<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.0.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-ietf-dkim-dkim2-motivation-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="DKIM2 Motivation">DKIM2 - signing the source and destination of every email</title>

    <author initials="B." surname="Gondwana" fullname="Bron Gondwana">
      <organization>Fastmail</organization>
      <address>
        <email>brong@fastmailteam.com</email>
      </address>
    </author>
    <author initials="R." surname="Clayton" fullname="Richard Clayton">
      <organization>Yahoo</organization>
      <address>
        <email>rclayton@yahooinc.com</email>
      </address>
    </author>
    <author initials="W." surname="Chuang" fullname="Wei Chuang">
      <organization>Google</organization>
      <address>
        <email>weihaw@google.com</email>
      </address>
    </author>

    <date year="2025" month="September" day="03"/>

    
    
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 39?>

<t>This memo provides a rationale for replacing the existing email security
mechanisms with a new mechanism based around a more strongly authenticated
email delivery pathway, including an asynchronous return channel.</t>



    </abstract>



  </front>

  <middle>


<?line 45?>

<section anchor="background-and-motivations"><name>Background and motivations</name>

<t>In 2007, <xref target="DKIM"/> (Domain Key Identified Mail / DKIM) was published, outlining a
mechanism for a domain to sign email in a way that recipients could ensure
that the email had come from an entity possessing the secret key matching
a public key published in the DNS by the source domain.</t>

<t><xref target="DKIM"/> has been updated and extended many times since then, and a
large amount of operational experience has been gained using it.</t>

<t>There are a number of things beyond authenticating the original email that would be useful
for mail system operators, particularly when it travels through multiple hops.
There have been other attempts to solve some of these problems, e.g.
<xref target="ARC"/> (Authenticated Received Chain / ARC), however they have not
achieved the same level of widespread use as DKIM.</t>

<t>This document proposes solving these related problems in a holistic way,
by having every hop in a forwarding chain responsible for:</t>

<t><list style="numbers" type="1">
  <t>verifying the path that messages have taken to get to it, including by
being able to reverse modifications or by asserting that it trusts the
previous hop unconditionally.</t>
  <t>declaring (under protection of its own signature) where the message is being
sent to next.</t>
  <t>promising that it will pass control messages (including bounces, abuse
reports and delivery notifications) back to the previous hop for a
reasonable time.</t>
</list></t>

<t>There is no way to add these properties to existing DKIM in a way which
is both backwards and forwards compatible, so a new specification will need
new headers so that it not mis-interpreted by DKIM verifiers which are
unaware of the new specfication.</t>

</section>
<section anchor="some-properties-that-will-be-required-to-deliver-on-these-goals"><name>Some properties that will be required to deliver on these goals</name>

<section anchor="explicit-signing-of-all-legitimate-recipients-for-each-message"><name>Explicit signing of all legitimate recipients for each message</name>

<t>By ensuring that the complete list of legitimate recipients for a message is
encoded in the signed content of the message, it will become possible for receiving
systems to confirm that they are the intended next hop for a message, and
reject messages which the signer did not intend for them to receive.</t>

<t>Even if a message is BCC'd, a copy of that message sent to the BCC
recipient can have that recipient address mentioned, without sending
the same exact copy to the other recipients.</t>

<t>This mechanism does not survive naive forwarders, where the new destination
address will not be explicitly mentioned, however a recipient system can
track which addresses forward to it, and accept just those.</t>

<t>Over time as more software is updated to add signatures, the need to
use heuristics becomes smaller, and eventually it will become possible
to reject any messages where the <xref target="SMTP"/> RCPT TO forward-path
addresses are not all present in the highest signature number header.</t>

</section>
<section anchor="a-chain-of-aligned-signatures-over-multiple-smtp-transactions"><name>A chain of aligned signatures over multiple SMTP transactions</name>

<t>By having the initial signature be from the domain aligned to the From or
Sender header, and each following hop adding its own signature with the
domain of the recipient of the previous hop, it is possible to create a
chain of custody where each recipient has confirmed that it should have
received the message, and then signed the content with a key for its
own domain.</t>

<t>If the recipient wishes to forward the message on to another address, it must
apply its own DKIM2 header, signed by a key which is aligned to the domain of
the recipient address in the previous DKIM2 header, and with a bounce address
which is in the same domain.</t>

<t>The end result is, like ARC, a chain of domains which have handled the message;
however unlike ARC, this chain MUST be fully linked in both directions, with
every sending address aligning to the recipient address of the previous DKIM2
header.</t>

</section>
<section anchor="a-signed-bounce-format-sent-in-reverse-along-the-same-path"><name>A signed bounce format, sent in reverse along the same path</name>

<t>By having the mail-from address be signed and aligned to the signing domain, and
having the bounce format include the signature headers of the message being bounced,
it is required to have directly received the message to generate a bounce for it.
This requirement eliminates the ability to cause backscatter entirely, as bounces
can only go to a domain that sent the message, and only be sent from a domain which
explicitly received that message.</t>

<t>The ability to avoid backscatter will allow receiving systems to delay their
decisions about whether to accept a message, since they can make the decision
without holding the connection open.  This removes the need for mitigations like
greylisting and even reduces the need for junk mail folders in jurisdictions where
it is forbidden to discard messages once they are accepted.</t>

<t>Since the DSN messages always go back up the DKIM2 chain, any hop can strip off the
higher number (i=) records; including the sender and recipient addresses for them,
and create a bounce as if the forwarder itself was doing the rejection.</t>

<t>This would not be possible with SMTP-transaction-time rejection, as you can't
reliably hold open the connection from the previous hop while you talk to the
next hop.</t>

<t>As asynchronous bounces will be common in DKIM2, this case becomes indistinguishable
to the sender, allowing privacy-preserving forwarders to seamlessly operate.</t>

<t>Passing bounces back along the outgoing path also allows mailing lists to take
responsibility for the event and not bother the person who sent a message to the list.</t>

<t>Provided that an email is correctly signed when received, it can be rejected at
a later point in time. The DSN will be sent to the immediately preceding intermediary.
Since the bounce travels back along the (fully authenticated) incoming path it
cannot be sent to an uninvolved third party.</t>

</section>
<section anchor="a-way-to-describe-changes"><name>A way to describe changes</name>

<t>ARC describes a separate "Seal" header which which never gets modified, however
this still allows an intermediate to make massive changes to a message and claim
that it was still the original message.  If a message goes through more than one
set of modifications, it becomes impossible for the receiver to know what changes
were made by each intermediary.</t>

<t>By defining an algebra sufficient to describe how to undo common changes, we
can allow the receiver to compare the eventual message received with the original
message sent, and decide which parties involved in changing the message are
making the kind of changes that the recipient doesn't want.</t>

<t>Mailing lists (or alumni forwarders etc.) that alter the Subject header field
(or other <xref target="IMF"/> headers) will record the previous header field contents.
This is easy to undo for checking purposes.</t>

<t>Mailing lists that add text (either to a simple email body or one or more MIME parts
within the body) will record details of the text they have added. This text can then be
removed when checking earlier signatures.</t>

<section anchor="security-gateways"><name>Security gateways</name>

<t>There are some types of alteration, for example by security gateways, that may
be impractical to describe in a cost-effective manner.</t>

<t>We would expect that outgoing gateways that may be adding disclaimers or rewriting
internal identifiers would be provided with appropriate signing keys so that they
could be the "first hop" as far as the rest of the email handling chain is concerned.</t>

<t>Incoming security gateways may be making substantial changes. Typically they
will remove problematic types of attachment and rewrite URLs to use "interstitials".</t>

<t>Since this type of functionality is generally provided on a contracted basis,
further intermediaries will be fully aware of the presence of the security gateway and
can be configured to implicitly trust that it has checked earlier signatures and found them
to be correct. Hence there is no need to be able to "undo" these changes, however there's
still value in indicating which system made these changes.</t>

</section>
</section>
<section anchor="simplification-of-signed-header-list"><name>Simplification of signed header list</name>

<t>Currently DKIM signatures list a particular number of copies of each header field which
are included in the signature, and the signer can choose exactly which headers to sign.</t>

<t>It is both valuable to mandate a set of headers, and the existence of a change algebra
will allow us to insist that all copies of a named header field are always signed,
reducing the risk of header stuffing attacks.</t>

</section>
</section>
<section anchor="goals-to-be-addressed-by-dkim2"><name>Goals to be addressed by DKIM2</name>

<section anchor="dkim-replay"><name>DKIM-replay</name>

<t>Because an email can currently be sent as "Bcc" such that there's no evidence in
the message data of who the recipient is expected to be, it's possible to take a
message that is correctly signed and replay it millions of times to different
destination addresses as if they had been BCC'd.  This message can be resent at
any time.</t>

<t>DKIM2 headers will always have timestamps so that "old" signatures have no value.</t>

<t>A possibility to be investigated during testing is a "singleton" flag to
allow senders to specify that this is a message for a single recipient (e.g.
for authentication codes for billing transactions) and should not be expanded
by mailing lists.</t>

<t>DKIM2 headers specify both "from" and "to" so that most opportunities to alter a
message, re-sign it and replay it at scale will no longer be possible.  Since the
"to" address is always encoded in the email, any email to multiple recipients must
be exploded by the sender, and each copy signed separately with different headers.</t>

<t>If the email is replayed (perhaps through a large system with many different
customers) then if the email does not say that it has been duplicated then signatures
can be assumed to be unique and hence simple caching (or Bloom filters) will identify
replays. If the email has been duplicated then recipients can assign a reputation to
the entity that did the duplication (along with the expected number of duplicates
that will arrive from that entity) and assess duplicate signatures on that basis.</t>

<t>If the email is altered before duplication then it is again the case that this will
be apparent to the recipient who can develop a reputation system for the entity that
did the modification and replay.</t>

</section>
<section anchor="backscatter"><name>Backscatter</name>

<t>The problem of backscatter, delivery status notifications sent to innocent third
parties who had their address forged as the source of a message, has caused
email recipients to implement a variety of countermeasures:</t>

<t><list style="symbols">
  <t>in-band scanning: performing detailed analysis of the email content before
replying to the DATA phase of the SMTP transaction, allowing immediate rejection
but consuming resources on both ends of the connection, and limiting the time
that can be used for the analysis to avoid timeouts.</t>
  <t>greylisting: replying with a temporary failure code to untrusted senders, allowing
time to decide if the sender is trustworthy enough, but also delaying mail for an
indeterminate period.</t>
  <t>delivery to "Spam" or "Junk" mailboxes - in some jurisdictions it's not allowed to
discard email that has been accepted, so providers must put the copy somewhere once
they have accepted it, filling Junk mailboxes even if they're very sure it's bad.</t>
</list></t>

<t>By requiring bounce addresses to aligned with the most recent signature domain,
we can avoid backscatter, allowing recipients to always take the message, and
later return a bounce.  This fulfils any legal obligation to inform the sender
if the message isn't delivered, while also avoiding the timeout and greylisting
re-connection issue that currently exists, so messages are spooled for less time
on intermediates, and recipients can take their time to analyse messages; even
delivering the message to a mailbox and then upon receiving further intelligence,
undoing the delivery and generating a bounce.</t>

<t>Privacy-preserving forwarding services will also see every bounce from any
dkim2-supporting destination mailbox, allowing them to strip off the details
of the further hop(s) and generate a bounce as if they had been the terminal
node of the delivery and were just making a delayed decision.</t>

</section>
</section>
<section anchor="other-areas-of-interest"><name>Other areas of interest</name>

<section anchor="algorithmic-dexterity"><name>Algorithmic dexterity</name>

<t>The final specification will require both RSA and elliptic curve be implemented
for algorithmic agility.  However this document acknowledges the long standing
lack of adoption of elliptic curve ,and elliptic curve support may not be needed
for development.  The specifications will provide support for multiple algorithms.
If there is IETF consensus around a "post-quantum" scheme then that will also be
included.</t>

<t>Dexterity will become essential if advances in cryptanalysis cause a particular type of algorithm
to become deprecated. To allow a phased switch away from such an algorithm we will make provision
for more than one signature to be present in a single DKIM2 header. Systems capable of checking
both signatures will require both to be correct. If only one signature is correct then email
will be rejected with a clear message -- allowing interworking issues to be easily debugged.</t>

<t>To allow for future dexterity, it makes sense to allow multiple signatures with the same or 
different algorithms, from the same domain, on the same message.</t>

</section>
<section anchor="sender-indications-of-intent"><name>Sender indications of intent</name>

<t>Having a way to indicate "the sender wants you not to make any modifications to this message"
will allow senders to indicate the same intent they current achieve with a DMARC p=reject policy
to stop messages which don't have a verifying DKIM signature.</t>

<t>Having a way to indicate "this message is for a single recipient" has been requested by some
services like document signature services.</t>

<t>Having a way to indicate "this message will be useless after time X" will be useful for
things like confirmation codes which have limited validity, allowing intermediate systems to
return the message if they haven't been able to complete delivery by the expiry time.</t>

</section>
<section anchor="signer-requests-for-feedback"><name>Signer requests for feedback</name>

<t>Each signer on the chain may wish to receive feedback about messages, in the way
that they currently use multiple DKIM signatures along with DMARC policies.</t>

<t>We can add a flag to allow intermediate signers (email sending providers,
mailing lists, forwarders, etc) to say whether they wish to receive feedback
about each message that they sign.</t>

</section>
</section>
<section anchor="security"><name>Security</name>

<t>TBA</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>TBA</t>

</section>


  </middle>

  <back>



    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="SMTP">
  <front>
    <title>Simple Mail Transfer Protocol</title>
    <author fullname="J. Klensin" initials="J." surname="Klensin"/>
    <date month="October" year="2008"/>
    <abstract>
      <t>This document is a specification of the basic protocol for Internet electronic mail transport. It consolidates, updates, and clarifies several previous documents, making all or parts of most of them obsolete. It covers the SMTP extension mechanisms and best practices for the contemporary Internet, but does not provide details about particular extensions. Although SMTP was designed as a mail transport and delivery protocol, this specification also contains information that is important to its use as a "mail submission" protocol for "split-UA" (User Agent) mail reading systems and mobile environments. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5321"/>
  <seriesInfo name="DOI" value="10.17487/RFC5321"/>
</reference>

<reference anchor="IMF">
  <front>
    <title>Internet Message Format</title>
    <author fullname="P. Resnick" initials="P." role="editor" surname="Resnick"/>
    <date month="October" year="2008"/>
    <abstract>
      <t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of "electronic mail" messages. This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, "Standard for the Format of ARPA Internet Text Messages", updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5322"/>
  <seriesInfo name="DOI" value="10.17487/RFC5322"/>
</reference>

<reference anchor="DKIM">
  <front>
    <title>DomainKeys Identified Mail (DKIM) Signatures</title>
    <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker"/>
    <author fullname="T. Hansen" initials="T." role="editor" surname="Hansen"/>
    <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy"/>
    <date month="September" year="2011"/>
    <abstract>
      <t>DomainKeys Identified Mail (DKIM) permits a person, role, or organization that owns the signing domain to claim some responsibility for a message by associating the domain with the message. This can be an author's organization, an operational relay, or one of their agents. DKIM separates the question of the identity of the Signer of the message from the purported author of the message. Assertion of responsibility is validated through a cryptographic signature and by querying the Signer's domain directly to retrieve the appropriate public key. Message transit from author to recipient is through relays that typically make no substantive change to the message content and thus preserve the DKIM signature.</t>
      <t>This memo obsoletes RFC 4871 and RFC 5672. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="76"/>
  <seriesInfo name="RFC" value="6376"/>
  <seriesInfo name="DOI" value="10.17487/RFC6376"/>
</reference>

<reference anchor="ARC">
  <front>
    <title>The Authenticated Received Chain (ARC) Protocol</title>
    <author fullname="K. Andersen" initials="K." surname="Andersen"/>
    <author fullname="B. Long" initials="B." role="editor" surname="Long"/>
    <author fullname="S. Blank" initials="S." role="editor" surname="Blank"/>
    <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy"/>
    <date month="July" year="2019"/>
    <abstract>
      <t>The Authenticated Received Chain (ARC) protocol provides an authenticated "chain of custody" for a message, allowing each entity that handles the message to see what entities handled it before and what the message's authentication assessment was at each step in the handling.</t>
      <t>ARC allows Internet Mail Handlers to attach assertions of message authentication assessment to individual messages. As messages traverse ARC-enabled Internet Mail Handlers, additional ARC assertions can be attached to messages to form ordered sets of ARC assertions that represent the authentication assessment at each step of the message-handling paths.</t>
      <t>ARC-enabled Internet Mail Handlers can process sets of ARC assertions to inform message disposition decisions, identify Internet Mail Handlers that might break existing authentication mechanisms, and convey original authentication assessments across trust boundaries.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8617"/>
  <seriesInfo name="DOI" value="10.17487/RFC8617"/>
</reference>




    </references>




<?line 321?>

<section anchor="changes-from-earlier-versions"><name>Changes from Earlier Versions</name>

<t>[[This section to be removed by RFC Editor]]</t>

<section anchor="draft-ietf-dkim-dkim2-motivation-01"><name>draft-ietf-dkim-dkim2-motivation-01:</name>

<t><list style="symbols">
  <t>saying DKIM1 is silly, just calling it DKIM</t>
  <t>updated DKIM reference to RFC6376</t>
  <t>use named references</t>
</list></t>

</section>
<section anchor="draft-ietf-dkim-dkim2-motivation-00"><name>draft-ietf-dkim-dkim2-motivation-00:</name>

<t><list style="symbols">
  <t>no changes other than the name</t>
</list></t>

</section>
<section anchor="draft-gondwana-dkim2-motivation-03"><name>draft-gondwana-dkim2-motivation-03:</name>

<t><list style="symbols">
  <t>typo fixes</t>
  <t>updated title</t>
  <t>allowed for multiple recipients to be signed (but still all legtimiate
recipients MUST be explicitly signed)</t>
  <t>rewrote to be more "motivation/goals" and less "implementation design"</t>
  <t>removed the 'obsoletes'</t>
</list></t>

</section>
<section anchor="draft-gondwana-dkim2-motivation-02"><name>draft-gondwana-dkim2-motivation-02:</name>

<t><list style="symbols">
  <t>changed section title because DKIM1/2 do not really interwork as such</t>
  <t>removed implementation details, this is the motivation doc</t>
  <t>significant rewrite based on feedback from mailing list</t>
</list></t>

</section>
<section anchor="draft-gondwana-dkim2-motivation-01"><name>draft-gondwana-dkim2-motivation-01:</name>

<t><list style="symbols">
  <t>remove the <spanx style="verb">z=</spanx> parameter on the grounds that it adds too much complexity</t>
  <t>document that messages MUST NOT re-enter the DKIM2 world once the chain
has been broken.</t>
</list></t>

</section>
<section anchor="draft-gondwana-dkim2-motivation-00"><name>draft-gondwana-dkim2-motivation-00:</name>

<t><list style="symbols">
  <t>initial version</t>
</list></t>

</section>
</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

