<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.27 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-chuang-dkim-replay-problem-03" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.0 -->
  <front>
    <title abbrev="DKIM Replay Problem">DKIM Replay Problem Statement</title>
    <seriesInfo name="Internet-Draft" value="draft-chuang-dkim-replay-problem-03"/>
    <author fullname="Weihaw Chuang">
      <organization>Google, Inc.</organization>
      <address>
        <email>weihaw@google.com</email>
      </address>
    </author>
    <author fullname="Dave Crocker">
      <organization>Brandenburg InternetWorking</organization>
      <address>
        <email>dcrocker@bbiw.net</email>
      </address>
    </author>
    <author fullname="Allen Robinson">
      <organization>Google, Inc.</organization>
      <address>
        <email>arobins@google.com</email>
      </address>
    </author>
    <author fullname="Bron Gondwana">
      <organization>Fastmail Pty Ltd</organization>
      <address>
        <email>brong@fastmailteam.com</email>
      </address>
    </author>
    <date year="2023" month="April" day="02"/>
    <workgroup>DKIM</workgroup>
    <keyword>DKIM</keyword>
    <keyword>Replay</keyword>
    <abstract>
      <t>DomainKeys Identified Mail (DKIM, RFC6376) permits claiming some responsibility for a message by cryptographically associating a domain name with the message.  For data covered by the cryptographic signature, this also enables detecting changes made during transit. DKIM survives basic email relaying.  In a Replay Attack, a recipient of a DKIM-signed message re-posts the message to other recipients,while retaining the original, validating signature, and thereby leveraging the reputation of the original signer.  This document discusses the resulting damage to email delivery, interoperability, and associated mail flows.  A significant challenge to mitigating this problem is that it is difficult for receivers to differentiate between legitimate forwarding flows and a DKIM Replay Attack.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <dl>
        <dt>DomainKeys Identified Mail (DKIM):</dt>
        <dd>
          <t>Defined in <xref target="RFC6376"/> is a well-established email protocol.</t>
        </dd>
        <dt/>
        <dd>
          <t>DKIM permits a person, role, or organization to claim some responsibility for a message by associating a domain name <xref target="RFC1034"/> with the message <xref target="RFC5322"/>, which they are authorized to use.  This can be an author's organization, an operational relay, or one of their agents.  Assertion of responsibility is validated through a cryptographic signature and by querying the Signer's domain directly to retrieve the appropriate public key.</t>
        </dd>
        <dt/>
        <dd>
          <t>DKIM authentication allows domains to create a durable identity to attach to email. Since its initial proposal it has been widely deployed by systems sending and receiving email. Receiving services use the DKIM identity as part of their inbound mail handling, and make delivery decisions based on the DKIM domain. Email sending services sign customer email with the customer’s own domain, but many also sign with their own domain.</t>
        </dd>
      </dl>
      <section anchor="the-problem">
        <name>The problem</name>
        <t>The presence of a DKIM signature serves as a basis for developing an assessment of mail received, over time, using that signature.  That assessment constitutes a reputation, which then serves to guide future handling of mail arriving with a DKIM signature for that domain name.  The presence of a validated DKIM signature was designed to ensure that the developed reputation is the result of activity only by the domain owner, and not by other, independent parties.  That is, it defines a 'clean' channel of behavior by the domain owner, with no 'noise' introduced by other actors.</t>
        <t>A receiving filtering system contains a rich array of rules and heuristics for assessing email, for protecting users against spam, phishing, and other abuses.  DKIM therefore provides an identity that some systems can use for reputation assessment and prediction of future sender behavior.</t>
        <t>During development of the DKIM specification, DKIM Replay was identified as only of hypothetical concern.  However, that attack has become commonplace, particularly for systems:</t>
        <ul spacing="normal">
          <li>Attackers create, obtain access, or compromise an account at some Originator that signs messages with DKIM</li>
          <li>Attackers locate a Receiver that consumes DKIM to make a delivery decision.  If the Receiver uses a reputation system with DKIM for delivery decisions, the attacker finds an Originator with a high reputation.</li>
          <li>They send an email from that account to an external account also under their control.</li>
          <li>This single message is delivered to the attacker's mailbox, giving them an email with a valid DKIM signature, for a domain with high reputation.</li>
          <li>They then post the message to a new and large set of additional recipients at the Receiver.</li>
        </ul>
        <t>Internet Mail permits sending a message to addresses that are not listed in the content To:, Cc: or Bcc: header fields.  Although DKIM covers portions of the message content, and can cover these header fields, it does not cover the envelope addresses, used by the email transport service, for determining handling behaviors.  So this message can then be replayed to arbitrary thousands or millions of other recipients, none of whom were specified by the original author.</t>
        <t>That is, DKIM Replay takes a message with a valid DKIM signature, and distributes it widely to many additional recipients, without breaking the signature.</t>
        <ul spacing="normal">
          <li>Further, a message used in a Replay Attack has the same attributes as some types of legitimate mail.  That is, an individual, replayed message has no observable differences from a legitimate message.</li>
        </ul>
        <t>Therefore, DKIM Replay is impossible to detect or prevent with current standards and practices.  Simply put, email authentication does not distinguish benign re-posting flows from a DKIM Replay Attack.</t>
        <t>ARC <xref target="RFC8617"/> is a protocol to securely propagate authentication results seen by Mediators that re-post a message, such as mailing lists.  Because ARC is heavily based on DKIM it has the same "replay" issue as described in section 9.5.</t>
      </section>
      <section anchor="glossary">
        <name>Glossary</name>
        <t>Modern email operation often involves many actors and many different actions.  This section attempts to identify those relevant to Replay Attacks.</t>
        <dl>
          <dt>NOTE:</dt>
          <dd>
            <t>This document is only Informative and omits the normative language defined in <xref target="RFC2119"/>.  Mail architectural terminology that is used here is from <xref target="RFC5598"/> and <xref target="RFC5321"/>.</t>
          </dd>
        </dl>
        <t><xref target="RFC5598"/> defines mail interactions conceptually from three perspectives of activities, divided into three types of roles:</t>
        <dl>
          <dt>Users:</dt>
          <dd>
            <t>This includes end-users, but also Mediators that re-post a message after delivery</t>
          </dd>
          <dt>Services (Message Handling Service - MHS):</dt>
          <dd>
            <t>Moving a message from a single submission to its related delivery</t>
          </dd>
          <dt>Administrative (ADministrative Management Domain - ADMD):</dt>
          <dd>
            <t>Covering independent operational scope, where functions of authorship, handling, and receiving can take place in any number of different ADMDs</t>
          </dd>
        </dl>
        <t>Also, as noted in <xref target="RFC5598"/>, a given implementation might perform multiple roles.</t>
        <t>It is useful to broadly identify participants in mail handling by functionality as defined in <xref target="RFC5598"/> as:</t>
        <ul spacing="normal">
          <li>Mail Submission Agent (MSA)</li>
          <li>Mail Transmission Agent (MTA)</li>
          <li>Mail Delivery Agent (MDA)</li>
        </ul>
        <t>In addition, a user interacts with the handling service via a:</t>
        <ul spacing="normal">
          <li>Mail User Agent (MUA).</li>
        </ul>
        <t>The following is a subset of the Mail Handling Services defined in <xref target="RFC5598"/> to be used in this document.   The are summarized here for convenience:</t>
        <dl>
          <dt>Originator:</dt>
          <dd>
            <t>defined in Section 2.2.1.  This is the first component of the MHS and works on behalf of the author to ensure the message is valid for transport; it then posts it to the relay (MTA) that provides SMTP store-and-forward transfer.  The Originator can DKIM sign the message on behalf of the author, although it is also possible that the author's system, or even the first MTA, does DKIM signing.</t>
          </dd>
          <dt>Alias:</dt>
          <dd>
            <t>defined in Section 5.1.  A type of Mediator user, operating in between a delivery and a following posting.  The Alias replaces the original RCPT TO envelope recipient address but does not alter the content address field header fields.  Often used for Auto-Forwarding.</t>
          </dd>
          <dt>ReSender:</dt>
          <dd>
            <t>as defined in Section 5.2, is a type of Mediator user, like an Alias; however the ReSender updates the recipient address, and "splices" the destination header field and possibly other address fields as well.</t>
          </dd>
          <dt>Mailing Lists:</dt>
          <dd>
            <t>defined in Section 5.3 is another Mediator; it receives a message and reposts it to the list's members; it might add list-specific header fields <xref target="RFC4021"/> e.g. List-XYZ: might modify other contents, such as revising the Subject: field, or adding content to the body.</t>
          </dd>
          <dt>Receiver:</dt>
          <dd>
            <t>defined in Section 2.2.4 is the last stop in the MHS, and works on behalf of the recipient to deliver the message to their inbox; it also might perform filtering.</t>
          </dd>
        </dl>
        <t>Any of these actors, as well as those below, can add trace and operational header fields.</t>
        <t>Modern email often includes additional services.  Three that are relevant to DKIM Replay are:</t>
        <dl>
          <dt>Email Service Provider (ESP):</dt>
          <dd>
            <t>Often called a Bulk Sender - An originating third-party service, acting as an agent of the author and sending to a list of recipients.  They may DKIM sign as themselves and/or sign with the author's domain name.</t>
          </dd>
          <dt>Outbound Filtering Service:</dt>
          <dd>
            <t>Rather than sending directly to recipients' servers, the Originator can route mail through a Filtering Service, to provide spam or data loss protection services.  This service may modify the message and can have a different ADMD from the Originator.</t>
          </dd>
          <dt>Inbound Filtering Service:</dt>
          <dd>
            <t>The Receiver can also route mail through a Filtering Service, to provide spam, malware and other anti-abuse protection services.  Typically, this is done by listing the service in an DNS MX record.  This service may modify the message and have a different ADMD from the Receiver.</t>
          </dd>
        </dl>
        <t>The above services can use email authentication as defined in the following specifications:</t>
        <dl>
          <dt>DomainKeys Identified Mail (DKIM):</dt>
          <dd>
            <t>Defined in <xref target="RFC6376"/>, with a cryptographic signature that typically survives basic relaying but can be broken when processed by a Mediator.  Further, DKIM Replay is defined in RFC6376 section 8.6.</t>
          </dd>
          <dt>Sender Policy Framework (SPF):</dt>
          <dd>
            <t>Defined in <xref target="RFC7208"/>, is another form of message handling authentication that works in parallel to DKIM and might be relevant to the detection of a DKIM Replay Attack.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="mail-flow-scenarios">
      <name>Mail Flow Scenarios</name>
      <t>The following section categorizes the different mail flows by a functional description, email authentication and recipient email header fields.</t>
      <section anchor="basic-types-of-flows">
        <name>Basic types of flows</name>
        <dl>
          <dt>Direct delivery:</dt>
          <dd>
            <t>In this case, email travels directly from the author's ADMD or the ADMD of their agent -- to the recipient's ADMD or their agent.  That is, for origination and reception, any interesting creation or modification is done by agreement with either the author or the recipient.  As such, these cases should have authentication that succeeds.</t>
          </dd>
          <dt/>
          <dd>
            <t>In this type of flow, SPF is expected to validate.</t>
          </dd>
          <dt/>
          <dd>
            <t>A DKIM Replay Attack uses a single message, sent through Direct delivery, and repurposes it.</t>
          </dd>
          <dt>Indirect Delivery:</dt>
          <dd>
            <t>This is mail involving a Mediator, producing a sequence of submission/delivery segments.  While not required, the Mediator is typically viewed as being in an ADMD that is independent of the author's ADMD and independent of the recipient's ADMD.</t>
          </dd>
        </dl>
      </section>
      <section anchor="direct-examples">
        <name>Direct examples</name>
        <dl>
          <dt>ESP:</dt>
          <dd>
            <t>An ESP is authorized to act on behalf of the author and will originate messages given a message body and a list of recipients, sending a different message to each recipient.  Content address fields are typically restricted to just the address of that copy's recipient.  The mail that is sent is typically 'direct', but the ESP cannot control whether an address refers to an alias or mailing list, or the like.  So, the message might become indirect, before reaching the final recipient.</t>
          </dd>
          <dt/>
          <dd>
            <t>The bulk nature of ESP activity means that it can look the same as DKIM Replay traffic.</t>
          </dd>
          <dt>Outbound filtering:</dt>
          <dd>
            <t>If the Author's domain has an SPF record that does not list this filtering service, SPF validation for the author's domain will fail.  However, the ESP might produce an SPF record of their own and use their own SMTP MAIL FROM (return) address.</t>
          </dd>
          <dt>Inbound filtering:</dt>
          <dd>
            <t>Typically, an inbound filtering service will add the results of its analysis to the message.  It might make other modifications to the message.</t>
          </dd>
        </dl>
      </section>
      <section anchor="indirect-examples">
        <name>Indirect Examples</name>
        <t>Indirect mail flows break SPF validation, unless the Mediator is listed in the SPF record.  This is almost never the case.</t>
        <dl>
          <dt>Mailing List:</dt>
          <dd>
            <t>The modifications done by a mailing list especially to the Subject: header field and the body of the message - nearly always break any existing DKIM signatures.</t>
          </dd>
          <dt>Alias (e.g., Auto-forwarder):</dt>
          <dd>
            <t>Typically, the envelope return (MAIL FROM) address is replaced, to be something related to the forwarder.  A resender might add trace header fields, but typically does not modify the recipients or the message body.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="dkim-replay">
      <name>DKIM Replay</name>
      <section anchor="scenario">
        <name>Scenario</name>
        <t>A spammer will find a mailbox provider with a high reputation and that signs their message with DKIM.  The spammer sends a message with spam content from there to a mailbox the spammer controls.  This received message is sometimes updated with additional header fields such as To: and Subject: that do not damage the existing DKIM signature, if those fields were not covered by the DKIM signature.  The resulting message is then sent at scale to target recipients.  Because the message signature is for a domain name with a high reputation, the message with spam content is more likely to get through to the inbox.  This is an example of a spam classification false negative incorrectly assessing spam to not be spam.</t>
        <t>When large amounts of such spam are sent to a single mailbox provider -- or through a filtering service with access to data across multiple mailbox providers -- the operator's filtering engine will eventually react by dropping the reputation of the original DKIM signer.  Benign mail from the signer's domain then starts to go to the spam folder.  For the benign mail, this is an example of a spam classification false positive.</t>
        <t>In both cases, mail that is potentially wanted by the recipient becomes much harder to find, reducing its utility to the recipient (and the author.)  In the first case, the wanted mail is mixed with potentially large quantities of spam.  In the second case, the wanted mail is put in the spam folder.</t>
      </section>
      <section anchor="direct-flows">
        <name>Direct Flows</name>
        <t>Legitimate mail might have a valid DKIM signature and no associated SPF record.</t>
        <t>So might a Replay attack.</t>
      </section>
      <section anchor="indirect-flows">
        <name>Indirect Flows</name>
        <t>Example benign indirect flows are outbound and inbound gateway, mailing lists, and forwarders.  This legitimate mail might have a valid DKIM signature, and SPF validation that is not aligned with the content From:</t>
        <t>So might a Replay attack.</t>
      </section>
    </section>
    <section anchor="replay-technical-characteristics">
      <name>Replay technical characteristics</name>
      <t>A message that has been replayed will typically show these characteristics:</t>
      <ul spacing="normal">
        <li>Original DKIM signature still validates</li>
        <li>Content covered by that signature is unchanged</li>
        <li>Received: header fields might be different from the original, or at least have ones that are added</li>
        <li>SMTP Envelope RCTP-TO address will be different</li>
        <li>SMTP MAIL-FROM might be different</li>
        <li>Replayed mail will typically be sent in very large volume</li>
        <li>The original SPF will typically not validate; however if the MAIL-FROM has been changed to an address controlled by the spammer, SPF might validate.</li>
      </ul>
    </section>
    <section anchor="basic-solution-space">
      <name>Basic solution space</name>
      <t>As can be seen from the above discussion, there is no straightforward way to detect DKIM Replay for an individual message, and possibly nothing completely reliable even in the aggregate.  The challenge, then, is to look for passive analysis that might provide a good heuristic, as well as active measures by the author's system to add protections.</t>
      <t>Here are some potential solutions to the problem, and their pros and cons:</t>
      <section anchor="include-the-smtp-rcpt-to-address-in-the-dkim-signature">
        <name>Include the SMTP RCPT-TO address in the DKIM signature</name>
        <t>Since this information is different in the Replay, than it was in the original sending, locking it into the signature will make validation fail, if the value has been changed.</t>
        <ul spacing="normal">
          <li>This avoids Replay to destination addresses not anticipated by the DKIM signer.</li>
          <li>Indirect flows will fail, since forwarding involves rewriting the ENVELOPE-TO; however they already typically fail.</li>
          <li>This will detect DKIM Replays, but not distinguish them from all other forwarding.</li>
          <li>If a message has more than one addressee, should the signature cover all of them, or does this require sending one message per  addressee?  If it covers all of them, note that they might be on different systems, so that upon arrival, the RCPT-TO list  will not include all of the original addresses</li>
        </ul>
      </section>
      <section anchor="count-known-dkim-signatures">
        <name>Count known DKIM signatures</name>
        <t>This technique caches known DKIM signatures and counts them.  Those above a certain threshold is considered DKIM replay.</t>
        <ul spacing="normal">
          <li>Since the same signature is being replayed many times, this might allow a receiving site with many mailboxes to detect whether a message is part of a DKIM Replay set, and to then suppress it.</li>
          <li>Mailing list traffic, aliases, and the like might also show up as duplicates.  So this is only an heuristic, and might produce false positives.</li>
          <li>Caches have storage overhead, and uncertain TTLs.</li>
        </ul>
      </section>
      <section anchor="strip-dkim-signatures-on-mailbox-delivery">
        <name>Strip DKIM signatures on mailbox delivery</name>
        <ul spacing="normal">
          <li>Messages delivered to a mailbox lacking DKIM signatures can no longer be replayed.</li>
          <li>Has no effect when the receiving platform is collaborating with the bad actor, as the attacker would just avoid stripping the header fields.</li>
        </ul>
      </section>
      <section anchor="shorten-dkim-signature-key-or-signature-lifetime">
        <name>Shorten DKIM signature key or signature lifetime</name>
        <ul spacing="normal">
          <li>If the key is no longer available through the DNS, the signature will no longer validate</li>
          <li>Alternatively express a validity period after which the signature is no longer valid</li>
          <li>Unfortunately, bad actors are quite good at taking action very quickly, and there is a limit to how much the window can be shortened, if the key is to have any utility for legitimate mail.</li>
        </ul>
      </section>
      <section anchor="add-per-hop-signature-specifying-the-destination-domain">
        <name>Add Per-hop signature, specifying the destination domain</name>
        <t>Distinguish each forwarding hop by its own signature which permits each forwarding hop to specify the intended next destination ADMD.  That intent can be verified to detect DKIM replay at the Receiver when the intended ADMD mismatches the current one.</t>
        <ul spacing="normal">
          <li>Messages with this kind of signature cannot be replayed down a different pathway, since the destination won't match.</li>
          <li>Requires every site along the path to support this spec, and to detect whether the next stop is making a commitment to follow the spec.</li>
          <li>If email goes to a site that does not support this behavior, traversing a naive forwarder remains indistinguishable from Replay.</li>
          <li>The time needed to change a global infrastructure such as email, to fully support a capability like this in every MTA is essentially infinite; therefore use of this approach must be narrowly tailored to scenarios that will adopt it and garner substantial benefit from it.</li>
        </ul>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This problem statement document has no security considerations.  (Subsequent documents defining changes to DKIM will very likely introduce new security considerations)</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>Informative References</name>
      <reference anchor="RFC6376">
        <front>
          <title>DomainKeys Identified Mail (DKIM) Signatures</title>
          <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker">
            <organization/>
          </author>
          <author fullname="T. Hansen" initials="T." role="editor" surname="Hansen">
            <organization/>
          </author>
          <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy">
            <organization/>
          </author>
          <date month="September" year="2011"/>
          <abstract>
            <t>DomainKeys Identified Mail (DKIM) permits a person, role, or organization that owns the signing domain to claim some responsibility for a message by associating the domain with the message.  This can be an author's organization, an operational relay, or one of their agents.  DKIM separates the question of the identity of the Signer of the message from the purported author of the message.  Assertion of responsibility is validated through a cryptographic signature and by querying the Signer's domain directly to retrieve the appropriate public key.  Message transit from author to recipient is through relays that typically make no substantive change to the message content and thus preserve the DKIM signature.</t>
            <t>This memo obsoletes RFC 4871 and RFC 5672.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="76"/>
        <seriesInfo name="RFC" value="6376"/>
        <seriesInfo name="DOI" value="10.17487/RFC6376"/>
      </reference>
      <reference anchor="RFC1034">
        <front>
          <title>Domain names - concepts and facilities</title>
          <author fullname="P. Mockapetris" initials="P." surname="Mockapetris">
            <organization/>
          </author>
          <date month="November" year="1987"/>
          <abstract>
            <t>This RFC is the revised basic definition of The Domain Name System.  It obsoletes RFC-882.  This memo describes the domain style names and their used for host address look up and electronic mail forwarding.  It discusses the clients and servers in the domain name system and the protocol used between them.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="13"/>
        <seriesInfo name="RFC" value="1034"/>
        <seriesInfo name="DOI" value="10.17487/RFC1034"/>
      </reference>
      <reference anchor="RFC5322">
        <front>
          <title>Internet Message Format</title>
          <author fullname="P. Resnick" initials="P." role="editor" surname="Resnick">
            <organization/>
          </author>
          <date month="October" year="2008"/>
          <abstract>
            <t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of "electronic mail" messages.  This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, "Standard for the Format of ARPA Internet Text Messages", updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5322"/>
        <seriesInfo name="DOI" value="10.17487/RFC5322"/>
      </reference>
      <reference anchor="RFC8617">
        <front>
          <title>The Authenticated Received Chain (ARC) Protocol</title>
          <author fullname="K. Andersen" initials="K." surname="Andersen">
            <organization/>
          </author>
          <author fullname="B. Long" initials="B." role="editor" surname="Long">
            <organization/>
          </author>
          <author fullname="S. Blank" initials="S." role="editor" surname="Blank">
            <organization/>
          </author>
          <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy">
            <organization/>
          </author>
          <date month="July" year="2019"/>
          <abstract>
            <t>The Authenticated Received Chain (ARC) protocol provides an authenticated "chain of custody" for a message, allowing each entity that handles the message to see what entities handled it before and what the message's authentication assessment was at each step in the handling.</t>
            <t>ARC allows Internet Mail Handlers to attach assertions of message authentication assessment to individual messages.  As messages traverse ARC-enabled Internet Mail Handlers, additional ARC assertions can be attached to messages to form ordered sets of ARC assertions that represent the authentication assessment at each step of the message-handling paths.</t>
            <t>ARC-enabled Internet Mail Handlers can process sets of ARC assertions to inform message disposition decisions, identify Internet Mail Handlers that might break existing authentication mechanisms, and convey original authentication assessments across trust boundaries.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8617"/>
        <seriesInfo name="DOI" value="10.17487/RFC8617"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner">
            <organization/>
          </author>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC5598">
        <front>
          <title>Internet Mail Architecture</title>
          <author fullname="D. Crocker" initials="D." surname="Crocker">
            <organization/>
          </author>
          <date month="July" year="2009"/>
          <abstract>
            <t>Over its thirty-five-year history, Internet Mail has changed significantly in scale and complexity, as it has become a global infrastructure service.  These changes have been evolutionary, rather than revolutionary, reflecting a strong desire to preserve both its installed base and its usefulness.  To collaborate productively on this large and complex system, all participants need to work from a common view of it and use a common language to describe its components and the interactions among them.  But the many differences in perspective currently make it difficult to know exactly what another participant means.  To serve as the necessary common frame of reference, this document describes the enhanced Internet Mail architecture, reflecting the current service.  This memo provides  information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5598"/>
        <seriesInfo name="DOI" value="10.17487/RFC5598"/>
      </reference>
      <reference anchor="RFC5321">
        <front>
          <title>Simple Mail Transfer Protocol</title>
          <author fullname="J. Klensin" initials="J." surname="Klensin">
            <organization/>
          </author>
          <date month="October" year="2008"/>
          <abstract>
            <t>This document is a specification of the basic protocol for Internet electronic mail transport.  It consolidates, updates, and clarifies several previous documents, making all or parts of most of them obsolete.  It covers the SMTP extension mechanisms and best practices for the contemporary Internet, but does not provide details about particular extensions.  Although SMTP was designed as a mail transport and delivery protocol, this specification also contains information that is important to its use as a "mail submission" protocol for "split-UA" (User Agent) mail reading systems and mobile environments.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5321"/>
        <seriesInfo name="DOI" value="10.17487/RFC5321"/>
      </reference>
      <reference anchor="RFC4021">
        <front>
          <title>Registration of Mail and MIME Header Fields</title>
          <author fullname="G. Klyne" initials="G." surname="Klyne">
            <organization/>
          </author>
          <author fullname="J. Palme" initials="J." surname="Palme">
            <organization/>
          </author>
          <date month="March" year="2005"/>
          <abstract>
            <t>This document defines the initial IANA registration for permanent mail and MIME message header fields, per RFC 3864.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4021"/>
        <seriesInfo name="DOI" value="10.17487/RFC4021"/>
      </reference>
      <reference anchor="RFC7208">
        <front>
          <title>Sender Policy Framework (SPF) for Authorizing Use of Domains in Email, Version 1</title>
          <author fullname="S. Kitterman" initials="S." surname="Kitterman">
            <organization/>
          </author>
          <date month="April" year="2014"/>
          <abstract>
            <t>Email on the Internet can be forged in a number of ways.  In particular, existing protocols place no restriction on what a sending host can use as the "MAIL FROM" of a message or the domain given on the SMTP HELO/EHLO commands.  This document describes version 1 of the Sender Policy Framework (SPF) protocol, whereby ADministrative Management Domains (ADMDs) can explicitly authorize the hosts that are allowed to use their domain names, and a receiving host can check such authorization.</t>
            <t>This document obsoletes RFC 4408.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7208"/>
        <seriesInfo name="DOI" value="10.17487/RFC7208"/>
      </reference>
    </references>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks goes to Emanuel Schorsch, Evan Burke, Laura Atkins and Murray Kucherawy for their advice.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
