DKIM D. Crocker, Ed. Internet-Draft Brandenburg InternetWorking Intended status: Standards Track February 5, 2009 Expires: August 9, 2009 RFC 4871 DomainKeys Identified Mail (DKIM) Signatures -- Errata draft-ietf-dkim-rfc4871-errata-02 Status of this Memo This Internet-Draft is submitted to IETF in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet- Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt. The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html. This Internet-Draft will expire on August 9, 2009. Copyright Notice Copyright (c) 2009 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Abstract This documents and resolves errata for RFC 4871, DomainKeys Identified Mail (DKIM) Signatures. Specifically the document Crocker Expires August 9, 2009 [Page 1] Internet-Draft RFC4871 Errata February 2009 clarifies the nature, roles and relationship of the two DKIM identifier tag values that are candidates for payload delivery to a receiving processing module. This Errata entry has been developed and approved by the IETF's DKIM working group. Errata Contact Fields Name: Dave Crocker Email: dcrocker@bbiw.net Type Technical Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 2. RFC 4871 Abstract . . . . . . . . . . . . . . . . . . . . . . 3 3. RFC4871 Section 1. Introduction . . . . . . . . . . . . . . . 4 4. RFC4871 Section 2.7 Identity . . . . . . . . . . . . . . . . . 4 5. RFC4871 Section 2.8 Identifier . . . . . . . . . . . . . . . . 4 6. RFC4871 Section 2.9 Signing Domain Identifier (SDID) . . . . . 4 7. RFC4871 Section 2.10 User Agent Identifier (UAID) . . . . . . 5 8. RFC4871 Section 2.11 Identity Assessor . . . . . . . . . . . . 5 9. RFC4871 Section 3.5 The DKIM-Signature Header Field . . . . . 5 10. RFC4871 Section 3.5 The DKIM-Signature Header Field . . . . . 6 11. RFC4871 Section 3.8. Signing by Parent Domains . . . . . . . 8 12. RFC4871 Section 3.9 Relationship Between SDID and UAID . . . . 9 13. RFC4871 Section 6.3. Interpret Results/Apply Local Policy . . 10 14. RFC4871 Section 6.3. Interpret Results/Apply Local Policy . . 11 15. RFC4871 Appendix D. MUA Considerations . . . . . . . . . . . 11 16. Security Considerations . . . . . . . . . . . . . . . . . . . 11 17. Normative References . . . . . . . . . . . . . . . . . . . . . 11 Appendix A. Acknowledgements . . . . . . . . . . . . . . . . . . 12 Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 12 Crocker Expires August 9, 2009 [Page 2] Internet-Draft RFC4871 Errata February 2009 1. Introduction About the purpose for DKIM, [RFC4871] states: The ultimate goal of this framework is to permit a signing domain to assert responsibility for a message, thus protecting message signer identity... Hence, DKIM has a signer that produces a signed message, a verifier that confirms the signature and an assessor that consumes the validated signing domain. So the simple purpose of DKIM is to communicate an identifier to a receive-side assessor module. The identifier is in the form of a domain name that refers to a responsible identity. For DKIM to be interoperable and useful, signer and assessor must share the same understanding of the details about the identifier. However the RFC5871 specification defines two, potentially different identifiers that are carried in the DKIM-Signature: header field, d= and i=. Either might be delivered to a receiving processing module that consumes validated payload. The DKIM specification fails to clearly define what is "payload" to be delivered to a consuming module, versus what is internal and merely in support of achieving payload delivery. This currently leaves signers and assessors with the potential for having differing -- and therefore non-interoperable -- interpretations of how DKIM operates. This erratum resolves this confusion. It defines new labels for the two values, clarifies their nature, and specifies and their relationship. NOTE: This Errata document has been developed and approved by the IETF's DKIM working group. For more information about DKIM and its IETF working group, see: . 2. RFC 4871 Abstract Original Text: The ultimate goal of this framework is to permit a signing domain to assert responsibility for a message, Crocker Expires August 9, 2009 [Page 3] Internet-Draft RFC4871 Errata February 2009 Corrected Text: The ultimate goal of this framework is to permit a person, role or organization that owns the signing domain to assert responsibility for a message, 3. RFC4871 Section 1. Introduction Original Text: ...permitting a signing domain to claim responsibility Corrected Text: permitting a person, role or organization that owns the signing domain to claim responsibility 4. RFC4871 Section 2.7 Identity Original Text: (None. Additional text.) Corrected Text: A person, role or organization. In the context of DKIM, examples include author, author's organization, an ISP along the handling path, an independent trust assessment service, and a mailing list operator. 5. RFC4871 Section 2.8 Identifier Original Text: (None. Additional text.) Corrected Text: A label that refers to an identity. 6. RFC4871 Section 2.9 Signing Domain Identifier (SDID) Crocker Expires August 9, 2009 [Page 4] Internet-Draft RFC4871 Errata February 2009 Original Text: (None. Additional text.) Corrected Text: A single, opaque value that is the mandatory payload output of DKIM and which refers to the identity claiming responsibility for the introduction of a message into the mail stream. It is specified in section 3.5. 7. RFC4871 Section 2.10 User Agent Identifier (UAID) Original Text: (None. Additional text.) Corrected Text: A single, opaque value that identifies the user or agent on behalf of whom the SDID has taken responsibility. It is specified in section 3.5. 8. RFC4871 Section 2.11 Identity Assessor Original Text: (None. Additional text.) Corrected Text: The name of the module that consumes DKIM's primary payload, the responsible Signing Domain Identifier (SDID). It can optionally consume the User Agent Identifier (UAID) value, if provided to the module. 9. RFC4871 Section 3.5 The DKIM-Signature Header Field Original Text: Crocker Expires August 9, 2009 [Page 5] Internet-Draft RFC4871 Errata February 2009 d= The domain of the signing entity (plain-text; REQUIRED). This is the domain that will be queried for the public key. This domain MUST be the same as or a parent domain of the "i=" tag (the signing identity, as described below), or it MUST meet the requirements for parent domain signing described in Section 3.8. When presented with a signature that does not meet these requirement, verifiers MUST consider the signature invalid. Internationalized domain names MUST be encoded as described in [RFC3490]. ABNF: sig-d-tag = %x64 [FWS] "=" [FWS] domain-name domain-name = sub-domain 1*("." sub-domain) ; from RFC 2821 Domain, but excluding address-literal Corrected Text: d= Specifies the SDID claiming responsibility for an introduction of a message into the mail stream (plain-text; REQUIRED). This is the domain that will be queried for the public key. The SDID MUST correspond to a valid DNS name under which the DKIM key record is published. The conventions and semantics used by a signer to create and use a specific SDID are outside the scope of the DKIM Signing specification, as is any use of those conventions and semantics. When presented with a signature that does not meet these requirements, verifiers MUST consider the signature invalid. Internationalized domain names MUST be encoded as described in [RFC3490]. ABNF: sig-d-tag = %x64 [FWS] "=" [FWS] domain-name domain-name = sub-domain 1*("." sub-domain) ; from RFC 2821 Domain, but excluding address-literal 10. RFC4871 Section 3.5 The DKIM-Signature Header Field Original Text: Crocker Expires August 9, 2009 [Page 6] Internet-Draft RFC4871 Errata February 2009 i= Identity of the user or agent (e.g., a mailing list manager) on behalf of which this message is signed (dkim-quoted-printable; OPTIONAL, default is an empty Local-part followed by an "@" followed by the domain from the "d=" tag). The syntax is a standard email address where the Local-part MAY be omitted. The domain part of the address MUST be the same as or a subdomain of the value of the "d=" tag. Internationalized domain names MUST be converted using the steps listed in Section 4 of [RFC3490] using the "ToASCII" function. ABNF: sig-i-tag = %x69 [FWS] "=" [FWS] [ Local-part ] "@" domain-name INFORMATIVE NOTE: The Local-part of the "i=" tag is optional because in some cases a signer may not be able to establish a verified individual identity. In such cases, the signer may wish to assert that although it is willing to go as far as signing for the domain, it is unable or unwilling to commit to an individual user name within their domain. It can do so by including the domain part but not the Local-part of the identity. INFORMATIVE DISCUSSION: This document does not require the value of the "i=" tag to match the identity in any message header fields. This is considered to be a verifier policy issue. Constraints between the value of the "i=" tag and other identities in other header fields seek to apply basic authentication into the semantics of trust associated with a role such as content author. Trust is a broad and complex topic and trust mechanisms are subject to highly creative attacks. The real-world efficacy of any but the most basic bindings between the "i=" value and other identities is not well established, nor is its vulnerability to subversion by an attacker. Hence reliance on the use of these options should be strictly limited. In particular, it is not at all clear to what extent a typical end-user recipient can rely on any assurances that might be made by successful use of the "i=" options. Corrected Text: i= The User Agent Identifier (UAID) on behalf of which the SDID is taking responsibility (dkim-quoted-printable; OPTIONAL, default Crocker Expires August 9, 2009 [Page 7] Internet-Draft RFC4871 Errata February 2009 is an empty Local-part followed by an "@" followed by the domain from the "d=" tag). The syntax is a standard email address where the Local-part MAY be omitted. The domain part of the address MUST be the same as, or a subdomain of the value of, the "d=" tag. Internationalized domain names MUST be converted using the steps listed in Section 4 of [RFC3490] using the "ToASCII" function. ABNF: sig-i-tag = %x69 [FWS] "=" [FWS] [ Local-part ] "@" domain-name The UAID is specified as having the same syntax as an email address, but is not required to have the same semantics. Notably, the domain name is not required to be registered in the DNS -- so it might not resolve in a query -- and the Local- part MAY be drawn from a namespace that does not contain the user's mailbox. The details of the structure and semantics for the namespace are determined by the Signer. Any knowledge or use of those details by verifiers or assessors is outside the scope of the DKIM Signing specification. The Signer MAY choose to use the same namespace for its UAIDs as its users' email addresses, or MAY choose other means of representing its users. However, the signer SHOULD use the same UAID for each message intended to be evaluated as being within the same sphere of responsibility, if it wishes to offer receivers the option of using the UAID as a finer grained, stable identifier than the SDID. INFORMATIVE NOTE: The Local-part of the "i=" tag is optional because in some cases a signer may not be able to establish a verified individual identity. In such cases, the signer might wish to assert that although it is willing to go as far as signing for the domain, it is unable or unwilling to commit to an individual user name within their domain. It can do so by including the domain part but not the Local-part of the identity. 11. RFC4871 Section 3.8. Signing by Parent Domains Original Text: Crocker Expires August 9, 2009 [Page 8] Internet-Draft RFC4871 Errata February 2009 e.g., a key record for the domain example.com can be used to verify messages where the signing identity ("i=" tag of the signature) is sub.example.com, or even sub1.sub2.example.com. In order to limit the capability of such keys when this is not intended, the "s" flag may be set in the "t=" tag of the key record to constrain the validity of the record to exactly the domain of the signing identity. If the referenced key record contains the "s" flag as part of the "t=" tag, the domain of the signing identity ("i=" flag) MUST be the same as that of the d= domain. If this flag is absent, the domain of the signing identity MUST be the same as, or a subdomain of, the d= domain. Corrected Text: ...for example, a key record for the domain example.com can be used to verify messages where the UAID ("i=" tag of the signature) is sub.example.com, or even sub1.sub2.example.com. In order to limit the capability of such keys when this is not intended, the "s" flag MAY be set in the "t=" tag of the key record, to constrain the validity of the domain of the UAID. If the referenced key record contains the "s" flag as part of the "t=" tag, the domain of the UAID ("i=" flag) MUST be the same as that of the SDID (d=) domain. If this flag is absent, the domain of the UAID MUST be the same as, or a subdomain of, the SDID. 12. RFC4871 Section 3.9 Relationship Between SDID and UAID Original Text: (None. This is an addition.) Corrected Text: DKIM's primary task is to communicate from the Signer to a recipient-side Identity Assessor a single, Signing Domain Identifier (SDID) that refers to a responsible identity. DKIM MAY optionally provide a single responsible User Agent Identifier (UAID). Hence, DKIM delivers to receive-side Identity Assessors responsible Identifiers that are opaque to the assessor. Their sub-structures and particular semantics are not publicly defined and, therefore, cannot be assumed by an Identity Assessor. A receive-side DKIM verifier MUST communicate the Signing Domain Identifier (d=) to a consuming Identity Assessor module and MAY communicate the User Agent Identifier (i=) if present. Crocker Expires August 9, 2009 [Page 9] Internet-Draft RFC4871 Errata February 2009 To the extent that a receiver attempts to intuit any structured semantics for either of the identifiers, this is a heuristic function that is outside the scope of DKIM's specification and semantics. Hence it is relegated to a higher-level service, such as a delivery handling filter that integrates a variety of inputs and performs heuristic analysis of them. INFORMATIVE DISCUSSION: This document does not require the value of the SDID or UAID to match the identity in any message header fields. This is considered to be an assessor policy issue. Constraints between the value of the SDID or UAID and other identities in other header fields seek to apply basic authentication into the semantics of trust associated with a role such as content author. Trust is a broad and complex topic and trust mechanisms are subject to highly creative attacks. The real-world efficacy of any but the most basic bindings between the SDID or UAID and other identities is not well established, nor is its vulnerability to subversion by an attacker. Hence reliance on the use of these options should be strictly limited. In particular, it is not at all clear to what extent a typical end- user recipient can rely on any assurances that might be made by successful use of the SDID or UAID. 13. RFC4871 Section 6.3. Interpret Results/Apply Local Policy Original Text: It is beyond the scope of this specification to describe what actions a verifier system should make, but an authenticated email presents an opportunity to a receiving system that unauthenticated email cannot. Specifically, an authenticated email creates a predictable identifier by which other decisions can reliably be managed, such as trust and reputation. Conversely, unauthenticated email lacks a reliable identifier that can be used to assign trust and reputation. Corrected Text: It is beyond the scope of this specification to describe what actions an Identity Assessor can make, but mail carrying a validated SDID presents an opportunity to an Identity Assessor that unauthenticated email does not. Specifically, an authenticated email creates a predictable identifier by which other decisions can reliably be managed, such as trust and reputation. Crocker Expires August 9, 2009 [Page 10] Internet-Draft RFC4871 Errata February 2009 14. RFC4871 Section 6.3. Interpret Results/Apply Local Policy Original Text: Once the signature has been verified, that information MUST be conveyed to higher-level systems (such as explicit allow/whitelists and reputation systems) and/or to the end user. If the message is signed on behalf of any address other than that in the From: header field, the mail system SHOULD take pains to ensure that the actual signing identity is clear to the reader. Corrected Text: Once the signature has been verified, that information MUST be conveyed to the Identity Assessor (such as an explicit allow/ whitelist and reputation system) and/or to the end user. If the SDID is not the same as the address in the From: header field, the mail system SHOULD take pains to ensure that the actual SDID is clear to the reader. 15. RFC4871 Appendix D. MUA Considerations Original Text: The tendency is to have the MUA highlight the address associated with this signing identity in some way, in an attempt to show the user the address from which the mail was sent. Corrected Text: The tendency is to have the MUA highlight the SDID, in an attempt to show the user the identity that is claiming responsibility for the message. 16. Security Considerations This Errata document clarifies core details about DKIM's payload. As such it affects interoperability, semantic characterization, and the expectations for the identifiers carried with a DKIM signature. Clarification of these details is likely to limit misinterpretation of DKIM's semantics. Since DKIM is fundamentally a security protocol, this should improve its security characteristics. 17. Normative References [RFC4871] Allman, E., Callas, J., Delany, M., Libbey, M., Fenton, J., and M. Thomas, "DomainKeys Identified Mail (DKIM) Signatures", RFC 4871, May 2007. Crocker Expires August 9, 2009 [Page 11] Internet-Draft RFC4871 Errata February 2009 Appendix A. Acknowledgements This document was initially formulated by an ad hoc design team, comprising: Jon Callas, J D Falk, Jim Fenton, Tony Hansen, Murray Kucherawy, John Levine, Michael Hammer, Jeff Macdonald, Ellen Siegel, Wietse Venema. It was then submitted to the DKIM working group for revision and approval. Author's Address D. Crocker (editor) Brandenburg InternetWorking Phone: +1.408.246.8253 Email: dcrocker@bbiw.net Crocker Expires August 9, 2009 [Page 12]