<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-ietf-dkim-dkim2-spec-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="DKIM2 Signatures">DomainKeys Identified Mail Signatures v2 (DKIM2)</title>

    <author initials="R." surname="Clayton" fullname="Richard Clayton">
      <organization>Yahoo</organization>
      <address>
        <email>rclayton@yahooinc.com</email>
      </address>
    </author>
    <author initials="W." surname="Chuang" fullname="Wei Chuang">
      <organization>Google</organization>
      <address>
        <email>weihaw@google.com</email>
      </address>
    </author>
    <author initials="B." surname="Gondwana" fullname="Bron Gondwana">
      <organization>Fastmail Pty Ltd</organization>
      <address>
        <postal>
          <street>Level 2, 114 William Street</street>
          <code>3000</code>
          <country>Australia</country>
        </postal>
        <phone>+61 457 416 436</phone>
        <email>brong@fastmailteam.com</email>
      </address>
    </author>

    <date year="2026" month="April" day="20"/>

    
    
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 61?>

<t>DomainKeys Identified Mail v2 (DKIM2) permits a person, role, or
organization that owns a signing domain to document that it has
handled an email message by associating their domain with the
message.  This is achieved by providing a hash value that has
been calculated on the current contents of the message and then applying a cryptographic
signature that covers the hash values and other details about the
transmission of the message. Verification is performed by querying an entry
within the signing domain's DNS space to retrieve an appropriate public
key. As a message is transferred from author to recipient systems that
alter the body or header fields will provide details of their changes
and calculate new hash values. Further signatures 
will be added to provide a validatable "chain". This permits validators
to identify the nature of changes made by intermediaries and apply a
reputation to the systems that made changed. DKIM2 also allows
recipients to detect when messages have been unexpectedly "replayed"
and will ensure that Delivery Status Notifications are only sent
to entities that were involved in the transmission of a message.</t>



    </abstract>



  </front>

  <middle>


<?line 81?>

<section anchor="introduction"><name>Introduction</name>

<t>DomainKeys Identified Mail v2 (DKIM2) permits a person, role, or
organization to document that they have handled an email message by
associating a domain name <xref target="RFC1034"></xref> with the message <xref target="RFC5322"></xref>. A
public key signature is used to record that they have been able
to read the contents of the message and write to it.</t>

<t>Verification of claims is achieved by fetching a public key stored
in the DNS under the relevant domain and then checking the signature.</t>

<t>Message transit from author to recipient is through
Forwarders that typically make no substantive change to the message
content and thus preserve the DKIM2 signature. Where they do make
a change the changes they have made are documented so that
these can be "undone" and the original signature validated.</t>

<t>When a message is forwarded from one system to another an
additional DKIM2 signature is added on each occasion. This chain
of custody assists validators in distinguishing between messages that
were intended to be sent to a particular email address and those
that are being "replayed" to that address.</t>

<t>The chain of custody can also be used to ensure that delivery status
notifications are only sent to entities that were involved in the
transmission of a message.</t>

<t>Organizations that process a message can add to their signature
a request for feedback as to any opinion (for example, that the
email was considered to be spam) that the eventual recipient of
the message wishes to share.</t>

<section anchor="dkim2-architecture-documents"><name>DKIM2 Architecture Documents</name>

<t>Readers are advised to be familiar with the material in TBA, TBA and TBA
which provide the background for the development of DKIM2, an overview
of the service, and deployment and operations guidance and advice.</t>

</section>
</section>
<section anchor="terminology-and-definitions"><name>Terminology and Definitions</name>

<t>This section defines terms used in the rest of the document.</t>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in
<xref target="RFC2119"></xref>.  These words take their normative meanings only when they
are presented in ALL UPPERCASE.</t>

<t>DKIM2 is designed to operate within the Internet Mail service, as
defined in <xref target="RFC5598"></xref>.  Basic email terminology is taken from that
specification.</t>

<t>DKIM2 inherits many ideas from DKIM (<xref target="RFC6376"></xref>) which, for clarity
we refer to in this specification as DKIM1. In addition, some features
were influenced by experience with (see <xref target="CONCLUDEARC"></xref>) the experimental
ARC protocol (<xref target="RFC8617"></xref>).</t>

<t>Syntax descriptions use Augmented BNF (ABNF) <xref target="RFC5234"></xref>.</t>

<t>This document uses JSON <xref target="RFC8259"></xref> to encode the "recipes" which
record changes made to a message header fields or body.
The JSON objects are then base64 encoded. This means that a
standard JSON parser can be used to create what may be quite
complex data structures. Unrecognised fields within JSON objects
MUST be ignored.</t>

<section anchor="signer"><name>Signer</name>

<t>Elements in the mail system that sign messages on behalf of a domain
are referred to as Signers.  These may be MUAs (Mail User Agents),
MSAs (Mail Submission Agents), MTAs (Mail Transfer Agents), or other
agents such as mailing list "exploders".  In general, any Signer will
be involved in the injection of a message into the message system in
some way.  The key point is that a message must be signed before it
leaves the administrative domain of the Signer.</t>

</section>
<section anchor="forwarder"><name>Forwarder</name>

<t><xref target="RFC5598"></xref> defines a Relay as transmitting or retransmitting a message
but states that it will not modify the envelope information or the
message content semantics. It also defines a Gateway as a hybrid of
User and Relay that connects heterogeneous mail services. In this
document we use the concept of a Forwarder which is an MTA that receives
a message and then, as an alternative to delivering it into a
destination mailbox, can forward it on to another system in an
automated, pre-determined, manner.</t>

</section>
<section anchor="reviser"><name>Reviser</name>

<t>As will be seen, a Forwarder may alter the message content or header
fields, in such a way that existing signatures on the message will
no longer validate. If so, then a record will be made of these
changes. We call a Forwarder that makes such changes a Reviser.</t>

</section>
<section anchor="verifier"><name>Verifier</name>

<t>Elements in the mail system that verify signatures are referred to as
Verifiers.  These may be Forwarders, Revisers, MTAs, Mail Delivery
Agents (MDAs), or MUAs.
It is an expectation of DKIM2 that a recipient of a message will
wish to verify some or all signatures before determining whether or
not to accept the message or pass it on to another entity.</t>

</section>
<section anchor="signing-domain"><name>Signing Domain</name>

<t>A domain name associated with a signature. This domain may be
associated with the author of an email, their organization, a
company hired to deliver the email, a mailing list operator, or
some other entity that handles email. What they have in common is
that at some point they had access to the entire contents of the
email and were in a position to add their signature to the email.</t>

</section>
<section anchor="originator"><name>Originator</name>

<t>The entity that creates and sends the initial form of a message.
The Originator adds the first Message-Instance header field (m=1) and
the first DKIM2-Signature header field (i=1) to the message.</t>

</section>
<section anchor="header-field"><name>Header Field</name>

<t>As defined in <xref target="RFC5322"></xref>, a header field is a single logical line in
the message header consisting of a field name, a colon, and a field
body (value).  In this document "header field" always refers to a
single field; "header fields" (plural) refers to multiple fields.
The unqualified term "header" is avoided to prevent ambiguity.</t>

</section>
<section anchor="tag"><name>Tag</name>

<t>A named element within a header field (see <xref target="hfMessageInstance"/>
and <xref target="hfDKIM2signature"/>).  A tag
consists of a tag-name and a tag-value separated by an equals sign.
Tags are separated by semicolons within the header field.</t>

</section>
<section anchor="message-body"><name>Message Body</name>

<t>The content of an email message that follows the blank line after
the header fields, treated as a sequence of octets.  In this document,
the terms "body" and "message body" are used interchangeably.</t>

</section>
<section anchor="hash"><name>Hash</name>

<t>A fixed-length value produced by applying a cryptographic hash
function (such as SHA-256) to an input.  DKIM2 uses hashes to
create a compact, verifiable representation of message header fields
and the message body.</t>

</section>
<section anchor="glossary"><name>Glossary</name>

<t>The following terms are used throughout this document:</t>

<dl>
  <dt>DKIM1</dt>
  <dd>
    <t>The original DomainKeys Identified Mail protocol as specified in
<xref target="RFC6376"></xref>.</t>
  </dd>
  <dt>DKIM2-Signature</dt>
  <dd>
    <t>A header field containing a cryptographic signature over the
Message-Instance and DKIM2-Signature header fields of a message,
along with metadata about the signing domain, SMTP envelope, and
timestamp.</t>
  </dd>
  <dt>Message-Instance</dt>
  <dd>
    <t>A header field containing cryptographic hashes of the message
header fields and body, along with optional recipes that allow
undoing changes made at that hop.</t>
  </dd>
  <dt>Recipe</dt>
  <dd>
    <t>A set of instructions encoded as a JSON object within the r= tag
of a Message-Instance header field.  Recipes allow a Verifier to
reconstruct the previous state of a message from its current state,
by specifying which parts of the header fields or body to copy and
which literal values to substitute.</t>
  </dd>
  <dt>Chain of Custody</dt>
  <dd>
    <t>The sequence of DKIM2-Signature header fields on a message, each
recording the SMTP envelope addresses (MAIL FROM and RCPT TO) used
at each hop.  A valid chain of custody demonstrates that the message
followed a plausible path from Originator to the current recipient.</t>
  </dd>
  <dt>Selector</dt>
  <dd>
    <t>A subdivision of the key namespace for a signing domain, used
to look up the public key in DNS.  The selector value is combined
with the signing domain to form the DNS query name:
selector._domainkey.domain.</t>
  </dd>
</dl>

</section>
<section anchor="whitespace"><name>Whitespace</name>

<t>There are two forms of whitespace used in this specification:</t>

<t><list style="symbols">
  <t>WSP represents simple whitespace, i.e., a space or a tab character
(formal definition in <xref target="RFC5234"></xref>).</t>
  <t>FWS is folding whitespace.  It allows multiple lines separated by
CRLF followed by at least one whitespace, to be joined.</t>
</list></t>

<t>The formal ABNF for these are (WSP given for information only):</t>

<figure><artwork><![CDATA[
WSP =   SP / HTAB
FWS =   [*WSP CRLF] 1*WSP
]]></artwork></figure>

<t>The definition of FWS is identical to that in <xref target="RFC5322"></xref> except for
the exclusion of obs-FWS.</t>

</section>
<section anchor="imported-abnf-tokens"><name>Imported ABNF Tokens</name>

<t>The following tokens are imported from other RFCs as noted.  Those
RFCs should be considered definitive.</t>

<t>The following tokens are imported from <xref target="RFC5321"></xref>:</t>

<t><list style="symbols">
  <t>"Domain"</t>
  <t>"Forward-path"</t>
  <t>"reverse-path"</t>
</list></t>

<t>The following tokens are imported from <xref target="RFC5322"></xref>:</t>

<t><list style="symbols">
  <t>"field-name" (name of a header field)</t>
</list></t>

<t>Other tokens not defined herein are imported from <xref target="RFC5234"></xref>.  These
are intuitive primitives such as SP, HTAB, WSP, ALPHA, DIGIT, CRLF,
etc.</t>

</section>
<section anchor="common-abnf-tokens"><name>Common ABNF Tokens</name>

<t>The following ABNF tokens are used elsewhere in this document:</t>

<figure><artwork><![CDATA[
ALPHADIGITD  = (ALPHA / DIGIT / "-" / "_")

textstring   =  [FWS] ALPHADIGITD *(ALPHADIGITD) [FWS]

ALPHADIGITPS =  (FWS / ALPHA / DIGIT / "+" / "/")

base64string =  ALPHADIGITPS *(ALPHADIGITPS) [[FWS] "=" [[FWS] "="]]
]]></artwork></figure>

<t>Note that base64strings are defined in <xref target="RFC4648"></xref>, but that document
does not contain any ABNF. Note that a base64string MUST be padded
with trailing = characters if needed.</t>

<t>Note that the definition of base64string allows
for the presence of FWS, which simplifies folding header fields
to an allowable line length. FWS within base64strings will be
ignored when their value is being used.</t>

</section>
</section>
<section anchor="algorithms"><name>Signing and Verification Cryptographic Algorithms</name>

<t>DKIM2 supports multiple hashing and digital signature algorithms. One
hash function (SHA256) is specified here and two signing algorithms
are defined by this specification: RSA-SHA256 and Ed25519-SHA256.
Signers and Verifiers MUST implement SHA256. Signers SHOULD implement
both RSA-SHA256 and Ed25519-SHA256. Verifiers MUST implement both
RSA-SHA256 and Ed25519-SHA256.</t>

<section anchor="the-sha256-hashing-algorithm"><name>The SHA256 Hashing Algorithm</name>

<t>The SHA256 hashing algorithm is used to compute body and
header hashes as defined in <xref target="computing-body-hash"/> and
<xref target="computing-header-hash"/>.</t>

<t>The resultant values are identified by the text string "sha256" and
placed into Message-Instance header fields.</t>

</section>
<section anchor="the-rsa-sha256-signing-algorithm"><name>The RSA-SHA256 Signing Algorithm</name>

<t>The RSA-SHA256 Signing Algorithm computes a hash over all the Message-Instance
and DKIM2-Signature header fields as described in <xref target="calculate-signature"/> using
SHA-256 (FIPS-180-4-2015) as the hash-alg.  That
hash is then signed by the Signer using the RSA algorithm (defined in
PKCS#1 version 1.5 <xref target="RFC8017"></xref>) as the crypt-alg and the Signer's
private key.  The hash MUST NOT be truncated or converted into any
form other than the native binary form before being signed.  The
signing algorithm MUST use a public exponent of 65537.</t>

<t>Signers MUST use RSA keys of at least 1024 bits.  Verifiers MUST be able
to validate signatures with keys ranging from 1024 bits to 2048 bits, and
they MAY be able to validate signatures with larger keys.</t>

<t>The signature value (expressed in base64) is placed (with the identifying
text string "rsa-sha256") into DKIM2-Signature header fields.</t>

</section>
<section anchor="the-ed25519-sha256-signing-algorithm"><name>The Ed25519-SHA256 Signing Algorithm</name>

<t>The Ed25519-SHA256 Signing Algorithm computes a hash over all the Message-Instance
and DKIM2-Signature fields as described in <xref target="calculate-signature"/> using
SHA-256 (FIPS-180-4-2015) as the hash-alg. It signs the hash with the PureEdDSA
variant Ed25519, as defined in Section 5.1 of <xref target="RFC8032"></xref>.</t>

<t>The signature value (expressed in base64) is placed (with the identifying
text string "ed25519-sha256") into DKIM2-Signature header fields.</t>

</section>
<section anchor="other-algorithms"><name>Other Algorithms</name>

<t>Other algorithms MAY be defined in the future.  Verifiers MUST ignore
any hashes or signatures using algorithms that they do not implement.</t>

</section>
<section anchor="selectors"><name>Selectors</name>

<t>To support multiple concurrent public keys per signing domain, the
key namespace is subdivided using "selectors".</t>

<t>The number of public keys and corresponding selectors for each domain
is determined by the domain owner. Many domain owners will use just one
selector, whereas administratively distributed organizations can choose
to manage disparate selectors
and key pairs in different regions or on different email servers.
Selectors can also be used to delegate a signing authority, which
can be withdrawn at any time. Selectors also make it possible to
seamlessly replace keys on a routine basis by signing with a new
selector, while keeping the key associated with the old selector
available.</t>

<t>Periods are allowed in selectors and are component separators. Periods in
selectors define DNS label boundaries in a manner similar to the
conventional use in domain names.  This will allow portions of
the selector namespace to be delegated.</t>

<t>ABNF:</t>

<figure><artwork><![CDATA[
selector = Domain
]]></artwork></figure>

</section>
<section anchor="key_management"><name>Key Management</name>

<t>Some level of assurance is required that
a public key is associated with the claimed Signer. DKIM2
does this by fetching the key from the DNS for the domain specified
in the d= field of the DKIM2-Signature header field.</t>

<t>DKIM2 keys are stored in a subdomain named "_domainkey".  Given a
DKIM2-Signature field with a "d=" tag of "example.com" and a selector
of "foo.bar", the DNS query will be for "foo.bar._domainkey.example.com".</t>

<t>NOTE: these keys are no different, and are stored in the same locations
as those for DKIM1 (<xref target="RFC6376"></xref>).</t>

<t>Further details can be found in <xref target="DKIMKEYS"></xref>.</t>

</section>
</section>
<section anchor="JSONrecipe"><name>Recipes</name>

<t>A set of "recipes" is used to recreate the previous version of the body
and/or header fields of a message. The recipes are provided
within a JSON object with the schema:</t>

<figure><artwork><![CDATA[
{
  "$schema": "https://json-schema.org/draft/2020-12/schema",
  "$id": "https://dkim2.org/schemas/recipe-v1",
  "title": "DKIM2 recipes",
  "description": "see draft-dkim-dkim2-spec",
  "type": "object",
  "properties": {
    "h": {
      "description": [ "recipes to recreate header fields",
        "keys are header field names matched case-insensitively",
        "and there MUST NOT be keys that differ only in case"],
      "oneOf": [
        {
          "description": "per-field-name recipe arrays",
          "type": "object",
          "minProperties": 1,
          "additionalProperties": { "$ref": "#/$defs/recipe-steps" }
        },
        {
          "description": "previous header state cannot be recreated",
          "type": "null"
        }
      ]
    },
    "b": {
      "description": "recipes to recreate the body",
      "oneOf": [
        {
          "description": "body recipes",
          "$ref": "#/$defs/recipe-steps"
        },
        {
          "description": "previous body state cannot be recreated",
          "type": "null"
        },
        {
          "description": "body was truncated (DSN)",
          "type": "object",
          "properties": {
            "z": { "type": "boolean", "const": true }
          },
          "required": ["z"], "additionalProperties": false
        }
      ]
    }
  },
  "anyOf": [
    { "required": ["h"] },
    { "required": ["b"] }
  ],
  "$defs": {
    "recipe-steps": {
      "type": "array",
      "items": {
        "oneOf": [
          {
            "description": "copy lines/fields, start to end inclusive",
            "type": "object",
            "properties": {
              "c": { "type": "array",
                "items": { "type": "integer", "minimum": 1 },
                "minItems": 2, "maxItems": 2
              }
            },
            "required": ["c"], "additionalProperties": false
          },
          {
            "description": "data lines/values to emit",
            "type": "object",
            "properties": {
              "d": { "type": "array",
                "items": { "type": "string" },
                "minItems": 1
              }
            },
            "required": ["d"], "additionalProperties": false
          }
        ]
      }
    }
  }
}
]]></artwork></figure>

<t>Note that the specification of JSON schemas is maintained by the JSON Schema
organisation, and the relevant specification document is linked to by the
$schema field in each JSON schema.</t>

<section anchor="header-recipes"><name>Header Recipes</name>

<t>A Header Recipe is an array of instructions applied to the specified
header fields with the given header field name. These instructions
are applied in order to the message which has been received
so as to recreate the message as it was before modifications were made.</t>

<t>If there is no "h" field in the JSON object then there was no
modification to the header fields.</t>

<t>If the "h" field value is null (there are no recipes for
any header field) then the previous state of the header fields
cannot be recreated. Verifiers of the message may be able to
determine, by seeing which entity makes this declaration, that
this is acceptable to them because, for example, that entity
is providing a contractually arranged service.</t>

<t>Matching of header field names is always done without regard to case.</t>

<t>If a header field name is not present in the JSON object then all
header fields with that header field name are to be retained.</t>

<t>If the recipe array for a header field name that is present in the
JSON object is empty then all instances of that header field are to
be removed to reinstate the previous state of the message.</t>

<t>Header fields are numbered "bottom up" (the opposite direction to
the body lines). That is to say, when walking the header fields
from the top of the message to end of the header fields then
the last header field instance
encountered with any particular header field name is numbered 1,
the header field (with the same header field name) above that is
numbered 2, and so on.</t>

<t>The header fields should be treated as
being unwrapped (in the normal <xref target="RFC5321"></xref> manner). That is, all
of the physical lines that form a single header field are
processed under the same logical number.</t>

<t>The recipes are processed in order and the resulting header
fields are emitted so that later header field will appear above
earlier header fields in the recreated message.</t>

<t>Each recipe step is a JSON object with exactly one key:</t>

<t>A "c" step has the form {"c": [start, end]}. The relevant header field
instances numbered from start to end inclusive, are to be emitted.
The start value of each "c" step MUST be in ascending order and
MUST be greater than the end value of all preceding "c" steps
for this header field name.</t>

<t>A "d" step has the form {"d": ["value1", "value2", ...]}. Each
string in the array is treated as a value to which the
relevant header field name and a colon is prepended and a CRLF
is appended and the resultant string is then emitted. Note that
the way in which hashes are calculated (see <xref target="computing-header-hash"/>)
means that no heed needs to be taken of wrapping
or the case of the header field name. The text strings MUST NOT
contain CR or LF characters. If a string is empty then the
CRLF will immediately follow the header field name and colon.</t>

</section>
<section anchor="body-recipes"><name>Body Recipes</name>

<t>A Body Recipe is an array of instructions applied to the message
body which can recreate the message as it was before modifications
were made.</t>

<t>If there is no "b" field in the JSON object then there was no
modification to the message body. Note that the JSON schema
requires either "h" or "b" to be present.</t>

<t>If the "b" field is null (there are no recipes) then the previous
state of the message body
cannot be recreated. Verifiers of the message may be able to
determine, by seeing which entity makes this declaration, that
this is acceptable to them because, for example, that entity
is providing a contractually arranged service.</t>

<t>Body lines are numbered "top down" (the opposite direction to
the header fields). The first line of the body (immediately after
the blank line that indicates that there are no more header fields)
is numbered 1.</t>

<t>The recipes are processed in order and the resulting body lines
fields are emitted so that later lines will appear below
earlier lines in the recreated message.</t>

<t>Each recipe step is a JSON object with exactly one key:</t>

<t>A "c" step has the form {"c": [start, end]}. The message body lines
from start to end, inclusive, are to be emitted. The start value of
each "c" step MUST be in ascending order and MUST be greater than the
end value of all preceding "c" steps.</t>

<t>A "d" step has the form {"d": ["line1", "line2", ...]}. Each
string in the array has a CRLF
appended and the resultant string is emitted. The text strings MUST NOT
contain CR or LF characters. If a string is empty then just
a CRLF is emitted.</t>

<t>A "z" step has the form {"z": true} and indicates that the
body was truncated (see the DSN handling in <xref target="bounce"/>).</t>

</section>
</section>
<section anchor="messagehashes"><name>Message Hash Values</name>

<t>A set of cryptographic "hashes" are used to record the current
message body and header fields. The hashes are placed into the
h= tag of a Message-Instance header field.</t>

<t>To provide for algorithmic dexterity more that one hash value, using a
different algorithm MAY be supplied in the same Message-Instance
header field.</t>

<t>Since Message-Instance header fields are ignored when calculating the
header hash value, the body hash and header hash may be calculated in
any convenient order.</t>

<section anchor="computing-body-hash"><name>Computing the Body Hash</name>

<t>The body of messages is treated as merely a string of octets. DKIM2
messages MAY be either in plain-text or in MIME format; no special
treatment is afforded to MIME content. Message attachments in MIME
format MUST be included in the content that is signed.</t>

<t>The DKIM2 body hash is calculated in the same manner as DKIM1's "simple"
scheme:</t>

<t>All empty lines at the end of the message body are ignored. An empty line
is a line of zero length after removal of the line terminator.  If there
is no body or no trailing CRLF on the message body, a CRLF is added. That
is "*CRLF" at the end of the body is converted to "CRLF".</t>

<t>No other changes are made to the body, which is then processed by the
relevant hash algorithm(s). The name of the hash and the hash value
(converted to base64 form) is then inserted into (Signers) or compared
to (Verifiers) the value of the "h=" tag of the Message-Instance header
field that is being created/verified. If multiple hashes are calculated
then multiple entries within the "h=" value will be inserted/compared.</t>

</section>
<section anchor="computing-header-hash"><name>Computing the Header Fields Hash</name>

<t>The header fields hash calculation done by a Signer MUST apply the
following steps in the order given. A Verifier will need to do the
equivalent steps in order to check that the hash they have received
is correct.</t>

<t><list style="symbols">
  <t>Ignore some header fields  <vspace blankLines='1'/>
When calculating the header field hash "Received" or "Return-Path"
header fields MUST be ignored.
These are Trace headers as described in <xref target="RFC5321"></xref>
and serve only to document details of the SMTP transmission process.  <vspace blankLines='1'/>
When calculating the header field hash any header field with
a header field name starting with "X-" MUST be ignored.
Currently deployed email systems use these fields as
proprietary Trace headers which have no defined meaning for
other systems and it considerably simplifies reporting
on changes to header fields to ignore them.  <vspace blankLines='1'/>
When calculating the header field hash any "Message-Instance" or
"DKIM2-Signature" header fields MUST be ignored. These header
fields will be included in the hash value that will be signed
by a DKIM2-Signature header field and it simplifies implementations
if they are not included twice, especially when determining
whether all modifications to a message have been correctly declared.  <vspace blankLines='1'/>
When calculating the header field hash any "DKIM-Signature" header
fields and any header fields whose field name starts with "ARC-"
MUST be ignored. Not including
DKIM1 and ARC signatures means that systems that wish to add other
types of signature as well as a DKIM2 signature are free to do this
in any convenient order.</t>
  <t>Convert all header field names (not the header field values) to
lowercase.  For example, convert "SUBJect: AbC" to "subject: AbC".</t>
  <t>Unfold all header field continuation lines as described in
<xref target="RFC5322"></xref>; in particular, lines with terminators embedded in
continued header field values (that is, CRLF sequences followed by
WSP) MUST be interpreted without the CRLF.  Implementations MUST
NOT remove the CRLF at the end of the header field value.</t>
  <t>Convert all sequences of one or more WSP characters to a single SP
character.  WSP characters here include those before and after a
line folding boundary.</t>
  <t>Delete all WSP characters at the end of each unfolded header field
value.</t>
  <t>Delete any WSP characters remaining before and after the colon
separating the header field name from the header field value.  The
colon separator MUST be retained.</t>
  <t>Place the header fields in alphabetical order by the header field
name.</t>
  <t>If there is more than one header with the same header field name
then the header fields are placed in the order in which they were
likely to have been placed into the message header, that is from
the last within the header upwards (the same ordering as is used
in the header recipes (see <xref target="header-recipes"/>).  <vspace blankLines='1'/>
It is sometimes suggested that some MTAs re-order
header fields after they receive an email. If an MTA does change the
order of header fields with the same header field name (and those
header fields will be included in the hash calculation) then it is their
responsibility to recover the original order
before verifying an existing signature or passing a previously signed
message to another MTA that may wish to do such verification.</t>
  <t>The hash(es) of the concatenated header fields are calculated.</t>
</list></t>

<t>The name of the hash and the hash value
(converted to base64 form) is then inserted into (Signers) or compared
to (Verifiers) the value of the "h=" tag of the Message-Instance header
field that is being created/verified. If multiple hashes are calculated
then multiple entries within the "h=" value will be inserted/compared.</t>

</section>
</section>
<section anchor="hfMessageInstance"><name>The Message-Instance Header Field</name>

<t>A Message-Instance header field documents the current contents of
the message and, in the case of a Reviser, records any relevant
changes that have been made to the incoming message.</t>

<t>The Message-Instance header field is a list of tag values as described
below. The m= and h= tags MUST be present. The r= tag is optional.</t>

<t>The tag identifiers (before the = sign) MUST be treated as case
insignificant, the tag value (after the = sign) is case significant. The
tags may appear in any order, but MUST be only one of each kind. Unknown
tags, for extensions, MUST be ignored.</t>

<t>ABNF:</t>

<figure><artwork><![CDATA[
mi-field    = "Message-Instance:" mi-tag-list
mi-tag-list = *([FWS] mi-tag [FWS] ";" [FWS])
mi-tag      = mi-m-tag / mi-h-tag / mi-r-tag / x-tag
x-tag       = ALPHA *(ALPHA / DIGIT / "_") "=" %x21-3A / %x3C-7E
              ; for extension
]]></artwork></figure>

<section anchor="m-the-revision-number-of-the-message-instance-header-field"><name>m= the revision number of the Message-Instance header field</name>

<t>The Originator of a message uses the
value 1. Further Message-Instance header fields are added with a value one
more than the current highest numbered Message-Instance header field. Gaps
in the numbering MUST be treated as making the whole message impossible
to verify.</t>

<t>ABNF:</t>

<figure><artwork><![CDATA[
mi-m-tag    = %x6d [FWS] "=" [FWS] 1*DIGIT
]]></artwork></figure>

</section>
<section anchor="r-recipes-to-recreate-the-previous-instance-of-the-message"><name>r= recipes to recreate the previous instance of the message</name>

<t>The r= tag value is the base64 encoded version of the JSON object that
contains the recipes that allow the previous instance of the message
to be recreated (see <xref target="JSONrecipe"/>}.</t>

<t>ABNF:</t>

<figure><artwork><![CDATA[
mi-r-tag    = %x72 [FWS] "=" base64string
]]></artwork></figure>

</section>
<section anchor="h-the-hash-values-for-the-message"><name>h= the hash values for the message</name>

<t>The h= tag value contains the hash name, header hash value and body
hash value. Calculating the hash values is explained in <xref target="messagehashes"/>.</t>

<t>ABNF:</t>

<figure><artwork><![CDATA[
mi-h-tag    = %x68 [FWS] "=" hash-set *("," hash-set )
hash-set    = [FWS] hash-name [FWS] ":" header-hash ":" body-hash
hash-name   = "sha256" / x-hash-name
header-hash = base64string
body-hash   = base64string
x-hash-name = textstring ; for later expansion
]]></artwork></figure>

</section>
</section>
<section anchor="hfDKIM2signature"><name>The DKIM2-Signature Header Field</name>

<t>The signature of the email is stored in a DKIM2-Signature header
field.  This header field contains tag values that provide the
signature and key-fetching data. The i=, m=, t=, mf=, rt=, d=
and s= tags MUST be present. The other tags are optional.</t>

<t>The tag identifiers (before the = sign) MUST be treated as case
insignificant, the tag value (after the = sign) is case significant. The
tags may appear in any order, but MUST be only one of each kind. Unknown
tags, for extensions, MUST be ignored.</t>

<t>ABNF:</t>

<figure><artwork><![CDATA[
sig-field    = "DKIM2-Signature:" sig-tag-list
sig-tag-list = *([FWS] sig-tag [FWS] ";" [FWS])
sig-tag      = sig-i-tag / sig-m-tag / sig-t-tag / sig-mf-tag /
               sig-rt-tag / sig-d-tag / sig-s-tag / sig-n-tag /
               sig-f-tag / x-tag
]]></artwork></figure>

<t>It will be noted that we have not included a version number.  Experience
from IMF onwards shows that it is essentially impossible to change
version numbers. If it becomes necessary to change DKIM2 in the sort
of incompatible way that a v=2 / v=3 version number would support,
it is expected that header fields will be labelled as DKIM3 instead.</t>

<section anchor="i-the-sequence-number-of-the-dkim2-signature-header-field"><name>i= the sequence number of the DKIM2-Signature header field</name>

<t>The Originator of a message uses the
value 1. Further DKIM2-Signature header fields are added with a value one
more than the current highest numbered DKIM2-Signature header field. Gaps
in the numbering MUST be treated as making the whole message unsigned.</t>

<t>ABNF:</t>

<figure><artwork><![CDATA[
sig-i-tag = %x69 [FWS] "=" [FWS] 1*DIGIT
]]></artwork></figure>

</section>
<section anchor="m-the-highest-numbered-message-instance-header-field"><name>m= the highest numbered Message-Instance header field</name>

<t>This value allows verifiers to determine which entity made a particular
revision to the message header fields or body.</t>

<t>ABNF:</t>

<figure><artwork><![CDATA[
sig-m-tag = %x6d [FWS] "=" [FWS] 1*DIGIT
]]></artwork></figure>

</section>
<section anchor="n-nonce-value"><name>n=  nonce value</name>

<t>This text value, if present, has a meaning to the creator of the signature
but MUST NOT be assumed to have any meaning to any other entity. It
MAY be used as an index into a database to assist in handling Delivery
Status Notifications or for any other purpose.</t>

<t>To discourage use of this tag field as an alternative to the use of more
appropriate header fields, the length of the string MUST NOT
exceed 64 characters and implementations SHOULD reject messages
where this limit has been ignored.</t>

<t>Note the value MUST be simple ASCII and MUST NOT contain semicolon.</t>

<t>ABNF:</t>

<figure><artwork><![CDATA[
sig-n-tag   = %x6e [FWS] "=" [FWS] nonce-value
nonce-value = *64(%x21-3A / %x3C-7E)
                  ; printable ASCII except semicolon, max 64 chars
]]></artwork></figure>

</section>
<section anchor="t-signature-timestamp"><name>t=  signature timestamp</name>

<t>The time that this header field was created. The format is the number of
seconds since 00:00:00 on January 1, 1970 in the UTC time zone.  The value
is expressed as an unsigned integer in decimal ASCII.  This value
is not constrained to fit into a 31- or 32-bit integer.</t>

<t>Implementations SHOULD be prepared to handle values up to at least
10^12 (until approximately AD 200,000; this fits into 40 bits).</t>

<t>Implementations MAY ignore signatures that have a timestamp in the future.
Implementations MAY ignore signatures that are more than 14 days old.</t>

<t>ABNF:</t>

<figure><artwork><![CDATA[
sig-t-tag    = %x74 [FWS] "=" [FWS] 1*DIGIT
]]></artwork></figure>

</section>
<section anchor="mf-the-mail-from-used-when-the-message-was-sent"><name>mf= the MAIL FROM used when the message was sent</name>

<t>DKIM2 records the <xref target="RFC5321"></xref> MAIL FROM value that was used when the message
was transmitted over an SMTP link from the signing MTA. Note that MAIL FROM
may be just "&lt;&gt;", for example for a Delivery Status Notification.</t>

<t>The value is recorded as the base64 encoding of the <xref target="RFC5321"></xref> reverse-path
because of the complex syntax of reverse-path values (which can include
characters which would confuse naive parsers of DKIM2-Signature header
fields). The angle brackets MUST be included, but any "Mail-parameters"
that were present after the reverse-path MUST NOT be included.</t>

<t>ABNF:</t>

<figure><artwork><![CDATA[
sig-mf-tag  = %x6d %x66 [FWS] "=" base64string
]]></artwork></figure>

</section>
<section anchor="rt-the-rcpt-to-values-used-when-the-message-was-sent"><name>rt= the RCPT TO value(s) used when the message was sent</name>

<t>DKIM2 records the <xref target="RFC5321"></xref> RCPT TO value(s) that were used when the message
was transmitted over an SMTP link from the signing MTA.</t>

<t>The value is recorded as the base64 encoding of the <xref target="RFC5321"></xref> Forward-path
because of the complex syntax of Forward-path values (which can include
characters which would confuse naive parsers of DKIM2-Signature header
fields). The angle brackets MUST be included, but any "Rcpt-parameters"
that were present after the Forward-path MUST NOT be included.</t>

<t>When a message is intended for more than one recipient then the RCPT
TO values provided MAY include all of the recipients so that a single
copy of the email MAY be sent to all of the recipients in a single SMTP
transaction. Alternatively, multiple copies of the email may be
generated so as to not immediately reveal who else received the email.</t>

<t>However, if "bcc:" recipients are involved then in order to
meet the requirements of <xref target="RFC5322"></xref> Section 3.6.3 each and every
bcc recipients MUST NOT revealed to any other message recipient.</t>

<t>ABNF:</t>

<figure><artwork><![CDATA[
sig-rt-tag = %x72 %x74 [FWS] "=" base64string *("," base64string)
]]></artwork></figure>

</section>
<section anchor="d-the-domain-associated-with-this-signature"><name>d=  the domain associated with this signature.</name>

<t>This domain is used to form the query for the public key. The domain MUST be a valid DNS
name under which the DKIM2 key record is published.</t>

<t>The domain name in the d= tag MUST exactly match the rightmost labels of
the domain name of the mf= tag. That is to say, the domain name of the
mf= tag MUST either match the d= domain exactly or be a sub-domain
of the d= domain name.</t>

<t>When the mf= domain is empty ("&lt;&gt;"), as will be the case for Delivery
Status Notifications (DSNs), then no match is required.</t>

<t>ABNF:</t>

<figure><artwork><![CDATA[
sig-d-tag   = %x64 [FWS] "=" [FWS] Domain
]]></artwork></figure>

</section>
<section anchor="s-the-signature-values-for-the-message"><name>s= the signature value(s) for the message</name>

<t>The s= tag value contains the selector, signature algorithm name and
signature value. Calculating the value is explained in
<xref target="calculate-signature"/>.</t>

<t>The selector values subdivides the namespace for the domain being
used for signing.</t>

<t>The algorithm value is the one used to generate
the signature. Verifiers MUST support "RSA-SHA256" for which
the string "rsa-sha256" is used and "Ed25519-SHA256" for which the
string "ed25519-sha256" is used. See <xref target="algorithms"/> for a description
of these algorithms.</t>

<t>To provide for algorithmic dexterity more than one signature,
using different algorithms, MAY be supplied. Since the DNS lookup for
the public key will check that the k= algorithm value matches, a different
selector MUST necessarily be used for each signature.</t>

<t>ABNF:</t>

<figure><artwork><![CDATA[
sig-s-tag   = %x73 [FWS] "=" [FWS] sig-set *( "," sig-set )
sig-set     = selector [FWS] ":" [FWS] sig-name [FWS] ":" message-sig
sig-name    = "rsa-sha256" / "ed25519-sha256" / x-sig-name
x-sig-name  = textstring     ; for later extension
message-sig = base64string
]]></artwork></figure>

</section>
<section anchor="f-flags"><name>f=  flags</name>

<t>Flags serve two purposes; they either report what has been done to
the message by the system creating the DKIM2-Signature or they make
a request to systems that handle the mail thereafter. Flags are
separated by commas, and optional white-space allows systems to
add several flags without creating long lines.</t>

<t>If a flag value is not recognised it MUST be ignored.</t>

<t>The flag values that report things are:</t>

<t>"exploded": this message (identified by its unique header hash value (recorded
in the h= JSON object of the relevant Message-Instance) is being sent to more
than one email address. An
MTA which receives a message MAY use this information to help it distinguish
between malicious "DKIM replay" and legitimate activity performed by
mailing list. If this flag is not present in at least one DKIM2-Signature
header field then an MTA MAY assume that only one copy of a particular
message (identified by relevant cryptographic hash values) is intended
to exist;</t>

<t>The flags values that make requests are:</t>

<t>"donotexplode": this Signer requests that the message not be sent to more
than one recipient. A system that, by local policy, ignores this request
MUST NOT allow any of the copies it creates to be forwarded on to any
MTA outside its control.</t>

<t>"donotmodify": this Signer requests that the message not be modified from
the form in which it is sent. A system that, by local policy, ignores this
request MUST NOT allow the message to be forwarded on to any
MTA outside its control.</t>

<t>"feedback": this Signer requests feedback about how this message is handled
during delivery and thereafter. This document does not describe what such
feedback might be or where it might be delivered. If this flag is absent
then feedback is explicitly not required.</t>

<t>ABNF:</t>

<figure><artwork><![CDATA[
sig-f-tag        = %x66 [FWS] "=" [FWS] sig-f-tag-data
                   *( [FWS] "," [FWS] sig-f-tag-data)
sig-f-tag-data   = "donotmodify" | "donotexplode" | "feedback" |
                   "exploded" | x-sig-f-tag-data
x-sig-f-tag-data = textstring ; for later extension
]]></artwork></figure>

</section>
</section>
<section anchor="signer-actions"><name>Signer Actions</name>

<t>This section gives the actions that need to be undertaken by the signer
of a message. They may be done in any appropriate order.</t>

<section anchor="add-any-necessary-message-instance-header-fields"><name>Add any Necessary Message-Instance Header Fields</name>

<t>If a system is generating the initial form of a message or if
it is a Reviser that has made changes to the message body and/or
header fields then it MUST compute the body hash as described in
<xref target="computing-body-hash"/> and the hash of the header fields
as described in <xref target="computing-header-hash"/>.</t>

<t>If the message does not contain a Message-Instance header field then one
MUST be added.</t>

<t>If hashing the message body or relevant header fields does not
give the same hash values as those recorded in the highest version
(m=) Message-Instance header field then a new Message-Instance
header field MUST be added and if they are the same a new
Message-Instance header field SHOULD NOT be added.</t>

<t>A Message-Instance header field MUST contain "recipes" to be able to
recreate the message corresponding to the hash values in the
currently highest numbered Message-Instance header field, or a
null recipe to indicate that recreating the previous version
of the message will not be possible.</t>

<t>A system may add more than one Message-Instance header field if it
wishes to do so, but the DKIM2 design allows all modifications made by
any single system to be documented
in a single Message-Instance header field.</t>

<t>Note that the first (m=1) Message-Instance header field MAY
contain "recipes" if it is wished to record any changes made to a
message as it enters the DKIM2 ecosystem. All other Message-Instance
header fields SHOULD contain at least one "recipe".</t>

</section>
<section anchor="chain-of-custody"><name>Provide a "Chain of Custody" for the Message</name>

<t>The DKIM2-Signature header field contains the MAIL FROM
and RCPT TO values that will be used when the message is transmitted,
so these <xref target="RFC5321"></xref> "envelope" values MUST be available to (or
deducible by) a Signer.</t>

<t>The receiver of a message will check for an exact match (including
the local parts of the email addresses) between the MAIL FROM / RCPT TO
<xref target="RFC5321"></xref> protocol values and the mf= and rt= values in the highest numbered
(most recent) DKIM2-Signature header field. It is acceptable for there to
be more RCPT TO email addresses recorded in rt= than are actually used in
the SMTP conversation, but any RCPT TO value which is used MUST be present.</t>

<t>Verifiers will check for a relaxed domain match (see <xref target="relaxed-domain-match"/>)
between the signing domain (d=) and the domain in the MAIL FROM value.</t>

<t>When the message being signed already has a DKIM2-Signature header field
(i.e. it has already been transmitted at least once) then a valid
"chain of custody" MUST be apparent when all of the DKIM2-Signature header fields
are considered. This "chain of custody" contributes to the way in
which DKIM2 tackles "DKIM replay" attacks.</t>

<t>In any situation where a message will be forwarded in such a way that the
mf= on the outgoing message is such that the "chain of custody"
would be broken then the Signer MUST generate an extra DKIM2-Signature
header field that causes values to match, i.e. a record must be fabricated
that documents the mail being passed from one domain to another.</t>

<t>It will be noted that the
creation of this extra header field will require the Signer to have access
to a DKIM2 private key associated with a domain in the RCPT TO entry. This is
often achieved by the Signer creating the private key and never sharing it and
then taking one of two approaches to publishing the public key.
The first is to provide the public key (and selector value) to the domain owner
who creates an appropriate DNS entry. The alternative is for the Signer 
to create a public
key DNS entry within a part of the DNS that they control and the domain owner
publishes a CNAME pointing at this.</t>

<t>If an MTA does not change anything in the message which would require
a new Message-Instance header field and it is going to send it onwards
to a system that be able to verify the existing message (that is no
changes are made to the MAIL FROM and RCPT TO values) and there is no
other reason to add a DKIM2-Signature header field then the MTA MAY
choose not to add one. This means that an essentially transparent
SMTP forwarding system need not be made "DKIM2 aware".</t>

</section>
<section anchor="relaxed-domain-match"><name>The Relaxed Domain Match Algorithm</name>

<t>To assist in addressing the "DKIM replay" problem DKIM2 provides a
"chain of custody" for every message. This is established by checking
that the MAIL FROM value recorded in every DKIM2-Signature header field
(except of course the i=1 instance) can be matched with a RCPT TO value
of the next lower numbered DKIM2-Signature header field.</t>

<t>It is also necessary to check DKIM2-Signature header fields for a match
between the signing domain (specified in the d= tag) and the MAIL FROM
domain.</t>

<t>To allow systems to use existing "bounce-handling" schemes with special
subdomains in their MAIL FROM values a "relaxed" approach is taken
to the matches between these values.</t>

<t><list style="symbols">
  <t>Only the domain part of the MAIL FROM and RCPT TO values is used
for these matches The local part (and the @) are ignored.</t>
  <t>If there is not an exact match between the domain names then labels
are removed, one by one from the left hand side of the MAIL
FROM domain name and the comparison is repeated.</t>
  <t>If no labels remain then there is no match.</t>
</list></t>

</section>
<section anchor="signer_privatekey"><name>Select a Private Key and Corresponding Selector Value</name>

<t>This specification does not define the basis by which a Signer should
choose which private key and selector value to use -- this will be a
matter of administrative convenience.  Distribution and management of private
keys is also outside the scope of this document.</t>

</section>
<section anchor="calculate-signature"><name>Calculate a Signature Value</name>

<t>A Signer calculates a signature solely over the Message-Instance and
DKIM2-Signature header fields of the message. The hashes of
the body and other header fields are covered by the hashes in
the highest version (m=) Message-Instance header field and hence
the signature will in practice be signing the message as a whole.</t>

<t>Most cryptographic schemes proceed by first calculating a hash value
and then signing the hash value, but the DKIM2-Signature header field
only provides the final signature value. This means that there
is no difficulty if the hash value is inordinately long, or is
not emitted by the cryptographic routine being used.</t>

<t>The signature algorithm MUST apply the following steps
in the order given (which are not quite the same as the steps
undertaken in calculating header hashes).</t>

<t><list style="symbols">
  <t>Convert all relevant header field names (not the header field values) to
lowercase.  For example, convert "DKIM2-signature" to "dkim2-signature".</t>
  <t>Unfold all header field continuation lines as described in
<xref target="RFC5322"></xref>; in particular, lines with terminators embedded in
continued header field values (that is, CRLF sequences followed by
WSP) MUST be interpreted without the CRLF.  Implementations MUST
NOT remove the CRLF at the end of the header field value.</t>
  <t>Delete all WSP characters. This means all WSP characters before and
after the colon separating the header field name from the header
field value, all WSP characters within the unfolded header field
value and all trailing WPS characters before the CRLF. The colon
separator and the CRLF MUST be retained.</t>
  <t>Place the header fields in order. First come the Message-Instance
header fields in ascending instance (m=) order. Second are the
DKIM2-Signature header fields in ascending sequence (i=) order.
Last of all is an incomplete DKIM2-Signature header field (the
one that this system is creating) with all tags present except
that the signature value(s) within the (s=) value are set to
the null string (""). The incomplete header field MUST be
unfolded, MUST have a trailing CRLF and MUST have spaces removed
in just the same way as the
complete header fields being processed.</t>
  <t>The concatenated header fields are then fed to the signature
algorithm(s). Once all the values are available the null 
signature value strings
are replaced by the base64 values of the signatures.</t>
</list></t>

</section>
</section>
<section anchor="verification-requirements"><name>Verification Requirements</name>

<t>The details of verification appear in <xref target="verifier_actions"/> below.
This section considers when verification should be performed and
how thorough it needs to be.</t>

<section anchor="check-most-recent-signature-and-hashes-for-the-message"><name>Check Most Recent Signature and Hashes for the Message</name>

<t>A Verifier SHOULD check the validity of the most recently applied
(highest numbered i= value) DKIM2-Signature header field
and the associated (m=) Message-Instance before accepting an email.</t>

<t>If these checks
do not pass then a Delivery Status Notification (DSN) for the email MUST
NOT be generated thereafter -- hence the best strategy, if the email
is not wanted, is to reject it (with a 5xx error code) whilst the
relevant SMTP conversation is still ongoing. If the check gives
a TEMPFAIL result then a 4xx error code SHOULD be used to allow the
sending MTA to understand the situation.</t>

<t>If the checks do pass and it is later determined that the email
is unacceptable for any reason then a DSN MAY be created and
passed to the system that delivered the email. The details of
this procedure appear in <xref target="bounce"/>.</t>

</section>
<section anchor="checking-the-message-instance-header-fields"><name>Checking the Message-Instance Header Fields</name>

<t>If the message has been modified since its original creation then
the Message-Instance header fields will enable a Verifier to determine
whether or not all the changes made are correctly recorded
by using the "recipes" to construct each preceding version
of the message.</t>

<t>Note that if it is only the first form of the message is of
interest then all the "recipes" can be applied in turn and
only one hash value checked -- the correctness of the
intermediate hash values are not relevant to this assessment.</t>

</section>
<section anchor="checking-the-dkim2-signature-header-fields"><name>Checking the DKIM2-Signature Header Fields</name>

<t>However, in order to check the chain of custody, to assess
whether the message has been exploded, to pick out
"feedback" requests to be honoured or to assign reputation to
Revisers then all of the DKIM2-Signature header fields
will have to checked for validity. The TBA document explores
these issues in more detail.</t>

</section>
<section anchor="verifier_interpret"><name>Interpret Results/Apply Local Policy</name>

<t>It is beyond the scope of this specification to describe what actions
the recipient of an email performs, but mail carrying valid DKIM2
signatures gives the recipient opportunities that unauthenticated
email would not.  Specifically, an authenticated email provides
predictable information by which other decisions can reliably be
managed, such as trust and reputation.  Conversely, it is hard
to assign trust or reputation to unauthenticated email.</t>

<t>If an MTA wishes to reject messages where signatures are missing
or do not verify, the handling MTA
SHOULD use a 550/5.7.x reply code.</t>

<t>Where the Verifier is integrated within the MTA and it is not
possible to fetch the public key, perhaps because the key server is
not available, a temporary failure message MAY be generated using a
451/4.7.5 reply code.</t>

<t>Temporary failures such as inability to access the key server or
other external service are the only conditions that SHOULD use a 4xx
SMTP reply code.  In particular, cryptographic signature verification
failures MUST NOT provoke 4xx SMTP replies.</t>

</section>
</section>
<section anchor="verifier_actions"><name>Verifier Actions</name>

<t>This section discusses the detail of the actions taken by a
Verifier. In essence
this will involve repeating all the actions taken by a Signer to
produce a Message-Instance or DKIM2-Signature header field. To
avoid a lot of repetition these actions will not be spelled out
in detail. Once a hash value has been calculated it is then
compared with the value reported by the Signer, or the Signer's
public key is used to determine whether a signature that has
been provided is correct.</t>

<t>When a Verifier is determining whether a particular DKIM2-Signature
header field it MUST consider the state of the message when that
header field was added to the message. That means it MUST first apply
all relevant recipes to reconstruct the body and header fields and it
MUST ignore any Message-Instance and DKIM2-Signature fields that
were added after that point.</t>

<section anchor="output-states"><name>Output States</name>

<t>For compatibility with the Authentication-Results header field defined
in <xref target="RFC8601"></xref> a verification will result in one of four states:</t>

<t>PASS:  The message was successfully verified.</t>

<t>FAIL:  The message could be verified but a hash or signature was not
       correct.</t>

<t>PERMERROR:  The message could not be verified due to some error that
      is unrecoverable, such as a required header field being absent
      or malformed.</t>

<t>TEMPERROR:  The message could not be verified due a temporary
      inability to retrieve a public key. A later attempt may
      produce a different.</t>

<t>A Verifier MAY cease verifying once a single failure is detected.</t>

<t>Verifiers wishing to communicate the results of verification to other
parts of the mail system may do so in whatever manner they see fit. If
they wish to provide a human-readable string to describe a failure
to verify (any state except PASS) then in order to provide the
maximum possible assistance to senders they SHOULD use the text
strings specified in this document. These human-readable messages
are described with m=<spanx style="verb">&lt;x&gt;</spanx> or tag=<spanx style="verb">&lt;y&gt;</spanx> placeholders, the <spanx style="verb">&lt;x&gt;</spanx> and <spanx style="verb">&lt;y&gt;</spanx> MUST
be replaced with the relevant ordinal or tag name (without the &lt; and
&gt; characters). Similarly <spanx style="verb">&lt;value&gt;</spanx> MUST be replaced by a relevant
string for the particular message.</t>

<t>If the verification is being performed during an SMTP protocol
conversation the human-readable string SHOULD be part of the
5xx or 4xx response string.</t>

<t>If the results of the verification are being communicated in a
Delivery Status Notification message (<xref target="RFC3461"/>) the
human-readable string should be included.</t>

<t>If, by local policy, a system wishes to accept a message which
has failed authentication it might choose to add an email header
field to the message before passing it on.  Any such header field
SHOULD include the human-readable string and 
SHOULD be inserted before any existing DKIM2-Signature or pre-existing
authentication status header fields in the header field block.  The
Authentication-Results: header field (<xref target="RFC8601"></xref>) MAY be used for this
purpose. It should be noted that any "Authentication-Results" header
field will count as a modification to the email if any further
DKIM2-Signature header fields are to be generated.</t>

</section>
<section anchor="ensure-that-the-dkim2-header-fields-are-valid"><name>Ensure that the DKIM2 Header Fields are Valid</name>

<t>Verifiers MUST meticulously validate the format and values of all
relevant Message-Instance and DKIM2-Signature header fields. It MUST
also ensure that all required instances of these header fields are
present and that all required tags are present. Recall however
that unknown tags MUST be ignored.</t>

<t>As a special case, there MUST NOT be a Message-Instance field
with a higher m= value than occurs in any DKIM2-Signature field.</t>

<t>Possible errors:</t>

<figure><artwork><![CDATA[
PERMERROR Message-Instance m=<x> missing
PERMERROR Message-Instance m=<x> syntax error
PERMERROR Message-Instance m=<x> tag=<y> missing
PERMERROR Message-Instance m=<x> is not signed
PERMERROR DKIM2-Signature i=<x> missing
PERMERROR DKIM2-Signature i=<x> syntax error
PERMERROR DKIM2-Signature i=<x> tag=<y> missing
]]></artwork></figure>

</section>
<section anchor="check-the-timestamps"><name>Check the timestamps</name>

<t>Verifiers SHOULD return a failure it is more than 14 days since the
timestamp recorded in the "t=" tag of any DKIM2-Signature header field.</t>

<t>Possible errors:</t>

<figure><artwork><![CDATA[
PERMERROR DKIM2-Signature i=<x> signature expired
]]></artwork></figure>

</section>
<section anchor="check-the-chain-of-custody"><name>Check the Chain-of-Custody</name>

<t>As explained in <xref target="chain-of-custody"/> a Verifier MUST check an exact
match between the MAIL FROM and RCPT TO parameters used when delivering
a message and the values found in the mf= and rt= tags of the highest
numbered DKIM2-Signature header field. There may be extra values
in the rt= value, but all RCPT TO values actually used for
delivery MUST be present.</t>

<t>The values of domains MUST BE put into lower-case before doing these
checks. As is usual in email protocols the case of the local part of
an email address is assumed to matter. Note that these checks MUST NOT
use the relaxed domain match algorithm.</t>

<t>A Verifier SHOULD check that there is a relaxed domain match
(see {relaxed-domain-match}) between the signing domain of the
most recently applied DKIM2-Signature header field and the
mf= value in that header field.</t>

<t>Possible errors:</t>

<figure><artwork><![CDATA[
PERMERROR: MAIL FROM <value> did not match
PERMERROR: RCPT TO <value> did not match
PERMERROR: MAIL FROM and d= do not match
]]></artwork></figure>

</section>
<section anchor="fetch-the-public-key"><name>Fetch the Public Key</name>

<t>The public keys of all the signatures in DKIM2-Signature fields are
needed to complete the verification process. Details of key management and
representation are described in <xref target="key_management"/> and <xref target="DKIMKEYS"></xref>.
The Verifier MUST validate the key record and MUST NOT use any public
key records that are malformed.</t>

<t>Note that DNS timeouts MUST be reported as TEMPERROR but a DNS
result that indicates the key is absent MUST be reported as a
PERMERROR. Additionally, as <xref target="DKIMKEYS"></xref> makes clear, if more than
one record is returned this is an error. The human-readable error
message SHOULD provide the selector value so that it is clear which
key has caused a problem.</t>

<t>Note that <xref target="DKIMKEYS"></xref> has retired the h= field and DKIM2 implementations
MUST ignore this tag if it is present.</t>

<t>Possible errors:</t>

<figure><artwork><![CDATA[
TEMPERROR: DKIM2-Signature i=<x> public key <value> could not be fetched
PERMERROR: DKIM2-Signature i=<x> public key <value> does not exist
PERMERROR: DKIM2-Signature i=<x> public key <value> has multiple records
PERMERROR: DKIM2-Signature i=<x> public key <value> has a syntax error
PERMERROR: DKIM2-Signature i=<x> public key <value> algorithm mismatch
PERMERROR: DKIM2-Signature i=<x> public key <value> has been revoked
]]></artwork></figure>

</section>
<section anchor="perform-the-signature-verification-calculation"><name>Perform the Signature Verification Calculation</name>

<t>Verifying a signature consists of actions semantically equivalent to the
following steps:</t>

<t><list style="numbers" type="1">
  <t>Prepare a canonicalized version of the Message-Instance and DKIM2-Signature
header fields as described in <xref target="calculate-signature"/>. The signature value(s)
themselves will need to be removed to correspond with what was actually
signed. Note that this canonicalized version does not actually replace
the original content.</t>
  <t>Use the relevant public key value(s) to check the signature(s).</t>
  <t>If there is more than one signature provided then they MUST all be
checked if the Verifier is able to do so. If any signature fails then
an error SHOULD be reported. If all signatures that can be checked fail
then PERMFAIL MUST be reported.</t>
  <t>If some signatures fail and other pass then any error that is
reported should provide that information (e.g. PERMFAIL "rsa-sha256
signature passed, ed25519-sha256 signature failed").</t>
</list></t>

<t>The reasoning for requiring that all signatures pass is that if a signature
scheme has recently become deprecated because it is known to be cryptographically
flawed then Signers will use a second (unbroken) signature scheme. However, such
a Signer may still provide the other signature for the benefit of Verifiers
that have yet to upgrade -- reasoning perhaps that attacks are too expensive
to be a very significant security issue. A Verifier that determines that
one signature passes whilst the other fails may well be in a position to
prevent an attack.</t>

<t>Possible errors:</t>

<figure><artwork><![CDATA[
FAIL: DKIM2-Signature i=<x> public key <value> incorrect signature
]]></artwork></figure>

</section>
<section anchor="validating-body-and-header-hashes"><name>Validating Body and Header hashes</name>

<t>Verifying a hash value requires a Verifier to repeat the hash calculation
performed by the Signer as set out in <xref target="computing-body-hash"/>
and <xref target="computing-body-hash"/>. The values can then be directly compared.</t>

<t>Since there may be more than one hash algorithm given the human-readable
error message SHOULD indicate which algorithm's result failed to match.</t>

<t>Possible errors:</t>

<figure><artwork><![CDATA[
FAIL: Message Instance m=<x> header hash <value> mismatch
FAIL: Message Instance m=<x> body hash <value> mismatch
]]></artwork></figure>

</section>
</section>
<section anchor="bounce"><name>Delivery Status Notifications in the DKIM2 ecosystem</name>

<t>In the DKIM2 ecosystem, when a message cannot be delivered then
this is reported to the sending machine by means of an <xref target="RFC5321"/>
return code or, if the SMTP session has completed, by generating
a Delivery Status Notification (DSN, as defined in <xref target="RFC3461"/>.</t>

<t>A DSN MUST be addressed to the MTA that sent the message. This
prevents "backscatter" by passing failures back along the chain
of MTAs that were in involved in passing the message forwards. This
is achieved by using the mf= tag from the highest numbered
DKIM2-Signature field. If this field is null ("mf=&lt;&gt;") then a DSN
MUST NOT be sent.</t>

<section anchor="dsn-contents"><name>DSN contents</name>

<t>As set out in <xref target="RFC3461"/>, the DSN has a top-level MIME part of
type <spanx style="verb">multipart/report</spanx>. Among other things, that MIME part must
contain a MIME part of type <spanx style="verb">message/rfc822</spanx> that holds either
the original message exactly as it was submitted by the sending system
or just the header fields of that message.</t>

<t>All relevant DKIM2-Signature header fields (and Message-Instance
header fields if the message body is supplied) MUST verify. The
DSN itself MUST have appropriate Message-Instance and DKIM2-Signature
fields, noting that the MAIL FROM to be used will be null ("&lt;&gt;").</t>

<t>If the message body has been truncated (rather than omitted
altogether) then in order to allow verification of the DNS
contents a Message-Instance header field MUST be added to the
message with a body recipe containing a {"z": true} step.</t>

<section anchor="bounce-propagation"><name>Bounce Propagation</name>

<t>A Forwarder which receives a DSN MAY decide to propagate this
DSN to the MAIL FROM address used to deliver the message to it
(which can be found in the relevant DKIM2-Signature header field).
The DSN SHOULD be handled in the usual way, with Message-Instance
header fields documenting any changes and a DKIM2-Signature
field with an incremented hop count value added.</t>

<t>The Forwarder MAY alternatively decide to reconstruct the message
(or just the message header fields) as they were when the message
was delivered to the Forwarder and construct a DSN using that
information. The information in Message-Instance header fields
can be used to achieve this. The resultant DSN is sent to the
MAIL FROM address from the now highest numbered DKIM2-Signature
header field. Doing this will ensure that details of where the
message was forwarded to will not be revealed to the previous hop.</t>

</section>
<section anchor="authentication-of-inbound-bounce-notifications"><name>Authentication of Inbound Bounce Notifications</name>

<t>When a system receives a DKIM2 signed bounce notification, and the
included original message is also DKIM2 signed, it SHOULD
verify that this message (or just the header fields if the body
is not present) has not been altered.</t>

<t>This means:</t>

<t><list style="numbers" type="1">
  <t>The DSN's DKIM2-Signature will have a signing domain that is
aligned with the recipient of the message that is being returned.
The recipient's address is located in the rt= tag of the
last (highest i= tag) DKIM2-Signature in the returned message.</t>
  <t>The last (highest <spanx style="verb">i=</spanx> tag) DKIM2-Signature header field of the
returned message will be one that was generated by the system
receiving the bounce notification, determined by examining the
d= and mf= tags of that DKIM2-Signature header field.</t>
  <t>The header fields of the embedded message (in the message/rfc822
MIME part) can be verified. If the message body is present then
that can also be verified by inspecting the Message-Instance
header field(s).</t>
</list></t>

<t>If the verification fails then the DSN MUST NOT be propagated
any further. If verification has been performed prior to
accepting the DSN from the sender the DSN SHOULD be rejected
with a 550/5.7.x return code. If the verification cannot be completed
because of a temporary issue (with DNS lookups) then a 4xx
return code should be used.</t>

</section>
</section>
</section>
<section anchor="signer_normalize"><name>Preventing Transport Conversions</name>

<t>DKIM2's design is predicated on valid input.</t>

<t>In order to be signed a message will need to be in "network normal" format
(text is ASCII encoded, lines are separated with CRLF characters, etc.).</t>

<t>A message that is not compliant with <xref target="RFC5322"></xref>, <xref target="RFC2045"></xref>, <xref target="RFC2047"></xref>
and other relevant message format standards can be subject to attempts
by intermediaries to correct or interpret such content.  See Section 8
of <xref target="RFC6409"></xref> for examples of changes that are commonly made.  Such
"corrections" may invalidate DKIM2 signatures or have other undesirable
effects, including some that involve changes to the way a message is
presented to an end user.</t>

<t>When calculating the hash on messages that will be transmitted using
base64 or quoted-printable encoding, Signers MUST compute the hash
after the encoding.  Likewise, the Verifier MUST incorporate the
values into the hash before decoding the base64 or quoted-printable
text.  However, the hash MUST be computed before transport-level
encodings such as SMTP "dot-stuffing" (the modification of lines
beginning with a "." to avoid confusion with the SMTP end-of-message
marker, as specified in <xref target="RFC5321"></xref>).</t>

<t>Further, if the message contains local encoding that will be modified before transmission,
that modification to canonical <xref target="RFC5322"></xref> form MUST be done before signing.
In particular, bare CR or LF characters (used by some systems as a local line
separator convention) MUST be converted to the SMTP-standard CRLF
sequence before the message is signed.  Any conversion of this sort
SHOULD be applied to the message actually sent to the recipient(s),
not just to the version presented to the signing algorithm.</t>

<t>More generally, the Signer MUST sign the message as it is expected to
be received by the Verifier rather than in some local or internal form.</t>

</section>
<section anchor="eai-rfc6530-considerations-for-dkim2"><name>EAI (<xref target="RFC6530"></xref>) Considerations for DKIM2</name>

<t>TBA</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>TBA</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>TBA</t>

</section>
<section anchor="changes-from-earlier-versions"><name>Changes from Earlier Versions</name>

<t>draft-ietf-dkim-dkim2-spec-01</t>

<t>Additions to terninology. Improved ABNF. Removed definition of tag-list
and placed relevant text in the two header field definitions. Untangled 
he description of what needs to be verified from the description of how
to verify and provided a list of human-readable strings to generate for
errors.</t>

<t>draft-ietf-dkim-dkim2-spec-00</t>

<t>Removed JSON for hashes, signatures and SMTP parameters. Provided
valid JSON for recipes and added "z" for truncated body.
Changed algorithm names for signing. Simplified the canonicalisation
performed for the header fields signed by DKIM2-Signature.
Changed v= to m= for message instance numbering.</t>

<t>General tidying up of specifying tag=value specifications and
associated ABNF. Various other fixes for issues flagged in WG.</t>

<t>[[This section to be removed by RFC Editor]]</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC1034">
  <front>
    <title>Domain names - concepts and facilities</title>
    <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
    <date month="November" year="1987"/>
    <abstract>
      <t>This RFC is the revised basic definition of The Domain Name System. It obsoletes RFC-882. This memo describes the domain style names and their used for host address look up and electronic mail forwarding. It discusses the clients and servers in the domain name system and the protocol used between them.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="13"/>
  <seriesInfo name="RFC" value="1034"/>
  <seriesInfo name="DOI" value="10.17487/RFC1034"/>
</reference>
<reference anchor="RFC2045">
  <front>
    <title>Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Message Bodies</title>
    <author fullname="N. Freed" initials="N." surname="Freed"/>
    <author fullname="N. Borenstein" initials="N." surname="Borenstein"/>
    <date month="November" year="1996"/>
    <abstract>
      <t>This initial document specifies the various headers used to describe the structure of MIME messages. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2045"/>
  <seriesInfo name="DOI" value="10.17487/RFC2045"/>
</reference>
<reference anchor="RFC2047">
  <front>
    <title>MIME (Multipurpose Internet Mail Extensions) Part Three: Message Header Extensions for Non-ASCII Text</title>
    <author fullname="K. Moore" initials="K." surname="Moore"/>
    <date month="November" year="1996"/>
    <abstract>
      <t>This particular document is the third document in the series. It describes extensions to RFC 822 to allow non-US-ASCII text data in Internet mail header fields. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2047"/>
  <seriesInfo name="DOI" value="10.17487/RFC2047"/>
</reference>
<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC3461">
  <front>
    <title>Simple Mail Transfer Protocol (SMTP) Service Extension for Delivery Status Notifications (DSNs)</title>
    <author fullname="K. Moore" initials="K." surname="Moore"/>
    <date month="January" year="2003"/>
    <abstract>
      <t>This memo defines an extension to the Simple Mail Transfer Protocol (SMTP) service, which allows an SMTP client to specify (a) that Delivery Status Notifications (DSNs) should be generated under certain conditions, (b) whether such notifications should return the contents of the message, and (c) additional information, to be returned with a DSN, that allows the sender to identify both the recipient(s) for which the DSN was issued, and the transaction in which the original message was sent. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3461"/>
  <seriesInfo name="DOI" value="10.17487/RFC3461"/>
</reference>
<reference anchor="RFC4648">
  <front>
    <title>The Base16, Base32, and Base64 Data Encodings</title>
    <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
    <date month="October" year="2006"/>
    <abstract>
      <t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes. It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4648"/>
  <seriesInfo name="DOI" value="10.17487/RFC4648"/>
</reference>
<reference anchor="RFC5234">
  <front>
    <title>Augmented BNF for Syntax Specifications: ABNF</title>
    <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker"/>
    <author fullname="P. Overell" initials="P." surname="Overell"/>
    <date month="January" year="2008"/>
    <abstract>
      <t>Internet technical specifications often need to define a formal syntax. Over the years, a modified version of Backus-Naur Form (BNF), called Augmented BNF (ABNF), has been popular among many Internet specifications. The current specification documents ABNF. It balances compactness and simplicity with reasonable representational power. The differences between standard BNF and ABNF involve naming rules, repetition, alternatives, order-independence, and value ranges. This specification also supplies additional rule definitions and encoding for a core lexical analyzer of the type common to several Internet specifications. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="68"/>
  <seriesInfo name="RFC" value="5234"/>
  <seriesInfo name="DOI" value="10.17487/RFC5234"/>
</reference>
<reference anchor="RFC5321">
  <front>
    <title>Simple Mail Transfer Protocol</title>
    <author fullname="J. Klensin" initials="J." surname="Klensin"/>
    <date month="October" year="2008"/>
    <abstract>
      <t>This document is a specification of the basic protocol for Internet electronic mail transport. It consolidates, updates, and clarifies several previous documents, making all or parts of most of them obsolete. It covers the SMTP extension mechanisms and best practices for the contemporary Internet, but does not provide details about particular extensions. Although SMTP was designed as a mail transport and delivery protocol, this specification also contains information that is important to its use as a "mail submission" protocol for "split-UA" (User Agent) mail reading systems and mobile environments. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5321"/>
  <seriesInfo name="DOI" value="10.17487/RFC5321"/>
</reference>
<reference anchor="RFC5322">
  <front>
    <title>Internet Message Format</title>
    <author fullname="P. Resnick" initials="P." role="editor" surname="Resnick"/>
    <date month="October" year="2008"/>
    <abstract>
      <t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of "electronic mail" messages. This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, "Standard for the Format of ARPA Internet Text Messages", updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5322"/>
  <seriesInfo name="DOI" value="10.17487/RFC5322"/>
</reference>
<reference anchor="RFC6376">
  <front>
    <title>DomainKeys Identified Mail (DKIM) Signatures</title>
    <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker"/>
    <author fullname="T. Hansen" initials="T." role="editor" surname="Hansen"/>
    <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy"/>
    <date month="September" year="2011"/>
    <abstract>
      <t>DomainKeys Identified Mail (DKIM) permits a person, role, or organization that owns the signing domain to claim some responsibility for a message by associating the domain with the message. This can be an author's organization, an operational relay, or one of their agents. DKIM separates the question of the identity of the Signer of the message from the purported author of the message. Assertion of responsibility is validated through a cryptographic signature and by querying the Signer's domain directly to retrieve the appropriate public key. Message transit from author to recipient is through relays that typically make no substantive change to the message content and thus preserve the DKIM signature.</t>
      <t>This memo obsoletes RFC 4871 and RFC 5672. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="76"/>
  <seriesInfo name="RFC" value="6376"/>
  <seriesInfo name="DOI" value="10.17487/RFC6376"/>
</reference>
<reference anchor="RFC6409">
  <front>
    <title>Message Submission for Mail</title>
    <author fullname="R. Gellens" initials="R." surname="Gellens"/>
    <author fullname="J. Klensin" initials="J." surname="Klensin"/>
    <date month="November" year="2011"/>
    <abstract>
      <t>This memo splits message submission from message relay, allowing each service to operate according to its own rules (for security, policy, etc.), and specifies what actions are to be taken by a submission server.</t>
      <t>Message relay is unaffected, and continues to use SMTP over port 25.</t>
      <t>When conforming to this document, message submission uses the protocol specified here, normally over port 587.</t>
      <t>This separation of function offers a number of benefits, including the ability to apply specific security or policy requirements. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="72"/>
  <seriesInfo name="RFC" value="6409"/>
  <seriesInfo name="DOI" value="10.17487/RFC6409"/>
</reference>
<reference anchor="RFC6530">
  <front>
    <title>Overview and Framework for Internationalized Email</title>
    <author fullname="J. Klensin" initials="J." surname="Klensin"/>
    <author fullname="Y. Ko" initials="Y." surname="Ko"/>
    <date month="February" year="2012"/>
    <abstract>
      <t>Full use of electronic mail throughout the world requires that (subject to other constraints) people be able to use close variations on their own names (written correctly in their own languages and scripts) as mailbox names in email addresses. This document introduces a series of specifications that define mechanisms and protocol extensions needed to fully support internationalized email addresses. These changes include an SMTP extension and extension of email header syntax to accommodate UTF-8 data. The document set also includes discussion of key assumptions and issues in deploying fully internationalized email. This document is a replacement for RFC 4952; it reflects additional issues identified since that document was published. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6530"/>
  <seriesInfo name="DOI" value="10.17487/RFC6530"/>
</reference>
<reference anchor="RFC8259">
  <front>
    <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
    <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
    <date month="December" year="2017"/>
    <abstract>
      <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
      <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="90"/>
  <seriesInfo name="RFC" value="8259"/>
  <seriesInfo name="DOI" value="10.17487/RFC8259"/>
</reference>
<reference anchor="RFC8601">
  <front>
    <title>Message Header Field for Indicating Message Authentication Status</title>
    <author fullname="M. Kucherawy" initials="M." surname="Kucherawy"/>
    <date month="May" year="2019"/>
    <abstract>
      <t>This document specifies a message header field called "Authentication-Results" for use with electronic mail messages to indicate the results of message authentication efforts. Any receiver-side software, such as mail filters or Mail User Agents (MUAs), can use this header field to relay that information in a convenient and meaningful way to users or to make sorting and filtering decisions.</t>
      <t>This document obsoletes RFC 7601.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8601"/>
  <seriesInfo name="DOI" value="10.17487/RFC8601"/>
</reference>

<reference anchor="DKIMKEYS">
   <front>
      <title>Domain Name Specification for DKIM2</title>
      <author fullname="Wei Chuang" initials="W." surname="Chuang">
         <organization>Google</organization>
      </author>
      <date day="18" month="March" year="2026"/>
      <abstract>
	 <t>   The updated DomainKeys Identified Mail (DKIM2) permits an
   organization that owns the signing domain to claim some
   responsibility for a message by associating the domain with the
   message through a digital signature.  This is done by publishing to
   Domain Name Service (DNS) of the domain a public key that is then
   associated to the domain and where messages can be signed by the
   corresponding private key.  Assertion of responsibility is validated
   through a cryptographic signature and by querying the Signer’s domain
   directly to retrieve the appropriate public key.  This document
   describes DKIM2 DNS record format and how to find the record.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-chuang-dkim2-dns-04"/>
   
</reference>



    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC5598">
  <front>
    <title>Internet Mail Architecture</title>
    <author fullname="D. Crocker" initials="D." surname="Crocker"/>
    <date month="July" year="2009"/>
    <abstract>
      <t>Over its thirty-five-year history, Internet Mail has changed significantly in scale and complexity, as it has become a global infrastructure service. These changes have been evolutionary, rather than revolutionary, reflecting a strong desire to preserve both its installed base and its usefulness. To collaborate productively on this large and complex system, all participants need to work from a common view of it and use a common language to describe its components and the interactions among them. But the many differences in perspective currently make it difficult to know exactly what another participant means. To serve as the necessary common frame of reference, this document describes the enhanced Internet Mail architecture, reflecting the current service. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5598"/>
  <seriesInfo name="DOI" value="10.17487/RFC5598"/>
</reference>
<reference anchor="RFC8017">
  <front>
    <title>PKCS #1: RSA Cryptography Specifications Version 2.2</title>
    <author fullname="K. Moriarty" initials="K." role="editor" surname="Moriarty"/>
    <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
    <author fullname="J. Jonsson" initials="J." surname="Jonsson"/>
    <author fullname="A. Rusch" initials="A." surname="Rusch"/>
    <date month="November" year="2016"/>
    <abstract>
      <t>This document provides recommendations for the implementation of public-key cryptography based on the RSA algorithm, covering cryptographic primitives, encryption schemes, signature schemes with appendix, and ASN.1 syntax for representing keys and for identifying the schemes.</t>
      <t>This document represents a republication of PKCS #1 v2.2 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series. By publishing this RFC, change control is transferred to the IETF.</t>
      <t>This document also obsoletes RFC 3447.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8017"/>
  <seriesInfo name="DOI" value="10.17487/RFC8017"/>
</reference>
<reference anchor="RFC8032">
  <front>
    <title>Edwards-Curve Digital Signature Algorithm (EdDSA)</title>
    <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
    <author fullname="I. Liusvaara" initials="I." surname="Liusvaara"/>
    <date month="January" year="2017"/>
    <abstract>
      <t>This document describes elliptic curve signature scheme Edwards-curve Digital Signature Algorithm (EdDSA). The algorithm is instantiated with recommended parameters for the edwards25519 and edwards448 curves. An example implementation and test vectors are provided.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8032"/>
  <seriesInfo name="DOI" value="10.17487/RFC8032"/>
</reference>
<reference anchor="RFC8617">
  <front>
    <title>The Authenticated Received Chain (ARC) Protocol</title>
    <author fullname="K. Andersen" initials="K." surname="Andersen"/>
    <author fullname="B. Long" initials="B." role="editor" surname="Long"/>
    <author fullname="S. Blank" initials="S." role="editor" surname="Blank"/>
    <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy"/>
    <date month="July" year="2019"/>
    <abstract>
      <t>The Authenticated Received Chain (ARC) protocol provides an authenticated "chain of custody" for a message, allowing each entity that handles the message to see what entities handled it before and what the message's authentication assessment was at each step in the handling.</t>
      <t>ARC allows Internet Mail Handlers to attach assertions of message authentication assessment to individual messages. As messages traverse ARC-enabled Internet Mail Handlers, additional ARC assertions can be attached to messages to form ordered sets of ARC assertions that represent the authentication assessment at each step of the message-handling paths.</t>
      <t>ARC-enabled Internet Mail Handlers can process sets of ARC assertions to inform message disposition decisions, identify Internet Mail Handlers that might break existing authentication mechanisms, and convey original authentication assessments across trust boundaries.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8617"/>
  <seriesInfo name="DOI" value="10.17487/RFC8617"/>
</reference>

<reference anchor="CONCLUDEARC">
   <front>
      <title>Concluding the ARC Experiment</title>
      <author fullname="J. Trent Adams" initials="J. T." surname="Adams">
         <organization>Proofpoint</organization>
      </author>
      <author fullname="John R. Levine" initials="J. R." surname="Levine">
         <organization>Taughannock Networks</organization>
      </author>
      <date day="4" month="December" year="2025"/>
      <abstract>
	 <t>   This document calls for a conclusion to the experiment defined by
   “The Authenticated Received Chain (ARC) Protocol,” (RFC8617) and
   recommends that ARC no longer be deployed or relied upon between
   disparate senders and receivers.  The document summarizes what ARC
   set out to do, reports on operational experience, and explains how
   the experience gained during the experiment is being incorporated
   into the proposed DKIM2 work as the successor to DomainKeys
   Identified Mail (DKIM).  To avoid any future confusion, it is
   therefore requested that ARC (RFC8617) be marked “Obsolete” by the
   publication of this Internet-Draft.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-adams-arc-experiment-conclusion-01"/>
   
</reference>



    </references>

</references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

