<?xml version='1.0' encoding='utf-8'?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" version="3" category="exp" consensus="true" docName="draft-ietf-dmarc-psd-14" indexInclude="true" ipr="trust200902" number="9091" prepTime="2021-07-26T13:19:18" scripts="Common,Latin" sortRefs="true" submissionType="IETF" symRefs="true" tocDepth="3" tocInclude="true" xml:lang="en">
  <link href="https://datatracker.ietf.org/doc/draft-ietf-dmarc-psd-14" rel="prev"/>
  <link href="https://dx.doi.org/10.17487/rfc9091" rel="alternate"/>
  <link href="urn:issn:2070-1721" rel="alternate"/>
  <front>
    <title abbrev="PSD DMARC">Experimental Domain-Based Message Authentication, Reporting, and Conformance (DMARC) Extension for Public Suffix Domains</title>
    <seriesInfo name="RFC" value="9091" stream="IETF"/>
    <author initials="S." surname="Kitterman" fullname="Scott Kitterman">
      <organization showOnFrontPage="true">fTLD Registry Services</organization>
      <address>
        <postal>
          <extaddr>Suite 400</extaddr>
          <street>600 13th Street, NW</street>
          <city>Washington</city>
          <region>DC</region>
          <code>20005</code>
          <country>United States of America</country>
        </postal>
        <phone>+1 301 325-5475</phone>
        <email>scott@kitterman.com</email>
      </address>
    </author>
    <author role="editor" initials="T." surname="Wicinski" fullname="Tim Wicinski">
      <organization showOnFrontPage="true"/>
      <address>
        <postal>
          <street/>
          <city>Elkins</city>
          <code>26241</code>
          <country>United States of America</country>
          <region>WV</region>
        </postal>
        <phone/>
        <email>tjw.ietf@gmail.com</email>
        <uri/>
      </address>
    </author>
    <date month="07" year="2021"/>
    <keyword>DMARC</keyword>
    <keyword>email authentication</keyword>
    <keyword>TLD</keyword>
    <abstract pn="section-abstract">
      <t indent="0" pn="section-abstract-1">Domain-based Message Authentication, Reporting, and Conformance
         (DMARC), defined in RFC 7489, permits a domain-controlling organization to express
         domain-level policies and preferences for message validation,
         disposition, and reporting, which a mail-receiving organization
         can use to improve mail handling.</t>
      <t indent="0" pn="section-abstract-2">DMARC distinguishes the portion of a name that is a
         Public Suffix Domain (PSD), below which
         Organizational Domain names are created.  The basic DMARC
         capability allows Organizational Domains to specify policies
         that apply to their subdomains, but it does not give that
         capability to PSDs. This document describes an extension to
         DMARC to fully enable DMARC functionality for PSDs.</t>
      <t indent="0" pn="section-abstract-3">Some implementations of DMARC consider a PSD to be ineligible for
         DMARC enforcement.  This specification addresses that case.</t>
    </abstract>
    <boilerplate>
      <section anchor="status-of-memo" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.1">
        <name slugifiedName="name-status-of-this-memo">Status of This Memo</name>
        <t indent="0" pn="section-boilerplate.1-1">
            This document is not an Internet Standards Track specification; it is
            published for examination, experimental implementation, and
            evaluation.
        </t>
        <t indent="0" pn="section-boilerplate.1-2">
            This document defines an Experimental Protocol for the Internet
            community.  This document is a product of the Internet Engineering
            Task Force (IETF).  It represents the consensus of the IETF community.
            It has received public review and has been approved for publication
            by the Internet Engineering Steering Group (IESG).  Not all documents
            approved by the IESG are candidates for any level of Internet
            Standard; see Section 2 of RFC 7841. 
        </t>
        <t indent="0" pn="section-boilerplate.1-3">
            Information about the current status of this document, any
            errata, and how to provide feedback on it may be obtained at
            <eref target="https://www.rfc-editor.org/info/rfc9091" brackets="none"/>.
        </t>
      </section>
      <section anchor="copyright" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.2">
        <name slugifiedName="name-copyright-notice">Copyright Notice</name>
        <t indent="0" pn="section-boilerplate.2-1">
            Copyright (c) 2021 IETF Trust and the persons identified as the
            document authors. All rights reserved.
        </t>
        <t indent="0" pn="section-boilerplate.2-2">
            This document is subject to BCP 78 and the IETF Trust's Legal
            Provisions Relating to IETF Documents
            (<eref target="https://trustee.ietf.org/license-info" brackets="none"/>) in effect on the date of
            publication of this document. Please review these documents
            carefully, as they describe your rights and restrictions with
            respect to this document. Code Components extracted from this
            document must include Simplified BSD License text as described in
            Section 4.e of the Trust Legal Provisions and are provided without
            warranty as described in the Simplified BSD License.
        </t>
      </section>
    </boilerplate>
    <toc>
      <section anchor="toc" numbered="false" removeInRFC="false" toc="exclude" pn="section-toc.1">
        <name slugifiedName="name-table-of-contents">Table of Contents</name>
        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1">
          <li pn="section-toc.1-1.1">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.1"><xref derivedContent="1" format="counter" sectionFormat="of" target="section-1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-introduction">Introduction</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.1.2">
              <li pn="section-toc.1-1.1.2.1">
                <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.2.1.1"><xref derivedContent="1.1" format="counter" sectionFormat="of" target="section-1.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-example">Example</xref></t>
              </li>
              <li pn="section-toc.1-1.1.2.2">
                <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.2.2.1"><xref derivedContent="1.2" format="counter" sectionFormat="of" target="section-1.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-discussion">Discussion</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.2">
            <t indent="0" pn="section-toc.1-1.2.1"><xref derivedContent="2" format="counter" sectionFormat="of" target="section-2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-terminology-and-definitions">Terminology and Definitions</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.2.2">
              <li pn="section-toc.1-1.2.2.1">
                <t indent="0" pn="section-toc.1-1.2.2.1.1"><xref derivedContent="2.1" format="counter" sectionFormat="of" target="section-2.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-conventions-used-in-this-do">Conventions Used in This Document</xref></t>
              </li>
              <li pn="section-toc.1-1.2.2.2">
                <t indent="0" pn="section-toc.1-1.2.2.2.1"><xref derivedContent="2.2" format="counter" sectionFormat="of" target="section-2.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-public-suffix-domain-psd">Public Suffix Domain (PSD)</xref></t>
              </li>
              <li pn="section-toc.1-1.2.2.3">
                <t indent="0" pn="section-toc.1-1.2.2.3.1"><xref derivedContent="2.3" format="counter" sectionFormat="of" target="section-2.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-organizational-domain">Organizational Domain</xref></t>
              </li>
              <li pn="section-toc.1-1.2.2.4">
                <t indent="0" pn="section-toc.1-1.2.2.4.1"><xref derivedContent="2.4" format="counter" sectionFormat="of" target="section-2.4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-longest-psd">Longest PSD</xref></t>
              </li>
              <li pn="section-toc.1-1.2.2.5">
                <t indent="0" pn="section-toc.1-1.2.2.5.1"><xref derivedContent="2.5" format="counter" sectionFormat="of" target="section-2.5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-public-suffix-operator-pso">Public Suffix Operator (PSO)</xref></t>
              </li>
              <li pn="section-toc.1-1.2.2.6">
                <t indent="0" pn="section-toc.1-1.2.2.6.1"><xref derivedContent="2.6" format="counter" sectionFormat="of" target="section-2.6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-pso-controlled-domain-names">PSO-Controlled Domain Names</xref></t>
              </li>
              <li pn="section-toc.1-1.2.2.7">
                <t indent="0" pn="section-toc.1-1.2.2.7.1"><xref derivedContent="2.7" format="counter" sectionFormat="of" target="section-2.7"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-non-existent-domains">Non-existent Domains</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.3">
            <t indent="0" pn="section-toc.1-1.3.1"><xref derivedContent="3" format="counter" sectionFormat="of" target="section-3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-psd-dmarc-updates-to-dmarc-">PSD DMARC Updates to DMARC Requirements</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.3.2">
              <li pn="section-toc.1-1.3.2.1">
                <t indent="0" pn="section-toc.1-1.3.2.1.1"><xref derivedContent="3.1" format="counter" sectionFormat="of" target="section-3.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-general-updates">General Updates</xref></t>
              </li>
              <li pn="section-toc.1-1.3.2.2">
                <t indent="0" pn="section-toc.1-1.3.2.2.1"><xref derivedContent="3.2" format="counter" sectionFormat="of" target="section-3.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-changes-in-section-63-gener">Changes in Section 6.3 ("General Record Format")</xref></t>
              </li>
              <li pn="section-toc.1-1.3.2.3">
                <t indent="0" pn="section-toc.1-1.3.2.3.1"><xref derivedContent="3.3" format="counter" sectionFormat="of" target="section-3.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-changes-in-section-64-forma">Changes in Section 6.4 ("Formal Definition")</xref></t>
              </li>
              <li pn="section-toc.1-1.3.2.4">
                <t indent="0" pn="section-toc.1-1.3.2.4.1"><xref derivedContent="3.4" format="counter" sectionFormat="of" target="section-3.4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-changes-in-section-65-domai">Changes in Section 6.5 ("Domain Owner Actions")</xref></t>
              </li>
              <li pn="section-toc.1-1.3.2.5">
                <t indent="0" pn="section-toc.1-1.3.2.5.1"><xref derivedContent="3.5" format="counter" sectionFormat="of" target="section-3.5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-changes-in-section-661-extr">Changes in Section 6.6.1 ("Extract Author Domain")</xref></t>
              </li>
              <li pn="section-toc.1-1.3.2.6">
                <t indent="0" pn="section-toc.1-1.3.2.6.1"><xref derivedContent="3.6" format="counter" sectionFormat="of" target="section-3.6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-changes-in-section-663-poli">Changes in Section 6.6.3 ("Policy Discovery")</xref></t>
              </li>
              <li pn="section-toc.1-1.3.2.7">
                <t indent="0" pn="section-toc.1-1.3.2.7.1"><xref derivedContent="3.7" format="counter" sectionFormat="of" target="section-3.7"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-changes-in-section-7-dmarc-">Changes in Section 7 ("DMARC Feedback")</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.4">
            <t indent="0" pn="section-toc.1-1.4.1"><xref derivedContent="4" format="counter" sectionFormat="of" target="section-4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-privacy-considerations">Privacy Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.5">
            <t indent="0" pn="section-toc.1-1.5.1"><xref derivedContent="5" format="counter" sectionFormat="of" target="section-5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-security-considerations">Security Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.6">
            <t indent="0" pn="section-toc.1-1.6.1"><xref derivedContent="6" format="counter" sectionFormat="of" target="section-6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-iana-considerations">IANA Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.7">
            <t indent="0" pn="section-toc.1-1.7.1"><xref derivedContent="7" format="counter" sectionFormat="of" target="section-7"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-references">References</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.7.2">
              <li pn="section-toc.1-1.7.2.1">
                <t indent="0" pn="section-toc.1-1.7.2.1.1"><xref derivedContent="7.1" format="counter" sectionFormat="of" target="section-7.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-normative-references">Normative References</xref></t>
              </li>
              <li pn="section-toc.1-1.7.2.2">
                <t indent="0" pn="section-toc.1-1.7.2.2.1"><xref derivedContent="7.2" format="counter" sectionFormat="of" target="section-7.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-informative-references">Informative References</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.8">
            <t indent="0" pn="section-toc.1-1.8.1"><xref derivedContent="Appendix A" format="default" sectionFormat="of" target="section-appendix.a"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-psd-dmarc-privacy-concern-m">PSD DMARC Privacy Concern Mitigation Experiment</xref></t>
          </li>
          <li pn="section-toc.1-1.9">
            <t indent="0" pn="section-toc.1-1.9.1"><xref derivedContent="Appendix B" format="default" sectionFormat="of" target="section-appendix.b"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-dmarc-psd-registry-examples">DMARC PSD Registry Examples</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.9.2">
              <li pn="section-toc.1-1.9.2.1">
                <t indent="0" pn="section-toc.1-1.9.2.1.1"><xref derivedContent="B.1" format="counter" sectionFormat="of" target="section-appendix.b.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-dmarc-psd-dns-query-service">DMARC PSD DNS Query Service</xref></t>
              </li>
              <li pn="section-toc.1-1.9.2.2">
                <t indent="0" pn="section-toc.1-1.9.2.2.1"><xref derivedContent="B.2" format="counter" sectionFormat="of" target="section-appendix.b.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-dmarc-psd-registry">DMARC PSD Registry</xref></t>
              </li>
              <li pn="section-toc.1-1.9.2.3">
                <t indent="0" pn="section-toc.1-1.9.2.3.1"><xref derivedContent="B.3" format="counter" sectionFormat="of" target="section-appendix.b.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-dmarc-psd-psl-extension">DMARC PSD PSL Extension</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.10">
            <t indent="0" pn="section-toc.1-1.10.1"><xref derivedContent="Appendix C" format="default" sectionFormat="of" target="section-appendix.c"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-implementations">Implementations</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.10.2">
              <li pn="section-toc.1-1.10.2.1">
                <t indent="0" pn="section-toc.1-1.10.2.1.1"><xref derivedContent="C.1" format="counter" sectionFormat="of" target="section-appendix.c.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-authheaders-module">Authheaders Module</xref></t>
              </li>
              <li pn="section-toc.1-1.10.2.2">
                <t indent="0" pn="section-toc.1-1.10.2.2.1"><xref derivedContent="C.2" format="counter" sectionFormat="of" target="section-appendix.c.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-zdkimfilter-module">Zdkimfilter Module</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.11">
            <t indent="0" pn="section-toc.1-1.11.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.d"/><xref derivedContent="" format="title" sectionFormat="of" target="name-acknowledgements">Acknowledgements</xref></t>
          </li>
          <li pn="section-toc.1-1.12">
            <t indent="0" pn="section-toc.1-1.12.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.e"/><xref derivedContent="" format="title" sectionFormat="of" target="name-authors-addresses">Authors' Addresses</xref></t>
          </li>
        </ul>
      </section>
    </toc>
  </front>
  <middle>
    <section anchor="intro" numbered="true" toc="include" removeInRFC="false" pn="section-1">
      <name slugifiedName="name-introduction">Introduction</name>
      <t indent="0" pn="section-1-1">DMARC <xref target="RFC7489" format="default" sectionFormat="of" derivedContent="RFC7489"/> provides a mechanism for publishing
        organizational policy information to email receivers.  DMARC allows policy to be
        specified for both individual domains and for Organizational Domains
        and their subdomains within a single organization.</t>
      <t indent="0" pn="section-1-2">To determine the Organizational Domain for a message under
      evaluation, and thus where to look for a policy statement, DMARC makes
      use of a public suffix list. The process for doing this can be found in
      <xref target="RFC7489" sectionFormat="of" section="3.2" format="default" derivedLink="https://rfc-editor.org/rfc/rfc7489#section-3.2" derivedContent="RFC7489">the DMARC
      specification</xref>.  Currently, the most common public suffix list being used is the
      one maintained by the Mozilla Foundation and made public at <eref brackets="angle" target="https://publicsuffix.org"/>.</t>
      <t indent="0" pn="section-1-3">In the basic DMARC model, Public Suffix Domains (PSDs) are not Organizational Domains
        and are thus not subject to DMARC processing.  In DMARC, domains
        fall into one of three categories: Organizational Domains,
        subdomains of Organizational Domains, or PSDs.  A PSD can only
        publish DMARC policy for itself and not for any subdomains
        under it.  In some cases, this limitation allows for the abuse
        of non-existent organizational-level domains and hampers
        identification of domain abuse in email.</t>
      <t indent="0" pn="section-1-4">This document specifies experimental updates to the DMARC
        specification <xref target="RFC7489" format="default" sectionFormat="of" derivedContent="RFC7489"/> in an attempt to mitigate this abuse.</t>
      <section anchor="example" numbered="true" toc="include" removeInRFC="false" pn="section-1.1">
        <name slugifiedName="name-example">Example</name>
        <t indent="0" pn="section-1.1-1">As an example, imagine a Top-Level Domain (TLD), ".example", that has
        public subdomains for government and commercial use (".gov.example"
        and ".com.example").  The maintainer of a list of such a PSD structure
        would include entries for both of these subdomains, thereby
        indicating that they are PSDs, below which Organizational Domains can
        be registered.  Suppose further that there exists a legitimate domain
        called "tax.gov.example", registered within ".gov.example".</t>
        <t indent="0" pn="section-1.1-2">By exploiting the typically unauthenticated nature of email, there are
        regular malicious campaigns to impersonate this organization that use
        similar-looking ("cousin") domains such as "t4x.gov.example".  Such
        domains are not registered.</t>
        <t indent="0" pn="section-1.1-3">Within the ".gov.example" public suffix, use of DMARC has been mandated,
        so "gov.example" publishes the following DMARC DNS record:
        </t>
        <sourcecode markers="false" pn="section-1.1-4">
_dmarc.gov.example. IN TXT ( "v=DMARC1; p=reject;"
                             "rua=mailto:dmc@dmarc.svc.gov.example" )
</sourcecode>
        <t indent="0" pn="section-1.1-5">
       This DMARC record provides policy and a reporting destination for
       mail sent from @gov.example.  Similarly, "tax.gov.example" will have
       a DMARC record that specifies policy for mail sent from addresses
       @tax.gov.example.  However, due to DMARC's current method of
       discovering and applying policy at the Organizational Domain
       level, the non-existent Organizational Domain of @t4x.gov.example
       does not and cannot fall under a DMARC policy.

        </t>
        <t indent="0" pn="section-1.1-6"> Defensively registering all variants of "tax" is not a scalable
         strategy.  The intent of this specification, therefore, is to enhance the
         DMARC discovery method by enabling an agent receiving such a
         message to be able to determine that a relevant policy is present at
         "gov.example", which is precluded by the current DMARC specification.
        </t>
      </section>
      <section anchor="discussion" numbered="true" toc="include" removeInRFC="false" pn="section-1.2">
        <name slugifiedName="name-discussion">Discussion</name>
        <t indent="0" pn="section-1.2-1"> This document provides a simple extension to <xref target="RFC7489" format="default" sectionFormat="of" derivedContent="RFC7489"/>
         to allow operators of Public Suffix Domains (PSDs) to:
        </t>
        <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-1.2-2">
          <li pn="section-1.2-2.1">Express policy at the level of the PSD that covers all
          Organizational Domains that do not explicitly publish DMARC records</li>
          <li pn="section-1.2-2.2">Extend the DMARC policy query functionality to detect
            and process such a policy</li>
          <li pn="section-1.2-2.3">Describe receiver feedback for such policies</li>
          <li pn="section-1.2-2.4">Provide controls to mitigate potential privacy considerations
       associated with this extension</li>
        </ul>
        <t indent="0" pn="section-1.2-3">This document also provides a new DMARC tag
	to indicate requested handling policy for non-existent subdomains.
	This is provided specifically to support phased deployment of PSD
	DMARC but is expected to be useful more generally.  Undesired
	rejection risks for mail purporting to be from domains that do not
	exist are substantially lower than for those that do, so the
	operational risk of requesting harsh policy treatment (e.g., reject) is
	lower.
        </t>
        <t indent="0" pn="section-1.2-4">As an additional benefit, the PSD DMARC extension clarifies
        existing requirements.  Based on the requirements of <xref target="RFC7489" format="default" sectionFormat="of" derivedContent="RFC7489"/>, DMARC should function above the
        organizational level for exact domain matches (i.e., if a DMARC record
        were published for "example", then mail from example@example should be
        subject to DMARC processing).  Testing has revealed that this is not
        consistently applied in different implementations.
        </t>
        <t indent="0" pn="section-1.2-5">There are two types of Public Suffix Operators (PSOs) for which this
         extension would be useful and appropriate:
        </t>
        <dl newline="true" indent="3" spacing="normal" pn="section-1.2-6">
          <dt pn="section-1.2-6.1">Branded PSDs (e.g., ".google"):
</dt>
          <dd pn="section-1.2-6.2">These domains are effectively Organizational Domains as discussed in <xref target="RFC7489" format="default" sectionFormat="of" derivedContent="RFC7489"/>. They control all subdomains of the
tree. These are effectively private domains but listed in the current public
suffix list. They are treated as public for DMARC purposes. They require the
same protections as DMARC Organizational Domains but are currently unable to
benefit from DMARC.
</dd>
          <dt pn="section-1.2-6.3">Multi-organization PSDs that require DMARC usage (e.g., ".bank"):
</dt>
          <dd pn="section-1.2-6.4">Because existing Organizational Domains using this PSD have their own
DMARC policy, the applicability of this extension is for non-existent
domains. The extension allows the brand protection benefits of DMARC to extend
to the entire PSD, including cousin domains of registered organizations.
</dd>
        </dl>
        <t indent="0" pn="section-1.2-7">Due to the design of DMARC and the nature of the Internet <xref target="RFC5598" format="default" sectionFormat="of" derivedContent="RFC5598">email architecture</xref>, there are
        interoperability issues associated with DMARC deployment.  These are
        discussed in "Interoperability Issues between Domain-based Message
        Authentication, Reporting, and Conformance (DMARC) and Indirect Email
        Flows" <xref target="RFC7960" format="default" sectionFormat="of" derivedContent="RFC7960"/>.  These issues are
        not typically applicable to PSDs since they (e.g., the ".gov.example"
        used above) do not typically send mail.
        </t>
      </section>
    </section>
    <section numbered="true" toc="include" removeInRFC="false" pn="section-2">
      <name slugifiedName="name-terminology-and-definitions">Terminology and Definitions</name>
      <t indent="0" pn="section-2-1">This section defines terms used in the rest of the document.
      </t>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-2.1">
        <name slugifiedName="name-conventions-used-in-this-do">Conventions Used in This Document</name>
        <t indent="0" pn="section-2.1-1">
    The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>",
    "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>",
    "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
    "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are
    to be interpreted as described in BCP 14 <xref target="RFC2119" format="default" sectionFormat="of" derivedContent="RFC2119"/>
          <xref target="RFC8174" format="default" sectionFormat="of" derivedContent="RFC8174"/> when, and only when, they appear in all capitals,
    as shown here.
        </t>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-2.2">
        <name slugifiedName="name-public-suffix-domain-psd">Public Suffix Domain (PSD)</name>
        <t indent="0" pn="section-2.2-1"> The global Internet Domain Name System (DNS) is documented in
               numerous RFCs.  It defines a tree of names
               starting with root, ".", immediately below which are Top-Level
               Domain names such as ".com" and ".us".

               The domain name structure consists of a tree of names, each of
               which is made of a sequence of words ("labels") separated by
               period characters.  The root of the tree is simply called ".".
               The Internet community at large, through processes and policies
               external to this work, selects points in this tree at which to
               register domain names "owned" by independent organizations.
               Real-world examples are ".com", ".org", ".us", and ".gov.uk".
               Names at which such registrations occur are called "Public
               Suffix Domains (PSDs)", and a registration consists of a label
               selected by the registrant to which a desirable PSD is
               appended.  For example, "ietf.org" is a registered domain name,
               and ".org" is its PSD.
        </t>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-2.3">
        <name slugifiedName="name-organizational-domain">Organizational Domain</name>
        <t indent="0" pn="section-2.3-1"> The term "Organizational Domain" is defined in <xref target="RFC7489" sectionFormat="of" section="3.2" format="default" derivedLink="https://rfc-editor.org/rfc/rfc7489#section-3.2" derivedContent="RFC7489"/>.</t>
      </section>
      <section anchor="lpsd" numbered="true" toc="include" removeInRFC="false" pn="section-2.4">
        <name slugifiedName="name-longest-psd">Longest PSD</name>
        <t indent="0" pn="section-2.4-1"> The longest PSD is the Organizational Domain with one label
               removed. It names the immediate parent node of the Organizational
               Domain in the DNS namespace tree.</t>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-2.5">
        <name slugifiedName="name-public-suffix-operator-pso">Public Suffix Operator (PSO)</name>
        <t indent="0" pn="section-2.5-1">A Public Suffix Operator is an organization that manages
              operations within a PSD, particularly the DNS records published
              for names at and under that domain name.
        </t>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-2.6">
        <name slugifiedName="name-pso-controlled-domain-names">PSO-Controlled Domain Names</name>
        <t indent="0" pn="section-2.6-1">PSO-Controlled Domain Names are names in the DNS that are
               managed by a PSO and are not available for use as Organizational
               Domains.  PSO-Controlled Domain Names may have one (e.g., ".com")
               or more (e.g., ".co.uk") name components, depending on PSD policy.
        </t>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-2.7">
        <name slugifiedName="name-non-existent-domains">Non-existent Domains</name>
        <t indent="0" pn="section-2.7-1">For DMARC purposes, a non-existent domain is a domain for which
        there is an NXDOMAIN or NODATA response for A, AAAA, and MX records.
        This is a broader definition than that in <xref target="RFC8020" format="default" sectionFormat="of" derivedContent="RFC8020"/>.
        </t>
      </section>
    </section>
    <section numbered="true" toc="include" removeInRFC="false" pn="section-3">
      <name slugifiedName="name-psd-dmarc-updates-to-dmarc-">PSD DMARC Updates to DMARC Requirements</name>
      <t indent="0" pn="section-3-1">To participate in this experiment, implementations should interpret
      <xref target="RFC7489" format="default" sectionFormat="of" derivedContent="RFC7489"/> as described in the following subsections.</t>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-3.1">
        <name slugifiedName="name-general-updates">General Updates</name>
        <t indent="0" pn="section-3.1-1">References to "Domain Owners" also apply to PSOs.</t>
      </section>
      <section anchor="genrecfmt" numbered="true" toc="include" removeInRFC="false" pn="section-3.2">
        <name slugifiedName="name-changes-in-section-63-gener">Changes in Section 6.3 ("General Record Format")</name>
        <t indent="0" pn="section-3.2-1">The following paragraph is added to this section.  A new tag is
        added after "fo":</t>
        <blockquote pn="section-3.2-2">
          <dl newline="false" spacing="normal" indent="3" pn="section-3.2-2.1">
            <dt pn="section-3.2-2.1.1">np:</dt>
            <dd pn="section-3.2-2.1.2"> Requested Mail Receiver policy for non-existent subdomains
          (plain-text; <bcp14>OPTIONAL</bcp14>).  Indicates the policy to be
          enacted by the Receiver at the request of the Domain Owner.  It
          applies only to non-existent subdomains of the domain queried and
          not to either existing subdomains or the domain itself.  Its syntax
          is identical to that of the "p" tag defined below.  If the "np" tag
          is absent, the policy specified by the "sp" tag (if the "sp" tag is
          present) or the policy specified by the "p" tag (if the "sp" tag is
          absent) <bcp14>MUST</bcp14> be applied for non-existent subdomains.
          Note that "np" will be ignored for DMARC records published on
          subdomains of Organizational Domains and PSDs due to the effect of
          the DMARC policy discovery mechanism described in <xref target="RFC7489" sectionFormat="of" section="6.6.3" format="default" derivedLink="https://rfc-editor.org/rfc/rfc7489#section-6.6.3" derivedContent="RFC7489"/>.
	  </dd>
          </dl>
        </blockquote>
        <t indent="0" pn="section-3.2-3">The following tag definitions from DMARC are updated:
        </t>
        <dl newline="false" spacing="normal" indent="3" pn="section-3.2-4">
          <dt pn="section-3.2-4.1">p:</dt>
          <dd pn="section-3.2-4.2">The sentence 'Policy applies to the domain queried and to
          subdomains, unless subdomain policy is explicitly described using
          the "sp" tag' is updated to read 'Policy applies to the domain
          queried and to subdomains, unless subdomain policy is explicitly
          described using the "sp" or "np" tags.'
	  </dd>
          <dt pn="section-3.2-4.3">sp:</dt>
          <dd pn="section-3.2-4.4">The sentence 'If absent, the policy specified by the "p" tag
          <bcp14>MUST</bcp14> be applied for subdomains' is updated to read
          'If both the "sp" tag is absent and the "np" tag is either absent or
          not applicable, the policy specified by the "p" tag
          <bcp14>MUST</bcp14> be applied for subdomains.'
	  </dd>
        </dl>
      </section>
      <section numbered="true" removeInRFC="false" toc="include" pn="section-3.3">
        <name slugifiedName="name-changes-in-section-64-forma">Changes in Section 6.4 ("Formal Definition")</name>
        <t indent="0" pn="section-3.3-1">The ABNF <xref target="RFC5234" format="default" sectionFormat="of" derivedContent="RFC5234"/> for DMARC is updated to include a new definition,
      "dmarc-nprequest": </t>
        <sourcecode type="abnf" markers="false" pn="section-3.3-2">
            dmarc-nprequest =  "np" *WSP "=" *WSP
                ( "none" / "quarantine" / "reject" )
</sourcecode>
        <t indent="0" pn="section-3.3-3">          The "dmarc-record" definition is also updated to include the following:</t>
        <sourcecode markers="false" pn="section-3.3-4">
dmarc-record    = dmarc-version dmarc-sep
              [dmarc-request]
              [dmarc-sep dmarc-srequest]
              [dmarc-sep dmarc-auri]
              [dmarc-sep dmarc-furi]
              [dmarc-sep dmarc-adkim]
              [dmarc-sep dmarc-aspf]
              [dmarc-sep dmarc-ainterval]
              [dmarc-sep dmarc-fo]
              [dmarc-sep dmarc-rfmt]
              [dmarc-sep dmarc-percent]
              [dmarc-sep]
              [dmarc-sep dmarc-nprequest]
              ; components other than dmarc-version and
              ; dmarc-request may appear in any order
</sourcecode>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-3.4">
        <name slugifiedName="name-changes-in-section-65-domai">Changes in Section 6.5 ("Domain Owner Actions")</name>
        <t indent="0" pn="section-3.4-1">In addition to the DMARC Domain Owner actions, PSOs that require
        use of DMARC and participate in PSD DMARC ought to make that
        information available to receivers. This document is an experimental
        mechanism for doing so; see the description in <xref target="registry" format="default" sectionFormat="of" derivedContent="Appendix B"/>.
        </t>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-3.5">
        <name slugifiedName="name-changes-in-section-661-extr">Changes in Section 6.6.1 ("Extract Author Domain")</name>
        <t indent="0" pn="section-3.5-1"> Experience with DMARC has shown that some implementations
        short-circuit messages, bypassing DMARC policy application, when the
        domain name extracted by the receiver (from the RFC5322.From domain) is on
        the public suffix list used by the receiver.  This negates the
        capability being created by this specification.  Therefore, the
        following paragraph is appended to <xref target="RFC7489" sectionFormat="of" section="6.6.1" format="default" derivedLink="https://rfc-editor.org/rfc/rfc7489#section-6.6.1" derivedContent="RFC7489">the DMARC
        specification</xref>:
        </t>
        <blockquote pn="section-3.5-2">
        Note that domain names that appear on a public suffix list are
             not exempt from DMARC policy application and reporting.
</blockquote>
      </section>
      <section anchor="poldis" numbered="true" toc="include" removeInRFC="false" pn="section-3.6">
        <name slugifiedName="name-changes-in-section-663-poli">Changes in Section 6.6.3 ("Policy Discovery")</name>
        <t indent="0" pn="section-3.6-1">A new step is added between steps 3 and 4:</t>
        <blockquote pn="section-3.6-2">
          <dl newline="false" spacing="normal" indent="3" pn="section-3.6-2.1">
            <dt pn="section-3.6-2.1.1">3A.</dt>
            <dd pn="section-3.6-2.1.2">If the set is now empty and the longest PSD ([RFC9091], <xref target="lpsd" format="default" sectionFormat="of" derivedContent="Section 2.4"/>) of the Organizational Domain is
          one that the receiver has determined is acceptable for PSD DMARC
          (based on the data in one of the DMARC PSD Registry Examples described
          in <xref target="registry" format="default" sectionFormat="of" derivedContent="Appendix B"/> of [RFC9091]), the
          Mail Receiver <bcp14>MUST</bcp14> query the DNS for a DMARC TXT record
	    at the DNS domain matching the longest PSD in place of the RFC5322.From
          domain in the message (if different).  A possibly empty set of
          records is returned.
          </dd>
          </dl>
        </blockquote>
        <t indent="0" pn="section-3.6-3">As an example, for a message with the Organizational Domain of
        "example.compute.cloudcompany.com.example", the query for PSD DMARC
        would use "compute.cloudcompany.com.example" as the
        longest PSD.  The receiver
        would check to see if that PSD is listed in the DMARC PSD Registry,
        and if so, perform the policy lookup at
        "_dmarc.compute.cloudcompany.com.example".
        </t>
        <t indent="3" pn="section-3.6-4">Note: Because the PSD policy query comes after the Organizational
        Domain policy query, PSD policy is not used for Organizational Domains
        that have published a DMARC policy.  Specifically, this is not a
        mechanism to provide feedback addresses (RUA/RUF) when an
        Organizational Domain has declined to do so.
        </t>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-3.7">
        <name slugifiedName="name-changes-in-section-7-dmarc-">Changes in Section 7 ("DMARC Feedback")</name>
        <t indent="0" pn="section-3.7-1">The following paragraph is added to this section:</t>
        <blockquote pn="section-3.7-2">
          <t indent="0" pn="section-3.7-2.1"> Operational note for PSD DMARC: For PSOs, feedback for
        non-existent domains is desirable and useful, just as it is for
        org-level DMARC operators.  See <xref target="privacy" format="default" sectionFormat="of" derivedContent="Section 4"/> of [RFC9091] for discussion of privacy
        considerations for PSD DMARC.
          </t>
        </blockquote>
      </section>
    </section>
    <section anchor="privacy" numbered="true" toc="include" removeInRFC="false" pn="section-4">
      <name slugifiedName="name-privacy-considerations">Privacy Considerations</name>
      <t indent="0" pn="section-4-1">These privacy considerations are developed based on the requirements of
          <xref target="RFC6973" format="default" sectionFormat="of" derivedContent="RFC6973"/>.
          Additionally, the privacy considerations of <xref target="RFC7489" format="default" sectionFormat="of" derivedContent="RFC7489"/>
          apply to the mechanisms described by this document.
          To participate in this experiment, implementations should be aware of
          the privacy considerations described in this section.  If this
	    experiment is successful, this section should be incorporated into the
          "Privacy Considerations" section as "Feedback Leakage".
      </t>
      <t indent="0" pn="section-4-2">Providing feedback reporting to PSOs can, in some cases, cause
           information to leak out of an organization to the PSO.
	         This leakage could potentially be utilized as part of a program
		       of pervasive surveillance (see <xref target="RFC7624" format="default" sectionFormat="of" derivedContent="RFC7624"/>).  There
		             are roughly three cases to consider:
      </t>
      <dl newline="true" indent="3" spacing="normal" pn="section-4-3">
        <dt pn="section-4-3.1">Single Organization PSDs (e.g., ".google"):
</dt>
        <dd pn="section-4-3.2">RUA and RUF reports based on PSD DMARC have the potential to contain
information about emails related to entities managed by the organization.
Since both the PSO and the Organizational Domain Owners are common, there is
no additional privacy risk for either normal or non-existent domain reporting
due to PSD DMARC.
</dd>
        <dt pn="section-4-3.3">Multi-organization PSDs that require DMARC usage (e.g., ".bank"):
</dt>
        <dd pn="section-4-3.4">Reports based on PSD DMARC will only be generated for domains that do not
publish a DMARC policy at the organizational or host level.  For domains that
do publish the required DMARC policy records, the feedback reporting addresses
(RUA and RUF) of the organization (or hosts) will be used.  The only direct
risk of feedback leakage for these PSDs are for Organizational Domains that are
out of compliance with PSD policy.  Data on non-existent cousin domains would
be sent to the PSO.
</dd>
        <dt pn="section-4-3.5">Multi-organization PSDs (e.g., ".com") that do not mandate DMARC usage:
</dt>
        <dd pn="section-4-3.6">Privacy risks for Organizational Domains that have not deployed DMARC
within such PSDs are significant.  For non-DMARC Organizational Domains, all
DMARC feedback will be directed to the PSO.  PSD DMARC is opt out (by
publishing a DMARC record at the Organizational Domain level) instead of
opt in, which would be the more desirable characteristic.  This means that any
non-DMARC Organizational Domain would have its Feedback Reports redirected to
the PSO.  The content of such reports, particularly for existing domains, is
privacy sensitive.
</dd>
      </dl>
      <t indent="0" pn="section-4-4">PSOs will receive feedback on non-existent domains, which may be similar
  to existing Organizational Domains.  Feedback related to such cousin domains
  have a small risk of carrying information related to an actual
  Organizational Domain.  To minimize this potential concern, PSD DMARC
  feedback <bcp14>MUST</bcp14> be limited to Aggregate Reports. Feedback
  Reports carry more detailed information and present a greater risk.
      </t>
      <t indent="0" pn="section-4-5">Due to the inherent privacy and security risks associated with
            PSD DMARC for Organizational Domains in multi-organization PSDs
        that do not participate in DMARC, any feedback reporting
        related to multi-organizational PSDs <bcp14>MUST</bcp14> be limited
        to non-existent domains
        except in cases where the reporter knows that PSO
	      requires use of DMARC (by checking the DMARC PSD Registry).
      </t>
    </section>
    <section numbered="true" toc="include" removeInRFC="false" pn="section-5">
      <name slugifiedName="name-security-considerations">Security Considerations</name>
      <t indent="0" pn="section-5-1"> This document does not change the security considerations of
          <xref target="RFC7489" format="default" sectionFormat="of" derivedContent="RFC7489"/> and <xref target="RFC7960" format="default" sectionFormat="of" derivedContent="RFC7960"/>.
      </t>
      <t indent="0" pn="section-5-2"> The risks of the issues identified in <xref target="RFC7489" sectionFormat="of" section="12.3" format="default" derivedLink="https://rfc-editor.org/rfc/rfc7489#section-12.3" derivedContent="RFC7489"/> ("DNS Security") are
      amplified by PSD DMARC.  In particular, consequences of DNS cache poisoning (or name
      chaining) are increased because a successful attack would potentially
      have a much wider scope (see <xref target="RFC3833" format="default" sectionFormat="of" derivedContent="RFC3833"/>
      for details).
      </t>
      <t indent="0" pn="section-5-3"> The risks of the issues identified in <xref target="RFC7489" sectionFormat="of" section="12.5" format="default" derivedLink="https://rfc-editor.org/rfc/rfc7489#section-12.5" derivedContent="RFC7489"/> ("External Reporting
      Addresses") are amplified by PSD DMARC.  By design, PSD DMARC causes
      unrequested reporting of feedback to entities external to the
      Organizational Domain.  This is discussed in more detail in <xref target="privacy" format="default" sectionFormat="of" derivedContent="Section 4"/>.
      </t>
    </section>
    <section anchor="iana" numbered="true" toc="include" removeInRFC="false" pn="section-6">
      <name slugifiedName="name-iana-considerations">IANA Considerations</name>
      <t indent="0" pn="section-6-1">IANA has added a new tag to the "DMARC Tag Registry" in the
        "Domain-based Message Authentication, Reporting, and Conformance
        (DMARC) Parameters" registry. The "Status" column is defined in <xref target="RFC7489" sectionFormat="of" section="11.4" format="default" derivedLink="https://rfc-editor.org/rfc/rfc7489#section-11.4" derivedContent="RFC7489"/>.
      </t>
      <t indent="0" pn="section-6-2">The new entry is as follows:
      </t>
      <table anchor="table_1" align="center" pn="table-1">
        <name/>
        <thead>
          <tr>
            <th align="left" colspan="1" rowspan="1">Tag Name</th>
            <th align="left" colspan="1" rowspan="1">Reference</th>
            <th align="left" colspan="1" rowspan="1">Status</th>
            <th align="left" colspan="1" rowspan="1">Description</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left" colspan="1" rowspan="1">np</td>
            <td align="left" colspan="1" rowspan="1">RFC 9091</td>
            <td align="left" colspan="1" rowspan="1">current</td>
            <td align="left" colspan="1" rowspan="1">Requested handling policy for non-existent subdomains</td>
          </tr>
        </tbody>
      </table>
      <t indent="0" pn="section-6-4">

      </t>
    </section>
  </middle>
  <back>
    <references pn="section-7">
      <name slugifiedName="name-references">References</name>
      <references pn="section-7.1">
        <name slugifiedName="name-normative-references">Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" quoteTitle="true" derivedAnchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author initials="S." surname="Bradner" fullname="S. Bradner">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="1997" month="March"/>
            <abstract>
              <t indent="0">In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC5234" target="https://www.rfc-editor.org/info/rfc5234" quoteTitle="true" derivedAnchor="RFC5234">
          <front>
            <title>Augmented BNF for Syntax Specifications: ABNF</title>
            <author initials="D." surname="Crocker" fullname="D. Crocker" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="P." surname="Overell" fullname="P. Overell">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2008" month="January"/>
            <abstract>
              <t indent="0">Internet technical specifications often need to define a formal syntax.  Over the years, a modified version of Backus-Naur Form (BNF), called Augmented BNF (ABNF), has been popular among many Internet specifications.  The current specification documents ABNF. It balances compactness and simplicity with reasonable representational power.  The differences between standard BNF and ABNF involve naming rules, repetition, alternatives, order-independence, and value ranges.  This specification also supplies additional rule definitions and encoding for a core lexical analyzer of the type common to several Internet specifications.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="68"/>
          <seriesInfo name="RFC" value="5234"/>
          <seriesInfo name="DOI" value="10.17487/RFC5234"/>
        </reference>
        <reference anchor="RFC7489" target="https://www.rfc-editor.org/info/rfc7489" quoteTitle="true" derivedAnchor="RFC7489">
          <front>
            <title>Domain-based Message Authentication, Reporting, and Conformance (DMARC)</title>
            <author initials="M." surname="Kucherawy" fullname="M. Kucherawy" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="E." surname="Zwicky" fullname="E. Zwicky" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2015" month="March"/>
            <abstract>
              <t indent="0">Domain-based Message Authentication, Reporting, and Conformance (DMARC) is a scalable mechanism by which a mail-originating organization can express domain-level policies and preferences for message validation, disposition, and reporting, that a mail-receiving organization can use to improve mail handling.</t>
              <t indent="0">Originators of Internet Mail need to be able to associate reliable and authenticated domain identifiers with messages, communicate policies about messages that use those identifiers, and report about mail using those identifiers.  These abilities have several benefits: Receivers can provide feedback to Domain Owners about the use of their domains; this feedback can provide valuable insight about the management of internal operations and the presence of external domain name abuse.</t>
              <t indent="0">DMARC does not produce or encourage elevated delivery privilege of authenticated email.  DMARC is a mechanism for policy distribution that enables increasingly strict handling of messages that fail authentication checks, ranging from no action, through altered delivery, up to message rejection.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7489"/>
          <seriesInfo name="DOI" value="10.17487/RFC7489"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" quoteTitle="true" derivedAnchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author initials="B." surname="Leiba" fullname="B. Leiba">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2017" month="May"/>
            <abstract>
              <t indent="0">RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references pn="section-7.2">
        <name slugifiedName="name-informative-references">Informative References</name>
        <reference anchor="PSD-DMARC" target="https://psddmarc.org/" quoteTitle="true" derivedAnchor="PSD-DMARC">
          <front>
            <title>Public Suffix Domain DMARC</title>
            <author>
            </author>
          </front>
        </reference>
        <reference anchor="RFC3833" target="https://www.rfc-editor.org/info/rfc3833" quoteTitle="true" derivedAnchor="RFC3833">
          <front>
            <title>Threat Analysis of the Domain Name System (DNS)</title>
            <author initials="D." surname="Atkins" fullname="D. Atkins">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="R." surname="Austein" fullname="R. Austein">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2004" month="August"/>
            <abstract>
              <t indent="0">Although the DNS Security Extensions (DNSSEC) have been under development for most of the last decade, the IETF has never written down the specific set of threats against which DNSSEC is designed to protect.  Among other drawbacks, this cart-before-the-horse situation has made it difficult to determine whether DNSSEC meets its design goals, since its design goals are not well specified.  This note attempts to document some of the known threats to the DNS, and, in doing so, attempts to measure to what extent (if any) DNSSEC is a useful tool in defending against these threats.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3833"/>
          <seriesInfo name="DOI" value="10.17487/RFC3833"/>
        </reference>
        <reference anchor="RFC5598" target="https://www.rfc-editor.org/info/rfc5598" quoteTitle="true" derivedAnchor="RFC5598">
          <front>
            <title>Internet Mail Architecture</title>
            <author initials="D." surname="Crocker" fullname="D. Crocker">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2009" month="July"/>
            <abstract>
              <t indent="0">Over its thirty-five-year history, Internet Mail has changed significantly in scale and complexity, as it has become a global infrastructure service.  These changes have been evolutionary, rather than revolutionary, reflecting a strong desire to preserve both its installed base and its usefulness.  To collaborate productively on this large and complex system, all participants need to work from a common view of it and use a common language to describe its components and the interactions among them.  But the many differences in perspective currently make it difficult to know exactly what another participant means.  To serve as the necessary common frame of reference, this document describes the enhanced Internet Mail architecture, reflecting the current service.  This memo provides  information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5598"/>
          <seriesInfo name="DOI" value="10.17487/RFC5598"/>
        </reference>
        <reference anchor="RFC6973" target="https://www.rfc-editor.org/info/rfc6973" quoteTitle="true" derivedAnchor="RFC6973">
          <front>
            <title>Privacy Considerations for Internet Protocols</title>
            <author initials="A." surname="Cooper" fullname="A. Cooper">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="H." surname="Tschofenig" fullname="H. Tschofenig">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="B." surname="Aboba" fullname="B. Aboba">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Peterson" fullname="J. Peterson">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Morris" fullname="J. Morris">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M." surname="Hansen" fullname="M. Hansen">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="R." surname="Smith" fullname="R. Smith">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2013" month="July"/>
            <abstract>
              <t indent="0">This document offers guidance for developing privacy considerations for inclusion in protocol specifications.  It aims to make designers, implementers, and users of Internet protocols aware of privacy-related design choices.  It suggests that whether any individual RFC warrants a specific privacy considerations section will depend on the document's content.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6973"/>
          <seriesInfo name="DOI" value="10.17487/RFC6973"/>
        </reference>
        <reference anchor="RFC7624" target="https://www.rfc-editor.org/info/rfc7624" quoteTitle="true" derivedAnchor="RFC7624">
          <front>
            <title>Confidentiality in the Face of Pervasive Surveillance: A Threat Model and Problem Statement</title>
            <author initials="R." surname="Barnes" fullname="R. Barnes">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="B." surname="Schneier" fullname="B. Schneier">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="C." surname="Jennings" fullname="C. Jennings">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="T." surname="Hardie" fullname="T. Hardie">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="B." surname="Trammell" fullname="B. Trammell">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="C." surname="Huitema" fullname="C. Huitema">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D." surname="Borkmann" fullname="D. Borkmann">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2015" month="August"/>
            <abstract>
              <t indent="0">Since the initial revelations of pervasive surveillance in 2013, several classes of attacks on Internet communications have been discovered.  In this document, we develop a threat model that describes these attacks on Internet confidentiality.  We assume an attacker that is interested in undetected, indiscriminate eavesdropping.  The threat model is based on published, verified attacks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7624"/>
          <seriesInfo name="DOI" value="10.17487/RFC7624"/>
        </reference>
        <reference anchor="RFC7960" target="https://www.rfc-editor.org/info/rfc7960" quoteTitle="true" derivedAnchor="RFC7960">
          <front>
            <title>Interoperability Issues between Domain-based Message Authentication, Reporting, and Conformance (DMARC) and Indirect Email Flows</title>
            <author initials="F." surname="Martin" fullname="F. Martin" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="E." surname="Lear" fullname="E. Lear" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="T." surname="Draegen" fullname="T. Draegen" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="E." surname="Zwicky" fullname="E. Zwicky" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="K." surname="Andersen" fullname="K. Andersen" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2016" month="September"/>
            <abstract>
              <t indent="0">Domain-based Message Authentication, Reporting, and Conformance (DMARC) introduces a mechanism for expressing domain-level policies and preferences for email message validation, disposition, and reporting.  However, the DMARC mechanism enables potentially disruptive interoperability issues when messages do not flow directly from the author's administrative domain to the final Recipients. Collectively, these email flows are referred to as "indirect email               flows".  This document describes these interoperability issues and presents possible methods for addressing them.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7960"/>
          <seriesInfo name="DOI" value="10.17487/RFC7960"/>
        </reference>
        <reference anchor="RFC8020" target="https://www.rfc-editor.org/info/rfc8020" quoteTitle="true" derivedAnchor="RFC8020">
          <front>
            <title>NXDOMAIN: There Really Is Nothing Underneath</title>
            <author initials="S." surname="Bortzmeyer" fullname="S. Bortzmeyer">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Huque" fullname="S. Huque">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2016" month="November"/>
            <abstract>
              <t indent="0">This document states clearly that when a DNS resolver receives a response with a response code of NXDOMAIN, it means that the domain name which is thus denied AND ALL THE NAMES UNDER IT do not exist.</t>
              <t indent="0">This document clarifies RFC 1034 and modifies a portion of RFC 2308: it updates both of them.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8020"/>
          <seriesInfo name="DOI" value="10.17487/RFC8020"/>
        </reference>
        <reference anchor="RFC8126" target="https://www.rfc-editor.org/info/rfc8126" quoteTitle="true" derivedAnchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author initials="M." surname="Cotton" fullname="M. Cotton">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="B." surname="Leiba" fullname="B. Leiba">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="T." surname="Narten" fullname="T. Narten">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2017" month="June"/>
            <abstract>
              <t indent="0">Many protocols make use of points of extensibility that use constants to identify various protocol parameters.  To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper.  For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t indent="0">To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed.  This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t indent="0">This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
      </references>
    </references>
    <section anchor="experiment" numbered="true" toc="include" removeInRFC="false" pn="section-appendix.a">
      <name slugifiedName="name-psd-dmarc-privacy-concern-m">PSD DMARC Privacy Concern Mitigation Experiment</name>
      <t indent="0" pn="section-appendix.a-1">The experiment being performed has three different questions that are
      looking to be addressed in this document. </t>
      <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-appendix.a-2">
        <li pn="section-appendix.a-2.1">
          <xref target="genrecfmt" format="default" sectionFormat="of" derivedContent="Section 3.2"/> modifies policy discovery to add an
        additional DNS lookup.  To determine if this lookup is useful, PSDs
        will add additional DMARC records in place and will analyze the DMARC
        reports.  Success will be determined if a consensus of PSDs that
        publish DMARC records are able to collect useful data.</li>
        <li pn="section-appendix.a-2.2">
          <xref target="genrecfmt" format="default" sectionFormat="of" derivedContent="Section 3.2"/> adds the "np" tag for non-existent
        subdomains (DNS NXDOMAIN).  PSOs wishing to test this will add this
        flag to their DMARC record and will analyze DMARC reports for
        deployment.  Success will be determined if organizations find
        explicitly blocking non-existent subdomains desirable and that doing
        so provides added value. </li>
        <li pn="section-appendix.a-2.3">
          <xref target="privacy" format="default" sectionFormat="of" derivedContent="Section 4"/> discusses three cases where providing
        feedback could cause information to leak out of an organization.  This
        experiment will analyze the Feedback Reports generated for each case
        to determine if there is information leakage.</li>
      </ul>
    </section>
    <section anchor="registry" numbered="true" toc="include" removeInRFC="false" pn="section-appendix.b">
      <name slugifiedName="name-dmarc-psd-registry-examples">DMARC PSD Registry Examples</name>
      <t indent="0" pn="section-appendix.b-1">To facilitate experimentation around mitigation of data leakage, samples
      of the DNS-based and IANA-like registries are available at <xref target="PSD-DMARC" format="default" sectionFormat="of" derivedContent="PSD-DMARC"/>.
      </t>
      <section anchor="dnsregistry" numbered="true" toc="include" removeInRFC="false" pn="section-appendix.b.1">
        <name slugifiedName="name-dmarc-psd-dns-query-service">DMARC PSD DNS Query Service</name>
        <t indent="0" pn="section-appendix.b.1-1"> A sample stand-alone DNS query service is available at <xref target="PSD-DMARC" format="default" sectionFormat="of" derivedContent="PSD-DMARC"/>.  It was developed based on the
        contents suggested for an IANA registry in an earlier draft version of this
        document.  Usage of the service is described at <xref target="PSD-DMARC" format="default" sectionFormat="of" derivedContent="PSD-DMARC"/>.
        </t>
      </section>
      <section anchor="iana2" numbered="true" toc="include" removeInRFC="false" pn="section-appendix.b.2">
        <name slugifiedName="name-dmarc-psd-registry">DMARC PSD Registry</name>
        <t indent="0" pn="section-appendix.b.2-1"> <xref target="PSD-DMARC" format="default" sectionFormat="of" derivedContent="PSD-DMARC"/> provides an IANA-like
        DMARC Public Suffix Domain (PSD) Registry as a stand-alone DNS query
        service.  It follows the contents and structure described below.
        There is a Comma-Separated Value (CSV) version of the listed PSDs
        that is suitable for use in build updates for PSD DMARC-capable software.
        </t>
        <t indent="0" pn="section-appendix.b.2-2">PSDs that are deploying DMARC and are participating in PSD DMARC
            must register their public suffix domain in this
	           new registry.   The requirement has to be documented in a
		          manner that satisfies the terms of Expert Review, per <xref target="RFC8126" format="default" sectionFormat="of" derivedContent="RFC8126"/>.  The Designated Expert needs to confirm that
			         provided documentation adequately describes PSD policy to require
				        Domain Owners to use DMARC or that all Domain Owners are part of
					       a single organization with the PSO.
        </t>
        <t indent="0" pn="section-appendix.b.2-3">The authoritative registry can be found here:
          <eref brackets="angle" target="https://psddmarc.org"/></t>
      </section>
      <section anchor="pslplus" numbered="true" toc="include" removeInRFC="false" pn="section-appendix.b.3">
        <name slugifiedName="name-dmarc-psd-psl-extension">DMARC PSD PSL Extension</name>
        <t indent="0" pn="section-appendix.b.3-1"> <xref target="PSD-DMARC" format="default" sectionFormat="of" derivedContent="PSD-DMARC"/> provides a file formatted like the
               Public Suffix List (PSL) in order to
               facilitate identification of PSD DMARC participants.  Contents are
               functionally identical to the IANA-like registry but presented in
               a different format.
        </t>
        <t indent="0" pn="section-appendix.b.3-2"> When using this approach, the input domain of the extension lookup
               is supposed to be the output domain of the regular PSL lookup, i.e.,
               the Organizational Domain.  This alternative data approach is
               potentially useful since DMARC implementations already need to be
               able to parse the data format, so it should be easier to implement.
        </t>
      </section>
    </section>
    <section anchor="implementations" numbered="true" toc="include" removeInRFC="false" pn="section-appendix.c">
      <name slugifiedName="name-implementations">Implementations</name>
      <t indent="0" pn="section-appendix.c-1"> There are two known implementations of PSD DMARC available for testing.
      </t>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-appendix.c.1">
        <name slugifiedName="name-authheaders-module">Authheaders Module</name>
        <t indent="0" pn="section-appendix.c.1-1">The authheaders Python module and command line tool is available
	    for download or installation from Pypi (Python Packaging Index).
        </t>
        <t indent="0" pn="section-appendix.c.1-2">It supports both use of the DNS-based query service and download
	    of the CSV registry file from <xref target="PSD-DMARC" format="default" sectionFormat="of" derivedContent="PSD-DMARC"/>.
        </t>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-appendix.c.2">
        <name slugifiedName="name-zdkimfilter-module">Zdkimfilter Module</name>
        <t indent="0" pn="section-appendix.c.2-1">The zdkimfilter module is a separately available add-on to
            Courier-MTA.
        </t>
        <t indent="0" pn="section-appendix.c.2-2">Mostly used for DomainKeys Identified Mail (DKIM) signing, it can
        be configured to also verify, apply DMARC policies, and send Aggregate
        Reports.  For PSD DMARC, it uses the PSL extension list approach, which
        is available from <xref target="PSD-DMARC" format="default" sectionFormat="of" derivedContent="PSD-DMARC"/>.
        </t>
      </section>
    </section>
    <section anchor="thanks" numbered="false" toc="include" removeInRFC="false" pn="section-appendix.d">
      <name slugifiedName="name-acknowledgements">Acknowledgements</name>
      <t indent="0" pn="section-appendix.d-1"> Thanks to the following individuals for their contributions (both
      public and private) to improving this document:
      <contact fullname="Kurt Andersen"/>, <contact fullname="Seth       Blank"/>, <contact fullname="Dave Crocker"/>, <contact fullname="Heather       Diaz"/>, <contact fullname="Tim Draegen"/>, <contact fullname="Zeke       Hendrickson"/>, <contact fullname="Andrew Kennedy"/>, <contact fullname="John Levine"/>, <contact fullname="Dr. Ian Levy"/>, <contact fullname="Craig Schwartz"/>, <contact fullname="Alessandro Vesely"/>,
      and <contact fullname="Tim Wicinski"/>.</t>
      <t indent="0" pn="section-appendix.d-2">A special mention to
      <contact fullname="Dave Crocker"/> for coming up with the name.</t>
    </section>
    <section anchor="authors-addresses" numbered="false" removeInRFC="false" toc="include" pn="section-appendix.e">
      <name slugifiedName="name-authors-addresses">Authors' Addresses</name>
      <author initials="S." surname="Kitterman" fullname="Scott Kitterman">
        <organization showOnFrontPage="true">fTLD Registry Services</organization>
        <address>
          <postal>
            <extaddr>Suite 400</extaddr>
            <street>600 13th Street, NW</street>
            <city>Washington</city>
            <region>DC</region>
            <code>20005</code>
            <country>United States of America</country>
          </postal>
          <phone>+1 301 325-5475</phone>
          <email>scott@kitterman.com</email>
        </address>
      </author>
      <author role="editor" initials="T." surname="Wicinski" fullname="Tim Wicinski">
        <organization showOnFrontPage="true"/>
        <address>
          <postal>
            <street/>
            <city>Elkins</city>
            <code>26241</code>
            <country>United States of America</country>
            <region>WV</region>
          </postal>
          <phone/>
          <email>tjw.ietf@gmail.com</email>
          <uri/>
        </address>
      </author>
    </section>
  </back>
</rfc>
