Internet DRAFT - draft-otis-mass-reputation

draft-otis-mass-reputation






mass                                                             D. Otis
Internet-Draft                                               Trend Micro
Expires: March 19, 2006                               September 15, 2005


                      MASS impacts upon reputation
                     draft-otis-mass-reputation-03

Status of this Memo

   By submitting this Internet-Draft, each author represents that any
   applicable patent or other IPR claims of which he or she is aware
   have been or will be disclosed, and any of which he or she becomes
   aware will be disclosed, in accordance with Section 6 of BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt.

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

   This Internet-Draft will expire on March 19, 2006.

Copyright Notice

   Copyright (C) The Internet Society (2005).

Abstract

   This document responds to findings in the MASS review by Russell
   Housley et al, with additional considerations from the perspective of
   reputation assessment.  This also includes speculations on possible
   solutions and implementations for the MASS proposal: DKIM.








Otis                     Expires March 19, 2006                 [Page 1]

Internet-Draft                  MASS-Rep                  September 2005


Table of Contents

   1.   Introduction . . . . . . . . . . . . . . . . . . . . . . . .   3
   2.   Resource Preservation  . . . . . . . . . . . . . . . . . . .   3
   3.   Community Policies . . . . . . . . . . . . . . . . . . . . .   4
   4.   Filtering Erodes Integrity . . . . . . . . . . . . . . . . .   5
   5.   Mailbox-domain Authorization . . . . . . . . . . . . . . . .   6
   6.   The Hack for Mailbox-Domain Authorization  . . . . . . . . .   8
   7.   Protecting Recipients without using Mailbox-domain
        Authorization  . . . . . . . . . . . . . . . . . . . . . . .  10
   8.   Detecting a Path Change  . . . . . . . . . . . . . . . . . .  12
   9.   Binding Identifiers  . . . . . . . . . . . . . . . . . . . .  13
   10.  The next steps in enforcement  . . . . . . . . . . . . . . .  15
   11.  PKI certificates per user would burden larger domains  . . .  16
   12.  Key size and performance . . . . . . . . . . . . . . . . . .  17
   13.  Border Validation  . . . . . . . . . . . . . . . . . . . . .  18
   14.  Domain Assertions for Signatures . . . . . . . . . . . . . .  20
   15.  IANA Considerations  . . . . . . . . . . . . . . . . . . . .  20
   16.  Security Considerations  . . . . . . . . . . . . . . . . . .  20
   17.  Acknowledgements . . . . . . . . . . . . . . . . . . . . . .  21
   18.  References . . . . . . . . . . . . . . . . . . . . . . . . .  21
     18.1   References - Normative . . . . . . . . . . . . . . . . .  21
     18.2   References - Informative . . . . . . . . . . . . . . . .  23
        Author's Address . . . . . . . . . . . . . . . . . . . . . .  24
        Intellectual Property and Copyright Statements . . . . . . .  25


























Otis                     Expires March 19, 2006                 [Page 2]

Internet-Draft                  MASS-Rep                  September 2005


1.  Introduction

   Laws governing email policy do not always prohibit unsolicited
   commercial email (UCE).  It is necessary that more stringent email
   policies are used by sending domains as demanded by recipients.
   Signatures, validated by keys published within DNS, allow recipients
   a stronger means to ascertain those domains most directly accountable
   for policies applied to the messages being offered.  The reputation
   of entities submitting messages often determines acceptance, although
   the assessed identity is normally the IP address.  Many domains use a
   shared outbound IP address and this may result in collateral
   refusals.  Signed messages offer a stronger, and more specific
   accountable domain than that of the IP address.  However, the use of
   domain signed messages is not a panacea.  The current [DKIM]
   specification creates challenges when attempting to squelch policy
   breaches, see [ID-Housley-MASS].  Also, the overhead required to
   implement signatures, as compared to the use of an IP address for
   reputation assessment, requires additional defensive measures.

   Terminology: Terminology conforms to [ID-email-arch].

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in [RFC2119].

2.  Resource Preservation

   The prevalence of undesirable email reaches levels where a decision
   to refuse a session MUST be made prior to the message exchange as a
   means to conserve network and system resources.  The decision to
   refuse a session is typically based upon accrued reputations, or the
   access type listed by providers for the remote IP address in
   question.  A similar level of protection is possible by basing
   reputations upon verified HELO/EHLO names.  Verifying the HELO/EHLO
   name demands that clients insure requisite DNS information is
   reliably returned, see [ID-CSV].  Accepted practices currently
   forgive HELO/EHLO names that do not verify, as allowed by [RFC2821].
   To establish effective name-based reputations for defending message
   signature verification operations, HELO/EHLO name verification is
   REQUIRED.  Verifiable HELO/EHLO names or domain signatures offer an
   alternative to the use of the IP address as a fair basis for accruing
   reputations.  Name-based reputations may avoid collateral refusals,
   however, verifications of the HELO/EHLO names are then needed to
   provide vital network and system resource protection.

   A signed message permits inclusion of a new identifier that can not
   be falsified.  The signing-domain can add an opaque-identifier
   together with recommendations regarding the use of this identifier in



Otis                     Expires March 19, 2006                 [Page 3]

Internet-Draft                  MASS-Rep                  September 2005


   conjunction with mailbox-addresses.  In addition to improving
   protections available to recipients, this identifier can also be used
   to abate abusive message replays.  The lookup required to detect a
   revocation of the opaque-identifier can be mitigated by the HELO/EHLO
   name being within the signing-domain, or by a valid hash of the
   [RFC2821] RCPT TO parameter.

   Resource protection mechanisms SHOULD be based upon a single DNS
   lookup to verify the authorization and authentication of the sending
   SMTP client.  When, by convention, the HELO/EHLO name is normally
   within the signing-domain, then a few other efficiencies are made
   possible.  It becomes possible to skip reputation checks for the
   signing-domain after a reputation check of a HELO/EHLO name that is
   within the signing-domain.  As mentioned, when the HELO/EHLO name is
   within the signing-domain, checking the status of a specific opaque-
   identifier should not be needed.  Had the account been revoked, it
   SHOULD be impossible for these messages to be signed with a revoked
   opaque-identifier.

   Systems suffering a security breach have become a significant vehicle
   for sending abusive email.  Millions of compromised systems may act
   as SMTP clients or utilize automated access to the provider's SMTP
   servers.  Any mechanism enforcing email policy SHOULD verify the
   source domain or use the remote IP address as a basis for reputation
   accrual.  As a result of domain verification, those accountable for
   maintaining security will have been determined when abuse is
   discovered.  Authentication ensures the validity of these identifiers
   used as a basis for network protection.  Assumptions regarding
   sources of abusive email or a presumption of security may injure
   innocent parties and damage the integrity of email delivery.

   With tens of millions of good and bad evolving email domains, it is
   less effective to abate abuse or maintain security where each
   recipient contemporaneously establishes acceptance criteria.  White-
   listing large domains, demonstrating good governance controlling
   abuse, will categorize a major portion of the messages being
   assessed.  While this reduces the number of messages needing
   evaluation, the categorization of remaining sources still represents
   a sizable expense.  Often a community of administrators pool efforts
   and create shared lists that offer histories for an extensive number
   of email sources.

3.  Community Policies

   The pooling of efforts is often accomplished through reputation
   services as a means to establish policy within a community.  Those
   with even a brief history of not adhering to these policies are
   thereby excluded from the community.  Real-time black-hole lists have



Otis                     Expires March 19, 2006                 [Page 4]

Internet-Draft                  MASS-Rep                  September 2005


   become a commonly used mechanism to publish IP address related
   reputations, where having no record returned indicates a good
   reputation.  As an example, a community wishing to enforce an Opt-In
   requirement for bulk email often employs an email reputation service
   to establish such community-wide policy.

   Reputation service subscription fees, if any, are typically paid by
   the recipient.  With such a service, those sending abusive levels of
   unrequested email to anyone within the community may find subsequent
   sessions refused with an error response.  This response often
   indicates which reputation service reported their server as not
   having a good reputation with respect to specific polices.  The
   extent of email abuse has made reputation services an integral
   component of network resource protection.

   Some bulk email distributors also utilize a vouching or accreditation
   service which attests their compliance to specific policies.  To
   benefit from the accreditation, the recipient must rely upon the
   service, but fees for this type of service are usually paid by the
   sender.  Mechanisms for accreditation services are often similar to
   real-time black-hole lists, except the record may also assert
   favorable ratings.

   Sender based fee structures for accreditation may provide greater
   latitude for senders, which may then dissuade some domain
   administrators from utilizing these services.  Some providers may
   utilize accreditation services together with their own white-listing
   of bulk email distributors, as an adjunct to real-time black-hole
   listings.  White-listing by IP address is difficult to maintain.
   Accreditation services assist with this white-listing effort for bulk
   distributors where their volumes often mislead filtering algorithms
   that categorize the distributors as abusers.

4.  Filtering Erodes Integrity

   Filter programs often place messages into several categories.
   Placement of messages into suspense pending review, often hides the
   filter's actions, and inhibits challenges by senders.  Often, when
   filtering provides multiple categories, a portion of these categories
   are marked suspicious and left to the recipient to make a final
   determination.  The lack of feedback prevents assurance of email
   delivery.  There MUST be an ability to challenge a categorization to
   ensure the integrity of email delivery.  A filter program's "Junk"
   folder contains email that has not been properly excluded by policy
   enforcement, but is without a strong basis for rejection.

   Even when a filtered message is rejected which provides feedback, it
   may be due to a phrase contained within the message.  A doctor's



Otis                     Expires March 19, 2006                 [Page 5]

Internet-Draft                  MASS-Rep                  September 2005


   reply to a patient may be steadfastly rejected regardless of which
   provider is used.  Unfortunately, many of these filter programs have
   evolved to also silently discard messages, once some level of
   heuristics has been achieved.  This mode removes all traces of the
   message for both the sender and the recipient.  As a result of a
   breakdown in policy enforcement and the resulting reliance upon
   filters which silently discard as well as place messages into the
   often ignored "Junk" folder, the integrity of email delivery has been
   reduced.

5.  Mailbox-domain Authorization

   As a basic principle, abuse prevention REQUIRES source verification
   and accrual of reputation.  For effective abuse prevention, sources
   SHOULD resolve to the sending domain to establish an appropriate
   hierarchy of accountability.  However, adding recipient overhead for
   discovering mailbox-domain authorizations increases the risk that the
   recipient's resources will be exhausted.  Furthermore, after the
   recipient expends these efforts to determine a mailbox-domain's
   authorizations, the resulting authorization could be inappropriately
   considered equivalent to having verified the source domain for
   purposes of accruing reputations.

   There have been several schemes proposing accrual of mailbox-domain
   reputations, often using recipient feedback techniques.  This accrual
   erroneously presumes that the mailbox-domain has been authenticated,
   rather than just having authorized the system handling the message.
   When recipients consider path or signing-domain based authorizations
   as being equivalent to verifying the source domain, this creates an
   unfair basis for accruing reputations.  The mailbox-domain owner
   often has no administrative oversight to assure the protection of the
   mailbox-domain owner's reputation.  Instead of authorization records
   preventing harm, these authorization records may actually cause an
   otherwise unevaluated mailbox-domain to create a bad reputation for
   the owner, when a mailbox-domain is still falsified by abusive
   messages.

   Assuming the recipient checks for mailbox-domain authorizations, the
   anticipated benefit of preventing misuse then depends upon the
   mailbox-domain owner accepting additional conditions.  The mailbox-
   domain owner MUST fully depend upon a provider ensuring the
   exclusivity of the outbound mailbox-domain.  Also, the mailbox-domain
   owner MUST accept the loss of emails in some cases.  This loss occurs
   when the authorization mechanisms are limited to using commonly
   visible or determinate mailbox-domains.  Present conventions may
   establish the sending entity with a typically invisible or perhaps
   indeterminate mailbox-domain.  Granting authorization exceptions to
   accommodate differing conventions offers opportunities for exploits.



Otis                     Expires March 19, 2006                 [Page 6]

Internet-Draft                  MASS-Rep                  September 2005


   Not granting exceptions increases the support needed for non-
   conforming mechanisms that result in email loss.

   Authorization schemes devise mailbox-domain/signing-domain or
   mailbox-domain/path relationships.  Establishing these relationships
   entails significant administrative effort as well as protocol
   overhead.  Exceptions granted may potentially mislead recipients, by
   offering false assurances when the mailbox-domain authorization
   mechanism indicates success.  Proponents of mailbox-domain
   authorization mechanisms ignore the uncertainty of the mailbox-
   domain's visibility, selection, and origin.  Recipients will still
   confront abuse from mailbox-domains providing authorization.
   Reputations based upon mailbox-domains may create unwarranted email
   delivery failures.  The inappropriate application of reputation
   occurs when recipients use authorization as a basis to hold
   potentially falsified mailbox-domains accountable, as their means to
   abate the abuse.

   Currently abusers control millions of compromised systems, and can
   take advantage of weak mailbox-domain authorizations.  Abusers may
   exploit published records that register permitted mailbox-domain
   paths or signing-domains, to usurp previously good reputations.  When
   abuse occurs that still falsifies the mailbox-domain, the mailbox-
   domain owner's tainted reputation may subsequently cause this
   domain's emails to be blocked.  What is worse, redemption of a
   mailbox-domain owner's reputation may not be practical due to the
   typical mailbox-domain multi-level authorization scheme that follows
   a filtering paradigm.  The mailbox-domain may not receive
   notification their emails are being placed into "Junk" folders.

   There are many weaknesses associated with path or signing-domain
   based authorizations where the mailbox-domain can still be falsified.
   Abusers may take advantage of a mailbox-domain owner's desire to
   ensure emails are delivered by allowing exceptions.  Abusers may also
   take advantage of an email provider's failure to check mailbox-domain
   authorizations, or failure to license mailbox-domain selection
   algorithms.  Nevertheless, with these flawed schemes, the mailbox-
   domain within the selected header is held accountable for having sent
   the message, when this accountability is only supported by
   authorization records.

   Some call this unfair assumption that holds the mailbox-domain
   accountable, "Sender Authentication."  Calling the authorization
   derived from a mailbox-domain "Sender Authentication" would be
   similar to making a declaration that the postal service is authorized
   to deliver letters for John Doe, where recipients then claim any
   letter received from the postal service and bearing John Doe's name
   is authentically or genuinely from John Doe. Of course, that would be



Otis                     Expires March 19, 2006                 [Page 7]

Internet-Draft                  MASS-Rep                  September 2005


   a false assumption, and path or signing-domain based authorizations
   are no different.  It is normal for mailbox-domains to employ common
   service providers.  It is also normal for service providers not to
   adopt specific checks requiring extensive support.  Mailbox-domain
   authorizations do not provide a safe or practical solution for
   mailbox-domain falsification.

6.  The Hack for Mailbox-Domain Authorization

   How will abusers take advantage of normal desires and the false
   assumptions surrounding mailbox-domain authorization?  While strictly
   limiting authorization to just an email provider's servers could
   reduce risks of a mailbox-domain being falsified, this could also
   cause some messages to be lost as a result.  The loss could occur
   when recipient's providers select mailbox-domains using an
   incompatible algorithm.  Recipients could also be forwarding messages
   which may result in email losses.  For example, with messages first
   sent to an alma mater's domain, forwarding may make messages appear
   to be unauthorized.  Messages may also be lost when sent through some
   list-servers, or through servers running older versions of email
   applications.

   Why quibble over who is responsible for implementing changes that
   often takes many years?  For the loss of messages due to an
   incompatible authorization scheme, the remedy invariably suggested
   would be to leave mailbox-domain authorization open-ended.  Open-
   ended authorization simply declares a lower level of authorization
   rather than authorization failure.  The multiple levels of
   authorization is intended to alert recipients to increase scrutiny
   given messages with lower levels.  However, this lower level of
   authorization can not ensure the mailbox-domain owner's reputation
   remains protected.  For example, abusers can take advantage of
   automatic image fetching to compile valuable lists of active email
   accounts by using encoded image links.  These abusers don't care
   which folder or level of authorization they obtain.  They don't care
   that recipients fail to respond, and they would be thrilled to see
   recipients make the effort to unsubscribe.

   The mailbox-domain owner's next concern is whether the recipient of a
   message clicks the "spam" button when messages have falsified their
   mailbox-domain.  Conventions remain uncertain for selecting the
   header being checked for authorization.  Email providers rely on
   open-source applications and are understandably reluctant to enter
   into licensing terms that are hostile to the open-source methods of
   software distribution.  It is also understandable some providers will
   only consider using non-proprietary algorithms for basing their
   assumptions of who originated the message.  These providers can not
   inspect some headers without violating claims of intellectual



Otis                     Expires March 19, 2006                 [Page 8]

Internet-Draft                  MASS-Rep                  September 2005


   property, when there are also proprietary header selection
   algorithms.  Each selection approach creates compatibility issues
   requiring differing mitigations.

   Some providers will utilize a proprietary algorithm and enforce their
   view by incorporating reputation extensions into MUA plug-ins that
   take an already unfair basis for reputation to a new level of being
   unfair.  With either path or signing-domain authorization records
   being very public, a mailbox-domain owner's reputation will be
   exposed to any possible weakness.  Publishing open-ended
   authorization records may even act as an invitation for this abuse.
   Furthermore, a provider that does not ensure message headers are not
   in conflict with other customers across all possible interpretations,
   may risk the mailbox-domain owner's reputation, especially when this
   provider's limitation becomes known.

   With phishing techniques becoming seemingly epidemic, mailbox-domain
   authorization is often touted as a remedy.  With respect to phishing,
   these authorization schemes may bypass the From header as the basis
   for acceptance, even though this is the header typically assumed as
   verified by recipients.  Some MUAs have made this problem worse by
   displaying user friendly names, known as the "pretty" names, rather
   than the actual mailbox address.  Phishing ploys often use disposable
   domain names with obfuscated links, which could also provide a
   variety of mailbox-domain authorizations as a means to obtain false
   assurances.

   Mailbox-domain authorization records can covertly authorize the
   entire Internet to enable a compromised system anywhere in the world.
   Mailbox-domain authorization, as a phishing deterrent, presumes wide
   adoption of an algorithm by mail clients and providers.  However,
   assurances offered by mailbox-domain authorization "aware"
   applications are dangerous, due to the possible use of hidden
   headers, and reliance upon uncertain interim authorization checks.
   This may actually place consumers in greater peril, when trusting
   false assurances.

   Mailbox-domain authorization requires that mailbox-domain owners
   trust their email providers, although many providers do not
   authenticate their own customers, and do not care what mailbox-domain
   is used.  Such providers will be exposing the mailbox-domain owners
   who publish mailbox-domain authorization records to substantial
   risks.  Mailbox-domain authorization does not identify these
   providers either, so there is no accountability that directly assures
   a provider's diligence.

   Mailbox-domain authorization itself may weaken the integrity of the
   DNS.  One draft risking the integrity of DNS only offers the advice



Otis                     Expires March 19, 2006                 [Page 9]

Internet-Draft                  MASS-Rep                  September 2005


   that providers use "properly paranoid DNS resolvers."  Path based
   authorization records catalog all outbound MTAs of a domain and may
   demand a minimum of more than one hundred DNS lookups, while also
   ignoring UDP exponential back-off.  Signed-domain authorization
   records require walking up the DNS label tree from five levels below
   the root.  This occurs for mailbox-domains that have not made an
   indication that a mailbox-domain authorization scheme is supported.
   This will increase DNS traffic and likely obligate root name servers
   to issue negative authorization records to mitigate the authorization
   query overhead.  Mailbox-domain authorization records can not offer
   network resource protection, but actually put these resources at
   risk.

   Publishing mailbox-domain authorization depends upon providers
   inspecting all possible interpretations of the message headers and
   envelope parameters.  To do this, providers may either limit their
   customer's choice of mailbox-domains, or isolate their customers
   outbound servers or IP address.  The mailbox-domain owner suffers
   harm when the provider is negligent at controlling access and
   establishing the needed constraints, since the provider remains
   anonymous.  Furthermore, the mailbox-domain owner will be left in the
   dark as to the cause of their dilemma.

7.  Protecting Recipients without using Mailbox-domain Authorization

   The opaque-identifier is a mechanism being suggested by this
   document.  The term 'opaque' means that only the domain creating the
   identifier understands the relationships described.  There could be
   two modes used for creating the content of the opaque-identifier.
   One mode would be persistent with the account used to access the
   signing-domain, and the other could be sequential for cases where an
   account is not involved.  A prefix could be added to the sequential
   opaque-identifier to prevent collisions with the identifiers used for
   accounts.

   A sequential opaque-identifier may be appropriate for distributing
   bulk mailings.  To identify the abusers that may attempt to stage
   replay attacks, having a unique identifier sent to each recipient
   could be helpful.  These replay attacks could be done using the
   unchanged content of the message, but sending to recipients that
   would consider the information to be unsolicited.  The reason for
   such a replay attack may be to damage the reputation of the signing-
   domain.

   If an identifier were added to an unsigned message, this would invite
   forgery and therefore offer little value.  A standardized opaque-
   identifier, included within the validated content of a signed
   message, would offer significant value.  It would be an opaque-



Otis                     Expires March 19, 2006                [Page 10]

Internet-Draft                  MASS-Rep                  September 2005


   identifier added to the signature header that is valid as a domain
   name label.  A persistent opaque-identifier would be most useful when
   derived from the access server that authenticates the account being
   used.

   The opaque-identifier would greatly aid the correlation of abuse and
   prove most useful for locating compromised systems.  This approach
   could be effective against systems compromised by Trojan programs,
   stolen passwords, and cracked wireless access points, among many
   other nefarious methods.  Abuse reports that catalog signed messages
   and that are correlated with the opaque-identifier, would provide
   incontrovertible evidence of where the source of a problem exists.
   The publishing of the revocation record for the opaque-identifier
   would also provide feedback that actions were taken to rectify a
   policy breach.

   In odd cases, where the HELO/EHLO name is not contained within the
   signing-domain and where the RCPT TO hash is not valid, a single
   lookup of the opaque-identifier returning no record would be an
   indication that this particular opaque-identifier is still authorized
   by the signing-domain.  This mechanism would be most valuable in
   those cases where the message may have been forwarded, such as at the
   typical alma mater, or where a mailing list opts to also forward
   signed messages unaltered.

   If there is a problem, the signature would offer the name of the most
   capable domain to remedy abuse.  People can still safely use their
   forwarding email accounts given to them by their school or society.
   Mailing lists would be given a strong identifier upon which to grant
   the replication of messages.  The best part, complaints would also
   likely be directed to those most able to curtail future episodes of
   bad behavior, i.e. the provider of the abusive account!

   The construction of this revocation record mechanism could take the
   form of a single A record lookup.  The opaque-identifier would be
   composed of 1 to 63 characters and select a record in this fashion:

   Within the signature header, a parameter u=<opaque-identifier> would
   indicate the use of a opaque-identifier.

      <opaque-identifier> ::= <letter> [ [ <ldh-str> ] <let-dig> ]

      <ldh-str> ::= <let-dig-hyp> | <let-dig-hyp> <ldh-str>

      <let-dig-hyp> ::= <let-dig> | "-"

      <let-dig> ::= <letter> | <digit>




Otis                     Expires March 19, 2006                [Page 11]

Internet-Draft                  MASS-Rep                  September 2005


      <letter> ::= %x41-5A / %x61-7A

      <digit> ::= %x30-39

      <opaque-identifier>._rl.<signing-domain> IN A 127.0.0.2

   When the signing-domain has not revoked authorization for this
   identifier, no record would be returned and the remote DNS cache
   would retain the absence of this record for a brief period of time,
   see [RFC2308].  For the majority of cases, where messages are
   obtained directly from the signing-domain, an exception granted by
   the HELO/EHLO being within the signing-domain allows this revocation
   check to be skipped.  A revocation check would be made for the odd
   cases where the HELO/EHLO is within a different domain and the RCPT
   TO hash is not valid.  This check would be performing nearly an
   identical lookup now ubiquitously done to investigate the status of
   the SMTP client's IP address against a real-time black-hole list.
   Those addresses or identifiers that warrant refusal are granted a
   long lived address record to ensure their immediate refusal and limit
   DNS traffic resulting from abusive sources.  Otherwise, not offering
   a record allows for the prompt cessation of an opaque-identifier's
   authorization when the situation regarding a particular identifier
   changes.  The Time-To-Live for negative DNS caching may be determined
   by the recipient, or represent the lesser of the SOA TTL or the SOA
   MINIMUM field, depending upon the recipient's implementation.

8.  Detecting a Path Change

   There are at least two techniques that can be used to detect when the
   message's path has been altered.  Verifying either check can mitigate
   a need to do a revocation check on a opaque-identifier.  One check
   would be verifying that the hash for the RCPT TO parameter is valid.
   The other would be verifying the HELO/EHLO name and confirming that
   it is within the signing-domain.

   The purpose of the RCPT TO hash would be to provide an indication of
   when to check for the opaque-identifier revocation, as an alternative
   to the HELO/EHLO being within the signing-domain.  There should be
   practical methods used on the RCPT TO line which obfuscates the
   hashed information.  Perhaps, randomly modifying the case of letters
   within the mailbox-domain and modifying the amount of white space
   could act as a type of salt.  The goal is to mitigate extra DNS
   lookups, albeit small in this case.  The RCPT TO hash option would
   also instill a practice that provides better tracking abilities when
   problems occur, without depending upon other steps being taken.

   The RCPT TO could use a white-space sensitive canonicalization that
   combines the RCPT TO parameters into a single SHA-1 hash.  This hash



Otis                     Expires March 19, 2006                [Page 12]

Internet-Draft                  MASS-Rep                  September 2005


   would be added to the signature using base64 encoding as a "r="
   parameter, for example.

   List servers that pass messages unaltered, or recipients that employ
   forwarding accounts could be fairly common scenarios where a
   revocation check would be required.  The reaction deterring the
   replay attack must be rapid, but does not require all abusive
   messages be stopped.  This rapid response will expose participating
   SMTP clients and reduce the profits of the abusive behavior.  The
   loss of the profits and the exposure should act as a deterrent.

9.  Binding Identifiers

   Binding identifiers allows a recipient to recognize a prior
   correspondent without the use of complex and problematic mailbox-
   domain authorizations.  Mailbox-domain authorization problems may
   create support issues that could significantly thwart [DKIM]
   deployment.  The MUA is able to associate visual items from prior
   correspondents and obtain a higher granularity and history of signed
   message sources without using any DNS lookups.  The identification of
   the message source is contained completely within the message itself.

   When assuming legacy MUAs, scant protections are possible by the MTA
   even using many DNS lookups.  Due to limitations of ensuring
   visibility of checked domains, the MTA approach provides an
   alarmingly low level of mailbox-address protections.  There is also a
   potential for an undesired exposure of mailbox-addresses in the 'i='
   parameter.  Mailbox-domain authorizations depend upon the signing-
   domain verifying the validity of the local-part of the mailbox-
   address for the recipient to detect intra-domain spoofing.

   A suggested opportunistic approach could be used to detect when a
   previous correspondent appears to be from a different point of
   origin.  The approach would rely upon the collected relationships
   discovered within signed messages.  The signed message may even
   advise what information should be compared against the mailbox-
   address and perhaps even the pretty-name.  While in most cases the
   collected relationships (bindings) would be made at the behest of the
   recipient and require their approval, some relationships could be
   established automatically.

   To reduce user interaction needed to establish bindings, there would
   be three modes expressed by a scope-width parameter included within
   the signature header.  A value of "w=n" would indicate a narrow
   binding recommendation, and a value of "w=b" would indicate a broad
   binding recommendation.  A Narrow binding would include mailbox-
   address/signing-domain/opaque-identifier, whereas the Broad binding
   would include just the mailbox-domain/signing-domain.  No "w="



Otis                     Expires March 19, 2006                [Page 13]

Internet-Draft                  MASS-Rep                  September 2005


   parameter would indicate that no bindings are recommended.

   A provision should be added to indicate when a key had been
   delegated.  The message signed with a delegated key should not be
   trusted to make recommendations with respect to the scope of a
   binding.  There should be a parameter added to the delegated key
   where "d=n" parameter indicates that the key has been delegated and
   the recommending binding for delegated keys is narrow.  In the case
   of a delegated key, the opaque-identifier and the key selector MUST
   match.

   The suggested binding are recommendations for the type of pseudo-
   certificate created to uniquely identify a correspondent for future
   reference.  One could argue that 'ssh' is one of the most widely used
   cryptographic protocols, which often relies upon "opportunistic
   cryptography" by saving self-signed certificates.  This document is
   suggesting this 'ssh' model could also work for [DKIM].  In the case
   where the "w=b" and the mailbox-domain and signing-domain match, the
   MUA, perhaps even the MTA, could cache the pseudo-certificates for
   the correspondents.

   When the mailbox/signing domains are the same, and when the message
   advises that only the mailbox/signing domains are essential to
   identify the originator of a message, then it should be safe to
   capture this relationship automatically.  With the relationship
   information captured (cached), the MTA or MUA would be able to detect
   when a message violated these expected relationships.

   In the case of a particular domain that recommends only the signing/
   mailbox domains be bound, then after the initial contact by anyone
   within that domain, comparing against the captured signing/mailbox
   domains could indicate when the source of a message appears
   suspicious.  If a subsequent message appeared suspicious coming from
   a list server, then the recipient could merge the list server domain
   within the associated relationship.  This approach would make it more
   advantageous for list servers not to damage initial signatures.

   A recipient could recognize the originator of a message even when
   there are no assurances being made regarding the mailbox-address, by
   using the opaque-identifier that tracks accounts added by the
   signing-domain.  This opaque-identifier would become a part of the
   captured relationship once approved by the recipient.  This approach
   means that providers that do not constrain their customer's use of a
   mailbox-address still offers significant value for their customers.
   Other out-of-band techniques could be used to strengthen the identity
   of the individual without involving the email provider.





Otis                     Expires March 19, 2006                [Page 14]

Internet-Draft                  MASS-Rep                  September 2005


10.  The next steps in enforcement

   Reduce reliance upon filtering that either discards or "junks"
   messages.  A growing loss of integrity in email delivery is eroding
   email's value as a method for conducting transactions.  This loss of
   integrity is largely caused by filtering programs that process
   messages based upon weak identifiers.  A filter program's use of
   heuristics with weak identifiers demands growing resources and may
   cost senders the loss of their messages, even to the point where
   their mailbox-domain becomes unusable, with no clear recourse for
   correcting errant behaviors.

   Remove advantages gained by spoofing the bounce-addresses by not
   returning the original content of the bounced message within the
   Delivery Status Notification (DSN).  This should curtail the
   exploitation of an MTA, that performs checks after accepting the
   message with a spoofed bounce-address intended to be bounced.  Reduce
   the exposure to the DSN from messages with spoofed bounce-addresses
   by implementing a time constrained cryptographic signature within the
   local-part of the bounce-address for all messages sent, as described
   in [ID-BATV].

   Improve the integrity of email by using reputations based only upon
   authenticated identities, where messages are either fully accepted or
   refused.  In email, there are only three identities that can be
   authenticated: the IP address of the sending MTA, a somewhat stronger
   HELO/EHLO, and a much stronger message signature.  Authentication of
   identities provides a means to fairly assess the sources for possible
   abuse.  The IP address and HELO/EHLO domain represent the
   administrator for the last step in the message's delivery.  A message
   signature represents the domain administrator granting initial
   access.

   Protect the signature validation process by utilizing an
   authenticated HELO/EHLO name to establish a reputation for the
   session prior to an exchange of messages and prior to the validation
   of signatures, see [ID-CSV].  The authentication and authorization of
   the HELO/EHLO name can be validated within a single DNS lookup.  The
   DNS infrastructure that provides the signature keys also requires
   better protections.  Do not expect the DNS server to handle active
   scripts that demand extensive lookups.  Ultimately, the deployment of
   [RFC4033] [RFC4034][RFC4035]for DNSSEC is required.

   Limit exposure to the replay of signed messages.  Although a message
   signature provides the strongest authentication and offers the
   recipient the best protections from spoofing or phishing, it could be
   abusively repeated beyond the signing domain's control.  As a
   defensive measure, when needed, a message signature should also



Otis                     Expires March 19, 2006                [Page 15]

Internet-Draft                  MASS-Rep                  September 2005


   permit inclusion of an opaque-identifier.  The opaque-identifier
   would both ease correlation of abuse, and enable a means to squelch
   "replay attacks."  For example, when the key or signature remains
   valid for one week, publishing a revocation record within minutes of
   an abuse report would reduce replay exposure by a factor of 2000 to
   1, and would clearly unveil replay sources to all recipients.  While
   message signatures offer little network protection, they indicate the
   administrator most able to prevent future breaches of policy.
   Message signatures also truly afford protections from the initial
   sources being spoofed.

   Assert email policy for the domain, see [ID-CSVCSA].  Currently this
   DNS record allows a domain to assert that all of their SMTP clients
   will be authorized and authenticated using [ID-CSV].  A signed
   message allows safe assessment of the message source by making no
   presumptions of intervening security.  At an administrative border,
   policy assertions, as well as the domains validated, may need to be
   communicated to another MTA within the administrative domain, where
   signature validation may occur.  This document recommends a possible
   structure for transferring this information.

11.  PKI certificates per user would burden larger domains

   The relative simplicity of the DKIM proposal represents an essential
   element needed to sustain the performance demanded by the email
   infrastructure.  While policy enforcement necessitates cancellation
   of access rights, using signatures also necessitates a need to revoke
   user authorization implied by a valid signature.  This is not
   equivalent to a certificate revocation as defined for PKI in
   [RFC3280].  A proposed method in this document achieves the
   revocation mechanism, and only requires a simple exchange for
   infrequent cases.  In fact, certificates would be unsuitable for
   fulfilling this need, as certificates per-user would represent an
   undue burden.

   For large providers, two certificates per user would be needed to
   accommodate the mail transit time during a certificate change-over.
   A domain with 20 million users would then require close to 7 GB of
   data published on-line.  Even when subsequent certificates are
   phased-out in stages, any extended period for such staging would
   increase the size of certificate revocation lists (CRL) which, to be
   effective against abuse, would require frequent polling.  Recipients
   would then need to cache this voluminous information for all users
   exchanging messages.  As an alternative, by adding a persistent
   identifier within the message, the amount of information exchanged
   would represent 6 orders of magnitude reduction, while still
   providing the same capabilities.




Otis                     Expires March 19, 2006                [Page 16]

Internet-Draft                  MASS-Rep                  September 2005


   For the smaller providers, not incurring the added expense of
   acquiring certificates helps reduce barriers to the deployment of
   message signatures.  A certificate authority typically ensures the
   identity of the certificate holder, but is less concerned about
   adherence to various email policies.  There would still be a need to
   verify the reputation of this identity against desired policies, as a
   basis for accepting their messages.  While using DNS to distribute
   keys reduces what could be a substantial expense, this relatively
   simple mechanism is not without risk.

12.  Key size and performance

   RSA keys are used by the proposal and, for this review, are assumed
   to follow the outline in [RFC3447].  The processing to verify a
   signature is roughly dependent upon the square of the key size.  The
   overhead associated with certificate or key handling is ameliorated
   through retention within a cache for extended periods.  In the summer
   of 1995, RSA laboratories recommended a minimum key size of 768 bits
   for user data, 1024 bit keys for enterprise keys, and 2048 bits for
   root keys.  Since that time, with Moore's law providing a doubling of
   performance every 2.5 years, today's system's performance is
   approximately 16 times faster.  At an RSA challenge in August 1999, a
   512-bit value was factored using 35.7 CPU-years.  Other concerns
   regarding the time to factor the key involve the advancement of
   programmable or custom logic.  These hardware advances further
   increases the performance of factoring by thousands of times more,
   especially for smaller keys where the needed memory size remains
   practical.

   Factoring memory requirements: [TWINKLE]

          +----------+-------------+--------+-------+--------+
          | Key Size | Time        | Factor | Sieve | Matrix |
          +----------+-------------+--------+-------+--------+
          | 512      | 1.7 x 10^19 | 3MB    | 128MB | 2GB    |
          | 768      | 1.1 x 10^23 | 240MB  | 10GB  | 160GB  |
          | 1024     | 1.3 x 10^26 | 7.5GB  | 256GB | 10TB   |
          +----------+-------------+--------+-------+--------+

   There are speculative estimates that with as little as $5,000 worth
   of specialized hardware, a 768-bit key could be determined within 95
   days, see [TWIRL].  Extrapolating from this figure, it may take
   $200,000 to do this within 3 days.  With the growing plunder achieved
   by criminal activity that sends email to entice victims, this expense
   may not be an adequate deterrent.  Today's recommended minimum key
   size of 1024-bits seems well justified.  It will change to 2048-bits
   by the year 2015, based on a tentative schedule provided by the NIST,
   see [NIST-Keys].  [RFC3766] provides details relevant to assessing



Otis                     Expires March 19, 2006                [Page 17]

Internet-Draft                  MASS-Rep                  September 2005


   key strength.

   A very rough estimate of processing overhead for signatures assumes
   that memory caching and higher processor performance provide about an
   8 times improvement over memory bus rates.  The following formula was
   used to estimate performance:

      (80,000 + 32 (key-bit-size^2) + 448(message-byte-size)) / bytes/
      second memory-speed

      Note: Once actual results are evaluated, constants within this
      formula will need adjustment and should also vary between
      different architectures.

   At 768-bit keys and a CPU using 2100 MB/second memory, the overhead
   for an 8 KB message estimates to be around 10.7 milliseconds.  The
   same parameters with a 1024-bit key would result in 17.8
   milliseconds.  This suggests that when changing from 768-bit to 1024-
   bit keys, the resulting overhead should increase by a factor of about
   1.6.  Such a CPU using 2100 MB/second memory dedicated to performing
   this operation, could then handle daily about 4.8 million messages
   that average 8 KB in size.

            +--------------+----------------+-------------+
            | Message Size | Signature Time | Message/min |
            +--------------+----------------+-------------+
            |     1,000    |      16 ms     |    3,700    |
            |     5000     |      17 ms     |    3,500    |
            |    10,000    |      18 ms     |    3,300    |
            |    50,000    |      27 ms     |    2,300    |
            |    100,000   |      37 ms     |    1,600    |
            +--------------+----------------+-------------+

   This table is for a CPU using 2100 MB/second memory validating 1024-
   bit keys.  This shows that beyond 100,000 byte messages, the much
   faster hash function becomes predominately the limiting factor.

13.  Border Validation

   To provide the conveyance of information obtained at the receiving
   administrative border, a new header is introduced.  This header
   documents the methods and results of message validations performed.
   It is added at the top of the message solely by the Internet facing
   border MTA.  Any previous Border-Validation header introduced at the
   Internet facing MTA should be stripped and may be viewed as an
   attempt to forge this information and cause the message to be
   rejected.  This header has the following format:




Otis                     Expires March 19, 2006                [Page 18]

Internet-Draft                  MASS-Rep                  September 2005


      header := "Border-Validation" ":" domain"["address-literal"]"
      1*LWSP *(";" method "=" result)

      domain := Domain as defined in [RFC2821]

      address-literal := Address literal as defined in [RFC2821]

      method := "CSV" | "DKIM" | "RDNS" | "A-RR"

      result := authen "/" author "/" assert "/" time "/" hash

      authen := "VALID" | "INVALID" | "UNKNOWN" | "ERROR"

      author := "VERIFIED" | "MISSING" | "UNKNOWN" | "ERROR"

      assert := hexadecimal presentation of the CSV-CSA port field.

      time := time value defined by recipient

      hash := defined by recipient to cover domain, address-literal,
      method, and result.

      LWSP := 0x20 / 0x09

   "CSV" refers to the procedures defined in [ID-CSV].  "DKIM" refers to
   the procedures defined in [DKIM].  "RDNS" refers to the validation of
   the HELO by using a reverse DNS lookup of the remote client IP
   address and verifying the HELO name, which will provide "UNKNOWN"
   authorization.  "A-RR" refers to using a lookup of an address record
   for the HELO name, which will also provide "UNKNOWN" authorization.

   Authen is for authentication and author is for authorization.  A
   "VALID" authentication indicates the domain has been confirmed by the
   method indicated.  "INVALID" indicates the method attempting
   authentication has failed.  A message that fails authentication
   should be refused.  An authentication returning "UNKNOWN" indicates
   the client does not conform to a standard which assures
   authentication.  Authentication returning "ERROR" indicates a system
   related failure has prevented a determination.

   A "VERIFIED" authorization indicates the client supports [ID-CSV].  A
   "MISSING" authorization indicates the client supports [ID-CSV] or
   [DKIM] but has determined the client or message is not authorized.
   Normally this should cause the message to be refused.  "UNKNOWN"
   authorization indicates the client does not support [ID-CSV].
   Authorization returning "ERROR" indicates a system related failure
   has prevented a determination.




Otis                     Expires March 19, 2006                [Page 19]

Internet-Draft                  MASS-Rep                  September 2005


14.  Domain Assertions for Signatures

   [ID-CSV] provides a means to make domain-wide assertions.  Currently,
   only the use of CSV itself is defined.  The Port field of the CSV-CSA
   record defined in [ID-CSVCSA] can be extended to make signature
   related assertions.

   +--------------+----------------------------------------------------+
   |   Bit Value  | Meaning                                            |
   +--------------+----------------------------------------------------+
   |       1      | Explicit: All authorized names have specific       |
   |              | CSV-CSA records.                                   |
   |       2      | All Messages Signed using DKIM.                    |
   |       4      | HELO/EHLO within signing-domain.                   |
   |       -      | Other bit values are reserved for expansion and    |
   |              | must be set to zero. This range of values should   |
   |              | be ignored by the recipient when their function is |
   |              | unknown.                                           |
   +--------------+----------------------------------------------------+

   Asserting that "all messages signed using DKIM" allows other domain
   signatures to be used, but makes an assurance that all messages sent
   by the MTA will be signed.  Asserting all "HELO/EHLO within signing-
   domain" makes an assurance all messages sent by this MTA can be
   identified by a parent domain signature.

15.  IANA Considerations

   There are no IANA considerations in this draft.

16.  Security Considerations

   Signatures hold the promise of enabling safe and strong methods for
   recipients to assert their own policy requirements.  Signatures
   should be used in conjunction with HELO/EHLO authentication and a
   opaque-identifier to provide a low risk, low impact method to improve
   the integrity of email messages.  Even if consensus can be reached
   regarding which mailbox-domain is to be constrained by a path or
   signing-domain based authorization list, and this mailbox-domain were
   universally checked, this still assumes all systems are secure, for
   any resulting conclusion to be valid.  There can be no open system
   that abates abuse, without the application of reputation or
   accreditation.  Applying reputations against a mailbox-domain puts
   consumers in extreme jeopardy and the email delivery system at risk.
   To ensure consumer safety and the integrity of email delivery,
   reputations MUST only be based upon authenticated entities.

   The stronger the authentication, the safer the mechanism is for



Otis                     Expires March 19, 2006                [Page 20]

Internet-Draft                  MASS-Rep                  September 2005


   providers and consumers alike.  Signatures can be implemented
   unilaterally and are not premised upon adoption of new universally
   applied checks.  The benefit of complaints being directed to the
   appropriate administrator justify the modest costs for signatures.
   Signed messages add value for customers, especially when signatures
   become a minimum requirement for various services.  Rather than being
   a method that targets the current behavior of abusers, signatures
   offer a real means to ensure the source of a message.  The current
   [DKIM] proposal lacks a much needed means to eliminate a replay and
   DoS attack, but this can be addressed through the inclusion of the
   opaque-identifier and conventions establishing the verification of
   the HELO/EHLO.

   The signature's key sizes should be reconsidered, where support for
   512-bit keys should not be required.

   The number of key selectors, when both DNS traffic and protective
   strategies are considered, don't lend themselves to be used on a per-
   user basis, especially for larger domains.  Should such use become
   common, recipient DNS caches could be overwhelmed with key
   information.

   In conclusion, signed messages provide excellent protections for both
   the MTA administrator and the mailbox-domain owner alike.  In
   addition, with a persistent identifier incorporated, signatures offer
   a means to rapidly abate abuse from compromised sources, even within
   large domains.  Using a valid signature, rather than an
   unauthenticated mailbox-domain, for assessing reputation will not
   invite more egregious behavioral changes in criminal activity, nor
   raise legal disputes over who should have been held accountable for
   abuse.

17.  Acknowledgements

   Earl Hood has been making several good suggestions, where I
   incorporated his concept of including a copy of the RCPT TO as a part
   of the message.  This was changed to being a hash of the RCPT TO with
   the intent of discovering whether the path of the message had
   changed.  In the same fashion as adding the RCPT TO hash, Earl also
   suggested adding a body hash to be able to isolate body content
   alteration from header alterations.

18.  References

18.1  References - Normative

   [RFC0791]  Postel, J., "Internet Protocol", STD 5, RFC 791,
              September 1981.



Otis                     Expires March 19, 2006                [Page 21]

Internet-Draft                  MASS-Rep                  September 2005


   [RFC0821]  Postel, J., "Simple Mail Transfer Protocol", STD 10,
              RFC 821, August 1982.

   [RFC0822]  Crocker, D., "Standard for the format of ARPA Internet
              text messages", STD 11, RFC 822, August 1982.

   [RFC1034]  Mockapetris, P., "DOMAIN NAMES - CONCEPTS AND FACILITIES",
              RFC 1034, November 1987.

   [RFC1035]  Mockapetris, P., "Domain names - implementation and
              specification", STD 13, RFC 1035, November 1987.

   [RFC1122]  Braden, R., "Requirements for Internet Hosts -
              Communication Layers", STD 3, RFC 1122, October 1989.

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119, March 1997.

   [RFC2181]  Elz, R. and R. Bush, "Clarifications to the DNS
              Specification", RFC 2181, July 1997.

   [RFC2234]  Crocker, D., "Augmented BNF for Syntax Specifications",
              RFC 2234, November 1997.

   [RFC2308]  Andrews, M., "Negative Caching of DNS Queries (DNS
              NCACHE)", RFC 2308, March 1998.

   [RFC2538]  Eastlake, D., "Storing Certificates in the Domain Name
              System (DNS)", RFC , March 1999.

   [RFC2821]  Klensin, J., "Simple Mail Transfer Protocol", RFC 2821,
              April 2001.

   [RFC2822]  Resnick, P., "Internet Message Format", RFC 2822,
              April 2001.

   [RFC3207]  Hoffman, P., "SMTP Service Extension for Secure SMTP over
              Transport Layer Security", RFC 3207, February 2002.

   [RFC3280]  Housley, R., "Internet X.509 Public Key Infrastructure
              Certificate and Certificate Revocation List (CRL)
              Profile", RFC 3280, April 2002.

   [RFC3447]  Jonsson, J., "Public-Key Cryptography Standards (PKCS) #1:
              RSA Cryptography Specifications Version 2.1.", RFC 3447,
              February 2003.

   [RFC3766]  Orman, H., "Determining Strengths For Public Keys Used For



Otis                     Expires March 19, 2006                [Page 22]

Internet-Draft                  MASS-Rep                  September 2005


              Exchanging Symmetric Keys", RFC 3766, April 2004.

   [RFC4033]  Arends, R., Austein, R., Larson, M., Massey, D., and S.
              Rose, "DNS Security Introduction and Requirements",
              RFC 4033, March 2005.

   [RFC4034]  Arends, R., Austein, R., Larson, M., Massey, D., and S.
              Rose, "Resource Records for the DNS Security Extensions",
              RFC 4034, March 2005.

   [RFC4035]  Arends, R., Austein, R., Larson, M., Massey, D., and S.
              Rose, "Protocol Modifications for the DNS Security
              Extensions", RFC 4035, March 2005.

18.2  References - Informative

   [DKIM]     Allman, E., Callas, J., Delany, M., Libbey, M., Fenton,
              J., and M. Thomas, "DomainKeys Identified Mail (DKIM)",
              July 2005.

   [ID-BATV]  Levine, J., Crocker, D., Silberman, S., and T. Finch,
              "Bounce Address Tag Validation (BATV)", September 2004.

   [ID-CSV]   Crocker, D., Otis, D., and J. Leslie, "Certified Server
              Validation (CSV)", February 2005.

   [ID-CSVCSA]
              Otis, D., Crocker, D., and J. Leslie, "SMTP client
              Authorization (CSA)", June 2004.

   [ID-Housley-MASS]
              Housley, R., "Security Review of Two MASS Proposals",
              January 2005.

   [ID-email-arch]
              Crocker, D., "Internet Mail Architecture", July 2004.

   [NIST-Keys]
              http://csrc.nist.gov/, "Key Management Guildline, Workshop
              Document (draft)", November 2001.

   [TWINKLE]  Silverman, R., "An Analysis of Shamir's Factoring Device",
              May 1999.

   [TWIRL]    Shamir, A., "Factoring Large Numbers with the TWIRL
              Device, Advances in Cryptology - CRYPTO 2003, Springer,
              Lecture Notes in Computer Science 2729", 2003.




Otis                     Expires March 19, 2006                [Page 23]

Internet-Draft                  MASS-Rep                  September 2005


Author's Address

   Douglas Otis
   Trend Micro
   1737 North First Street, Suite 680
   San Jose, CA  94043
   USA

   Phone: +1.408.453.6277
   Email: doug_otis@trendmicro.com









































Otis                     Expires March 19, 2006                [Page 24]

Internet-Draft                  MASS-Rep                  September 2005


Intellectual Property Statement

   The IETF takes no position regarding the validity or scope of any
   Intellectual Property Rights or other rights that might be claimed to
   pertain to the implementation or use of the technology described in
   this document or the extent to which any license under such rights
   might or might not be available; nor does it represent that it has
   made any independent effort to identify any such rights.  Information
   on the procedures with respect to rights in RFC documents can be
   found in BCP 78 and BCP 79.

   Copies of IPR disclosures made to the IETF Secretariat and any
   assurances of licenses to be made available, or the result of an
   attempt made to obtain a general license or permission for the use of
   such proprietary rights by implementers or users of this
   specification can be obtained from the IETF on-line IPR repository at
   http://www.ietf.org/ipr.

   The IETF invites any interested party to bring to its attention any
   copyrights, patents or patent applications, or other proprietary
   rights that may cover technology that may be required to implement
   this standard.  Please address the information to the IETF at
   ietf-ipr@ietf.org.


Disclaimer of Validity

   This document and the information contained herein are provided on an
   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
   ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
   INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
   INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.


Copyright Statement

   Copyright (C) The Internet Society (2005).  This document is subject
   to the rights, licenses and restrictions contained in BCP 78, and
   except as set forth therein, the authors retain all their rights.


Acknowledgment

   Funding for the RFC Editor function is currently provided by the
   Internet Society.




Otis                     Expires March 19, 2006                [Page 25]