<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-chuang-dkim2-dns-03" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="DKIM2 DNS">Domain Name Specification for DKIM2</title>
    <seriesInfo name="Internet-Draft" value="draft-chuang-dkim2-dns-03"/>
    <author initials="W." surname="Chuang" fullname="Wei Chuang">
      <organization>Google</organization>
      <address>
        <email>weihaw@google.com</email>
      </address>
    </author>
    <date year="2025" month="October" day="20"/>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 32?>

<t>The updated DomainKeys Identified Mail (DKIM2) permits an organization
that owns the signing domain to claim some responsibility for a
message by associating the domain with the message through a digital
signature. This is done by publishing to Domain Name Service (DNS) of
the domain a public key that is then associated to the domain and
where messages can be signed by the corresponding private key.
Assertion of responsibility is validated through a cryptographic
signature and by querying the Signer’s domain directly to retrieve the
appropriate public key.  This document describes DKIM2 DNS record format
and how to find the record.</t>
    </abstract>
  </front>
  <middle>
    <?line 45?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The updated DomainKeys Identified Mail (DKIM2) permits an organization
that owns the signing domain to claim some responsibility for a
message <xref target="RFC5322"/> by associating the domain with the message through a
digital signature.  This is done by publishing to Domain Name Service
(DNS) of the domain a public key that is then associated to the domain
<xref target="RFC1034"/> and where messages can be signed by the corresponding
private key.  Assertion of responsibility is validated through a
cryptographic signature and by querying the Signer’s domain directly
to retrieve the appropriate public key.</t>
      <t>This document describes DKIM2 DNS record format and how to find the
record.  The updated DomainKeys Identified Mail (DKIM2) adopts a
subset of the DKIM <xref target="RFC6376"/> DNS specification, but to prevent
ambiguity from using the using normative references to RFC6376, this
document copies over the RFC6376 and updates as necessary.  However,
this document still does normatively reference RFC6376 for the IANA
registrations. This document and the other DKIM2 documents do not
deprecate RFC6376 as it is expected that both DKIM and DKIM2 will
co-exist for at least some period of time.</t>
      <t>INFORMATIVE NOTE: another reason for separating the DKIM2 DNS
specification from DKIM, is that in the future, it is likely that
DKIM2 will diverge from the parent specification.</t>
      <t>There are other updated DomainKeys Identified Mail (DKIM2) documents
as well: the first document describes the motivation; the second
document describes the headers.</t>
    </section>
    <section anchor="terminology-and-definitions">
      <name>Terminology and Definitions</name>
      <t>This section defines terms used in the rest of the document.
DKIM2 is designed to operate within the Internet Mail service, as
defined in <xref target="RFC5598"/>. Basic email terminology is taken from that
specification.</t>
      <t>Syntax descriptions use Augmented BNF (ABNF) <xref target="RFC5234"/>.
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in
<xref target="RFC2119"/>. These words take their normative meanings only when they
are presented in ALL UPPERCASE.</t>
      <section anchor="signers">
        <name>Signers</name>
        <t>Elements in the mail system that sign messages on behalf of a domain
are referred to as Signers. These may be MUAs (Mail User Agents),
MSAs (Mail Submission Agents), MTAs (Mail Transfer Agents), or other
agents such as mailing list exploders. In general, any Signer will
be involved in the injection of a message into the message system in
some way. The key issue is that a message must be signed before it
leaves the administrative domain of the Signer.</t>
      </section>
      <section anchor="verifiers">
        <name>Verifiers</name>
        <t>Elements in the mail system that verify signatures are referred to as
Verifiers. These may be MTAs, Mail Delivery Agents (MDAs), or MUAs.
In most cases, it is expected that Verifiers will be close to an end
user (reader) of the message or some consuming agent such as a
mailing list exploder.</t>
      </section>
      <section anchor="identity">
        <name>Identity</name>
        <t>This specification DKIM2 calls for the Identity to correspond to an
organization while DKIM permitted person, or role as well. In the
context of email architecture specification <xref target="RFC5598"/>, this
corresponds to an ADministrative Management Domain (ADMD).  Some
examples include the the author’s organization, an ISP along the
handling path, an independent trust assessment service, and a mailing
list operator.</t>
      </section>
      <section anchor="identifier">
        <name>Identifier</name>
        <t>A label that refers to an identity.</t>
      </section>
      <section anchor="signing-domain-identifier-sdid">
        <name>Signing Domain Identifier (SDID)</name>
        <t>A single domain name that is the mandatory payload output of DKIM and
that refers to the identity claiming some responsibility</t>
      </section>
      <section anchor="identity-assessor">
        <name>Identity Assessor</name>
        <t>An element in the mail system that consumes DKIM2’s payload, which is
the responsible Signing Domain Identifier (SDID). The Identity
Assessor is dedicated to the assessment of the delivered identifier.
Other DKIM2 (and non-DKIM2) values can also be used by the Identity
Assessor (if they are available) to provide a more general message
evaluation filtering engine. However, this additional activity is
outside the scope of this specification.</t>
      </section>
      <section anchor="whitespace">
        <name>Whitespace</name>
        <t>There are three forms of whitespace:</t>
        <ul spacing="normal">
          <li>
            <t>WSP represents simple whitespace, i.e., a space or a tab character (formal definition in <xref target="RFC5234"/>)</t>
          </li>
          <li>
            <t>LWSP is linear whitespace, defined as WSP plus CRLF (formal definition in <xref target="RFC5234"/>).</t>
          </li>
          <li>
            <t>FWS is folding whitespace. It allows multiple lines separated by CRLF followed by at least one whitespace, to be joined.</t>
          </li>
        </ul>
        <t>The formal ABNF for these are (WSP and LWSP are given for information  only):</t>
        <artwork><![CDATA[
WSP = SP / HTAB
LWSP = *(WSP / CRLF WSP)
FWS = [*WSP CRLF] 1*WSP
]]></artwork>
        <t>The definition of FWS is identical to that in <xref target="RFC5322"/> except for the exclusion of obs-FWS.</t>
      </section>
      <section anchor="imported-abnf-tokens">
        <name>Imported ABNF Tokens</name>
        <t>The following tokens are imported from other RFCs as noted. Those RFCs should be connsidered definitive.</t>
        <t>The following tokens are imported from <xref target="RFC2045"/>:</t>
        <ul spacing="normal">
          <li>
            <t>"qp-section" (a single line of quoted-printable-encoded text)</t>
          </li>
        </ul>
        <t>Tokens not defined herein are imported from <xref target="RFC5234"/>. These are intuitive primitives such as SP, HTAB, WSP, ALPHA, DIGIT, CRLF, etc.</t>
      </section>
      <section anchor="common-abnf-tokens">
        <name>Common ABNF Tokens</name>
        <t>The following ABNF tokens are used elsewhere in this document:</t>
        <artwork><![CDATA[
hyphenated-word = ALPHA [ *(ALPHA / DIGIT / "-") (ALPHA / DIGIT) ]
ALPHADIGITPS = (ALPHA / DIGIT / "+" / "/")
base64string = ALPHADIGITPS *([FWS] ALPHADIGITPS)
[ [FWS] "=" [ [FWS] "=" ] ]
]]></artwork>
      </section>
    </section>
    <section anchor="protocol-elements">
      <name>Protocol Elements</name>
      <t>Protocol Elements are conceptual parts of the protocol that are not
specific to either Signers or Verifiers. The protocol descriptions
for Signers and Verifiers will be described in a separate document. NOTE: This
section must be read in the context of those elements.</t>
      <section anchor="selectors">
        <name>Selectors</name>
        <t>To support multiple concurrent public keys per signing domain, the
key namespace is subdivided using "selectors". For example,
selectors might indicate the names of office locations (e.g.,
"sanfrancisco", "coolumbeach", and "reykjavik"), the signing date
(e.g., "january2005", "february2005", etc.), or even an individual
user.</t>
        <t>Selectors are needed to support some important use cases. For
example:</t>
        <ul spacing="normal">
          <li>
            <t>Domains that want to delegate signing capability for a specific address for a given duration to a partner, such as an advertising provider or other outsourced function.</t>
          </li>
          <li>
            <t>Domains that want to allow frequent travelers to send messages locally without the need to connect with a particular MSA.</t>
          </li>
          <li>
            <t>"Affinity" domains (e.g., college alumni associations) that provide forwarding of incoming mail, but that do not operate a mail submission agent for outgoing mail.</t>
          </li>
        </ul>
        <t>Periods are allowed in selectors and are component separators. When
keys are retrieved from the DNS, periods in selectors define DNS label
boundaries in a manner similar to the conventional use in domain
names. Selector components might be used to combine dates with
locations, for example, "march2005.reykjavik". In a DNS
implementation, this can be used to allow delegation of a portion of
he selector namespace.</t>
        <artwork><![CDATA[
ABNF:
selector = sub-domain *( "." sub-domain )
]]></artwork>
        <t>The number of public keys and corresponding selectors for each domain
is determined by the domain owner. Many domain owners will be
satisfied with just one selector, whereas administratively
distributed organizations can choose to manage disparate selectors
and key pairs in different regions or on different email servers.</t>
        <t>Beyond administrative convenience, selectors make it possible to
seamlessly replace public keys on a routine basis. If a domain
wishes to change from using a public key associated with selector
"january2005" to a public key associated with selector
"february2005", it merely makes sure that both public keys are
advertised in the public-key repository concurrently for the
transition period during which email may be in transit prior to
verification. At the start of the transition period, the outbound
email servers are configured to sign with the "february2005" private
key. At the end of the transition period, the "january2005" public
key is removed from the public-key repository.</t>
        <t>INFORMATIVE NOTE: A key may also be revoked as described below.
The distinction between revoking and removing a key selector
record is subtle. When phasing out keys as described above, a
signing domain would probably simply remove the key record after
the transition period. However, a signing domain could elect to
revoke the key (but maintain the key record) for a further period.
There is no defined semantic difference between a revoked key and
a removed key.</t>
        <t>While some domains may wish to make selector values well-known,
others will want to take care not to allocate selector names in a way
that allows harvesting of data by outside parties.</t>
        <t>INFORMATIVE OPERATIONS NOTE: Reusing a selector with a new key
(for example, changing the key associated with a user’s name)
makes it impossible to tell the difference between a message that
didn’t verify because the key is no longer valid and a message
that is actually forged. For this reason, Signers are ill-advised
to reuse selectors for new keys. A better strategy is to assign
new keys to new selectors.</t>
      </section>
      <section anchor="tagvalue">
        <name>Tag=Value Lists</name>
        <t>DKIM2 uses a simple "tag=value" syntax in several contexts, including
in messages and domain signature records.
Values are a series of strings containing either plain text, "base64"
text (as defined in <xref target="RFC2045"/>, Section 6.8), or "qp-section" (ibid,
Section 6.7). The name of the tag will determine the encoding of
each value. Unencoded semicolon (";") characters MUST NOT occur in
the tag value, since that separates tag-specs.</t>
        <t>INFORMATIVE IMPLEMENTATION NOTE: Although the "plain text" defined
below (as "tag-value") only includes 7-bit characters, an
implementation that wished to anticipate future standards would be
advised not to preclude the use of UTF-8-encoded <xref target="RFC3629"/> text
in tag=value lists.</t>
        <t>Formally, the ABNF syntax rules are as follows:</t>
        <artwork><![CDATA[
tag-list = tag-spec *( ";" tag-spec ) [ ";" ]
tag-spec = [FWS] tag-name [FWS] "=" [FWS] tag-value [FWS]
tag-name = ALPHA *ALNUMPUNC
tag-value = [ tval *( 1*(WSP / FWS) tval ) ]
; Prohibits WSP and FWS at beginning and end
tval = 1*VALCHAR
VALCHAR = %x21-3A / %x3C-7E
; EXCLAMATION to TILDE except SEMICOLON
ALNUMPUNC = ALPHA / DIGIT / "_"
]]></artwork>
        <t>Note that WSP is allowed anywhere around tags. In particular, any
WSP after the "=" and any WSP before the terminating ";" is not part
of the value; however, WSP inside the value is signicant.</t>
        <t>MUST be interpreted in a case-sensitive manner. Values MUST be
processed as case sensitive unless the specific tag description of
semantics specifies case insensitivity.</t>
        <t>Tags with duplicate names MUST NOT occur within a single tag-list; if
a tag name does occur more than once, the entire tag-list is invalid.</t>
        <t>Whitespace within a value MUST be retained unless explicitly excluded
by the specific tag description.</t>
        <t>Tag=value pairs that represent the default value MAY be included to
aid legibility.</t>
        <t>Unrecognized tags MUST be ignored.</t>
        <t>Tags that have an empty value are not the same as omitted tags. An
omitted tag is treated as having the default value; a tag with an
empty value explicitly designates the empty string as the value.</t>
      </section>
      <section anchor="algorithm">
        <name>Signing and Verification Algorithms</name>
        <t>DKIM2 supports multiple digital signature algorithms.  Two algorithms
are referenced by this specification at this time: rsa-sha256 and
ed25519-sha256. rsa-sha256 is specified in <xref target="RFC6376"/> while
ed25519-sha256 is specified in <xref target="RFC8463"/>.  Signers and Verifiers MUST
implement rsa-sha256 and SHOULD implement ed25519-sha256.  Futher they
MUST NOT validate the legacy DKIM <xref target="RFC6376"/> rsa-sha1 algorithm
i.e. ignore the public key and signatures associated with it.</t>
        <t>INFORMATIVE NOTE: rsa-sha256 enjoys virtually universal deployment
while ed25519-sha256 has very little deployment at the creation of
this draft.  It does provide better capability in reduced key size,
and faster signing and verification speed.  Support for at least two
algorithms provides algorithmic diversity that provides defense
against some unforeseen future algorithm breakage.  Thus
implementation of ed25519-sha256 will be changed to MUST upon the
completion of the DKIM2 specification.  rsa-sha1 algorithm is
deprecated for DKIM2 as sha1 is demonstrateably broken.</t>
      </section>
      <section anchor="key-management-and-representation">
        <name>Key Management and Representation</name>
        <t>Signature applications require some level of assurance that the
verification public key is associated with the claimed Signer. Many
applications achieve this by using public-key certificates issued by
a trusted third party. However, DKIM2 can achieve a sufficient level
of security, with significantly enhanced scalability, by simply
having the Verifier query the purported Signer’s DNS entry (or some
security-equivalent) in order to retrieve the public key.
DKIM2 keys can potentially be stored in multiple types of key servers
and in multiple formats. The storage and format of keys are
irrelevant to the remainder of the DKIM2 algorithm.
Parameters to the key lookup algorithm are the type of the lookup
(the "q=" tag), the domain of the Signer (the "d=" tag of the DKIM2
signature header field), and the selector (the "s=" tag).</t>
        <artwork><![CDATA[
public_key = dkim2_find_key(q_val, d_val, s_val)
]]></artwork>
        <t>This document defines a single binding, using DNS TXT RRs to
distribute the keys. Other bindings may be defined in the future.</t>
        <section anchor="textualrepresentation">
          <name>Textual Representation</name>
          <t>It is expected that many key servers will choose to present the keys
in an otherwise unstructured text format (for example, an XML form
would not be considered to be unstructured text for this purpose).
The following definition MUST be used for any DKIM2 key represented in
an otherwise unstructured textual form.</t>
          <t>The overall syntax is a tag-list as described in <xref target="tagvalue"/>. The
current valid tags are described below. Other tags MAY be present
and MUST be ignored by any implementation that does not understand
them.</t>
          <dl>
            <dt>v=</dt>
            <dd>
              <t>Version of the DKIM key record (plain-text; RECOMMENDED,
default is "DKIM1"). If specified, this tag MUST be set to
"DKIM1" (without the quotes). This tag MUST be the first tag in
the record. Records beginning with a "v=" tag with any other
value MUST be discarded. Note that Verifiers must do a string
comparison on this value; for example, "DKIM1" is not the same
as "DKIM1.0".</t>
            </dd>
          </dl>
          <t>INFORMATIVE NOTE: DKIM2 reuses a subset of the DKIM textual
representation including this version number for compatibility
with existing key deployment.  Consequently DKIM2 does not
increment the version number.</t>
          <artwork><![CDATA[
ABNF:
key-v-tag = %x76 [FWS] "=" [FWS] %x44.4B.49.4D.31
]]></artwork>
          <dl>
            <dt>h=</dt>
            <dd>
              <t>Acceptable hash algorithms (plain-text; OPTIONAL, defaults to
allowing all algorithms). A colon-separated list of hash
algorithms that might be used. Unrecognized algorithms MUST be
ignored. Refer to <xref target="algorithm"/> for a discussion of the hash
algorithms implemented by Signers and Verifiers. The set of
algorithms listed in this tag in each record is an operational
choice made by the Signer.</t>
            </dd>
          </dl>
          <artwork><![CDATA[
ABNF:
key-h-tag = %x68 [FWS] "=" [FWS] key-h-tag-alg
*( [FWS] ":" [FWS] key-h-tag-alg )
key-h-tag-alg = "sha1" / "sha256" / x-key-h-tag-alg
x-key-h-tag-alg = hyphenated-word ; for future extension
]]></artwork>
          <dl>
            <dt>k=</dt>
            <dd>
              <t>Key type (plain-text; OPTIONAL, default is "rsa"). Signers and
Verifiers MUST support the "rsa" key type. The "rsa" key type
indicates that an ASN.1 DER-encoded [ITU-X660-1997] RSAPublicKey
(see <xref target="RFC8017"/>, Sections 3.1 and A.1.1) is being used in the "p="
tag. (Note: the "p=" tag further encodes the value using the
base64 algorithm.) In addition Signers and Verifiers SHOULD
support the "ed25519" key type (See <xref target="RFC8463"/>).  The p= value
in the key record is the Ed25519 public key encoded in base64. 
Unrecognized key types MUST be ignored.</t>
            </dd>
          </dl>
          <artwork><![CDATA[
ABNF:
key-k-tag = %x76 [FWS] "=" [FWS] key-k-tag-type
key-k-tag-type = "rsa" / "ed25519" / x-key-k-tag-type
x-key-k-tag-type = hyphenated-word ; for future extension
]]></artwork>
          <dl>
            <dt>n=</dt>
            <dd>
              <t>Notes that might be of interest to a human (qp-section; OPTIONAL,
default is empty). No interpretation is made by any program.
This tag should be used sparingly in any key server mechanism that
has space limitations (notably DNS). This is intended for use by
administrators, not end users.</t>
            </dd>
          </dl>
          <artwork><![CDATA[
ABNF:
key-n-tag = %x6e [FWS] "=" [FWS] qp-section
]]></artwork>
          <dl>
            <dt>p=</dt>
            <dd>
              <t>Public-key data (base64; REQUIRED). An empty value means that
this public key has been revoked. The syntax and semantics of
this tag value before being encoded in base64 are defined by the
"k=" tag.</t>
            </dd>
          </dl>
          <t>INFORMATIVE RATIONALE: If a private key has been compromised or
otherwise disabled (e.g., an outsourcing contract has been
terminated), a Signer might want to explicitly state that it
knows about the selector, but all messages using that selector</t>
          <artwork><![CDATA[
ABNF:
key-p-tag = %x70 [FWS] "=" [ [FWS] base64string]
]]></artwork>
          <t>INFORMATIVE NOTE: A base64string is permitted to include
whitespace (FWS) at arbitrary places; however, any CRLFs must
be followed by at least one WSP character. Implementers and
administrators are cautioned to ensure that selector TXT RRs
conform to this specification.</t>
          <dl>
            <dt>s=</dt>
            <dd>
              <t>Service Type (plain-text; OPTIONAL; default is "*"). A colon-
separated list of service types to which this record applies.
Verifiers for a given service type MUST ignore this record if the
appropriate type is not listed. Unrecognized service types MUST
be ignored. Currently defined service types are as follows:
</t>
              <dl>
                <dt>*</dt>
                <dd>
                  <t>matches all service types</t>
                </dd>
                <dt>email</dt>
                <dd>
                  <t>electronic mail (not necessarily limited to SMTP)</t>
                </dd>
              </dl>
              <t>This tag is intended to constrain the use of keys for other
purposes, should use of DKIM2 be defined by other services in the
future.</t>
            </dd>
          </dl>
          <artwork><![CDATA[
ABNF:
key-s-tag = %x73 [FWS] "=" [FWS] key-s-tag-type
*( [FWS] ":" [FWS] key-s-tag-type )
key-s-tag-type = "email" / "*" / x-key-s-tag-type
x-key-s-tag-type = hyphenated-word ; for future extension
]]></artwork>
          <dl>
            <dt>t=</dt>
            <dd>
              <t>Flags, represented as a colon-separated list of names (plain-
text; OPTIONAL, default is no flags set). Unrecognized flags MUST
be ignored. The defined flags are as follows:
</t>
              <dl>
                <dt>y</dt>
                <dd>
                  <t>This domain is testing DKIM2. Verifiers MUST NOT treat messages
from Signers in testing mode differently from unsigned email,
even should the signature fail to verify. Verifiers MAY wish
to track testing mode results to assist the Signer.</t>
                </dd>
                <dt>s</dt>
                <dd>
                  <t>Any DKIM2 signature header fields using the "i=" tag MUST have
the same domain value on the right-hand side of the "@" in the
"i=" tag and the value of the "d=" tag. That is, the "i="
domain MUST NOT be a subdomain of "d=". Use of this flag is</t>
                </dd>
              </dl>
              <t>RECOMMENDED unless subdomaining is required.</t>
            </dd>
          </dl>
          <artwork><![CDATA[
ABNF:
key-t-tag = %x74 [FWS] "=" [FWS] key-t-tag-flag
*( [FWS] ":" [FWS] key-t-tag-flag )
key-t-tag-flag = "y" / "s" / x-key-t-tag-flag
x-key-t-tag-flag = hyphenated-word ; for future extension
]]></artwork>
        </section>
        <section anchor="dns-binding">
          <name>DNS Binding</name>
          <t>A binding using DNS TXT RRs as a key service is hereby defined. All
implementations MUST support this binding.</t>
          <section anchor="namespace">
            <name>Namespace</name>
            <t>All DKIM2 keys are stored in a subdomain named "_domainkey". Given a
DKIM2 signature header field with a "d=" tag of "example.com" and an
"s=" tag of "foo.bar", the DNS query will be for
"foo.bar._domainkey.example.com".</t>
          </section>
          <section anchor="resource-record-types-for-key-storage">
            <name>Resource Record Types for Key Storage</name>
            <t>The DNS Resource Record type used is specified by an option to the
query-type ("q=") tag. The only option defined in this base
specification is "txt", indicating the use of a TXT RR. A later
extension of this standard may define another RR type.</t>
            <t>Strings in a TXT RR MUST be concatenated together before use with no
intervening whitespace. TXT RRs MUST be unique for a particular
selector name; that is, if there are multiple records in an RRset,
the results are undefined.</t>
            <t>TXT RRs are encoded as described in <xref target="textualrepresentation"/>.</t>
          </section>
        </section>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document reuses the IANA registrations in <xref target="RFC6376"/> in Section 7.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document recommends thorough review and adherence to the Security
Consideration in <xref target="RFC6376"/> in Section 8.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC1034">
        <front>
          <title>Domain names - concepts and facilities</title>
          <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
          <date month="November" year="1987"/>
          <abstract>
            <t>This RFC is the revised basic definition of The Domain Name System. It obsoletes RFC-882. This memo describes the domain style names and their used for host address look up and electronic mail forwarding. It discusses the clients and servers in the domain name system and the protocol used between them.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="13"/>
        <seriesInfo name="RFC" value="1034"/>
        <seriesInfo name="DOI" value="10.17487/RFC1034"/>
      </reference>
      <reference anchor="RFC2045">
        <front>
          <title>Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Message Bodies</title>
          <author fullname="N. Freed" initials="N." surname="Freed"/>
          <author fullname="N. Borenstein" initials="N." surname="Borenstein"/>
          <date month="November" year="1996"/>
          <abstract>
            <t>This initial document specifies the various headers used to describe the structure of MIME messages. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="2045"/>
        <seriesInfo name="DOI" value="10.17487/RFC2045"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC3629">
        <front>
          <title>UTF-8, a transformation format of ISO 10646</title>
          <author fullname="F. Yergeau" initials="F." surname="Yergeau"/>
          <date month="November" year="2003"/>
          <abstract>
            <t>ISO/IEC 10646-1 defines a large character set called the Universal Character Set (UCS) which encompasses most of the world's writing systems. The originally proposed encodings of the UCS, however, were not compatible with many current applications and protocols, and this has led to the development of UTF-8, the object of this memo. UTF-8 has the characteristic of preserving the full US-ASCII range, providing compatibility with file systems, parsers and other software that rely on US-ASCII values but are transparent to other values. This memo obsoletes and replaces RFC 2279.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="63"/>
        <seriesInfo name="RFC" value="3629"/>
        <seriesInfo name="DOI" value="10.17487/RFC3629"/>
      </reference>
      <reference anchor="RFC5234">
        <front>
          <title>Augmented BNF for Syntax Specifications: ABNF</title>
          <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker"/>
          <author fullname="P. Overell" initials="P." surname="Overell"/>
          <date month="January" year="2008"/>
          <abstract>
            <t>Internet technical specifications often need to define a formal syntax. Over the years, a modified version of Backus-Naur Form (BNF), called Augmented BNF (ABNF), has been popular among many Internet specifications. The current specification documents ABNF. It balances compactness and simplicity with reasonable representational power. The differences between standard BNF and ABNF involve naming rules, repetition, alternatives, order-independence, and value ranges. This specification also supplies additional rule definitions and encoding for a core lexical analyzer of the type common to several Internet specifications. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="68"/>
        <seriesInfo name="RFC" value="5234"/>
        <seriesInfo name="DOI" value="10.17487/RFC5234"/>
      </reference>
      <reference anchor="RFC5322">
        <front>
          <title>Internet Message Format</title>
          <author fullname="P. Resnick" initials="P." role="editor" surname="Resnick"/>
          <date month="October" year="2008"/>
          <abstract>
            <t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of "electronic mail" messages. This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, "Standard for the Format of ARPA Internet Text Messages", updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5322"/>
        <seriesInfo name="DOI" value="10.17487/RFC5322"/>
      </reference>
      <reference anchor="RFC5598">
        <front>
          <title>Internet Mail Architecture</title>
          <author fullname="D. Crocker" initials="D." surname="Crocker"/>
          <date month="July" year="2009"/>
          <abstract>
            <t>Over its thirty-five-year history, Internet Mail has changed significantly in scale and complexity, as it has become a global infrastructure service. These changes have been evolutionary, rather than revolutionary, reflecting a strong desire to preserve both its installed base and its usefulness. To collaborate productively on this large and complex system, all participants need to work from a common view of it and use a common language to describe its components and the interactions among them. But the many differences in perspective currently make it difficult to know exactly what another participant means. To serve as the necessary common frame of reference, this document describes the enhanced Internet Mail architecture, reflecting the current service. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5598"/>
        <seriesInfo name="DOI" value="10.17487/RFC5598"/>
      </reference>
      <reference anchor="RFC6376">
        <front>
          <title>DomainKeys Identified Mail (DKIM) Signatures</title>
          <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker"/>
          <author fullname="T. Hansen" initials="T." role="editor" surname="Hansen"/>
          <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy"/>
          <date month="September" year="2011"/>
          <abstract>
            <t>DomainKeys Identified Mail (DKIM) permits a person, role, or organization that owns the signing domain to claim some responsibility for a message by associating the domain with the message. This can be an author's organization, an operational relay, or one of their agents. DKIM separates the question of the identity of the Signer of the message from the purported author of the message. Assertion of responsibility is validated through a cryptographic signature and by querying the Signer's domain directly to retrieve the appropriate public key. Message transit from author to recipient is through relays that typically make no substantive change to the message content and thus preserve the DKIM signature.</t>
            <t>This memo obsoletes RFC 4871 and RFC 5672. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="76"/>
        <seriesInfo name="RFC" value="6376"/>
        <seriesInfo name="DOI" value="10.17487/RFC6376"/>
      </reference>
      <reference anchor="RFC8017">
        <front>
          <title>PKCS #1: RSA Cryptography Specifications Version 2.2</title>
          <author fullname="K. Moriarty" initials="K." role="editor" surname="Moriarty"/>
          <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
          <author fullname="J. Jonsson" initials="J." surname="Jonsson"/>
          <author fullname="A. Rusch" initials="A." surname="Rusch"/>
          <date month="November" year="2016"/>
          <abstract>
            <t>This document provides recommendations for the implementation of public-key cryptography based on the RSA algorithm, covering cryptographic primitives, encryption schemes, signature schemes with appendix, and ASN.1 syntax for representing keys and for identifying the schemes.</t>
            <t>This document represents a republication of PKCS #1 v2.2 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series. By publishing this RFC, change control is transferred to the IETF.</t>
            <t>This document also obsoletes RFC 3447.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8017"/>
        <seriesInfo name="DOI" value="10.17487/RFC8017"/>
      </reference>
      <reference anchor="RFC8463">
        <front>
          <title>A New Cryptographic Signature Method for DomainKeys Identified Mail (DKIM)</title>
          <author fullname="J. Levine" initials="J." surname="Levine"/>
          <date month="September" year="2018"/>
          <abstract>
            <t>This document adds a new signing algorithm, Ed25519-SHA256, to "DomainKeys Identified Mail (DKIM) Signatures" (RFC 6376). DKIM verifiers are required to implement this algorithm.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8463"/>
        <seriesInfo name="DOI" value="10.17487/RFC8463"/>
      </reference>
    </references>
    <?line 539?>

<section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The parent document to this is DKIM <xref target="RFC6376"/> from which the vast
majority of content is copied from with only slight editing to update
for DKIM2.  The DKIM RFC was editted by Dave Crocker, Tony Hansen, and
Murray Kucherawy.  In addition, another source for this document is the
Ed25519 extension to DKIM <xref target="RFC8463"/> with content transfered verbatum
directly from.  The Ed25519 extension RFC was written by John Levine.
Credit for the content and specification for DKIM and the Edd25519
extension, from which DKIM2 is derived from, goes to them.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
