<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
 <!ENTITY rfc0822 PUBLIC "" "http://xml.resource.org/public/rfc/bibxml/reference.RFC.0822.xml">
 <!ENTITY rfc2476 PUBLIC "" "http://xml.resource.org/public/rfc/bibxml/reference.RFC.2476.xml">
 <!ENTITY rfc2554 PUBLIC "" "http://xml.resource.org/public/rfc/bibxml/reference.RFC.2554.xml">
 <!ENTITY rfc2821 PUBLIC "" "http://xml.resource.org/public/rfc/bibxml/reference.RFC.2821.xml">
 <!ENTITY rfc2822 PUBLIC "" "http://xml.resource.org/public/rfc/bibxml/reference.RFC.2822.xml">
 <!ENTITY rfc3207 PUBLIC "" "http://xml.resource.org/public/rfc/bibxml/reference.RFC.3207.xml">
]>

<?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?>

<!-- autobreaks="yes" -->
<?rfc comments="yes" ?> <?rfc inline="yes" ?>
<?rfc compact="yes" ?> <?rfc subcompact="no" ?> <!-- colonspace="no" -->
<!-- editing="no" -->
<?rfc iprnotified="yes" ?>
<!-- linkmailto="yes" -->
<!-- <?rfc private="Internet-Draft" ?> <?rfc header="Internet-Draft" ?> --> <!-- footer="" -->
<!-- slides="no" --> <!-- background="" --> <!-- emoticonic="no" --> <!-- useobject="no" -->
<!-- sortrefs="no" --> <?rfc symrefs="yes" ?>
<?rfc strict="yes" ?>
<?rfc toc="yes" ?> <?rfc tocdepth="2" ?>
<!-- tocompact="yes" --> <!-- tocindent="yes" --> <!-- tocnarrow="yes" -->
<!-- topblock="yes" -->

<!--

(defun fanf-xml-insert-xref ()
 (interactive)
 (insert "<xref target=\"\"/>"))

(local-set-key "\M-r" 'fanf-xml-insert-xref)
(local-set-key """" 'self-insert-command)

-->

<rfc ipr="full3978"
     docName="draft-fanf-dkim-rationale">
<!-- category="info" -->

<!-- === -->
 <front>

  <!-- provisional -->

  <title abbrev="DKIM Rationale">
   Threats to email addressed by DomainKeys Identified Mail (DKIM)
  </title>

  <author initials="T." surname="Finch" fullname="Tony Finch">
   <organization abbrev="University of Cambridge">
    University of Cambridge Computing Service
   </organization>
   <address>
    <postal>
     <street>New Museums Site</street>
     <street>Pembroke Street</street>
     <city>Cambridge</city>
     <code>CB2 3QH</code>
     <country>ENGLAND</country>
    </postal>
    <phone>+44 797 040 1426</phone>
    <email>dot@dotat.at</email>
    <uri>http://dotat.at/</uri>
   </address>
  </author>

  <date month="August" year="2005"/>

  <area>Security</area>
  <workgroup>DKIM</workgroup>

  <abstract>

   <t>XXX</t>

  </abstract>

  <note title="Document revision">
   <t>$Cambridge: hermes/doc/antiforgery/draft-fanf-dkim-rationale.xml,v 1.3 2006/02/28 18:47:54 fanf2 Exp $</t>
  </note>

 </front>

 <middle>

<!-- === -->
  <section title="Introduction">

   <t>XXX</t>

   <t><xref target="DKIM"/></t>

  </section>

<!-- === -->
  <section title="Identitifying an accountable entity">

   <t>an accountable entity is someone who is willing to accept the
   consequences of emitting email that the recipients don't like e.g.
   blacklisting, filtering</t>

   <t>performance improvements from avoiding filtering of known-good email</t>

   <t>email has many identities, but they are all fairly weak; the IP
   addresses currently strongest</t>

   <section title="Using IP addresses for accountability">

    <t>volatile addresses, shared addresses</t>

    <t>mismatch between message route and origin</t>

   </section>

   <section title="Using domain names for accountability">

    <t>more information available as a basis for reputation</t>

    <t>simpler black/white list management</t>

    <t>some success already with domains from URLs used by
    spammers/phishers</t>

   </section>

   <section title="Attacks against the accountable entity">

    <t>Replay attacks - direct and parasitic. Fine-grained keying.
    Revocation IDs. Revoking delegated key selectors.</t>

   </section>

  </section>

<!-- === -->
  <section title="Using cryptography to provide stronger identification">

   <t>Use of signatures as a tool to provide a strong identity; other
   applications of crypto sigs are irrelevant or incidental
   (non-repudiation, message integrity, etc.)</t>

   <t><list style="symbols">
    <t>problems with existing solutions</t>
    <t>why we want to stuff the signature in the message header</t>
    <t>and use the DNS for key distribution</t>
    <t>see &lt;Pine.LNX.4.60.0508171837430.8751@hermes-1.csi.cam.ac.uk&gt;</t>
   </list></t>

   <section title="Vulnerabilities of email signatures">

    <t>public archives expose sigs to offline attack; message
    modification in transit - however usually done by good guys not
    bad guys! (mailing lists)</t>

    <t>how to make signature robust against reasonable modifications
    and resistant to attack? contradictory requirements</t>

   </section>

   <section title="Network attacks">

    <t>signature added to message after submission;
    low-level network attacks most likely during submission</t>

    <t>out-of-scope for DKIM - see
    <xref target="RFC2476"/> <xref target="RFC2554"/> <xref target="RFC3207"/>.</t>

   </section>

  </section>

<!-- === -->
  <section title="Survey of email identities">

   <t>how they might be strengthened and/or why they are difficult to
   use as they are</t>

   <t>Identity names are clarified by reference to the relevant
   commands described in <xref target="RFC2821"/> or header fields
   described in <xref target="RFC2822"/>.</t>

   <section title="Hostname (RFC 2821 EHLO)">

    <t>routinely misconfigured or a total lie</t>

    <t>out-of-scope for DKIM - see e.g. <xref target="CSA"/>.</t>

    <t>However hostname verification can be used to optimise certain
    DKIM checks.</t>

   </section>

   <section title="Return path (RFC 2821 MAIL FROM)">

    <t>
    original message data often not present in bounce messages
      so a signature in the message can't be used to secure this
      -&gt; security tag in the address itself
    </t>

    <t>out-of-scope for DKIM - see e.g. <xref target="BATV"/>.</t>

   </section>

   <section title="Sender (RFC 2822 Sender:)">

    <t>often not displayed to recipients
    so strengthening it may not be all that useful</t>

    <t>problems with the way it is currently used
      e.g. mailing lists</t>

    <t>problems related to authors also apply to sender
      (except for multiple authorship)</t>

   </section>

   <section title="Author(s) (RFC 2822 From:)">

    <t>roaming users should still be supported
      e.g. where the accountable identity
      is the ISP that runs the smart host
      not domain of author(s)</t>

    <t>multiple authorship is awkward to handle
      especially because of the preceding</t>

   </section>

   <section title="Re-sender(s) (RFC 2822 Resent-Sender: and Resent-From:)">

    <t>not widely used; invisible if re-sending is actually forwarding;
    <xref target="RFC0822"/> / <xref target="RFC2822"/> incompatibility</t>

   </section>

  </section>

<!-- === -->
  <section title="The Signer identity">

   <t>we can work with simpler semantics by introducing a new identity
   (though DKIM provides some complexity here with d=/s=/i=)</t>

   <t>may multiple signers occur if message is re-sent?
   separately accountable, separate times and places
   unlike authorship which is joint</t>

   <section title="Relationship with standard identities">

    <t>tied to traditional identities with SSP</t>

   </section>

  </section>

<!-- === -->
  <section title="Security Considerations">

   <t>This entire document discusses security weaknesses in
   Internet email and how they might be mitigated.</t>

  </section>

 </middle>

<!-- === -->
 <back>

  <references title="Normative references">

   &rfc2821;
   &rfc2822;

   <reference anchor="DKIM">
    <front>
     <title>DomainKeys Identified Mail (DKIM)</title>
     <author fullname="Eric Allman" initials="E." surname="Allman">
      <organization>Sendmail, Inc.</organization>
     </author>
     <author fullname="Jon Callas" initials="J." surname="Callas">
      <organization>PGP Corporation</organization>
     </author>
     <author fullname="Mark Delaney" initials="M." surname="Delaney">
      <organization>Yahoo! Inc.</organization>
     </author>
     <author fullname="Miles Libbey" initials="M." surname="Libbey">
      <organization>Yahoo! Inc.</organization>
     </author>
     <author fullname="Jim Fenton" initials="J." surname="Fenton">
      <organization>Cisco Systems, Inc.</organization>
     </author>
     <author fullname="Michael Thomas" initials="M." surname="Thomas">
      <organization>Cisco Systems, Inc.</organization>
     </author>
     <date day="9" month="July" year="2005"/>
    </front>
    <seriesInfo name="Internet-Draft" value="draft-allman-dkim-base-00"/>
   </reference>

  </references>

  <references title="Informative references">

   &rfc0822;
   &rfc2476;
   &rfc2554;
   &rfc3207;

   <reference anchor="BATV">
    <front>
     <title>Bounce Address Tag Validation (BATV)</title>
     <author fullname="John Levine" initials="J." surname="Levine">
      <organization>Taughannock Networks</organization>
     </author>
     <author fullname="Dave Crocker" initials="D." surname="Crocker">
      <organization>Brandenburg InternetWorking</organization>
     </author>
     <author fullname="Sam Silberman" initials="S." surname="Silberman">
      <organization>Openwave</organization>
     </author>
     <author fullname="Tony Finch" initials="T." surname="Finch">
      <organization>University of Cambridge</organization>
     </author>
     <date day="7" month="September" year="2004"/>
    </front>
    <seriesInfo name="Internet-Draft" value="draft-levine-mass-batv-00"/>
   </reference>

   <reference anchor="CSA">
    <front>
     <title>Client SMTP Authorization (CSA)</title>
     <author fullname="Douglas Otis" initials="D." surname="Otis">
      <organization>Mail Abuse Prevention System</organization>
     </author>
     <author fullname="Dave Crocker" initials="D." surname="Crocker">
      <organization>Brandenburg InternetWorking</organization>
     </author>
     <author fullname="John Leslie" initials="J." surname="Leslie">
      <organization>JLC.net</organization>
     </author>
     <date day="20" month="February" year="2005"/>
    </front>
    <seriesInfo name="Internet-Draft" value="draft-ietf-marid-csv-csa-02"/>
   </reference>

  </references>

<!-- === -->

  <section title="IANA Considerations">

   <t>This document specifies no actions for IANA</t>

  </section>

  <section title="Contributors">

   <t>Ned Freed pointed out the distinction between the use of
   cryptographic signatures as a tool and as a higher-level
   service.
   &lt;01LS5XOD9DPU000092@mauve.mrochek.com&gt;</t>

   <t>Doug Otis suggested the use of HELO verification to optimise
   certain DKIM checks, and the use of revocation IDs to deal with
   replay attacks.
   &lt;7B3DE745-64F5-4593-8DC4-2597C1D1B1CA@mail-abuse.org&gt;</t>

   <t>Michael Thomas provided a list of deployment problems with
   existing cryptographic email security protocols and how these are
   addressed by DKIM.
   &lt;4300FC01.80406@mtcc.com&gt;</t>

  </section>

 </back>

</rfc>
