Internet DRAFT - draft-santos-dkim-strip
draft-santos-dkim-strip
DKIM Working Group H. Santos
Internet-Draft Santronics Software, Inc.
Intended status: Experimental July 26, 2006
Expires: January 27, 2007
DKIM Canonicalization Method: STRIP
draft-santos-dkim-strip-00
Status of this Memo
By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on January 27, 2007.
Copyright Notice
Copyright (C) The Internet Society (2006).
Abstract
The DKIM base protocol has offers two digital signature
canonicalization (cl4n) methods called "relaxed" and "simple" with
low reliability and survivability during in-transient operations.
This proposal describes a new STRIP canonicalization algorithm and
method to increase the reliability and survivability of the digital
signature. In additional, the proposal describe new original body
hashing requirements to help secure STRIP c14n security concerns
found in a similar but deprecated NOFWS c14n method.
Santos Expires January 27, 2007 [Page 1]
Internet-Draft DSAP July 2006
To be Done List
1. Get Examples of security issues for NOFWS.
2. Complete Security Section.
Table of Contents
1. Nomemclature and Definitions . . . . . . . . . . . . . . . . . 3
1.1. Requirements Language . . . . . . . . . . . . . . . . . . . 3
2. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
3. STRIP Canonicalization . . . . . . . . . . . . . . . . . . . . 4
4. Signing Logic . . . . . . . . . . . . . . . . . . . . . . . . . 4
5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . . 5
6. Security Considerations . . . . . . . . . . . . . . . . . . . . 5
6.1. Replays . . . . . . . . . . . . . . . . . . . . . . . . . . 5
6.2. Denial-of-Service Attacks . . . . . . . . . . . . . . . . . 5
7. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 5
8. References . . . . . . . . . . . . . . . . . . . . . . . . . . 5
8.1. Normative References . . . . . . . . . . . . . . . . . . . 5
8.2. Informative References . . . . . . . . . . . . . . . . . . 6
Appendix A. Appendix . . . . . . . . . . . . . . . . . . . . . . . 6
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 6
Intellectual Property and Copyright Statements . . . . . . . . . . 7
Santos Expires January 27, 2007 [Page 2]
Internet-Draft DSAP July 2006
1. Nomemclature and Definitions
1.1. Requirements Language
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 [RFC2119].
2. Introduction
The DKIM [DKIM-BASE] protocol implements message canonicalization
(c14n) as part its Digital Signature model. Two c14n methods are
currently defined:
SIMPLE
RELAXED
SIMPLE is the the strongest of the two to maintain the originality of
the message integrity during the mail delivery process Any slight
change to the message header or body content at any point during the
transport will cause the verification of the signature to fail.
RELAXED provides a method which canonicalizing the header and body
content to a disembodied digital form with the goal to increase the
survivability of the signature.
Due to the nature of the current infrastructure with a high degree of
unknown, the stronger SIMPLE c14n has a low survival rate. Although
RELAXED improves the chances of survival of the signature, there
still exist legacy CR/LF mutations that can fail the verification
process.
This documents introduces the new STRIP c14n which is similar to
RELAXED but with the added logic to remove all CR and LF characters
from the hashing engine. The STRIP c14n is very similar to the NOFWS
c14n method used by Yahoo's experimental DomainKeys protocol and was
once considered for usage for the DKIM protocol. However, since it
was determined the NOFWS c14n exhibited some replay security threats,
it is expected for STRIP c14n to also inherent the same security
concerns.
To address this issue and to protect the STRIP c14n, a new original
body hashing signature tag is introduced to eliminate the mail
integrity security concerns.
The goals of this proposal are:
Santos Expires January 27, 2007 [Page 3]
Internet-Draft DSAP July 2006
1. help increase the validation of the signature that are now
affected due to current and/or legacy infrastructure CR/LR
related mutations.
2. by introducing cl4n method called STRIP, and
3. by augmented it with a original body hash security layer that
will help eliminate the security concerns related to a STRIP cl4n
method.
3. STRIP Canonicalization
The STRIP c14n method is similar to the RELAXED c14n with the added
step of removing the trailing white spaces in the hashing engine
feed:
(preamble)
<CR> (OCTET 13) Carriage Return
<LF> (OCTET 10) Line Feed
<TSP> (OCTET 32) Trailing Space
(postamble)
4. Signing Logic
If the signer wishes to use the STRIP cl4n method, follow the DKIM-
BASE [DKIM-BASE] specs for signing by also incorporating the
following steps:
1. Add the required tags to the DKIM-SIG header.
2. Add the "bc=strip" tag to the DKIM-SIG header.
3. Calculate the body hash (bh=) based on STRIP cl4n method.
4. Add the bh=body-hash tag to the DKIM-SIG header.
5. Calculate the signature hash (b=).
6. Add the b=sign-hash to the DKIM-SIG header.
7. Calculate the original body hash (oh=) based on SIMPLE cl4n
method.
8. Add the oh=body-hash tag to the DKIM-SIG header.
Santos Expires January 27, 2007 [Page 4]
Internet-Draft DSAP July 2006
The following an example DKIM-Signature with STRIP c14n support:
DKIM-Signature: a=rsa-sha256; s=brisbane; d=example.com;
c=simple; bc=strip; q=dns/txt; i=joe@football.example.com;
h=Received : From : To : Subject : Date : Message-ID;
bh=ZSVEYuq4ri3LR9S+qjlzCP+LxvJrIfrOI2g5hxp5+MI=;
b=dzdVyOfAKCdLXdJOc9G2q8LoXSlEniSbav+yuU4zGeeruD00lszZVoG4ZHRNiYzR;
oh=ADasdadaasdada-adsad123-2n123d+232x1ahddlld=;
5. IANA Considerations
This document makes no request of IANA.
Note to RFC Editor: this section may be removed on publication as an
RFC.
6. Security Considerations
6.1. Replays
TBD
6.2. Denial-of-Service Attacks
TBD
7. Acknowledgements
Discussions related to canonicalization in the IETF-DKIM Working
Group among many participants lead to the development of this
proposed draft.
8. References
8.1. Normative References
[DKIM-BASE]
Allman, E., "DomainKeys Identified Mail Signatures",
April 2006, <http://mipassoc.org/dkim/specs/
draft-allman-dkim-base-04.html>.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
Santos Expires January 27, 2007 [Page 5]
Internet-Draft DSAP July 2006
[RFC2821] Klensin, J., "Simple Mail Transfer Protocol", RFC 2821,
April 2001.
[RFC2822] Resnick, P., "Internet Message Format", RFC 2822,
April 2001.
8.2. Informative References
[LYNCH] Lynch, C., "Canonicalization: A Fundamental Tool to
Facilitate Preservation and Management of Digital
Information", 1999,
<http://www.dlib.org/dlib/september99/09lynch.html>.
Appendix A. Appendix
Author's Address
Hector Santos
Santronics Software, Inc.
15600 SW 158 ST Suite #306
Homestead, Florida, FL 33033
United States of America
Email: hsantos@isdg.net
URI: http://www.isdg.net
Santos Expires January 27, 2007 [Page 6]
Internet-Draft DSAP July 2006
Full Copyright Statement
Copyright (C) The Internet Society (2006).
This document is subject to the rights, licenses and restrictions
contained in BCP 78, and except as set forth therein, the authors
retain all their rights.
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Intellectual Property
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Acknowledgment
Funding for the RFC Editor function is provided by the IETF
Administrative Support Activity (IASA).
Santos Expires January 27, 2007 [Page 7]