<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.31 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-chuang-mutual-tls-email-authentication-00" category="exp" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="TLS Email Authentication">Mutual TLS for Email Authentication</title>

    <author fullname="Weihaw Chuang">
      <organization>Google, Inc.</organization>
      <address>
        <email>weihaw@google.com</email>
      </address>
    </author>
    <author fullname="Allen Robinson">
      <organization>Google, Inc.</organization>
      <address>
        <email>arobins@google.com</email>
      </address>
    </author>
    <author fullname="Bruce Nan">
      <organization>Google, Inc.</organization>
      <address>
        <email>brucenan@google.com</email>
      </address>
    </author>

    <date year="2026" month="February" day="15"/>

    
    <workgroup>Independent Stream</workgroup>
    <keyword>Email</keyword> <keyword>TLS</keyword> <keyword>SPF</keyword> <keyword>ACME</keyword> <keyword>PKIX</keyword>

    <abstract>


<?line 40?>

<t>Valid client and server TLS certificates authenticate the traffic coming from the SMTP sending and receiving servers.  Domain owners can delegate email sending and receiving to servers using Mail eXchange (MX) DNS resource records.  This enables transitive authentication of mail traffic from sending and receiving domains of envelope sender much like Sender Policy Framework and the envelope recipient.   This document also proposes an Automatic Certificate Management Environment responder using these DNS records to automate TLS certificate issuance.</t>



    </abstract>



  </front>

  <middle>


<?line 44?>

<section anchor="introduction"><name>Introduction</name>

<t>Simple Mail Transfer Protocol (SMTP) <xref target="RFC5321"/> supports delivery of Internet email messages.  TLS encrypts and authenticates socket connections by building upon the X.509/PKIX <xref target="RFC5280"/> certificate trust system.  SMTP leverages TLS to encrypt and authenticate email transport.  The client and server TLS certificates identify the server name as a subject hostname and associate the traffic coming from SMTP sender and receiver servers via the private key used to establish the TLS connection. SMTP TLS end-entity certificates hold the subject name validated by a Certificate Authority (CA).  Evidence of this validation is by certificate issuance, typically from an intermediate CA that is itself issued from a root CA.  The SMTP TLS  transaction counterparty, be it the receiver or sender, can validate the issuance to a root CA that it trusts thereby is able to trust the content of the entity certificate. The counterparty can then trust that the TLS traffic is coming from the identified hostname of the sender or receiver.</t>

<t>Once the TLS authenticated sender or receiver is established, this document describes a process by which we can associate and verify the SMTP envelope sender and recipient.  This corresponds to the address given in the SMTP MAIL FROM and RCPT TO.  The association is done through Client and Server DNS Mail eXchange (MX) resource records corresponding to the sending and receiving SMTP server.  This document just further specifies the name of the SMTP <xref target="RFC5321"/> MX record to Server MX to distinguish from the Client MX specified in this document.  These MX records are published by the domain owner to indicate the delegated mail servers that handle message delivery on its behalf.  The Server MX is used to discover the receiving mail delivery server as described in <xref target="RFC5321"/>, and also specifies the permitted hostnames that may be present in the Server TLS certificates.  The Client MX specifies the permitted hostnames that may be present in the Client TLS certificates.  Publication of Client MX indicates adherence and consent to validation using the methods in this specification.  Verification of SMTP envelope MAIL FROM sender domain is analogous to the Sender Policy Framework (SPF) <xref target="RFC7208"/> sender but uses TLS instead of IP addresses.   Verification of client and server TLS certificates permits the mutual verification of both the sender and receiver which is analogous to the mTLS in other applications such as HTTP specified in <xref target="RFC8120"/>.</t>

<t>To encourage further adoption of SMTP TLS especially in light of recent server certificate policy changes, this also specifies extending an Automatic Certificate Management Environment (ACME) <xref target="RFC8555"/> validation responder using Server and Client MX.  This enables supporting delegation through the MX lookup where the ACME HTTP responder is present at the hostname.</t>

<section anchor="terminology-and-definitions"><name>Terminology and Definitions</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in <xref target="RFC2119"/>.</t>

</section>
<section anchor="client-and-server-validation"><name>Client and Server Validation</name>

<t>This document defines a procedure for validating the authenticity of traffic sent from and to the SMTP sender and recipient Mailbox domains using SMTP TLS.</t>

<section anchor="client-and-server-mx"><name>Client and Server MX</name>

<t>This document refers to MX DNS records defined in <xref target="RFC1035"/> to be Server MX records that help differentiate against the Client MX record specified in this document.  This document defines a Client MX record with a distinct resource record type as defined by IANA Resource Record TYPE registry.  The Client MX record has the same format as Server MX records as defined in Section 3.3.9 of <xref target="RFC1035"/>.</t>

<t>SMTP <xref target="RFC5321"/> defines mail delivery between a SMTP sender and recipient represented by their respective email addresses. The structure of an email address into local-part@domain where this domain is considered the Mailbox domain.  Section 5 defines the process of resolving the Mailbox domain into server hostname domain using the MX record mapping.  There may be multiple MX records found resulting in multiple hostnames when resolving the Mailbox domain.</t>

<t>Any domain accepting email delivery publishes one or more server MX records, however this does not indicate any sort of usage of SMTP TLS, or usage of TLS certificates issued by a public CA with valid hostname alignment.  Because of this, using TLS certificates for email authentication is risky.  Instead this document specifies an opt in process using publication of the Client MX record.  When a domain publishes one or more Client MX records, this indicates that the domain agrees to use the specification in this document to validate its servers' hostname identities.  Compliant SMTP servers MUST support TLS, and the SMTP TLS certificates must be issued from a valid public CA.  In addition the SMTP sending and receiving server hostnames MUST match the appropriate Server or Client MX hostnames as defined later.</t>

</section>
<section anchor="tls-certificate-validation"><name>TLS Certificate Validation</name>

<t>SMTP TLS socket sessions will exchange client and server TLS certificates corresponding to the sending and receiving servers.  The counter party receiving and sending server MUST validate the end-entity certificates using the path validation procedures in <xref target="RFC5280"/> Section 6.  The validator MAY check other certificate profile information such as public key algorithm and key size, signature algorithm and key size, Key Usage, Extended Key Usage, Policy, Certificate Transparency <xref target="RFC6962"/> and other information according to local-policy.  When the sender's server TLS certificate validation fails, it checks if the receiver has published Client MX records that indicate adherence to this protocol.  If found, it closes the SMTP TLS socket to prevent Man-In-The-Middle.  When the receiver's client TLS certificate validation fails, it checks if the sender has published Client MX records.  If so and according to local-policy, the receiver either MAY choose to report an authentication failure or MAY otherwise close the SMTP TLS socket with a SMTP error. A valid TLS certificate defines one or more server hostnames as either Subject Alternative Name extension dnsNames otherwise Subject Distinguished Name common names.</t>

</section>
<section anchor="hostname-validation"><name>Hostname Validation</name>

<t><xref target="RFC5321"/> defines the SMTP sender and recipient with the corresponding sender and recipient Mailbox domain. After TLS Certificate Validation, the validator resolves the SMTP Mailbox domain to a set of server hostnames and one of the server hostnames MUST exactly match one of the corresponding TLS certificate hostnames.  One of the receiver MX defined hostnames MUST exactly match one of server TLS certificate hostnames.   If it does not match, then the sender looks up the receiver Client MX certificate.  If found, it closes the SMTP TLS socket to prevent Man-In-The-Middle.  Similarly one sender MX defined hostnames MUST exactly match client TLS certificate hostnames.  If it does not match, then the receiver looks up the sender Client MX.  If so and according to local policy, the receiver MAY either choose to report an authentication failure or otherwise MAY close the SMTP TLS socket with a SMTP error.</t>

<t>TODO: discuss strict hostname alignment.</t>

</section>
<section anchor="validation-results"><name>Validation Results</name>

<t>Receivers check the result of client TLS certificate passes path validation and hostname matching.  If both pass, then the authentication result is a pass, otherwise it is a fail.   Because this validates the authenticity of the SMTP sender Mailx domain which is the same as the  MAIL FROM Mailbox domain, this MAY be used in the same way as SPF authentication.  This document modifies Domain-based Message Authentication, Reporting, and Conformance (DMARC) <xref target="RFC7489"/> to permit this result to be substituted for SPF.</t>

<t>Upon completion of a successful SMTP transaction, the receiver MAY report the result of the sender validation in Authentication-Result <xref target="RFC8601"/>.  The method name is "mtls".  The status results:</t>

<t><list style="symbols">
  <t>PASS: client TLS certificate passes path validation and hostname matching</t>
  <t>FAIL: fails either TLS certificate path validation or hostname matching</t>
</list></t>

</section>
</section>
<section anchor="acme-for-smtp-tls"><name>ACME for SMTP TLS</name>

<t>This document specifies extending ACME <xref target="RFC8555"/> validation responder using Server and Client MX.  The ACME client MAY request to the CA that it use SMTP Client or Server MX DNS record lookup for discovering the ACME HTTP verification responder at the location of the SMTP servers.  Publication of the MX record demonstrates the domain owners delegation to the SMTP servers.  As there are multiple possible MX records, this supports multiple servers.</t>

<t>This modifies ACME to support two new challenges corresponding to Client and Server MX.  They are identified by ACME challenge type "client-mx-http-01" and "server-mx-http-01".  The CA is given a domain and respectively uses Client or Server MX lookup.  The CA provides a path at which a set of validations identifiers will present.  The CA resolves the domain using <xref target="RFC5321"/> section 5 to hostnames and then iterates over the MX hostnames.  For hostname it looks up the identifier at the path specified using HTTP as specified in <xref target="RFC8555"/> section 8.3.  The rest of the interface and interaction between the ACME client and CA is the same as the HTTP challenge method.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>This proposes a new email authentication protocol that reduces some of the risk of the SPF by simplifying the delegation process to the well understood DNS MX lookup.  SPF uses a rich policy specification with features like the include mechanism, macros and policy qualifiers that have caused permitted spoofing vulnerabilities. The identification foundation of this protocol leverages the existing and very well understood TLS, and most senders and receivers have deployed SMTP TLS.  It also encourages adoption of PKIX/X.509 best practices linking SMTP TLS to email authentication.</t>

<t>This protocol puts further weight on the security of TLS for email communication and the email community SHOULD understand the changes and challenges there.  For example there is significant TLS/PKIX IETF work in Post Quantum Cryptography.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>NOTE: These values are just INFORMATIVE placeholders for discussion of this draft.  No such registrations have been done.</t>

<t>IANA maintains a registry of Resource Record (RR) TYPEs under the category of Domain Name System (DNS) Parameters. This document proposes a new Resource Record (RR) TYPEs called "client mail exchange" as value 265.  This proposes naming "mail exchange" value 15 to "server mail exchange".</t>

<t>This also proposes modifying the ACME Identifier Types registry to include two new types:</t>

<t><list style="symbols">
  <t>label: "server-mx-http-01"</t>
  <t>label: "client-mx-http-01"</t>
</list></t>

<t>This also proposes extending the Email Authentication Methods registration. This proposes a new method "mtls" along with a "pass" and "fail" result.</t>

</section>
</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC5321">
  <front>
    <title>Simple Mail Transfer Protocol</title>
    <author fullname="J. Klensin" initials="J." surname="Klensin"/>
    <date month="October" year="2008"/>
    <abstract>
      <t>This document is a specification of the basic protocol for Internet electronic mail transport. It consolidates, updates, and clarifies several previous documents, making all or parts of most of them obsolete. It covers the SMTP extension mechanisms and best practices for the contemporary Internet, but does not provide details about particular extensions. Although SMTP was designed as a mail transport and delivery protocol, this specification also contains information that is important to its use as a "mail submission" protocol for "split-UA" (User Agent) mail reading systems and mobile environments. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5321"/>
  <seriesInfo name="DOI" value="10.17487/RFC5321"/>
</reference>
<reference anchor="RFC5280">
  <front>
    <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
    <author fullname="D. Cooper" initials="D." surname="Cooper"/>
    <author fullname="S. Santesson" initials="S." surname="Santesson"/>
    <author fullname="S. Farrell" initials="S." surname="Farrell"/>
    <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
    <author fullname="R. Housley" initials="R." surname="Housley"/>
    <author fullname="W. Polk" initials="W." surname="Polk"/>
    <date month="May" year="2008"/>
    <abstract>
      <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5280"/>
  <seriesInfo name="DOI" value="10.17487/RFC5280"/>
</reference>
<reference anchor="RFC7208">
  <front>
    <title>Sender Policy Framework (SPF) for Authorizing Use of Domains in Email, Version 1</title>
    <author fullname="S. Kitterman" initials="S." surname="Kitterman"/>
    <date month="April" year="2014"/>
    <abstract>
      <t>Email on the Internet can be forged in a number of ways. In particular, existing protocols place no restriction on what a sending host can use as the "MAIL FROM" of a message or the domain given on the SMTP HELO/EHLO commands. This document describes version 1 of the Sender Policy Framework (SPF) protocol, whereby ADministrative Management Domains (ADMDs) can explicitly authorize the hosts that are allowed to use their domain names, and a receiving host can check such authorization.</t>
      <t>This document obsoletes RFC 4408.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7208"/>
  <seriesInfo name="DOI" value="10.17487/RFC7208"/>
</reference>
<reference anchor="RFC8555">
  <front>
    <title>Automatic Certificate Management Environment (ACME)</title>
    <author fullname="R. Barnes" initials="R." surname="Barnes"/>
    <author fullname="J. Hoffman-Andrews" initials="J." surname="Hoffman-Andrews"/>
    <author fullname="D. McCarney" initials="D." surname="McCarney"/>
    <author fullname="J. Kasten" initials="J." surname="Kasten"/>
    <date month="March" year="2019"/>
    <abstract>
      <t>Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names. Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate. As of this writing, this verification is done through a collection of ad hoc mechanisms. This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance. The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8555"/>
  <seriesInfo name="DOI" value="10.17487/RFC8555"/>
</reference>
<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC1035">
  <front>
    <title>Domain names - implementation and specification</title>
    <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
    <date month="November" year="1987"/>
    <abstract>
      <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="13"/>
  <seriesInfo name="RFC" value="1035"/>
  <seriesInfo name="DOI" value="10.17487/RFC1035"/>
</reference>
<reference anchor="RFC6962">
  <front>
    <title>Certificate Transparency</title>
    <author fullname="B. Laurie" initials="B." surname="Laurie"/>
    <author fullname="A. Langley" initials="A." surname="Langley"/>
    <author fullname="E. Kasper" initials="E." surname="Kasper"/>
    <date month="June" year="2013"/>
    <abstract>
      <t>This document describes an experimental protocol for publicly logging the existence of Transport Layer Security (TLS) certificates as they are issued or observed, in a manner that allows anyone to audit certificate authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
      <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6962"/>
  <seriesInfo name="DOI" value="10.17487/RFC6962"/>
</reference>
<reference anchor="RFC8601">
  <front>
    <title>Message Header Field for Indicating Message Authentication Status</title>
    <author fullname="M. Kucherawy" initials="M." surname="Kucherawy"/>
    <date month="May" year="2019"/>
    <abstract>
      <t>This document specifies a message header field called "Authentication-Results" for use with electronic mail messages to indicate the results of message authentication efforts. Any receiver-side software, such as mail filters or Mail User Agents (MUAs), can use this header field to relay that information in a convenient and meaningful way to users or to make sorting and filtering decisions.</t>
      <t>This document obsoletes RFC 7601.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8601"/>
  <seriesInfo name="DOI" value="10.17487/RFC8601"/>
</reference>



    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC8120">
  <front>
    <title>Mutual Authentication Protocol for HTTP</title>
    <author fullname="Y. Oiwa" initials="Y." surname="Oiwa"/>
    <author fullname="H. Watanabe" initials="H." surname="Watanabe"/>
    <author fullname="H. Takagi" initials="H." surname="Takagi"/>
    <author fullname="K. Maeda" initials="K." surname="Maeda"/>
    <author fullname="T. Hayashi" initials="T." surname="Hayashi"/>
    <author fullname="Y. Ioku" initials="Y." surname="Ioku"/>
    <date month="April" year="2017"/>
    <abstract>
      <t>This document specifies an authentication scheme for the Hypertext Transfer Protocol (HTTP) that is referred to as either the Mutual authentication scheme or the Mutual authentication protocol. This scheme provides true mutual authentication between an HTTP client and an HTTP server using password-based authentication. Unlike the Basic and Digest authentication schemes, the Mutual authentication scheme specified in this document assures the user that the server truly knows the user's encrypted password.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8120"/>
  <seriesInfo name="DOI" value="10.17487/RFC8120"/>
</reference>
<reference anchor="RFC7489">
  <front>
    <title>Domain-based Message Authentication, Reporting, and Conformance (DMARC)</title>
    <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy"/>
    <author fullname="E. Zwicky" initials="E." role="editor" surname="Zwicky"/>
    <date month="March" year="2015"/>
    <abstract>
      <t>Domain-based Message Authentication, Reporting, and Conformance (DMARC) is a scalable mechanism by which a mail-originating organization can express domain-level policies and preferences for message validation, disposition, and reporting, that a mail-receiving organization can use to improve mail handling.</t>
      <t>Originators of Internet Mail need to be able to associate reliable and authenticated domain identifiers with messages, communicate policies about messages that use those identifiers, and report about mail using those identifiers. These abilities have several benefits: Receivers can provide feedback to Domain Owners about the use of their domains; this feedback can provide valuable insight about the management of internal operations and the presence of external domain name abuse.</t>
      <t>DMARC does not produce or encourage elevated delivery privilege of authenticated email. DMARC is a mechanism for policy distribution that enables increasingly strict handling of messages that fail authentication checks, ranging from no action, through altered delivery, up to message rejection.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7489"/>
  <seriesInfo name="DOI" value="10.17487/RFC7489"/>
</reference>



    </references>

</references>


<?line 128?>

<section anchor="acknowledgments"><name>Acknowledgments</name>

<t>We thank Nicholas Lidzborkski for his advice.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

