this ticket. It's up to Google if they trust the ARC signer and that is outside the scope of any code changes to OpenARC as it's a policy issue.
Hi, you can see my setup working here: https://github.com/trusteddomainproject/OpenARC/issues/124
However, I am getting those messages in my Log whe forwarding mails to Gmail.
Isn't OpenARC supposed to exactly fix this problem?