<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.22 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-chuang-dkim-replay-problem-01" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.16.0 -->
  <front>
    <title abbrev="DKIM Replay Problem">DKIM Replay Problem Statement and Scenarios</title>
    <seriesInfo name="Internet-Draft" value="draft-chuang-dkim-replay-problem-01"/>
    <author fullname="Weihaw Chuang">
      <organization>Google, Inc.</organization>
      <address>
        <email>weihaw@google.com</email>
      </address>
    </author>
    <author fullname="Allen Robinson">
      <organization>Google, Inc.</organization>
      <address>
        <email>arobins@google.com</email>
      </address>
    </author>
    <author fullname="Bron Gondwana">
      <organization>Fastmail Pty Ltd</organization>
      <address>
        <email>brong@fastmailteam.com</email>
      </address>
    </author>
    <date year="2023" month="February" day="10"/>
    <workgroup>dkim</workgroup>
    <keyword>DKIM</keyword>
    <keyword>Replay</keyword>
    <abstract>
      <t>DomainKeys Identified Mail (DKIM, RFC6376) claims some responsibility for a message by associating a domain and protecting the integrity of the covered portion of a message during transit through a digital signature.  DKIM survives basic email relaying.  In a Replay Attack, the recipient of a DKIM-signed message sends the message further, to other recipients, while retaining the original, validating signature, thereby seeking to leverage the reputation of the original signer. This document discusses the damage this causes to email delivery and interoperability, and the associated Mail Flows.  A significant challenge to mitigating this problem is that it is difficult for Receivers to differentiate between legitimate forwarding flows and DKIM Replay.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>DomainKeys Identified Mail (DKIM) is a well-established email protocol <xref target="RFC6376"/>:</t>
      <t><em>DomainKeys Identified Mail (DKIM) permits a person, role, or organization to claim some responsibility for a message by associating a domain name <xref target="RFC1034"/> with the message <xref target="RFC5322"/>, which they are authorized to use.  This can be an author's organization, an operational relay, or one of their agents.  Assertion of responsibility is validated through a cryptographic signature and by querying the Signer's domain directly to retrieve the appropriate public key.</em></t>
      <section anchor="the-problem">
        <name>The problem</name>
        <t>Since many domains (including those of bad actors) list DKIM records, receiving systems track the history of messages using a DKIM-based domain name, to formulate a reputation for the name, and then to classify incoming emails.  The presence of a DKIM signature that validates  the message ensures that the developed reputation was the result of activity by the domain owner, and not by other parties.  Receiving filtering systems contain a rich array of rules and heuristics for assessing email.  DKIM is one such identity that this system associates with sender reputation and uses to predict future sender behavior.  The filter system helps protect users against spam, phishing and other abuse.</t>
        <t>While DKIM Replay was identified as a hypothetical concern during the development of the DKIM standard, that attack has become commonplace: Attackers create, obtain access, or compromise an account at a site with a high reputation. This allows them to generate an email having content that they can (re-)broadcast widely. They send an email from that account, to an external account also under their control. This single message is delivered to the attacker’s mailbox, giving them an email with a valid DKIM signature, for a domain with high reputation.  Further, Internet Mail permits sending a message to addresses that are not listed in the content To:, Cc: or Bcc: header fields.  DKIM covers portions of the message content, and can cover these header fields, but it does not cover the envelope addresses, used by the email transport service, for determining actual recipient addresses. So this message can then be replayed to arbitrary thousands or millions of other recipients, none of whom were specified by the original author.</t>
        <t>Unfortunately DKIM Replay is impossible to detect or prevent with current standards.  Email authentication does not distinguish benign forwarding flows from DKIM Replay, as will be described later by itemizing the different forwarding flows and their email authentication patterns.</t>
        <t>ARC <xref target="RFC8617"/> is a protocol to securely propagate authentication results seen by forwarders, such as mailing lists that re-post messages, in eMail Flow. It can be used to adjust DMARC <xref target="RFC7489"/> validation as described in section 7.2.1.  Because ARC is heavily based on DKIM it has the same replay issue as described in section 9.5.</t>
      </section>
      <section anchor="glossary">
        <name>Glossary</name>
        <t>This document is completely informative and omits normative language as described in <xref target="RFC2119"/>.</t>
        <t>This document uses delivery terminology from <xref target="RFC5598"/> and <xref target="RFC5321"/> to define the participants in a Mail Flow.  In particular <xref target="RFC5598"/> defines mail interactions conceptually from three perspectives which are called <em>actors</em> there- users, services (Message Handling Service) or administratively (ADministrative Management Domain). This document primarily works with and expands the list of Message Handling Services.  As noted in <xref target="RFC5598"/> a given implementation might have multiple roles. The following are a subset of the Mail Handling Services defined in <xref target="RFC5598"/> to be used in this document:</t>
        <ul spacing="normal">
          <li>Originator - defined in Section 2.2.1.  This works on behalf of the author to post the message to the relay that performs the SMTP store-and-forwarding and to validate the message.  The Originator may DKIM sign the message on behalf of the author.</li>
          <li>Alias- as defined in Section 5.1, the Alias updates the RCPT TO envelope recipient but not the address field headers.  Often used for <em>Auto-Forwarding</em>.</li>
          <li>Mailing Lists- defined in Section 5.3.   Receives a message and reposts them to a list of members.  May add list-specific header fields e.g. List-XYZ:, etc.  May append text to the Subject header, and at the end of the content.</li>
          <li>Receiver- defined in Section 2.2.4.  The Receiver works on behalf of the recipient to deliver the message to the inbox and may perform filtering.</li>
        </ul>
        <t>All of these Mail Handling Services and those below may add trace and operational headers.</t>
        <t>Modern Mail Flow has additional Mail Handling Services.  These additional service definitions are:</t>
        <ul spacing="normal">
          <li>Email Service Provider (ESP) Bulk Sender or often abbreviated as Bulk Sender- An originating third-party service, acting as an agent of the author and sending to a list of recipients.  They may DKIM sign as themselves but also sign for the author of the message.</li>
          <li>Outbound Filtering Service- The Originator can route some or all of their mail through an Outbound Filtering Service to provide spam or data loss protection services, instead of sending directly to the recipient's server.  This service may modify the message and is administratively separate from the Originator.</li>
          <li>Inbound Filtering Service- The Receiver can route mail through an Inbound Filtering Service to provide spam, malware and other anti-abuse protection service.  Typically this is done by publishing the Inbound Filtering Service hosts in the Receiver's MX record. This service may modify the message and is administratively separate from the Receiver.  Once done filtering, the Inbound Filtering Service relays the messages to the Receiver.</li>
        </ul>
        <t>It is useful to broadly identify participants in Mail Flow by functionality as defined in <xref target="RFC5598"/> in terms of submission, transmission and delivery.  The SMTP agents are categorized under these as:</t>
        <ul spacing="normal">
          <li>Mail Submission Agent (MSA)</li>
          <li>Mail Transmission Agent (MTA)</li>
          <li>Mail Delivery Agent (MDA)</li>
        </ul>
        <t>In addition the user interact with the MSA and MDA via:</t>
        <ul spacing="normal">
          <li>Mail User Agent (MUA).</li>
        </ul>
        <t>The above services uses email authentication as defined in the following specifications:</t>
        <ul spacing="normal">
          <li>
            <t>DomainKeys Identified Mail (DKIM): defined in <xref target="RFC6376"/>.
            </t>
            <ul spacing="normal">
              <li>Note that DKIM replay is defined in <xref target="RFC6376"/> section 8.6.</li>
            </ul>
          </li>
          <li>Sender Policy Framework (SPF)- defined in <xref target="RFC7208"/>.</li>
          <li>Domain-based Message Authentication, Reporting, and Conformance (DMARC): defined in <xref target="RFC7489"/>.</li>
        </ul>
        <t>Mail Flow is an informal term for the path that messages take when they traverse between some Originator and Receiver and possibly one or more intermediary Message Handling Services.  Those intermediary Message Handling Services are administratively distinct from the Originator and Receiver.  Direct Mail Flow contains only the Originator and Receiver without intermediary Message Handling Services, whereas Indirect Mail Flow has Originator and Receiver with intermediary Message Handling Services.</t>
      </section>
    </section>
    <section anchor="dkim-replay">
      <name>DKIM Replay</name>
      <t>A spammer finds a mail Originator with a high reputation and that signs their message with DKIM.  They obtain access to an account at the Originator.  This may happen via open enrollment at some Mailbox Provider or Bulk Sender, or via account hijacking for any Originator.  The spammer sends a message with spam content from there to a mailbox they control.  Taking advantage of the flexibility in DKIM to selectively sign headers, the spammer may intentionally leave out certain headers such as To:, and Subject: that can be added in later without damaging the existing DKIM signature.  The spammer reads the signed message from the initial Receiver's inbox and potentially adds the missing headers customized by the ultimate spam victim recipient.  The resulting message is then sent at scale to the victim recipients.  In addition to being DKIM authenticated via the spoofed DKIM signature, the spammer can set up SPF authentication on their servers though that will not be aligned with the DKIM.  Because the signed message has high reputation, the message with spam content will tend to get through to the inbox.  This is an example of a spam classification false negative – incorrectly assessing spam to not be spam.</t>
      <t>When large amounts of spam are received by the mailbox provider, the operator’s filtering engine will eventually react by dropping the reputation of the original DKIM signer.  Benign mail from the signer's domain then starts to go to the spam folder.  This is an example of a spam classification false positive.</t>
      <t>In both cases, mail that is potentially wanted by the user becomes much harder to find, reducing its value to the user.  In the first case, the wanted mail is mixed with potentially large quantities of spam.  In the second case, the wanted mail is put in the spam folder where the user does not expect it.</t>
      <t>When the Receiver observes a spam campaign, operators at the Receiver may use additional signals such as SPF to reject spam.   As described in the next section, SPF works well for Direct Mail Flows but is problematic for Indirect Mail Flows that are an important part of the email ecosystem.</t>
    </section>
    <section anchor="mail-flow-scenarios">
      <name>Mail Flow Scenarios</name>
      <t>The following section categorizes the different Mail Flows by a functional description, and effect on email authentication.  The Mail Flow categorization in this section by email authentication is meant to demonstrate why DKIM replay is so hard to distinguish from benign Mail Flow particularly for Indirect Mail Flows.  Email authentication, when present, is defined in terms of DKIM and SPF provided by some sender and validated by the Receiver.  Flows involving the same service as both a forwarder and as a destination service can be thought of as two independent (though related) Mail Flows for the purposes of authentication signal propagation.  Some intermediary Mail Handling Services can be composed to make even more complex Indirect Mail Flows.</t>
      <section anchor="direct-mail-flow">
        <name>Direct Mail Flow</name>
        <t>In this case the Originator delivers mail directly to the Receiver without any intermediary Mail Handling Services.</t>
        <t>Email authentication:</t>
        <ul spacing="normal">
          <li>SPF- the Originator's IPs are plainly observable by the Receiver, enabling successful authentication by the Receiver.</li>
          <li>DKIM- authenticates as there is no intermediary that breaks the DKIM signature.</li>
        </ul>
      </section>
      <section anchor="bulk-sender">
        <name>Bulk Sender</name>
        <t>Bulk Senders is a special case of Direct Mail Flow.  The ESP acts as the Originator of messages on behalf of the Author given a message body and a list of recipients.</t>
        <t>Email authentication:</t>
        <ul spacing="normal">
          <li>SPF based on a customer domain requires careful coordination with that customer, since it is their SPF record and not the ESP's.</li>
          <li>DKIM- the ESP may generate a DKIM signature based on the Author's domain and/or one based on the ESP 's own.  Requires coordination when the customer's domain is used.</li>
        </ul>
        <t>The following are examples of Indirect Mail Flows.</t>
      </section>
      <section anchor="transmission-through-an-outbound-filtering-service">
        <name>Transmission through an Outbound Filtering Service</name>
        <t>In this case, the Originator relays email to Outbound Filtering Service that provides spam or data loss protection before sending the message onto the Receiver.</t>
        <t>Email authentication:</t>
        <ul spacing="normal">
          <li>SPF authentication is possible, but may not be advisable. The Originator does this by publishing an SPF policy that covers the Outbound Filtering Service IPs but this IP sharing weakens authentication.</li>
          <li>DKIM may break if the filter performs any modifications of the message such as URL rewriting or attachment stripping. Such modifications could be supported if the filtering service has the ability to resign for DKIM on behalf of the Originator though the Originator increases risk of losing control of their private key.</li>
        </ul>
      </section>
      <section anchor="transmission-through-an-inbound-filtering-service">
        <name>Transmission through an Inbound Filtering Service</name>
        <t>In this case an Inbound Filtering Service provides spam and abuse protections for the Receiver.  The Receiver sets this up by having its MX record point to the Inbound Filtering Service and the Inbound Filtering Service relays the message to the Receiver.</t>
        <t>Email authentication:</t>
        <ul spacing="normal">
          <li>SPF will be unauthenticated with the original MAIL FROM domain as the required connecting IP information is only available during the SMTP transaction between the Originator service and the Inbound Filtering Service.  The Inbound Filter Service's EHLO domain or rewritten MAIL FROM domain may authenticate.</li>
          <li>DKIM may break if the filter performs any modifications of the message such as URL rewriting or attachment stripping.</li>
        </ul>
        <t>Because email authentication completely fails with aggressive inbound filtering, the Receiver typically will have to trust the Inbound Filtering Service to perform email authentication and DMARC policy enforcement.</t>
      </section>
      <section anchor="mailing-list">
        <name>Mailing List</name>
        <t>Messages are sent to a mailing list which takes delivery, possibly append text to the Subject header, and at the end of the content, and then re-posts the message to an expanded list of recipients.</t>
        <t>Email authentication:</t>
        <ul spacing="normal">
          <li>SPF will be unauthenticated with the original MAIL FROM domain as the required connecting IP information is only available during the SMTP transaction between the Originator service and the Mailing List.  The Mailing List's EHLO domain or rewritten MAIL FROM domain may authenticate.</li>
          <li>DKIM may break if the Mailing List modifies the message.  To compensate, some Mailing Lists DKIM signs the message with the identity of the Mailing List.  Because this may break DMARC From header alignment, the Mailing List may also rewrite the From address.</li>
        </ul>
        <section anchor="alias-aka-auto-forwarding">
          <name>Alias aka Auto-Forwarding</name>
          <t>Automatically forwards mail to a new recipient, updating the envelope from address (MAIL FROM).</t>
          <t>Email authentication:</t>
          <ul spacing="normal">
            <li>SPF will be unauthenticated with the original MAIL FROM domain as the required connecting IP information is only available during the SMTP transaction between the Originator service and the Alias.  The Alias EHLO domain or rewritten MAIL FROM domain may authenticate.</li>
            <li>DKIM- authenticates as the Alias does not modify the messages.</li>
          </ul>
          <t>In all cases of Indirect Mail Flow, SPF MAIL FROM authentication fails. To authenticate SPF, the intermediary may rewrite the MAIL FROM to provide its domain as the MAIL FROM identity or publish an EHLO domain but this identity won't align with the DKIM domain.  The Indirect Mail Flow pattern of typically passing DKIM and failing or misaligned SPF is the same DKIM Replay.</t>
        </section>
      </section>
    </section>
    <section anchor="proposed-solution-space">
      <name>Proposed Solution Space</name>
      <t>Here are some potential solutions to the problem, and their pros and cons</t>
      <ol spacing="normal" type="1"><li>
          <t>The originator includes the ENVELOPE-TO address in the signature and the Receiver verifies against the actual recipient.
          </t>
          <ul spacing="normal">
            <li>
              <t>Pros:
              </t>
              <ul spacing="normal">
                <li>Avoids replay to destination addresses not anticipated by the DKIM signer thereby preventing DKIM replay.</li>
              </ul>
            </li>
            <li>
              <t>Cons:
              </t>
              <ul spacing="normal">
                <li>Some Indirect Mail Flows will not authenticate if they rewrite the ENVELOPE-TO.  This problem is similar to SPF in being unable to support some Indirect Mail Flows.</li>
              </ul>
            </li>
          </ul>
        </li>
        <li>
          <t>Cache        known DKIM signatures.  Since the exact same signature is being replayed repeatedly, this allows a Receiver to detect whether a message is part of a DKIM Replay set, and suppress it.
          </t>
          <ul spacing="normal">
            <li>
              <t>Pros:
              </t>
              <ul spacing="normal">
                <li>No changes to the DKIM standard required</li>
              </ul>
            </li>
            <li>
              <t>Cons:
              </t>
              <ul spacing="normal">
                <li>Mailing list traffic, exploder aliases, or regular BCCs will also show up as duplicates, so this is very much a heuristic guess of whether the amount of duplication is expected or not.  This may lead to spam filtering false positives.</li>
              </ul>
            </li>
          </ul>
        </li>
        <li>
          <t>Strip DKIM signatures on mailbox delivery to the inbox.  No DKIM signature will be available to resend by the spammer.
          </t>
          <ul spacing="normal">
            <li>
              <t>Pros:
              </t>
              <ul spacing="normal">
                <li>Messages delivered to a mailbox can not be DKIM replayed any more.</li>
                <li>No changes to the DKIM standard required.</li>
              </ul>
            </li>
            <li>
              <t>Cons:
              </t>
              <ul spacing="normal">
                <li>Does not help against evil or non-participanting Mailbox Provider.</li>
                <li>May not support MUA services that wish to independently check message integrity.  A new standard could be developed to sign twice and strip only the over the wire signature used for email authentication, and leave a long term signature for message integrity. \</li>
              </ul>
            </li>
          </ul>
        </li>
        <li>
          <t>Add a per-hop signature, specifying the destination domain for the next hop
          </t>
          <ul spacing="normal">
            <li>
              <t>Pros:
              </t>
              <ul spacing="normal">
                <li>Messages with this kind of signature cannot be replayed down a different pathway, since the destination won't match.</li>
              </ul>
            </li>
            <li>
              <t>Cons:
              </t>
              <ul spacing="normal">
                <li>Requires every site along the path to support this spec, so it will need to detect whether the next stop is making a commitment to follow the spec.</li>
                <li>If email goes outside of sites with this spec (without disclosure), traversing a naive forwarder remains indistinguishable from replay.</li>
              </ul>
            </li>
          </ul>
        </li>
      </ol>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions yet.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>Normative References</name>
      <reference anchor="RFC6376">
        <front>
          <title>DomainKeys Identified Mail (DKIM) Signatures</title>
          <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker">
            <organization/>
          </author>
          <author fullname="T. Hansen" initials="T." role="editor" surname="Hansen">
            <organization/>
          </author>
          <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy">
            <organization/>
          </author>
          <date month="September" year="2011"/>
          <abstract>
            <t>DomainKeys Identified Mail (DKIM) permits a person, role, or organization that owns the signing domain to claim some responsibility for a message by associating the domain with the message.  This can be an author's organization, an operational relay, or one of their agents.  DKIM separates the question of the identity of the Signer of the message from the purported author of the message.  Assertion of responsibility is validated through a cryptographic signature and by querying the Signer's domain directly to retrieve the appropriate public key.  Message transit from author to recipient is through relays that typically make no substantive change to the message content and thus preserve the DKIM signature.</t>
            <t>This memo obsoletes RFC 4871 and RFC 5672.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="76"/>
        <seriesInfo name="RFC" value="6376"/>
        <seriesInfo name="DOI" value="10.17487/RFC6376"/>
      </reference>
      <reference anchor="RFC1034">
        <front>
          <title>Domain names - concepts and facilities</title>
          <author fullname="P. Mockapetris" initials="P." surname="Mockapetris">
            <organization/>
          </author>
          <date month="November" year="1987"/>
          <abstract>
            <t>This RFC is the revised basic definition of The Domain Name System.  It obsoletes RFC-882.  This memo describes the domain style names and their used for host address look up and electronic mail forwarding.  It discusses the clients and servers in the domain name system and the protocol used between them.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="13"/>
        <seriesInfo name="RFC" value="1034"/>
        <seriesInfo name="DOI" value="10.17487/RFC1034"/>
      </reference>
      <reference anchor="RFC5322">
        <front>
          <title>Internet Message Format</title>
          <author fullname="P. Resnick" initials="P." role="editor" surname="Resnick">
            <organization/>
          </author>
          <date month="October" year="2008"/>
          <abstract>
            <t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of "electronic mail" messages.  This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, "Standard for the Format of ARPA Internet Text Messages", updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5322"/>
        <seriesInfo name="DOI" value="10.17487/RFC5322"/>
      </reference>
      <reference anchor="RFC8617">
        <front>
          <title>The Authenticated Received Chain (ARC) Protocol</title>
          <author fullname="K. Andersen" initials="K." surname="Andersen">
            <organization/>
          </author>
          <author fullname="B. Long" initials="B." role="editor" surname="Long">
            <organization/>
          </author>
          <author fullname="S. Blank" initials="S." role="editor" surname="Blank">
            <organization/>
          </author>
          <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy">
            <organization/>
          </author>
          <date month="July" year="2019"/>
          <abstract>
            <t>The Authenticated Received Chain (ARC) protocol provides an authenticated "chain of custody" for a message, allowing each entity that handles the message to see what entities handled it before and what the message's authentication assessment was at each step in the handling.</t>
            <t>ARC allows Internet Mail Handlers to attach assertions of message authentication assessment to individual messages.  As messages traverse ARC-enabled Internet Mail Handlers, additional ARC assertions can be attached to messages to form ordered sets of ARC assertions that represent the authentication assessment at each step of the message-handling paths.</t>
            <t>ARC-enabled Internet Mail Handlers can process sets of ARC assertions to inform message disposition decisions, identify Internet Mail Handlers that might break existing authentication mechanisms, and convey original authentication assessments across trust boundaries.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8617"/>
        <seriesInfo name="DOI" value="10.17487/RFC8617"/>
      </reference>
      <reference anchor="RFC7489">
        <front>
          <title>Domain-based Message Authentication, Reporting, and Conformance (DMARC)</title>
          <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy">
            <organization/>
          </author>
          <author fullname="E. Zwicky" initials="E." role="editor" surname="Zwicky">
            <organization/>
          </author>
          <date month="March" year="2015"/>
          <abstract>
            <t>Domain-based Message Authentication, Reporting, and Conformance (DMARC) is a scalable mechanism by which a mail-originating organization can express domain-level policies and preferences for message validation, disposition, and reporting, that a mail-receiving organization can use to improve mail handling.</t>
            <t>Originators of Internet Mail need to be able to associate reliable and authenticated domain identifiers with messages, communicate policies about messages that use those identifiers, and report about mail using those identifiers.  These abilities have several benefits: Receivers can provide feedback to Domain Owners about the use of their domains; this feedback can provide valuable insight about the management of internal operations and the presence of external domain name abuse.</t>
            <t>DMARC does not produce or encourage elevated delivery privilege of authenticated email.  DMARC is a mechanism for policy distribution that enables increasingly strict handling of messages that fail authentication checks, ranging from no action, through altered delivery, up to message rejection.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7489"/>
        <seriesInfo name="DOI" value="10.17487/RFC7489"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner">
            <organization/>
          </author>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC5598">
        <front>
          <title>Internet Mail Architecture</title>
          <author fullname="D. Crocker" initials="D." surname="Crocker">
            <organization/>
          </author>
          <date month="July" year="2009"/>
          <abstract>
            <t>Over its thirty-five-year history, Internet Mail has changed significantly in scale and complexity, as it has become a global infrastructure service.  These changes have been evolutionary, rather than revolutionary, reflecting a strong desire to preserve both its installed base and its usefulness.  To collaborate productively on this large and complex system, all participants need to work from a common view of it and use a common language to describe its components and the interactions among them.  But the many differences in perspective currently make it difficult to know exactly what another participant means.  To serve as the necessary common frame of reference, this document describes the enhanced Internet Mail architecture, reflecting the current service.  This memo provides  information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5598"/>
        <seriesInfo name="DOI" value="10.17487/RFC5598"/>
      </reference>
      <reference anchor="RFC5321">
        <front>
          <title>Simple Mail Transfer Protocol</title>
          <author fullname="J. Klensin" initials="J." surname="Klensin">
            <organization/>
          </author>
          <date month="October" year="2008"/>
          <abstract>
            <t>This document is a specification of the basic protocol for Internet electronic mail transport.  It consolidates, updates, and clarifies several previous documents, making all or parts of most of them obsolete.  It covers the SMTP extension mechanisms and best practices for the contemporary Internet, but does not provide details about particular extensions.  Although SMTP was designed as a mail transport and delivery protocol, this specification also contains information that is important to its use as a "mail submission" protocol for "split-UA" (User Agent) mail reading systems and mobile environments.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5321"/>
        <seriesInfo name="DOI" value="10.17487/RFC5321"/>
      </reference>
      <reference anchor="RFC7208">
        <front>
          <title>Sender Policy Framework (SPF) for Authorizing Use of Domains in Email, Version 1</title>
          <author fullname="S. Kitterman" initials="S." surname="Kitterman">
            <organization/>
          </author>
          <date month="April" year="2014"/>
          <abstract>
            <t>Email on the Internet can be forged in a number of ways.  In particular, existing protocols place no restriction on what a sending host can use as the "MAIL FROM" of a message or the domain given on the SMTP HELO/EHLO commands.  This document describes version 1 of the Sender Policy Framework (SPF) protocol, whereby ADministrative Management Domains (ADMDs) can explicitly authorize the hosts that are allowed to use their domain names, and a receiving host can check such authorization.</t>
            <t>This document obsoletes RFC 4408.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7208"/>
        <seriesInfo name="DOI" value="10.17487/RFC7208"/>
      </reference>
    </references>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Many thanks goes to Dave Crocker for his patient editing and clarification. Thanks also goes to Emanuel Schorsch and Evan Burke for their advice.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
