One document matched: draft-allman-dkim-ssp-00.txt
pre-MASS E. Allman
Internet-Draft Sendmail, Inc.
Expires: January 10, 2006 July 9, 2005
DKIM Sender Signing Policy
draft-allman-dkim-ssp-00
Status of this Memo
By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on January 10, 2006.
Copyright Notice
Copyright (C) The Internet Society (2005).
Abstract
DomainKeys Identified Mail (DKIM) defines a domain-level
authentication framework for email using public-key cryptography and
key server technology to permit verification of the source and
contents of messages by either Mail Transport Agents (MTAs) or Mail
User Agents (MUAs). The primary DKIM protocol is described in [ID-
DK-BASE]. This document describes the policy records that senders
may use to advertise how they sign their outgoing mail, and how
verifiers should access and interpret those results.
Allman Expires January 10, 2006 [Page 1]
Internet-Draft DKIM SSP July 2005
Requirements Language
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119].
(Unresolved Issues/To Be Done)
Security Considerations needs further work.
Need to add new and check existing ABNF.
DKP RR needs to be defined.
Text structure of document needs to be examined; this is a quick
slash-and-burn approach. Stop signs indicate sections that haven't
even been approached yet.
CONVERSION DISCLAIMER
This initial version that is being submitted as an IETF Internet-
Draft has been converted over to RFC format by Dave Crocker. Besides
the many rough edges to the resulting format of the document, he
suspects there also might be some more serious errors, such as sub-
sections being at the wrong level. These errors will be repaired as
soon as they are reported.
Allman Expires January 10, 2006 [Page 2]
Internet-Draft DKIM SSP July 2005
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 4
2. Language and Terminology . . . . . . . . . . . . . . . . . . . 4
2.1 Originator Address . . . . . . . . . . . . . . . . . . . . 4
2.2 Suspicious . . . . . . . . . . . . . . . . . . . . . . . . 5
3. Overview of DKIM . . . . . . . . . . . . . . . . . . . . . . . 6
4. Operation . . . . . . . . . . . . . . . . . . . . . . . . . . 6
5. Query and record format . . . . . . . . . . . . . . . . . . . 7
6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 9
7. Normative References . . . . . . . . . . . . . . . . . . . . . 9
Author's Address . . . . . . . . . . . . . . . . . . . . . . . 10
Intellectual Property and Copyright Statements . . . . . . . . 11
Allman Expires January 10, 2006 [Page 3]
Internet-Draft DKIM SSP July 2005
1. Introduction
DomainKeys Identified Mail (DKIM) [ID-DK-BASE] defines a method
whereby email senders ("signers") may sign their outgoing messages
with a secret key that can be checked by a receiver ("verifier") to
determine whether the signer was authorized to use the sending domain
name. The method used is based on well-known public-key cryptography
methods.
However, the legacy of the Internet is such that not all messages
will be signed, and the absence of a signature on a message is not an
a priori indication of forgery. In fact, during early phases of
deployment it must be expected that most messages will remain
unsigned. However, some senders may choose to sign all of their
outgoing mail, for example, to protect their brand name. Such
signers must be able to advertise to verifiers that messages claiming
to be from them that are not signed are forgeries. This is the topic
for sender signing policy.
In the absence of a valid DKIM signature on behalf of the "From"
address [RFC2822], the verifier of a message MUST determine whether
messages from a particular sender are expected to be signed, and what
signatures are acceptable. In particular, whether a domain is
participating in DKIM, whether they are testing, and whether it signs
all outbound email must be communicated to the verifier. Without
such a mechanism, the benefit of message signing techniques such as
DKIM is limited since unsigned messages will always need to be
considered to be potentially legitimate. This determination is
referred to as a Sender Signing Policy Check.
Sender Signing Policies MAY be expressed on behalf of an entity which
may be a domain or an individual address. Expression of signing
policy on behalf of individual addresses will, of course, entail
additional key server transaction load.
Conceivably, such policy expressions might be imagined to be extended
in the future to include information about what hashing algorithms a
domain uses, what kind of messages might be sent (e.g., bulk vs.
personal vs. transactional), etc. Such concerns are out of scope of
this standard; because of the need for outside auditing they fall
under the purview of reputation and accreditation.
2. Language and Terminology
2.1 Originator Address
The email address in the "From" header field of a message [RFC2822],
or if and only if the From header field contains multiple addresses,
Allman Expires January 10, 2006 [Page 4]
Internet-Draft DKIM SSP July 2005
the email address in the "Sender" header field.
o An "Alleged Signer" is the identify of the signer claimed in the
DKIM-Signature header field in a message received by a verifier;
it is "alleged" because it has not yet been verified.
o An "Alleged Sender" is the Originator Address of a message
received by a verifier; it is "alleged" because it has not yet
been verified.
o A "Sender Signing Policy" (or just "policy") is a machine-
readable record published by the Alleged Sender which includes
information about whether that sender signs all, some, or none of
their email. It must be considered together with the "key"
records, which advertise the public keys associated with the
Alleged Sender.
2.2 Suspicious
Messages that fail an initial signature verification step (either by
an incorrect signature or a lack of signature) and also a further
Sender Signing Policy check are referred to as "Suspicious". The
handling of such messages is at the discretion of the verifier or
final recipient. "Suspicious" applies only to the DKIM layer; a
verifier may decide the message should be accepted on the basis of
other information beyond the scope of this document. Conversely,
messages deemed non-Suspicious may be rejected for other reasons.
Some terminology used herein is derived directly from [ID-DK-BASE].
Briefly,
o A "signer" is the agent that signs a message. In normal cases
it will probably correspond closely with the original author of
the message or an agent working on the author's behalf. However,
third parties are often legitimately involved with mail sending,
and hence it is reasonable for what may seem at first glance to be
an unaffiliated third party might reasonably send mail on behalf
of another domain. Hence, "signer" refers only to the
administrative authority that has the secret key necessary to sign
the message. In particular, that secret key may have been
transferred to them or otherwise delegated to them by the alleged
sender.
o A "verifier" is the agent that verifies a message by checking
the actual signature against the message itself and the public key
published by the alleged signer. The verifier also looks up the
Sender Signing Policy published by the alleged sender if the
Allman Expires January 10, 2006 [Page 5]
Internet-Draft DKIM SSP July 2005
message is not correctly signed by the Alleged Sender.
o A "selector" specifies which of the keys published by an Alleged
Signer or Sender should be queried. It is essentially a way of
subdividing the address space to allow a single sending domain to
publish multiple keys.
3. Overview of DKIM
This section is informative only and MUST NOT be treated as
normative. The actual specification is described in [ID-DK-BASE] and
must be consulted.
Briefly, when a verifier receives a message, they examine the header
field of that message to see if it includes one or more DKIM-
Signature header fields. If it does, the authenticity of that
message may be validated using conventional cryptographic techniques.
However, if the verifier receives a message containing no valid DKIM-
Signature header fields, it must proceed with the algorithms defined
in this document.
4. Operation
Sender Signing Policy Checks MUST be based on the Originator Address.
If the message contains a valid signature on behalf of the Originator
Address no Sender Signing Policy Check need be performed: the
verifier SHOULD NOT look up the Sender Signing Policy and the message
SHOULD be considered non-Suspicious.
Verifiers checking messages that do not have at least one valid
signature MUST perform a Sender Signing Policy Check by doing a DNS
query to the domain specified by the Originator Address. The query
MUST be for the search key "_policy._domainkey.<domain>", where
<domain> is the domain of the Originator Address. The query may
return either a DKSSP record or a TXT record; the DKSSP record MUST
override the TXT record.
The result of a Sender Signing Policy Check is one of four possible
policies:
(1) Some messages from this entity are not signed; the message
SHOULD be presumed to be legitimate in the absence of a valid
signature. This is the default policy.z
(2) All messages from this entity are signed; all messages from
this entity SHOULD have a valid signature, either directly on
behalf of the originator or on behalf of a third party (e.g., a
Allman Expires January 10, 2006 [Page 6]
Internet-Draft DKIM SSP July 2005
mailing list or an outsourcing house) handling the message.
(3) All valid messages from this entity are signed, and SHOULD
have a valid signature from this entity. Third-party signatures
SHOULD not be accepted.
(4) Signing policy for this domain is expressed at the individual
address level. A second Sender Signing Policy Check should be
performed specifying the individual address.
(5) This Alleged Sender never sends mail at all.
If a message is encountered by a verifier without a valid signature
from the Originator Address, the policy results MUST be interpreted
as follows:
If the result of the check is policy (1) described above, the
message MUST be considered non-Suspicious.
If the result of the check is policy (2), and any verifiable
signature is present from some signer other than the Originator
Address in the message, the message SHOULD be considered non-
Suspicious.
If the result of the check is policy (3), the message MUST be
considered suspicious.
If the result of the check is policy (4), a second Sender Signing
Policy Check SHOULD be performed based on the entire Originator
Address and interpreted using the above steps. If the result of
that check is policy (4), the signing policy for the originator is
misconfigured, and the message SHOULD be considered non-
Suspicious.
If the Sender Signing Policy record does not exist, verifier
systems MUST assume that some messages from this entity are not
signed and the message SHOULD NOT be considered to be Suspicious.
5. Query and record format
Signing policy records for a domain are published in key servers as
the "_policy" selector. Signing policy records for individual
addresses are published as the "user._policy" selector.
NON-NORMATIVE RATIONALE: Use of a synthetic selector allows non-
DNS based access for signer policies.
Allman Expires January 10, 2006 [Page 7]
Internet-Draft DKIM SSP July 2005
To avoid a Denial-of-Service attack, signer policy searches for
signing policy checks of very deeply nested domains MUST strip off
all but the last five components of a domain name. If a policy
record is not found, the verifier MUST repeat the request to
successively higher levels of the domain hierarchy until the root is
reached. This allows subdomains to inherit the signing policy of
their parent domains without allowing attackers to specify extremely
deep subdomains such as
"a.b.c.d.e.f.g.h.i.j.k.l.m.n.o.p.q.r.s.t.u.v.w.x.y.z.example.com".
If presented with such a signing domain in a DKIM-Signature header
field, the search for a policy record would start at
"x.y.z.example.com" and proceed upwards. Verifiers MUST stop
searching at the first policy record they encounter.
NON-NORMATIVE DISCUSSION: It seems like this limitation should be
part of the DNS binding rather than a general restriction.
Signing policy records follow the tag-value syntax described in [ID-
DK-BASE]. Tags used in signing policy records are as follows:
o= Outbound signing policy for the entity (plain-text; OPTIONAL,
default is "~"). Possible values are as follows:
~ The entity signs some but not all email.
- All mail from the entity is signed; unsigned email MUST NOT
be accepted, but email signed by a third party SHOULD be
accepted.
! All mail from the entity is signed; third-party signatures
SHOULD NOT be accepted
. This entity never sends email. The "." policy can be used
to "short circuit" searches from subdomains; for example, the
"ad.jp" domain might use this. If an initial policy search
receives this policy then the email SHOULD NOT be accepted; if
found while searching parent domains then the search should
terminate as though no policy record was found.
^ Repeat query at user level. This value MUST NOT be used in
user-level policy records.
t= A vertical-bar separated list of flags (plain-text; OPTIONAL,
default is that no flags are set). Flag values are:
y -- The entity is testing signing policy, and the verifier
SHOULD NOT consider a message suspicious based on the record.
Allman Expires January 10, 2006 [Page 8]
Internet-Draft DKIM SSP July 2005
n= Human readable notes regarding the record (quoted-printable
with semicolon encoded in addition to the standard characters;
OPTIONAL, default is no notes).
r= Email address for reports and inquiries regarding the signing
policy for this entity (plain-text; OPTIONAL, default is no
contact address available).
u= Reserved for future reference to a URI to provide more detailed
policy information.
When represented in DNS, signing policy checks MUST search for a
DKSSP (DomainKey Sender Signing Policy) RR type first. If no DKSSP
RR is found, signing policy checks MUST search for a TXT RR type.
6. IANA Considerations
Use of the _domainkey prefix in DNS records will require registration
by IANA.
Use of the _policy prefix in DNS records will require registration by
IANA.
The DKSSP RR type must be registered by IANA.
7. Normative References
[ID-DK-BASE]
Allman, E., Callas, J., Delany, M., Libbey, M., Fenton,
J., and M. Thomas, "DomainKeys Identified Mail (DKIM)",
draft-allman-dkim-base-00 (work in progress), July 2005.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC2822] Resnick, P., "Internet Message Format", RFC 2822,
April 2001.
Allman Expires January 10, 2006 [Page 9]
Internet-Draft DKIM SSP July 2005
Author's Address
Eric Allman
Sendmail, Inc.
6425 Christie Ave, Suite 400
Emeryville, CA 94608
USA
Phone: +1 510 594 5501
Email: eric+dkim@sendmail.org
URI:
Allman Expires January 10, 2006 [Page 10]
Internet-Draft DKIM SSP July 2005
Intellectual Property Statement
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Disclaimer of Validity
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Copyright Statement
Copyright (C) The Internet Society (2005). This document is subject
to the rights, licenses and restrictions contained in BCP 78, and
except as set forth therein, the authors retain all their rights.
Acknowledgment
Funding for the RFC Editor function is currently provided by the
Internet Society.
Allman Expires January 10, 2006 [Page 11]
| PAFTECH AB 2003-2026 | 2026-04-22 06:21:56 |