<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.0.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-gondwana-dkim2-motivation-01" category="std" consensus="true" submissionType="IETF" obsoletes="4686" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="DKIM2 Motivation">DKIM2 Why DKIM needs replacing, and what a replacement would look like</title>

    <author initials="B." surname="Gondwana" fullname="Bron Gondwana">
      <organization>Fastmail Pty Ltd</organization>
      <address>
        <postal>
          <street>Level 2, 114 William Street</street>
          <code>3000</code>
          <country>Australia</country>
        </postal>
        <phone>+61 457 416 436</phone>
        <email>brong@fastmailteam.com</email>
      </address>
    </author>
    <author initials="R." surname="Clayton" fullname="Richard Clayton">
      <organization>Yahoo</organization>
      <address>
        <email>rclayton@yahooinc.com</email>
      </address>
    </author>
    <author initials="W." surname="Chuang" fullname="Wei Chuang">
      <organization>Google</organization>
      <address>
        <email>weihaw@google.com</email>
      </address>
    </author>

    <date year="2024" month="November" day="03"/>

    
    
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 43?>

<t>This memo provides a rationale and outline design for replacing the existing email security
mechanisms with a new mechanism based around a more strongly authenticated
email delivery pathway, including an asynchronous return channel.</t>



    </abstract>



  </front>

  <middle>


<?line 49?>

<section anchor="background-and-motivations"><name>Background and motivations</name>

<t>In 2007, <xref target="RFC4871"/> (Domain Key Identified Mail / DKIM) was published, outlining a
mechanism for a domain to sign email in a way that recipients could ensure
that the email had come from an entity possessing the secret key matching
a public key published in the DNS by the source domain. For clarity in this
document we call this established scheme "DKIM1".</t>

<t>This document has been obsoleted and updated many times since then, and a
large amount of operational experience has been gained using it. However, it
has some known weaknesses with some kinds of email flow.</t>

<t>If an intermediary alters the email then the original DKIM1 signature will no
longer be verifiable. In 2019, <xref target="RFC8617"/> (Authenticated Received Chain / ARC)
attempted to solve this issue. However, it does not provide a mechanism for
determining whether recipients will recognise the ARC signatures or trust the veracity
of the systems that add them.</t>

<t>A further issue is that bad actors may "replay" bad email that systems have DKIM
signed and erode the reputation of the signer.</t>

<t>Ad hoc systems have been developed so that systems that have placed a DKIM
signature onto an email may be informed about the quality of the messages that
they are relaying -- so called feedback loops. However, there are no formal
specifications for such schemes and feedback may be sent where it is not
actually required.</t>

<t>Furthermore, where the origin of a message has been forged and the final
intermediary in a chain finds that it is undeliverable, then the Delivery
Status Notification (DSN) may be sent to an unsuspecting third-party -- a phenomenon
called backscatter.</t>

<t>This document solves these and related problems in a holistic way, by having
every hop in a forwarding chain responsible for:</t>

<t><list style="numbers" type="1">
  <t>verifying the path that messages have taken to get to it, including by
being able to reverse modifications
or by asserting that it trusts the previous hop unconditionally, and that
it is the declared next hop in the chain.</t>
  <t>declaring (under protection of its own signature) where the message is being
sent to next.</t>
  <t>asserting that it will pass control messages (including bounces, abuse
reports and delivery notifications) back to the previous hop for a reasonable
time.</t>
</list></t>

</section>
<section anchor="design-goals"><name>Design Goals</name>

<t><list style="numbers" type="1">
  <t>It is intended that legacy mail systems constructed in the last century will be
able to interoperate with this new specification. However, more recently
developed systems will, after a period of parallel running, need to be
upgraded in order to continue to be able to authenticate email.</t>
  <t>We favor simplicity over obscure functionality.</t>
  <t>We aim to keep the number of cryptographic operations required the same
or less, for all the most common types of email flow.</t>
  <t>We aim to make all parts of the specification mandatory to implement because
experience shows that interworking is adversely affected by providing optional
functionality.</t>
</list></t>

</section>
<section anchor="basic-ideas"><name>Basic ideas</name>

<t>An email is DKIM2 signed by the originator -- in pretty much the same way as is
done in the existing DKIM1 standard. In practice the vast majority of mail is
signed using relaxed/relaxed methods. DKIM2 will only allow relaxed/relaxed.</t>

<t>Each "hop" that handles the email adds another, sequentially numbered, DKIM2
header field. A simple relay will only add a single header. Email
service providers will often add two, one on behalf of the actual originator the other
for themselves. A relay that rewrites email from one domain to another will
add two headers to record the rewriting.</t>

<t>If an email is accepted by a server but it is later found that it cannot be
delivered onward, or further analysis of its contents leads to a determination
that it should not be delivered after all, then the previous hop is informed by means of a
Delivery Status Notification (DSN). If a DSN is received for an email that was
previously relayed, then the DSN is passed back to the system that delivered the
email. Hence, DSNs are returned back along the "outgoing path" until they reach a
system that can take responsibility for handling the report.</t>

<t>The DKIM2 headers contain the source and destination of the email. They may
also request "feedback" from later entities as to the quality of the email.
This feedback is sent directly from systems that choose to honor such
requests to any all of the requestors that the sender deems appropriate.</t>

<t>Intermediaries that alter emails record their actions (so that later hops can
undo and check signatures). Intermediaries whose alterations are too complex
to be described or reversed will either have to arrange to be treated as the
originator of the message (if they are near the start of the message's
journey) or they will need to implicitly trusted by any further intermediaries
(if they are near the end of the message's) journey.</t>

<t>Intermediaries that duplicate ("explode") emails, record their action so that
any further systems that see multiple copies of the email will not reject or
discard the email as a "replay".</t>

</section>
<section anchor="how-the-aims-of-dkim2-are-achieved"><name>How the aims of DKIM2 are achieved</name>

<section anchor="simplification-codification"><name>Simplification &amp; codification</name>

<t><strong>Issue</strong>:</t>

<t>Every DKIM1 signature specifies an explicit list of which email header fields
have been signed. This leads to inconsistent signing of headers, and allows a
signature to be created in which security-critical headers are not covered.
To prevent bad actors from adding headers which were not originally present
it is common to oversign by signing null versions of headers that are not
present. This oversigning may be extended to signing two, for example, Subject
header fields because some recipients may not enforce the <xref target="RFC5322"/> requirement
of uniqueness.</t>

<t><strong>Mitigation:</strong></t>

<t>DKIM2 will specify a fixed set of headers in accordance with now well-established
best practice (and insist they are unique) so there will be no need to list what
is signed.</t>

<t>However, some exotic headers may need to be signed for unusual or future use-cases.
DKIM2 will allow this with an h= field.</t>

</section>
<section anchor="preventing-backscatter"><name>Preventing backscatter</name>

<t><strong>Issue:</strong></t>

<t>With DKIM1, you can send delayed bounces if the message has come directly to you and
the DKIM signature is DMARC aligned, but otherwise you need to reject at SMTP transaction time
to ensure you won't be creating backscatter.</t>

<t><strong>Mitigation:</strong></t>

<t>Provided that an email is correctly signed when received, it can be rejected at
a later point in time. The DSN will be sent to the immediately preceding intermediary.
Since the bounce travels back along the (fully authenticated) incoming path it
cannot be sent to an uninvolved third party.</t>

</section>
<section anchor="improved-privacy-for-forwarders"><name>Improved privacy for forwarders</name>

<t><strong>Issue:</strong></t>

<t>If you want to create a privacy preserving forwarding service, you need to SRS rewrite
the email's bounce address so that bounces don't accidentally leak the real address of the recipient.</t>

<t><strong>Mitigation:</strong></t>

<t>Since the DSN messages always go back up the DKIM2 chain, any hop can strip off the
higher number (i=) records; including the sender and recipient addresses for them,
and create a bounce as if the forwarder itself was doing the rejection.  As asynchronous
bounces will be common in DKIM2, this is indistinguishable to the sender.</t>

</section>
<section anchor="simplifying-error-handling-for-intermediaries"><name>Simplifying error handling for intermediaries</name>

<t><strong>Issue:</strong></t>

<t>ESPs and other entities that send email on behalf of others have a need to know when delivery
errors occur. At present this can only be done by changing the RFC5321 return path so that DSNs will
be delivered to an intermediary rather than original sender. Non-standardised mechanisms
such as VERP or SRS may be employed to be able to pin down the details of the failure.</t>

<t><strong>Mitigation:</strong></t>

<t>In DKIM2 DSNs are passed back along the outgoing path so the ESP will receive
the DSN and, depending on contractual arrangements, may be able to avoid passing this
message any further back along the chain.</t>

<t><strong>Issue:</strong></t>

<t>A mailing list wishes to learn when email it has handled cannot be delivered. At present
DSNs (as opposed to next hop delivery rejections) are often passed to the originator of the
email (the value in the <xref target="RFC5321"/> MAIL FROM) and are invisible to the mailing list.</t>

<t><strong>Mitigation:</strong></t>

<t>Passing bounces back along the outgoing path allows a mailing list to take responsibility
for the event and not bother the person who sent a message to the list.</t>

</section>
<section anchor="the-mailing-list-dmarc-issue"><name>The "mailing list DMARC issue"</name>

<t><strong>Issue:</strong></t>

<t>Once an intermediate (for example, a mailing list or alumni forwarder) makes a
change to the header or body of a message, the hashes covered by the sender's
DKIM signature no longer match, and it's not possible to see whether the message
is semantically similar, or has been completely replaced by a bad actor.</t>

<t><strong>Mitigation:</strong></t>

<t>DKIM2 will define an algebra for describing how to reverse any changes to
create the prior binary data, by inspecting the diff between the two versions,
recipients will be able to see who injected bad content.</t>

<t>Mailing lists (or alumni forwarders etc.) that alter the Subject header field
(or other <xref target="RFC5322"/> headers) will record the previous header field contents.
This is easy to undo for checking purposes.</t>

<t>Mailing lists that add text (either to a simple email body or one or more MIME parts
within the body) will record details of the text they have added. This text can then be
removed when checking earlier signatures.</t>

<t>We expect the "algebra" describing changes to be in a stand-alone document that
need not be finalised on the same timescale as DKIM2 itself.</t>

</section>
<section anchor="security-gateways"><name>Security gateways</name>

<t><strong>Issue:</strong></t>

<t>There are some types of alteration, for example by security gateways, that may
be impractical to describe in a cost-effective manner.</t>

<t><strong>Mitigation:</strong></t>

<t>We would expect that outgoing gateways that may be adding disclaimers or rewriting 
internal identifiers would be provided with appropriate signing keys so that they
could be the "first hop" as far as the rest of the email handling chain is concerned.</t>

<t>Incoming security gateways may be making substantial changes. Typically they
will remove problematic types of attachment and rewrite URLs to use "interstitials".
Since this type of functionality is generally provided on a contracted basis
further intermediaries will be fully aware of the presence of the security gateway and
can be configured to implicitly trust that it has checked earlier signatures and found them
to be correct. Hence there is not need to be able to "undo" these changes.</t>

</section>
<section anchor="addressing-dkim-replay"><name>Addressing DKIM-replay</name>

<t><strong>Issue:</strong></t>

<t>Because an email can currently be sent as "Bcc" such that there's no evidence in
the message data of who the recipient is expected to be, it's possible to take a
message that is correctly signed and replay it millions of times to different
destination addresses as if they had been BCC'd.  This message can be resent at
any time.</t>

<t><strong>Migitation:</strong></t>

<t>DKIM2 headers will always have timestamps so that "old" signatures have no value.</t>

<t>DKIM2 headers specify both "from" and "to" so that most opportunities to alter a
message, re-sign it and replay it at scale will no longer be possible.  Since the
"to" address is always encoded in the email, any email to multiple recipients must
be exploded by the sender, and each copy signed separately with different headers.</t>

<t>If the email is replayed (perhaps through a large system with many different
customers) then if the email does not say that it has been duplicated then signatures
can be assumed to be unique and hence simple caching (or Bloom filters) will identify
replays. If the email has been duplicated then recipients can assign a reputation to
the entity that did the duplication (along with the expected number of duplicates
that will arrive from that entity) and assess duplicate signatures on that basis.</t>

<t>If the email is altered before duplication then it is again the case that this will
be apparent to the recipient who can develop a reputation system for the entity that
did the modification and replay.</t>

</section>
<section anchor="algorithmic-dexterity"><name>Algorithmic dexterity</name>

<t>The specification will require both RSA and elliptic curve be implemented. If there
is IETF consensus around a "post-quantum" scheme then that will also be included. Experience
with DKIM1 is that everyone supports RSA keys and EC support is very patchy so we will
emphasize this aspect in bake-offs etc.</t>

<t>Dexterity will become essential if advances in cryptanalysis cause a particular type of algorithm
to become deprecated. To allow a phased switch away from such an algorithm we will make provision
for more than one signature to be present in a single DKIM2 header. Systems capable of checking
both signatures will require both to be correct. If only one signature is correct then email
will be rejected with a clear message -- allowing interworking issues to be easily debugged.</t>

</section>
<section anchor="reducing-crypto-calculations"><name>Reducing crypto-calculations</name>

<t>Experience at large mailbox providers is that incoming messages can have large numbers of DKIM
signatures all of which need to be checked. For DKIM2, in the common case where email has
not been altered by earlier hops, it will only be necessary to check the first DKIM2 signature,
the one applied by the previous hop and, if "feedback" is to be provided, the signatures of
any entities that have requested feedback.</t>

<t>If DKIM-replay is felt to be an issue (and some providers will detect this by
identifying non-unique signatures) then more DKIM2 headers may need to be processed
to establish the veracity of an alleged forwarding path. Additionally any attempt to
do forensics or to assign reputation to intermediates will require more signatures
to be checked.</t>

</section>
</section>
<section anchor="dkim2-header-fields"><name>DKIM2 header fields</name>

<t>DKIM2 headers will have the following fields</t>

<texttable>
      <ttcol align='left'>Field identifier</ttcol>
      <ttcol align='left'>Explanation</ttcol>
      <c>i=</c>
      <c>Sequence Number (from 1 to N)</c>
      <c>t=</c>
      <c>Timestamp</c>
      <c>ds=</c>
      <c>Signing key identifier (domain &amp; selector)</c>
      <c>a=</c>
      <c>Crypto algorithm(s) used (unless combined with b= to allow for multiple signatures on the same email, see discussion of crypto-agility above)</c>
      <c>b=</c>
      <c>Signature over hash value strings (DKIM uses b=)</c>
      <c>bh=</c>
      <c>Body hash value (see discussion)</c>
      <c>h=</c>
      <c>Extra headers signed by this hop</c>
      <c>m=</c>
      <c>Indicates if mail has been modified or exploded</c>
      <c>mf=</c>
      <c>RFC5321.mail-from</c>
      <c>rt=</c>
      <c>RFC5321.rcpt-to</c>
      <c>fb=</c>
      <c>feedback requested for this email</c>
      <c>n=</c>
      <c>a nonce value (could use for database lookup for DSN handling)</c>
</texttable>

<t>At the first hop there cannot be any modification, so instead the m= field is used to indicate
a request by the sender that the email never be modified and/or never be “exploded” to multiple
recipients. This might be appropriate for some types of transactional email. Since it is only
a request, intermediaries may, by local policy, not honor it, but they SHOULD NOT relay
mail where the request has not been honored to third parties.</t>

<t>We will always hash headers in a "relaxed" mode (to use the DKIM1 jargon). For the body we will
always use "relaxed" because that is the usual scheme for DKIM1. Relaxed is more expensive than
"simple" but there have been concerns about expressed about interworking. The vast majority of
DKIM1 email (99%+) uses relaxed/relaxed.</t>

<t>The hashes of the header and the body can be placed into the DKIM2 header field, and then
a signature is applied. Alternatively we could define a signature over the hashes but
not record their values. The second is neater but the former does allow an unchanged body
hash to just be copied and may assist in diagnosing faults. Note also, that there is no
technical reason for computing two hashes rather than one, but the presence of an
obviously unchanged body hash may again be useful for fault diagnosis and may assist
humans in reasoning about how and where changes were made to the body.</t>

<t>The nonce value is available for any purpose, but may well be used as an index
into a database to access meta-data about an email that has been handled in the
past. DKIM2 signatures expire after a fixed period (a week would be appropriate) so that
it is not necessary to hold information for indefinite periods or to handle DSNs
for email that was delivered long ago.</t>

<t>Note that we have not included a version number. Experience from MIME onwards shows
that it is essentially impossible to change version numbers. If it becomes necessary to
change DKIM2 in the sort of incompatible way that a v=2 / v=3 version number would
support, we recommend using header fields labeled DKIM3 instead.</t>

<t>For simplicity using single characters before the = would be good, but we quickly run
out of obvious relevant letters. Where there is a match to DKIM1 fields these have
been copied (though this is merely to assist humans, it's unlikely to affect any code).</t>

<section anchor="value-of-rt"><name>Value of rt=</name>

<t>Note that is inherent in the DKIM2 design that emails are only ever
sent to one recipient at a time. At present some mail servers will
batch deliveries together if they are going to the same destination
and issue multiple RCPT TO commands in the SMTP protocol conversation.
This is not possible with DKIM2 because each email must document a
single RFC5321 destination in the rt= parameter. This may seem
inefficient but only about 1% of email is currently delivered using
multiple RCPT TO commands.</t>

</section>
<section anchor="maximum-value-for-i"><name>Maximum value for i=</name>

<t>There will be an absolutely maximum value of 255 for i=; though realistically we
should be able to bring this value back down to about 50.</t>

</section>
<section anchor="maximum-age-for-t"><name>Maximum age for t=</name>

<t>For a message in transit, the timestamp MUST be less than one week ago.  For bounces,
they MUST be returned to their source within 2 weeks of the timestamp on hop i=1.
This requires that as the destination, you MUST create the bounce within 1 week of receipt.</t>

</section>
<section anchor="registry-of-values-for-m"><name>Registry of values for m=</name>

<texttable>
      <ttcol align='left'>Value</ttcol>
      <ttcol align='left'>Purpose</ttcol>
      <c>nomodify</c>
      <c>Any hop that adds this requires no modifications; anybody later hop must either reject it or agree to pass it on unmodified</c>
      <c>header</c>
      <c>This hop has modified the headers; a separate header lists the algebra to revert the changes</c>
      <c>body</c>
      <c>This hop has modified the body; a separate header lists the algebra to revert the changes</c>
      <c>complex</c>
      <c>This hop has done something complex and there is no way to revert it</c>
</texttable>

<t>If there is no "m" value then this hop asserts it has not modified either the body nor any header covered by a previous DKIM2 signature.</t>

</section>
<section anchor="value-for-the-fb-header"><name>Value for the fb= header</name>

<t>Not present, do not send feedback for this email to the signing domain</t>

<t>fb=y - this signing domain would like to receive feedback about the disposition of this email (e.g. percentage reported as spam).</t>

</section>
</section>
<section anchor="checking-hashes"><name>Checking hashes</name>

<t>For clarity this is written as if there is only one hash and signature to check, whereas there
may in fact be one for the header and one for the body. Issues with DNS will cause <xref target="RFC5321"/>
4xx responses to be sent.</t>

<section anchor="step-1"><name>Step 1</name>

<t>Find the latest DKIM2 signature and determine if the email as received matches that hash
AND that you are named as the destination of the email AND that the mail is coming from
the named source. If not then refuse to accept the email. The previous hop is responsible
for the email (they have either forged it or mangled it -- either way it is their problem).</t>

<t>If this check passes then other checks can either be done at delivery time or the mail
can be accepted and if later rejected there is a valid path back to the sender over
which a DSN can be sent.</t>

<t>If it is decided, by local policy, to accept an email where the hash fails (or you are
not the documented recipient) then DSN messages back along the chain MUST NOT be sent.</t>

</section>
<section anchor="step-2"><name>Step 2</name>

<t>Find the first DKIM2 header (numbered 1) and determine if the email as received has
the same hash as recorded there. If so, you know the email has not been altered on
its way to you. The path it has followed is most likely irrelevant for deciding what
to do with it.</t>

</section>
<section anchor="dealing-with-modifications"><name>Dealing with modifications.</name>

<t>Find the highest numbered DKIM2 header that reports a modification. Undo the modification
and repeat. When all modifications have been done then there should be a match
with the original signature (at hop1). If not then the email has been altered (in an
undocumented manner) on its way to you and it SHOULD be rejected.</t>

<t>Note that it is not necessary to check the signature on a DKIM2 header that reports
a modification. Undoing the modification and discovering that the message can now
be authenticated is sufficient.</t>

<t>Over time a reputation can be developed for a intermediary which is making
modifications and given sufficient trust then the "undo" step could be skipped. Note
that the signature of the DKIM2 header that reports the modification would need
to be checked to ensure reputation accrued to the correct entity.</t>

<t>If the modification is substantial (eg URLs rewritten, MIME parts removed) and
it cannot be undone then the receiver (who may not be the immediate next hop)
MUST trust the system doing the modification. If it does not then the mail
SHOULD be rejected.</t>

<t>It will be noted that some modifications can totally change the meaning of
an email. This specification does not try to limit modifications. We believe
that being able to attribute modifications to a particular entity will allow
reliable blocking of malicious intermediaries once they are identified.</t>

</section>
<section anchor="dealing-with-replays"><name>Dealing with replays</name>

<t>Checking source and destination as recorded by the previous hop makes many
“DKIM replay” scenarios impossible.</t>

<t>It is possible to exclude all replays by determining if any DKIM2 header reports an
expansion event (one incoming email resulting in multiple further emails). If not
then you would expect that the (original) hash of the email is unique and duplicates
can be rejected.</t>

<t>If a expansion event is recorded then receiving multiple copies would not
be a surprise. It will be necessary to use local policy to assess whether the
number of copies received is acceptable or not.</t>

<t>Over time you may wish to develop a reputation for a DKIM2 identity which is
doing expansions and conclude that a specific number of copies is to be expected.
This can be used to refine local policy.</t>

</section>
</section>
<section anchor="feedback-loops"><name>Feedback loops</name>

<t>Some mailbox providers are prepared to report their, or their customers',
opinions about incoming email -- for example: that a customer marked a
particular email as "spam". These systems are generally called "feedback
loops".</t>

<t>There are usually bureaucratic systems to ensure reports are only sent to
entities that wish to receive them and the mailbox provider may decide that
some entities should not be sent any feedback.</t>

<t>The senders of email, the originator and/or a commercial company (an ESP)
hired to send the email generally favor feedback loops because it allows
them to make their emails more acceptable, and the commercial companies
can rapidly become aware of customers whose email is widely disliked.</t>

<t>In DKIM2 any intermediary can request feedback, but it is still the decision
of the mailbox provider as to whether any feedback will be sent. They may
still require pre-registration on a per domain basis to receive feedback
if only to ensure that any nominated email address is appropriate and is
not an unsuspecting third party.</t>

<t>Note that feedback can be sent to any requesting entity. There is nothing
special about a requester being at hop1 or hop2 on a chain. In particular
some forwarding systems late in the chain may wish to become aware if they
are forwarding emails that are then reported to be spam.</t>

</section>
<section anchor="dkim1dkim2-interworking"><name>DKIM1/DKIM2 Interworking</name>

<t>Note that DKIM2 signed email can also be DKIM1 signed, and so systems
that are not DKIM2 aware can and will operate as they do at present.</t>

<t>DKIM2 capable servers will announce the capability in their initial banner
in the usual manner for SMTP extensions.</t>

<t>When a DKIM2 signed email is delivered to a server that does not understand
DKIM2 and leaves the DKIM2 ecosystem the DKIM2 specific events can no longer
be expected to occur. In particular any failures to be deliver will be
reported to the address in the relevant return path and not back along
the DKIM2 chain.</t>

<t>A DKIM2 signed email may be delivered to a server that understands DKIM2 but
if that server needs to forward the email elsewhere it may find that there
is no signing key available for the relevant domain (recalling that the
incoming email recorded the destination domain and it is necessary for
the next "hop" to match with that. In such a case, once more the email
will leave the DKIM2 ecosystem.</t>

<t>Refusing to allow an email to leave the DKIM2 ecosystem may be an appropriate
choice in some circumstances. If so then an appropriate DSN should be
created and passed back along the chain in the normal manner.</t>

<t>It is more likely that local policy will be to pass the email to the next
intermediary even though this means that it leaves the DKIM2 ecosystem. In
such a case it would be possible to add a final DKIM2 header to record
this event, but doing this adds considerable complexity, and would provide
limited information which was not otherwise available, hence no such
header will be added.</t>

<t>If, after having left the DKIM2 ecosystem, the email reaches a DKIM2 aware
system then the email may have been altered in such a way that the DKIM2
signatures now fail. The receiving system will apply its local policy to
determine whether or not to accept the email.</t>

<t>If the DKIM2 signatures on the mail are valid, except that the last header
does not specify the receiving system as the next hop, then once again it
will a matter for local policy as to whether to accept the email. It might
be thought that it was obvious that the email was acceptable, but the
non-DKIM2-aware intermediaries that have handled it may have duplicated
the email and there will be no DKIM2 headers to record this.</t>

<t>In any event, systems that accept email which has been outside the DKIM2
ecosystem MUST NOT add any further DKIM2 headers.</t>

</section>
<section anchor="security"><name>Security</name>

<t>TBA</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>TBA</t>

</section>


  </middle>

  <back>



    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC4871">
  <front>
    <title>DomainKeys Identified Mail (DKIM) Signatures</title>
    <author fullname="E. Allman" initials="E." surname="Allman"/>
    <author fullname="J. Callas" initials="J." surname="Callas"/>
    <author fullname="M. Delany" initials="M." surname="Delany"/>
    <author fullname="M. Libbey" initials="M." surname="Libbey"/>
    <author fullname="J. Fenton" initials="J." surname="Fenton"/>
    <author fullname="M. Thomas" initials="M." surname="Thomas"/>
    <date month="May" year="2007"/>
    <abstract>
      <t>DomainKeys Identified Mail (DKIM) defines a domain-level authentication framework for email using public-key cryptography and key server technology to permit verification of the source and contents of messages by either Mail Transfer Agents (MTAs) or Mail User Agents (MUAs). The ultimate goal of this framework is to permit a signing domain to assert responsibility for a message, thus protecting message signer identity and the integrity of the messages they convey while retaining the functionality of Internet email as it is known today. Protection of email identity may assist in the global control of "spam" and "phishing". [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4871"/>
  <seriesInfo name="DOI" value="10.17487/RFC4871"/>
</reference>

<reference anchor="RFC5321">
  <front>
    <title>Simple Mail Transfer Protocol</title>
    <author fullname="J. Klensin" initials="J." surname="Klensin"/>
    <date month="October" year="2008"/>
    <abstract>
      <t>This document is a specification of the basic protocol for Internet electronic mail transport. It consolidates, updates, and clarifies several previous documents, making all or parts of most of them obsolete. It covers the SMTP extension mechanisms and best practices for the contemporary Internet, but does not provide details about particular extensions. Although SMTP was designed as a mail transport and delivery protocol, this specification also contains information that is important to its use as a "mail submission" protocol for "split-UA" (User Agent) mail reading systems and mobile environments. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5321"/>
  <seriesInfo name="DOI" value="10.17487/RFC5321"/>
</reference>

<reference anchor="RFC5322">
  <front>
    <title>Internet Message Format</title>
    <author fullname="P. Resnick" initials="P." role="editor" surname="Resnick"/>
    <date month="October" year="2008"/>
    <abstract>
      <t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of "electronic mail" messages. This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, "Standard for the Format of ARPA Internet Text Messages", updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5322"/>
  <seriesInfo name="DOI" value="10.17487/RFC5322"/>
</reference>

<reference anchor="RFC8617">
  <front>
    <title>The Authenticated Received Chain (ARC) Protocol</title>
    <author fullname="K. Andersen" initials="K." surname="Andersen"/>
    <author fullname="B. Long" initials="B." role="editor" surname="Long"/>
    <author fullname="S. Blank" initials="S." role="editor" surname="Blank"/>
    <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy"/>
    <date month="July" year="2019"/>
    <abstract>
      <t>The Authenticated Received Chain (ARC) protocol provides an authenticated "chain of custody" for a message, allowing each entity that handles the message to see what entities handled it before and what the message's authentication assessment was at each step in the handling.</t>
      <t>ARC allows Internet Mail Handlers to attach assertions of message authentication assessment to individual messages. As messages traverse ARC-enabled Internet Mail Handlers, additional ARC assertions can be attached to messages to form ordered sets of ARC assertions that represent the authentication assessment at each step of the message-handling paths.</t>
      <t>ARC-enabled Internet Mail Handlers can process sets of ARC assertions to inform message disposition decisions, identify Internet Mail Handlers that might break existing authentication mechanisms, and convey original authentication assessments across trust boundaries.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8617"/>
  <seriesInfo name="DOI" value="10.17487/RFC8617"/>
</reference>




    </references>




<?line 577?>

<section anchor="changes-from-earlier-versions"><name>Changes from Earlier Versions</name>

<t>[[This section to be removed by RFC Editor]]</t>

<section anchor="draft-gondwana-dkim2-motivation-01"><name>draft-gondwana-dkim2-motivation-01:</name>

<t><list style="symbols">
  <t>remove the <spanx style="verb">z=</spanx> parameter on the grounds that it adds too much complexity</t>
  <t>document that messages MUST NOT re-enter the DKIM2 world once the chain
has been broken.</t>
</list></t>

</section>
<section anchor="draft-gondwana-dkim2-motivation-00"><name>draft-gondwana-dkim2-motivation-00:</name>

<t><list style="symbols">
  <t>initial version</t>
</list></t>

</section>
</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

