<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-chuang-dkim2-dns-02" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.29.0 -->
  <front>
    <title abbrev="DKIM2 DNS">Domain Name Specification for DKIM2</title>
    <seriesInfo name="Internet-Draft" value="draft-chuang-dkim2-dns-02"/>
    <author initials="W." surname="Chuang" fullname="Wei Chuang">
      <organization>Google</organization>
      <address>
        <email>weihaw@google.com</email>
      </address>
    </author>
    <date year="2025" month="July" day="07"/>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 32?>

<t>The updated DomainKeys Identified Mail (DKIM2) permits an organization
that owns the signing domain to claim some responsibility for a
message by associating the domain with the message through a digital
signature. This is done by publishing to Domain Name Service (DNS) of
the domain a public key that is then associated to the domain and
where messages can be signed by the corresponding private key.
Assertion of responsibility is validated through a cryptographic
signature and by querying the Signer’s domain directly to retrieve the
appropriate public key.  This document describes DKIM2 DNS record format
and how to find the record.</t>
    </abstract>
  </front>
  <middle>
    <?line 45?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The updated DomainKeys Identified Mail (DKIM2) permits an organization
that owns the signing domain to claim some responsibility for a
message <xref target="RFC5322"/> by associating the domain with the message through a
digital signature.  This is done by publishing to Domain Name Service
(DNS) of the domain a public key that is then associated to the domain
<xref target="RFC1034"/> and where messages can be signed by the corresponding
private key.  Assertion of responsibility is validated through a
cryptographic signature and by querying the Signer’s domain directly
to retrieve the appropriate public key.</t>
      <t>This document describes DKIM2 DNS record format and how to find the
record.  The updated DomainKeys Identified Mail (DKIM2) adopts a
subset of the DKIM <xref target="RFC6376"/> DNS specification, but to prevent
ambiguity from using the using normative references to RFC6376, this
document copies over the RFC6376 and updates as necessary.  However,
this document still does normatively reference RFC6376 for the IANA
registrations. This document and the other DKIM2 documents do not
deprecate RFC6376 as it is expected that both DKIM and DKIM2 will
co-exist for at least some period of time.</t>
      <t>INFORMATIVE NOTE: another reason for separating the DKIM2 DNS
specification from DKIM, is that in the future, it is likely that
DKIM2 will diverge from the parent specification.</t>
      <t>There are other updated DomainKeys Identified Mail (DKIM2) documents
as well: the first document describes the motivation; the second
document describes the headers.</t>
    </section>
    <section anchor="terminology-and-definitions">
      <name>Terminology and Definitions</name>
      <t>This section defines terms used in the rest of the document.
DKIM2 is designed to operate within the Internet Mail service, as
defined in <xref target="RFC5598"/>. Basic email terminology is taken from that
specification.</t>
      <t>Syntax descriptions use Augmented BNF (ABNF) <xref target="RFC5234"/>.
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in
<xref target="RFC2119"/>. These words take their normative meanings only when they
are presented in ALL UPPERCASE.</t>
      <section anchor="signers">
        <name>Signers</name>
        <t>Elements in the mail system that sign messages on behalf of a domain
are referred to as Signers. These may be MUAs (Mail User Agents),
MSAs (Mail Submission Agents), MTAs (Mail Transfer Agents), or other
agents such as mailing list exploders. In general, any Signer will
be involved in the injection of a message into the message system in
some way. The key issue is that a message must be signed before it
leaves the administrative domain of the Signer.</t>
      </section>
      <section anchor="verifiers">
        <name>Verifiers</name>
        <t>Elements in the mail system that verify signatures are referred to as
Verifiers. These may be MTAs, Mail Delivery Agents (MDAs), or MUAs.
In most cases, it is expected that Verifiers will be close to an end
user (reader) of the message or some consuming agent such as a
mailing list exploder.</t>
      </section>
      <section anchor="identity">
        <name>Identity</name>
        <t>This specification DKIM2 calls for the Identity to correspond to an
organization while DKIM permitted person, or role as well. In the
context of email architecture specification <xref target="RFC5598"/>, this
corresponds to an ADministrative Management Domain (ADMD).  Some
examples include the the author’s organization, an ISP along the
handling path, an independent trust assessment service, and a mailing
list operator.</t>
      </section>
      <section anchor="identifier">
        <name>Identifier</name>
        <t>A label that refers to an identity.</t>
      </section>
      <section anchor="signing-domain-identifier-sdid">
        <name>Signing Domain Identifier (SDID)</name>
        <t>A single domain name that is the mandatory payload output of DKIM and
that refers to the identity claiming some responsibility</t>
      </section>
      <section anchor="identity-assessor">
        <name>Identity Assessor</name>
        <t>An element in the mail system that consumes DKIM2’s payload, which is
the responsible Signing Domain Identifier (SDID). The Identity
Assessor is dedicated to the assessment of the delivered identifier.
Other DKIM2 (and non-DKIM2) values can also be used by the Identity
Assessor (if they are available) to provide a more general message
evaluation filtering engine. However, this additional activity is
outside the scope of this specification.</t>
      </section>
      <section anchor="whitespace">
        <name>Whitespace</name>
        <t>There are three forms of whitespace:</t>
        <ul spacing="normal">
          <li>
            <t>WSP represents simple whitespace, i.e., a space or a tab character (formal definition in <xref target="RFC5234"/>)</t>
          </li>
          <li>
            <t>LWSP is linear whitespace, defined as WSP plus CRLF (formal definition in <xref target="RFC5234"/>).</t>
          </li>
          <li>
            <t>FWS is folding whitespace. It allows multiple lines separated by CRLF followed by at least one whitespace, to be joined.</t>
          </li>
        </ul>
        <t>The formal ABNF for these are (WSP and LWSP are given for information  only):</t>
        <artwork><![CDATA[
WSP = SP / HTAB
LWSP = *(WSP / CRLF WSP)
FWS = [*WSP CRLF] 1*WSP
]]></artwork>
        <t>The definition of FWS is identical to that in <xref target="RFC5322"/> except for the exclusion of obs-FWS.</t>
      </section>
      <section anchor="imported-abnf-tokens">
        <name>Imported ABNF Tokens</name>
        <t>The following tokens are imported from other RFCs as noted. Those RFCs should be connsidered definitive.</t>
        <t>The following tokens are imported from <xref target="RFC2045"/>:</t>
        <ul spacing="normal">
          <li>
            <t>"qp-section" (a single line of quoted-printable-encoded text)</t>
          </li>
        </ul>
        <t>Tokens not defined herein are imported from <xref target="RFC5234"/>. These are intuitive primitives such as SP, HTAB, WSP, ALPHA, DIGIT, CRLF, etc.</t>
      </section>
      <section anchor="common-abnf-tokens">
        <name>Common ABNF Tokens</name>
        <t>The following ABNF tokens are used elsewhere in this document:</t>
        <artwork><![CDATA[
hyphenated-word = ALPHA [ *(ALPHA / DIGIT / "-") (ALPHA / DIGIT) ]
ALPHADIGITPS = (ALPHA / DIGIT / "+" / "/")
base64string = ALPHADIGITPS *([FWS] ALPHADIGITPS)
[ [FWS] "=" [ [FWS] "=" ] ]
]]></artwork>
      </section>
    </section>
    <section anchor="protocol-elements">
      <name>Protocol Elements</name>
      <t>Protocol Elements are conceptual parts of the protocol that are not
specific to either Signers or Verifiers. The protocol descriptions
for Signers and Verifiers will be described in a separate document. NOTE: This
section must be read in the context of those elements.</t>
      <section anchor="selectors">
        <name>Selectors</name>
        <t>To support multiple concurrent public keys per signing domain, the
key namespace is subdivided using "selectors". For example,
selectors might indicate the names of office locations (e.g.,
"sanfrancisco", "coolumbeach", and "reykjavik"), the signing date
(e.g., "january2005", "february2005", etc.), or even an individual
user.</t>
        <t>Selectors are needed to support some important use cases. For
example:</t>
        <ul spacing="normal">
          <li>
            <t>Domains that want to delegate signing capability for a specific address for a given duration to a partner, such as an advertising provider or other outsourced function.</t>
          </li>
          <li>
            <t>Domains that want to allow frequent travelers to send messages locally without the need to connect with a particular MSA.</t>
          </li>
          <li>
            <t>"Affinity" domains (e.g., college alumni associations) that provide forwarding of incoming mail, but that do not operate a mail submission agent for outgoing mail.</t>
          </li>
        </ul>
        <t>Periods are allowed in selectors and are component separators. When
keys are retrieved from the DNS, periods in selectors define DNS label
boundaries in a manner similar to the conventional use in domain
names. Selector components might be used to combine dates with
locations, for example, "march2005.reykjavik". In a DNS
implementation, this can be used to allow delegation of a portion of
he selector namespace.</t>
        <artwork><![CDATA[
ABNF:
selector = sub-domain *( "." sub-domain )
]]></artwork>
        <t>The number of public keys and corresponding selectors for each domain
is determined by the domain owner. Many domain owners will be
satisfied with just one selector, whereas administratively
distributed organizations can choose to manage disparate selectors
and key pairs in different regions or on different email servers.</t>
        <t>Beyond administrative convenience, selectors make it possible to
seamlessly replace public keys on a routine basis. If a domain
wishes to change from using a public key associated with selector
"january2005" to a public key associated with selector
"february2005", it merely makes sure that both public keys are
advertised in the public-key repository concurrently for the
transition period during which email may be in transit prior to
verification. At the start of the transition period, the outbound
email servers are configured to sign with the "february2005" private
key. At the end of the transition period, the "january2005" public
key is removed from the public-key repository.</t>
        <t>INFORMATIVE NOTE: A key may also be revoked as described below.
The distinction between revoking and removing a key selector
record is subtle. When phasing out keys as described above, a
signing domain would probably simply remove the key record after
the transition period. However, a signing domain could elect to
revoke the key (but maintain the key record) for a further period.
There is no defined semantic difference between a revoked key and
a removed key.</t>
        <t>While some domains may wish to make selector values well-known,
others will want to take care not to allocate selector names in a way
that allows harvesting of data by outside parties.</t>
        <t>INFORMATIVE OPERATIONS NOTE: Reusing a selector with a new key
(for example, changing the key associated with a user’s name)
makes it impossible to tell the difference between a message that
didn’t verify because the key is no longer valid and a message
that is actually forged. For this reason, Signers are ill-advised
to reuse selectors for new keys. A better strategy is to assign
new keys to new selectors.</t>
      </section>
      <section anchor="tagvalue">
        <name>Tag=Value Lists</name>
        <t>DKIM2 uses a simple "tag=value" syntax in several contexts, including
in messages and domain signature records.
Values are a series of strings containing either plain text, "base64"
text (as defined in <xref target="RFC2045"/>, Section 6.8), or "qp-section" (ibid,
Section 6.7). The name of the tag will determine the encoding of
each value. Unencoded semicolon (";") characters MUST NOT occur in
the tag value, since that separates tag-specs.</t>
        <t>INFORMATIVE IMPLEMENTATION NOTE: Although the "plain text" defined
below (as "tag-value") only includes 7-bit characters, an
implementation that wished to anticipate future standards would be
advised not to preclude the use of UTF-8-encoded <xref target="RFC3629"/> text
in tag=value lists.</t>
        <t>Formally, the ABNF syntax rules are as follows:</t>
        <artwork><![CDATA[
tag-list = tag-spec *( ";" tag-spec ) [ ";" ]
tag-spec = [FWS] tag-name [FWS] "=" [FWS] tag-value [FWS]
tag-name = ALPHA *ALNUMPUNC
tag-value = [ tval *( 1*(WSP / FWS) tval ) ]
; Prohibits WSP and FWS at beginning and end
tval = 1*VALCHAR
VALCHAR = %x21-3A / %x3C-7E
; EXCLAMATION to TILDE except SEMICOLON
ALNUMPUNC = ALPHA / DIGIT / "_"
]]></artwork>
        <t>Note that WSP is allowed anywhere around tags. In particular, any
WSP after the "=" and any WSP before the terminating ";" is not part
of the value; however, WSP inside the value is signicant.</t>
        <t>MUST be interpreted in a case-sensitive manner. Values MUST be
processed as case sensitive unless the specific tag description of
semantics specifies case insensitivity.</t>
        <t>Tags with duplicate names MUST NOT occur within a single tag-list; if
a tag name does occur more than once, the entire tag-list is invalid.</t>
        <t>Whitespace within a value MUST be retained unless explicitly excluded
by the specific tag description.</t>
        <t>Tag=value pairs that represent the default value MAY be included to
aid legibility.</t>
        <t>Unrecognized tags MUST be ignored.</t>
        <t>Tags that have an empty value are not the same as omitted tags. An
omitted tag is treated as having the default value; a tag with an
empty value explicitly designates the empty string as the value.</t>
      </section>
      <section anchor="algorithm">
        <name>Signing and Verification Algorithms</name>
        <t>DKIM2 supports multiple digital signature algorithms.  Two algorithms
are referenced by this specification at this time: rsa-sha256 and
ed25519-sha256. rsa-sha256 is specified in <xref target="RFC6376"/> while
ed25519-sha256 is specified in <xref target="RFC8463"/>.  Signers and Verifiers MUST
implement rsa-sha256 and SHOULD implement ed25519-sha256.  Futher they
MUST NOT validate the legacy DKIM <xref target="RFC6376"/> rsa-sha1 algorithm
i.e. ignore the public key and signatures associated with it.</t>
        <t>INFORMATIVE NOTE: rsa-sha256 enjoys virtually universal deployment
while ed25519-sha256 has very little deployment at the creation of
this draft.  It does provide better capability in reduced key size,
and faster signing and verification speed.  Support for at least two
algorithms provides algorithmic diversity that provides defense
against some unforeseen future algorithm breakage.  Thus
implementation of ed25519-sha256 will be changed to MUST upon the
completion of the DKIM2 specification.  rsa-sha1 algorithm is
deprecated for DKIM2 as sha1 is demonstrateably broken.</t>
      </section>
      <section anchor="key-management-and-representation">
        <name>Key Management and Representation</name>
        <t>Signature applications require some level of assurance that the
verification public key is associated with the claimed Signer. Many
applications achieve this by using public-key certificates issued by
a trusted third party. However, DKIM2 can achieve a sufficient level
of security, with significantly enhanced scalability, by simply
having the Verifier query the purported Signer’s DNS entry (or some
security-equivalent) in order to retrieve the public key.
DKIM2 keys can potentially be stored in multiple types of key servers
and in multiple formats. The storage and format of keys are
irrelevant to the remainder of the DKIM2 algorithm.
Parameters to the key lookup algorithm are the type of the lookup
(the "q=" tag), the domain of the Signer (the "d=" tag of the DKIM2
signature header field), and the selector (the "s=" tag).</t>
        <artwork><![CDATA[
public_key = dkim2_find_key(q_val, d_val, s_val)
]]></artwork>
        <t>This document defines a single binding, using DNS TXT RRs to
distribute the keys. Other bindings may be defined in the future.</t>
        <section anchor="textualrepresentation">
          <name>Textual Representation</name>
          <t>It is expected that many key servers will choose to present the keys
in an otherwise unstructured text format (for example, an XML form
would not be considered to be unstructured text for this purpose).
The following definition MUST be used for any DKIM2 key represented in
an otherwise unstructured textual form.</t>
          <t>The overall syntax is a tag-list as described in <xref target="tagvalue"/>. The
current valid tags are described below. Other tags MAY be present
and MUST be ignored by any implementation that does not understand
them.</t>
          <dl>
            <dt>v=</dt>
            <dd>
              <t>Version of the DKIM key record (plain-text; RECOMMENDED,
default is "DKIM1"). If specified, this tag MUST be set to
"DKIM1" (without the quotes). This tag MUST be the first tag in
the record. Records beginning with a "v=" tag with any other
value MUST be discarded. Note that Verifiers must do a string
comparison on this value; for example, "DKIM1" is not the same
as "DKIM1.0".</t>
            </dd>
          </dl>
          <t>INFORMATIVE NOTE: DKIM2 reuses a subset of the DKIM textual
representation including this version number for compatibility
with existing key deployment.  Consequently DKIM2 does not
increment the version number.</t>
          <artwork><![CDATA[
ABNF:
key-v-tag = %x76 [FWS] "=" [FWS] %x44.4B.49.4D.31
]]></artwork>
          <dl>
            <dt>h=</dt>
            <dd>
              <t>Acceptable hash algorithms (plain-text; OPTIONAL, defaults to
allowing all algorithms). A colon-separated list of hash
algorithms that might be used. Unrecognized algorithms MUST be
ignored. Refer to <xref target="algorithm"/> for a discussion of the hash
algorithms implemented by Signers and Verifiers. The set of
algorithms listed in this tag in each record is an operational
choice made by the Signer.</t>
            </dd>
          </dl>
          <artwork><![CDATA[
ABNF:
key-h-tag = %x68 [FWS] "=" [FWS] key-h-tag-alg
*( [FWS] ":" [FWS] key-h-tag-alg )
key-h-tag-alg = "sha1" / "sha256" / x-key-h-tag-alg
x-key-h-tag-alg = hyphenated-word ; for future extension
]]></artwork>
          <dl>
            <dt>k=</dt>
            <dd>
              <t>Key type (plain-text; OPTIONAL, default is "rsa"). Signers and
Verifiers MUST support the "rsa" key type. The "rsa" key type
indicates that an ASN.1 DER-encoded [ITU-X660-1997] RSAPublicKey
(see <xref target="RFC8017"/>, Sections 3.1 and A.1.1) is being used in the "p="
tag. (Note: the "p=" tag further encodes the value using the
base64 algorithm.) Unrecognized key types MUST be ignored.</t>
            </dd>
          </dl>
          <artwork><![CDATA[
ABNF:
key-k-tag = %x76 [FWS] "=" [FWS] key-k-tag-type
key-k-tag-type = "rsa" / x-key-k-tag-type
x-key-k-tag-type = hyphenated-word ; for future extension
]]></artwork>
          <dl>
            <dt>n=</dt>
            <dd>
              <t>Notes that might be of interest to a human (qp-section; OPTIONAL,
default is empty). No interpretation is made by any program.
This tag should be used sparingly in any key server mechanism that
has space limitations (notably DNS). This is intended for use by
administrators, not end users.</t>
            </dd>
          </dl>
          <artwork><![CDATA[
ABNF:
key-n-tag = %x6e [FWS] "=" [FWS] qp-section
]]></artwork>
          <dl>
            <dt>p=</dt>
            <dd>
              <t>Public-key data (base64; REQUIRED). An empty value means that
this public key has been revoked. The syntax and semantics of
this tag value before being encoded in base64 are defined by the
"k=" tag.</t>
            </dd>
          </dl>
          <t>INFORMATIVE RATIONALE: If a private key has been compromised or
otherwise disabled (e.g., an outsourcing contract has been
terminated), a Signer might want to explicitly state that it
knows about the selector, but all messages using that selector</t>
          <artwork><![CDATA[
ABNF:
key-p-tag = %x70 [FWS] "=" [ [FWS] base64string]
]]></artwork>
          <t>INFORMATIVE NOTE: A base64string is permitted to include
whitespace (FWS) at arbitrary places; however, any CRLFs must
be followed by at least one WSP character. Implementers and
administrators are cautioned to ensure that selector TXT RRs
conform to this specification.</t>
          <dl>
            <dt>s=</dt>
            <dd>
              <t>Service Type (plain-text; OPTIONAL; default is "*"). A colon-
separated list of service types to which this record applies.
Verifiers for a given service type MUST ignore this record if the
appropriate type is not listed. Unrecognized service types MUST
be ignored. Currently defined service types are as follows:
</t>
              <dl>
                <dt>*</dt>
                <dd>
                  <t>matches all service types</t>
                </dd>
                <dt>email</dt>
                <dd>
                  <t>electronic mail (not necessarily limited to SMTP)</t>
                </dd>
              </dl>
              <t>This tag is intended to constrain the use of keys for other
purposes, should use of DKIM2 be defined by other services in the
future.</t>
            </dd>
          </dl>
          <artwork><![CDATA[
ABNF:
key-s-tag = %x73 [FWS] "=" [FWS] key-s-tag-type
*( [FWS] ":" [FWS] key-s-tag-type )
key-s-tag-type = "email" / "*" / x-key-s-tag-type
x-key-s-tag-type = hyphenated-word ; for future extension
]]></artwork>
          <dl>
            <dt>t=</dt>
            <dd>
              <t>Flags, represented as a colon-separated list of names (plain-
text; OPTIONAL, default is no flags set). Unrecognized flags MUST
be ignored. The defined flags are as follows:
</t>
              <dl>
                <dt>y</dt>
                <dd>
                  <t>This domain is testing DKIM2. Verifiers MUST NOT treat messages
from Signers in testing mode differently from unsigned email,
even should the signature fail to verify. Verifiers MAY wish
to track testing mode results to assist the Signer.</t>
                </dd>
                <dt>s</dt>
                <dd>
                  <t>Any DKIM2 signature header fields using the "i=" tag MUST have
the same domain value on the right-hand side of the "@" in the
"i=" tag and the value of the "d=" tag. That is, the "i="
domain MUST NOT be a subdomain of "d=". Use of this flag is</t>
                </dd>
              </dl>
              <t>RECOMMENDED unless subdomaining is required.</t>
            </dd>
          </dl>
          <artwork><![CDATA[
ABNF:
key-t-tag = %x74 [FWS] "=" [FWS] key-t-tag-flag
*( [FWS] ":" [FWS] key-t-tag-flag )
key-t-tag-flag = "y" / "s" / x-key-t-tag-flag
x-key-t-tag-flag = hyphenated-word ; for future extension
]]></artwork>
        </section>
        <section anchor="dns-binding">
          <name>DNS Binding</name>
          <t>A binding using DNS TXT RRs as a key service is hereby defined. All
implementations MUST support this binding.</t>
          <section anchor="namespace">
            <name>Namespace</name>
            <t>All DKIM2 keys are stored in a subdomain named "_domainkey". Given a
DKIM2 signature header field with a "d=" tag of "example.com" and an
"s=" tag of "foo.bar", the DNS query will be for
"foo.bar._domainkey.example.com".</t>
          </section>
          <section anchor="resource-record-types-for-key-storage">
            <name>Resource Record Types for Key Storage</name>
            <t>The DNS Resource Record type used is specified by an option to the
query-type ("q=") tag. The only option defined in this base
specification is "txt", indicating the use of a TXT RR. A later
extension of this standard may define another RR type.</t>
            <t>Strings in a TXT RR MUST be concatenated together before use with no
intervening whitespace. TXT RRs MUST be unique for a particular
selector name; that is, if there are multiple records in an RRset,
the results are undefined.</t>
            <t>TXT RRs are encoded as described in <xref target="textualrepresentation"/>.</t>
          </section>
        </section>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document reuses the IANA registrations in <xref target="RFC6376"/> in Section 7.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document recommends thorough review and adherence to the Security
Consideration in <xref target="RFC6376"/> in Section 8.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC1034">
        <front>
          <title>Domain names - concepts and facilities</title>
          <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
          <date month="November" year="1987"/>
          <abstract>
            <t>This RFC is the revised basic definition of The Domain Name System. It obsoletes RFC-882. This memo describes the domain style names and their used for host address look up and electronic mail forwarding. It discusses the clients and servers in the domain name system and the protocol used between them.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="13"/>
        <seriesInfo name="RFC" value="1034"/>
        <seriesInfo name="DOI" value="10.17487/RFC1034"/>
      </reference>
      <reference anchor="RFC2045">
        <front>
          <title>Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Message Bodies</title>
          <author fullname="N. Freed" initials="N." surname="Freed"/>
          <author fullname="N. Borenstein" initials="N." surname="Borenstein"/>
          <date month="November" year="1996"/>
          <abstract>
            <t>This initial document specifies the various headers used to describe the structure of MIME messages. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="2045"/>
        <seriesInfo name="DOI" value="10.17487/RFC2045"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC3629">
        <front>
          <title>UTF-8, a transformation format of ISO 10646</title>
          <author fullname="F. Yergeau" initials="F." surname="Yergeau"/>
          <date month="November" year="2003"/>
          <abstract>
            <t>ISO/IEC 10646-1 defines a large character set called the Universal Character Set (UCS) which encompasses most of the world's writing systems. The originally proposed encodings of the UCS, however, were not compatible with many current applications and protocols, and this has led to the development of UTF-8, the object of this memo. UTF-8 has the characteristic of preserving the full US-ASCII range, providing compatibility with file systems, parsers and other software that rely on US-ASCII values but are transparent to other values. This memo obsoletes and replaces RFC 2279.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="63"/>
        <seriesInfo name="RFC" value="3629"/>
        <seriesInfo name="DOI" value="10.17487/RFC3629"/>
      </reference>
      <reference anchor="RFC5234">
        <front>
          <title>Augmented BNF for Syntax Specifications: ABNF</title>
          <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker"/>
          <author fullname="P. Overell" initials="P." surname="Overell"/>
          <date month="January" year="2008"/>
          <abstract>
            <t>Internet technical specifications often need to define a formal syntax. Over the years, a modified version of Backus-Naur Form (BNF), called Augmented BNF (ABNF), has been popular among many Internet specifications. The current specification documents ABNF. It balances compactness and simplicity with reasonable representational power. The differences between standard BNF and ABNF involve naming rules, repetition, alternatives, order-independence, and value ranges. This specification also supplies additional rule definitions and encoding for a core lexical analyzer of the type common to several Internet specifications. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="68"/>
        <seriesInfo name="RFC" value="5234"/>
        <seriesInfo name="DOI" value="10.17487/RFC5234"/>
      </reference>
      <reference anchor="RFC5322">
        <front>
          <title>Internet Message Format</title>
          <author fullname="P. Resnick" initials="P." role="editor" surname="Resnick"/>
          <date month="October" year="2008"/>
          <abstract>
            <t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of "electronic mail" messages. This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, "Standard for the Format of ARPA Internet Text Messages", updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5322"/>
        <seriesInfo name="DOI" value="10.17487/RFC5322"/>
      </reference>
      <reference anchor="RFC5598">
        <front>
          <title>Internet Mail Architecture</title>
          <author fullname="D. Crocker" initials="D." surname="Crocker"/>
          <date month="July" year="2009"/>
          <abstract>
            <t>Over its thirty-five-year history, Internet Mail has changed significantly in scale and complexity, as it has become a global infrastructure service. These changes have been evolutionary, rather than revolutionary, reflecting a strong desire to preserve both its installed base and its usefulness. To collaborate productively on this large and complex system, all participants need to work from a common view of it and use a common language to describe its components and the interactions among them. But the many differences in perspective currently make it difficult to know exactly what another participant means. To serve as the necessary common frame of reference, this document describes the enhanced Internet Mail architecture, reflecting the current service. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5598"/>
        <seriesInfo name="DOI" value="10.17487/RFC5598"/>
      </reference>
      <reference anchor="RFC6376">
        <front>
          <title>DomainKeys Identified Mail (DKIM) Signatures</title>
          <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker"/>
          <author fullname="T. Hansen" initials="T." role="editor" surname="Hansen"/>
          <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy"/>
          <date month="September" year="2011"/>
          <abstract>
            <t>DomainKeys Identified Mail (DKIM) permits a person, role, or organization that owns the signing domain to claim some responsibility for a message by associating the domain with the message. This can be an author's organization, an operational relay, or one of their agents. DKIM separates the question of the identity of the Signer of the message from the purported author of the message. Assertion of responsibility is validated through a cryptographic signature and by querying the Signer's domain directly to retrieve the appropriate public key. Message transit from author to recipient is through relays that typically make no substantive change to the message content and thus preserve the DKIM signature.</t>
            <t>This memo obsoletes RFC 4871 and RFC 5672. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="76"/>
        <seriesInfo name="RFC" value="6376"/>
        <seriesInfo name="DOI" value="10.17487/RFC6376"/>
      </reference>
      <reference anchor="RFC8017">
        <front>
          <title>PKCS #1: RSA Cryptography Specifications Version 2.2</title>
          <author fullname="K. Moriarty" initials="K." role="editor" surname="Moriarty"/>
          <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
          <author fullname="J. Jonsson" initials="J." surname="Jonsson"/>
          <author fullname="A. Rusch" initials="A." surname="Rusch"/>
          <date month="November" year="2016"/>
          <abstract>
            <t>This document provides recommendations for the implementation of public-key cryptography based on the RSA algorithm, covering cryptographic primitives, encryption schemes, signature schemes with appendix, and ASN.1 syntax for representing keys and for identifying the schemes.</t>
            <t>This document represents a republication of PKCS #1 v2.2 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series. By publishing this RFC, change control is transferred to the IETF.</t>
            <t>This document also obsoletes RFC 3447.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8017"/>
        <seriesInfo name="DOI" value="10.17487/RFC8017"/>
      </reference>
      <reference anchor="RFC8463">
        <front>
          <title>A New Cryptographic Signature Method for DomainKeys Identified Mail (DKIM)</title>
          <author fullname="J. Levine" initials="J." surname="Levine"/>
          <date month="September" year="2018"/>
          <abstract>
            <t>This document adds a new signing algorithm, Ed25519-SHA256, to "DomainKeys Identified Mail (DKIM) Signatures" (RFC 6376). DKIM verifiers are required to implement this algorithm.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8463"/>
        <seriesInfo name="DOI" value="10.17487/RFC8463"/>
      </reference>
    </references>
    <?line 536?>

<section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The parent document to this is DKIM <xref target="RFC6376"/> from which the vast
majority of content is copied from with only slight editing to update
for DKIM2.  The DKIM RFC was editted by Dave Crocker, Tony Hansen, and
Murray Kucherawy.  Credit for the content and specification for DKIM,
from which DKIM2 is derived from, goes to them.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
