[conspire] (forw) Drastic step to deal with DMARC damage (was: What the hey? I am still garrison.hilliard at gmail.com)

Local mailing list for the CABAL Linux user group. conspire at linuxmafia.com
Fri Mar 1 15:09:08 PST 2024


Quoting Local mailing list for the CABAL Linux user group. (conspire at linuxmafia.com):

[This is Ivan Sergio Borgonovo.]

> >   That setting is called "anonymous list", for short.
> 
> This is a very bad idea and you can already acknowledge the effects
> and I bet it's not necessary but I understand I've no right to
> assume you've to fix it.

Datum:  linuxmafia.com runs Mailman 2.1.13.  The signature mitigations 
for DMARC were introduced only with late 2.1.x releases.  For
complicated reasons, linuxmafia.com is poorly maintainable at present,
and really needs a from-scratch redesign.

However, with caution and planning, I'm guessing we'll be able to
upgrade Mailman from 2.1.13 to 2.1.30 soon -- and then will have DMARC
mitigation available for application to each hosted list in the admin
WebUI.

Until then, the awful kludge of "anonymous list" is the only way I know
(in 2.1.13) to sidestep the observed DMARC trainwreck from Paul W.
Harrison's postings to the Skeptic list (from provider co.site).  The
awful kludge manages that because it substitutes a wholly new From: 
internal header on all outbound subscriber copies, removing the sender's 
address, hence making DKIM/DMARC alignment failure for the sender's
domain not matter.

Do you have a better idea, given the constraint of Mailman 2.1.13?





More information about the conspire mailing list