<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.0.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-gondwana-dkim2-motivation-02" category="std" consensus="true" submissionType="IETF" obsoletes="4686" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="DKIM2 Motivation">DKIM2 Why DKIM needs replacing, and what a replacement would look like</title>

    <author initials="B." surname="Gondwana" fullname="Bron Gondwana">
      <organization>Fastmail Pty Ltd</organization>
      <address>
        <postal>
          <street>Level 2, 114 William Street</street>
          <code>3000</code>
          <country>Australia</country>
        </postal>
        <phone>+61 457 416 436</phone>
        <email>brong@fastmailteam.com</email>
      </address>
    </author>
    <author initials="R." surname="Clayton" fullname="Richard Clayton">
      <organization>Yahoo</organization>
      <address>
        <email>rclayton@yahooinc.com</email>
      </address>
    </author>
    <author initials="W." surname="Chuang" fullname="Wei Chuang">
      <organization>Google</organization>
      <address>
        <email>weihaw@google.com</email>
      </address>
    </author>

    <date year="2025" month="March" day="03"/>

    
    
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 43?>

<t>This memo provides a rationale for replacing the existing email security
mechanisms with a new mechanism based around a more strongly authenticated
email delivery pathway, including an asynchronous return channel.</t>



    </abstract>



  </front>

  <middle>


<?line 49?>

<section anchor="background-and-motivations"><name>Background and motivations</name>

<t>In 2007, <xref target="RFC4871"/> (Domain Key Identified Mail / DKIM) was published, outlining a
mechanism for a domain to sign email in a way that recipients could ensure
that the email had come from an entity possessing the secret key matching
a public key published in the DNS by the source domain. For clarity in this
document we call this established scheme "DKIM1".</t>

<t><xref target="RFC4871"/> has been updated and extended many times since then, and a
large amount of operational experience has been gained using it.</t>

<t>There are a number of things beyond authenticating email that would be useful
for mail system operators, particularly when it travels through multiple hops.
There have been other attempts to solve some of these problems, e.g.
<xref target="RFC8617"/> (Authenticated Received Chain / ARC), however they have not
achieved the same level of widespread use as DKIM1.</t>

<t>This document proposes solving these related problems in a holistic way,
by having every hop in a forwarding chain responsible for:</t>

<t><list style="numbers" type="1">
  <t>verifying the path that messages have taken to get to it, including by
being able to reverse modifications or by asserting that it trusts the
previous hop unconditionally.</t>
  <t>declaring (under protection of its own signature) where the message is being
sent to next.</t>
  <t>promising that it will pass control messages (including bounces, abuse
reports and delivery notifications) back to the previous hop for a
reasonable time.</t>
</list></t>

<t>There is no way to add these properties to existing DKIM1 in a way which
is both backwards and forwards compatible, so any new specification will need
new headers so that it not mis-interpreted by DKIM1 verifiers which are
unaware of the new specfication.</t>

</section>
<section anchor="some-properties-that-will-be-required-to-deliver-on-these-goals"><name>Some properties that will be required to deliver on these goals</name>

<section anchor="a-single-recipient-per-signature"><name>A single recipient per signature</name>

<t>By only allowing precisely one destination address per DKIM2-signed email, and
encoding that address in the signature, messages will be unable to be replayed
to any other destination.  This allows recipients to confirm that they are the
intended next hop for a message, and reject any message that is incorrectly
formed.</t>

<t>Even if a message is BCC'd, the copy of that message sent to the BCC'd recipient
will have their own address in the DKIM2 signature, so replay to arbitrary
addresses is no longer possible.</t>

<t>During initial evaluation, there will be a period where receivers maintain a
list of known dkim2-unaware forwarders and a longer term solution will be
sought out; however we feel that the benefits of DKIM2 in identifying mail
flow participants will help improve getting wanted email to their recipients,
thereby driving adoption.</t>

</section>
<section anchor="a-chain-of-aligned-dkim2-signatures-over-smtp-fromto-pairs"><name>A chain of aligned DKIM2 signatures over SMTP from/to pairs</name>

<t>If the recipient wishes to forward the message on to another address, it must
apply its own DKIM2 header, signed by a key which is aligned to the domain of
the recipient address in the previous DKIM2 header, and with a bounce address
which is in the same domain.</t>

<t>Both of the above requirements mean that every SMTP transaction for DKIM2 messages
will, by necessity, have only a single recipient.  Any email to multiple people,
alias that expands to multiple addresses, or mailing list, will create a different
next-hop signature for each distinct destination address.</t>

<t>The end result is, like ARC, a chain of domains which have handled the message;
however unlike ARC, this chain MUST be fully linked in both directions, with
every sending address aligning to the recipient address of the previous DKIM2
header.</t>

</section>
<section anchor="a-signed-bounce-format-sent-in-reverse-along-the-same-path"><name>A signed bounce format, sent in reverse along the same path</name>

<t>In DKIM2, DSNs are passed back along the same path.  This solves the issue with
Email Service Providers (ESPs, entities that specialise in sending email on
behalf of others) wanting error reports.  The ESP will see the DSN and, depending
on contractual arrangements, may be able to avoid passing this message any further
back along the chain.</t>

<t>Since the DSN messages always go back up the DKIM2 chain, any hop can strip off the
higher number (i=) records; including the sender and recipient addresses for them,
and create a bounce as if the forwarder itself was doing the rejection.
As asynchronous bounces will be common in DKIM2, this is indistinguishable to the
sender, allowing privacy-preserving forwarders to seamlessly operate.</t>

<t>Passing bounces back along the outgoing path also allows mailing lists to take
responsibility for the event and not bother the person who sent a message to the list.</t>

<t>Provided that an email is correctly signed when received, it can be rejected at
a later point in time. The DSN will be sent to the immediately preceding intermediary.
Since the bounce travels back along the (fully authenticated) incoming path it
cannot be sent to an uninvolved third party.</t>

</section>
<section anchor="a-way-to-describe-changes"><name>A way to describe changes</name>

<t>DKIM2 will define an algebra for describing how to reverse any changes to
create the prior binary data, by inspecting the diff between the two versions,
recipients will be able to see who injected bad content.</t>

<t>Mailing lists (or alumni forwarders etc.) that alter the Subject header field
(or other <xref target="RFC5322"/> headers) will record the previous header field contents.
This is easy to undo for checking purposes.</t>

<t>Mailing lists that add text (either to a simple email body or one or more MIME parts
within the body) will record details of the text they have added. This text can then be
removed when checking earlier signatures.</t>

<t>We expect an "algebra" describing changes to be in a stand-alone document.</t>

</section>
<section anchor="simplification-of-signed-header-list"><name>Simplification of signed header list</name>

<t>While this part is not strictly necessary to achieve the goals above, some headers must be signed
to get the guarantees, so rather than say that certain headers must be listed,
DKIM2 will specify a fixed set of always-signed headers in accordance with now
well-established best practice (and insist they are unique) so there will be no
need to list what is signed in the common case.</t>

<t>However, some exotic headers may need to be signed for unusual or future use-cases.
DKIM2 will still allow for extended headers.</t>

<t>As the modification algebra allows for reversing changes to headers, it will not
be necessary to oversign as any "extra" headers matching a signature must be either
removed by the modification algebra, or break the signature.</t>

<t>Any future hop must continue to sign any headers that were signed by previous
hops, even if they removed the header via modification algebra they needs to
sign the lack of it, so that modifications can be correctly checked.</t>

</section>
<section anchor="security-gateways"><name>Security gateways</name>

<t>There are some types of alteration, for example by security gateways, that may
be impractical to describe in a cost-effective manner.</t>

<t>We would expect that outgoing gateways that may be adding disclaimers or rewriting
internal identifiers would be provided with appropriate signing keys so that they
could be the "first hop" as far as the rest of the email handling chain is concerned.</t>

<t>Incoming security gateways may be making substantial changes. Typically they
will remove problematic types of attachment and rewrite URLs to use "interstitials".
Since this type of functionality is generally provided on a contracted basis
further intermediaries will be fully aware of the presence of the security gateway and
can be configured to implicitly trust that it has checked earlier signatures and found them
to be correct. Hence there is no need to be able to "undo" these changes.</t>

</section>
</section>
<section anchor="goals-ot-be-addressed-by-dkim2"><name>Goals ot be addressed by DKIM2</name>

<section anchor="dkim-replay"><name>DKIM-replay</name>

<t>Because an email can currently be sent as "Bcc" such that there's no evidence in
the message data of who the recipient is expected to be, it's possible to take a
message that is correctly signed and replay it millions of times to different
destination addresses as if they had been BCC'd.  This message can be resent at
any time.</t>

<t>DKIM2 headers will always have timestamps so that "old" signatures have no value.</t>

<t>A possibility to be investigated during testing is a "singleton" flag to
allow senders to specify that this is a message for a single recipient (e.g.
for authentication codes for billing transactions) and should not be expanded
by mailing lists.</t>

<t>DKIM2 headers specify both "from" and "to" so that most opportunities to alter a
message, re-sign it and replay it at scale will no longer be possible.  Since the
"to" address is always encoded in the email, any email to multiple recipients must
be exploded by the sender, and each copy signed separately with different headers.</t>

<t>If the email is replayed (perhaps through a large system with many different
customers) then if the email does not say that it has been duplicated then signatures
can be assumed to be unique and hence simple caching (or Bloom filters) will identify
replays. If the email has been duplicated then recipients can assign a reputation to
the entity that did the duplication (along with the expected number of duplicates
that will arrive from that entity) and assess duplicate signatures on that basis.</t>

<t>If the email is altered before duplication then it is again the case that this will
be apparent to the recipient who can develop a reputation system for the entity that
did the modification and replay.</t>

</section>
<section anchor="backscatter"><name>Backscatter</name>

<t>The problem of backscatter, delivery status notifications sent to innocent third
parties who had their address forged as the source of a message, has caused
email recipients to implement a variety of countermeasures:</t>

<t><list style="symbols">
  <t>in-band scanning: performing detailed analysis of the email content before
replying to the DATA phase of the SMTP transaction, allowing immediate rejection
but consuming resources on both ends of the connection, and limiting the time
that can be used for the analysis to avoid timeouts.</t>
  <t>greylisting: replying with a temporary failure code to untrusted senders, allowing
time to decide if the sender is trustworthy enough, but also delaying mail for an
indeterminate period.</t>
  <t>delivery to "Spam" or "Junk" mailboxes - in some jurisdictions it's not allowed to
discard email that has been accepted, so providers must put the copy somewhere once
they have accepted it, filling Junk mailboxes even if they're very sure it's bad.</t>
</list></t>

<t>By requiring bounce addresses to aligned with the most recent signature domain,
we can avoid backscatter, allowing recipients to always take the message, and
later return a bounce.  This fulfils any legal obligation to inform the sender
if the message isn't delivered, while also avoiding the timeout and greylisting
re-connection issue that currently exists, so messages are spooled for less time
on intermediates, and recipients can take their time to analyse messages; even
delivering the message to a mailbox and then upon receiving further intelligence,
undoing the delivery and generating a bounce.</t>

<t>Privacy-preserving forwarding services will also see every bounce from any
dkim2-supporting destination mailbox, allowing them to strip off the details
of the further hop(s) and generate a bounce as if they had been the terminal
node of the delivery and were just making a delayed decision.</t>

</section>
</section>
<section anchor="other-areas-of-interest"><name>Other areas of interest</name>

<section anchor="algorithmic-dexterity"><name>Algorithmic dexterity</name>

<t>The final specification will require both RSA and elliptic curve be implemented
for algorithmic agility.  However this document acknowledges the long standing
lack of adoption of elliptic curve ,and elliptic curve support may not be needed
for development.  The specifications will provide support for multiple algorithms.
If there is IETF consensus around a "post-quantum" scheme then that will also be
included.</t>

<t>Dexterity will become essential if advances in cryptanalysis cause a particular type of algorithm
to become deprecated. To allow a phased switch away from such an algorithm we will make provision
for more than one signature to be present in a single DKIM2 header. Systems capable of checking
both signatures will require both to be correct. If only one signature is correct then email
will be rejected with a clear message -- allowing interworking issues to be easily debugged.</t>

</section>
<section anchor="reducing-crypto-calculations"><name>Reducing crypto-calculations</name>

<t>Experience at large mailbox providers is that incoming messages can have large numbers of DKIM
signatures all of which need to be checked. For DKIM2, in the common case where email has
not been altered by earlier hops, it will only be necessary to check the first DKIM2 signature,
the one applied by the previous hop and, if "feedback" is to be provided, the signatures of
any entities that have requested feedback.</t>

<t>If DKIM-replay is felt to be an issue (and some providers will detect this by
identifying non-unique signatures) then more DKIM2 headers may need to be processed
to establish the veracity of an alleged forwarding path. Additionally any attempt to
do forensics or to assign reputation to intermediaries will require more signatures
to be checked.</t>

</section>
</section>
<section anchor="security"><name>Security</name>

<t>TBA</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>TBA</t>

</section>


  </middle>

  <back>



    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC4871">
  <front>
    <title>DomainKeys Identified Mail (DKIM) Signatures</title>
    <author fullname="E. Allman" initials="E." surname="Allman"/>
    <author fullname="J. Callas" initials="J." surname="Callas"/>
    <author fullname="M. Delany" initials="M." surname="Delany"/>
    <author fullname="M. Libbey" initials="M." surname="Libbey"/>
    <author fullname="J. Fenton" initials="J." surname="Fenton"/>
    <author fullname="M. Thomas" initials="M." surname="Thomas"/>
    <date month="May" year="2007"/>
    <abstract>
      <t>DomainKeys Identified Mail (DKIM) defines a domain-level authentication framework for email using public-key cryptography and key server technology to permit verification of the source and contents of messages by either Mail Transfer Agents (MTAs) or Mail User Agents (MUAs). The ultimate goal of this framework is to permit a signing domain to assert responsibility for a message, thus protecting message signer identity and the integrity of the messages they convey while retaining the functionality of Internet email as it is known today. Protection of email identity may assist in the global control of "spam" and "phishing". [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4871"/>
  <seriesInfo name="DOI" value="10.17487/RFC4871"/>
</reference>

<reference anchor="RFC5321">
  <front>
    <title>Simple Mail Transfer Protocol</title>
    <author fullname="J. Klensin" initials="J." surname="Klensin"/>
    <date month="October" year="2008"/>
    <abstract>
      <t>This document is a specification of the basic protocol for Internet electronic mail transport. It consolidates, updates, and clarifies several previous documents, making all or parts of most of them obsolete. It covers the SMTP extension mechanisms and best practices for the contemporary Internet, but does not provide details about particular extensions. Although SMTP was designed as a mail transport and delivery protocol, this specification also contains information that is important to its use as a "mail submission" protocol for "split-UA" (User Agent) mail reading systems and mobile environments. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5321"/>
  <seriesInfo name="DOI" value="10.17487/RFC5321"/>
</reference>

<reference anchor="RFC5322">
  <front>
    <title>Internet Message Format</title>
    <author fullname="P. Resnick" initials="P." role="editor" surname="Resnick"/>
    <date month="October" year="2008"/>
    <abstract>
      <t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of "electronic mail" messages. This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, "Standard for the Format of ARPA Internet Text Messages", updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5322"/>
  <seriesInfo name="DOI" value="10.17487/RFC5322"/>
</reference>

<reference anchor="RFC8617">
  <front>
    <title>The Authenticated Received Chain (ARC) Protocol</title>
    <author fullname="K. Andersen" initials="K." surname="Andersen"/>
    <author fullname="B. Long" initials="B." role="editor" surname="Long"/>
    <author fullname="S. Blank" initials="S." role="editor" surname="Blank"/>
    <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy"/>
    <date month="July" year="2019"/>
    <abstract>
      <t>The Authenticated Received Chain (ARC) protocol provides an authenticated "chain of custody" for a message, allowing each entity that handles the message to see what entities handled it before and what the message's authentication assessment was at each step in the handling.</t>
      <t>ARC allows Internet Mail Handlers to attach assertions of message authentication assessment to individual messages. As messages traverse ARC-enabled Internet Mail Handlers, additional ARC assertions can be attached to messages to form ordered sets of ARC assertions that represent the authentication assessment at each step of the message-handling paths.</t>
      <t>ARC-enabled Internet Mail Handlers can process sets of ARC assertions to inform message disposition decisions, identify Internet Mail Handlers that might break existing authentication mechanisms, and convey original authentication assessments across trust boundaries.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8617"/>
  <seriesInfo name="DOI" value="10.17487/RFC8617"/>
</reference>




    </references>




<?line 302?>

<section anchor="changes-from-earlier-versions"><name>Changes from Earlier Versions</name>

<t>[[This section to be removed by RFC Editor]]</t>

<section anchor="draft-gondwana-dkim2-motivation-02"><name>draft-gondwana-dkim2-motivation-02:</name>

<t><list style="symbols">
  <t>changed section title because DKIM1/2 do not really interwork as such</t>
  <t>removed implementation details, this is the motivation doc</t>
  <t>significant rewrite based on feedback from mailing list</t>
</list></t>

</section>
<section anchor="draft-gondwana-dkim2-motivation-01"><name>draft-gondwana-dkim2-motivation-01:</name>

<t><list style="symbols">
  <t>remove the <spanx style="verb">z=</spanx> parameter on the grounds that it adds too much complexity</t>
  <t>document that messages MUST NOT re-enter the DKIM2 world once the chain
has been broken.</t>
</list></t>

</section>
<section anchor="draft-gondwana-dkim2-motivation-00"><name>draft-gondwana-dkim2-motivation-00:</name>

<t><list style="symbols">
  <t>initial version</t>
</list></t>

</section>
</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

