1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837
|
<pre>Network Working Group M. Thomas
Request for Comments: 5016 Cisco Systems
Category: Informational October 2007
<span class="h1">Requirements for a</span>
<span class="h1">DomainKeys Identified Mail (DKIM) Signing Practices Protocol</span>
Status of This Memo
This memo provides information for the Internet community. It does
not specify an Internet standard of any kind. Distribution of this
memo is unlimited.
Abstract
DomainKeys Identified Mail (DKIM) provides a cryptographic mechanism
for domains to assert responsibility for the messages they handle. A
related mechanism will allow an administrator to publish various
statements about their DKIM signing practices. This document defines
requirements for this mechanism, distinguishing between those that
must be satisfied (MUST), and those that are highly desirable
(SHOULD).
<span class="grey">Thomas Informational [Page 1]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-2" ></span>
<span class="grey"><a href="./rfc5016">RFC 5016</a> DKIM-SSP-REQ October 2007</span>
Table of Contents
<a href="#section-1">1</a>. Introduction ....................................................<a href="#page-2">2</a>
<a href="#section-2">2</a>. Definitions and Requirements Language ...........................<a href="#page-3">3</a>
<a href="#section-3">3</a>. SSP Problem Scenarios ...........................................<a href="#page-4">4</a>
<a href="#section-3.1">3.1</a>. Problem Scenario 1: Is All Mail Signed with DKIM? ..........<a href="#page-4">4</a>
<a href="#section-3.2">3.2</a>. Problem Scenario 2: Illegitimate Domain Name Use ...........<a href="#page-5">5</a>
<a href="#section-4">4</a>. SSP Deployment Considerations ...................................<a href="#page-6">6</a>
<a href="#section-4.1">4.1</a>. Deployment Consideration 1: Outsourced Signing .............<a href="#page-6">6</a>
<a href="#section-4.2">4.2</a>. Deployment Consideration 2: Subdomain Coverage .............<a href="#page-6">6</a>
<a href="#section-4.3">4.3</a>. Deployment Consideration 3: Resent Original Mail ...........<a href="#page-7">7</a>
4.4. Deployment Consideration 4: Incremental Deployment
of Signing .................................................<a href="#page-7">7</a>
<a href="#section-4.5">4.5</a>. Deployment Consideration 5: Performance and Caching ........<a href="#page-8">8</a>
<a href="#section-4.6">4.6</a>. Deployment Consideration 6: Human Legibility of Practices ..8
<a href="#section-4.7">4.7</a>. Deployment Consideration 7: Extensibility ..................<a href="#page-8">8</a>
<a href="#section-4.8">4.8</a>. Deployment Consideration 8: Security .......................<a href="#page-8">8</a>
<a href="#section-5">5</a>. Requirements ....................................................<a href="#page-9">9</a>
<a href="#section-5.1">5.1</a>. Discovery Requirements .....................................<a href="#page-9">9</a>
<a href="#section-5.2">5.2</a>. SSP Transport Requirements ................................<a href="#page-10">10</a>
<a href="#section-5.3">5.3</a>. Practice and Expectation Requirements .....................<a href="#page-10">10</a>
<a href="#section-5.4">5.4</a>. Extensibility and Forward Compatibility Requirements ......<a href="#page-13">13</a>
<a href="#section-6">6</a>. Requirements for SSP Security ..................................<a href="#page-13">13</a>
<a href="#section-7">7</a>. Security Considerations ........................................<a href="#page-13">13</a>
<a href="#section-8">8</a>. Acknowledgments ................................................<a href="#page-13">13</a>
<a href="#section-9">9</a>. References .....................................................<a href="#page-14">14</a>
<a href="#section-9.1">9.1</a>. Normative References ......................................<a href="#page-14">14</a>
<span class="h2"><a class="selflink" id="section-1" href="#section-1">1</a>. Introduction</span>
DomainKeys Identified Mail [<a href="./rfc4871" title=""DomainKeys Identified Mail (DKIM) Signatures"">RFC4871</a>] defines a message level signing
and verification mechanism for email. While a DKIM signed message
speaks for itself, there is ambiguity if a message doesn't have a
valid first party signature (i.e., on behalf of the [<a href="./rfc2822" title=""Internet Message Format"">RFC2822</a>].From
address): is this to be expected or not? For email, this is an
especially difficult problem since there is no expectation of a
priori knowledge of a sending domain's practices. This ambiguity can
be used to mount a bid down attack that is inherent with systems like
email that allow optional authentication: if a receiver doesn't know
otherwise, it should not assume that the lack of a valid signature is
exceptional without other information. Thus, an attacker can take
advantage of the ambiguity and simply not sign messages. If a
protocol could be developed for a domain to publish its DKIM signing
practices, a message verifier could take that into account when it
receives an unsigned piece of email.
<span class="grey">Thomas Informational [Page 2]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-3" ></span>
<span class="grey"><a href="./rfc5016">RFC 5016</a> DKIM-SSP-REQ October 2007</span>
This document defines the requirements for a mechanism that permits
the publication of Sender Signing Practices (SSP). The document is
organized into two main sections: first, a Problem and Deployment
Scenario section that describes the problems that SSP is intended to
address as well as the deployment issues surrounding the base
problems, and the second section is the Requirements that arise
because of those scenarios.
<span class="h2"><a class="selflink" id="section-2" href="#section-2">2</a>. Definitions and Requirements Language</span>
o Domain Holder: the entity that controls the contents of the DNS
subtree starting at the domain, either directly or by delegation
via NS records it controls.
o First Party Address: for DKIM, a first party address is defined to
be the [<a href="./rfc2822" title=""Internet Message Format"">RFC2822</a>].From address in the message header; a first party
address is also known as an Author address.
o First Party Signature: a first party signature is a valid
signature where the signing identity (the d= tag or the more
specific identity i= tag) matches the first party address.
"Matches" in this context is defined in [<a href="./rfc4871" title=""DomainKeys Identified Mail (DKIM) Signatures"">RFC4871</a>].
o Third Party Signature: a third party signature is a valid
signature that does not qualify as a first party signature. Note
that a DKIM third party signature is not required to correspond to
a header field address such as the contents of Sender or List-Id,
etc.
o Practice: a statement according to the [<a href="./rfc2822" title=""Internet Message Format"">RFC2822</a>].From domain
holder of externally verifiable behavior in the email messages it
sends.
o Expectation: an expectation combines with a practice to convey
what the domain holder considers the likely survivability of the
practice for a receiver, in particular receivers that may be more
than one SMTP hop away.
o DKIM Signing Complete: a practice where the domain holder asserts
that all legitimate mail will be sent with a valid first party
signature.
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in <a href="./rfc2119">RFC 2119</a> [<a href="./rfc2119" title=""Key words for use in RFCs to Indicate Requirement Levels"">RFC2119</a>].
<span class="grey">Thomas Informational [Page 3]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-4" ></span>
<span class="grey"><a href="./rfc5016">RFC 5016</a> DKIM-SSP-REQ October 2007</span>
<span class="h2"><a class="selflink" id="section-3" href="#section-3">3</a>. SSP Problem Scenarios</span>
The email world is a diverse place with many deployment
considerations. This section outlines expected usage scenarios where
DKIM signing/verifying will take place, and how a new protocol might
help to clarify the relevance of DKIM-signed mail.
<span class="h3"><a class="selflink" id="section-3.1" href="#section-3.1">3.1</a>. Problem Scenario 1: Is All Mail Signed with DKIM?</span>
After auditing their outgoing mail and deploying DKIM signing for all
of their legitimate outgoing mail, a domain could be said to be DKIM
signing complete. That is, the domain has, to the best of its
ability, ensured that all legitimate mail purporting to have come
from that domain contains a valid DKIM signature.
A receiver in the general case doesn't know what the practices are
for a given domain. Thus, the receiver is at a disadvantage in not
knowing whether or not it should expect all mail to be signed from a
given domain. This knowledge gap leads to a trivially exploitable
bid-down attack where the attacker merely sends unsigned mail; since
the receiver doesn't know the practices of the signing domain, it
cannot treat the message any more harshly for lack of a valid
signature.
An information service that allows a receiver to query for the
practices and expectations of the first party domain when no valid
first party signature is found could be useful in closing this gap.
A receiver could use this information to treat such questionable mail
with varying degrees of prejudice.
Note that, for the foreseeable future, unrestricted use patterns of
mail (e.g., where users may be members of mailing lists, etc.) will
likely suffer occasional, non-malicious signature failure in transit.
While probably not a large percentage of total traffic, this kind of
breakage may be a significant concern for those usage patterns. This
scenario defines where the sender cannot set any expectation as to
whether an individual message will arrive intact.
Even without that expectation, a receiver may be able to take
advantage of the knowledge that the domain's practice is to sign all
mail and bias its filters against unsigned or damaged in transit
mail. This information should not be expected to be used in a binary
yes/no fashion, but instead as a data point among others in a
filtering system.
<span class="grey">Thomas Informational [Page 4]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-5" ></span>
<span class="grey"><a href="./rfc5016">RFC 5016</a> DKIM-SSP-REQ October 2007</span>
The following exchange illustrates problem scenario 1.
1. Mail with a [<a href="./rfc2822" title=""Internet Message Format"">RFC2822</a>].From domain Alice is sent to domain Bob
with a missing or broken DKIM first party signature from Alice.
2. Domain Bob would like to know whether that is an expected state
of affairs.
3. Domain Alice provides information that it signs all outgoing
mail, but places no expectation on whether it will arrive with an
intact first party signature.
4. Domain Bob could use this information to bias its filters to
examine the message with some suspicion.
<span class="h3"><a class="selflink" id="section-3.2" href="#section-3.2">3.2</a>. Problem Scenario 2: Illegitimate Domain Name Use</span>
A class of mail typified by transactional mail from high-value
domains is currently the target of phishing attacks. In particular,
many phishing scams forge the [<a href="./rfc2822" title=""Internet Message Format"">RFC2822</a>].From address in addition to
spoofing much of the content to trick unsuspecting users into
revealing sensitive information. Domain holders sending this mail
would like the ability to give an enhanced guarantee that mail sent
with their domain name should always arrive with the proof that the
domain holder consented to its transmission. That is, the message
should contain a valid first party signature as defined above.
From a receiver's standpoint, knowing that a domain not only signs
all of its mail, but places a very high value on the receipt of a
valid first party signature from that domain is helpful. Hence, a
receiver knows that the sending domain signs all its mail, and that
the sending domain considers mail from this domain particularly
sensitive in some sense, and is asking the receiver to be more
suspicious than it otherwise might be of a broken or missing first-
party signature. A receiver with the knowledge of the sender's
expectations in hand might choose to process messages not conforming
to the published practices in a special manner. Note that the
ability to state an enhanced guarantee of a valid signature means
that senders should expect mail that traverses modifying
intermediaries (e.g., mailing lists, etc.) will likely be quarantined
or deleted; thus, this scenario is more narrow than problem scenario
1.
Informative Note: a receiving filter may choose to treat scenario
2 much more harshly than scenario 1; where scenario 1 looks odd,
scenario 2 looks like something is very wrong.
<span class="grey">Thomas Informational [Page 5]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-6" ></span>
<span class="grey"><a href="./rfc5016">RFC 5016</a> DKIM-SSP-REQ October 2007</span>
1. Mail with a [<a href="./rfc2822" title=""Internet Message Format"">RFC2822</a>].From domain Alice is sent to domain Bob
with a missing or broken first party DKIM signature from domain
Alice.
2. Domain Bob would like to know whether that is an expected state
of affairs.
3. Domain Alice provides information that it signs all outgoing
mail, and furthermore places an expectation that it should arrive
with an intact first party signature, and that the receiver
should be much more wary if it does not.
4. Domain Bob could use this information to bias its filters such
that it examines the message with great suspicion.
<span class="h2"><a class="selflink" id="section-4" href="#section-4">4</a>. SSP Deployment Considerations</span>
Given the problems enumerated above for which we'd like SSP to
provide information to recipients, there are a number of scenarios
that are not related to the problems that are to be solved, per se,
but the actual mechanics of implementing/deploying the information
service that SSP would provide.
<span class="h3"><a class="selflink" id="section-4.1" href="#section-4.1">4.1</a>. Deployment Consideration 1: Outsourced Signing</span>
Many domains do not run their own mail infrastructure, or may
outsource parts of it to third parties. It is desirable for a domain
holder to have the ability to delegate to other entities the ability
to sign for the domain holder. One obvious use scenario is a domain
holder from a small domain that needs to have the ability for their
outgoing ISP to sign all of their mail on behalf of the domain
holder. Other use scenarios include outsourced bulk mail for
marketing campaigns, as well as outsourcing various business
functions, such as insurance benefits, etc.
<span class="h3"><a class="selflink" id="section-4.2" href="#section-4.2">4.2</a>. Deployment Consideration 2: Subdomain Coverage</span>
An SSP client will perform lookups on incoming mail streams to
provide the information as proposed in the problem scenarios. The
domain part of the first address of the [<a href="./rfc2822" title=""Internet Message Format"">RFC2822</a>].From will form the
basis to fetch the published information. A trivial attack to
circumvent finding the published information can be mounted by simply
using a subdomain of the parent domain that doesn't have published
information. This attack is called the subdomain attack: that is, a
domain wants to not only publish a policy for a given DNS label it
controls, but it would also like to protect all subdomains of that
label as well. If this characteristic is not met, an attacker would
need only create a possibly fictitious subdomain that was not covered
<span class="grey">Thomas Informational [Page 6]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-7" ></span>
<span class="grey"><a href="./rfc5016">RFC 5016</a> DKIM-SSP-REQ October 2007</span>
by the SSP's information service. Thus, it would be advantageous for
SSP to not only cover a given domain, but all subdomains of that
domain as well.
<span class="h3"><a class="selflink" id="section-4.3" href="#section-4.3">4.3</a>. Deployment Consideration 3: Resent Original Mail</span>
Resent mail is a common occurrence in many scenarios in the email
world of today. For example, domain Alice sends a DKIM-signed
message with a published practice of signing all messages to domain
Bob's mailing list. Bob, being a good net citizen, wants to be able
to take his part of the responsibility of the message in question, so
he DKIM signs the message, perhaps corresponding to the Sender
address.
Note that this scenario is completely orthogonal to whether Alice's
signature survived Bob's mailing list: Bob merely wants to assert his
part in the chain of accountability for the benefit of the ultimate
receivers. It would be useful for this practice to be encouraged as
it gives a more accurate view of who handled the message. It also
has the side benefit that remailers that break DKIM first party
signatures can be potentially assessed by the receiver based on the
receiver's opinion of the signing domains that actually survived.
<span class="h3"><a class="selflink" id="section-4.4" href="#section-4.4">4.4</a>. Deployment Consideration 4: Incremental Deployment of Signing</span>
As a practical matter, it may be difficult for a domain to roll out
DKIM signing such that they can publish the DKIM Signing Complete
practice given the complexities of the user population, the
outsourced vendors sending on its behalf, etc. This leaves open an
exploit that high-value mail, such as in Problem Scenario 2, must be
classified to the least common denominator of the published
practices. It would be desirable to allow a domain holder to publish
a list of exceptions that would have a more restrictive practices
statement. NB: this consideration has been deemed met by the
mechanisms provided by the base DKIM signing mechanism; it is merely
documented here as having been an issue.
For example, bigbank.example.com might be ready to say that
statements@bigbank.example.com is always signed, but the rest of the
domain, say, is not. Another situation is that the practices of some
address local parts in a given domain are not the same as practices
of other local parts. Using the same example of
statements@bigbank.example.com being a transactional kind of email
that would like to publish very strong practices, mixed in with the
rest of the user population local parts, which may go through mailing
lists, etc., for which a less strong statement is appropriate.
<span class="grey">Thomas Informational [Page 7]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-8" ></span>
<span class="grey"><a href="./rfc5016">RFC 5016</a> DKIM-SSP-REQ October 2007</span>
It should be said that DKIM, through the use of subdomains, can
already support this kind of differentiation. That is, in order to
publish a strong practice, one only has to segregate those cases into
different subdomains. For example: accounts.bigbank.example.com
would publish constrained practices, while
corporateusers.bigbank.example.com might publish more permissive
practices.
<span class="h3"><a class="selflink" id="section-4.5" href="#section-4.5">4.5</a>. Deployment Consideration 5: Performance and Caching</span>
Email service provides an any-any mesh of potential connections: all
that is required is the publication of an MX record and an SMTP
listener to receive mail. Thus, the use of SSP is likely to fall
into two main scenarios, the first of which are large, well-known
domains that are in constant contact with one another. In this case,
caching of records is essential for performance, including the
caching of the non-existence of records (i.e., negative caching).
The second main scenario is when a domain exchanges mail with a much
smaller volume domain. This scenario can be both perfectly normal as
with the case of vanity domains, and unfortunately, a vector for
those sending mail for anti-social reasons. In this case, we'd like
the message exchange burden to SSP querier to be low, since many of
the lookups will not provide a useful answer. Likewise, it would be
advantageous to have upstream caching here as well so that, say, a
mailing list exploder on a small domain does not result in an
explosion of queries back at the root and authoritative server for
the small domain.
<span class="h3"><a class="selflink" id="section-4.6" href="#section-4.6">4.6</a>. Deployment Consideration 6: Human Legibility of Practices</span>
While SSP records are likely to be primarily consumed by an
automaton, for the foreseeable future they are also likely to be
inspected by hand. It would be nice to have the practices stated in
a fashion that is also intuitive to the human inspectors.
<span class="h3"><a class="selflink" id="section-4.7" href="#section-4.7">4.7</a>. Deployment Consideration 7: Extensibility</span>
While this document pertains only to requirements surrounding DKIM
signing practices, it would be beneficial for the protocol to be able
to extend to other protocols.
<span class="h3"><a class="selflink" id="section-4.8" href="#section-4.8">4.8</a>. Deployment Consideration 8: Security</span>
SSP must be able to withstand life in a hostile, open-Internet
environment. These include DoS attacks, and especially DoS attacks
that leverage themselves through amplification inherent in the
protocol. In addition, while a useful protocol may be built without
<span class="grey">Thomas Informational [Page 8]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-9" ></span>
<span class="grey"><a href="./rfc5016">RFC 5016</a> DKIM-SSP-REQ October 2007</span>
strong source authentication provided by the information service, a
path to strong source authentication should be provided by the
protocol, or underlying protocols.
<span class="h2"><a class="selflink" id="section-5" href="#section-5">5</a>. Requirements</span>
This section defines the requirements for SSP. As with most
requirements documents, these requirements define the MINIMUM
requirements that a candidate protocol must provide. It should also
be noted that SSP must fulfill all of the requirements.
<span class="h3"><a class="selflink" id="section-5.1" href="#section-5.1">5.1</a>. Discovery Requirements</span>
Receivers need a means of obtaining information about a sender's DKIM
practices. This requires a means of discovering where the
information is and what it contains.
1. The author is the first-party sender of a message, as specified
in the [<a href="./rfc2822" title=""Internet Message Format"">RFC2822</a>].From field. SSP's information is associated
with the author's domain name, and is published subordinate to
that domain name.
2. In order to limit the cost of its use, any query service
supplying SSP's information MUST provide a definitive response
within a small, deterministic number of message exchanges under
normal operational conditions.
Informative Note: this, for all intents and purposes is a
prohibition on anything that might produce loops or result in
extended delays and overhead; also though "deterministic"
doesn't specify how many exchanges, the expectation is "few".
Refs: Deployment Considerations, Sections <a href="#section-4.2">4.2</a> and <a href="#section-4.5">4.5</a>.
3. SSP's publishing mechanism MUST be defined such that it does not
lead to multiple resource records of the same type for different
protocols residing at the same location.
Informative note: an example is multiple resource record of the
same type within a common DNS leaf. Hence, uniquely defined
leaf names or uniquely defined resource record types will
ensure unambiguous referencing.
Refs: Deployment Consideration, <a href="#section-4.2">Section 4.2</a>.
<span class="grey">Thomas Informational [Page 9]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-10" ></span>
<span class="grey"><a href="./rfc5016">RFC 5016</a> DKIM-SSP-REQ October 2007</span>
4. SSP retrieval SHOULD provide coverage for not only a given domain
but all of its subdomains as well. It is recognized that there
is some reasonable doubt about the feasibility of a widely
accepted solution to this requirement. If the working group does
not achieve rough consensus on a solution, it MUST document the
relevant security considerations in the protocol specification.
Refs: Deployment Considerations, Sections <a href="#section-4.2">4.2</a> and <a href="#section-4.5">4.5</a>.
<span class="h3"><a class="selflink" id="section-5.2" href="#section-5.2">5.2</a>. SSP Transport Requirements</span>
The publication and query mechanism will operate as an internet-based
message exchange. There are multiple requirements for this lower-
layer service:
1. The exchange SHOULD have existing widespread deployment of the
transport layer, especially if riding on top of a true transport
layer (e.g., TCP, UDP).
Refs: Deployment Considerations, Sections <a href="#section-4.5">4.5</a> and <a href="#section-4.7">4.7</a>.
2. The query/response in terms of latency time and the number of
messages involved MUST be low (less than three message exchanges
not counting retransmissions or other exceptional conditions).
Refs: Deployment Consideration, <a href="#section-4.5">Section 4.5</a>.
3. If the infrastructure doesn't provide caching (a la DNS), the
records retrieved MUST provide initiators the ability to maintain
their own cache. The existing caching infrastructure is,
however, highly desirable.
Refs: Deployment Consideration, <a href="#section-4.5">Section 4.5</a>.
4. Multiple geographically and topologically diverse servers MUST be
supported for high availability.
Refs: Deployment Considerations, Sections <a href="#section-4.5">4.5</a> and <a href="#section-4.7">4.7</a>.
<span class="h3"><a class="selflink" id="section-5.3" href="#section-5.3">5.3</a>. Practice and Expectation Requirements</span>
As stated in the definitions section, a practice is a statement
according to the [<a href="./rfc2822" title=""Internet Message Format"">RFC2822</a>].From domain holder of externally
verifiable behavior in the email messages it sends. As an example, a
practice might be defined such that all email messages will contain a
DKIM signature corresponding to the [<a href="./rfc2822" title=""Internet Message Format"">RFC2822</a>].From address. Since
there is a possibility of alteration between what a sender sends and
a receiver examines, an expectation combines with a practice to
<span class="grey">Thomas Informational [Page 10]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-11" ></span>
<span class="grey"><a href="./rfc5016">RFC 5016</a> DKIM-SSP-REQ October 2007</span>
convey what the [<a href="./rfc2822" title=""Internet Message Format"">RFC2822</a>].From domain considers the likely outcome of
the survivability of the practice at a receiver. For example, a
practice that a valid DKIM for the [<a href="./rfc2822" title=""Internet Message Format"">RFC2822</a>].From address is present
when it is sent from the domain, and an expectation that it will
remain present and valid for all receivers whether topologically
adjacent or not.
1. SSP MUST be able to make practices and expectation assertions
about the domain part of a [<a href="./rfc2822" title=""Internet Message Format"">RFC2822</a>].From address in the context
of DKIM. SSP will not make assertions about other addresses for
DKIM at this time.
Refs: Problem Scenarios 1 and 2, Sections <a href="#section-3.1">3.1</a> and <a href="#section-3.2">3.2</a>.
2. SSP MUST provide a concise linkage between the [<a href="./rfc2822" title=""Internet Message Format"">RFC2822</a>].From and
the identity in the DKIM i= tag, or its default if it is missing
in the signature. That is, SSP MUST precisely define the
semantics of what qualifies as a first party signature.
Refs: Problem Scenarios 1 and 2, Sections <a href="#section-3.1">3.1</a> and <a href="#section-3.2">3.2</a>.
3. SSP MUST be able to publish a practice that the domain's signing
behavior is "DKIM Signing Complete". That is, all messages were
transmitted with a valid first party signature.
Refs: Problem Scenario 1, <a href="#section-3.1">Section 3.1</a>.
4. SSP MUST be able to publish an expectation that a verifiable
first party DKIM signature should be expected on receipt of a
message.
Refs: Problem Scenario 2, <a href="#section-3.2">Section 3.2</a>.
5. Practices and expectations MUST be presented in SSP syntax using
as intuitive a descriptor as possible. For example, p=? would be
better represented as p=unknown.
Refs: Deployment Consideration, <a href="#section-4.6">Section 4.6</a>.
6. Because DKIM uses DNS to store selectors, there is always the
ability for a domain holder to delegate all or parts of the
_domainkey subdomain to an affiliated party of the domain
holder's choosing. That is, the domain holder may set an NS
record for _domainkey.example.com to delegate to an email
provider who manages the entire namespace. There is also the
ability for the domain holder to partition its namespace into
subdomains to further constrain third parties. For example, a
domain holder could delegate only _domainkey.benefits.example.com
<span class="grey">Thomas Informational [Page 11]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-12" ></span>
<span class="grey"><a href="./rfc5016">RFC 5016</a> DKIM-SSP-REQ October 2007</span>
to a third party to constrain the third party to only be able to
produce valid signatures in the benefits.example.com subdomain.
Last, a domain holder can even use CNAME's to delegate individual
leaf nodes. Given the above considerations, SSP need not invent
a different means of allowing affiliated parties to sign on a
domain's behalf at this time.
Refs: Deployment Consideration, <a href="#section-4.4">Section 4.4</a>.
7. Practices and expectations MUST be presented as an information
service from the signing domain to be consumed as an added factor
to the receiver's local policy. In particular, a practice or
expectation MUST NOT mandate any disposition stance on the
receiver.
Refs: Problem Scenarios 1 and 2, Sections <a href="#section-3.1">3.1</a> and <a href="#section-3.2">3.2</a>.
8. There is no requirement that SSP publish practices of any/all
third parties that MUST NOT sign on the domain holder's behalf.
This should be considered out of scope.
INFORMATIVE NOTE: this is essentially saying that the protocol
doesn't have to concern itself with being a blacklist
repository.
Refs: Problem Scenarios 1 and 2, Sections <a href="#section-3.1">3.1</a> and <a href="#section-3.2">3.2</a>.
9. SSP MUST NOT be required to be invoked if a valid first party
signature is found.
Refs: Deployment Consideration, <a href="#section-4.2">Section 4.2</a>.
10. SSP MUST NOT provide a mechanism that impugns the existence of
non-first party signatures in a message. A corollary of this
requirement is that the protocol MUST NOT link practices of first
party signers with the practices of third party signers.
INFORMATIVE NOTE: the main thrust of this requirement is that
practices should only be published for that which the publisher
has control, and should not meddle in what is ultimately the
local policy of the receiver.
Refs: Deployment Consideration, <a href="#section-4.3">Section 4.3</a>.
<span class="grey">Thomas Informational [Page 12]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-13" ></span>
<span class="grey"><a href="./rfc5016">RFC 5016</a> DKIM-SSP-REQ October 2007</span>
<span class="h3"><a class="selflink" id="section-5.4" href="#section-5.4">5.4</a>. Extensibility and Forward Compatibility Requirements</span>
1. SSP MUST NOT extend to any protocol other than DKIM for email at
this time. SSP SHOULD be extensible for protocols other than
DKIM.
Refs: Deployment Consideration, <a href="#section-4.7">Section 4.7</a>.
2. SSP MUST be able to add new practices and expectations within the
existing discovery/transport/practices in a backward compatible
fashion.
Refs: Deployment Consideration, <a href="#section-4.7">Section 4.7</a>.
<span class="h2"><a class="selflink" id="section-6" href="#section-6">6</a>. Requirements for SSP Security</span>
1. SSP for a high-value domain is potentially a high-value DoS
target, especially since the unavailability of SSP's record could
make unsigned messages less suspicious.
2. SSP MUST NOT make highly leveraged amplification or make-work
attacks possible. In particular, the work and message exchanges
involved MUST be order of a constant.
Refs: Deployment Consideration, <a href="#section-4.8">Section 4.8</a>.
3. SSP MUST have the ability for a domain holder to provide SSP's
data such that a receiver can determine that it is authentically
from the domain holder with a large degree of certainty. SSP may
provide means that provide less certainty in trade off for ease
of deployment.
Refs: Deployment Consideration, <a href="#section-4.8">Section 4.8</a>.
<span class="h2"><a class="selflink" id="section-7" href="#section-7">7</a>. Security Considerations</span>
This document defines requirements for a new protocol and the
security related requirements are defined above. Since it is
expected that the new protocol will use the DNS as a basis for the
published SSP information, most if not all of the threats described
in [<a href="./rfc4686" title=""Analysis of Threats Motivating DomainKeys Identified Mail (DKIM)"">RFC4686</a>] will be applicable.
<span class="h2"><a class="selflink" id="section-8" href="#section-8">8</a>. Acknowledgments</span>
Dave Crocker and Jim Fenton provided substantial review of this
document. Thanks also to Vijay Gurbani and David Harrington for
their helpful last call reviews.
<span class="grey">Thomas Informational [Page 13]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-14" ></span>
<span class="grey"><a href="./rfc5016">RFC 5016</a> DKIM-SSP-REQ October 2007</span>
<span class="h2"><a class="selflink" id="section-9" href="#section-9">9</a>. References</span>
<span class="h3"><a class="selflink" id="section-9.1" href="#section-9.1">9.1</a>. Normative References</span>
[<a id="ref-RFC2119">RFC2119</a>] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", <a href="https://www.rfc-editor.org/bcp/bcp14">BCP 14</a>, <a href="./rfc2119">RFC 2119</a>, March 1997.
[<a id="ref-RFC2822">RFC2822</a>] Resnick, P., Ed., "Internet Message Format", <a href="./rfc2822">RFC 2822</a>,
April 2001.
[<a id="ref-RFC4686">RFC4686</a>] Fenton, J., "Analysis of Threats Motivating DomainKeys
Identified Mail (DKIM)", <a href="./rfc4686">RFC 4686</a>, September 2006.
[<a id="ref-RFC4871">RFC4871</a>] Allman, E., Callas, J., Delany, M., Libbey, M., Fenton,
J., and M. Thomas, "DomainKeys Identified Mail (DKIM)
Signatures", <a href="./rfc4871">RFC 4871</a>, May 2007.
Author's Address
Michael Thomas
Cisco Systems
606 Sanchez St
San Francisco, California 94114
USA
Phone: +1-408-525-5386
Fax: +1-408-525-5386
EMail: mat@cisco.com
<span class="grey">Thomas Informational [Page 14]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-15" ></span>
<span class="grey"><a href="./rfc5016">RFC 5016</a> DKIM-SSP-REQ October 2007</span>
Full Copyright Statement
Copyright (C) The IETF Trust (2007).
This document is subject to the rights, licenses and restrictions
contained in <a href="https://www.rfc-editor.org/bcp/bcp78">BCP 78</a>, and except as set forth therein, the authors
retain all their rights.
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Intellectual Property
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in <a href="https://www.rfc-editor.org/bcp/bcp78">BCP 78</a> and <a href="https://www.rfc-editor.org/bcp/bcp79">BCP 79</a>.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
<a href="http://www.ietf.org/ipr">http://www.ietf.org/ipr</a>.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Thomas Informational [Page 15]
</pre>
|