<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-ietf-dkim-dkim2-spec-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="DKIM2 Signatures">DomainKeys Identified Mail Signatures v2 (DKIM2)</title>

    <author initials="R." surname="Clayton" fullname="Richard Clayton">
      <organization>Yahoo</organization>
      <address>
        <email>rclayton@yahooinc.com</email>
      </address>
    </author>
    <author initials="W." surname="Chuang" fullname="Wei Chuang">
      <organization>Google</organization>
      <address>
        <email>weihaw@google.com</email>
      </address>
    </author>
    <author initials="B." surname="Gondwana" fullname="Bron Gondwana">
      <organization>Fastmail Pty Ltd</organization>
      <address>
        <postal>
          <street>Level 2, 114 William Street</street>
          <code>3000</code>
          <country>Australia</country>
        </postal>
        <phone>+61 457 416 436</phone>
        <email>brong@fastmailteam.com</email>
      </address>
    </author>

    <date year="2026" month="March" day="24"/>

    
    
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 61?>

<t>DomainKeys Identified Mail v2 (DKIM2) permits a person, role, or
organization that owns a signing domain to document that it has
handled an email message by associating their domain with the
message.  This is achieved by providing a hash value that has
been calculated on the current contents of the message and then applying a cryptographic
signature that covers the hash values and other details about the
transmission of the message. Verification is performed by querying an entry
within the signing domain's DNS space to retrieve an appropriate public
key. As a message is transferred from author to recipient systems that
alter the body or header fields will provide details of their changes
and calculate new hash values. Further signatures 
will be added to provide a validatable "chain". This permits validators
to identify the nature of changes made by intermediaries and apply a
reputation to the systems that made changed. DKIM2 also allows
recipients to detect when messages have been unexpectedly "replayed"
and will ensure that Delivery Status Notifications are only sent
to entities that were involved in the transmission of a message.</t>



    </abstract>



  </front>

  <middle>


<?line 81?>

<section anchor="introduction"><name>Introduction</name>

<t>DomainKeys Identified Mail v2 (DKIM2) permits a person, role, or
organization to document that they have handled an email message by
associating a domain name <xref target="RFC1034"></xref> with the message <xref target="RFC5322"></xref>. A
public key signature is used to record that they have been able
to read the contents of the message and write to it.</t>

<t>Verification of claims is achieved by fetching a public key stored
in the DNS under the relevant domain and then checking the signature.</t>

<t>Message transit from author to recipient is through
Forwarders that typically make no substantive change to the message
content and thus preserve the DKIM2 signature. Where they do make
a change the changes they have made are documented so that
these can be "undone" and the original signature validated.</t>

<t>When a message is forwarded from one system to another an
additional DKIM2 signature is added on each occasion. This chain
of custody assists validators in distinguishing between messages that
were intended to be sent to a particular email address and those
that are being "replayed" to that address.</t>

<t>The chain of custody can also be used to ensure that delivery status
notifications are only sent to entities that were involved in the
transmission of a message.</t>

<t>Organizations that process a message can add to their signature
a request for feedback as to any opinion (for example, that the
email was considered to be spam) that the eventual recipient of
the message wishes to share.</t>

<section anchor="dkim2-architecture-documents"><name>DKIM2 Architecture Documents</name>

<t>Readers are advised to be familiar with the material in TBA, TBA and TBA
which provide the background for the development of DKIM2, an overview
of the service, and deployment and operations guidance and advice.</t>

</section>
</section>
<section anchor="terminology-and-definitions"><name>Terminology and Definitions</name>

<t>This section defines terms used in the rest of the document.</t>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in
<xref target="RFC2119"></xref>.  These words take their normative meanings only when they
are presented in ALL UPPERCASE.</t>

<t>DKIM2 is designed to operate within the Internet Mail service, as
defined in <xref target="RFC5598"></xref>.  Basic email terminology is taken from that
specification.</t>

<t>DKIM2 inherits many ideas from DKIM (<xref target="RFC6376"></xref>) which, for clarity
we refer to in this specification as DKIM1. In addition, some features
were influenced by experience with (see <xref target="CONCLUDEARC"></xref>) the experimental
ARC protocol (<xref target="RFC8617"></xref>).</t>

<t>Syntax descriptions use Augmented BNF (ABNF) <xref target="RFC5234"></xref>.</t>

<t>This document uses JSON <xref target="RFC8259"></xref> for collections of related information.
The JSON objects are then base64 encoded and placed into Tag=Value
lists. This is done to avoid significant complexities in parsing
Tag=Value lists (see <xref target="tagvaluelists"/>) and to simplify the way in
which algorithmic
agility is provided. Unrecognised fields within JSON objects MUST
be ignored.</t>

<section anchor="signer"><name>Signer</name>

<t>Elements in the mail system that sign messages on behalf of a domain
are referred to as Signers.  These may be MUAs (Mail User Agents),
MSAs (Mail Submission Agents), MTAs (Mail Transfer Agents), or other
agents such as mailing list "exploders".  In general, any Signer will
be involved in the injection of a message into the message system in
some way.  The key point is that a message must be signed before it
leaves the administrative domain of the Signer.</t>

</section>
<section anchor="forwarder"><name>Forwarder</name>

<t><xref target="RFC5598"></xref> defines a Relay as transmitting or retransmitting a message
but states that it will not modify the envelope information or the
message content semantics. It also defines a Gateway as a hybrid of
User and Relay that connects heterogeneous mail services. In this
document we use the concept of a Forwarder which is an MTA that receives
a message and then, as an alternative to delivering it into a
destination mailbox, can forward it on to another system in an
automated, pre-determined, manner.</t>

</section>
<section anchor="reviser"><name>Reviser</name>

<t>As will be seen, a Forwarder may alter the message content or header
fields, in such a way that existing signatures on the message will
no longer validate. If so, then a record will be made of these
changes. We call a Forwarder that makes such changes a Reviser.</t>

</section>
<section anchor="verifier"><name>Verifier</name>

<t>Elements in the mail system that verify signatures are referred to as
Verifiers.  These may be Forwarders, Revisers, MTAs, Mail Delivery
Agents (MDAs), or MUAs.
It is an expectation of DKIM2 that a recipient of a message will
wish to verify some or all signatures before determining whether or
not to accept the message or pass it on to another entity.</t>

</section>
<section anchor="signing-domain"><name>Signing Domain</name>

<t>A domain name associated with a signature. This domain may be
associated with the author of an email, their organization, a
company hired to deliver the email, a mailing list operator, or
some other entity that handles email. What they have in common is
that at some point they had access to the entire contents of the
email and were in a position to add their signature to the email.</t>

</section>
<section anchor="whitespace"><name>Whitespace</name>

<t>There are two forms of whitespace used in this specification:</t>

<t><list style="symbols">
  <t>WSP represents simple whitespace, i.e., a space or a tab character
(formal definition in <xref target="RFC5234"></xref>).</t>
  <t>FWS is folding whitespace.  It allows multiple lines separated by
CRLF followed by at least one whitespace, to be joined.</t>
</list></t>

<t>The formal ABNF for these are (WSP given for information only):</t>

<figure><artwork><![CDATA[
WSP =   SP / HTAB
FWS =   [*WSP CRLF] 1*WSP
]]></artwork></figure>

<t>The definition of FWS is identical to that in <xref target="RFC5322"></xref> except for
the exclusion of obs-FWS.</t>

</section>
<section anchor="imported-abnf-tokens"><name>Imported ABNF Tokens</name>

<t>The following tokens are imported from other RFCs as noted.  Those
RFCs should be considered definitive.</t>

<t>The following tokens are imported from <xref target="RFC5321"></xref>:</t>

<t><list style="symbols">
  <t>"Domain"</t>
  <t>"Forward-path"</t>
  <t>"reverse-path"</t>
</list></t>

<t>The following tokens are imported from <xref target="RFC5322"></xref>:</t>

<t><list style="symbols">
  <t>"field-name" (name of a header field)</t>
</list></t>

<t>Other tokens not defined herein are imported from <xref target="RFC5234"></xref>.  These
are intuitive primitives such as SP, HTAB, WSP, ALPHA, DIGIT, CRLF,
etc.</t>

</section>
<section anchor="common-abnf-tokens"><name>Common ABNF Tokens</name>

<t>The following ABNF tokens are used elsewhere in this document:</t>

<figure><artwork><![CDATA[
ALPHADIGITD  = (ALPHA / DIGIT / "-" / "_")

textstring   =  [FWS] ALPHADIGITD *(ALPHADIGITD) [FWS]

ALPHADIGITPS =  (FWS / ALPHA / DIGIT / "+" / "/")

base64string =  ALPHADIGITPS *(ALPHADIGITPS) [[FWS] "=" [[FWS] "="]]

rcptmailbox  =  ( "<Postmaster@" Domain ">" /
                  "<Postmaster>" /
                  Forward-path )
]]></artwork></figure>

<t>Note that base64strings are defined in <xref target="RFC4648"></xref>, but that document
does not contain any ABNF. Note that a base64string MUST be padded
with trailing = characters if needed.</t>

<t>Note that the definition of base64string allows
for the presence of FWS, which simplifies folding header fields
to an allowable line length. FWS within base64strings will be
ignored when their value is being used.</t>

</section>
</section>
<section anchor="algorithms"><name>Signing and Verification Cryptographic Algorithms</name>

<t>DKIM2 supports multiple hashing and digital signature algorithms. One
hash function (SHA256) if specified here and two signing algorithms
are defined by this specification: RSA-SHA256 and Ed25519-SHA256.
Signers and Verifiers MUST implement SHA256. Signers SHOULD implement
both RSA-SHA256 and Ed25519-SHA256. Verifiers MUST implement both
RSA-SHA256 and Ed25519-SHA256.</t>

<section anchor="the-sha256-hashing-algorithm"><name>The SHA256 Hashing Algorithm</name>

<t>The SHA256 hashing algorithm is used to compute body and
header hashes as defined in <xref target="computing-body-hash"/> and
<xref target="computing-header-hash"/>.</t>

<t>The resultant values are identified by the text string "sha256" and
placed into Message-Instance header fields.</t>

</section>
<section anchor="the-rsa-sha256-signing-algorithm"><name>The RSA-SHA256 Signing Algorithm</name>

<t>The RSA-SHA256 Signing Algorithm computes a hash over all the Message-Instance
and DKIM2-Signature header fields as described in <xref target="calculate-signature"/> using
SHA-256 (FIPS-180-4-2015) as the hash-alg.  That
hash is then signed by the Signer using the RSA algorithm (defined in
PKCS#1 version 1.5 <xref target="RFC8017"></xref>) as the crypt-alg and the Signer's
private key.  The hash MUST NOT be truncated or converted into any
form other than the native binary form before being signed.  The
signing algorithm MUST use a public exponent of 65537.</t>

<t>Signers MUST use RSA keys of at least 1024 bits.  Verifiers MUST be able
to validate signatures with keys ranging from 1024 bits to 2048 bits, and
they MAY be able to validate signatures with larger keys.</t>

<t>The signature value (expressed in base64) is placed (with the identifying
text string "rsa-sha256") into DKIM2-Signature header fields.</t>

</section>
<section anchor="the-ed25519-sha256-signing-algorithm"><name>The Ed25519-SHA256 Signing Algorithm</name>

<t>The Ed25519-SHA256 Signing Algorithm computes a hash over all the Message-Instance
and DKIM2-Signature fields as described in <xref target="calculate-signature"/> using
SHA-256 (FIPS-180-4-2015) as the hash-alg. It signs the hash with the PureEdDSA
variant Ed25519, as defined in Section 5.1 of <xref target="RFC8032"></xref>.</t>

<t>The signature value (expressed in base64) is placed (with the identifying
text string "ed25519-sha256") into DKIM2-Signature header fields.</t>

</section>
<section anchor="other-algorithms"><name>Other Algorithms</name>

<t>Other algorithms MAY be defined in the future.  Verifiers MUST ignore
any hashes or signatures using algorithms that they do not implement.</t>

</section>
<section anchor="selectors"><name>Selectors</name>

<t>To support multiple concurrent public keys per signing domain, the
key namespace is subdivided using "selectors".</t>

<t>The number of public keys and corresponding selectors for each domain
is determined by the domain owner. Many domain owners will use just one
selector, whereas administratively distributed organizations can choose
to manage disparate selectors
and key pairs in different regions or on different email servers.
Selectors can also be used to delegate a signing authority, which
can be withdraw at any time. Selectors also make it possible to
seamlessly replace keys on a routine basis by signing with a new
selector, while keeping the key associated with the old selector
available.</t>

<t>Periods are allowed in selectors and are component separators. Periods in
selectors define DNS label boundaries in a manner similar to the
conventional use in domain names.  This will allow portions of
the selector namespace to be delegated.</t>

<t>ABNF:</t>

<figure><artwork><![CDATA[
selector = Domain
]]></artwork></figure>

</section>
<section anchor="key_management"><name>Key Management</name>

<t>Some level of assurance is required that
a public key is associated with the claimed Signer. DKIM2
does this by fetching the key from the DNS for the domain specified
in the d= field of the DKIM2-Signature header field.</t>

<t>DKIM2 keys are stored in a subdomain named "_domainkey".  Given a
DKIM2-Signature field with a "d=" tag of "example.com" and a selector
of "foo.bar", the DNS query will be for "foo.bar._domainkey.example.com".</t>

<t>NOTE: these keys are no different, and are stored in the same locations
as those for DKIM1 (<xref target="RFC6376"></xref>).</t>

<t>Further details can be found in <xref target="DKIMKEYS"></xref>.</t>

</section>
</section>
<section anchor="JSONrecipe"><name>Recipes</name>

<t>A set of "recipes" is used to recreate the previous version of the body
and/or header fields of a message. The recipes are provided
within a JSON object with the schema:</t>

<figure><artwork><![CDATA[
{
  "$schema": "https://json-schema.org/draft/2020-12/schema",
  "$id": "https://dkim2.org/schemas/recipe-v1",
  "title": "DKIM2 recipes",
  "description": "see draft-dkim-dkim2-spec",
  "type": "object",
  "properties": {
    "h": {
      "description": [ "recipes to recreate header fields",
        "keys are header field names matched case-insensitively",
        "and there MUST NOT be keys that differ only in case"],
      "oneOf": [
        {
          "description": "per-field-name recipe arrays",
          "type": "object",
          "minProperties": 1,
          "additionalProperties": { "$ref": "#/$defs/recipe-steps" }
        },
        {
          "description": "previous header state cannot be recreated",
          "type": "null"
        }
      ]
    },
    "b": {
      "description": "recipes to recreate the body",
      "oneOf": [
        {
          "description": "body recipes",
          "$ref": "#/$defs/recipe-steps"
        },
        {
          "description": "previous body state cannot be recreated",
          "type": "null"
        },
        {
          "description": "body was truncated (DSN)",
          "type": "object",
          "properties": {
            "z": { "type": "boolean", "const": true }
          },
          "required": ["z"], "additionalProperties": false
        }
      ]
    }
  },
  "anyOf": [
    { "required": ["h"] },
    { "required": ["b"] }
  ],
  "$defs": {
    "recipe-steps": {
      "type": "array",
      "items": {
        "oneOf": [
          {
            "description": "copy lines/fields, start to end inclusive",
            "type": "object",
            "properties": {
              "c": { "type": "array",
                "items": { "type": "integer", "minimum": 1 },
                "minItems": 2, "maxItems": 2
              }
            },
            "required": ["c"], "additionalProperties": false
          },
          {
            "description": "data lines/values to emit",
            "type": "object",
            "properties": {
              "d": { "type": "array",
                "items": { "type": "string" },
                "minItems": 1
              }
            },
            "required": ["d"], "additionalProperties": false
          }
        ]
      }
    }
  }
}
]]></artwork></figure>

<t>Note that the specification of JSON schemas is maintained by the JSON Schema
organisation, and the relevant specification document is linked to by the
$schema field in each JSON schema.</t>

<section anchor="header-recipes"><name>Header Recipes</name>

<t>A Header Recipe is an array of instructions applied to the specified
header fields with the given header field name. These instructions
are applied in order to the message which has been received
so as to recreate the message as it was before modifications were made.</t>

<t>If there is no "h" field in the JSON object then there was no
modification to the header fields.</t>

<t>If the "h" field value is null (there are no recipes for
any header field) then the previous state of the header fields
cannot be recreated. Verifiers of the message may be able to
determine, by seeing which entity makes this declaration, that
this is acceptable to them because, for example, that entity
is providing a contractually arranged service.</t>

<t>Matching of header field names is always done without regard to case.</t>

<t>If a header field name is not present in the JSON object then all
header fields with that header field name are to be retained.</t>

<t>If the recipe array for a header field name that is present in the
JSON object is empty then all instances of that header field are to
be removed to reinstate the previous state of the message.</t>

<t>Header fields are numbered "bottom up" (the opposite direction to
the body lines). That is to say, when walking the header fields
from the top of the message to end of the header fields then
the last header field instance
encountered with any particular header field name is numbered 1,
the header field (with the same header field name) above that is
numbered 2, and so on.</t>

<t>The header fields should be treated as
being unwrapped (in the normal <xref target="RFC5321"></xref> manner). That is, all
of the physical lines that form a single header field are
processed under the same logical number.</t>

<t>The recipes are processed in order and the resulting header
fields are emitted so that later header field will appear above
earlier header fields in the recreated message.</t>

<t>Each recipe step is a JSON object with exactly one key:</t>

<t>A "c" step has the form {"c": [start, end]}. The relevant header field
instances numbered from start to end inclusive, are to be emitted.
The start value of each "c" step MUST be in ascending order and
MUST be greater than the end value of all preceding "c" steps
for this header field name.</t>

<t>A "d" step has the form {"d": ["value1", "value2", ...]}. Each
string in the array is treated as a value to which the
relevant header field name and a colon is prepended and a CRLF
is appended and the resultant string is then emitted. Note that
the way in which hashes are calculated (see <xref target="computing-header-hash"/>)
means that no heed needs to be taken of wrapping
or the case of the header field name. The text strings MUST NOT
contain CR or LF characters. If a string is empty then the
CRLF will immediately follow the header field name and colon.</t>

</section>
<section anchor="body-recipes"><name>Body Recipes</name>

<t>A Body Recipe is an array of instructions applied to the message
body which can recreate the message as it was before modifications
were made.</t>

<t>If there is no "b" field in the JSON object then there was no
modification to the message body. Note that the JSON schema
requires either "h" or "b" to be present.</t>

<t>If the "b" field is null (there are no recipes) then the previous
state of the message body
cannot be recreated. Verifiers of the message may be able to
determine, by seeing which entity makes this declaration, that
this is acceptable to them because, for example, that entity
is providing a contractually arranged service.</t>

<t>Body lines are numbered "top down" (the opposite direction to
the header fields). The first line of the body (immediately after
the blank line that indicates that there are no more header fields)
is numbered 1.</t>

<t>The recipes are processed in order and the resulting body lines
fields are emitted so that later lines will appear below
earlier lines in the recreated message.</t>

<t>Each recipe step is a JSON object with exactly one key:</t>

<t>A "c" step has the form {"c": [start, end]}. The message body lines
from start to end, inclusive, are to be emitted. The start value of
each "c" step MUST be in ascending order and MUST be greater than the
end value of all preceding "c" steps.</t>

<t>A "d" step has the form {"d": ["line1", "line2", ...]}. Each
string in the array has a CRLF
appended and the resultant string is emitted. The text strings MUST NOT
contain CR or LF characters. If a string is empty then just
a CRLF is emitted.</t>

<t>A "z" step has the form {"z": true} and indicates that the
body was truncated (see the DSN handling in <xref target="bounce"/>).</t>

</section>
</section>
<section anchor="messagehashes"><name>Message Hash Values</name>

<t>A set of cryptographic "hashes" are used to record the current
message body and header fields. The hashes are placed into the
h= tag of a Message-Instance header field.</t>

<t>To provide for algorithmic dexterity more that one hash value, using a
different algorithm MAY be supplied in the same Message-Instance
header field.</t>

<t>Since Message-Instance header fields are ignored when calculating the
header hash value, the body hash and header hash may be calculated in
any convenient order.</t>

<section anchor="computing-body-hash"><name>Computing the Body Hash</name>

<t>The body of messages is treated as merely a string of octets. DKIM2
messages MAY be either in plain-text or in MIME format; no special
treatment is afforded to MIME content. Message attachments in MIME
format MUST be included in the content that is signed.</t>

<t>The DKIM2 body hash is calculated in the same manner as DKIM1's "simple"
scheme:</t>

<t>All empty lines at the end of the message body are ignored. An empty line
is a line of zero length after removal of the line terminator.  If there
is no body or no trailing CRLF on the message body, a CRLF is added. That
is "*CRLF" at the end of the body is converted to "CRLF".</t>

<t>No other changes are made to the body, which is then processed by the
relevant hash algorithm(s). The name of the hash and the hash value
(converted to base64 form) is then inserted into (Signers) or compared
to (Verifiers) the value of the "h=" tag of the Message-Instance header
field that is being created/verified. If multiple hashes are calculated
then multiple entries within the "h=" value will be inserted/compared.</t>

</section>
<section anchor="computing-header-hash"><name>Computing the Header Fields Hash</name>

<t>The header fields hash calculation done by a Signer MUST apply the
following steps in the order given. A Verifier will need to do the
equivalent steps in order to check that the hash they have received
is correct.</t>

<t><list style="symbols">
  <t>Ignore some header fields  <vspace blankLines='1'/>
When calculating the header field hash "Received" or "Return-Path"
header fields MUST be ignored.
These are Trace headers as described in <xref target="RFC5321"></xref>
and serve only to document details of the SMTP transmission process.  <vspace blankLines='1'/>
When calculating the header field hash any header field with
a header field name starting with "X-" MUST be ignored.
Currently deployed email systems use these fields as
proprietary Trace headers which have no defined meaning for
other systems and it considerably simplifies reporting
on changes to header fields to ignore them.  <vspace blankLines='1'/>
When calculating the header field hash any "Message-Instance" or
"DKIM2-Signature" header fields MUST be ignored. These header
fields will be included in the hash value that will be signed
by a DKIM2-Signature header field and it simplifies implementations
if they are not included twice, especially when determining
whether all modifications to a message have been correctly declared.  <vspace blankLines='1'/>
When calculating the header field hash any "DKIM-Signature" header
fields and any header fields whose field name starts with "ARC-"
MUST be ignored. Not including
DKIM1 and ARC signatures means that systems that wish to add other
types of signature as well as a DKIM2 signature are free to do this
in any convenient order.</t>
  <t>Convert all header field names (not the header field values) to
lowercase.  For example, convert "SUBJect: AbC" to "subject: AbC".</t>
  <t>Unfold all header field continuation lines as described in
<xref target="RFC5322"></xref>; in particular, lines with terminators embedded in
continued header field values (that is, CRLF sequences followed by
WSP) MUST be interpreted without the CRLF.  Implementations MUST
NOT remove the CRLF at the end of the header field value.</t>
  <t>Convert all sequences of one or more WSP characters to a single SP
character.  WSP characters here include those before and after a
line folding boundary.</t>
  <t>Delete all WSP characters at the end of each unfolded header field
value.</t>
  <t>Delete any WSP characters remaining before and after the colon
separating the header field name from the header field value.  The
colon separator MUST be retained.</t>
  <t>Place the header fields in alphabetical order by the header field
name.</t>
  <t>If there is more than one header with the same header field name
then the header fields are placed in the order in which they were
likely to have been placed into the message header, that is from
the last within the header upwards (the same ordering as is used
in the header recipes (see <xref target="header-recipes"/>).  <vspace blankLines='1'/>
It is sometimes suggested that some MTAs re-order
header fields after they receive an email. If an MTA does change the
order of header fields with the same header field name (and those
header fields will be included in the hash calculation) then it is their
responsibility to recover the original order
before verifying an existing signature or passing a previously signed
message to another MTA that may wish to do such verification.</t>
  <t>The hash(es) of the concatenated header fields are calculated.</t>
</list></t>

<t>The name of the hash and the hash value
(converted to base64 form) is then inserted into (Signers) or compared
to (Verifiers) the value of the "h=" tag of the Message-Instance header
field that is being created/verified. If multiple hashes are calculated
then multiple entries within the "h=" value will be inserted/compared.</t>

</section>
</section>
<section anchor="tagvaluelists"><name>Tag=Value Lists</name>

<t>DKIM2 uses a simple "tag=value" syntax in the Message-Instance and
DKIM2-Signature header fields, as well as in domain signature records
(see <xref target="DKIMKEYS"></xref>).</t>

<t>Values are a series of strings containing either text or "base64"
text (as defined in <xref target="RFC2045"></xref>, Section 6.8). The name of the tag will
determine the encoding and structure of each value.</t>

<t>Formally, the ABNF syntax rules are as follows:</t>

<figure><artwork><![CDATA[
tag-list  =  tag-spec *( ";" tag-spec ) [ ";" ]
tag-spec  =  [FWS] tag-name [FWS] "=" [FWS] tag-value [FWS]
tag-name  =  ALPHA *(ALPHA / DIGIT / "_")
tval      =  %x21-3A / %x3C-7E
                  ; not SEMICOLON
tag-value =  [ tval *( 1*(WSP / FWS) tval ) ]
                  ; Prohibits WSP and FWS at beginning and end
]]></artwork></figure>

<t>Note that WSP is allowed anywhere around tags.  In particular, any
WSP after the "=" and any WSP before the terminating ";" is not part
of the value; however, WSP inside the value is significant.
Semicolon (";") characters MUST NOT occur in the tag value, since
that separates tag-specs.</t>

<t>Tags MUST be interpreted in a case-sensitive manner.  Values MUST be
processed as case sensitive unless the specific tag description of
semantics specifies case insensitivity.</t>

<t>Tags with duplicate names MUST NOT occur within a single tag-list; if
a tag name does occur more than once, the entire tag-list is invalid.</t>

<t>Whitespace within a value MUST be retained unless explicitly excluded
by the specific tag description.</t>

<t>Tag=value pairs that represent the default value MAY be included to
aid legibility.</t>

<t>Unrecognized tags MUST be ignored.</t>

<t>Tags that have an empty value are not the same as omitted tags.  An
omitted tag is treated as having the default value; a tag with an
empty value explicitly designates the empty string as the value.</t>

</section>
<section anchor="hfMessageInstance"><name>The Message-Instance Header Field</name>

<t>A Message-Instance header field documents the current contents of
the message and, in the case of a Reviser records any relevant
changes that have been made to the incoming message.</t>

<t>The Message-Instance header field is a tag-list as described in
<xref target="tagvaluelists"/>. The tags are described below.</t>

<t>The m= and h= tags MUST be present. The r= tag is optional.</t>

<section anchor="m-the-revision-number-of-the-message-instance-header-field"><name>m= the revision number of the Message-Instance header field</name>

<t>The originator of a message uses the
value 1. Further Message-Instance header fields are added with a value one
more than the current highest numbered Message-Instance header field. Gaps
in the numbering MUST be treated as making the whole message impossible
to verify.</t>

<t>ABNF:</t>

<figure><artwork><![CDATA[
mi-m-tag    = %x6d [FWS] "=" [FWS] 1*DIGIT
]]></artwork></figure>

</section>
<section anchor="r-recipes-to-recreate-the-previous-instance-of-the-message"><name>r= recipes to recreate the previous instance of the message</name>

<t>The r= tag value is the base64 encoded version of the JSON object that
contains the recipes that allow the previous instance of the message
to be recreated (see <xref target="JSONrecipe"/>}.</t>

<t>ABNF:</t>

<figure><artwork><![CDATA[
mi-r-tag    = %x72 [FWS] "=" base64string
]]></artwork></figure>

</section>
<section anchor="h-the-hash-values-for-the-message"><name>h= the hash values for the message</name>

<t>The h= tag value contains the hash name, header hash value and body
hash value. Calculating the hash values is explained in <xref target="messagehashes"/>.</t>

<t>ABNF:</t>

<figure><artwork><![CDATA[
mi-h-tag    = %x68 [FWS] "=" hash-set *("," hash-set )
hash-set    = [FWS] hash-name [FWS] ":" header-hash ":" body-hash
hash-name   = "sha256" / x-hash-name
header-hash = base64string
body-hash   = base64string
x-hash-name = textstring ; for later expansion
]]></artwork></figure>

</section>
</section>
<section anchor="hfDKIM2signature"><name>The DKIM2-Signature Header Field</name>

<t>The signature of the email is stored in a DKIM2-Signature header
field.  This header field contains all of the signature and key-
fetching data.  The DKIM2-Signature value is a tag-list as described
in <xref target="tagvaluelists"/>.</t>

<t>The tags are described below. It will be noted that we
have not included a version number.  Experience from IMF onwards shows
that it is essentially impossible to change version numbers.
If it becomes necessary to change DKIM2 in the sort of incompatible way that
a v=2 / v=3 version number would support, it is expected that header
fields will be labelled as DKIM3 instead.</t>

<t>The i=, m=, t=, mf=, rt=, d= and s= tags MUST be present.
The other tags are optional.</t>

<section anchor="i-the-sequence-number-of-the-dkim2-signature-header-field"><name>i= the sequence number of the DKIM2-Signature header field</name>

<t>The originator of a message uses the
value 1. Further DKIM2-Signature header fields are added with a value one
more than the current highest numbered DKIM2-Signature header field. Gaps
in the numbering MUST be treated as making the whole message unsigned.</t>

<t>ABNF:</t>

<figure><artwork><![CDATA[
sig-i-tag = %x69 [FWS] "=" [FWS] 1*DIGIT
]]></artwork></figure>

</section>
<section anchor="m-the-highest-numbered-message-instance-header-field"><name>m= the highest numbered Message-Instance header field</name>

<t>This value allows verifiers to determine which entity made a particular
revision to the message header fields or body.</t>

<t>ABNF:</t>

<figure><artwork><![CDATA[
sig-m-tag = %x6d [FWS] "=" [FWS] 1*DIGIT
]]></artwork></figure>

</section>
<section anchor="n-nonce-value"><name>n=  nonce value</name>

<t>This text value, if present, has a meaning to the creator of the signature
but MUST NOT be assumed to have any meaning to any other entity. It
MAY be used as an index into a database to assist in handling Delivery
Status Notifications or for any other purpose.</t>

<t>To discourage use of this tag field as an alternative to the use of more
appropriate header fields, the length of the string MUST NOT
exceed 64 characters and implementations SHOULD reject messages
where this limit has been ignored.</t>

<t>Note the value MUST be simple ASCII and MUST NOT contain semicolon.</t>

<t>ABNF:</t>

<figure><artwork><![CDATA[
sig-n-tag = %x6e [FWS] "=" [FWS] *(%x21-3A / %x3C-7E/ FWS)
]]></artwork></figure>

</section>
<section anchor="t-signature-timestamp"><name>t=  signature timestamp</name>

<t>The time that this header field was created. The format is the number of
seconds since 00:00:00 on January 1, 1970 in the UTC time zone.  The value
is expressed as an unsigned integer in decimal ASCII.  This value
is not constrained to fit into a 31- or 32-bit integer.</t>

<t>Implementations SHOULD be prepared to handle values up to at least
10^12 (until approximately AD 200,000; this fits into 40 bits).</t>

<t>Implementations MAY ignore signatures that have a timestamp in the future.
Implementations MAY ignore signatures that are more than 14 days old.</t>

<t>ABNF:</t>

<figure><artwork><![CDATA[
sig-t-tag    = %x74 [FWS] "=" [FWS] 1*DIGIT
]]></artwork></figure>

</section>
<section anchor="mf-the-mail-from-used-when-the-message-was-sent"><name>mf= the MAIL FROM used when the message was sent</name>

<t>DKIM2 records the <xref target="RFC5321"></xref> MAIL FROM value that was used when the message
was transmitted over an SMTP link from the signing MTA. Note that MAIL FROM
may be just "&lt;&gt;", for example for a Delivery Status Notification.</t>

<t>The value is recorded as the base64 encoding of the <xref target="RFC5321"></xref> reverse-path
because of the complex syntax of reverse-path values (which can include
characters which would confuse naive parsers of DKIM2-Signature header
fields). The angle brackets MUST be included, but any "Mail-parameters"
that were present after the reverse-path MUST NOT be included.</t>

<t>ABNF:</t>

<figure><artwork><![CDATA[
sig-mf-tag  = %x6d %x66 [FWS] "=" base64string
]]></artwork></figure>

</section>
<section anchor="rt-the-rcpt-to-values-used-when-the-message-was-sent"><name>rt= the RCPT TO value(s) used when the message was sent</name>

<t>DKIM2 records the <xref target="RFC5321"></xref> RCPT TO value(s) that were used when the message
was transmitted over an SMTP link from the signing MTA.</t>

<t>The value is recorded as the base64 encoding of the <xref target="RFC5321"></xref> Forward-path
because of the complex syntax of Forward-path values (which can include
characters which would confuse naive parsers of DKIM2-Signature header
fields). The angle brackets MUST be included, but any "Rcpt-parameters"
that were present after the Forward-path MUST NOT be included.</t>

<t>When a message is intended for more than one recipient then the RCPT
TO values provided MAY include all of the recipients so that a single
copy of the email MAY be sent to all of the recipients in a single SMTP
transaction. Alternatively, multiple copies of the email may be
generated so as to not immediately reveal who else received the email.</t>

<t>However, if "bcc:" recipients are involved then in order to
meet the requirements of <xref target="RFC5322"></xref> Section 3.6.3 each and every
bcc recipients MUST NOT revealed to any other message recipient.</t>

<t>ABNF:</t>

<figure><artwork><![CDATA[
sig-rt-tag = %x72 %x74 [FWS] "=" base64string *("," base64string)
]]></artwork></figure>

</section>
<section anchor="d-the-domain-associated-with-this-signature"><name>d=  the domain associated with this signature.</name>

<t>This domain is used to form the query for the public key. The domain MUST be a valid DNS
name under which the DKIM2 key record is published.</t>

<t>The domain name in the d= tag MUST exactly match the rightmost labels of
the domain name of the mf= tag. That is to say, the domain name of the
mf= tag MUST either match the d= domain exactly or be a sub-domain
of the d= domain name.</t>

<t>When the mf= domain is empty ("&lt;&gt;"), as will be the case for Delivery
Status Notifications (DSNs), then no match is required.</t>

<t>ABNF:</t>

<figure><artwork><![CDATA[
sig-d-tag   = %x64 [FWS] "=" [FWS] Domain
]]></artwork></figure>

</section>
<section anchor="s-the-signature-values-for-the-message"><name>s= the signature value(s) for the message</name>

<t>The s= tag value contains the selector, signature algorithm name and
signature value. Calculating the value is explained in
<xref target="calculate-signature"/>.</t>

<t>The selector values subdivides the namespace for the domain being
used for signing.</t>

<t>The algorithm value is the one used to generate
the signature. Verifiers MUST support "RSA-SHA256" for which
the string "rsa-sha256" is used and "Ed25519-SHA256" for which the
string "ed25519-sha256" is used. See <xref target="algorithms"/> for a description
of these algorithms.</t>

<t>To provide for algorithmic dexterity more than one signature,
using different algorithms, MAY be supplied. Since the DNS lookup for
the public key will check that the k= algorithm value matches, a different
selector MUST necessarily be used for each signature.</t>

<t>ABNF:</t>

<figure><artwork><![CDATA[
sig-s-tag   = %x73 [FWS] "=" [FWS] sig-set *( "," sig-set )
sig-set     = selector [FWS] ":" [FWS] sig-name [FWS] ":" message-sig
sig-name    = "rsa-sha256" / "ed25519-sha256" / x-sig-name
x-sig-name  = textstring     ; for later extension
message-sig = base64string
]]></artwork></figure>

</section>
<section anchor="f-flags"><name>f=  flags</name>

<t>Flags serve two purposes; they either report what has been done to
the message by the system creating the DKIM2-Signature or they make
a request to systems that handle the mail thereafter. Flags are
separated by commas, and optional white-space allows systems to
add several flags without creating long lines.</t>

<t>If a flag value is not recognised it MUST be ignored.</t>

<t>The flag values that report things are:</t>

<t>"exploded": this message (identified by its unique header hash value (recorded
in the h= JSON object of the relevant Message-Instance) is being sent to more
than one email address. An
MTA which receives a message MAY use this information to help it distinguish
between malicious "DKIM replay" and legitimate activity performed by
mailing list. If this flag is not present in at least one DKIM2-Signature
header field then an MTA MAY assume that only one copy of a particular
message (identified by relevant cryptographic hash values) is intended
to exist;</t>

<t>The flags values that make requests are:</t>

<t>"donotexplode": this signer requests that the message not be sent to more
than one recipient. A system that, by local policy, ignores this request
MUST NOT allow any of the copies it creates to be forwarded on to any
MTA outside its control.</t>

<t>"donotmodify": this signer requests that the message not be modified from
the form in which it is sent. A system that, by local policy, ignores this
request MUST NOT allow the message to be forwarded on to any
MTA outside its control.</t>

<t>"feedback": this signer requests feedback about how this message is handled
during delivery and thereafter. This document does not describe what such
feedback might be or where it might be delivered. If this flag is absent
then feedback is explicitly not required.</t>

<t>ABNF:</t>

<figure><artwork><![CDATA[
sig-f-tag        = %x66 [FWS] "=" [FWS] sig-f-tag-data
                   *( [FWS] "," [FWS] sig-f-tag-data)
sig-f-tag-data   = "donotmodify" | "donotexplode" | "feedback" |
                   "exploded" | x-sig-f-tag-data
x-sig-f-tag-data = textstring ; for later extension
]]></artwork></figure>

</section>
</section>
<section anchor="signer-actions"><name>Signer Actions</name>

<t>This section gives the actions that need to be undertaken by the signer
of a message. They may be done in any appropriate order.</t>

<section anchor="add-any-necessary-message-instance-header-fields"><name>Add any Necessary Message-Instance Header Fields</name>

<t>If a system is generating the initial form of a message or if
it a Reviser that has made to changes to the message body and/or
header fields then it MUST compute the body hash as described in
<xref target="computing-body-hash"/> and the hash of the header fields
as described in <xref target="computing-header-hash"/>.</t>

<t>If the message does not contain a Message-Instance header field then one
MUST be added.</t>

<t>If hashing the message body or relevant header fields does not
give the same hash values as those recorded in the highest version
(m=) Message-Instance header field then a new Message-Instance
header field MUST be added.
This Message-Instance header field MUST contain "recipes" to be able to
recreate the message corresponding to the hash values in the
currently highest numbered Message-Instance header field, or a
null recipe to indicate that recreating the previous version
of the message will not be possible.</t>

<t>A system may add more than one Message-Instance header field if it
wishes to do so, but the DKIM2 design allows all modifications made by
any single system to be documented
in a single Message-Instance header field.</t>

<t>Note that the first (m=1) Message-Instance header field MAY
contain "recipes" if it is wished to record any changes made to a
message as it enters the DKIM2 ecosystem. All other Message-Instance
header fields SHOULD contain at least one "recipe".</t>

</section>
<section anchor="chain-of-custody"><name>Provide a "Chain of Custody" for the Message</name>

<t>To construct the DKIM2-Signature header field contains the MAIL FROM
and RCPT TO values that will be used when the message is transmitted
so these <xref target="RFC5321"></xref> "envelope" values MUST be available to (or
deducible by) a Signer.</t>

<t>The receiver of a message will check for an exact match (including
the local parts of the email addresses) between the MAIL FROM / RCPT TO
<xref target="RFC5321"></xref> protocol values and the mf= and rt= values in the highest numbered
(most recent) DKIM2-Signature header field. It is acceptable for there to
be more RCPT TO email addresses recorded in rt= than are actually used in
the SMTP conversation, but any RCPT TO value which is used MUST be present.</t>

<t>Verifiers will check for a relaxed domain match (see <xref target="relaxed-domain-match"/>)
between the signing domain (d=) and the domain in the MAIL FROM value.</t>

<t>When the message being signed already has a DKIM2-Signature header field
(i.e. it has already been transmitted at least once) then a valid
"chain of custody" MUST be apparent when all of the DKIM2-Signature header fields
are considered. This "chain of custody" contributes to the way in
which DKIM2 tackles "DKIM replay" attacks.</t>

<t>In any situation where a messages will be forwarded in such a way that the
mf= on the outgoing message is such that the "chain of custody"
would be broken then the Signer MUST generate an extra DKIM2-Signature
header field that causes values to match, i.e. a record must be fabricated
that documents the mail being passed from one domain to another.</t>

<t>It will be noted that the
creation of this extra header field will require the Signer to have access
to a DKIM2 private key associated with a domain in the RCPT TO entry. This is
often achieved by the Signer creating the private key and never sharing it.
The Signer gives the public key (and selector value) to the domain owner who
creates an appropriate DNS entry. Alternatively, the Signer creates a public
key DNS entry within a part of the DNS that they control and the domain owner
merely needs to publish a CNAME pointing at this.</t>

</section>
<section anchor="relaxed-domain-match"><name>The Relaxed Domain Match Algorithm</name>

<t>To assist in addressing the "DKIM replay" problem DKIM2 provides a
"chain of custody" for every message. This is established by checking
that the MAIL FROM value recorded in every DKIM2-Signature header field
(except of course the i=1 instance) can be matched with a RCPT TO value
of the next lower numbered DKIM2-Signature header field.</t>

<t>It is also necessary to check DKIM2-Signature header fields for a match
between the signing domain (specified in the d= tag) and the MAIL FROM
domain.</t>

<t>To allow systems to use existing "bounce-handling" schemes with special
subdomains in their MAIL FROM values a "relaxed" approach is taken
to the matches between these values.</t>

<t><list style="symbols">
  <t>Only the domain part of the MAIL FROM and RCPT TO values is used
for these matches The local part (and the @) are ignored.</t>
  <t>If there is not an exact match between the domain names then labels
are removed, one by one from the left hand side of the MAIL
FROM domain name and the comparison is repeated.</t>
  <t>If no labels remain then there is no match.</t>
</list></t>

</section>
<section anchor="signer_privatekey"><name>Select a Private Key and Corresponding Selector Value</name>

<t>This specification does not define the basis by which a Signer should
choose which private key and selector value to use -- this will be a
matter of administrative convenience.  Distribution and management of private
keys is also outside the scope of this document.</t>

</section>
<section anchor="calculate-signature"><name>Calculate a Signature Value</name>

<t>A Signer calculates a signature solely over the Message-Instance and
DKIM2-Signature header fields of the message. The hashes of
the body and other header fields are covered by the hashes in
the highest version (m=) Message-Instance header field and hence
the signature will in practice be signing the message as a whole.</t>

<t>Most cryptographic schemes proceed by first calculating a hash value
and then signing the hash value, but the DKIM2-Signature header field
only provides the final signature value. This means that there
is no difficulty if the hash value is inordinately long, or is
not emitted by the cryptographic routine being used.</t>

<t>The signature algorithm MUST apply the following steps
in the order given (which are consistent with the steps
undertaken in calculating header hashes).</t>

<t><list style="symbols">
  <t>Convert all relevant header field names (not the header field values) to
lowercase.  For example, convert "DKIM2-signature" to "dkim2-signature".</t>
  <t>Unfold all header field continuation lines as described in
<xref target="RFC5322"></xref>; in particular, lines with terminators embedded in
continued header field values (that is, CRLF sequences followed by
WSP) MUST be interpreted without the CRLF.  Implementations MUST
NOT remove the CRLF at the end of the header field value.</t>
  <t>Delete all WSP characters. This means all WSP characters before and
after the colon separating the header field name from the header
field value, all WSP characters within the unfolded header field
value and all trailing WPS characters before the CRLF. The colon
separator and the CRLF MUST be retained.</t>
  <t>Place the header fields in order. First come the Message-Instance
header fields in ascending instance (m=) order. Second are the
DKIM2-Signature header fields in ascending sequence (i=) order.
Last of all is an incomplete DKIM2-Signature header field (the
one that this system is creating) with all tags present except
that the signature value(s) within the (s=) value are set to
the null string (""). The incomplete header field MUST be
unfolded and have spaces removed in just the same way as the
complete header fields being processed.</t>
  <t>The concatenated header fields are then fed to the signature
algorithm(s). Once all the values are available the null strings
are replaced by the base64 values of the signatures.</t>
</list></t>

</section>
</section>
<section anchor="verifier_actions"><name>Verifier Actions</name>

<t>This section discusses the actions taken by a Verifier. In essence
this will involve repeating all the actions taken by a Signer to
produce a Message-Instance or DKIM2-Signature header field. To
avoid a lot of repetition these actions will not be spelled out
in detail. Once a hash value has been calculated it is then
compared with the value reported by the Signer, or the Signer's
public key is used to determine whether a signature that has
been provided is correct.</t>

<section anchor="output-states"><name>Output States</name>

<t>A verification ends in one of three states, which this document
refers to as follows:</t>

<t>SUCCESS:   a successful verification</t>

<t>PERMFAIL:  a permanent, non-recoverable error such as a signature
   verification failure or mismatched hash value</t>

<t>TEMPFAIL:  a temporary, recoverable error such as a DNS query timeout</t>

<t>A verifier MAY cease verifying once a single failure is detected.</t>

<t>Verifiers wishing to communicate the results of verification to other
parts of the mail system may do so in whatever manner they see fit.
For example, implementations might choose to add an email header
field to the message before passing it on.  Any such header field
SHOULD be inserted before any existing DKIM2-Signature or pre-existing
authentication status header fields in the header field block.  The
Authentication-Results: header field (<xref target="RFC8601"></xref>) MAY be used for this
purpose. It should be noted that any "Authentication-Results" header
field will count as a modification to the email if any further
DKIM2-Signature header fields are to be generated.</t>

</section>
<section anchor="validation-of-tag-fields"><name>Validation of Tag Fields</name>

<t>Implementers MUST meticulously validate the format and values of
Message-Instance and DKIM2-Signature header fields. Errors SHOULD
be treated as a PERMFAIL (signature syntax error).  Being "liberal in what
you accept" is an inappropriate strategy.</t>

<t>Note, however, that the presence of unknown tags in a DKIM2-Signature
header field (or a Message-Instance header field), MUST NOT cause a
verification to fail.</t>

<t>Verifiers MAY return PERMFAIL ("signature expired") if it is more than
14 days since the timestamp recorded in the "t=" tag of a DKIM2-Signature
header field.</t>

</section>
<section anchor="verifier_publickey"><name>Fetching the Public Key</name>

<t>The public key of a signature is needed to complete the verification
process. Details of key management and representation are described in
<xref target="key_management"/> and <xref target="DKIMKEYS"></xref>.  The Verifier MUST validate the key record and MUST
ignore any public key records that are malformed.</t>

<t>When validating a message, a Verifier MUST perform the following
steps in a manner that is semantically the same as performing them in
the order indicated; in some cases, the implementation may
parallelize or reorder these steps, as long as the semantics remain
unchanged:</t>

<t><list style="numbers" type="1">
  <t>The Verifier retrieves the public key as described in <xref target="key_management"/>
using the "d=" tag, and the selector from within the JSON object
in the "s" tag. If there is more than one signature within
the JSON object then these steps are repeated for each one.</t>
  <t>If the query for the public key fails to complete, the Verifier
MAY seek a later verification attempt by returning TEMPFAIL ("key
unavailable").</t>
  <t>If the query for the public key fails because the corresponding
key record does not exist, the Verifier MUST return
PERMFAIL ("no key for signature").</t>
  <t>If the query for the public key returns multiple key records, then
the return PERMFAIL ("more than one key returned" since this
is not permitted by <xref target="DKIMKEYS"></xref>).</t>
  <t>If the result returned from the query does not adhere to the
format defined in the DKIM key specification <xref target="DKIMKEYS"></xref>, the Verifier MUST ignore
the key record and return PERMFAIL ("key syntax error").  Verifiers
are urged to validate the syntax of key records carefully to
avoid attacks.  In particular, the Verifier MUST ignore
keys with a version code ("m=" tag) that they do not implement.</t>
  <t>If the public key data (the "p=" tag) is empty, then this key has
been revoked and the Verifier MUST treat this as a failed
signature check and return PERMFAIL ("key revoked").  There is no
defined semantic difference between a key that has been revoked
and a key record that has been removed.</t>
  <t>If the public key data is not suitable for use with the algorithm
specified in the DKIM-Signature header field, the Verifier MAY immediately
return PERMFAIL ("inappropriate key algorithm"). However, the tag fields
in the public key record that would cause this to occur are now deprecated
so DKIM2 implementations MAY ignore these tag fields altogether.</t>
  <t>If the "h=" tag exists in the public key record and the hash
algorithm implied by the type of signature being checked is not
included in the contents of the "h=" tag, the
Verifier MUST ignore the key record and return PERMFAIL
("inappropriate hash algorithm").</t>
</list></t>

</section>
<section anchor="perform-the-signature-verification-calculation"><name>Perform the Signature Verification Calculation</name>

<t>Verifying a signature consists of actions semantically equivalent to the
following steps:</t>

<t><list style="numbers" type="1">
  <t>Prepare a canonicalized version of the Message-Instance and DKIM2-Signature
header fields as described in <xref target="calculate-signature"/>. Note that this
canonicalized version does not actually replace the original content.</t>
  <t>Based on the algorithm and selector indicated s= tag value determine
whether the signature of the highest numbered DKIM2-Signature field
validates. The signature value(s) themselves will need to be removed
to correspond with what was actually signed. If the signature is incorrect
the Verifier SHOULD ignore the
signature and return PERMFAIL ("signature did not verify").</t>
  <t>If there is more than one signature provided then they MUST all be
checked if the verifier is able to do so. If any signature fails then
an error SHOULD be reported. If all signatures that can be checked fail
then PERMFAIL MUST be reported.</t>
  <t>If some signatures fail and other pass then the error that is
reported should provide that information (e.g. PERMFAIL "rsa-sha256
signature passed, ed25519-sha256 signature failed").</t>
</list></t>

<t>The reasoning for requiring that all signatures pass is that if a signature
scheme has recently become deprecated because it is known to be cryptographically
flawed then Signers will use a second (unbroken) signature scheme. However, such
a Signer may still provide the other signature for the benefit of Verifiers
that have yet to upgrade -- reasoning perhaps that attacks are too expensive
to be a very significant security issue. A Verifier that determines that
one signature passes whilst the other fails may well be in a position to
prevent an attack.</t>

</section>
<section anchor="verifier_extract"><name>Check Most Recent Signature and Hashes for the Message</name>

<t>A Verifier SHOULD check the validity of the most recently applied
(highest numbered i= value) DKIM2-Signature header field
and the associated (m=)
Message-Instance before accepting an email. If this check
does not pass then a Delivery Status Notification for the email MUST
NOT be generated thereafter -- hence the best strategy, if the email
is not wanted, is to reject it (with a 5xx error code) whilst the
relevant SMTP conversation is still ongoing. If the check gives
a TEMPFAIL result then a 4xx error code SHOULD be used to allow the
sending MTA to understand the situation.</t>

<t>A Verifier SHOULD check that the MAIL FROM value in the most
recent DKIM2-Signature header field is identical to the <xref target="RFC5321"></xref>
MAIL FROM values of the SMTP protocol interaction that
delivered the email to the Verifier. A Verifier SHOULD also
check that all of the <xref target="RFC5321"></xref> RCPT TO values from the SMTP
protocol occur in the most recent DKIM2-Signature header field.
The values MUST BE
put into lower-case before doing these checks. Note that these
check MUST NOT use the relaxed domain match algorithm.</t>

<t>A Verifier SHOULD check that there is a relaxed domain match
(see {relaxed-domain-match}) between the signing domain of the
most recently applied DKIM2-Signature header field and the
mf= value in that header field.</t>

<t>A Verifier SHOULD also check the chain of custody for the message
(see {chain-of-custody}) is valid, using a relaxed domain match (see
<xref target="relaxed-domain-match"/>).</t>

<t>Should checking these signatures (all but the most recently applied)
give the status TEMPFAIL then it may be possible for the Verifier
to determine the validity of the signature at a later time. It the
TEMPFAIL status continues to occur, or if a PERMFAIL is encountered
then this MAY be reported to the sending MTA by means of a Delivery
Status Notification. However the non-validating email MUST NOT be
forwarded to any MTA outside of the current organisation.</t>

</section>
<section anchor="checking-the-message-instance-header-fields"><name>Checking the Message-Instance Header Fields</name>

<t>The highest numbered (m=) Message-Instance header field SHOULD
be checked to determine that the message body has not been
altered since the body hash was calculated.</t>

<t>If the message has been modified since its original creation then
the Message-Instance header fields will enable a Verifier to determine
whether or not all the changes made are correctly recorded
by using the "recipes" to construct each preceding version
of the message.</t>

<t>Note that if it is only the first form of the message is of
interest then all the "recipes" can be applied in turn and
only one hash value checked -- the correctness of the
intermediate hash values are not relevant to this assessment.</t>

</section>
<section anchor="checking-the-dkim2-signature-header-fields"><name>Checking the DKIM2-Signature Header Fields</name>

<t>However, in order to check the chain of custody, to assess
whether the message has been exploded, to pick out
"feedback" requests to be honoured or to assign reputation to
Revisers then all of the DKIM2-Signature header fields
will have to checked for validity. The TBA document explores
these issues in more detail.</t>

</section>
<section anchor="verifier_interpret"><name>Interpret Results/Apply Local Policy</name>

<t>It is beyond the scope of this specification to describe what actions
the recipient of an email performs, but mail carrying valid DKIM2
signatures gives the recipient opportunities that unauthenticated
email would not.  Specifically, an authenticated email provides
predictable information by which other decisions can reliably be
managed, such as trust and reputation.  Conversely, it is hard
to assign trust or reputation to unauthenticated email.</t>

<t>If an MTA wishes to reject messages where signatures are missing
or do not verify, the handling MTA
SHOULD use a 550/5.7.x reply code.</t>

<t>Where the Verifier is integrated within the MTA and it is not
possible to fetch the public key, perhaps because the key server is
not available, a temporary failure message MAY be generated using a
451/4.7.5 reply code, such as:</t>

<t>451 4.7.5 Unable to verify signature - key server unavailable</t>

<t>Temporary failures such as inability to access the key server or
other external service are the only conditions that SHOULD use a 4xx
SMTP reply code.  In particular, cryptographic signature verification
failures MUST NOT provoke 4xx SMTP replies.</t>

</section>
</section>
<section anchor="bounce"><name>Delivery Status Notifications in the DKIM2 ecosystem</name>

<t>In the DKIM2 ecosystem, when a message cannot be delivered then
this is reported to the sending machine by means of an <xref target="RFC5321"/>
return code or, if the SMTP session has completed, by generating
a Delivery Status Notification (DSN, as defined in <xref target="RFC3461"/>.</t>

<t>A DSN MUST be addressed to the MTA that sent the message. This
prevents "backscatter" by passing failures back along the chain
of MTAs that were in involved in passing the message forwards. This
is achieved by using the mf= tag from the highest numbered
DKIM2-Signature field. If this field is null ("mf=&lt;&gt;") then a DSN
MUST NOT be sent.</t>

<section anchor="dsn-contents"><name>DSN contents</name>

<t>As set out in <xref target="RFC3461"/>, the DSN has a top-level MIME part of
type <spanx style="verb">multipart/report</spanx>. Among other things, that MIME part must
contain a MIME part of type <spanx style="verb">message/rfc822</spanx> that holds either
the original message exactly as it was submitted by the sending system
or just the header fields of that message.</t>

<t>All relevant DKIM2-Signature header fields (and Message-Instance
header fields if the message body is supplied) MUST verify. The
DSN itself MUST have appropriate Message-Instance and DKIM2-Signature
fields, noting that the MAIL FROM to be used will be null ("&lt;&gt;").</t>

<t>If the message body has been truncated (rather than omitted
altogether) then in order to allow verification of the DNS
contents a Message-Instance header field MUST be added to the
message with a body recipe containing a {"z": true} step.</t>

<section anchor="bounce-propagation"><name>Bounce Propagation</name>

<t>A Forwarder which receives a DSN MAY decide to propagate this
DSN to the MAIL FROM address used to deliver the message to it
(which can be found in the relevant DKIM2-Signature header field).
The DSN SHOULD be handled in the usual way, with Message-Instance
header fields documenting any changes and a DKIM2-Signature
field with an incremented hop count value added.</t>

<t>The Forwarder MAY alternatively decide to reconstruct the message
(or just the message header fields) as they were when the message
was delivered to the Forwarder and construct a DSN using that
information. The information in Message-Instance header fields
can be used to achieve this. The resultant DSN is sent to the
MAIL FROM address from the now highest numbered DKIM2-Signature
header field. Doing this will ensure that details of where the
message was forwarded to will not be revealed to the previous hop.</t>

</section>
<section anchor="authentication-of-inbound-bounce-notifications"><name>Authentication of Inbound Bounce Notifications</name>

<t>When a system receives a DKIM2 signed bounce notification, and the
included original message is also DKIM2 signed, it SHOULD
verify that this message (or just the header fields if the body
is not present) has not been altered.</t>

<t>This means:</t>

<t><list style="numbers" type="1">
  <t>The DSN's DKIM2-Signature will have a signing domain that is
aligned with the recipient of the message that is being returned.
The recipient's address is located in the rt= tag of the
last (highest i= tag) DKIM2-Signature in the returned message.</t>
  <t>The last (highest <spanx style="verb">i=</spanx> tag) DKIM2-Signature header field of the
returned message will be one that was generated by the system
receiving the bounce notification, determined by examining the
d= and mf= tags of that DKIM2-Signature header field.</t>
  <t>The header fields of the embedded message (in the message/rfc822
MIME part) can be verified. If the message body is present then
that can also be verified by inspecting the Message-Instance
header field(s).</t>
</list></t>

<t>If the verification fails then the DSN MUST NOT be propagated
any further. If verification has been performed prior to
accepting the DSN from the sender the DSN SHOULD be rejected
with a 550/5.7.x return code. If the verification cannot be completed
because of a temporary issue (with DNS lookups) then a 4xx
return code should be used.</t>

</section>
</section>
</section>
<section anchor="signer_normalize"><name>Preventing Transport Conversions</name>

<t>DKIM2's design is predicated on valid input.</t>

<t>In order to be signed a message will need to be in "network normal" format
(text is ASCII encoded, lines are separated with CRLF characters, etc.).</t>

<t>A message that is not compliant with <xref target="RFC5322"></xref>, <xref target="RFC2045"></xref>, <xref target="RFC2047"></xref>
and other relevant message format standards can be subject to attempts
by intermediaries to correct or interpret such content.  See Section 8
of <xref target="RFC6409"></xref> for examples of changes that are commonly made.  Such
"corrections" may invalidate DKIM2 signatures or have other undesirable
effects, including some that involve changes to the way a message is
presented to an end user.</t>

<t>When calculating the hash on messages that will be transmitted using
base64 or quoted-printable encoding, Signers MUST compute the hash
after the encoding.  Likewise, the Verifier MUST incorporate the
values into the hash before decoding the base64 or quoted-printable
text.  However, the hash MUST be computed before transport-level
encodings such as SMTP "dot-stuffing" (the modification of lines
beginning with a "." to avoid confusion with the SMTP end-of-message
marker, as specified in <xref target="RFC5321"></xref>).</t>

<t>Further, if the message contains local encoding that will be modified before transmission,
that modification to canonical <xref target="RFC5322"></xref> form MUST be done before signing.
In particular, bare CR or LF characters (used by some systems as a local line
separator convention) MUST be converted to the SMTP-standard CRLF
sequence before the message is signed.  Any conversion of this sort
SHOULD be applied to the message actually sent to the recipient(s),
not just to the version presented to the signing algorithm.</t>

<t>More generally, the Signer MUST sign the message as it is expected to
be received by the Verifier rather than in some local or internal form.</t>

</section>
<section anchor="eai-rfc6530-considerations-for-dkim2"><name>EAI (<xref target="RFC6530"></xref>) Considerations for DKIM2</name>

<t>TBA</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>TBA</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>TBA</t>

</section>
<section anchor="changes-from-earlier-versions"><name>Changes from Earlier Versions</name>

<t>draft-ietf-dkim-dkim2-spec-00</t>

<t>Removed JSON for hashes, signatures and SMTP parameters. Provided
valid JSON for recipes and added "z" for truncated body.
Changed algorithm names for signing. Simplified the canonicalisation
performed for the header fields signed by DKIM2-Signature.
Changed v= to m= for message instance numbering.</t>

<t>General tidying up of specifying tag=value specifications and
associated ABNF. Various other fixes for issues flagged in WG.</t>

<t>[[This section to be removed by RFC Editor]]</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC1034">
  <front>
    <title>Domain names - concepts and facilities</title>
    <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
    <date month="November" year="1987"/>
    <abstract>
      <t>This RFC is the revised basic definition of The Domain Name System. It obsoletes RFC-882. This memo describes the domain style names and their used for host address look up and electronic mail forwarding. It discusses the clients and servers in the domain name system and the protocol used between them.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="13"/>
  <seriesInfo name="RFC" value="1034"/>
  <seriesInfo name="DOI" value="10.17487/RFC1034"/>
</reference>
<reference anchor="RFC2045">
  <front>
    <title>Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Message Bodies</title>
    <author fullname="N. Freed" initials="N." surname="Freed"/>
    <author fullname="N. Borenstein" initials="N." surname="Borenstein"/>
    <date month="November" year="1996"/>
    <abstract>
      <t>This initial document specifies the various headers used to describe the structure of MIME messages. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2045"/>
  <seriesInfo name="DOI" value="10.17487/RFC2045"/>
</reference>
<reference anchor="RFC2047">
  <front>
    <title>MIME (Multipurpose Internet Mail Extensions) Part Three: Message Header Extensions for Non-ASCII Text</title>
    <author fullname="K. Moore" initials="K." surname="Moore"/>
    <date month="November" year="1996"/>
    <abstract>
      <t>This particular document is the third document in the series. It describes extensions to RFC 822 to allow non-US-ASCII text data in Internet mail header fields. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2047"/>
  <seriesInfo name="DOI" value="10.17487/RFC2047"/>
</reference>
<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC3461">
  <front>
    <title>Simple Mail Transfer Protocol (SMTP) Service Extension for Delivery Status Notifications (DSNs)</title>
    <author fullname="K. Moore" initials="K." surname="Moore"/>
    <date month="January" year="2003"/>
    <abstract>
      <t>This memo defines an extension to the Simple Mail Transfer Protocol (SMTP) service, which allows an SMTP client to specify (a) that Delivery Status Notifications (DSNs) should be generated under certain conditions, (b) whether such notifications should return the contents of the message, and (c) additional information, to be returned with a DSN, that allows the sender to identify both the recipient(s) for which the DSN was issued, and the transaction in which the original message was sent. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3461"/>
  <seriesInfo name="DOI" value="10.17487/RFC3461"/>
</reference>
<reference anchor="RFC4648">
  <front>
    <title>The Base16, Base32, and Base64 Data Encodings</title>
    <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
    <date month="October" year="2006"/>
    <abstract>
      <t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes. It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4648"/>
  <seriesInfo name="DOI" value="10.17487/RFC4648"/>
</reference>
<reference anchor="RFC5234">
  <front>
    <title>Augmented BNF for Syntax Specifications: ABNF</title>
    <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker"/>
    <author fullname="P. Overell" initials="P." surname="Overell"/>
    <date month="January" year="2008"/>
    <abstract>
      <t>Internet technical specifications often need to define a formal syntax. Over the years, a modified version of Backus-Naur Form (BNF), called Augmented BNF (ABNF), has been popular among many Internet specifications. The current specification documents ABNF. It balances compactness and simplicity with reasonable representational power. The differences between standard BNF and ABNF involve naming rules, repetition, alternatives, order-independence, and value ranges. This specification also supplies additional rule definitions and encoding for a core lexical analyzer of the type common to several Internet specifications. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="68"/>
  <seriesInfo name="RFC" value="5234"/>
  <seriesInfo name="DOI" value="10.17487/RFC5234"/>
</reference>
<reference anchor="RFC5321">
  <front>
    <title>Simple Mail Transfer Protocol</title>
    <author fullname="J. Klensin" initials="J." surname="Klensin"/>
    <date month="October" year="2008"/>
    <abstract>
      <t>This document is a specification of the basic protocol for Internet electronic mail transport. It consolidates, updates, and clarifies several previous documents, making all or parts of most of them obsolete. It covers the SMTP extension mechanisms and best practices for the contemporary Internet, but does not provide details about particular extensions. Although SMTP was designed as a mail transport and delivery protocol, this specification also contains information that is important to its use as a "mail submission" protocol for "split-UA" (User Agent) mail reading systems and mobile environments. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5321"/>
  <seriesInfo name="DOI" value="10.17487/RFC5321"/>
</reference>
<reference anchor="RFC5322">
  <front>
    <title>Internet Message Format</title>
    <author fullname="P. Resnick" initials="P." role="editor" surname="Resnick"/>
    <date month="October" year="2008"/>
    <abstract>
      <t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of "electronic mail" messages. This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, "Standard for the Format of ARPA Internet Text Messages", updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5322"/>
  <seriesInfo name="DOI" value="10.17487/RFC5322"/>
</reference>
<reference anchor="RFC6376">
  <front>
    <title>DomainKeys Identified Mail (DKIM) Signatures</title>
    <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker"/>
    <author fullname="T. Hansen" initials="T." role="editor" surname="Hansen"/>
    <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy"/>
    <date month="September" year="2011"/>
    <abstract>
      <t>DomainKeys Identified Mail (DKIM) permits a person, role, or organization that owns the signing domain to claim some responsibility for a message by associating the domain with the message. This can be an author's organization, an operational relay, or one of their agents. DKIM separates the question of the identity of the Signer of the message from the purported author of the message. Assertion of responsibility is validated through a cryptographic signature and by querying the Signer's domain directly to retrieve the appropriate public key. Message transit from author to recipient is through relays that typically make no substantive change to the message content and thus preserve the DKIM signature.</t>
      <t>This memo obsoletes RFC 4871 and RFC 5672. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="76"/>
  <seriesInfo name="RFC" value="6376"/>
  <seriesInfo name="DOI" value="10.17487/RFC6376"/>
</reference>
<reference anchor="RFC6409">
  <front>
    <title>Message Submission for Mail</title>
    <author fullname="R. Gellens" initials="R." surname="Gellens"/>
    <author fullname="J. Klensin" initials="J." surname="Klensin"/>
    <date month="November" year="2011"/>
    <abstract>
      <t>This memo splits message submission from message relay, allowing each service to operate according to its own rules (for security, policy, etc.), and specifies what actions are to be taken by a submission server.</t>
      <t>Message relay is unaffected, and continues to use SMTP over port 25.</t>
      <t>When conforming to this document, message submission uses the protocol specified here, normally over port 587.</t>
      <t>This separation of function offers a number of benefits, including the ability to apply specific security or policy requirements. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="72"/>
  <seriesInfo name="RFC" value="6409"/>
  <seriesInfo name="DOI" value="10.17487/RFC6409"/>
</reference>
<reference anchor="RFC6530">
  <front>
    <title>Overview and Framework for Internationalized Email</title>
    <author fullname="J. Klensin" initials="J." surname="Klensin"/>
    <author fullname="Y. Ko" initials="Y." surname="Ko"/>
    <date month="February" year="2012"/>
    <abstract>
      <t>Full use of electronic mail throughout the world requires that (subject to other constraints) people be able to use close variations on their own names (written correctly in their own languages and scripts) as mailbox names in email addresses. This document introduces a series of specifications that define mechanisms and protocol extensions needed to fully support internationalized email addresses. These changes include an SMTP extension and extension of email header syntax to accommodate UTF-8 data. The document set also includes discussion of key assumptions and issues in deploying fully internationalized email. This document is a replacement for RFC 4952; it reflects additional issues identified since that document was published. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6530"/>
  <seriesInfo name="DOI" value="10.17487/RFC6530"/>
</reference>
<reference anchor="RFC8259">
  <front>
    <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
    <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
    <date month="December" year="2017"/>
    <abstract>
      <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
      <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="90"/>
  <seriesInfo name="RFC" value="8259"/>
  <seriesInfo name="DOI" value="10.17487/RFC8259"/>
</reference>
<reference anchor="RFC8601">
  <front>
    <title>Message Header Field for Indicating Message Authentication Status</title>
    <author fullname="M. Kucherawy" initials="M." surname="Kucherawy"/>
    <date month="May" year="2019"/>
    <abstract>
      <t>This document specifies a message header field called "Authentication-Results" for use with electronic mail messages to indicate the results of message authentication efforts. Any receiver-side software, such as mail filters or Mail User Agents (MUAs), can use this header field to relay that information in a convenient and meaningful way to users or to make sorting and filtering decisions.</t>
      <t>This document obsoletes RFC 7601.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8601"/>
  <seriesInfo name="DOI" value="10.17487/RFC8601"/>
</reference>

<reference anchor="DKIMKEYS">
   <front>
      <title>Domain Name Specification for DKIM2</title>
      <author fullname="Wei Chuang" initials="W." surname="Chuang">
         <organization>Google</organization>
      </author>
      <date day="18" month="March" year="2026"/>
      <abstract>
	 <t>   The updated DomainKeys Identified Mail (DKIM2) permits an
   organization that owns the signing domain to claim some
   responsibility for a message by associating the domain with the
   message through a digital signature.  This is done by publishing to
   Domain Name Service (DNS) of the domain a public key that is then
   associated to the domain and where messages can be signed by the
   corresponding private key.  Assertion of responsibility is validated
   through a cryptographic signature and by querying the Signer’s domain
   directly to retrieve the appropriate public key.  This document
   describes DKIM2 DNS record format and how to find the record.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-chuang-dkim2-dns-04"/>
   
</reference>



    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC5598">
  <front>
    <title>Internet Mail Architecture</title>
    <author fullname="D. Crocker" initials="D." surname="Crocker"/>
    <date month="July" year="2009"/>
    <abstract>
      <t>Over its thirty-five-year history, Internet Mail has changed significantly in scale and complexity, as it has become a global infrastructure service. These changes have been evolutionary, rather than revolutionary, reflecting a strong desire to preserve both its installed base and its usefulness. To collaborate productively on this large and complex system, all participants need to work from a common view of it and use a common language to describe its components and the interactions among them. But the many differences in perspective currently make it difficult to know exactly what another participant means. To serve as the necessary common frame of reference, this document describes the enhanced Internet Mail architecture, reflecting the current service. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5598"/>
  <seriesInfo name="DOI" value="10.17487/RFC5598"/>
</reference>
<reference anchor="RFC8017">
  <front>
    <title>PKCS #1: RSA Cryptography Specifications Version 2.2</title>
    <author fullname="K. Moriarty" initials="K." role="editor" surname="Moriarty"/>
    <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
    <author fullname="J. Jonsson" initials="J." surname="Jonsson"/>
    <author fullname="A. Rusch" initials="A." surname="Rusch"/>
    <date month="November" year="2016"/>
    <abstract>
      <t>This document provides recommendations for the implementation of public-key cryptography based on the RSA algorithm, covering cryptographic primitives, encryption schemes, signature schemes with appendix, and ASN.1 syntax for representing keys and for identifying the schemes.</t>
      <t>This document represents a republication of PKCS #1 v2.2 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series. By publishing this RFC, change control is transferred to the IETF.</t>
      <t>This document also obsoletes RFC 3447.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8017"/>
  <seriesInfo name="DOI" value="10.17487/RFC8017"/>
</reference>
<reference anchor="RFC8032">
  <front>
    <title>Edwards-Curve Digital Signature Algorithm (EdDSA)</title>
    <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
    <author fullname="I. Liusvaara" initials="I." surname="Liusvaara"/>
    <date month="January" year="2017"/>
    <abstract>
      <t>This document describes elliptic curve signature scheme Edwards-curve Digital Signature Algorithm (EdDSA). The algorithm is instantiated with recommended parameters for the edwards25519 and edwards448 curves. An example implementation and test vectors are provided.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8032"/>
  <seriesInfo name="DOI" value="10.17487/RFC8032"/>
</reference>
<reference anchor="RFC8617">
  <front>
    <title>The Authenticated Received Chain (ARC) Protocol</title>
    <author fullname="K. Andersen" initials="K." surname="Andersen"/>
    <author fullname="B. Long" initials="B." role="editor" surname="Long"/>
    <author fullname="S. Blank" initials="S." role="editor" surname="Blank"/>
    <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy"/>
    <date month="July" year="2019"/>
    <abstract>
      <t>The Authenticated Received Chain (ARC) protocol provides an authenticated "chain of custody" for a message, allowing each entity that handles the message to see what entities handled it before and what the message's authentication assessment was at each step in the handling.</t>
      <t>ARC allows Internet Mail Handlers to attach assertions of message authentication assessment to individual messages. As messages traverse ARC-enabled Internet Mail Handlers, additional ARC assertions can be attached to messages to form ordered sets of ARC assertions that represent the authentication assessment at each step of the message-handling paths.</t>
      <t>ARC-enabled Internet Mail Handlers can process sets of ARC assertions to inform message disposition decisions, identify Internet Mail Handlers that might break existing authentication mechanisms, and convey original authentication assessments across trust boundaries.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8617"/>
  <seriesInfo name="DOI" value="10.17487/RFC8617"/>
</reference>

<reference anchor="CONCLUDEARC">
   <front>
      <title>Concluding the ARC Experiment</title>
      <author fullname="J. Trent Adams" initials="J. T." surname="Adams">
         <organization>Proofpoint</organization>
      </author>
      <author fullname="John R. Levine" initials="J. R." surname="Levine">
         <organization>Taughannock Networks</organization>
      </author>
      <date day="4" month="December" year="2025"/>
      <abstract>
	 <t>   This document calls for a conclusion to the experiment defined by
   “The Authenticated Received Chain (ARC) Protocol,” (RFC8617) and
   recommends that ARC no longer be deployed or relied upon between
   disparate senders and receivers.  The document summarizes what ARC
   set out to do, reports on operational experience, and explains how
   the experience gained during the experiment is being incorporated
   into the proposed DKIM2 work as the successor to DomainKeys
   Identified Mail (DKIM).  To avoid any future confusion, it is
   therefore requested that ARC (RFC8617) be marked “Obsolete” by the
   publication of this Internet-Draft.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-adams-arc-experiment-conclusion-01"/>
   
</reference>



    </references>

</references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

