<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.0.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-gondwana-dkim2-motivation-00" category="std" consensus="true" submissionType="IETF" obsoletes="4686" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="DKIM2 Motivation">DKIM2 Why DKIM needs replacing, and what a replacement would look like</title>

    <author initials="B." surname="Gondwana" fullname="Bron Gondwana">
      <organization>Fastmail Pty Ltd</organization>
      <address>
        <postal>
          <street>Level 2, 114 William Street</street>
          <code>3000</code>
          <country>Australia</country>
        </postal>
        <phone>+61 457 416 436</phone>
        <email>brong@fastmailteam.com</email>
      </address>
    </author>
    <author initials="R." surname="Clayton" fullname="Richard Clayton">
      <organization>Yahoo</organization>
      <address>
        <email>rclayton@yahooinc.com</email>
      </address>
    </author>
    <author initials="W." surname="Chuang" fullname="Wei Chuang">
      <organization>Google</organization>
      <address>
        <email>weihaw@google.com</email>
      </address>
    </author>

    <date year="2024" month="October" day="21"/>

    
    
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 43?>

<t>This memo provides a rationale and outline design for replacing the existing email security
mechanisms with a new mechanism based around a more strongly authenticated
email delivery pathway, including an asynchronous return channel.</t>



    </abstract>



  </front>

  <middle>


<?line 49?>

<section anchor="background-and-motivations"><name>Background and motivations</name>

<t>In 2007, <xref target="RFC4871"/> (Domain Key Identified Mail / DKIM) was published, outlining a
mechanism for a domain to sign email in a way that recipients could ensure
that the email had come from an entity possessing the secret key matching
a public key published in the DNS by the source domain. For clarity in this
document we call this established scheme "DKIM1".</t>

<t>This document has been obsoleted and updated many times since then, and a
large amount of operational experience has been gained using it. However, it
has some known weaknesses with some kinds of email flow.</t>

<t>If an intermediary alters the email then the original DKIM1 signature will no
longer be verifiable. In 2019, <xref target="RFC8617"/> (Authenticated Received Chain / ARC)
attempted to solve this issue. However, it does not provide a mechanism for
determining whether recipients will recognise the ARC signatures or trust the veracity
of the systems that add them.</t>

<t>A further issue is that bad actors may "replay" bad email that systems have DKIM
signed and erode the reputation of the signer.</t>

<t>Ad hoc systems have been developed so that systems that have placed a DKIM
signature onto an email may be informed about the quality of the messages that
they are relaying -- so called feedback loops. However, there are no formal
specifications for such schemes and feedback may be sent where it is not
actually required.</t>

<t>Furthermore, where the origin of a message has been forged and the final
intermediary in a chain finds that it is undeliverable, then the Delivery
Status Notification (DSN) may be sent to an unsuspecting third-party -- a phenomenon
called backscatter.</t>

<t>This document solves these and related problems in a holistic way, by having
every hop in a forwarding chain responsible for:</t>

<t><list style="numbers" type="1">
  <t>verifying the path that messages have taken to get to it, including by
being able to reverse modifications
or by asserting that it trusts the previous hop unconditionally, and that
it is the declared next hop in the chain.</t>
  <t>declaring (under protection of its own signature) where the message is being
sent to next.</t>
  <t>asserting that it will pass control messages (including bounces, abuse
reports and delivery notifications) back to the previous hop for a reasonable
time.</t>
</list></t>

</section>
<section anchor="design-goals"><name>Design Goals</name>

<t><list style="numbers" type="1">
  <t>It is intended that legacy mail systems constructed in the last century will be
able to interoperate with this new specification. However, more recently
developed systems will, after a period of parallel running, need to be
upgraded in order to continue to be able to authenticate email.</t>
  <t>We favor simplicity over obscure functionality.</t>
  <t>We aim to keep the number of cryptographic operations required the same
or less, for all the most common types of email flow.</t>
  <t>We aim to make all parts of the specification mandatory to implement because
experience shows that interworking is adversely affected by providing optional
functionality.</t>
</list></t>

</section>
<section anchor="basic-ideas"><name>Basic ideas</name>

<t>An email is DKIM2 signed by the originator -- in pretty much the same way as is
done in the existing DKIM1 standard. In practice the vast majority of mail is
signed using relaxed/relaxed methods. DKIM2 will only allow relaxed/relaxed.</t>

<t>Each "hop" that handles the email adds another, sequentially numbered, DKIM2
header field. A simple relay will only add a single header. Email
service providers will often add two, one on behalf of the actual originator the other
for themselves. A relay that rewrites email from one domain to another will
add two headers to record the rewriting.</t>

<t>If an email is accepted by a server but it is later found that it cannot be
delivered onward, or further analysis of its contents leads to a determination
that it should not be delivered after all, then the previous hop is informed by means of a
Delivery Status Notification (DSN). If a DSN is received for an email that was
previously relayed, then the DSN is passed back to the system that delivered the
email. Hence, DSNs are returned back along the "outgoing path" until they reach a
system that can take responsibility for handling the report.</t>

<t>The DKIM2 headers contain the source and destination of the email. They may
also request "feedback" from later entities as to the quality of the email.
This feedback is sent directly from systems that choose to honor such
requests to any all of the requestors that the sender deems appropriate.</t>

<t>Intermediaries that alter emails record their actions (so that later hops can
undo and check signatures). Intermediaries whose alterations are too complex
to be described or reversed will either have to arrange to be treated as the
originator of the message (if they are near the start of the message's
journey) or they will need to implicitly trusted by any further intermediaries
(if they are near the end of the message's) journey.</t>

<t>Intermediaries that duplicate ("explode") emails, record their action so that
any further systems that see multiple copies of the email will not reject or
discard the email as a "replay".</t>

</section>
<section anchor="how-the-aims-of-dkim2-are-achieved"><name>How the aims of DKIM2 are achieved</name>

<section anchor="simplification-codification"><name>Simplification &amp; codification</name>

<t><strong>Issue</strong>:</t>

<t>Every DKIM1 signature specifies an explicit list of which email header fields
have been signed. This leads to inconsistent signing of headers, and allows a
signature to be created in which security-critical headers are not covered.
To prevent bad actors from adding headers which were not originally present
it is common to oversign by signing null versions of headers that are not
present. This oversigning may be extended to signing two, for example, Subject
header fields because some recipients may not enforce the <xref target="RFC5322"/> requirement
of uniqueness.</t>

<t><strong>Mitigation:</strong></t>

<t>DKIM2 will specify a fixed set of headers in accordance with now well-established
best practice (and insist they are unique) so there will be no need to list what
is signed.</t>

<t>However, some exotic headers may need to be signed for unusual or future use-cases.
DKIM2 will allow this with an h= field.</t>

</section>
<section anchor="preventing-backscatter"><name>Preventing backscatter</name>

<t><strong>Issue:</strong></t>

<t>With DKIM1, you can send delayed bounces if the message has come directly to you and
the DKIM signature is DMARC aligned, but otherwise you need to reject at SMTP transaction time
to ensure you won't be creating backscatter.</t>

<t><strong>Mitigation:</strong></t>

<t>Provided that an email is correctly signed when received, it can be rejected at
a later point in time. The DSN will be sent to the immediately preceding intermediary.
Since the bounce travels back along the (fully authenticated) incoming path it
cannot be sent to an uninvolved third party.</t>

</section>
<section anchor="improved-privacy-for-forwarders"><name>Improved Privacy for forwarders</name>

<t><strong>Issue:</strong></t>

<t>If you want to create a privacy preserving forwarding service, you need to SRS rewrite
the email's bounce address so that bounces don't accidentally leak the real address of the recipient.</t>

<t><strong>Mitigation:</strong></t>

<t>Since the DSN messages always go back up the DKIM2 chain, any hop can strip off the
higher number (i=) records; including the sender and recipient addresses for them,
and create a bounce as if the forwarder itself was doing the rejection.  As asynchronous
bounces will be common in DKIM2, this is indistinguishable to the sender.</t>

</section>
<section anchor="simplifying-error-handling-for-intermediaries"><name>Simplifying error handling for intermediaries</name>

<t><strong>Issue:</strong></t>

<t>ESPs and other entities that send email on behalf of others have a need to know when delivery
errors occur. At present this can only be done by changing the RFC5321 return path so that DSNs will
be delivered to an intermediary rather than original sender. Non-standardised mechanisms
such as VERP or SRS may be employed to be able to pin down the details of the failure.</t>

<t><strong>Mitigation:</strong></t>

<t>In DKIM2 DSNs are passed back along the outgoing path so the ESP will receive
the DSN and, depending on contractual arrangements, may be able to avoid passing this
message any further back along the chain.</t>

<t><strong>Issue:</strong></t>

<t>A mailing list wishes to learn when email it has handled cannot be delivered. At present
DSNs (as opposed to next hop delivery rejections) are often passed to the originator of the
email (the value in the <xref target="RFC5321"/> MAIL FROM) and are invisible to the mailing list.</t>

<t><strong>Mitigation:</strong></t>

<t>Passing bounces back along the outgoing path allows a mailing list to take responsibility
for the event and not bother the person who sent a message to the list.</t>

</section>
<section anchor="the-mailing-list-dmarc-issue"><name>The "mailing list DMARC issue"</name>

<t><strong>Issue:</strong></t>

<t>Once an intermediate (for example, a mailing list or alumni forwarder) makes a
change to the header or body of a message, the hashes covered by the sender's
DKIM signature no longer match, and it's not possible to see whether the message
is semantically similar, or has been completely replaced by a bad actor.</t>

<t><strong>Mitigation:</strong></t>

<t>DKIM2 will define an algebra for describing how to reverse any changes to
create the prior binary data, by inspecting the diff between the two versions,
recipients will be able to see who injected bad content.</t>

<t>Mailing lists (or alumni forwarders etc.) that alter the Subject header field
(or other <xref target="RFC5322"/> headers) will record the previous header field contents.
This is easy to undo for checking purposes.</t>

<t>Mailing lists that add text (either to a simple email body or one or more MIME parts
within the body) will record details of the text they have added. This text can then be
removed when checking earlier signatures.</t>

<t>We expect the "algebra" describing changes to be in a stand-alone document that
need not be finalised on the same timescale as DKIM2 itself.</t>

</section>
<section anchor="security-gateways"><name>Security gateways</name>

<t><strong>Issue:</strong></t>

<t>There are some types of alteration, for example by security gateways, that may
be impractical to describe in a cost-effective manner.</t>

<t><strong>Mitigation:</strong></t>

<t>We would expect that outgoing gateways that may be adding disclaimers or rewriting 
internal identifiers would be provided with appropriate signing keys so that they
could be the "first hop" as far as the rest of the email handling chain is concerned.</t>

<t>Incoming security gateways may be making substantial changes. Typically they
will remove problematic types of attachment and rewrite URLs to use "interstitials".
Since this type of functionality is generally provided on a contracted basis
further intermediaries will be fully aware of the presence of the security gateway and
can be configured to implicitly trust that it has checked earlier signatures and found them
to be correct. Hence there is not need to be able to "undo" these changes.</t>

</section>
<section anchor="addressing-dkim-replay"><name>Addressing DKIM-replay</name>

<t><strong>Issue:</strong></t>

<t>Because an email can currently be sent as "Bcc" such that there's no evidence in
the message data of who the recipient is expected to be, it's possible to take a
message that is correctly signed and replay it millions of times to different
destination addresses as if they had been BCC'd.  This message can be resent at
any time.</t>

<t><strong>Migitation:</strong></t>

<t>DKIM2 headers will always have timestamps so that "old" signatures have no value.</t>

<t>DKIM2 headers specify both "from" and "to" so that most opportunities to alter a
message, re-sign it and replay it at scale will no longer be possible.  Since the
"to" address is always encoded in the email, any email to multiple recipients must
be exploded by the sender, and each copy signed separately with different headers.</t>

<t>If the email is replayed (perhaps through a large system with many different
customers) then if the email does not say that it has been duplicated then signatures
can be assumed to be unique and hence simple caching (or Bloom filters) will identify
replays. If the email has been duplicated then recipients can assign a reputation to
the entity that did the duplication (along with the expected number of duplicates
that will arrive from that entity) and assess duplicate signatures on that basis.</t>

<t>If the email is altered before duplication then it is again the case that this will
be apparent to the recipient who can develop a reputation system for the entity that
did the modification and replay.</t>

</section>
<section anchor="algorithmic-dexterity"><name>Algorithmic dexterity</name>

<t>The specification will require both RSA and elliptic curve be implemented. If there
is IETF consensus around a "post-quantum" scheme then that will also be included. Experience
with DKIM1 is that everyone supports RSA keys and EC support is very patchy so we will
emphasize this aspect in bake-offs etc.</t>

<t>Dexterity will become essential if advances in cryptanalysis cause a particular type of algorithm
to become deprecated. To allow a phased switch away from such an algorithm we will make provision
for more than one signature to be present in a single DKIM2 header. Systems capable of checking
both signatures will require both to be correct. If only one signature is correct then email
will be rejected with a clear message -- allowing interworking issues to be easily debugged.</t>

</section>
<section anchor="reducing-crypto-calculations"><name>Reducing crypto-calculations</name>

<t>Experience at large mailbox providers is that incoming messages can have large numbers of DKIM
signatures all of which need to be checked. For DKIM2, in the common case where email has
not been altered by earlier hops, it will only be necessary to check the first DKIM2 signature,
the one applied by the previous hop and, if "feedback" is to be provided, the signatures of
any entities that have requested feedback.</t>

<t>If DKIM-replay is felt to be an issue (and some providers will detect this by
identifying non-unique signatures) then more DKIM2 headers may need to be processed
to establish the veracity of an alleged forwarding path. Additionally any attempt to
do forensics or to assign reputation to intermediates will require more signatures
to be checked.</t>

</section>
</section>
<section anchor="dkim2-header-fields"><name>DKIM2 header fields</name>

<t>DKIM2 headers will have the following fields</t>

<texttable>
      <ttcol align='left'>Field identifier</ttcol>
      <ttcol align='left'>Explanation</ttcol>
      <c>i=</c>
      <c>Sequence Number (from 1 to N)</c>
      <c>t=</c>
      <c>Timestamp</c>
      <c>ds=</c>
      <c>Signing key identifier (domain &amp; selector)</c>
      <c>a=</c>
      <c>Crypto algorithm(s) used (unless combined with b= to allow for multiple signatures on the same email, see discussion of crypto-agility above)</c>
      <c>b=</c>
      <c>Signature over hash value strings (DKIM uses b=)</c>
      <c>bh=</c>
      <c>Body hash value (see discussion)</c>
      <c>h=</c>
      <c>Extra headers signed by this hop</c>
      <c>m=</c>
      <c>Indicates if mail has been modified or exploded</c>
      <c>z=</c>
      <c>Next hop does not support DKIM2 (see below)</c>
      <c>mf=</c>
      <c>RFC5321.mail-from</c>
      <c>rt=</c>
      <c>RFC5321.rcpt-to</c>
      <c>fb=</c>
      <c>feedback requested for this email</c>
      <c>n=</c>
      <c>a nonce value (could use for database lookup for DSN handling)</c>
</texttable>

<t>At the first hop there cannot be any modification, so instead the z= field is used to indicate
a request by the sender that the email never be modified and/or never be “exploded” to multiple
recipients. This might be appropriate for some types of transactional email. Since it is only
a request, intermediaries may, by local policy, not honor it, but they SHOULD NOT relay
mail where the request has not been honored to third parties.</t>

<t>We will always hash headers in a "relaxed" mode (to use the DKIM1 jargon). For the body we will
always use "relaxed" because that is the usual scheme for DKIM1. Relaxed is more expensive than
"simple" but there have been concerns about expressed about interworking. The vast majority of
DKIM1 email (99%+) uses relaxed/relaxed.</t>

<t>The hashes of the header and the body can be placed into the DKIM2 header field, and then
a signature is applied. Alternatively we could define a signature over the hashes but
not record their values. The second is neater but the former does allow an unchanged body
hash to just be copied and may assist in diagnosing faults. Note also, that there is no
technical reason for computing two hashes rather than one, but the presence of an
obviously unchanged body hash may again be useful for fault diagnosis and may assist
humans in reasoning about how and where changes were made to the body.</t>

<t>The nonce value is available for any purpose, but may well be used as an index
into a database to access meta-data about an email that has been handled in the
past. DKIM2 signatures expire after a fixed period (a week would be appropriate) so that
it is not necessary to hold information for indefinite periods or to handle DSNs
for email that was delivered long ago.</t>

<t>Note that we have not included a version number. Experience from MIME onwards shows
that it is essentially impossible to change version numbers. If it becomes necessary to
change DKIM2 in the sort of incompatible way that a v=2 / v=3 version number would
support, we recommend using header fields labeled DKIM3 instead.</t>

<t>For simplicity using single characters before the = would be good, but we quickly run
out of obvious relevant letters. Where there is a match to DKIM1 fields these have
been copied (though this is merely to assist humans, it's unlikely to affect any code).</t>

<section anchor="maximum-value-for-i"><name>Maximum value for i=</name>

<t>There will be an absolutely maximum value of 255 for i=; though realistically we
should be able to bring this value back down to about 50.</t>

</section>
<section anchor="maximum-age-for-t"><name>Maximum age for t=</name>

<t>For a message in transit, the timestamp MUST be less than one week ago.  For bounces,
they MUST be returned to their source within 2 weeks of the timestamp on hop i=1.
This requires that as the destination, you MUST create the bounce within 1 week of receipt.</t>

</section>
<section anchor="registry-of-values-for-m"><name>Registry of values for m=</name>

<texttable>
      <ttcol align='left'>Value</ttcol>
      <ttcol align='left'>Purpose</ttcol>
      <c>nomodify</c>
      <c>Any hop that adds this requires no modifications; anybody later hop must either reject it or agree to pass it on unmodified</c>
      <c>header</c>
      <c>This hop has modified the headers; a separate header lists the algebra to revert the changes</c>
      <c>body</c>
      <c>This hop has modified the body; a separate header lists the algebra to revert the changes</c>
      <c>complex</c>
      <c>This hop has done something complex and there is no way to revert it</c>
</texttable>

<t>If there is no "m" value then this hop asserts it has not modified either the body nor any header covered by a previous DKIM2 signature.</t>

</section>
<section anchor="registry-of-values-for-z"><name>Registry of values for z=</name>

<t>Not present - the message staying in the DKIM2 world; the next hop has stated it supports DKIM2 and will be able to sign
the next hop with a key which is domain aligned to the to= address on this message.</t>

<t>z=y - the next hop does not support DKIM2 or does not have a key for the destination domain.</t>

</section>
<section anchor="value-for-the-fb-header"><name>Value for the fb= header</name>

<t>Not present, do not send feedback for this email to the signing domain</t>

<t>fb=y - this signing domain would like to receive feedback about the disposition of this email (e.g. percentage reported as spam).</t>

</section>
</section>
<section anchor="checking-hashes"><name>Checking hashes</name>

<t>For clarity this is written as if there is only one hash and signature to check, whereas there
may in fact be one for the header and one for the body. Issues with DNS will cause <xref target="RFC5321"/>
4xx responses to be sent.</t>

<section anchor="step-1"><name>Step 1</name>

<t>Find the latest DKIM2 signature and determine if the email as received matches that hash
AND that you are named as the destination of the email AND that the mail is coming from
the named source. If not then refuse to accept the email. The previous hop is responsible
for the email (they have either forged it or mangled it -- either way it is their problem).</t>

<t>If this check passes then other checks can either be done at delivery time or the mail
can be accepted and if later rejected there is a valid path back to the sender over
which a DSN can be sent.</t>

<t>If it is decided, by local policy, to accept an email where the hash fails (or you are
not the documented recipient) then DSN messages back along the chain MUST NOT be sent.</t>

</section>
<section anchor="step-2"><name>Step 2</name>

<t>Find the first DKIM2 header (numbered 1) and determine if the email as received has
the same hash as recorded there. If so, you know the email has not been altered on
its way to you. The path it has followed is most likely irrelevant for deciding what
to do with it.</t>

</section>
<section anchor="dealing-with-modifications"><name>Dealing with modifications.</name>

<t>Find the highest numbered DKIM2 header that reports a modification. Undo the modification
and repeat. When all modifications have been done then there should be a match
with the original signature (at hop1). If not then the email has been altered (in an
undocumented manner) on its way to you and it SHOULD be rejected.</t>

<t>Note that it is not necessary to check the signature on a DKIM2 header that reports
a modification. Undoing the modification and discovering that the message can now
be authenticated is sufficient.</t>

<t>Over time a reputation can be developed for a intermediary which is making
modifications and given sufficient trust then the "undo" step could be skipped. Note
that the signature of the DKIM2 header that reports the modification would need
to be checked to ensure reputation accrued to the correct entity.</t>

<t>If the modification is substantial (eg URLs rewritten, MIME parts removed) and
it cannot be undone then the receiver (who may not be the immediate next hop)
MUST trust the system doing the modification. If it does not then the mail
SHOULD be rejected.</t>

<t>It will be noted that some modifications can totally change the meaning of
an email. This specification does not try to limit modifications. We believe
that being able to attribute modifications to a particular entity will allow
reliable blocking of malicious intermediaries once they are identified.</t>

</section>
<section anchor="dealing-with-replays"><name>Dealing with replays</name>

<t>Checking source and destination as recorded by the previous hop makes many
“DKIM replay” scenarios impossible.</t>

<t>It is possible to exclude all replays by determining if any DKIM2 header reports an
expansion event (one incoming email resulting in multiple further emails). If not
then you would expect that the (original) hash of the email is unique and duplicates
can be rejected.</t>

<t>If a expansion event is recorded then receiving multiple copies would not
be a surprise. It will be necessary to use local policy to assess whether the
number of copies received is acceptable or not.</t>

<t>Over time you may wish to develop a reputation for a DKIM2 identity which is
doing expansions and conclude that a specific number of copies is to be expected.
This can be used to refine local policy.</t>

</section>
</section>
<section anchor="feedback-loops"><name>Feedback loops</name>

<t>Some mailbox providers are prepared to report their, or their customers',
opinions about incoming email -- for example: that a customer marked a
particular email as "spam". These systems are generally called "feedback
loops".</t>

<t>There are usually bureaucratic systems to ensure reports are only sent to
entities that wish to receive them and the mailbox provider may decide that
some entities should not be sent any feedback.</t>

<t>The senders of email, the originator and/or a commercial company (an ESP)
hired to send the email generally favor feedback loops because it allows
them to make their emails more acceptable, and the commercial companies
can rapidly become aware of customers whose email is widely disliked.</t>

<t>In DKIM2 any intermediary can request feedback, but it is still the decision
of the mailbox provider as to whether any feedback will be sent. They may
still require pre-registration on a per domain basis to receive feedback
if only to ensure that any nominated email address is appropriate and is
not an unsuspecting third party.</t>

<t>Note that feedback can be sent to any requesting entity. There is nothing
special about a requester being at hop1 or hop2 on a chain. In particular
some forwarding systems late in the chain may wish to become aware if they
are forwarding emails that are then reported to be spam.</t>

</section>
<section anchor="dkim1dkim2-interworking"><name>DKIM1/DKIM2 Interworking</name>

<t>Note that DKIM2 signed email can also be DKIM1 signed.</t>

<t>DKIM2 capable servers will announce the capability in their initial banner
in the usual manner for SMTP extensions.</t>

<t>A DKIM2 capable client connecting to a DKIM2 capable server will append
a "rcpt parameter" to the RCPT TO command to query whether or not the
particular destination domain if DKIM2 capable -- viz: that it will be able to
sign DKIM2 headers if email is relayed or sign a DSN if an email is
rejected. A specific 5xx response will indicate that the domain is not
DKIM2 capable.</t>

<figure><artwork><![CDATA[
e.g. RCPT TO: <person@example.com> DKIM2
]]></artwork></figure>

<t>If a DKIM2 capable server finds that it will have to pass an email to a
non-DKIM2 server or that the relevant domain is not DKIM2 capable
then a special DKIM2 header will be added to the email, as an extra
hop, (using the z= parameter) to indicate that the message is leaving
the DKIM2 world. The message can then be sent using a RCPT TO command
without the DKIM2 rcpt parameter (perhaps immediately in the same
SMTP connection).</t>

<t>It may be inconvenient for a server to generate and sign a DKIM2 header
whilst the SMTP conversation is occurring. If so, then it will be necessary
to maintain a database of whether a particular destination is expected to
support DKIM2 or not and pre-sign accordingly. In the event that expectations
are not met then the SMTP conversation would be abandoned and the email re-queued
after appropriate modification.</t>

<t>If a DKIM2 capable server receives an email which has a z= field in the latest
DKIM2 header then if the original signature is correct (perhaps after
undoing documented modifications) then all is well and delivery
can continue as normal. Otherwise the server can either, by local policy,
accept a known-to-be-mutilated email OR it can generate a DSN and send it
to the last DKIM2 server. It SHOULD NOT reject delivery because a non-DKIM2
aware system will generate a delivery failure message to the SMTP return
path address which is not appropriate.</t>

<t>Note that is inherent in the DKIM2 design that emails are only ever
sent to one recipient at a time. At present some mail servers will
batch deliveries together if they are going to the same destination
and issue multiple RCPT TO commands in the SMTP protocol conversation.
This is not possible with DKIM2 because each email must document a
single RFC5321 destination in the rt= parameter. This may seem
inefficient but only about 1% of email is currently delivered using
multiple RCPT TO commands.</t>

</section>
<section anchor="security"><name>Security</name>

<t>TBA</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>TBA</t>

</section>


  </middle>

  <back>



    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC4871">
  <front>
    <title>DomainKeys Identified Mail (DKIM) Signatures</title>
    <author fullname="E. Allman" initials="E." surname="Allman"/>
    <author fullname="J. Callas" initials="J." surname="Callas"/>
    <author fullname="M. Delany" initials="M." surname="Delany"/>
    <author fullname="M. Libbey" initials="M." surname="Libbey"/>
    <author fullname="J. Fenton" initials="J." surname="Fenton"/>
    <author fullname="M. Thomas" initials="M." surname="Thomas"/>
    <date month="May" year="2007"/>
    <abstract>
      <t>DomainKeys Identified Mail (DKIM) defines a domain-level authentication framework for email using public-key cryptography and key server technology to permit verification of the source and contents of messages by either Mail Transfer Agents (MTAs) or Mail User Agents (MUAs). The ultimate goal of this framework is to permit a signing domain to assert responsibility for a message, thus protecting message signer identity and the integrity of the messages they convey while retaining the functionality of Internet email as it is known today. Protection of email identity may assist in the global control of "spam" and "phishing". [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4871"/>
  <seriesInfo name="DOI" value="10.17487/RFC4871"/>
</reference>

<reference anchor="RFC5321">
  <front>
    <title>Simple Mail Transfer Protocol</title>
    <author fullname="J. Klensin" initials="J." surname="Klensin"/>
    <date month="October" year="2008"/>
    <abstract>
      <t>This document is a specification of the basic protocol for Internet electronic mail transport. It consolidates, updates, and clarifies several previous documents, making all or parts of most of them obsolete. It covers the SMTP extension mechanisms and best practices for the contemporary Internet, but does not provide details about particular extensions. Although SMTP was designed as a mail transport and delivery protocol, this specification also contains information that is important to its use as a "mail submission" protocol for "split-UA" (User Agent) mail reading systems and mobile environments. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5321"/>
  <seriesInfo name="DOI" value="10.17487/RFC5321"/>
</reference>

<reference anchor="RFC5322">
  <front>
    <title>Internet Message Format</title>
    <author fullname="P. Resnick" initials="P." role="editor" surname="Resnick"/>
    <date month="October" year="2008"/>
    <abstract>
      <t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of "electronic mail" messages. This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, "Standard for the Format of ARPA Internet Text Messages", updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5322"/>
  <seriesInfo name="DOI" value="10.17487/RFC5322"/>
</reference>

<reference anchor="RFC8617">
  <front>
    <title>The Authenticated Received Chain (ARC) Protocol</title>
    <author fullname="K. Andersen" initials="K." surname="Andersen"/>
    <author fullname="B. Long" initials="B." role="editor" surname="Long"/>
    <author fullname="S. Blank" initials="S." role="editor" surname="Blank"/>
    <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy"/>
    <date month="July" year="2019"/>
    <abstract>
      <t>The Authenticated Received Chain (ARC) protocol provides an authenticated "chain of custody" for a message, allowing each entity that handles the message to see what entities handled it before and what the message's authentication assessment was at each step in the handling.</t>
      <t>ARC allows Internet Mail Handlers to attach assertions of message authentication assessment to individual messages. As messages traverse ARC-enabled Internet Mail Handlers, additional ARC assertions can be attached to messages to form ordered sets of ARC assertions that represent the authentication assessment at each step of the message-handling paths.</t>
      <t>ARC-enabled Internet Mail Handlers can process sets of ARC assertions to inform message disposition decisions, identify Internet Mail Handlers that might break existing authentication mechanisms, and convey original authentication assessments across trust boundaries.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8617"/>
  <seriesInfo name="DOI" value="10.17487/RFC8617"/>
</reference>




    </references>




<?line 576?>

<section anchor="changes-from-earlier-versions"><name>Changes from Earlier Versions</name>

<t>[[This section to be removed by RFC Editor]]</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

