<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version  (Ruby 3.2.3) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-ietf-dkim-dkim2-motivation-02" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="DKIM2 Motivation">DKIM2 - signing the source and destination of every email</title>

    <author initials="B." surname="Gondwana" fullname="Bron Gondwana">
      <organization>Fastmail</organization>
      <address>
        <email>brong@fastmailteam.com</email>
      </address>
    </author>
    <author initials="R." surname="Clayton" fullname="Richard Clayton">
      <organization>Yahoo</organization>
      <address>
        <email>rclayton@yahooinc.com</email>
      </address>
    </author>
    <author initials="W." surname="Chuang" fullname="Wei Chuang">
      <organization>Google</organization>
      <address>
        <email>weihaw@google.com</email>
      </address>
    </author>

    <date year="2025" month="November" day="03"/>

    
    
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This memo provides a rationale for building a new email accountability mechanism,
based on the lessons learned from implementing the ARC experiment from RFC 8617
and other experiences from email system operators.</t>



    </abstract>



  </front>

  <middle>


<section anchor="background-and-motivations"><name>Background and motivations</name>

<t>In 2007, <xref target="DKIM"/> (Domain Key Identified Mail / DKIM) was published, outlining a
mechanism for a domain to sign email in a way that recipients could ensure
that the email had come from an entity possessing the secret key matching
a public key published in the DNS by the source domain.</t>

<t><xref target="DKIM"/> has been updated and extended many times since then, and a
large amount of operational experience has been gained using it.</t>

<t>There are a number of things beyond authenticating the original email that would be useful
for mail system operators, particularly when it travels through multiple hops.
There have been other attempts to solve some of these problems, e.g.
<xref target="ARC"/> (Authenticated Received Chain / ARC), however they have not
achieved the same level of widespread use as DKIM.</t>

<t>In particular, the following issues frustrate email system system operators:</t>

<t><list style="numbers">
  <t>You can legitimately receive a validly DKIM signed email, where there is no evidence
inside the signed part that you were an intended recipient</t>
  <t>An email can have a bounce (SMTP-FROM) email address for a domain which was never
involved in the transit of that message</t>
  <t>An email can be altered by forwarders or mailing lists, and there’s no way to know
what parts of the message were changed</t>
</list></t>

<t>In the first two cases, a solution would be to have the sending system provide an unforgeable 
digital signature describing its identity and intent, such that if all parties involved in 
transiting versions of an email participate, there is no way for a third party to pretend 
to have been legitimately involved in processing the email, or to change or redirect the
email in any way.</t>

<t>In the third case, a solution would be to provide a way to describe how to undo the changes,
such that each domain's signature can be attributed to the version of the message that was
seen by systems which can sign on behalf of that domain.</t>

</section>
<section anchor="some-properties-for-a-system-which-would-solve-these-issues"><name>Some properties for a system which would solve these issues</name>

<section anchor="explicit-signing-of-all-legitimate-recipients-for-each-message"><name>Explicit signing of all legitimate recipients for each message</name>

<t>By ensuring that the complete list of legitimate recipients for a message is
encoded in the signed content of the message, it will become possible for receiving
systems to confirm that they are an intended next hop for a message, and
reject messages which the signer did not intend for them to receive.</t>

<t>Even if a message is BCC'd, a copy of that message sent to the BCC
recipient can have that recipient address mentioned, without sending
the same exact copy to the other recipients.</t>

<t>This mechanism does not survive naive forwarders, where the new destination
address will not be explicitly mentioned, however a recipient system can
track which addresses forward to it, and accept just those.</t>

<t>Over time as more software is updated to add signatures, the need to
use heuristics becomes smaller, and eventually it will become possible
to reject any messages where the <xref target="SMTP"/> RCPT TO forward-path
addresses are not all present in the highest signature number header.</t>

</section>
<section anchor="a-chain-of-aligned-signatures-over-multiple-smtp-transactions"><name>A chain of aligned signatures over multiple SMTP transactions</name>

<t>By having the initial signature be from the domain aligned to the From or
Sender header, and each following hop adding its own signature with the
domain of the recipient of the previous hop, it is possible to create a
chain of custody where each recipient has confirmed that it should have
received the message, and then signed the content with a key for its
own domain.</t>

<t>If the recipient wishes to forward the message on to another address, it must
apply its own DKIM2 header, signed by a key which is aligned to the domain of
the recipient address in the previous DKIM2 header, and with a bounce address
which is in the same domain.</t>

<t>The end result is, like ARC, a chain of domains which have handled the message;
however unlike ARC, this chain MUST be fully linked in both directions, with
every sending address aligning to the recipient address of the previous DKIM2
header.</t>

</section>
<section anchor="a-signed-bounce-format-sent-in-reverse-along-the-same-path"><name>A signed bounce format, sent in reverse along the same path</name>

<t>By having the mail-from address be signed and aligned to the signing domain, and
having the bounce format include the signature headers of the message being bounced,
it is required to have directly received the message to generate a bounce for it.
This requirement eliminates the ability to cause backscatter entirely, as bounces
can only go to a domain that sent the message, and only be sent from a domain which
explicitly received that message.</t>

<t>The ability to avoid backscatter will allow receiving systems to delay their
decisions about whether to accept a message, since they can make the decision
without holding the connection open.  This removes the need for mitigations like
greylisting and even reduces the need for junk mail folders in jurisdictions where
it is forbidden to discard messages once they are accepted.</t>

<t>Since the DSN messages always go back up the DKIM2 chain, any hop can strip off the
higher number (i=) records; including the sender and recipient addresses for them,
and create a bounce as if the forwarder itself was doing the rejection.</t>

<t>This would not be possible with SMTP-transaction-time rejection, as you can't
reliably hold open the connection from the previous hop while you talk to the
next hop.</t>

<t>As asynchronous bounces will be common in DKIM2, this case becomes indistinguishable
to the sender, allowing privacy-preserving forwarders to seamlessly operate.</t>

<t>Passing bounces back along the outgoing path also allows mailing lists to take
responsibility for the event and not bother the person who sent a message to the list.</t>

<t>Provided that an email is correctly signed when received, it can be rejected at
a later point in time. The DSN will be sent to the immediately preceding intermediary.
Since the bounce travels back along the (fully authenticated) incoming path it
cannot be sent to an uninvolved third party.</t>

</section>
<section anchor="a-way-to-describe-changes"><name>A way to describe changes</name>

<t>ARC describes a separate "Seal" header which which never gets modified, however
this still allows an intermediate to make massive changes to a message and claim
that it was still the original message.  If a message goes through more than one
set of modifications, it becomes impossible for the receiver to know what changes
were made by each intermediary.</t>

<t>By defining an algebra sufficient to describe how to undo common changes, we
can allow the receiver to compare the eventual message received with the original
message sent, and decide which parties involved in changing the message are
making the kind of changes that the recipient doesn't want.</t>

<t>Mailing lists (or alumni forwarders etc.) that alter the Subject header field
(or other <xref target="IMF"/> headers) will record the previous header field contents.
This is easy to undo for checking purposes.</t>

<t>Mailing lists that add text (either to a simple email body or one or more MIME parts
within the body) will record details of the text they have added. This text can then be
removed when checking earlier signatures.</t>

<section anchor="security-gateways"><name>Security gateways</name>

<t>There are some types of alteration, for example by security gateways, that may
be impractical to describe in a cost-effective manner.</t>

<t>We would expect that outgoing gateways that may be adding disclaimers or rewriting
internal identifiers would be provided with appropriate signing keys so that they
could be the "first hop" as far as the rest of the email handling chain is concerned.</t>

<t>Incoming security gateways may be making substantial changes. Typically they
will remove problematic types of attachment and rewrite URLs to use "interstitials".</t>

<t>Since this type of functionality is generally provided on a contracted basis,
further intermediaries will be fully aware of the presence of the security gateway and
can be configured to implicitly trust that it has checked earlier signatures and found them
to be correct. Hence there is no need to be able to "undo" these changes, however there's
still value in indicating which system made these changes.</t>

</section>
</section>
</section>
<section anchor="goals-to-be-addressed"><name>Goals to be addressed</name>

<section anchor="dkim-replay"><name>DKIM-replay</name>

<t>Because an email can currently be sent as "Bcc" such that there's no evidence in
the message data of who the recipient is expected to be, it's possible to take a
message that is correctly signed and replay it millions of times to different
destination addresses as if they had been BCC'd.  This message can be resent at
any time.</t>

<t>DKIM2 headers will always have timestamps so that "old" signatures have no value.</t>

<t>A possibility to be investigated during testing is a "singleton" flag to
allow senders to specify that this is a message for a single recipient (e.g.
for authentication codes for billing transactions) and should not be expanded
by mailing lists.</t>

<t>DKIM2 headers specify both "from" and "to" so that most opportunities to alter a
message, re-sign it and replay it at scale will no longer be possible.  Since the
"to" address is always encoded in the email, any email to multiple recipients must
be exploded by the sender, and each copy signed separately with different headers.</t>

<t>If the email is replayed (perhaps through a large system with many different
customers) then if the email does not say that it has been duplicated then signatures
can be assumed to be unique and hence simple caching (or Bloom filters) will identify
replays. If the email has been duplicated then recipients can assign a reputation to
the entity that did the duplication (along with the expected number of duplicates
that will arrive from that entity) and assess duplicate signatures on that basis.</t>

<t>If the email is altered before duplication then it is again the case that this will
be apparent to the recipient who can develop a reputation system for the entity that
did the modification and replay.</t>

</section>
<section anchor="backscatter"><name>Backscatter</name>

<t>The problem of backscatter, delivery status notifications sent to innocent third
parties who had their address forged as the source of a message, has caused
email recipients to implement a variety of countermeasures:</t>

<t><list style="symbols">
  <t>in-band scanning: performing detailed analysis of the email content before
replying to the DATA phase of the SMTP transaction, allowing immediate rejection
but consuming resources on both ends of the connection, and limiting the time
that can be used for the analysis to avoid timeouts.</t>
  <t>greylisting: replying with a temporary failure code to untrusted senders, allowing
time to decide if the sender is trustworthy enough, but also delaying mail for an
indeterminate period.</t>
  <t>delivery to "Spam" or "Junk" mailboxes - in some jurisdictions it's not allowed to
discard email that has been accepted, so providers must put the copy somewhere once
they have accepted it, filling Junk mailboxes even if they're very sure it's bad.</t>
</list></t>

<t>By requiring bounce addresses to aligned with the most recent signature domain,
we can avoid backscatter, allowing recipients to always take the message, and
later return a bounce.  This fulfils any legal obligation to inform the sender
if the message isn't delivered, while also avoiding the timeout and greylisting
re-connection issue that currently exists, so messages are spooled for less time
on intermediates, and recipients can take their time to analyse messages; even
delivering the message to a mailbox and then upon receiving further intelligence,
undoing the delivery and generating a bounce.</t>

<t>Privacy-preserving forwarding services will also see every bounce from any
dkim2-supporting destination mailbox, allowing them to strip off the details
of the further hop(s) and generate a bounce as if they had been the terminal
node of the delivery and were just making a delayed decision.</t>

</section>
</section>
<section anchor="other-areas-of-interest"><name>Other areas of interest</name>

<section anchor="algorithmic-dexterity"><name>Algorithmic dexterity</name>

<t>The final specification will require both RSA and elliptic curve be implemented
for algorithmic agility.  However this document acknowledges the long standing
lack of adoption of elliptic curve ,and elliptic curve support may not be needed
for development.  The specifications will provide support for multiple algorithms.
If there is IETF consensus around a "post-quantum" scheme then that will also be
included.</t>

<t>Dexterity will become essential if advances in cryptanalysis cause a particular type of algorithm
to become deprecated. To allow a phased switch away from such an algorithm we will make provision
for more than one signature to be present in a single DKIM2 header. Systems capable of checking
both signatures will require both to be correct. If only one signature is correct then email
will be rejected with a clear message -- allowing interworking issues to be easily debugged.</t>

<t>To allow for future dexterity, it makes sense to allow multiple signatures with the same or 
different algorithms, from the same domain, on the same message.</t>

</section>
<section anchor="sender-indications-of-intent"><name>Sender indications of intent</name>

<t>Having a way to indicate "the sender wants you not to make any modifications to this message"
will allow senders to indicate the same intent they current achieve with a DMARC p=reject policy
to stop messages which don't have a verifying DKIM signature.</t>

<t>Having a way to indicate "this message is for a single recipient" has been requested by some
services like document signature services.</t>

<t>Having a way to indicate "this message will be useless after time X" will be useful for
things like confirmation codes which have limited validity, allowing intermediate systems to
return the message if they haven't been able to complete delivery by the expiry time.</t>

</section>
<section anchor="signer-requests-for-feedback"><name>Signer requests for feedback</name>

<t>Each signer on the chain may wish to receive feedback about messages, in the way
that they currently use multiple DKIM signatures along with DMARC policies.</t>

<t>We can add a flag to allow intermediate signers (email sending providers,
mailing lists, forwarders, etc) to say whether they wish to receive feedback
about each message that they sign.</t>

</section>
<section anchor="simplification-of-signed-header-list"><name>Simplification of signed header list</name>

<t>Currently DKIM signatures list a particular number of copies of each header field which
are included in the signature, and the signer can choose exactly which headers to sign.</t>

<t>It is both valuable to mandate a set of headers, and the existence of a change algebra
will allow us to insist that all copies of a named header field are always signed,
reducing the risk of header stuffing attacks.</t>

</section>
</section>
<section anchor="security"><name>Security</name>

<t>TBA</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>TBA</t>

</section>


  </middle>

  <back>


    <references title='Normative References'>



<reference anchor='SMTP'>
  <front>
    <title>Simple Mail Transfer Protocol</title>
    <author fullname='J. Klensin' initials='J.' surname='Klensin'/>
    <date month='October' year='2008'/>
    <abstract>
      <t>This document is a specification of the basic protocol for Internet electronic mail transport. It consolidates, updates, and clarifies several previous documents, making all or parts of most of them obsolete. It covers the SMTP extension mechanisms and best practices for the contemporary Internet, but does not provide details about particular extensions. Although SMTP was designed as a mail transport and delivery protocol, this specification also contains information that is important to its use as a "mail submission" protocol for "split-UA" (User Agent) mail reading systems and mobile environments. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='5321'/>
  <seriesInfo name='DOI' value='10.17487/RFC5321'/>
</reference>

<reference anchor='IMF'>
  <front>
    <title>Internet Message Format</title>
    <author fullname='P. Resnick' initials='P.' role='editor' surname='Resnick'/>
    <date month='October' year='2008'/>
    <abstract>
      <t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of "electronic mail" messages. This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, "Standard for the Format of ARPA Internet Text Messages", updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='5322'/>
  <seriesInfo name='DOI' value='10.17487/RFC5322'/>
</reference>

<reference anchor='DKIM'>
  <front>
    <title>DomainKeys Identified Mail (DKIM) Signatures</title>
    <author fullname='D. Crocker' initials='D.' role='editor' surname='Crocker'/>
    <author fullname='T. Hansen' initials='T.' role='editor' surname='Hansen'/>
    <author fullname='M. Kucherawy' initials='M.' role='editor' surname='Kucherawy'/>
    <date month='September' year='2011'/>
    <abstract>
      <t>DomainKeys Identified Mail (DKIM) permits a person, role, or organization that owns the signing domain to claim some responsibility for a message by associating the domain with the message. This can be an author's organization, an operational relay, or one of their agents. DKIM separates the question of the identity of the Signer of the message from the purported author of the message. Assertion of responsibility is validated through a cryptographic signature and by querying the Signer's domain directly to retrieve the appropriate public key. Message transit from author to recipient is through relays that typically make no substantive change to the message content and thus preserve the DKIM signature.</t>
      <t>This memo obsoletes RFC 4871 and RFC 5672. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='STD' value='76'/>
  <seriesInfo name='RFC' value='6376'/>
  <seriesInfo name='DOI' value='10.17487/RFC6376'/>
</reference>

<reference anchor='ARC'>
  <front>
    <title>The Authenticated Received Chain (ARC) Protocol</title>
    <author fullname='K. Andersen' initials='K.' surname='Andersen'/>
    <author fullname='B. Long' initials='B.' role='editor' surname='Long'/>
    <author fullname='S. Blank' initials='S.' role='editor' surname='Blank'/>
    <author fullname='M. Kucherawy' initials='M.' role='editor' surname='Kucherawy'/>
    <date month='July' year='2019'/>
    <abstract>
      <t>The Authenticated Received Chain (ARC) protocol provides an authenticated "chain of custody" for a message, allowing each entity that handles the message to see what entities handled it before and what the message's authentication assessment was at each step in the handling.</t>
      <t>ARC allows Internet Mail Handlers to attach assertions of message authentication assessment to individual messages. As messages traverse ARC-enabled Internet Mail Handlers, additional ARC assertions can be attached to messages to form ordered sets of ARC assertions that represent the authentication assessment at each step of the message-handling paths.</t>
      <t>ARC-enabled Internet Mail Handlers can process sets of ARC assertions to inform message disposition decisions, identify Internet Mail Handlers that might break existing authentication mechanisms, and convey original authentication assessments across trust boundaries.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8617'/>
  <seriesInfo name='DOI' value='10.17487/RFC8617'/>
</reference>




    </references>



<section anchor="changes-from-earlier-versions"><name>Changes from Earlier Versions</name>

<t>[[This section to be removed by RFC Editor]]</t>

<section anchor="draft-ietf-dkim-dkim2-motivation-02"><name>draft-ietf-dkim-dkim2-motivation-02:</name>

<t><list style="symbols">
  <t>Updated the background and motivations to be more about the problems</t>
  <t>Moved "simplification of signed header list" into the "other areas", it's
not core to solving the underlying problems.</t>
</list></t>

</section>
<section anchor="draft-ietf-dkim-dkim2-motivation-01"><name>draft-ietf-dkim-dkim2-motivation-01:</name>

<t><list style="symbols">
  <t>saying DKIM1 is silly, just calling it DKIM</t>
  <t>updated DKIM reference to RFC6376</t>
  <t>use named references</t>
</list></t>

</section>
<section anchor="draft-ietf-dkim-dkim2-motivation-00"><name>draft-ietf-dkim-dkim2-motivation-00:</name>

<t><list style="symbols">
  <t>no changes other than the name</t>
</list></t>

</section>
<section anchor="draft-gondwana-dkim2-motivation-03"><name>draft-gondwana-dkim2-motivation-03:</name>

<t><list style="symbols">
  <t>typo fixes</t>
  <t>updated title</t>
  <t>allowed for multiple recipients to be signed (but still all legtimiate
recipients MUST be explicitly signed)</t>
  <t>rewrote to be more "motivation/goals" and less "implementation design"</t>
  <t>removed the 'obsoletes'</t>
</list></t>

</section>
<section anchor="draft-gondwana-dkim2-motivation-02"><name>draft-gondwana-dkim2-motivation-02:</name>

<t><list style="symbols">
  <t>changed section title because DKIM1/2 do not really interwork as such</t>
  <t>removed implementation details, this is the motivation doc</t>
  <t>significant rewrite based on feedback from mailing list</t>
</list></t>

</section>
<section anchor="draft-gondwana-dkim2-motivation-01"><name>draft-gondwana-dkim2-motivation-01:</name>

<t><list style="symbols">
  <t>remove the <spanx style="verb">z=</spanx> parameter on the grounds that it adds too much complexity</t>
  <t>document that messages MUST NOT re-enter the DKIM2 world once the chain
has been broken.</t>
</list></t>

</section>
<section anchor="draft-gondwana-dkim2-motivation-00"><name>draft-gondwana-dkim2-motivation-00:</name>

<t><list style="symbols">
  <t>initial version</t>
</list></t>

</section>
</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

