<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- used by XSLT processors -->
<!-- OPTIONS, known as processing instructions (PIs) go here. -->
<!-- For a complete list and description of PIs,
     please see http://xml.resource.org/authoring/README.html. -->
<!-- Below are generally applicable PIs that most I-Ds might want to use. -->
<?rfc strict="yes" ?>
<!-- give errors regarding ID-nits and DTD validation -->
<!-- control the table of contents (ToC): -->
<?rfc toc="yes"?>
<!-- generate a ToC -->
<?rfc tocdepth="3"?>
<!-- the number of levels of subsections in ToC. default: 3 -->
<!-- control references: -->
<?rfc symrefs="yes"?>
<!-- use symbolic references tags, i.e, [RFC2119] instead of [1] -->
<?rfc sortrefs="yes" ?>
<!-- sort the reference entries alphabetically -->
<!-- control vertical white space:
     (using these PIs as follows is recommended by the RFC Editor) -->
<?rfc compact="yes" ?>
<!-- do not start each main section on a new page -->
<?rfc subcompact="no" ?>
<!-- keep one blank line between list items -->
<!-- end of popular PIs -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" category="info" docName="draft-adams-arc-experiment-conclusion-01" ipr="trust200902" obsoletes="8617" updates="" submissionType="IETF" xml:lang="en" tocInclude="true" tocDepth="2" symRefs="true" sortRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.1.1 -->
  <front>
    <title abbrev="Concluding the ARC Experiment">Concluding the ARC Experiment</title>
    <seriesInfo name="Internet-Draft" value="draft-adams-arc-experiment-conclusion-01"/>
    <author fullname="J. Trent Adams" initials="T" surname="Adams">
      <organization>Proofpoint</organization>
      <address>
        <postal>
          <street>105 Edgeview Drive, Suite 440</street>
          <city>Broomfield</city>
          <region>CO</region>
          <code>80021</code>
          <country>USA</country>
        </postal>
<!-- <phone/> -->
<!-- <facsimile/> -->
      <email>tadams@proofpoint.com</email>
        <!-- <uri/> -->
      </address>
    </author>
    <author fullname="John Levine" initials="J" surname="Levine">
      <organization>Taughannock Networks</organization>
      <address>
        <postal>
          <street>PO Box 727</street>
          <city>Trumansburg</city>
          <region>NY</region>
          <code>14886</code>
          <country>USA</country>
        </postal>
<!-- <phone/> -->
<!-- <facsimile/> -->
      <email>standards@taugh.com</email>
        <!-- <uri/> -->
      </address>
    </author>
    <date year="2025"/>
    <!-- <area/> -->
<!-- <workgroup/> -->
    <keyword>ARC</keyword>
    <keyword>Authenticated Received Chain</keyword>
    <keyword>DKIM</keyword>
    <keyword>DKIM2</keyword>
    <keyword>DMARC</keyword>
    <keyword>SPF</keyword>
    <!-- <keyword/> -->
    <abstract>
      <t>
				This document calls for a conclusion to the experiment defined by “The Authenticated
				Received Chain (ARC) Protocol,” (RFC8617) and recommends that ARC no
				longer be deployed or relied upon between disparate senders and receivers. The 
				document summarizes what ARC set out to do, reports on operational experience, and 
				explains how the experience gained during the experiment is being incorporated into 
				the proposed DKIM2 work as the successor to DomainKeys Identified Mail (DKIM).  To 
				avoid any future confusion, it is therefore requested that ARC (RFC8617) be marked 
				“Obsolete” by the publication of this Internet-Draft.
      </t>
    </abstract>
  </front>
  <middle>
    <section numbered="true" toc="default">
      <name>Introduction</name>
      <t>
				Following the deployment of DMARC <xref target="RFC7489"/> that aligned author
				domains with SPF <xref target="RFC7208"/> / DKIM <xref target="RFC6376"/> and provided a method to request receiver
				handling for authentication failures, while DKIM continued to provide
				message-level signatures, it became clear that there was a failure
				case that needed to be addressed.  Real-world forwarding and
				modifications performed by mailing list managers frequently broke
				the authentication protocols that underpin DMARC, motivating the ARC experiment as a potential
				mitigation.
      </t>
      <t>
		   As a response, ARC <xref target="RFC8617"/> was introduced as an experiment to
		   determine whether a cryptographically verifiable “chain of custody”
		   for email, as assembled by intermediaries rewriting messages, could
		   preserve the original sender’s authentication results across
		   forwarding, mailing lists, and other intermediaries.  ARC’s premise
		   was that each handler could record its view of upstream
		   authentication and then sign that record, enabling downstream
		   evaluators to see what happened along the path.
      </t>
      <t>
		   This document reports the experiment’s results and explains why, with
		   the emergence of the proposed successor to DKIM, currently known as
		   DKIM2, the community should retire ARC and incorporate the useful
		   pieces directly into the successor to DKIM.
      </t>
      
    </section>
    
    <section numbered="true" toc="default">
      <name>Background</name>

      <section anchor="problem-space" numbered="true">
        <name>Problem Space: DMARC Breakage at Intermediaries</name>
        <t>
					DMARC relies on successful SPF and/or DKIM authentication along with alignment with the Author Domain.
					When intermediaries modify a message (for example, subject or body
					changes, footer insertion, MIME adjustments), DKIM signatures from
					the originator can fail to verify; when an intermediary relays mail
					through different IPs than are defined within the originator’s SPF
					record, SPF authentication can fail.  As a result, messages that were
					legitimate at origination can appear unauthenticated downstream, even
					if the intermediary handling is benign.  ARC was proposed to let
					trustworthy intermediaries attest to what they saw before the
					breakage occurred and add a new signature to the message, essentially
					creating a signature chain.
        </t>
        <t>
					Forwarding remains one of the most pervasive sources of broken
					authentication results.  When a recipient’s mail is automatically
					forwarded (for example, via a mailing list, auto-forward rule, or
					redirect), the forwarding infrastructure appears as the sending IP,
					not the IP of the original sending domain, so SPF authentication fails by
					design.  DKIM may survive only if the signature remains intact
					through forwarding, but many forwarding systems change headers or
					bodies (footers, mailing list tags, encodings), thus invalidating
			   DKIM and causing DMARC to fail.
        </t>
        <t>
					Because the forwarding party is typically not in the author’s domain
					control and cannot easily be enumerated in the author’s SPF record,
					it becomes operationally infeasible for senders to cover every
					possible forwarder.  As such, broken authentication at forwarders
					represents a structural gap in DMARC deployment.
        </t>
        <t>
					The forwarder’s participation and transformations therefore form the
					very scenario that the ARC experiment targeted, namely intermediaries
					rewriting messages and breaking original authentication signals, and
					the hope that those intermediaries could attest to the original
					author’s state via a chain of custody.
        </t>
      </section>

      <section anchor="arc-overview" numbered="true">
        <name>ARC Overview</name>
        <t>
					To address these failure modes, ARC defines header fields (
					ARC-Seal, ARC-Message-Signature, ARC-Authentication-Results)
					that allow each intermediary to:
        </t>
        <ul>
          <li>capture its input authentication assessment (typically DMARC-related),</li>
          <li>indicate that some transformation happened but not what changed, and</li>
          <li>sign its contribution, forming a verifiable chain that subsequent receivers can validate.</li>
        </ul>
        <t>
					ARC does not assert message authorship; it asserts a sequence of
					handling and observations only by those participating in ARC signing.
					Verification yields two outputs: (1) whether the chain is
					cryptographically valid, and (2) what those upstream assessments (if
					any) were.  It makes no value assertion of the email nor if
					there were any intermediary handlers not participating in ARC
					handling or signing.
        </t>
      </section>

	    <section anchor="scope" numbered="true">
	      <name>Scope and Non-Goals of ARC</name>
	      <t>
					The experiment explicitly limited ARC’s role to signaling: it could
					reveal that certain intermediaries participated and re-signed
					messages, but a validated ARC chain was not intended to convey trust
					in any signer on its own.  Trust decisions were left to receivers’
					local policy.  As such, without a robust reputation system, ARC in-
					and-of itself cannot convey trust in an email that fails DMARC.
	      </t>
	      <t>
					Another limitation of the design was that the ARC signature only
					indicated the intermediaries handling the message, but was silent
					about any changes the intermediaries made to the message.  As such,
					a fully validated ARC chain might include a modified message without
					the final evaluator knowing what changes were made.
	      </t>
	    </section>

</section>

<section numbered="true" toc="default">
  <name>Analysis of the ARC Experiment</name>

			<section numbered="true" toc="default">
			  <name>Operational Experience</name>
			      <t>This section summarizes widely reported deployment observations from
			      	operators and implementers during the ARC experiment.</t>
			      <ul>
			        <li>
								Data-center and intra-domain utility: Early effective use of ARC
								occurred inside single administrative domains or tightly
								controlled data centers, where messages traversed multiple
								internal hops.  Operators applied ARC to ensure messages were not
								modified unexpectedly between their own servers.  In these cases,
								operators already had implicit trust and operational control.
			        </li>
			        <li>
								Internet-scale dependency on reputation: For broad
								interoperability, ARC required evaluators to run a reputation
								system for ARC signers.  Verifying the cryptography was necessary
								but insufficient; evaluators needed to decide whether to trust
								each signer in the chain before using their assertions to override
								DMARC outcomes.  This created a parallel trust infrastructure,
								separate from (but interacting with) existing domain or IP
								reputation.
			        </li>
			        <li>
								Limited reputation deployment:Even early deployers that validated
								ARC chains did not deploy robust, dynamic reputation.  Instead,
								they implemented “allow lists” of intermediaries whose ARC
								assertions were always (or mostly) accepted.  This provided
								utility in specific bilateral or consortium relationships but did
								not scale to the open Internet.
			        </li>
			        <li>
								Complex evaluator policy: Receivers faced policy questions: how
								many hops of ARC to honor, how to treat partial or broken chains,
								how to reconcile conflicting assessments across chain links, and
								under what conditions ARC could influence DMARC enforcement.  The
								resulting diversity limited predictable interoperation across
								receivers.
			        </li>
			        <li>
								Forwarding-driven breakage still dominant: Because email
								forwarding automatically changes the apparent sender
								infrastructure (for example, the forwarding system’s IP rather
								than the original domain), many well-authenticated messages fail
								DMARC at the final recipient purely due to forwarders.  Forwarding
								often results in SPF failure by design and DKIM failure due to
								header or body modifications.  This reinforces that any
								intermediary authentication or chaining mechanism (such as ARC)
								must address the uncontrolled nature of forwarding, which spans
								countless unknown and dynamic systems, rather than only known
								mailing lists or enterprise relays.
			        </li>
			        <li>
								Abuse of trusted chains: Attackers have been leveraging situations 
								where recipients trusted ARC chains by modifying email after an 
								initial attestation and then passing it to another entity which 
								trusted that attestation. Assessing whether the email came directly 
								from the entity at the head of the ARC chain is complex and assessing
								whether or not any changes to the email were made by a trusted signer 
								or a malicious third party has proved to be impossible.
			        </li>
			        <li>
								Limited deployment and use compared to DKIM: Implementation of ARC has 
								been limited at Internet scale with only about 10,000 domains having 
								been observed to send email with ARC-signed headers.  Even fewer 
								have done so in full compliance with the specification since it was 
								published as an RFC in 2019. For comparison, 9.5 million DKIM records 
								were found via passive DNS inspection over the same six years with 460 
								million DKIM signatures observed from real-world email headers.
			        </li>
			        <li>
								Ecosystem shift to successor work: As the community prioritized
								addressing DKIM replay and strengthening end-to-end authenticity,
								the DKIM working group has initiated work on what is being called
								DKIM2.  That effort explicitly considers incorporating ARC-like
								“handling assertions” where they add value, while avoiding a
								separate global trust fabric for intermediaries.  As focus has
								shifted from ARC to DKIM2, incorporating the learning from the ARC
								experiment, there is no longer any meaningful effort to continue
								developing and deploying ARC.
			        </li>
			      </ul>
			</section>

      <section numbered="true">
        <name>ARC’s Core Lesson: Signatures Are Not Trust</name>
        <t>
					ARC successfully demonstrated that intermediaries can publish a
					cryptographically verifiable history of handling.  However,
					verifiable history without reputation does not enable safe override
					of DMARC or other enforcement policies.  Any Internet-wide solution
					must pair verifiable signals with a scalable, abuse-resistant trust
					model; ad hoc allow lists are not sufficient.
        </t>
      </section>

      <section numbered="true">
        <name>No Indication of Modifications</name>
        <t>
					When the content of an email was modified by an intermediary,
					breaking the DKIM signature, ARC was able to identify the
					intermediary that performed the modification via a signature,
					through ARC doesn't define a mechanism to identify what was
					modified in the message or why it was modified. This left
					the interpretation of whether or not the email should
					be accepted up to the evaluator's ability to determine
					the reputation of the intermediary.					
        </t>
      </section>

      <section numbered="true">
        <name>Reputation at Each Hop Is Operationally Heavy</name>
        <t>
					Operating, sharing, and refreshing reputation for potentially
					thousands of intermediaries is expensive and complex.  Without a
					common reputation framework, ARC yielded inconsistent receiver
					behavior and created incentive for attackers to infiltrate or mimic
					“trusted” intermediaries.
        </t>
        <t>
					The forwarding problem illustrates this operational burden: the
					number of potential forwarders is vast and dynamic, making it
					unrealistic to maintain allow-lists or reputation records for all of
					them.
        </t>
        <t>
        	Attempts to create internet-scale reputation systems for ARC have 
        	not been successful during the ten years of the experiment, and
        	it as there is no known plan for one in development, it is unlikely 
        	there will be one in the future.
        </t>
      </section>

      <section numbered="true">
        <name>Favoring the DKIM2 Approach</name>
        <t>
					The DKIM2 motivation identifies replay as a critical gap and proposes
					signing the source and destination for each message, along with
					mechanisms better aligned with modern routing patterns.
					Incorporating ARC’s useful elements (for example, signed assertions
					about handling) into DKIM2 avoids a parallel chain or signature stack
					and reduces reliance on separate hop-by-hop reputation.
        </t>
      </section>

    <section numbered="true" toc="default">
      <name>Conclusions of the ARC Experiment</name>
      <t>Based on community experience and the direction of the DKIM2 work:</t>
      <ol type="a">
        <li>
					The ARC experiment is over.  Implementers and operators should
					not rely on ARC going forward, and should cease further Internet-
					wide deployments.  Existing ARC deployers should plan to
					decommission them or confine their usage to controlled, intra-
					domain contexts where bilateral policy suffices.
        </li>
        <li>
					Experience from the ARC experiment is informing the development
					of DKIM2.  The DKIM working group is actively developing DKIM2;
					relevant ARC insights, such as durable capture of upstream
					authentication state and intermediary handling, shall inform
					DKIM2 design where appropriate.
        </li>
        <li>
					RFC 8617 should be marked Obsolete.  This document requests that
					the RFC Editor and IESG mark RFC 8617 as “Obsolete” upon
					publication of this draft (or its successor) to conclude the
					experiment and prevent new deployments.
        </li>
      </ol>
    </section>

</section>

    <section numbered="true">
      <name>Guidance to Implementers and Operators</name>
      <ul>
        <li>
					Receivers that still parse ARC headers may continue to verify them
					for forensic or intra-domain purposes, but should not make
					delivery decisions based on ARC chain validity without robust reputational
					trust signals and associated policies.
        </li>
        <li>
					New ARC deployments are discouraged since they are unlikely to provide useful
					information for mail processing.
        </li>
        <li>
					Anyone interested in ARC should follow the development of DKIM2 as it matures
					through the IETF process.
        </li>
      </ul>
    </section>

    <section anchor="Acknowledgements" numbered="true" toc="default">
      <name>Acknowledgements</name>
      <t>
        The authors of RFC8617 and the many operators who deployed and evaluated ARC
        provided the data and experience that made these conclusions possible. The DKIM
        working group’s current efforts, including the DKIM2 motivation and related
        drafts, informed the direction recommended here. Thanks also to those who
        helped review and edit this draft including (but not limited to) Todd Herr,
        Richard Clayton, Alex Brotman, Marc Bradshaw, and Emanuel Schorsch.        
      </t>
    </section>
    <section anchor="IANA" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <t>
      	This document has no IANA actions.
      </t>
    </section>
    <section anchor="Security" numbered="true" toc="default">
      <name>Security Considerations</name>
      <t>
        ARC’s separation of “verification” from “trust” created risks when evaluators
        accepted chains from low-reputation or compromised intermediaries. Attackers
        could attempt to route through permissive handlers to gain favorable treatment.
        Ending the experiment and migrating learnings into DKIM2, along with explicit
        controls to mitigate replay and stronger binding of message context, should
        reduce these risks. Operators must treat residual ARC processing as diagnostic
        only, unless backed by robust, auditable trust frameworks.
      </t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>

      <references>
        <name>Normative References</name>
		      <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml"/>
		      <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6376.xml"/>
		      <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7208.xml"/>
		      <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7489.xml"/>
		      <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml"/>
		      <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8617.xml"/>
      </references>

      <references>
        <name>Informative References</name>

					<xi:include href="https://datatracker.ietf.org/doc/bibxml3/draft-ietf-dkim-dkim2-motivation.xml"/>
		      <reference anchor="ARC-SPEC" target="https://arc-spec.org/">
		        <front>
		          <title>ARC Specification site, background and history</title>
		          <author surname="ARC Community"/>
		          <date year="2019"/>
		        </front>
		      </reference>
		      
      </references>
    </references>

  </back>
</rfc>
