<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.27 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-chuang-dkim-replay-problem-02" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.0 -->
  <front>
    <title abbrev="DKIM Replay Problem">DKIM Replay Problem Statement</title>
    <seriesInfo name="Internet-Draft" value="draft-chuang-dkim-replay-problem-02"/>
    <author fullname="Weihaw Chuang">
      <organization>Google, Inc.</organization>
      <address>
        <email>weihaw@google.com</email>
      </address>
    </author>
    <author fullname="Dave Crocker">
      <organization>Brandenburg InternetWorking</organization>
      <address>
        <email>dcrocker@bbiw.net</email>
      </address>
    </author>
    <author fullname="Allen Robinson">
      <organization>Google, Inc.</organization>
      <address>
        <email>arobins@google.com</email>
      </address>
    </author>
    <author fullname="Bron Gondwana">
      <organization>Fastmail Pty Ltd</organization>
      <address>
        <email>brong@fastmailteam.com</email>
      </address>
    </author>
    <date year="2023" month="April" day="01"/>
    <workgroup>DKIM</workgroup>
    <keyword>DKIM</keyword>
    <keyword>Replay</keyword>
    <abstract>
      <t>DomainKeys Identified Mail (DKIM, RFC6376) permits claiming some responsibility for a message by cryptographically associating a domain name with the message.  For data covered by the cryptographic signature, this also enables detecting changes made during transit. DKIM survives basic email relaying.  In a Replay Attack, a recipient of a DKIM-signed message re-posts the message to other recipients,while retaining the original, validating signature, and thereby leveraging the reputation of the original signer.  This document discusses the resulting damage to email delivery, interoperability, and associated mail flows.  A significant challenge to mitigating this problem is that it is difficult for receivers to differentiate between legitimate forwarding flows and a DKIM Replay Attack.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <dl>
        <dt>DomainKeys Identified Mail (DKIM) is a well-established email protocol <xref target="RFC6376"/></dt>
        <dd>
          <t>DomainKeys Identified Mail (DKIM) permits a person, role, or organization to claim some responsibility for a message by associating a domain name <xref target="RFC1034"/> with the message <xref target="RFC5322"/>, which they are authorized to use.  This can be an author's organization, an operational relay, or one of their agents.  Assertion of responsibility is validated through a cryptographic signature and by querying the Signer's domain directly to retrieve the appropriate public key.</t>
        </dd>
      </dl>
      <section anchor="the-problem">
        <name>The problem</name>
        <t>The presence of a DKIM signature serves as a basis for developing an assessment of mail received, over time, using that signature.  That assessment constitutes a reputation, which then serves to guide future handling of mail arriving with a DKIM signature for that domain name.  The presence of a validated DKIM signature was designed to ensure that the developed reputation is the result of activity only by the domain owner, and not by other, independent parties.  That is, it defines a 'clean' channel of behavior by the domain owner, with no 'noise' introduced by other actors.</t>
        <t>A receiving filtering system contains a rich array of rules and heuristics for assessing email, for protecting users against spam, phishing, and other abuses.  DKIM therefore provides an identity that this system can use for reputation assessment and prediction of future sender behavior.</t>
        <t>During development of the DKIM specification, DKIM Replay was identified as only of hypothetical concern.  However, that attack has become commonplace:</t>
        <ul spacing="normal">
          <li>Attackers create, obtain access, or compromise an account at a site with a high reputation.</li>
          <li>They send an email from that account to an external account also under their control.</li>
          <li>This single message is delivered to the attacker's mailbox, giving them an email with a valid DKIM signature, for a domain with high reputation.</li>
          <li>They then post the message to a new and large set of additional recipients.</li>
        </ul>
        <t>Internet Mail permits sending a message to addresses that are not listed in the content To:, Cc: or Bcc: header fields.  Although DKIM covers portions of the message content, and can cover these header fields, it does not cover the envelope addresses, used by the email transport service, for determining handling behaviors.  So this message can then be replayed to arbitrary thousands or millions of other recipients, none of whom were specified by the original author.</t>
        <t>That is, DKIM Replay takes a message with a valid DKIM signature, and distributes it widely to many additional recipients, without breaking the signature.</t>
        <ul spacing="normal">
          <li>Further, a message used in a Replay Attack has the same attributes as some types of legitimate mail.  That is, an individual, replayed message has no observable differences from a legitimate message.</li>
        </ul>
        <t>Therefore, DKIM Replay is impossible to detect or prevent with current standards and practices.  Simply put, email authentication does not distinguish benign re-posting flows from a DKIM Replay Attack.</t>
        <t>ARC <xref target="RFC8617"/> is a protocol to securely propagate authentication results seen by Mediators that re-post a message, such as mailing lists.  It can be used to adjust DMARC <xref target="RFC7489"/> validation as described in section 7.2.1.  Because ARC is heavily based on DKIM it has the same "replay" issue as described in section 9.5.</t>
      </section>
      <section anchor="glossary">
        <name>Glossary</name>
        <t>Modern email operation often involves many actors and many different actions.  This section attempts to identify those relevant to Replay Attacks.</t>
        <dl>
          <dt>NOTE:</dt>
          <dd>
            <t>This document is only Informative and omits the normative language defined in <xref target="RFC2119"/>.  Mail architectural terminology that is used here is from <xref target="RFC5598"/> and <xref target="RFC5321"/>.</t>
          </dd>
        </dl>
        <t><xref target="RFC5598"/> defines mail interactions conceptually from three perspectives of activities, divided into three types of roles:</t>
        <dl>
          <dt>Users:</dt>
          <dd>
            <t>This includes end-users, but also Mediators that re-post a message after delivery</t>
          </dd>
          <dt>Services (Message Handling Service - MHS):</dt>
          <dd>
            <t>Moving a message from a single submission to its related delivery</t>
          </dd>
          <dt>Administrative (ADministrative Management Domain - ADMD):</dt>
          <dd>
            <t>Covering independent operational scope, where functions of authorship, handling, and receiving can take place in any number of different ADMDs</t>
          </dd>
        </dl>
        <t>Also, as noted in <xref target="RFC5598"/>, a given implementation might perform multiple roles.</t>
        <t>It is useful to broadly identify participants in mail handling by functionality as defined in <xref target="RFC5598"/> as:</t>
        <ul spacing="normal">
          <li>Mail Submission Agent (MSA)</li>
          <li>Mail Transmission Agent (MTA)</li>
          <li>Mail Delivery Agent (MDA)</li>
        </ul>
        <t>In addition, a user interacts with the handling service via a:</t>
        <ul spacing="normal">
          <li>Mail User Agent (MUA).</li>
        </ul>
        <t>The following is a subset of the Mail Handling Services defined in <xref target="RFC5598"/> to be used in this document:</t>
        <dl>
          <dt>Originator:</dt>
          <dd>
            <t>defined in Section 2.2.1.  This is the first component of the MHS and works on behalf of the author to ensure the message is valid for transport; it then posts it to the relay (MTA) that provides SMTP store-and-forward transfer.  The Originator can DKIM sign the message on behalf of the author, although it is also possible that the author's system, or even the first MTA, does DKIM signing.</t>
          </dd>
          <dt>Alias:</dt>
          <dd>
            <t>defined in Section 5.1.  A type of Mediator user, operating in between a delivery and a following posting.  The Alias replaces the original RCPT TO envelope recipient address but does not alter the content address field header fields.  Often used for Auto-Forwarding.</t>
          </dd>
          <dt>ReSender:</dt>
          <dd>
            <t>as defined in Section 5.2, is a type of Mediator user, like an Alias; however the ReSender updates the recipient address, and "splices" the destination header field and possibly other address fields as well.</t>
          </dd>
          <dt>Mailing Lists:</dt>
          <dd>
            <t>defined in Section 5.3 is another Mediator; it receives a message and reposts it to the list's members; it might add list-specific header fields e.g. List-XYZ: might modify other contents, such as revising the Subject: field, or adding content to the body.</t>
          </dd>
          <dt>Receiver:</dt>
          <dd>
            <t>defined in Section 2.2.4 is the last stop in the MHS, and works on behalf of the recipient to deliver the message to their inbox; it also might perform filtering.</t>
          </dd>
        </dl>
        <t>Any of these actors, as well as those below, can add trace and operational header fields.</t>
        <t>Modern email often includes additional services.  Four that are relevant to DKIM Replay are:</t>
        <dl>
          <dt>Email Service Provider (ESP):</dt>
          <dd>
            <t>Often called a Bulk Sender - An originating third-party service, acting as an agent of the author and sending to a list of recipients.  They may DKIM sign as themselves and/or sign with the author's domain name.</t>
          </dd>
          <dt>Outbound Filtering Service:</dt>
          <dd>
            <t>Rather than sending directly to recipients' servers, the Originator can route mail through a Filtering Service, to provide spam or data loss protection services.  This service may modify the message and can be administratively separate from the Originator.</t>
          </dd>
          <dt>Inbound Filtering Service:</dt>
          <dd>
            <t>The Receiver can also route mail through a Filtering Service, to provide spam, malware and other anti-abuse protection services.  Typically, this is done by listing the service in an DNS MX record.  This service may modify the message and can be administratively separate from the Receiver.</t>
          </dd>
        </dl>
        <t>The above services can use email authentication as defined in the following specifications:</t>
        <dl>
          <dt>DomainKeys Identified Mail (DKIM):</dt>
          <dd>
            <t>Defined in <xref target="RFC6376"/>, with a cryptographic signature that typically survives basic relaying but can be broken when processed by a Mediator.  Further, DKIM Replay is defined in RFC6376 section 8.6.</t>
          </dd>
          <dt>Sender Policy Framework (SPF):</dt>
          <dd>
            <t>Defined in <xref target="RFC7208"/>, is another form of message handling authentication that works in parallel to DKIM and might be relevant to the detection of a DKIM Replay Attack.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="mail-flow-scenarios">
      <name>Mail Flow Scenarios</name>
      <t>The following section categorizes the different mail flows by a functional description, email authentication and recipient email header fields.</t>
      <section anchor="basic-types-of-flows">
        <name>Basic types of flows</name>
        <dl>
          <dt>Direct delivery:</dt>
          <dd>
            <t>In this case, email travels directly from the author's ADMD or the ADMD of their agent -- to the recipient's ADMD or their agent.  That is, for origination and reception, any interesting creation or modification is done by agreement with either the author or the recipient.  As such, these cases should have authentication that succeeds.</t>
          </dd>
          <dt/>
          <dd>
            <t>In this type of flow, SPF is expected to validate.</t>
          </dd>
          <dt/>
          <dd>
            <t>A DKIM Replay Attack uses a single message, sent through Direct delivery, and repurposes it.</t>
          </dd>
          <dt>Indirect Delivery:</dt>
          <dd>
            <t>This is mail involving a Mediator, producing a sequence of submission/delivery segments.  While not required, the Mediator is typically viewed as being in an ADMD that is independent of the author's ADMD and independent of the recipient's ADMD.</t>
          </dd>
        </dl>
      </section>
      <section anchor="direct-examples">
        <name>Direct examples</name>
        <dl>
          <dt>ESP:</dt>
          <dd>
            <t>An ESP is authorized to act on behalf of the author and will originate messages given a message body and a list of recipients, sending a different message to each recipient.  Content address fields are typically restricted to just the address of that copy's recipient.  The mail that is sent is typically 'direct', but the ESP cannot control whether an address refers to an alias or mailing list, or the like.  So, the message might become indirect, before reaching the final recipient.</t>
          </dd>
          <dt/>
          <dd>
            <t>The bulk nature of ESP activity means that it can look the same as DKIM Replay traffic.</t>
          </dd>
          <dt>Outbound filtering:</dt>
          <dd>
            <t>If the Author's domain has an SPF record that does not list this filtering service, SPF validation for the author's domain will fail.  However, the ESP might produce an SPF record of their own and use their own SMTP MAIL FROM (return) address.</t>
          </dd>
          <dt>Inbound filtering:</dt>
          <dd>
            <t>Typically, an inbound filtering service will add the results of its analysis to the message.  It might make other modifications to the message.</t>
          </dd>
        </dl>
      </section>
      <section anchor="indirect-examples">
        <name>Indirect Examples</name>
        <t>Indirect mail flows break SPF validation, unless the Mediator is listed in the SPF record.  This is almost never the case.</t>
        <dl>
          <dt>Mailing List:</dt>
          <dd>
            <t>The modifications done by a mailing list especially to the Subject: header field and the body of the message - nearly always break any existing DKIM signatures.</t>
          </dd>
          <dt>Alias (e.g., Auto-forwarder):</dt>
          <dd>
            <t>Typically, the envelope return (MAIL FROM) address is replaced, to be something related to the forwarder.  A resender might add trace headers, but typically does not modify the recipients or the message body.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="dkim-replay">
      <name>DKIM Replay</name>
      <section anchor="scenario">
        <name>Scenario</name>
        <t>A spammer will find a mailbox provider with a high reputation and that signs their message with DKIM.  The spammer sends a message with spam content from there to a mailbox the spammer controls.  This received message is sometimes updated with additional header fields such as To: and Subject: that do not damage the existing DKIM signature, if those fields were not covered by the DKIM signature.  The resulting message is then sent at scale to target recipients.  Because the message signature is for a domain name with a high reputation, the message with spam content is more likely to get through to the inbox.  This is an example of a spam classification false negative incorrectly assessing spam to not be spam.</t>
        <t>When large amounts of such spam are sent to a single mailbox provider -- or through a filtering service with access to data across multiple mailbox providers -- the operator's filtering engine will eventually react by dropping the reputation of the original DKIM signer.  Benign mail from the signer's domain then starts to go to the spam folder.  For the benign mail, this is an example of a spam classification false positive.</t>
        <t>In both cases, mail that is potentially wanted by the recipient becomes much harder to find, reducing its utility to the recipient (and the author.)  In the first case, the wanted mail is mixed with potentially large quantities of spam.  In the second case, the wanted mail is put in the spam folder.</t>
      </section>
      <section anchor="direct-flows">
        <name>Direct Flows</name>
        <t>Legitimate mail might have a valid DKIM signature and no associated SPF record.</t>
        <t>So might a Replay attack.</t>
      </section>
      <section anchor="indirect-flows">
        <name>Indirect Flows</name>
        <t>Example benign indirect flows are outbound and inbound gateway, mailing lists, and forwarders.  This legitimate mail might have a valid DKIM signature, and SPF validation that is not aligned with the content From:</t>
        <t>So might a Replay attack.</t>
      </section>
    </section>
    <section anchor="replay-technical-characteristics">
      <name>Replay technical characteristics</name>
      <t>A message that has been replayed will typically show these characteristics:</t>
      <ul spacing="normal">
        <li>Original DKIM signature still validates</li>
        <li>Content covered by that signature is unchanged</li>
        <li>Received: header fields might be different from the original, or at least have ones that are added</li>
        <li>SMTP Envelope RCTP-TO address will be different</li>
        <li>SMTP MAIL-FROM might be different</li>
        <li>Replayed mail will typically be sent in very large volume</li>
        <li>The original SPF will typically not validate; however if the MAIL-FROM has been changed to an address controlled by the spammer, SPF might validate.</li>
      </ul>
    </section>
    <section anchor="basic-solution-space">
      <name>Basic solution space</name>
      <t>As can be seen from the above discussion, there is no straightforward way to detect DKIM Replay for an individual message, and possibly nothing completely reliable even in the aggregate.  The challenge, then, is to look for passive analysis that might provide a good heuristic, as well as active measures by the author's system to add protections.</t>
      <t>Here are some potential solutions to the problem, and their pros and cons:</t>
      <section anchor="include-the-smtp-rcpt-to-address-in-the-dkim-signature">
        <name>Include the SMTP RCPT-TO address in the DKIM signature</name>
        <t>Since this information is different in the Replay, than it was in the original sending, locking it into the signature will make validation fail, if the value has been changed.</t>
        <ul spacing="normal">
          <li>This avoids Replay to destination addresses not anticipated by the DKIM signer.</li>
          <li>Indirect flows will fail, since forwarding involves rewriting the ENVELOPE-TO; however they already typically fail.</li>
          <li>This will detect DKIM Replays, but not distinguish them from all other forwarding.</li>
          <li>If a message has more than one addressee, should the signature cover all of them, or does this require sending one message per  addressee?  If it covers all of them, note that they might be on different systems, so that upon arrival, the RCPT-TO list  will not include all of the original addresses</li>
        </ul>
      </section>
      <section anchor="count-known-dkim-signatures">
        <name>Count known DKIM signatures</name>
        <t>This technique caches known DKIM signatures and counts them.  Those above a certain threshold is considered DKIM replay.</t>
        <ul spacing="normal">
          <li>Since the same signature is being replayed many times, this might allow a receiving site with many mailboxes to detect whether a message is part of a DKIM Replay set, and to then suppress it.</li>
          <li>Mailing list traffic, aliases, and the like might also show up as duplicates.  So this is only an heuristic, and might produce false positives.</li>
        </ul>
      </section>
      <section anchor="strip-dkim-signatures-on-mailbox-delivery">
        <name>Strip DKIM signatures on mailbox delivery</name>
        <ul spacing="normal">
          <li>Messages delivered to a mailbox lacking DKIM signatures can no longer be replayed.</li>
          <li>Has no effect when the receiving platform is collaborating with the bad actor, as the attacker would just avoid stripping the header fields.</li>
        </ul>
      </section>
      <section anchor="shorten-dkim-signature-key-or-signature-lifetime">
        <name>Shorten DKIM signature key or signature lifetime</name>
        <ul spacing="normal">
          <li>If the key is no longer available through the DNS, the signature will no longer validate</li>
          <li>Alternatively express a validity period after which the signature is no longer valid</li>
          <li>Unfortunately, bad actors are quite good at taking action very quickly, and there is a limit to how much the window can be shortened, if the key is to have any utility for legitimate mail.</li>
        </ul>
      </section>
      <section anchor="add-per-hop-signature-specifying-the-destination-domain">
        <name>Add Per-hop signature, specifying the destination domain</name>
        <t>Distinguish each forwarding hop by its own signature.  This permits each forwarding hop to specify the next destination domain which can be verified to detect DKIM replay.</t>
        <ul spacing="normal">
          <li>Messages with this kind of signature cannot be replayed down a different pathway, since the destination won't match.</li>
          <li>Requires every site along the path to support this spec, and to detect whether the next stop is making a commitment to follow the spec.</li>
          <li>If email goes to a site that does not support this behavior, traversing a naive forwarder remains indistinguishable from Replay.</li>
          <li>The time needed to change a global infrastructure such as email, to fully support a capability like this in every MTA is essentially infinite; therefore use of this approach must be narrowly tailored to scenarios that will adopt it and garner substantial benefit from it.</li>
        </ul>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions yet.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>Informative References</name>
      <reference anchor="RFC6376">
        <front>
          <title>DomainKeys Identified Mail (DKIM) Signatures</title>
          <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker">
            <organization/>
          </author>
          <author fullname="T. Hansen" initials="T." role="editor" surname="Hansen">
            <organization/>
          </author>
          <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy">
            <organization/>
          </author>
          <date month="September" year="2011"/>
          <abstract>
            <t>DomainKeys Identified Mail (DKIM) permits a person, role, or organization that owns the signing domain to claim some responsibility for a message by associating the domain with the message.  This can be an author's organization, an operational relay, or one of their agents.  DKIM separates the question of the identity of the Signer of the message from the purported author of the message.  Assertion of responsibility is validated through a cryptographic signature and by querying the Signer's domain directly to retrieve the appropriate public key.  Message transit from author to recipient is through relays that typically make no substantive change to the message content and thus preserve the DKIM signature.</t>
            <t>This memo obsoletes RFC 4871 and RFC 5672.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="76"/>
        <seriesInfo name="RFC" value="6376"/>
        <seriesInfo name="DOI" value="10.17487/RFC6376"/>
      </reference>
      <reference anchor="RFC1034">
        <front>
          <title>Domain names - concepts and facilities</title>
          <author fullname="P. Mockapetris" initials="P." surname="Mockapetris">
            <organization/>
          </author>
          <date month="November" year="1987"/>
          <abstract>
            <t>This RFC is the revised basic definition of The Domain Name System.  It obsoletes RFC-882.  This memo describes the domain style names and their used for host address look up and electronic mail forwarding.  It discusses the clients and servers in the domain name system and the protocol used between them.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="13"/>
        <seriesInfo name="RFC" value="1034"/>
        <seriesInfo name="DOI" value="10.17487/RFC1034"/>
      </reference>
      <reference anchor="RFC5322">
        <front>
          <title>Internet Message Format</title>
          <author fullname="P. Resnick" initials="P." role="editor" surname="Resnick">
            <organization/>
          </author>
          <date month="October" year="2008"/>
          <abstract>
            <t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of "electronic mail" messages.  This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, "Standard for the Format of ARPA Internet Text Messages", updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5322"/>
        <seriesInfo name="DOI" value="10.17487/RFC5322"/>
      </reference>
      <reference anchor="RFC8617">
        <front>
          <title>The Authenticated Received Chain (ARC) Protocol</title>
          <author fullname="K. Andersen" initials="K." surname="Andersen">
            <organization/>
          </author>
          <author fullname="B. Long" initials="B." role="editor" surname="Long">
            <organization/>
          </author>
          <author fullname="S. Blank" initials="S." role="editor" surname="Blank">
            <organization/>
          </author>
          <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy">
            <organization/>
          </author>
          <date month="July" year="2019"/>
          <abstract>
            <t>The Authenticated Received Chain (ARC) protocol provides an authenticated "chain of custody" for a message, allowing each entity that handles the message to see what entities handled it before and what the message's authentication assessment was at each step in the handling.</t>
            <t>ARC allows Internet Mail Handlers to attach assertions of message authentication assessment to individual messages.  As messages traverse ARC-enabled Internet Mail Handlers, additional ARC assertions can be attached to messages to form ordered sets of ARC assertions that represent the authentication assessment at each step of the message-handling paths.</t>
            <t>ARC-enabled Internet Mail Handlers can process sets of ARC assertions to inform message disposition decisions, identify Internet Mail Handlers that might break existing authentication mechanisms, and convey original authentication assessments across trust boundaries.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8617"/>
        <seriesInfo name="DOI" value="10.17487/RFC8617"/>
      </reference>
      <reference anchor="RFC7489">
        <front>
          <title>Domain-based Message Authentication, Reporting, and Conformance (DMARC)</title>
          <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy">
            <organization/>
          </author>
          <author fullname="E. Zwicky" initials="E." role="editor" surname="Zwicky">
            <organization/>
          </author>
          <date month="March" year="2015"/>
          <abstract>
            <t>Domain-based Message Authentication, Reporting, and Conformance (DMARC) is a scalable mechanism by which a mail-originating organization can express domain-level policies and preferences for message validation, disposition, and reporting, that a mail-receiving organization can use to improve mail handling.</t>
            <t>Originators of Internet Mail need to be able to associate reliable and authenticated domain identifiers with messages, communicate policies about messages that use those identifiers, and report about mail using those identifiers.  These abilities have several benefits: Receivers can provide feedback to Domain Owners about the use of their domains; this feedback can provide valuable insight about the management of internal operations and the presence of external domain name abuse.</t>
            <t>DMARC does not produce or encourage elevated delivery privilege of authenticated email.  DMARC is a mechanism for policy distribution that enables increasingly strict handling of messages that fail authentication checks, ranging from no action, through altered delivery, up to message rejection.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7489"/>
        <seriesInfo name="DOI" value="10.17487/RFC7489"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner">
            <organization/>
          </author>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC5598">
        <front>
          <title>Internet Mail Architecture</title>
          <author fullname="D. Crocker" initials="D." surname="Crocker">
            <organization/>
          </author>
          <date month="July" year="2009"/>
          <abstract>
            <t>Over its thirty-five-year history, Internet Mail has changed significantly in scale and complexity, as it has become a global infrastructure service.  These changes have been evolutionary, rather than revolutionary, reflecting a strong desire to preserve both its installed base and its usefulness.  To collaborate productively on this large and complex system, all participants need to work from a common view of it and use a common language to describe its components and the interactions among them.  But the many differences in perspective currently make it difficult to know exactly what another participant means.  To serve as the necessary common frame of reference, this document describes the enhanced Internet Mail architecture, reflecting the current service.  This memo provides  information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5598"/>
        <seriesInfo name="DOI" value="10.17487/RFC5598"/>
      </reference>
      <reference anchor="RFC5321">
        <front>
          <title>Simple Mail Transfer Protocol</title>
          <author fullname="J. Klensin" initials="J." surname="Klensin">
            <organization/>
          </author>
          <date month="October" year="2008"/>
          <abstract>
            <t>This document is a specification of the basic protocol for Internet electronic mail transport.  It consolidates, updates, and clarifies several previous documents, making all or parts of most of them obsolete.  It covers the SMTP extension mechanisms and best practices for the contemporary Internet, but does not provide details about particular extensions.  Although SMTP was designed as a mail transport and delivery protocol, this specification also contains information that is important to its use as a "mail submission" protocol for "split-UA" (User Agent) mail reading systems and mobile environments.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5321"/>
        <seriesInfo name="DOI" value="10.17487/RFC5321"/>
      </reference>
      <reference anchor="RFC7208">
        <front>
          <title>Sender Policy Framework (SPF) for Authorizing Use of Domains in Email, Version 1</title>
          <author fullname="S. Kitterman" initials="S." surname="Kitterman">
            <organization/>
          </author>
          <date month="April" year="2014"/>
          <abstract>
            <t>Email on the Internet can be forged in a number of ways.  In particular, existing protocols place no restriction on what a sending host can use as the "MAIL FROM" of a message or the domain given on the SMTP HELO/EHLO commands.  This document describes version 1 of the Sender Policy Framework (SPF) protocol, whereby ADministrative Management Domains (ADMDs) can explicitly authorize the hosts that are allowed to use their domain names, and a receiving host can check such authorization.</t>
            <t>This document obsoletes RFC 4408.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7208"/>
        <seriesInfo name="DOI" value="10.17487/RFC7208"/>
      </reference>
    </references>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks goes to Emanuel Schorsch and Evan Burke for their advice.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
