<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 4.0.1) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-herr-dkim2-bcp-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="DKIM2 BCP">DKIM2 Best Practices</title>

    <author initials="T." surname="Herr" fullname="Todd Herr">
      <organization>GreenArrow Email</organization>
      <address>
        <email>todd@someguyinva.com</email>
      </address>
    </author>

    <date year="2026" month="February" day="11"/>

    
    
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 40?>

<t><xref target="DKIM2"></xref> and associated documents describe the DomainKeys Identified Mail v2 (DKIM2) email authentication protocol. 
DKIM2 is designed to address shortcomings in email authentication protocols and mechanisms released prior to DKIM2,
specifically SPF <xref target="RFC7208"></xref>, DKIM <xref target="RFC6376"></xref>, DMARC <xref target="RFC7489"></xref>, and ARC <xref target="RFC8617"></xref>. Those shortcomings most commonly
manifested themselves in email messages that passed through one or more intermediary hosts (e.g., forwarders or
mailing list servers) while transiting from origination to final destination. Although these messages were properly
authenticated when sent, the alteration of their path and/or content by the intermediary hosts would cause authentication
checks to fail at the final destination. In addition, DKIM was susceptible to "replay" of signatures, when attackers
would construct abusive messages in such a way that they would pass validation checks for a DKIM signature that had
been imported from another message entirely.</t>

<t>To address these shortcomings, DKIM2 provides methods not only for intermediary systems to provide details of the changes that
they make to a message in transit, but also for receiving hosts to validate those changes in addition to the original message.
DKIM2 also allows recipients to detect when messages have been unexpectedly "replayed" and can also ensure that delivery status
notifications (DSNs) are only sent to entities that were involved in the transmission of a message.</t>

<t>This document describes the recommended usage of the DKIM2 protocol for sending hosts, intermediary hosts, and receiving
hosts.</t>



    </abstract>



  </front>

  <middle>


<?line 60?>

<section anchor="introduction"><name>Introduction</name>

<t>DomainKeys Identified Mail v2 (DKIM2) permits a person, role, or
organization to document that they have handled an email message by
associating a domain name <xref target="RFC1034"></xref> with the message <xref target="RFC5322"></xref>. A
public key signature is used to record that they have been able
to read the contents of the message and write to it.</t>

<t>Verification of claims is achieved by fetching a public key stored
in the DNS under the relevant domain and then checking the signature.</t>

<t>Message transit from author to recipient is through
Forwarders that typically make no substantive change to the message
content and thus preserve the DKIM2 signature. Where they do make
a change the changes they have made are documented so that
these can be "undone" and the original signature validated.</t>

<t>When a message is forwarded from one system to another an
additional DKIM2 signature is added on each occasion. This chain
of custody assists validators in distinguishing between messages that
were intended to be sent to a particular email address and those
that are being "replayed" to that address.</t>

<t>The chain of custody can also be used to ensure that delivery status
notifications are only sent to entities that were involved in the
transmission of a message.</t>

<t>Organizations that process a message can add to their signature
a request for feedback as to any opinion (for example, that the
email was considered to be spam) that the eventual recipient of
the message wishes to share.</t>

<t>This document discusses best practices for signing, handling, and validating
messages that have a DKIM2 signature. These best practices are based in large
part on the many years of experience the email community has with the 
authentication protocols that DKIM2 is intended to replace.</t>

</section>
<section anchor="terminology-and-definitions"><name>Terminology and Definitions</name>

<t>This section defines terms used in the rest of the document.</t>

<t>DKIM2 is designed to operate within the Internet Mail service, as
defined in <xref target="RFC5598"></xref>.  Basic email terminology is taken from that
specification.</t>

<t>DKIM2 inherits many ideas from DKIM (<xref target="RFC6376"></xref>) which, for clarity
we refer to in this specification as DKIM1. In addition, some features
were influenced by experience from (see <xref target="CONCLUDEARC"></xref>) the experimental
ARC protocol (<xref target="RFC8617"></xref>).</t>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in
<xref target="RFC2119"></xref>.  These words take their normative meanings only when they
are presented in ALL UPPERCASE.</t>

<section anchor="signers"><name>Signers</name>

<t>Elements in the mail system that sign messages on behalf of a domain
are referred to as Signers.  These may be MUAs (Mail User Agents),
MSAs (Mail Submission Agents), MTAs (Mail Transfer Agents), or other
agents such as mailing list "exploders".  In general, any Signer will
be involved in the injection of a message into the message system in
some way.  The key point is that a message must be signed before it
leaves the administrative domain of the Signer.</t>

</section>
<section anchor="forwarder"><name>Forwarder</name>

<t><xref target="RFC5598"></xref> defines a Relay as transmitting or retransmitting a message
but states that it will not modify the envelope information or the
message content semantics. It also defines a Gateway as a hybrid of
User and Relay that connects heterogeneous mail services. In this
document we use the concept of a Forwarder which is an MTA that receives
a message and then, as an alternative to delivering it into a
destination mailbox, can forward it on to another system in an
automated, pre-determined, manner.</t>

</section>
<section anchor="reviser"><name>Reviser</name>

<t>As will be seen, a Forwarder may alter the message content or header
fields, in such a way that existing signatures on the message will
no longer validate. If so, then a record will be made of these
changes. We call a Forwarder that makes such changes a Reviser.</t>

</section>
<section anchor="verifiers"><name>Verifiers</name>

<t>Elements in the mail system that verify signatures are referred to as
Verifiers.  These may be Forwarders, Revisers, MTAs, Mail Delivery
Agents (MDAs), or MUAs.
It is an expectation of DKIM2 that a recipient of a message will
wish to verify some or all signatures before determining whether or
not to accept the message or pass it on to another entity.</t>

</section>
<section anchor="signing-domain"><name>Signing Domain</name>

<t>A domain name associated with a signature. This domain may be
associated with the author of an email, their organization, a
company hired to deliver the email, a mailing list operator, or
some other entity that handles email. What they have in common is
that at some point they had access to the entire contents of the
email and were in a position to add their signature to the email.</t>

</section>
<section anchor="selectors"><name>Selectors</name>

<t>To support multiple concurrent public keys per signing domain, the
key namespace is subdivided using "selectors".</t>

<t>The number of public keys and corresponding selectors for each domain
is determined by the domain owner. Many domain owners will use just one
selector, whereas administratively distributed organizations can choose
to manage disparate selectors and key pairs in different regions or on 
different email servers.</t>

<t>Selectors can also be used to delegate a signing authority, which
can be withdraw at any time. Selectors also make it possible to
seamlessly replace keys on a routine basis by signing with a new
selector, while keeping the key associated with the old selector
available.</t>

</section>
<section anchor="senders"><name>Senders</name>

<t><xref target="RFC5598"></xref> defines a path for messages that starts with hops from an Author
to an Originator to a Relay, before transiting additional hops on the way 
to their final destination. In this document, we will collectively refer 
to those first three hops (Author--&gt;Originator--&gt;Relay) as Sender.</t>

</section>
</section>
<section anchor="algorithms"><name>Signing and Verification Cryptographic Algorithms</name>

<t>DKIM2 supports multiple hashing and digital signature algorithms. One
hash function (SHA256) if specified here and two signing algorithms
are defined by the DKIM2 protocol: RSA-SHA256 and Ed25519-SHA256.
Signers and Verifiers <strong>MUST</strong> implement SHA256. Signers <strong>SHOULD</strong> implement
both RSA-SHA256 and Ed25519-SHA256. Verifiers <strong>MUST</strong> implement both
RSA-SHA256 and Ed25519-SHA256.</t>

<section anchor="the-sha256-hashing-algorithm"><name>The SHA256 Hashing Algorithm</name>

<t>The SHA256 hashing algorithm is used to compute body and
header hashes as defined in <xref target="DKIM2"></xref> and
<xref target="DKIM2"></xref> The resultant
values are stored within Message-Instance header fields.</t>

</section>
<section anchor="the-rsa-sha256-signing-algorithm"><name>The RSA-SHA256 Signing Algorithm</name>

<t>The RSA-SHA256 Signing Algorithm computes a hash over all the Message-Instance
and DKIM2-Signature header fields as described in <xref target="DKIM2"></xref> using
SHA-256 (FIPS-180-4-2015) as the hash-alg.  That
hash is then signed by the Signer using the RSA algorithm (defined in
PKCS#1 version 1.5 <xref target="RFC8017"></xref>) as the crypt-alg and the Signer's
private key.  The hash <strong>MUST NOT</strong> be truncated or converted into any
form other than the native binary form before being signed.  The
signing algorithm <strong>MUST</strong> use a public exponent of 65537.</t>

<t>Signers <strong>MUST</strong> use RSA keys of at least 1024 bits.  Verifiers <strong>MUST</strong> be able
to validate signatures with keys ranging from 1024 bits to 2048 bits, and
they <strong>MAY</strong> be able to validate signatures with larger keys.</t>

</section>
<section anchor="the-ed25519-sha256-signing-algorithm"><name>The Ed25519-SHA256 Signing Algorithm</name>

<t>The Ed25519-SHA256 Signing Algorithm computes a hash over all the Message-Instance
and DKIM2-Signature fields as described in <xref target="DKIM2"></xref> using
SHA-256 (FIPS-180-4-2015) as the hash-alg. It signs the hash with the PureEdDSA
variant Ed25519, as defined in Section 5.1 of <xref target="RFC8032"></xref>.</t>

</section>
<section anchor="other-algorithms"><name>Other Algorithms</name>

<t>Other algorithms <strong>MAY</strong> be defined in the future.  Verifiers <strong>MUST</strong> ignore
any hashes or signatures using algorithms that they do not implement.</t>

</section>
<section anchor="key_management"><name>Key Management</name>

<t>Some level of assurance is required that
a public key is associated with the claimed Signer. DKIM2
does this by fetching the key from the DNS for the domain specified
in the d= field.</t>

<t>DKIM2 keys are stored in a subdomain named "_domainkey".  Given a
DKIM2-Signature field with a "d=" tag of "example.com" and an "s1=" tag
of "foo.bar", the DNS query will be for "foo.bar._domainkey.example.com".</t>

<t>NOTE: these keys are no different, and are stored in the same locations
as those for DKIM1 (<xref target="RFC6376"></xref>).</t>

<t>Further details can be found in <xref target="DKIMKEYS"></xref>.</t>

</section>
</section>
<section anchor="sender-actions"><name>Sender Actions</name>

<t>In order to participate in DKIM2, Senders <em>*MUST</em> be Signers. The following sections 
describe best practices for such Senders.</t>

<section anchor="sign-all-outgoing-messages-with-dkim2-and-dkim1-signatures"><name>Sign all outgoing messages with DKIM2 and DKIM1 signatures.</name>

<t>Because it is expected that the transition from DKIM1 to DKIM2 across the email ecosystem will be gradual, Senders
<strong>SHOULD</strong> sign messages with both DKIM1 and DKIM2 keys until such time as the deployment of DKIM2 is effectively 
ubiquitous.</t>

</section>
<section anchor="sign-with-multiple-keys"><name>Sign with multiple keys</name>

<t>To ensure maximum interoperability, Senders <strong>SHOULD</strong> sign messages with multiple DKIM2 signatures, with each 
such signature using a different cryptographic algorithm.</t>

</section>
<section anchor="only-sign-on-exit"><name>Only Sign On Exit</name>

<t>Many Senders originate messages from infrastructure that requires the message transit multiple hops before reaching
its egress point to travel to its destination. Senders <strong>MUST</strong> only apply DKIM2 signatures to messsages only at this
last hop before it leaves their infrastructure.</t>

</section>
<section anchor="regularly-rotate-dkim-signing-keys"><name>Regularly Rotate DKIM Signing Keys</name>

<t>Senders <strong>SHOULD</strong> follow best practices for rotating DKIM keys, both for DKIM1 and DKIM2 - 
https://www.m3aawg.org/sites/default/files/m3aawg-dkim-key-rotation-bp-2019-03.pdf</t>

</section>
</section>
<section anchor="forwarder-actions"><name>Forwarder Actions</name>

<t>A Forwarder participating in DKIM2 <strong>MUST</strong> be a Signer. Further, as mentioned above, a Forwarder might also 
function as a Reviser and/or a Verifier before passing a message along to the next hop. This section describes 
the best practices for a Forwarder participating in DKIM2.</t>

<section anchor="attempt-verification-of-existing-dkim-signatures"><name>Attempt Verification of Existing DKIM Signatures</name>

<t>A Forwarder <strong>MUST</strong> attempt to Verify the DKIM signatures found in a message when it first arrives to the Forwarder.</t>

</section>
<section anchor="sign-all-outgoing-messages-with-dkim2-and-dkim1-signatures-1"><name>Sign all outgoing messages with DKIM2 and DKIM1 signatures.</name>

<t>Forwarders participating in DKIM2 <strong>MUST</strong> be Signers, In addition, for the reason mentioned above in the Sender Actions 
section of this document, Forwarders <strong>SHOULD</strong> sign messages with both DKIM1 and DKIM2 keys until such time as the 
deployment of DKIM2 is effectively ubiquitous.</t>

</section>
<section anchor="sign-even-if-just-forwarding-and-not-revising"><name>Sign Even If Just Forwarding and Not Revising</name>

<t>Forwarders participating in DKIM2 <strong>MUST</strong> DKIM2 sign any message they handle, regardless of whether or not they 
Revise the message.  Such signatures maintain a proper DKIM2 "chain of custody" and allow for cleaner verification 
and unwinding of changes at future hops.</t>

</section>
<section anchor="sign-with-multiple-keys-1"><name>Sign with multiple keys</name>

<t>To ensure maximum interoperability, Forwarders <strong>SHOULD</strong> sign messages with multiple DKIM2 signatures, with each 
such signature using a different cryptographic algorithm.</t>

</section>
<section anchor="only-sign-on-exit-1"><name>Only Sign On Exit</name>

<t>As with Senders, if the Fowarder's infrastructure requires the message to transit multiple hops before reaching
its egress point to travel to its destination, then the Forwarder <strong>MUST</strong> only apply DKIM2 signatures to messsages
only at this last hop before it leaves their infrastructure.</t>

</section>
<section anchor="regularly-rotate-dkim-signing-keys-1"><name>Regularly Rotate DKIM Signing Keys</name>

<t>Forwarders <strong>SHOULD</strong> follow best practices for rotating DKIM keys, both for DKIM1 and DKIM2 - 
https://www.m3aawg.org/sites/default/files/m3aawg-dkim-key-rotation-bp-2019-03.pdf</t>

</section>
<section anchor="continue-doing-from-munging"><name>Continue doing From munging</name>

<t>When a message reaches a Forwarder, if the Forwarder determines that the Domain Owner of the RFC5322.From header 
domain has published a DMARC record for that domain, the Fowarder <strong>SHOULD</strong> alter the RFC5322.From header in 
such a way as to ensure that the message will not fail DMARC validation when it reaches its destination. Some 
strategies for doing this are discussed in Section 7.4 of <xref target="DMARCbis"></xref></t>

</section>
<section anchor="brons-idea-privacy-preseving-forwarder-remove-mention-of-forward-target-from-bounces"><name>Bron's idea - Privacy preseving forwarder - remove mention of forward target from bounces</name>

<t>Need some text for this...</t>

</section>
</section>
<section anchor="receiving-host-actions"><name>Receiving Host Actions</name>

<t>Receiving Hosts in the DKIM2 ecosystem are those that host mailboxes for the domain to which the message
is ultimately routed. Receiving Hosts are Verifiers, and depending on local policy, the disposition of the
message may be influenced by whether or not the message passes DKIM2 verification checks.</t>

<t>Verification of messages will rely in part on whether or not a full DKIM2 "chain of custody" exists for
the message, meaning whether or not the Verifier can reliably determine if each hop that handled the message
prior to its reaching the Receiving Host applied a proper DKIM2 signature to the message. We will define
three conditions, as follows:</t>

<t><list style="symbols">
  <t>A message that was DKIM2 signed by each host handling the message prior to its reaching the Receiving Host
is one that "Never Left The DKIM2 Ecosystem"</t>
  <t>A message that was DKIM2 signed by some, but not all, hosts handling the message prior to its reaching the
Receiving Host is one that was "In and Out of The DKIM2 Ecosystem"</t>
  <t>A message that contains no DKIM2 signatures when reaching the Receiving Host is one that "Never Entered The
DKIM2 Ecosystem"</t>
</list></t>

<t>Each condition will come with its own set of recommendations for the Receiving Host.</t>

<section anchor="messages-that-never-left-the-dkim2-ecosystem"><name>Messages That Never Left The DKIM2 Ecosystem</name>

<t>If such a message passes DKIM2 Verification performed by the Receiving Host, the Receiving Host should apply 
local policy for determining message handling and disposition.</t>

<t>If such a message fails DKIM2 Verification performed by the Receiving Host, the Receiving Host <strong>MAY</strong> safely 
reject the message under assumption that the DSN(s) will only be sent to entities responsible for transmission 
of the message. The Receiving Host's local policy, however, will dictate final handling and disposition.</t>

</section>
<section anchor="messages-that-were-in-and-out-of-the-dkim2-ecosystem"><name>Messages That Were In and Out of the DKIM2 Ecosystem</name>

<t>Examples of messages that match this condition would be:</t>

<t><list style="symbols">
  <t>The message was DKIM2 signed by the Sender, and passed through one or more Forwarders on its way to the 
Receiver, and at least one Forwarder did not DKIM2 sign the message.</t>
  <t>The message was not DKIM2 signed by the Sender, and passed through one or more Forwarders on its way to 
the Receiver, and at least one Forwarder did DKIM sign the message.</t>
</list></t>

<t>Need text on how to detect that message left DKIM2 Ecosystem?</t>

<t>For such messages, local policy will dictate handling. Receivers will have to decide whether or not a 
successful DKIM2 Verification is a condition of message acceptance or whether or not a failed Verification
might not preclude acceptance but might influence message disposition. As DKIM2 deployment widens and 
protocol usage matures, Receivers might alter their local policies to be more reliant on DKIM2 Verification.</t>

</section>
<section anchor="messages-never-entered-the-dkim2-ecosystem"><name>Messages Never Entered The DKIM2 Ecosystem</name>

<t>Receivers participating in DKIM2 will have to establish local policy to dictate what to do with messages
that arrive bearing no DKIM2 signatures. This policy may change over time, as Receivers observe what percentage
of mail arrives each day bearing DKIM2 signatures vice the percentage that arrives without, and how their 
mailbox holders engage with each kind.</t>

</section>
<section anchor="dkim1-and-dkim2-interoperability"><name>DKIM1 and DKIM2 Interoperability</name>

<t>(From Wei)</t>

<t>When DKIM2 is first deployed, there will be a mix of DKIM-only (RFC6376) and DKIM2-capable participants and there will be significant interaction between these two groups.  To maximize compatibility with the DKIM receivers, many DKIM2-capable participants will sign and verify DKIM in addition to DKIM2.  At origination, DKIM2-capable sender should sign with DKIM and DKIM2 as some receivers may only support DKIM, and others both DKIM and DKIM2.  DKIM2-capable receivers should verify both DKIM and DKIM2 signatures when found, but that said, should not treat results equivalently.  When forwarding, DKIM2-capable sender should perform DKIM2 signing only when the DKIM2 security properties to protect against replay and backscatter are met.  This property is met when any prior DKIM2 signatures are be valid per draft-clayton-dkim2-spec.</t>

<t>DKIM does not provide the same anti-replay and backscatter protections that DKIM2 can.  Consequently DKIM2-capable participant should not DKIM2 sign a forwarded message with the same consideration if there is only DKIM signatures available.  Under certain circumstances a DKIM2-capable forwarder may choose to DKIM2 sign a message with a prior DKIM signature if it can be certain that the message was not replayed or introduce backscatter using local-policy.   Some properties to consider are looking for the same anti-replay and backscatter properties described in draft-clayton-dkim2-spec except signed with the DKIM signature.  Typically this only is only apparent for DKIM signed messages at origination, meaning when the payload From header is DMARC aligned with the DKIM signed domain and the signature is valid.  Forwarders may wish to consider other validations under local-policy as well.</t>

</section>
<section anchor="notes"><name>Notes</name>

<t>Pull stuff from RFC 6376</t>

<t>Keys are same, but some features in keys in DKIM1 will be deprecated; unknown fields will be ignored, as with DKIM1</t>

<t>DKIM2 and DMARC</t>

<t>Discuss implications of requesting feedback</t>

</section>
</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC1034">
  <front>
    <title>Domain names - concepts and facilities</title>
    <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
    <date month="November" year="1987"/>
    <abstract>
      <t>This RFC is the revised basic definition of The Domain Name System. It obsoletes RFC-882. This memo describes the domain style names and their used for host address look up and electronic mail forwarding. It discusses the clients and servers in the domain name system and the protocol used between them.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="13"/>
  <seriesInfo name="RFC" value="1034"/>
  <seriesInfo name="DOI" value="10.17487/RFC1034"/>
</reference>
<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC5322">
  <front>
    <title>Internet Message Format</title>
    <author fullname="P. Resnick" initials="P." role="editor" surname="Resnick"/>
    <date month="October" year="2008"/>
    <abstract>
      <t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of "electronic mail" messages. This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, "Standard for the Format of ARPA Internet Text Messages", updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5322"/>
  <seriesInfo name="DOI" value="10.17487/RFC5322"/>
</reference>
<reference anchor="RFC6376">
  <front>
    <title>DomainKeys Identified Mail (DKIM) Signatures</title>
    <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker"/>
    <author fullname="T. Hansen" initials="T." role="editor" surname="Hansen"/>
    <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy"/>
    <date month="September" year="2011"/>
    <abstract>
      <t>DomainKeys Identified Mail (DKIM) permits a person, role, or organization that owns the signing domain to claim some responsibility for a message by associating the domain with the message. This can be an author's organization, an operational relay, or one of their agents. DKIM separates the question of the identity of the Signer of the message from the purported author of the message. Assertion of responsibility is validated through a cryptographic signature and by querying the Signer's domain directly to retrieve the appropriate public key. Message transit from author to recipient is through relays that typically make no substantive change to the message content and thus preserve the DKIM signature.</t>
      <t>This memo obsoletes RFC 4871 and RFC 5672. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="76"/>
  <seriesInfo name="RFC" value="6376"/>
  <seriesInfo name="DOI" value="10.17487/RFC6376"/>
</reference>
<reference anchor="RFC7208">
  <front>
    <title>Sender Policy Framework (SPF) for Authorizing Use of Domains in Email, Version 1</title>
    <author fullname="S. Kitterman" initials="S." surname="Kitterman"/>
    <date month="April" year="2014"/>
    <abstract>
      <t>Email on the Internet can be forged in a number of ways. In particular, existing protocols place no restriction on what a sending host can use as the "MAIL FROM" of a message or the domain given on the SMTP HELO/EHLO commands. This document describes version 1 of the Sender Policy Framework (SPF) protocol, whereby ADministrative Management Domains (ADMDs) can explicitly authorize the hosts that are allowed to use their domain names, and a receiving host can check such authorization.</t>
      <t>This document obsoletes RFC 4408.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7208"/>
  <seriesInfo name="DOI" value="10.17487/RFC7208"/>
</reference>
<reference anchor="RFC7489">
  <front>
    <title>Domain-based Message Authentication, Reporting, and Conformance (DMARC)</title>
    <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy"/>
    <author fullname="E. Zwicky" initials="E." role="editor" surname="Zwicky"/>
    <date month="March" year="2015"/>
    <abstract>
      <t>Domain-based Message Authentication, Reporting, and Conformance (DMARC) is a scalable mechanism by which a mail-originating organization can express domain-level policies and preferences for message validation, disposition, and reporting, that a mail-receiving organization can use to improve mail handling.</t>
      <t>Originators of Internet Mail need to be able to associate reliable and authenticated domain identifiers with messages, communicate policies about messages that use those identifiers, and report about mail using those identifiers. These abilities have several benefits: Receivers can provide feedback to Domain Owners about the use of their domains; this feedback can provide valuable insight about the management of internal operations and the presence of external domain name abuse.</t>
      <t>DMARC does not produce or encourage elevated delivery privilege of authenticated email. DMARC is a mechanism for policy distribution that enables increasingly strict handling of messages that fail authentication checks, ranging from no action, through altered delivery, up to message rejection.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7489"/>
  <seriesInfo name="DOI" value="10.17487/RFC7489"/>
</reference>

<reference anchor="DMARCbis">
   <front>
      <title>Domain-based Message Authentication, Reporting, and Conformance (DMARC)</title>
      <author fullname="Todd Herr" initials="T." surname="Herr">
         <organization>Valimail</organization>
      </author>
      <author fullname="John R. Levine" initials="J. R." surname="Levine">
         <organization>Standcore LLC</organization>
      </author>
      <date day="4" month="April" year="2025"/>
      <abstract>
	 <t>   This document describes the Domain-based Message Authentication,
   Reporting, and Conformance (DMARC) protocol.

   DMARC permits the owner of an email&#x27;s Author Domain to enable
   validation of the domain&#x27;s use, to indicate the Domain Owner&#x27;s or
   Public Suffix Operator&#x27;s message handling preference regarding failed
   validation, and to request reports about the use of the domain name.
   Mail receiving organizations can use this information when evaluating
   handling choices for incoming mail.

   This document obsoletes RFCs 7489 and 9091.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-dmarc-dmarcbis-41"/>
   
</reference>

<reference anchor="DKIM2">
   <front>
      <title>DomainKeys Identified Mail Signatures v2 (DKIM2)</title>
      <author fullname="Richard Clayton" initials="R." surname="Clayton">
         <organization>Yahoo</organization>
      </author>
      <author fullname="Wei Chuang" initials="W." surname="Chuang">
         <organization>Google</organization>
      </author>
      <author fullname="Bron Gondwana" initials="B." surname="Gondwana">
         <organization>Fastmail Pty Ltd</organization>
      </author>
      <date day="20" month="January" year="2026"/>
      <abstract>
	 <t>   DomainKeys Identified Mail v2 (DKIM2) permits a person, role, or
   organization that owns a signing domain to document that it has
   handled an email message by associating their domain with the
   message.  This is achieved by providing a hash value that has been
   calculated on the current contents of the message and then applying a
   cryptographic signature that covers the hash values and other details
   about the transmission of the message.  Verification is performed by
   querying an entry within the signing domain&#x27;s DNS space to retrieve
   an appropriate public key.  As a message is transferred from author
   to recipient systems that alter the body or header fields will
   provide details of their changes and calculate new hash values.
   Further signatures will be added to provide a validatable &quot;chain&quot;.
   This permits validators to identify the nature of changes made by
   intermediaries and apply a reputation to the systems that made
   changed.  DKIM2 also allows recipients to detect when messages have
   been unexpectedly &quot;replayed&quot; and will ensure that Delivery Status
   Notifications are only sent to entities that were involved in the
   transmission of a message.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-clayton-dkim2-spec-06"/>
   
</reference>

<reference anchor="DKIMKEYS">
   <front>
      <title>Domain Name Specification for DKIM2</title>
      <author fullname="Wei Chuang" initials="W." surname="Chuang">
         <organization>Google</organization>
      </author>
      <date day="20" month="October" year="2025"/>
      <abstract>
	 <t>   The updated DomainKeys Identified Mail (DKIM2) permits an
   organization that owns the signing domain to claim some
   responsibility for a message by associating the domain with the
   message through a digital signature.  This is done by publishing to
   Domain Name Service (DNS) of the domain a public key that is then
   associated to the domain and where messages can be signed by the
   corresponding private key.  Assertion of responsibility is validated
   through a cryptographic signature and by querying the Signer’s domain
   directly to retrieve the appropriate public key.  This document
   describes DKIM2 DNS record format and how to find the record.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-chuang-dkim2-dns-03"/>
   
</reference>



    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC5598">
  <front>
    <title>Internet Mail Architecture</title>
    <author fullname="D. Crocker" initials="D." surname="Crocker"/>
    <date month="July" year="2009"/>
    <abstract>
      <t>Over its thirty-five-year history, Internet Mail has changed significantly in scale and complexity, as it has become a global infrastructure service. These changes have been evolutionary, rather than revolutionary, reflecting a strong desire to preserve both its installed base and its usefulness. To collaborate productively on this large and complex system, all participants need to work from a common view of it and use a common language to describe its components and the interactions among them. But the many differences in perspective currently make it difficult to know exactly what another participant means. To serve as the necessary common frame of reference, this document describes the enhanced Internet Mail architecture, reflecting the current service. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5598"/>
  <seriesInfo name="DOI" value="10.17487/RFC5598"/>
</reference>
<reference anchor="RFC8017">
  <front>
    <title>PKCS #1: RSA Cryptography Specifications Version 2.2</title>
    <author fullname="K. Moriarty" initials="K." role="editor" surname="Moriarty"/>
    <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
    <author fullname="J. Jonsson" initials="J." surname="Jonsson"/>
    <author fullname="A. Rusch" initials="A." surname="Rusch"/>
    <date month="November" year="2016"/>
    <abstract>
      <t>This document provides recommendations for the implementation of public-key cryptography based on the RSA algorithm, covering cryptographic primitives, encryption schemes, signature schemes with appendix, and ASN.1 syntax for representing keys and for identifying the schemes.</t>
      <t>This document represents a republication of PKCS #1 v2.2 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series. By publishing this RFC, change control is transferred to the IETF.</t>
      <t>This document also obsoletes RFC 3447.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8017"/>
  <seriesInfo name="DOI" value="10.17487/RFC8017"/>
</reference>
<reference anchor="RFC8032">
  <front>
    <title>Edwards-Curve Digital Signature Algorithm (EdDSA)</title>
    <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
    <author fullname="I. Liusvaara" initials="I." surname="Liusvaara"/>
    <date month="January" year="2017"/>
    <abstract>
      <t>This document describes elliptic curve signature scheme Edwards-curve Digital Signature Algorithm (EdDSA). The algorithm is instantiated with recommended parameters for the edwards25519 and edwards448 curves. An example implementation and test vectors are provided.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8032"/>
  <seriesInfo name="DOI" value="10.17487/RFC8032"/>
</reference>
<reference anchor="RFC8617">
  <front>
    <title>The Authenticated Received Chain (ARC) Protocol</title>
    <author fullname="K. Andersen" initials="K." surname="Andersen"/>
    <author fullname="B. Long" initials="B." role="editor" surname="Long"/>
    <author fullname="S. Blank" initials="S." role="editor" surname="Blank"/>
    <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy"/>
    <date month="July" year="2019"/>
    <abstract>
      <t>The Authenticated Received Chain (ARC) protocol provides an authenticated "chain of custody" for a message, allowing each entity that handles the message to see what entities handled it before and what the message's authentication assessment was at each step in the handling.</t>
      <t>ARC allows Internet Mail Handlers to attach assertions of message authentication assessment to individual messages. As messages traverse ARC-enabled Internet Mail Handlers, additional ARC assertions can be attached to messages to form ordered sets of ARC assertions that represent the authentication assessment at each step of the message-handling paths.</t>
      <t>ARC-enabled Internet Mail Handlers can process sets of ARC assertions to inform message disposition decisions, identify Internet Mail Handlers that might break existing authentication mechanisms, and convey original authentication assessments across trust boundaries.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8617"/>
  <seriesInfo name="DOI" value="10.17487/RFC8617"/>
</reference>

<reference anchor="CONCLUDEARC">
   <front>
      <title>Concluding the ARC Experiment</title>
      <author fullname="J. Trent Adams" initials="J. T." surname="Adams">
         <organization>Proofpoint</organization>
      </author>
      <author fullname="John R. Levine" initials="J. R." surname="Levine">
         <organization>Taughannock Networks</organization>
      </author>
      <date day="4" month="December" year="2025"/>
      <abstract>
	 <t>   This document calls for a conclusion to the experiment defined by
   “The Authenticated Received Chain (ARC) Protocol,” (RFC8617) and
   recommends that ARC no longer be deployed or relied upon between
   disparate senders and receivers.  The document summarizes what ARC
   set out to do, reports on operational experience, and explains how
   the experience gained during the experiment is being incorporated
   into the proposed DKIM2 work as the successor to DomainKeys
   Identified Mail (DKIM).  To avoid any future confusion, it is
   therefore requested that ARC (RFC8617) be marked “Obsolete” by the
   publication of this Internet-Draft.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-adams-arc-experiment-conclusion-01"/>
   
</reference>



    </references>

</references>


<?line 395?>

<section anchor="changes-from-earlier-versions"><name>Changes from Earlier Versions</name>

<t>[[This section to be removed by RFC Editor]]</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

