| < draft-ietf-dkim-mailinglists-09.txt | draft-ietf-dkim-mailinglists-10.txt > | |||
|---|---|---|---|---|
| DKIM Working Group M. Kucherawy | DKIM Working Group M. Kucherawy | |||
| Internet-Draft Cloudmark | Internet-Draft Cloudmark | |||
| Intended status: BCP May 9, 2011 | Intended status: BCP May 10, 2011 | |||
| Expires: November 10, 2011 | Expires: November 11, 2011 | |||
| DKIM And Mailing Lists | DKIM And Mailing Lists | |||
| draft-ietf-dkim-mailinglists-09 | draft-ietf-dkim-mailinglists-10 | |||
| Abstract | Abstract | |||
| DomainKeys Identified Mail (DKIM) allows an administrative mail | DomainKeys Identified Mail (DKIM) allows an administrative mail | |||
| domain (ADMD) to assume some responsibility for a message. Based on | domain (ADMD) to assume some responsibility for a message. Based on | |||
| deployment experience with DKIM, this Best Current Practices document | deployment experience with DKIM, this Best Current Practices document | |||
| provides guidance for the use of DKIM with scenarios that include | provides guidance for the use of DKIM with scenarios that include | |||
| Mailing List Managers (MLMs). | Mailing List Managers (MLMs). | |||
| Status of this Memo | Status of this Memo | |||
| skipping to change at page 1, line 34 ¶ | skipping to change at page 1, line 34 ¶ | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at http://datatracker.ietf.org/drafts/current/. | Drafts is at http://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on November 10, 2011. | This Internet-Draft will expire on November 11, 2011. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2011 IETF Trust and the persons identified as the | Copyright (c) 2011 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| carefully, as they describe your rights and restrictions with respect | carefully, as they describe your rights and restrictions with respect | |||
| to this document. Code Components extracted from this document must | to this document. Code Components extracted from this document must | |||
| include Simplified BSD License text as described in Section 4.e of | include Simplified BSD License text as described in Section 4.e of | |||
| the Trust Legal Provisions and are provided without warranty as | the Trust Legal Provisions and are provided without warranty as | |||
| described in the Simplified BSD License. | described in the Simplified BSD License. | |||
| Table of Contents | Table of Contents | |||
| 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 | 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
| 1.1. Background . . . . . . . . . . . . . . . . . . . . . . . . 3 | 1.1. Background . . . . . . . . . . . . . . . . . . . . . . . . 4 | |||
| 1.2. MLMs In Infrastructure . . . . . . . . . . . . . . . . . . 4 | 1.2. MLMs In Infrastructure . . . . . . . . . . . . . . . . . . 4 | |||
| 1.3. Feedback Loops And Other Bi-Lateral Agreements . . . . . . 5 | 1.3. Feedback Loops And Other Bi-Lateral Agreements . . . . . . 5 | |||
| 1.4. Document Scope and Goals . . . . . . . . . . . . . . . . . 5 | 1.4. Document Scope and Goals . . . . . . . . . . . . . . . . . 5 | |||
| 2. Definitions . . . . . . . . . . . . . . . . . . . . . . . . . 7 | 2. Definitions . . . . . . . . . . . . . . . . . . . . . . . . . 7 | |||
| 2.1. Key Words . . . . . . . . . . . . . . . . . . . . . . . . 7 | 2.1. Key Words . . . . . . . . . . . . . . . . . . . . . . . . 7 | |||
| 2.2. Messaging Terms . . . . . . . . . . . . . . . . . . . . . 7 | 2.2. Messaging Terms . . . . . . . . . . . . . . . . . . . . . 7 | |||
| 2.3. DKIM-Specific References . . . . . . . . . . . . . . . . . 7 | 2.3. DKIM-Specific References . . . . . . . . . . . . . . . . . 7 | |||
| 2.4. 'DKIM-Friendly' . . . . . . . . . . . . . . . . . . . . . 7 | 2.4. 'DKIM-Friendly' . . . . . . . . . . . . . . . . . . . . . 7 | |||
| 2.5. Message Streams . . . . . . . . . . . . . . . . . . . . . 7 | 2.5. Message Streams . . . . . . . . . . . . . . . . . . . . . 7 | |||
| 3. Mailing Lists and DKIM . . . . . . . . . . . . . . . . . . . . 8 | 3. Mailing Lists and DKIM . . . . . . . . . . . . . . . . . . . . 9 | |||
| 3.1. Roles and Realities . . . . . . . . . . . . . . . . . . . 8 | 3.1. Roles and Realities . . . . . . . . . . . . . . . . . . . 9 | |||
| 3.2. Types Of Mailing Lists . . . . . . . . . . . . . . . . . . 9 | 3.2. Types Of Mailing Lists . . . . . . . . . . . . . . . . . . 10 | |||
| 3.3. Current MLM Effects On Signatures . . . . . . . . . . . . 10 | 3.3. Current MLM Effects On Signatures . . . . . . . . . . . . 11 | |||
| 4. Non-Participating MLMs . . . . . . . . . . . . . . . . . . . . 13 | 4. Non-Participating MLMs . . . . . . . . . . . . . . . . . . . . 14 | |||
| 4.1. Author-Related Signing . . . . . . . . . . . . . . . . . . 13 | 4.1. Author-Related Signing . . . . . . . . . . . . . . . . . . 14 | |||
| 4.2. Verification Outcomes at Receivers . . . . . . . . . . . . 14 | 4.2. Verification Outcomes at Receivers . . . . . . . . . . . . 15 | |||
| 4.3. Handling Choices at Receivers . . . . . . . . . . . . . . 14 | 4.3. Handling Choices at Receivers . . . . . . . . . . . . . . 15 | |||
| 4.4. Wrapping A Non-Participating MLM . . . . . . . . . . . . . 14 | 4.4. Wrapping A Non-Participating MLM . . . . . . . . . . . . . 15 | |||
| 5. Participating MLMs . . . . . . . . . . . . . . . . . . . . . . 15 | 5. Participating MLMs . . . . . . . . . . . . . . . . . . . . . . 16 | |||
| 5.1. General . . . . . . . . . . . . . . . . . . . . . . . . . 15 | 5.1. General . . . . . . . . . . . . . . . . . . . . . . . . . 16 | |||
| 5.2. DKIM Author Domain Signing Practices . . . . . . . . . . . 15 | 5.2. DKIM Author Domain Signing Practices . . . . . . . . . . . 16 | |||
| 5.3. Subscriptions . . . . . . . . . . . . . . . . . . . . . . 16 | 5.3. Subscriptions . . . . . . . . . . . . . . . . . . . . . . 17 | |||
| 5.4. Exceptions To ADSP Recommendations . . . . . . . . . . . . 16 | 5.4. Exceptions To ADSP Recommendations . . . . . . . . . . . . 18 | |||
| 5.5. Author-Related Signing . . . . . . . . . . . . . . . . . . 16 | 5.5. Author-Related Signing . . . . . . . . . . . . . . . . . . 18 | |||
| 5.6. Verification Outcomes at MLMs . . . . . . . . . . . . . . 17 | 5.6. Verification Outcomes at MLMs . . . . . . . . . . . . . . 18 | |||
| 5.7. Signature Removal Issues . . . . . . . . . . . . . . . . . 18 | 5.7. Signature Removal Issues . . . . . . . . . . . . . . . . . 19 | |||
| 5.8. MLM Signatures . . . . . . . . . . . . . . . . . . . . . . 19 | 5.8. MLM Signatures . . . . . . . . . . . . . . . . . . . . . . 21 | |||
| 5.9. Verification Outcomes at Final Receiving Sites . . . . . . 20 | 5.9. Verification Outcomes at Final Receiving Sites . . . . . . 22 | |||
| 5.10. Use With FBLs . . . . . . . . . . . . . . . . . . . . . . 21 | 5.10. Use With FBLs . . . . . . . . . . . . . . . . . . . . . . 22 | |||
| 5.11. Handling Choices at Receivers . . . . . . . . . . . . . . 21 | 5.11. Handling Choices at Receivers . . . . . . . . . . . . . . 23 | |||
| 6. DKIM Reporting . . . . . . . . . . . . . . . . . . . . . . . . 23 | 6. DKIM Reporting . . . . . . . . . . . . . . . . . . . . . . . . 25 | |||
| 7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 24 | 7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 26 | |||
| 8. Security Considerations . . . . . . . . . . . . . . . . . . . 25 | 8. Security Considerations . . . . . . . . . . . . . . . . . . . 27 | |||
| 8.1. Security Considerations from DKIM and ADSP . . . . . . . . 25 | 8.1. Security Considerations from DKIM and ADSP . . . . . . . . 27 | |||
| 8.2. Authentication Results When Relaying . . . . . . . . . . . 25 | 8.2. Authentication Results When Relaying . . . . . . . . . . . 27 | |||
| 9. References . . . . . . . . . . . . . . . . . . . . . . . . . . 26 | 9. References . . . . . . . . . . . . . . . . . . . . . . . . . . 28 | |||
| 9.1. Normative References . . . . . . . . . . . . . . . . . . . 26 | 9.1. Normative References . . . . . . . . . . . . . . . . . . . 28 | |||
| 9.2. Informative References . . . . . . . . . . . . . . . . . . 26 | 9.2. Informative References . . . . . . . . . . . . . . . . . . 28 | |||
| Appendix A. Acknowledgements . . . . . . . . . . . . . . . . . . 28 | Appendix A. Acknowledgements . . . . . . . . . . . . . . . . . . 30 | |||
| Appendix B. Example Scenarios . . . . . . . . . . . . . . . . . . 29 | Appendix B. Example Scenarios . . . . . . . . . . . . . . . . . . 31 | |||
| B.1. MLMs and ADSP . . . . . . . . . . . . . . . . . . . . . . 29 | B.1. MLMs and ADSP . . . . . . . . . . . . . . . . . . . . . . 31 | |||
| B.2. MLMs and FBLs . . . . . . . . . . . . . . . . . . . . . . 29 | B.2. MLMs and FBLs . . . . . . . . . . . . . . . . . . . . . . 31 | |||
| Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 30 | Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 32 | |||
| 1. Introduction | 1. Introduction | |||
| DomainKeys Identified Mail ([DKIM]) allows an Administrative Mail | DomainKeys Identified Mail [DKIM] allows an Administrative Mail | |||
| Domain to take some responsibility for a [MAIL] message. This can be | Domain to take some responsibility for a [MAIL] message. Such | |||
| an author's organization, an operational relay (Mail Transfer Agent, | responsibility can be taken by an author's organization, an | |||
| or MTA) or one of their agents. Assertion of responsibility is made | operational relay (Mail Transfer Agent, or MTA) or one of their | |||
| through a cryptographic signature. Message transit from author to | agents. Assertion of responsibility is made through a cryptographic | |||
| recipient is through relays that typically make no substantive change | signature. Message transit from author to recipient is through | |||
| to the message content and thus preserve the validity of the DKIM | relays that typically make no substantive change to the message | |||
| signature. | content and thus preserve the validity of the DKIM signature. | |||
| In contrast to relays, there are intermediaries, such as mailing list | In contrast to relays, there are intermediaries, such as mailing list | |||
| managers (MLMs), that actively take delivery of messages, re-format | managers (MLMs), that actively take delivery of messages, re-format | |||
| them, and re-post them, often invalidating DKIM signatures. The goal | them, and re-post them, often invalidating DKIM signatures. The goal | |||
| for this document is to explore the use of DKIM for scenarios that | for this document is to explore the use of DKIM for scenarios that | |||
| include intermediaries, and recommend Best Current Practices based on | include intermediaries, and recommend Best Current Practices based on | |||
| acquired experience. Questions that will be discussed include: | acquired experience. Questions that will be discussed include: | |||
| o Under what circumstances is it advisable for an author, or its | o Under what circumstances is it advisable for an author, or its | |||
| organization, to apply DKIM to mail sent to mailing lists? | organization, to apply DKIM to mail sent to mailing lists? | |||
| skipping to change at page 3, line 37 ¶ | skipping to change at page 3, line 37 ¶ | |||
| identifiers? | identifiers? | |||
| o What are the tradeoffs regarding having an MLM remove existing | o What are the tradeoffs regarding having an MLM remove existing | |||
| DKIM signatures prior to re-posting the message? | DKIM signatures prior to re-posting the message? | |||
| o What are the tradeoffs regarding having an MLM add its own DKIM | o What are the tradeoffs regarding having an MLM add its own DKIM | |||
| signature? | signature? | |||
| These and others are open questions for which there may be no | These and others are open questions for which there may be no | |||
| definitive answers. However, based on experience since the | definitive answers. However, based on experience since the | |||
| publication of [DKIM] and its gradual deployment, there are some | publication of the original version of [DKIM] and its gradual | |||
| views that are useful to consider and some recommended procedures. | deployment, there are some views that are useful to consider and some | |||
| recommended procedures. | ||||
| In general there are, in relation to DKIM, two categories of MLMs: | In general there are, in relation to DKIM, two categories of MLMs: | |||
| participating and non-participating. As each type has its own issues | participating and non-participating. As each type has its own issues | |||
| regarding DKIM-signed messages that are either handled or produced by | regarding DKIM-signed messages that are either handled or produced by | |||
| them (or both), the types are discussed in separate sections. | them (or both), the types are discussed in separate sections. | |||
| The best general recommendation for dealing with MLMs is that the MLM | ||||
| or an MTA in the MLM's domain apply its own DKIM signature to each | ||||
| message it forwards, and for assessors on the receiving end to | ||||
| consider the MLM's domain signature in making their assessments. | ||||
| With the understanding that that is not always possible or practical, | ||||
| and the consideration that it might not always be sufficient, this | ||||
| document provides additional guidance. | ||||
| 1.1. Background | 1.1. Background | |||
| DKIM signatures permit an agent of the email architecture (see | DKIM signatures permit an agent of the email architecture (see | |||
| [EMAIL-ARCH]) to make a claim of responsibility for a message by | [EMAIL-ARCH]) to make a claim of responsibility for a message by | |||
| affixing a validated domain-level identifier to the message as it | affixing a validated domain-level identifier to the message as it | |||
| passes through a relay. Although not the only possibility, this is | passes through a relay. Although not the only possibility, this is | |||
| most commonly done as a message passes through a boundary Mail | most commonly done as a message passes through a boundary Mail | |||
| Transport Agent (MTA) as it departs an Administrative Mail Domain | Transport Agent (MTA) as it departs an Administrative Mail Domain | |||
| (ADMD) across the open Internet. | (ADMD) across the open Internet. | |||
| skipping to change at page 5, line 34 ¶ | skipping to change at page 5, line 42 ¶ | |||
| to exchange reports of abuse. Typically, a sender registers with a | to exchange reports of abuse. Typically, a sender registers with a | |||
| receiving site to receive abuse reports from that site for mail | receiving site to receive abuse reports from that site for mail | |||
| coming from the sender. | coming from the sender. | |||
| An FBL reporting address (i.e., an address to which FBL reports are | An FBL reporting address (i.e., an address to which FBL reports are | |||
| sent) is part of this bi-lateral registration. Some FBLs require | sent) is part of this bi-lateral registration. Some FBLs require | |||
| DKIM use by the registrant. | DKIM use by the registrant. | |||
| See Section 6 for additional discussion. | See Section 6 for additional discussion. | |||
| FBLs tend to use the ARF ([MARF]) or the IODEF ([IODEF]) formats. | FBLs tend to use the [ARF] or the [IODEF] formats. | |||
| 1.4. Document Scope and Goals | 1.4. Document Scope and Goals | |||
| This document provides discussion on the above issues, to improve the | This document provides discussion on the above issues, to improve the | |||
| handling of possible interactions between DKIM and MLMs. In general, | handling of possible interactions between DKIM and MLMs. In general, | |||
| the preference is to impose changes to behaviour at the signer and | the preference is to impose changes to behaviour at the signer and | |||
| verifier rather than at the MLM. | verifier rather than at the MLM. | |||
| Wherever possible, the document's discussion of MLMs is conceptually | Wherever possible, the document's discussion of MLMs is conceptually | |||
| decoupled from MTAs despite the very tight integration that is | decoupled from MTAs despite the very tight integration that is | |||
| skipping to change at page 7, line 10 ¶ | skipping to change at page 7, line 10 ¶ | |||
| deployment, and working group consensus. There is no substantial | deployment, and working group consensus. There is no substantial | |||
| implementation history upon which these suggestions are based, and | implementation history upon which these suggestions are based, and | |||
| the efficacy, performance and security characteristics of them have | the efficacy, performance and security characteristics of them have | |||
| not yet been fully explored. | not yet been fully explored. | |||
| 2. Definitions | 2. Definitions | |||
| 2.1. Key Words | 2.1. Key Words | |||
| The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | |||
| "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | |||
| document are to be interpreted as described in [KEYWORDS]. | "OPTIONAL" in this document are to be interpreted as described in | |||
| [KEYWORDS]. | ||||
| 2.2. Messaging Terms | 2.2. Messaging Terms | |||
| See [EMAIL-ARCH] for a general description of the current messaging | See [EMAIL-ARCH] for a general description of the current messaging | |||
| architecture, and for definitions of various terms used in this | architecture, and for definitions of various terms used in this | |||
| document. | document. | |||
| 2.3. DKIM-Specific References | 2.3. DKIM-Specific References | |||
| Readers are encouraged to become familiar with [DKIM] and [ADSP], | Readers are encouraged to become familiar with [DKIM] and [ADSP], | |||
| skipping to change at page 15, line 40 ¶ | skipping to change at page 16, line 40 ¶ | |||
| considerations (see Section 3.5 of [DKIM]). Its use is therefore | considerations (see Section 3.5 of [DKIM]). Its use is therefore | |||
| discouraged. | discouraged. | |||
| Expressions of list-specific policy (e.g., rules for participation, | Expressions of list-specific policy (e.g., rules for participation, | |||
| small advertisements, etc.) are often added to outgoing messages by | small advertisements, etc.) are often added to outgoing messages by | |||
| MLM operators. There is currently no header field proposed for | MLM operators. There is currently no header field proposed for | |||
| relaying such general operational MLM details apart from what | relaying such general operational MLM details apart from what | |||
| [LIST-URLS] already supports. This sort of information is commonly | [LIST-URLS] already supports. This sort of information is commonly | |||
| included footer text appended to the body of the message, or header | included footer text appended to the body of the message, or header | |||
| text prepended above the original body. It is RECOMMENDED that | text prepended above the original body. It is RECOMMENDED that | |||
| periodic, automatic mailings to the list to remind subscribers of | periodic, automatic mailings to the list are sent to remind | |||
| list policy, and it is otherwise RECOMMENDED that the use of standard | subscribers of list policy. It is also RECOMMENDED that the use of | |||
| header fields to express list operation parameters be applied rather | standard header fields to express list operation parameters be | |||
| than body changes. These periodic mailings will be repetitive, of | applied rather than body changes. These periodic mailings will be | |||
| course, but by being generally the same each time they can be easily | repetitive, of course, but by being generally the same each time they | |||
| filtered if desired. | can be easily filtered if desired. | |||
| 5.2. DKIM Author Domain Signing Practices | 5.2. DKIM Author Domain Signing Practices | |||
| ADSP presents a particular challenge. An author domain posting a | ADSP presents a particular challenge. An author domain posting a | |||
| policy of "discardable" imposes a very tight restriction on the use | policy of "discardable" imposes a very tight restriction on the use | |||
| of mailing lists, essentially constraining that domain's users to | of mailing lists, essentially constraining that domain's users to | |||
| lists operated by aliasing MLMs only; any MLM that alters a message | lists operated by aliasing MLMs only; any MLM that alters a message | |||
| from such a domain or removes its signature subjects the message to | from such a domain or removes its signature subjects the message to | |||
| severe action by verifiers or receivers. A resending MLM SHOULD | severe action by verifiers or receivers. A resending MLM SHOULD | |||
| reject outright any mail from an author whose domain posts such a | reject outright any mail from an author whose domain posts such a | |||
| skipping to change at page 16, line 18 ¶ | skipping to change at page 17, line 18 ¶ | |||
| ADSP-aware recipients. See also the discussion in Section 5.3. | ADSP-aware recipients. See also the discussion in Section 5.3. | |||
| Where such rejection of "discardable" mail is not enforced, and such | Where such rejection of "discardable" mail is not enforced, and such | |||
| mail arrives to a verifier that applies ADSP checks which fail, the | mail arrives to a verifier that applies ADSP checks which fail, the | |||
| message SHOULD either be discarded (i.e. accept the message at the | message SHOULD either be discarded (i.e. accept the message at the | |||
| [SMTP] level but discard it without delivery) or rejected by | [SMTP] level but discard it without delivery) or rejected by | |||
| returning a 5xx error code. In the latter case, some advice for how | returning a 5xx error code. In the latter case, some advice for how | |||
| to conduct the rejection in a potentially meaningful way can be found | to conduct the rejection in a potentially meaningful way can be found | |||
| in Section 5.11. | in Section 5.11. | |||
| The reason for these recommendations is best illustrated by example. | ||||
| Suppose the following: | ||||
| o users U1 and U2 are subscribers of list L; | ||||
| o U1 is within an ADMD that advertises a "discardable" policy using | ||||
| ADSP; | ||||
| o L alters submissions prior to re-sending in a way that invalidates | ||||
| the DKIM signature added by U1's ADMD; | ||||
| o U2's ADMD enforces ADSP at the border by issuing an SMTP error | ||||
| code; and | ||||
| o L is configured to remove subscribers whose mail is bouncing. | ||||
| It follows then that a submission to L from U1 will be received at | ||||
| U2, but since the DKIM signature fails to verify, U2's ADMD will | ||||
| reject it based on the ADSP protocol. That rejection is received at | ||||
| L, which proceeds to remove U2 from the list. | ||||
| See also Appendix B.5 of [ADSP] for further discussion. | See also Appendix B.5 of [ADSP] for further discussion. | |||
| 5.3. Subscriptions | 5.3. Subscriptions | |||
| At subscription time, an ADSP-aware MLM SHOULD check for a published | At subscription time, an ADSP-aware MLM SHOULD check for a published | |||
| ADSP record for the new subscriber's domain. If the policy specifies | ADSP record for the new subscriber's domain. If the policy specifies | |||
| "discardable", the MLM SHOULD disallow the subscription or present a | "discardable", the MLM SHOULD disallow the subscription or present a | |||
| warning that the subscriber's submissions to the mailing list might | warning that the subscriber's submissions to the mailing list might | |||
| not be deliverable to some recipients because of the subscriber's | not be deliverable to some recipients because of the subscriber's | |||
| ADMD's published policy. | ADMD's published policy. | |||
| skipping to change at page 24, line 7 ¶ | skipping to change at page 26, line 7 ¶ | |||
| DKIM verification failures, MLMs will benefit from their use. | DKIM verification failures, MLMs will benefit from their use. | |||
| MLMs SHOULD apply DKIM failure reporting mechanisms as a method for | MLMs SHOULD apply DKIM failure reporting mechanisms as a method for | |||
| providing feedback to signers about issues with DKIM infrastructure. | providing feedback to signers about issues with DKIM infrastructure. | |||
| This is especially important for MLMs that implement DKIM | This is especially important for MLMs that implement DKIM | |||
| verification as a mechanism for authentication of list configuration | verification as a mechanism for authentication of list configuration | |||
| commands and submissions from subscribers. | commands and submissions from subscribers. | |||
| 7. IANA Considerations | 7. IANA Considerations | |||
| This document includes no IANA actions. | This document includes no IANA actions. It should be removed prior | |||
| to publication. | ||||
| 8. Security Considerations | 8. Security Considerations | |||
| This document provides suggested or best current practices for use | This document provides suggested or best current practices for use | |||
| with DKIM, and as such does not introduce any new technologies for | with DKIM, and as such does not introduce any new technologies for | |||
| consideration. However, the following security issues should be | consideration. However, the following security issues should be | |||
| considered when implementing the above practices. | considered when implementing the above practices. | |||
| 8.1. Security Considerations from DKIM and ADSP | 8.1. Security Considerations from DKIM and ADSP | |||
| skipping to change at page 26, line 33 ¶ | skipping to change at page 28, line 33 ¶ | |||
| [KEYWORDS] | [KEYWORDS] | |||
| Bradner, S., "Key words for use in RFCs to Indicate | Bradner, S., "Key words for use in RFCs to Indicate | |||
| Requirement Levels", BCP 14, RFC 2119, March 1997. | Requirement Levels", BCP 14, RFC 2119, March 1997. | |||
| [MAIL] Resnick, P., "Internet Message Format", RFC 5322, | [MAIL] Resnick, P., "Internet Message Format", RFC 5322, | |||
| October 2008. | October 2008. | |||
| 9.2. Informative References | 9.2. Informative References | |||
| [ARF] Shafranovich, Y., Levine, J., and M. Kucherawy, "An | ||||
| Extensible Format for Email Feedback Reports", RFC 5965, | ||||
| August 2010. | ||||
| [DKIM-DEPLOYMENT] | [DKIM-DEPLOYMENT] | |||
| Hansen, T., Siegel, E., Hallam-Baker, P., and D. Crocker, | Hansen, T., Siegel, E., Hallam-Baker, P., and D. Crocker, | |||
| "DomainKeys Identified Mail (DKIM) Development, Deployment | "DomainKeys Identified Mail (DKIM) Development, Deployment | |||
| and Operations", I-D DRAFT-IETF-DKIM-DEPLOYMENT, | and Operations", I-D DRAFT-IETF-DKIM-DEPLOYMENT, | |||
| January 2010. | January 2010. | |||
| [DKIM-OVERVIEW] | [DKIM-OVERVIEW] | |||
| Hansen, T., Crocker, D., and P. Hallam-Baker, "DomainKeys | Hansen, T., Crocker, D., and P. Hallam-Baker, "DomainKeys | |||
| Identified Mail (DKIM) Service Overview", RFC 5585, | Identified Mail (DKIM) Service Overview", RFC 5585, | |||
| July 2009. | July 2009. | |||
| skipping to change at page 27, line 12 ¶ | skipping to change at page 29, line 16 ¶ | |||
| [LIST-ID] Chandhok, R. and G. Wenger, "List-Id: A Structured Field | [LIST-ID] Chandhok, R. and G. Wenger, "List-Id: A Structured Field | |||
| and Namespace for the Identification of Mailing Lists", | and Namespace for the Identification of Mailing Lists", | |||
| RFC 2919, March 2001. | RFC 2919, March 2001. | |||
| [LIST-URLS] | [LIST-URLS] | |||
| Neufeld, G. and J. Baer, "The Use of URLs as Meta-Syntax | Neufeld, G. and J. Baer, "The Use of URLs as Meta-Syntax | |||
| for Core Mail List Commands and their Transport through | for Core Mail List Commands and their Transport through | |||
| Message Header Fields", RFC 2369, July 1998. | Message Header Fields", RFC 2369, July 1998. | |||
| [MARF] Shafranovich, Y., Levine, J., and M. Kucherawy, "An | ||||
| Extensible Format for Email Feedback Reports", RFC 5965, | ||||
| August 2010. | ||||
| [MIME] Freed, N. and N. Borenstein, "Multipurpose Internet Mail | [MIME] Freed, N. and N. Borenstein, "Multipurpose Internet Mail | |||
| Extensions (MIME) Part One: Format of Internet Message | Extensions (MIME) Part One: Format of Internet Message | |||
| Bodies", RFC 2045, November 1996. | Bodies", RFC 2045, November 1996. | |||
| [MIME-TYPES] | [MIME-TYPES] | |||
| Freed, N. and N. Borenstein, "Multipurpose Internet Mail | Freed, N. and N. Borenstein, "Multipurpose Internet Mail | |||
| Extensions (MIME) Part Two: Media Types", RFC 2046, | Extensions (MIME) Part Two: Media Types", RFC 2046, | |||
| November 1996. | November 1996. | |||
| [SMTP] Klensin, J., "Simple Mail Transfer Protocol", RFC 5321, | [SMTP] Klensin, J., "Simple Mail Transfer Protocol", RFC 5321, | |||
| End of changes. 15 change blocks. | ||||
| 63 lines changed or deleted | 95 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||