<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.5 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-chuang-mailing-list-modifications-04" category="exp" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.19.4 -->
  <front>
    <title abbrev="Mailing-List Modifications">Tolerating Mailing-List Modifications</title>
    <seriesInfo name="Internet-Draft" value="draft-chuang-mailing-list-modifications-04"/>
    <author fullname="Weihaw Chuang">
      <organization>Google, Inc.</organization>
      <address>
        <email>weihaw@google.com</email>
      </address>
    </author>
    <date year="2024" month="February" day="20"/>
    <workgroup>Independent Stream</workgroup>
    <keyword>DKIM</keyword>
    <keyword>ARC</keyword>
    <keyword>Mailing-list</keyword>
    <abstract>
      <?line 31?>

<t>Mailing-lists distribute email to multiple recipients by forwarding and potentially modifying messages to document the distribution to the recipients.  Unfortunately forwarding breaks SPF (RFC7208) authentication and message modification breaks DKIM (RFC6376) authentication.  This document is based on ARC (RFC8617) to provide a framework to describe forwarding with extensions to tolerate common mailing-list message modifications. This specification characterizes the mailing-list transforms such that a receiver can reverse them to enable digital signatures verification and attribution of the message content.  These message modifications are: 1) adding a description string to the Subject header, 2) rewriting the From header, 3) removing the original DKIM-Signature and 4) appending a footer to the message body.  This also specifies those modifications for the purpose of making them reversible.</t>
    </abstract>
  </front>
  <middle>
    <?line 35?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Mailing-lists have long complicated email authentication.  They break SPF <xref target="RFC7208"/> authentication due to forwarding and break DKIM <xref target="RFC6376"/> authentication due to message modification that used to identify the mailing-list.  This specification provides methods to restore authentication even in the presence of forwarding and message modification.  Being able to restore authentication is particularly important as senders may specify a sender-defined  receiver email handling policy that may prevent delivery of the message as defined in DMARC <xref target="RFC7489"/>.  Moreover malicious content is currently attributed to all parties in the mail flow.  This specification permits a receiver to attribute the email content to its author be it the sender or the mailing-list.</t>
      <t>The approach in this document is to be highly opinionated about only supporting common case mutations to lessen the implementation burden upon mailing-lists and receivers.  This also seeks to eliminate any burden for messages that don't go through mailing-lists.  At origination, it is sufficient to sign a message with a DKIM signature as typically done already.  It does ask those mailing-lists that wish to use this specification to characterize the modifications it performs at each forwarding step.  The goal is to permit receivers to reverse the modification so that the message hash can be recovered and the prior signature verified at each forwarding step, be it from DKIM or ARC.  This allows the receiver to determine which forwarder or the originating sender contributed which content, in the received message.  This specification uses the ARC <xref target="RFC8617"/> framework to describe each forwarder, and then record the mutation performed at each forwarding step.  Consequently this attribution enables more precise reputation systems and UI features.  The supported modifications are: 1) adding a description string to the Subject header, 2) rewriting the "From" header, 3) rewriting the original DKIM-Signature and 4) appending a footer to the message body.   This document specifies the characterization of the modifications and how to apply the modifications.</t>
      <t>The validation results in this specification are orthogonal to the results in</t>
      <t><eref target="https://datatracker.ietf.org/doc/draft-chuang-replay-resistant-arc/">draft-chuang-replay-resistant-arc</eref>.  In addition to better supporting DMARC in the presence of mailing-list modifications, this specification enables attribution of malicious content back to the author.  However this specification is vulnerable to replay much like DKIM and ARC.  <eref target="https://datatracker.ietf.org/doc/draft-chuang-replay-resistant-arc/">draft-chuang-replay-resistant-arc</eref> validation is tolerant of header and message body modifications but unable to provide attribution.  It also detects and prevents replay.  A receiver may want to combine the results of these two validations to create a strong authentication result that provides greater certainty that a message was sent by some originating sender through a mailing-list.</t>
      <t>This specification assumes that originators and forwarders are named by the methods specified in the internet-draft <eref target="https://datatracker.ietf.org/doc/draft-chuang-identifying-email-forwarding/">draft-chuang-identifying-email-forwarding</eref>.  That specification calls for a naming method of participants in the mail flow using a mail flow tag.  That also names the ADMDs by the signer domain as defined in the DKIM-Signature "d=" SDID domains, and the ARC-Seal and ARC-Message-Signature "d=" SDID domains.</t>
      <section anchor="terminology-and-definitions">
        <name><strong>Terminology and Definitions</strong></name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in <xref target="RFC2119"/>.</t>
      </section>
      <section anchor="algorithm">
        <name><strong>Algorithm</strong></name>
        <t>The specification in this document is divided into procedures computed at the mailing-list forwarders and at the receiver and is based on the procedures in ARC <xref target="RFC8617"/>.  The steps at the forwarder are further divided at the forwarder into the  inbound validation procedures and outbound forwarding procedures.  The receiver only performs the inbound validation procedures.  The inbound validation procedures are variable length corresponding to the depth of the ARC sets.  At each ARC set corresponding to some earlier forwarder, the receiver computes any reversing procedure described later for any described mailing-list mutations to obtain the message hash of the message as seen at the inbound of the mailing-list.  This hash comes from an ARC-Message-Signature if the sender is a forwarder and a DKIM-Signature (or possibly ARC-message-signature)  if the sender is the originator.  That signature MUST verify correctly, otherwise this is considered a signature verification failure by this specification. Interpretation of that failure is described later.</t>
        <section anchor="forwarder-characterization">
          <name>Forwarder Characterization</name>
          <t>Conformant forwarders characterize message mutations to enable receivers to interpret mutations and potentially verification failures.  A description is added as a tag-value to the ARC-Message-Signature mail flow description tag "m" as defined in the internet-draft  <eref target="https://datatracker.ietf.org/doc/draft-chuang-identifying-email-forwarding/">draft-chuang-identifying-email-forwarding</eref>.  The following mail flow values are considered mutators:</t>
          <dl>
            <dt>mailing_list:</dt>
            <dd>
              <t>Describes a forwarder that distributes messages to multiple recipients and any modification conforms to the specification in this document.</t>
            </dd>
            <dt>ofs:</dt>
            <dd>
              <t>Outbound-Filtering-Service is a mutating forwarder that works on behalf of the originating sender.  The sender is presumed to have delegated responsibility to sign on behalf of the originating sender.</t>
            </dd>
            <dt>ifs:</dt>
            <dd>
              <t>Inbound-Filtering-Service mutating forwarder that works on behalf of the final receiver.  The receiver is presumed to have an established trust model with the gateway outside of this document and, and validation failure result is interpreted by the receiver.</t>
            </dd>
          </dl>
          <t>Receivers MAY use the ARC-Message-Signature d= SDID domain to identify trusted forwarders.  Receivers SHOULD NOT use the mail flow tag-value description to detect the existence of such trust relationships, as those descriptions exist for human operators to interpret gateway's actions.</t>
        </section>
        <section anchor="header-rewriting-characterization">
          <name>Header Rewriting Characterization</name>
          <t>A mailing-list forwarder that rewrites a Subject, From or DKIM-Signature headers can store the prior values by substituting with a modified header name i.e. prefixing "X-Prior-" to the original name.   Moreover the header name retains the original capitalization, its place with respect to other headers, and is not ambiguous if there are multiple headers of the same name.  First the bottoms-up line count of all headers is computed starting from the 0th position.  Then all headers to be rewritten are collected, ordered by position to be prepended to the headers list and given a bottoms-up line count position.  This is an offset from "X-Prior-" header to it's rewritten counterpart.  It is assumed that the prior header has the following format:</t>
          <artwork><![CDATA[
<header name>:<value including any whitespaces>
]]></artwork>
          <t>The conserved header name is prefixed with a "X-Prior-".  Then an ARC instance number tag "i" i.e. "=&lt;#&gt;," and line count tag "l" i.e. "l=&lt;bottoms-up line count offset&gt;" are prepended to the header value and separated by a semicolon and one whitespace.  The position of this "i" and "l" is important because they may otherwise be ambiguous with the original header's tag-values e.g DKIM-Signature. Thus the conserved header is:</t>
          <artwork><![CDATA[
X-Prior-<header name>: i=<#>; l=<bottoms-up line count offset>; 
     <value including any whitespaces>
]]></artwork>
          <t>For example:</t>
          <artwork><![CDATA[
X-Prior-Dkim-Signature: i=1; l=4; d=example.com; b=...
X-Prior-Subject: i=1; l=3; Meeting on the 5th
]]></artwork>
          <t>This stores the prior header in a format that SHOULD be ignored by subsequent forwarders, and if not then will cause a verification failure.  The forwarder then rewrites or deletes the header as before by prepending the rewritten header to the message or skipping prepending for deletion.   To protect the integrity of these headers, these headers are hashed separately from ARC-Message-Signature "h" header list.  The forwarder generates the header hash by hashing the "X-Prior-" headers (and any "Content-Footer" header described below) found in bottoms up order as found in the headers.  This specification calls for the header hash to be explicitly added to the ARC-Message-Signature with a tag "fh" as defined in the internet-draft  <eref target="https://datatracker.ietf.org/doc/draft-chuang-replay-resistant-arc/">draft-chuang-replay-resistant-arc</eref>.  Conformant forwarders even without mailing-lists mutations MUST report header hash explicitly to better differentiate and tolerate body modifications when verifying headers.</t>
          <t>To reverse the rewriting or deletion of headers, all "X-Prior-" headers are collected at the given ARC instance number.  The prior header name is extracted from the "X-Prior-" header, and the original value extracted and restored.  The rewritten header is found by taking the "X-Prior-" header line count position and adding the offset in the "l" tag's value.  Rewritten headers are deleted in top down order.</t>
        </section>
        <section anchor="message-footer-characterization">
          <name>Message Footer Characterization</name>
          <t>Mailing-lists may choose to add a message footer to the body of the message to notify the recipient of the mailing-list distribution action and conformant mailing-list will describe this mutation to the receiver.   One method is to append the footer text to all content-type text in the top level of MIME <xref target="RFC2045"/> part "multipart/alternative".  Another method is to append a new successor MIME part for a "multipart/mixed" part, and that MIME part contains the footer as a content-type text.  If the message is not mime formatted, the entire body is treated as text and the mailing-list may append a text footer at the bottom of the message.</t>
          <t>Conformant mailing-list forwarders characterize these changes with a new "Content-Footer" header.  It contains a list of semicolon and whitespace separated tag-values using the formatting specifications in DKIM.  The first of these is an ARC set instance number describing which forwarder added the header.  When the mailing-list appends a text part, the receiver characterizes it with the beginning and ending byte offset of the MIME part or message-body if MIME unformatted.  If the mailing-list adds a text MIME part as footer, it describes the mime part with its purpose tag-value.  The Content-Footer header is added to the MIME part for MIME formatted messages, and to the message headers for unformatted messages. To protect the integrity of the header, in the latter case, the Content-Footer is hashed along with "X-Prior-" headers in the same bottoms up order.  In the former case, Content-Footer headers added to the message-body are protected by the message body hash.   The following are the Content-Footer header tag-values:</t>
          <dl>
            <dt>i</dt>
            <dd>
              <t>Instance tag. Must be the first tag-value.  The value contains the instance number</t>
            </dd>
            <dt>b</dt>
            <dd>
              <t>Footer beginning octet offset from the start of the text MIME part or the message-body if no MIME unformatted.  MUST always appear with a footer ending offset.</t>
            </dd>
            <dt>e</dt>
            <dd>
              <t>Footer ending octet offset from the start of the text MIME part or the message-body if no mime unformatted.  MUST always appear with a footer beginning offset.</t>
            </dd>
            <dt>m</dt>
            <dd>
              <t>Mime-part purpose description.  If the added MIME part contains the text footer, then the value is "footer".  If the added MIME part is "multipart/mixed" and meant to support adding the text footer, then the value is "mixed".  If the text footer is appended, then this tag-value is not added.</t>
            </dd>
          </dl>
          <t>For example:</t>
          <artwork><![CDATA[
Content-Footer: i=1; b=100; e=200
Content-Footer: i=2; m=footer
]]></artwork>
          <t>To reverse the footer addition, the receiver looks at the headers to see if the message is MIME formatted.  If not, the receiver looks for a "Content-Footer" in the headers.  If so, the receiver looks for "Content-Footer" in the MIME tree content headers.  For each "Content-Footer" found header at the current ARC set instance, it reverses the footer mutation.  For offset values designated by beginning and ending offset tags, it removes the text from that MIME part or the message-body designated.  For a MIME part text footer, it deletes it along with any supporting "multipart/mixed" MIME part.  Then the receiver deletes the Content-Footer header from the updated message if not done so already.</t>
        </section>
        <section anchor="validation">
          <name>Validation</name>
          <t>The receiver verifies prior ARC sets per the procedure described in ARC <xref target="RFC8617"/>. In addition, the receiver validates the ARC sets starting from the largest instance number found to the smallest.  First the receiver verifies the given instance ARC-Message-Signature or DKIM-Signature as appropriate.  Then the receiver computes the rewritten header hash taking the header hash computed by ARC-Message-Signature at the given instance number or DKIM-Signature.   Then the hash is taken for "X-Prior-" headers and "Content-Footer" header if found in the headers at the current ARC set instance number and all prior ones.  This is verified against the header hash value associated with the tag "fh", reporting signature failure if it mismatches.</t>
          <t>Next the receiver determines whether it needs to reverse any header or footer mutations at that ARC set instance by looking for the ARC-Message-Signature mutation tag "m=".  For values of "mailinglist", it attempts to reverse mutations keeping the resulting message so that further validations are possible.  The receiver attempts to provide header reversing procedures given in  "Header Rewriting" section and body reversing procedures given in "Message Footer" section.   For values "gateway" the receiver MAY apply local policy to interpret subsequent validation failures.  For all other mutation tag "m" values, it assumes no mutations are present or outside the scope of mailing-list modifications.</t>
          <t>In addition, the originating sender's DKIM-signature or ARC-Message-Signature MUST successfully verify.  If so and all prior signatures verify, then the result is a "pass".  Verification failures are subject to interpretation in "Footer Characterization" section, and potentially indicate a "fail".    The result of this procedure is written in Authentication-Result <xref target="RFC8601"/> and  ARC-Authentication-Result with a method named "reverse" as the REVERSE result.</t>
          <t>Informationally, if the receiver implements <eref target="https://datatracker.ietf.org/doc/draft-chuang-replay-resistant-arc/">draft-chuang-replay-resistant-arc</eref>, this specification suggests modifying <eref target="https://datatracker.ietf.org/doc/draft-chuang-replay-resistant-arc/">draft-chuang-replay-resistant-arc</eref> PATH results to take into account the REVERSE result.  At each ARC set instance where PATH recursively combines the local DARA results, if REVERSE reports "fail" then the PATH result reports "fail".  Because <em>REVERSE _combined with</em> <em>DARA</em> _represents a higher bar of verification than DARA alone, the receiver applies local policy when interpreting the PATH result.</t>
        </section>
      </section>
      <section anchor="mailing-list-modifications">
        <name>Mailing-List Modifications</name>
        <t>When a message body or Subject header is modified by a forwarder, the sender's DKIM signature will no longer validate.  To mitigate this forwarders MAY elect to replace the DKIM signature with their own with a new message hash that takes into account the modifications.  Because the signature is not DMARC aligned, senders also MAY rewrite the From header to take ownership of the message.  The following creates a specification making the message body or Subject header modification, replacing the DKIM signature and applying characterization headers.</t>
        <section anchor="subject-header-modification">
          <name>Subject Header Modification</name>
          <t>The mailing-list may want to communicate to the recipient that a message went through a mailing-list by modifying the Subject header to append the name of the mailing-list.  Typically the name is put between brackets e.g. "[name]" and prepended to the Subject header content.  This specification supports arbitrary text changes by saving the earlier inbound version of the Subject header's content in the "X-Prior-Subject" header.  The change in Subject text will break the DKIM-Signature so mailing-lists MAY rewrite DKIM-Signature to update the message header hash and resign the signature.  Similarly they MAY update the From header to DMARC align the DKIM-Signature "d=" domain with the From header domain.  Typically the From address is the set to the mailing-list address to further identify the mailing-list.  This specification supports saving the earlier inbound version of the DKIM-Signature and From headers in the "X-Prior-DKIM-Signature" and "X-Prior-From" headers respectively.</t>
          <t>For example the original message looks like:</t>
          <artwork><![CDATA[
Dkim-Signature: d=example.com; b=...
From: john.doe@example.com
Subject: Meeting on the 5th
]]></artwork>
          <t>A mailing-list rewrite Subject, From and DKIM-Signature headers and saves the original content in the "X-Prior-" headers</t>
          <artwork><![CDATA[
Dkim-Signature: d=mailinglist.example.com; b=...
From: mailinglist@mailinglist.example.com
Subject: [mailing-list] Meeting on the 5th
X-Prior-Dkim-Signature: i=1; l=3; d=example.com; b=...
X-Prior-From: i=1; l=3; john.doe@example.com
X-Prior-Subject: i=1; l=3; Meeting on the 5th
]]></artwork>
        </section>
        <section anchor="body-modification">
          <name>Body Modification</name>
          <t>The mailing-list may want to communicate to the recipient that a message went through a mailing-list by adding a text footer describing the mailing-list.  Typically this is done by appending that text description at the bottom of message body text. This specification supports three different footer organizations, depending on the MIME structure, content type and content  transport encoding of the MIME parts of the message.  In particular the organization depends if its MIME parts can be concatenated, meaning whether a text footer can be appended and removed without having to re-encode the original content to preserve the original content.  For example appending new content to "base64", and "binary" will likely introduce artifacts between the original message and the interpretation footer.  MIME parts that can be concatenated are defined as having one of the following type and subtype of Content-type:</t>
          <ul spacing="normal">
            <li>
              <t>text/plain</t>
            </li>
            <li>
              <t>text/html</t>
            </li>
          </ul>
          <t>and one of the following mechanisms for Content-transfer-encoding:</t>
          <ul spacing="normal">
            <li>
              <t>7bit</t>
            </li>
            <li>
              <t>8bit</t>
            </li>
            <li>
              <t>quoted-printable</t>
            </li>
          </ul>
          <t>Similarly, non-text MIME parts, and complex multipart MIME parts don't lend themselves to appending text.  One exception to this is "multipart/alternative" as will be described shortly.  To handle these scenarios, this specification calls for adding a new text MIME part footer that can handle any encoding or any mime structure but requires altering the MIME tree.</t>
          <t>The following procedure describes how the mailing-lists MAY choose from one of those formats to add a footer.  Here a mailing-list should evaluate in the same order as these three sections, following the steps in each section.  If any footer addition is successful, then the footer algorithm stops.</t>
          <section anchor="unstructured-or-text-message-body">
            <name>Unstructured or Text Message Body</name>
            <t>The simplest structure applies when the message lacks <xref target="RFC2045"/> MIME structure or the top level MIME part can be concatenated.  Here the forwarder appends a text footer with the same content type and content transfer encoding as the message-body.  When a message lacks MIME struct, the default message content-type is "text/plain" (section 5.2) and default content transfer encoding is "7bit" (section 6.1).   Next a "Content-Footer" header is prepended describing the start and ending message body octet offsets.  Reversing this transform is a straightforward deletion of the footer at the offsets given.</t>
            <t>For example given an original message of:</t>
            <artwork><![CDATA[
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
From: john.doe@example.com

This is the message body.
]]></artwork>
            <t>A text footer can be appended as follows:</t>
            <artwork><![CDATA[
Content-Footer: i=1; b=25; e=67
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
From: john.doe@example.com

This is the message body.

============
This is a mailing-list footer.
]]></artwork>
          </section>
          <section anchor="multipartalternative">
            <name>Multipart/Alternative</name>
            <t>When the top level MIME part is Content-type "multipart/alternative", the forwarder checks if any of the immediate children MIME parts can be concatenated.  If so, it attempts to append a text footer with the same content type and content transfer encoding as the children MIME part.  Next it prepends a Content-Footer header in the child MIME part header description with the start and end octet offsets from the beginning of the part.  If a footer can be added to a child MIME part, then this is considered success and the algorithm can halt. The reversing algorithm is to look for the top level MIME part with Content-type "multipart/alternative".  If so then look in the immediate child MIME parts and delete the text at the offsets given by the Content-Footer.</t>
            <t>For example given an original message of:</t>
            <artwork><![CDATA[
Content-Type: multipart/alternative; boundary="abcd"
From: john.doe@example.com

--abcd
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

This is the message body.

--abcd--
]]></artwork>
            <t>A text footer can be appended as follows:</t>
            <artwork><![CDATA[
Content-Type: multipart/alternative; boundary="abcd"
From: john.doe@example.com

--abcd
Content-Footer: i=1; b=25; e=67
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

This is the message body.

============
This is a mailing-list footer.

--abcd--
]]></artwork>
          </section>
          <section anchor="mime-part-footer">
            <name>MIME Part Footer</name>
            <t>The following procedure adds a MIME "multipart/mixed" at the top level and has as its children the original top level MIME part as the first child and the footer MIME text part as the second child.  This procedure will always succeed no matter the MIME structure or MIME content transfer encoding, however this modifies the MIME tree.  The top level MIME "multipart/mixed" is denoted by adding a "Content-Footer" header purpose description with "mixed" value and the footer MIME part denoted by adding a "Content-Footer" header purpose of "footer" value.  To reverse the mutation, the original top-level mime part is moved back to the actual top-level and delete the "multipart/mixed" and the footer MIME parts.</t>
            <t>For example given an original message of:</t>
            <artwork><![CDATA[
Content-Type: multipart/mixed; boundary="abcd"
From: john.doe@example.com

--abcd
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: base64

VGhpcyBpcyB0aGUgbWVzc2FnZSBib2R5Lg==

--abcd--
]]></artwork>
            <t>A "multipart/mixed" and text footer MIME parts can be appended as follows:</t>
            <artwork><![CDATA[
Content-Footer: m=mixed
Content-Type: multipart/mixed; boundary="efgh"
From: john.doe@example.com

--efgh
Content-Type: multipart/mixed; boundary="abcd"

--abcd
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: base64

VGhpcyBpcyB0aGUgbWVzc2FnZSBib2R5Lg==

--abcd--
--efgh
Content-Footer: m=footer
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
============
This is a mailing-list footer.

--efgh--
]]></artwork>
          </section>
        </section>
      </section>
      <section anchor="examples">
        <name>Examples</name>
        <t>These examples are informational.</t>
        <section anchor="originator-first-mailing-list-second-mailing-list-receiver">
          <name>Originator ⇒ First Mailing-List ⇒ Second Mailing-List ⇒Receiver</name>
          <t>This message is sent through two mailing-lists to some receiver.  The originating sender creates and signs a message as follows:</t>
          <artwork><![CDATA[
DKIM-Signature: d=example.com
From: john.doe@example.com
Subject: A really big announcement

It's Jane Doe's birthday tomorrow!
]]></artwork>
          <t>The first mailing-list adds a Subject header prefix and message-body footer, and denotes this using the procedures and headers specified in this document.   It denotes that it performed mailing-list mutations in the ARC-Message-Signature.</t>
          <artwork><![CDATA[
ARC-Message-Signature: i=1; m=mailinglist...
Content-Footer: i=1; b=34; e=78
DKIM-Signature: d=mailinglist.example.com...
From: school@mailinglist.example.com
Subject: [school list] A really big announcement
X-Prior-DKIM-Signature: i=1; l=3; d=example.com...
X-Prior-From: i=1; l=5=3; john.doe@example.com
X-Prior-Subject: i=1; l=3; A really big announcement

It's Jane Doe's birthday tomorrow!

============
This is the school mailing-list.
]]></artwork>
          <t>The second mailing-list adds a Subject header prefix and message-body footer, and denotes this using the procedures and headers specified in this document.  It denotes that it performed mailing-list mutations in the ARC-Message-Signature.</t>
          <artwork><![CDATA[
ARC-Message-Signature: i=2; m=mailinglist...
Content-Footer: i=2; b=79; e=124
DKIM-Signature: d=mailinglist.example.com...
From: district@mailinglist.example.com
Subject: [district list] [school list] A really big announcement
ARC-Message-Signature: i=1; m=mailinglist...
Content-Footer: i=1; b=34; e=78
X-Prior-DKIM-Signature: i=2; l=5; d=mailinglist.example.com
X-Prior-From: i=2; l=5; school@mailinglist.example.com
X-Prior-Subject: i=2; l=5; [school list] A really big announcement
X-Prior-DKIM-Signature: i=1; l=3; d=example.com
X-Prior-From: i=1; l=3; john.doe@example.com
X-Prior-Subject: i=1; l=3; A really big announcement

It's Jane Doe's birthday tomorrow!

============
This is the school mailing-list.

============
This is the district mailing-list.
]]></artwork>
          <t>The receiver sees the above message on inbound delivery, and attempts to verify the ARC message signature at the i=2.  Upon success, the receiver notices that there were mailing-list mutations at ARC set i=2.  It applies the REVERSE validation algorithm to reverse the mutations from the second mailing-list.  After applying the reverse procedure, the reversed message looks like:</t>
          <artwork><![CDATA[
ARC-Message-Signature: i=2; m=mailinglist...
ARC-Message-Signature: i=1; m=mailinglist...
Content-Footer: i=1; b=34; e=79
DKIM-Signature: d=mailinglist.example.com
From: school@mailinglist.example.com
Subject: [school list] A really big announcement
X-Prior-DKIM-Signature: i=1,l=3, d=example.com
X-Prior-From: i=1; l=3; john.doe@example.com
X-Prior-Subject: i=1; l=3; A really big announcement

It's Jane Doe's birthday tomorrow!

============
This is the school mailing-list.
]]></artwork>
          <t>Again the receiver attempts to verify the ARC message signature now at the i=1.  Upon success, the receiver notices that there were mailing-list mutations at ARC set i=1.  It applies the REVERSE validation algorithm to reverse the mutations from the first mailing-list, obtaining the original message.  The reversed message looks like:</t>
          <artwork><![CDATA[
ARC-Message-Signature: i=2; m=mailinglist...
ARC-Message-Signature: i=1; m=mailinglist...
From: john.doe@example.com
DKIM-Signature: d=example.com...
Subject: A really big announcement

It's Jane Doe's birthday tomorrow!
]]></artwork>
          <t>The resulting reversed headers and message body DKIM-Signature verifies, and the REVERSE passing result is published in the ARC-Authentication-Result:</t>
          <artwork><![CDATA[
ARC-Authentication-Result: i=3; mx.example.com; reverse=pass...
ARC-Message-Signature: i=2; m=mailinglist...
Content-Footer: i=2; b=79; e=124
DKIM-Signature: d=mailinglist.example.com...
From: district@mailinglist.example.com
Subject: [district list] [school list] A really big announcement
ARC-Message-Signature: i=1; m=mailinglist...
Content-Footer: i=1; b=34; e=78
X-Prior-DKIM-Signature: i=2; l=5; d=mailinglist.example.com...
X-Prior-From: i=2; l=5; school@mailinglist.example.com
X-Prior-Subject: i=2; l=5; [school list] A really big announcement
X-Prior-DKIM-Signature: i=1; l=3; d=example.com...
X-Prior-From: i=1; l=3; john.doe@example.com
X-Prior-Subject: i=1; l=3; A really big announcement

It's Jane Doe's birthday tomorrow!

============
This is the school mailing-list.

============
]]></artwork>
          <t><tt>This is the district mailing-list.</tt></t>
        </section>
      </section>
      <section anchor="security-considerations">
        <name>Security Considerations</name>
        <t>Care must be used if the reversed transformed message is used for authentication.  The reversed transformed message is vulnerable to replay attacks and "hides" the potentially spammy contribution from the mailing-lists.</t>
      </section>
      <section anchor="iana-considerations">
        <name>IANA Considerations</name>
        <t>There are no requests at this time.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC7208">
        <front>
          <title>Sender Policy Framework (SPF) for Authorizing Use of Domains in Email, Version 1</title>
          <author fullname="S. Kitterman" initials="S." surname="Kitterman"/>
          <date month="April" year="2014"/>
          <abstract>
            <t>Email on the Internet can be forged in a number of ways. In particular, existing protocols place no restriction on what a sending host can use as the "MAIL FROM" of a message or the domain given on the SMTP HELO/EHLO commands. This document describes version 1 of the Sender Policy Framework (SPF) protocol, whereby ADministrative Management Domains (ADMDs) can explicitly authorize the hosts that are allowed to use their domain names, and a receiving host can check such authorization.</t>
            <t>This document obsoletes RFC 4408.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7208"/>
        <seriesInfo name="DOI" value="10.17487/RFC7208"/>
      </reference>
      <reference anchor="RFC6376">
        <front>
          <title>DomainKeys Identified Mail (DKIM) Signatures</title>
          <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker"/>
          <author fullname="T. Hansen" initials="T." role="editor" surname="Hansen"/>
          <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy"/>
          <date month="September" year="2011"/>
          <abstract>
            <t>DomainKeys Identified Mail (DKIM) permits a person, role, or organization that owns the signing domain to claim some responsibility for a message by associating the domain with the message. This can be an author's organization, an operational relay, or one of their agents. DKIM separates the question of the identity of the Signer of the message from the purported author of the message. Assertion of responsibility is validated through a cryptographic signature and by querying the Signer's domain directly to retrieve the appropriate public key. Message transit from author to recipient is through relays that typically make no substantive change to the message content and thus preserve the DKIM signature.</t>
            <t>This memo obsoletes RFC 4871 and RFC 5672. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="76"/>
        <seriesInfo name="RFC" value="6376"/>
        <seriesInfo name="DOI" value="10.17487/RFC6376"/>
      </reference>
      <reference anchor="RFC7489">
        <front>
          <title>Domain-based Message Authentication, Reporting, and Conformance (DMARC)</title>
          <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy"/>
          <author fullname="E. Zwicky" initials="E." role="editor" surname="Zwicky"/>
          <date month="March" year="2015"/>
          <abstract>
            <t>Domain-based Message Authentication, Reporting, and Conformance (DMARC) is a scalable mechanism by which a mail-originating organization can express domain-level policies and preferences for message validation, disposition, and reporting, that a mail-receiving organization can use to improve mail handling.</t>
            <t>Originators of Internet Mail need to be able to associate reliable and authenticated domain identifiers with messages, communicate policies about messages that use those identifiers, and report about mail using those identifiers. These abilities have several benefits: Receivers can provide feedback to Domain Owners about the use of their domains; this feedback can provide valuable insight about the management of internal operations and the presence of external domain name abuse.</t>
            <t>DMARC does not produce or encourage elevated delivery privilege of authenticated email. DMARC is a mechanism for policy distribution that enables increasingly strict handling of messages that fail authentication checks, ranging from no action, through altered delivery, up to message rejection.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7489"/>
        <seriesInfo name="DOI" value="10.17487/RFC7489"/>
      </reference>
      <reference anchor="RFC8617">
        <front>
          <title>The Authenticated Received Chain (ARC) Protocol</title>
          <author fullname="K. Andersen" initials="K." surname="Andersen"/>
          <author fullname="B. Long" initials="B." role="editor" surname="Long"/>
          <author fullname="S. Blank" initials="S." role="editor" surname="Blank"/>
          <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy"/>
          <date month="July" year="2019"/>
          <abstract>
            <t>The Authenticated Received Chain (ARC) protocol provides an authenticated "chain of custody" for a message, allowing each entity that handles the message to see what entities handled it before and what the message's authentication assessment was at each step in the handling.</t>
            <t>ARC allows Internet Mail Handlers to attach assertions of message authentication assessment to individual messages. As messages traverse ARC-enabled Internet Mail Handlers, additional ARC assertions can be attached to messages to form ordered sets of ARC assertions that represent the authentication assessment at each step of the message-handling paths.</t>
            <t>ARC-enabled Internet Mail Handlers can process sets of ARC assertions to inform message disposition decisions, identify Internet Mail Handlers that might break existing authentication mechanisms, and convey original authentication assessments across trust boundaries.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8617"/>
        <seriesInfo name="DOI" value="10.17487/RFC8617"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC2045">
        <front>
          <title>Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Message Bodies</title>
          <author fullname="N. Freed" initials="N." surname="Freed"/>
          <author fullname="N. Borenstein" initials="N." surname="Borenstein"/>
          <date month="November" year="1996"/>
          <abstract>
            <t>This initial document specifies the various headers used to describe the structure of MIME messages. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="2045"/>
        <seriesInfo name="DOI" value="10.17487/RFC2045"/>
      </reference>
      <reference anchor="RFC8601">
        <front>
          <title>Message Header Field for Indicating Message Authentication Status</title>
          <author fullname="M. Kucherawy" initials="M." surname="Kucherawy"/>
          <date month="May" year="2019"/>
          <abstract>
            <t>This document specifies a message header field called "Authentication-Results" for use with electronic mail messages to indicate the results of message authentication efforts. Any receiver-side software, such as mail filters or Mail User Agents (MUAs), can use this header field to relay that information in a convenient and meaningful way to users or to make sorting and filtering decisions.</t>
            <t>This document obsoletes RFC 7601.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8601"/>
        <seriesInfo name="DOI" value="10.17487/RFC8601"/>
      </reference>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
