WG Review: Domain Keys Identified Mail (dkim)

The IESG <iesg-secretary@ietf.org> Thu, 06 February 2025 20:40 UTC

Return-Path: <iesg-secretary@ietf.org>
X-Original-To: ietf-announce@ietfa.amsl.com
Delivered-To: ietf-announce@ietfa.amsl.com
Received: from mail.ietf.org (ietfa.amsl.com [50.223.129.194]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPSA id 1AA23C18DB9A; Thu, 6 Feb 2025 12:40:35 -0800 (PST)
Received: from [10.244.8.212] (unknown [104.131.183.230]) by ietfa.amsl.com (Postfix) with ESMTP id DA5BBC204D1A; Thu, 6 Feb 2025 12:40:34 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce <ietf-announce@ietf.org>
Subject: WG Review: Domain Keys Identified Mail (dkim)
X-Test-IDTracker: no
X-IETF-IDTracker: 12.35.0
Auto-Submitted: auto-generated
Precedence: bulk
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
Message-ID: <173887443448.187.6319712985617559117@dt-datatracker-75c44cbbdf-pxnd6>
Date: Thu, 06 Feb 2025 12:40:34 -0800
Message-ID-Hash: FEKOUFKT2PENNH7PATU4D4MXYW2IVQLW
X-Message-ID-Hash: FEKOUFKT2PENNH7PATU4D4MXYW2IVQLW
X-MailFrom: iesg-secretary@ietf.org
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-ietf-announce.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: ietf-dkim@ietf.org
X-Mailman-Version: 3.3.9rc6
Reply-To: iesg@ietf.org
List-Id: "IETF announcement list. No discussions." <ietf-announce.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf-announce/tkSJroGvtb4tH1iS6P3Mk4b-sas>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf-announce>
List-Help: <mailto:ietf-announce-request@ietf.org?subject=help>
List-Owner: <mailto:ietf-announce-owner@ietf.org>
List-Post: <mailto:ietf-announce@ietf.org>
List-Subscribe: <mailto:ietf-announce-join@ietf.org>
List-Unsubscribe: <mailto:ietf-announce-leave@ietf.org>

A new IETF WG has been proposed in the Applications and Real-Time Area. The
IESG has not made any determination yet. The following draft charter was
submitted, and is provided for informational purposes only. Please send your
comments to the IESG mailing list (iesg@ietf.org) by 2025-02-16.

Domain Keys Identified Mail (dkim)
-----------------------------------------------------------------------
Current status: Proposed WG

Chairs:
  Laura A <laura@wordtothewise.com>
  Tim Wicinski <tjw.ietf@gmail.com>

Assigned Area Director:
  Murray Kucherawy <superuser@gmail.com>

Applications and Real-Time Area Directors:
  Murray Kucherawy <superuser@gmail.com>
  Orie Steele <orie@or13.io>

Mailing list:
  Address: ietf-dkim@ietf.org
  To subscribe: https://www.ietf.org/mailman/listinfo/ietf-dkim/
  Archive: https://mailarchive.ietf.org/arch/browse/ietf-dkim/

Group page: https://datatracker.ietf.org/group/dkim/

Charter: https://datatracker.ietf.org/doc/charter-ietf-dkim/

Background

An Internet message (email) may, from creation to final delivery, pass
through multiple handling agents, some of which simply route the message,
others effecting an interim delivery and reinjection into the ecosystem. 
There are complexities with this handling model, such as evaluation,
filtering, intentional mutation, and even malicious activities.

The core email protocols do not provide for authentication of the identifiers
in the message that indicate authorship, receipt, or handling, nor do they
involve themselves with evaluation of the content for any sort of validity or
safety.  DKIM [STD 76] attaches a domain name to a message by using a
cryptographic signature.  The signature survives simple relaying but does not
survive transit through some intermediate handling agents.  There is a desire
to retain signature validity across a wider range of common transits,
including where modifications are made during forwarding, such as by mailing
lists.

There are contemporary issues, which were not concerns at the time of STD 76
or earlier standards, that the community now seeks to address, including the
following:

* There is a desire to maintain validation of a message's signing identifier
across common transit and forwarding modifications.  When a message goes
through a re-posting, such as through a mailing list, the validation
signature typically does not survive and cannot be recovered.  Fixing this
would permit a more robust evaluation of the message.

* DKIM “replay” exploits the absence of a protected recipient address, where
an authorized user of a site sends a message that is signed by that site to a
collaborating receiver, which then re-sends the message to other recipients
not in the original set of recipients, but without any indication that the
message has been re-posted.  This way, the domain name of the DKIM signature
is intended to result in a positive reputation analysis that will obtain
deliveries that otherwise would not succeed.

* “Backscatter” can result from unauthorized use of the (envelope) sender of
a message, where bulk failure notifications go to an address that is not
responsible for such unauthorized use.

* Service providers that generate mail on behalf of an entity have no
visibility into any resulting errors, as they are sent to the entity and not
the provider.

No optimal or preferred remedy to any of the above is provided by any
contemporary technology.

Objectives

The working group will develop a new technology suite that seeks to address
these concerns.  Pursuit of incremental enhancements to DKIM and/or novel
applications of DKIM are preferred, but not required.  In particular, this
technology will strive to:

* Provide assurances against unauthorized use of the (envelope) sender,
reducing the success of direct domain name misuse and improving the value of
delivery status notifications;

* Identify message mutations made by any handling agent that affect signature
validity; and

* Attach annotations in transit of the intended chain of handling to assure
accountability for each delivery, aiding in the mitigation of backscatter.

The working group will prefer a result that is incremental to the deployed
ecosystem.  It may, however, determine that a technology which supersedes
existing technologies such as DKIM, DMARC, and ARC, is a superior solution. 
In either case, the working group will be expected to document support for
its decisions.

To allow for widespread adoption, proposed solutions are expected to be
robust in terms of interoperability and scalability.

Deliverables

The working group will produce multiple documents:

* An overview document describing the problem area and proposed mechanism
(Informational)

* One or more documents specifying the new mechanism(s) (Standards Track)

* An Applicability Statement guiding use during any deployment period, in
which interoperability with existing mechanisms needs to be maintained
(Standards Track)

The working group may optionally introduce the mechanism document at
Experimental status first to gain operational experience before pursuing
Standards Track status.

This working group will also liaise with the DMARC working group on adding
its specification as a new recognized authentication mechanism. If the DMARC
working group has concluded by that time, this working group can undertake
that update in coordination with the responsible Area Directors.

Initial Documents

The working group will consider adoption of these documents as starting
points:

* draft-gondwana-dkim2-motivation
* draft-gondwana-dkim2-modification-alegbra

As usual, consideration of other alternative proposals is encouraged.

Proposed Milestones

[dates to be negotiated; focus on the sequence for now]

* WG Formation: Feb 2025

* Overview document: Mar 2025

* Mechanism document draft(s): Mar 2025

* Experiments and drafts: Apr 2025 - Nov 2025

* Implementation guide: Nov 2025

* Publish documents as a group: Dec 2025

Milestones: