| < draft-ietf-dkim-mailinglists-07.txt | draft-ietf-dkim-mailinglists-08.txt > | |||
|---|---|---|---|---|
| DKIM Working Group M. Kucherawy | DKIM Working Group M. Kucherawy | |||
| Internet-Draft Cloudmark | Internet-Draft Cloudmark | |||
| Intended status: BCP April 25, 2011 | Intended status: BCP April 27, 2011 | |||
| Expires: October 27, 2011 | Expires: October 29, 2011 | |||
| DKIM And Mailing Lists | DKIM And Mailing Lists | |||
| draft-ietf-dkim-mailinglists-07 | draft-ietf-dkim-mailinglists-08 | |||
| Abstract | Abstract | |||
| DomainKeys Identified Mail (DKIM) allows an administrative mail | DomainKeys Identified Mail (DKIM) allows an administrative mail | |||
| domain (ADMD) to assume some responsibility for a message. Based on | domain (ADMD) to assume some responsibility for a message. Based on | |||
| deployment experience with DKIM, this Best Current Practices document | deployment experience with DKIM, this Best Current Practices document | |||
| provides guidance for the use of DKIM with scenarios that include | provides guidance for the use of DKIM with scenarios that include | |||
| Mailing List Managers (MLMs). {DKIM 12} | Mailing List Managers (MLMs). {DKIM 12} | |||
| Status of this Memo | Status of this Memo | |||
| skipping to change at page 1, line 34 ¶ | skipping to change at page 1, line 34 ¶ | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at http://datatracker.ietf.org/drafts/current/. | Drafts is at http://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on October 27, 2011. | This Internet-Draft will expire on October 29, 2011. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2011 IETF Trust and the persons identified as the | Copyright (c) 2011 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| skipping to change at page 2, line 37 ¶ | skipping to change at page 2, line 37 ¶ | |||
| 5.4. Wrapping A Non-Participating MLM . . . . . . . . . . . . . 15 | 5.4. Wrapping A Non-Participating MLM . . . . . . . . . . . . . 15 | |||
| 6. Participating MLMs . . . . . . . . . . . . . . . . . . . . . . 16 | 6. Participating MLMs . . . . . . . . . . . . . . . . . . . . . . 16 | |||
| 6.1. General . . . . . . . . . . . . . . . . . . . . . . . . . 16 | 6.1. General . . . . . . . . . . . . . . . . . . . . . . . . . 16 | |||
| 6.2. DKIM Author Domain Signing Practices . . . . . . . . . . . 16 | 6.2. DKIM Author Domain Signing Practices . . . . . . . . . . . 16 | |||
| 6.3. Subscriptions . . . . . . . . . . . . . . . . . . . . . . 17 | 6.3. Subscriptions . . . . . . . . . . . . . . . . . . . . . . 17 | |||
| 6.4. Exceptions To ADSP Recommendations . . . . . . . . . . . . 17 | 6.4. Exceptions To ADSP Recommendations . . . . . . . . . . . . 17 | |||
| 6.5. Author-Related Signing . . . . . . . . . . . . . . . . . . 17 | 6.5. Author-Related Signing . . . . . . . . . . . . . . . . . . 17 | |||
| 6.6. Verification Outcomes at MLMs . . . . . . . . . . . . . . 18 | 6.6. Verification Outcomes at MLMs . . . . . . . . . . . . . . 18 | |||
| 6.7. Signature Removal Issues . . . . . . . . . . . . . . . . . 19 | 6.7. Signature Removal Issues . . . . . . . . . . . . . . . . . 19 | |||
| 6.8. MLM Signatures . . . . . . . . . . . . . . . . . . . . . . 20 | 6.8. MLM Signatures . . . . . . . . . . . . . . . . . . . . . . 20 | |||
| 6.9. Verification Outcomes at Final Receiving Sites . . . . . . 22 | 6.9. Verification Outcomes at Final Receiving Sites . . . . . . 21 | |||
| 6.10. Use With FBLs . . . . . . . . . . . . . . . . . . . . . . 22 | 6.10. Use With FBLs . . . . . . . . . . . . . . . . . . . . . . 22 | |||
| 6.11. Handling Choices at Receivers . . . . . . . . . . . . . . 23 | 6.11. Handling Choices at Receivers . . . . . . . . . . . . . . 23 | |||
| 7. DKIM Reporting . . . . . . . . . . . . . . . . . . . . . . . . 25 | 7. DKIM Reporting . . . . . . . . . . . . . . . . . . . . . . . . 24 | |||
| 8. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 26 | 8. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 25 | |||
| 9. Security Considerations . . . . . . . . . . . . . . . . . . . 27 | 9. Security Considerations . . . . . . . . . . . . . . . . . . . 26 | |||
| 9.1. Security Considerations from DKIM and ADSP . . . . . . . . 27 | 9.1. Security Considerations from DKIM and ADSP . . . . . . . . 26 | |||
| 9.2. Authentication Results When Relaying . . . . . . . . . . . 27 | 9.2. Authentication Results When Relaying . . . . . . . . . . . 26 | |||
| 10. References . . . . . . . . . . . . . . . . . . . . . . . . . . 28 | 10. References . . . . . . . . . . . . . . . . . . . . . . . . . . 27 | |||
| 10.1. Normative References . . . . . . . . . . . . . . . . . . . 28 | 10.1. Normative References . . . . . . . . . . . . . . . . . . . 27 | |||
| 10.2. Informative References . . . . . . . . . . . . . . . . . . 28 | 10.2. Informative References . . . . . . . . . . . . . . . . . . 27 | |||
| Appendix A. Acknowledgements . . . . . . . . . . . . . . . . . . 30 | Appendix A. Acknowledgements . . . . . . . . . . . . . . . . . . 29 | |||
| Appendix B. Example Scenarios . . . . . . . . . . . . . . . . . . 31 | Appendix B. Example Scenarios . . . . . . . . . . . . . . . . . . 30 | |||
| B.1. MLMs and ADSP . . . . . . . . . . . . . . . . . . . . . . 31 | B.1. MLMs and ADSP . . . . . . . . . . . . . . . . . . . . . . 30 | |||
| B.2. MLMs and FBLs . . . . . . . . . . . . . . . . . . . . . . 31 | B.2. MLMs and FBLs . . . . . . . . . . . . . . . . . . . . . . 30 | |||
| Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 32 | Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 31 | |||
| 1. Notes to Editor and Reviewers | 1. Notes to Editor and Reviewers | |||
| This version of the memo contains notations such as "{DKIM 2}". | This version of the memo contains notations such as "{DKIM 2}". | |||
| These correspond to DKIM working group issue tracker items. They | These correspond to DKIM working group issue tracker items. They | |||
| should be deleted prior to publication. | should be deleted prior to publication. | |||
| 2. Introduction | 2. Introduction | |||
| DomainKeys Identified Mail ([DKIM]) allows an Administrative Mail | DomainKeys Identified Mail ([DKIM]) allows an Administrative Mail | |||
| skipping to change at page 19, line 49 ¶ | skipping to change at page 19, line 49 ¶ | |||
| 2. Apply local policy to authenticate the identity of the author; | 2. Apply local policy to authenticate the identity of the author; | |||
| 3. Remove all existing [AUTH-RESULTS] fields (optional); | 3. Remove all existing [AUTH-RESULTS] fields (optional); | |||
| 4. Add an [AUTH-RESULTS] header field to the message to indicate the | 4. Add an [AUTH-RESULTS] header field to the message to indicate the | |||
| results of the above; | results of the above; | |||
| 5. Remove all previously-evaluated DKIM signatures; | 5. Remove all previously-evaluated DKIM signatures; | |||
| 6. Affix a new signature that covers the entire message on the | 6. Affix a new signature that includes in in its hashes the entire | |||
| output side, including the Authentication-Results header field | message on the output side, including the Authentication-Results | |||
| just added (see Section 6.8). | header field just added (see Section 6.8). | |||
| Removing the original signature(s) seems particularly appropriate | Removing the original signature(s) seems particularly appropriate | |||
| when the MLM knows it is likely to invalidate any or all of them due | when the MLM knows it is likely to invalidate any or all of them due | |||
| to the nature of the reformatting it will do. This avoids false | to the nature of the reformatting it will do. This avoids false | |||
| negatives at the list's subscribers in their roles as receivers of | negatives at the list's subscribers in their roles as receivers of | |||
| the message; although [DKIM] stipulates that an invalid signature is | the message; although [DKIM] stipulates that an invalid signature is | |||
| the same as no signature, it is anticipated that there will be some | the same as no signature, it is anticipated that there will be some | |||
| implementations that ignore this advice. | implementations that ignore this advice. | |||
| The MLM could re-evaluate existing signatures after making its | The MLM could re-evaluate existing signatures after making its | |||
| skipping to change at page 21, line 28 ¶ | skipping to change at page 21, line 28 ¶ | |||
| A signing MLM could add a List-Post: {DKIM 12} header field (see | A signing MLM could add a List-Post: {DKIM 12} header field (see | |||
| [LIST-URLS]) using that DNS domain matching the one used in the "d=" | [LIST-URLS]) using that DNS domain matching the one used in the "d=" | |||
| tag of the DKIM signature that is added by the MLM. This can be used | tag of the DKIM signature that is added by the MLM. This can be used | |||
| by {DKIM 12} verifiers or receivers to identify the DKIM signature | by {DKIM 12} verifiers or receivers to identify the DKIM signature | |||
| that was added by the MLM. This is not required, however; it is | that was added by the MLM. This is not required, however; it is | |||
| believed the reputation of the signer will be a more critical data | believed the reputation of the signer will be a more critical data | |||
| point rather than this suggested binding. Furthermore, this is not a | point rather than this suggested binding. Furthermore, this is not a | |||
| binding recognized by any current specification document. | binding recognized by any current specification document. | |||
| Section 5.5 of [DKIM] includes a list of header fields that a | ||||
| signature SHOULD include in its header hash and discusses reasons for | ||||
| doing so. MLMs that sign MUST adhere to those guidelines, extended | ||||
| as follows: {DKIM 12} | ||||
| o Any [AUTH-RESULTS] fields added by the MLM; | ||||
| o Any [LIST-ID] or [LIST-URLS] fields added by the MLM; | ||||
| o Any [MAIL] fields, especially Sender and Reply-To, added or | ||||
| replaced by the MLM. | ||||
| A DKIM-aware resending MLM SHOULD sign the entire message after the | A DKIM-aware resending MLM SHOULD sign the entire message after the | |||
| message is prepared for distribution (i.e. the "MLM Output" from | message is prepared for distribution (i.e. the "MLM Output" from | |||
| Section 4.2). Any other configuration might generate signatures that | Section 4.2). Any other configuration might generate signatures that | |||
| will not validate. {DKIM 12} As with any other DKIM signing | will not validate. {DKIM 12} | |||
| operation, the choice of what portions of the header and body of the | ||||
| output message should include those parts of the header and body for | ||||
| which the MLM wishes to assert responsibility. | ||||
| DKIM-aware authoring MLMs MUST sign the mail they send according to | DKIM-aware authoring MLMs MUST sign the mail they send according to | |||
| the regular signing guidelines given in [DKIM]. | the regular signing guidelines given in [DKIM]. | |||
| One concern is that having an MLM apply its signature to unsigned | One concern is that having an MLM apply its signature to unsigned | |||
| mail might cause some verifiers or receivers to interpret the | mail might cause some verifiers or receivers to interpret the | |||
| signature as conferring more authority or authenticity to the message | signature as conferring more authority or authenticity to the message | |||
| content than is defined by [DKIM]. This is an issue beyond MLMs and | content than is defined by [DKIM]. This is an issue beyond MLMs and | |||
| primarily entails receive-side processing outside of the scope of | primarily entails receive-side processing outside of the scope of | |||
| [DKIM]. It is nevertheless worth noting here. {DKIM 12} | [DKIM]. It is nevertheless worth noting here. {DKIM 12} | |||
| skipping to change at page 28, line 16 ¶ | skipping to change at page 27, line 16 ¶ | |||
| 10.1. Normative References | 10.1. Normative References | |||
| [ADSP] Allman, E., Delany, M., Fenton, J., and J. Levine, "DKIM | [ADSP] Allman, E., Delany, M., Fenton, J., and J. Levine, "DKIM | |||
| Sender Signing Practises", RFC 5617, August 2009. | Sender Signing Practises", RFC 5617, August 2009. | |||
| [AUTH-RESULTS] | [AUTH-RESULTS] | |||
| Kucherawy, M., "Message Header Field for Indicating | Kucherawy, M., "Message Header Field for Indicating | |||
| Message Authentication Status", RFC 5451, April 2009. | Message Authentication Status", RFC 5451, April 2009. | |||
| [DKIM] Allman, E., Callas, J., Delany, M., Libbey, M., Fenton, | [DKIM] Crocker, D., Hansen, T., and M. Kucherawy, "DomainKeys | |||
| J., and M. Thomas, "DomainKeys Identified Mail (DKIM) | Identified Mail (DKIM) Signatures", | |||
| Signatures", RFC 4871, May 2007. | I-D draft-ietf-dkim-rfc4871bis, April 2011. | |||
| [EMAIL-ARCH] | [EMAIL-ARCH] | |||
| Crocker, D., "Internet Mail Architecture", RFC 5598, | Crocker, D., "Internet Mail Architecture", RFC 5598, | |||
| July 2009. | July 2009. | |||
| [KEYWORDS] | [KEYWORDS] | |||
| Bradner, S., "Key words for use in RFCs to Indicate | Bradner, S., "Key words for use in RFCs to Indicate | |||
| Requirement Levels", BCP 14, RFC 2119, March 1997. | Requirement Levels", BCP 14, RFC 2119, March 1997. | |||
| [MAIL] Resnick, P., "Internet Message Format", RFC 5322, | [MAIL] Resnick, P., "Internet Message Format", RFC 5322, | |||
| End of changes. 9 change blocks. | ||||
| 40 lines changed or deleted | 25 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||