1
2
3
4
5
6
7Network Working Group D. Crocker, Ed.
8Request for Comments: 5672 Brandenburg InternetWorking
9Updates: 4871 August 2009
10Category: Standards Track
11
12
13 RFC 4871 DomainKeys Identified Mail (DKIM) Signatures -- Update
14
15Abstract
16
17 This document updates RFC 4871, "DomainKeys Identified Mail (DKIM)
18 Signatures". Specifically, the document clarifies the nature, roles,
19 and relationship of the two DKIM identifier tag values that are
20 candidates for payload delivery to a receiving processing module.
21 The Update is in the style of an Errata entry, albeit a rather long
22 one.
23
24Status of This Memo
25
26 This document specifies an Internet standards track protocol for the
27 Internet community, and requests discussion and suggestions for
28 improvements. Please refer to the current edition of the "Internet
29 Official Protocol Standards" (STD 1) for the standardization state
30 and status of this protocol. Distribution of this memo is unlimited.
31
32Copyright Notice
33
34 Copyright (c) 2009 IETF Trust and the persons identified as the
35 document authors. All rights reserved.
36
37 This document is subject to BCP 78 and the IETF Trust's Legal
38 Provisions Relating to IETF Documents in effect on the date of
39 publication of this document (http://trustee.ietf.org/license-info).
40 Please review these documents carefully, as they describe your rights
41 and restrictions with respect to this document.
42
43 This document may contain material from IETF Documents or IETF
44 Contributions published or made publicly available before November
45 10, 2008. The person(s) controlling the copyright in some of this
46 material may not have granted the IETF Trust the right to allow
47 modifications of such material outside the IETF Standards Process.
48 Without obtaining an adequate license from the person(s) controlling
49 the copyright in such materials, this document may not be modified
50 outside the IETF Standards Process, and derivative works of it may
51 not be created outside the IETF Standards Process, except to format
52 it for publication as an RFC or to translate it into languages other
53 than English.
54
55
56
57
58Crocker Standards Track [Page 1]
59
60RFC 5672 RFC 4871 Update August 2009
61
62
63Table of Contents
64
65 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 2
66 2. RFC 4871, Abstract . . . . . . . . . . . . . . . . . . . . . . 4
67 3. RFC 4871, Section 1, Introduction . . . . . . . . . . . . . . 4
68 4. RFC 4871, Section 2.7, Identity . . . . . . . . . . . . . . . 4
69 5. RFC 4871, Section 2.8, Identifier . . . . . . . . . . . . . . 5
70 6. RFC 4871, Section 2.9, Signing Domain Identifier (SDID) . . . 5
71 7. RFC 4871, Section 2.10, Agent or User Identifier (AUID) . . . 5
72 8. RFC 4871, Section 2.11, Identity Assessor . . . . . . . . . . 6
73 9. RFC 4871, Section 3.5, The DKIM-Signature Header Field . . . . 6
74 10. RFC 4871, Section 3.5, The DKIM-Signature Header Field . . . . 7
75 11. RFC 4871, Section 3.8, Signing by Parent Domains . . . . . . . 9
76 12. RFC 4871, Section 3.9, Relationship between SDID and AUID . . 10
77 13. RFC 4871, Section 6.3, Interpret Results/Apply Local Policy . 11
78 14. RFC 4871, Section 6.3, Interpret Results/Apply Local Policy . 11
79 15. RFC 4871, Appendix D, MUA Considerations . . . . . . . . . . . 12
80 16. Security Considerations . . . . . . . . . . . . . . . . . . . 12
81 17. Normative References . . . . . . . . . . . . . . . . . . . . . 12
82 Appendix A. ABNF Fragments . . . . . . . . . . . . . . . . . . . 13
83 Appendix B. Acknowledgements . . . . . . . . . . . . . . . . . . 14
84
85
861. Introduction
87
88 About the purpose for DKIM, [RFC4871] states:
89
90 The ultimate goal of this framework is to permit a signing domain
91 to assert responsibility for a message, thus protecting message
92 signer identity...
93
94 Hence, DKIM has a signer that produces a signed message, a verifier
95 that confirms the signature, and an assessor that consumes the
96 validated signing domain. So, the simple purpose of DKIM is to
97 communicate an identifier to a receive-side assessor module. The
98 identifier is in the form of a domain name that refers to a
99 responsible identity. For DKIM to be interoperable and useful, the
100 signer and assessor must share the same understanding of the details
101 about the identifier.
102
103 However, the RFC 4871 specification defines two, potentially
104 different, identifiers that are carried in the DKIM-Signature: header
105 field, d= and i=. Either might be delivered to a receiving
106 processing module that consumes validated payload. The DKIM
107 specification fails to clearly define which is the "payload" to be
108 delivered to a consuming module, versus what is internal and merely
109 in support of achieving payload delivery.
110
111
112
113
114Crocker Standards Track [Page 2]
115
116RFC 5672 RFC 4871 Update August 2009
117
118
119 This currently leaves signers and assessors with the potential for
120 making different interpretations between the two identifiers and may
121 lead to interoperability problems. A signer could intend one to be
122 used for assessment, and have a different intent in setting the value
123 in the other. However the verifier might choose the wrong value to
124 deliver to the assessor, thereby producing an unintended (and
125 inaccurate) assessment.
126
127 This Update resolves that confusion. It defines additional, semantic
128 labels for the two values, clarifies their nature, and specifies
129 their relationship. More specifically, it clarifies that the
130 identifier intended for delivery to the assessor -- such as one that
131 consults a whitelist -- is the value of the "d=" tag. However, this
132 does not prohibit message filtering engines from using the "i=" tag,
133 or any other information in the message's header, for filtering
134 decisions.
135
136 For signers and verifiers that have been using the i= tag as the
137 primary value that is delivered to the assessor, a software change to
138 using the d= tag is intended.
139
140 So, this Update clarifies the formal interface to DKIM, after
141 signature verification has been performed. It distinguishes DKIM's
142 internal signing and verification activity, from its standardized
143 delivery of data to that interface.
144
145 The focus of the Update is on the portion of DKIM that is much like
146 an API definition. If DKIM is implemented as a software library for
147 use by others, it needs to define what outputs are provided, that is,
148 what data that an application developer who uses the library can
149 expect to obtain as a result of invoking DKIM on a message.
150
151 This Update defines the output of that library to include the yes/no
152 result of the verification and the "d=" value. In other words, it
153 says what (one) identifier was formally specified for use by the
154 signer and whether the use of that identifier has been validated.
155 For a particular library, other information can be provided at the
156 discretion of the library developer, since developers of assessors --
157 these are the consumers of the DKIM library -- well might want more
158 information than the standardized two pieces of information.
159 However, that standardized set is the minimum that is required to be
160 provided to a consuming module, in order to be able to claim that the
161 library is DKIM compliant.
162
163 This does not state what the implicit value of "i=" is, relative to
164 "d=". In this context, that fact is irrelevant.
165
166
167
168
169
170Crocker Standards Track [Page 3]
171
172RFC 5672 RFC 4871 Update August 2009
173
174
175 Another example is the difference between the socket interface to TCP
176 versus the TCP protocol itself. There is the activity within the
177 protocol stack, and then there is the activity within in the software
178 libraries that are actually used.
179
180 NOTE: The text provided here updates [RFC4871]. Text appearing in
181 the "Corrected Text:" replaces text in RFC 4871. Hence,
182 references that appear in the "Original Text:" can be found in RFC
183 4871, and are not duplicated in this document.
184
185 The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
186 "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
187 document are to be interpreted as described in [RFC2119].
188
1892. RFC 4871, Abstract
190
191 Original Text:
192
193 The ultimate goal of this framework is to permit a signing domain
194 to assert responsibility for a message,
195
196 Corrected Text:
197
198 The ultimate goal of this framework is to permit a person, role or
199 organization that owns the signing domain to assert responsibility
200 for a message,
201
2023. RFC 4871, Section 1, Introduction
203
204 Original Text:
205
206 ...permitting a signing domain to claim responsibility
207
208 Corrected Text:
209
210 permitting a person, role, or organization that owns the signing
211 domain to claim responsibility
212
2134. RFC 4871, Section 2.7, Identity
214
215 Original Text:
216
217 (None. New section. Additional text.)
218
219
220
221
222
223
224
225
226Crocker Standards Track [Page 4]
227
228RFC 5672 RFC 4871 Update August 2009
229
230
231 Corrected Text:
232
233 A person, role, or organization. In the context of DKIM, examples
234 include author, author's organization, an ISP along the handling
235 path, an independent trust assessment service, and a mailing list
236 operator.
237
2385. RFC 4871, Section 2.8, Identifier
239
240 Original Text:
241
242 (None. New section. Additional text.)
243
244 Corrected Text:
245
246 A label that refers to an identity.
247
2486. RFC 4871, Section 2.9, Signing Domain Identifier (SDID)
249
250 Original Text:
251
252 (None. New section. Additional text.)
253
254 Corrected Text:
255
256 A single domain name that is the mandatory payload output of DKIM
257 and that refers to the identity claiming responsibility for
258 introduction of a message into the mail stream. For DKIM
259 processing, the name has only basic domain name semantics; any
260 possible owner-specific semantics are outside the scope of DKIM.
261 It is specified in Section 3.5.
262
2637. RFC 4871, Section 2.10, Agent or User Identifier (AUID)
264
265 Original Text:
266
267 (None. New section. Additional text.)
268
269 Corrected Text:
270
271 A single identifier that refers to the agent or user on behalf of
272 whom the Signing Domain Identifier (SDID) has taken
273 responsibility. The AUID comprises a domain name and an optional
274 <Local-part>. The domain name is the same as that used for the
275 SDID or is a sub-domain of it. For DKIM processing, the domain
276 name portion of the AUID has only basic domain name semantics; any
277 possible owner-specific semantics are outside the scope of DKIM.
278 It is specified in Section 3.5.
279
280
281
282Crocker Standards Track [Page 5]
283
284RFC 5672 RFC 4871 Update August 2009
285
286
2878. RFC 4871, Section 2.11, Identity Assessor
288
289 Original Text:
290
291 (None. New section. Additional text.)
292
293 Corrected Text:
294
295 A module that consumes DKIM's mandatory payload, which is the
296 responsible Signing Domain Identifier (SDID). The module is
297 dedicated to the assessment of the delivered identifier. Other
298 DKIM (and non-DKIM) values can also be delivered to this module as
299 well as to a more general message evaluation filtering engine.
300 However, this additional activity is outside the scope of the DKIM
301 signature specification.
302
3039. RFC 4871, Section 3.5, The DKIM-Signature Header Field
304
305 Original Text:
306
307 d= The domain of the signing entity (plain-text; REQUIRED). This is
308 the domain that will be queried for the public key. This domain
309 MUST be the same as or a parent domain of the "i=" tag (the
310 signing identity, as described below), or it MUST meet the
311 requirements for parent domain signing described in Section 3.8.
312 When presented with a signature that does not meet these
313 requirement, verifiers MUST consider the signature invalid.
314
315 Internationalized domain names MUST be encoded as described in
316 [RFC3490].
317
318 ABNF:
319
320 sig-d-tag = %x64 [FWS] "=" [FWS] domain-name
321 domain-name = sub-domain 1*("." sub-domain)
322 ; from RFC 2821 Domain,
323 but excluding address-literal
324
325 Corrected Text:
326
327 d=
328
329 Specifies the SDID claiming responsibility for an introduction
330 of a message into the mail stream (plain-text; REQUIRED).
331 Hence, the SDID value is used to form the query for the public
332 key. The SDID MUST correspond to a valid DNS name under which
333 the DKIM key record is published. The conventions and
334 semantics used by a signer to create and use a specific SDID
335
336
337
338Crocker Standards Track [Page 6]
339
340RFC 5672 RFC 4871 Update August 2009
341
342
343 are outside the scope of the DKIM Signing specification, as is
344 any use of those conventions and semantics. When presented
345 with a signature that does not meet these requirements,
346 verifiers MUST consider the signature invalid.
347
348 Internationalized domain names MUST be encoded as described in
349 [RFC3490].
350
351 ABNF:
352
353 sig-d-tag = %x64 [FWS] "=" [FWS] domain-name
354 domain-name = sub-domain 1*("." sub-domain)
355 ; from RFC 5321 Domain,
356 but excluding address-literal
357
35810. RFC 4871, Section 3.5, The DKIM-Signature Header Field
359
360 Original Text:
361
362 i= Identity of the user or agent (e.g., a mailing list manager) on
363 behalf of which this message is signed (dkim-quoted-printable;
364 OPTIONAL, default is an empty Local-part followed by an "@"
365 followed by the domain from the "d=" tag). The syntax is a
366 standard email address where the Local-part MAY be omitted. The
367 domain part of the address MUST be the same as or a subdomain of
368 the value of the "d=" tag.
369
370 Internationalized domain names MUST be converted using the steps
371 listed in Section 4 of [RFC3490] using the "ToASCII" function.
372
373 ABNF:
374
375 sig-i-tag = %x69 [FWS] "=" [FWS]
376 [ Local-part ] "@" domain-name
377
378 INFORMATIVE NOTE: The Local-part of the "i=" tag is optional
379 because in some cases a signer may not be able to establish a
380 verified individual identity. In such cases, the signer may
381 wish to assert that although it is willing to go as far as
382 signing for the domain, it is unable or unwilling to commit
383 to an individual user name within their domain. It can do so
384 by including the domain part but not the Local-part of the
385 identity.
386
387 INFORMATIVE DISCUSSION: This document does not require the value
388 of the "i=" tag to match the identity in any message header
389 fields. This is considered to be a verifier policy issue.
390 Constraints between the value of the "i=" tag and other
391
392
393
394Crocker Standards Track [Page 7]
395
396RFC 5672 RFC 4871 Update August 2009
397
398
399 identities in other header fields seek to apply basic
400 authentication into the semantics of trust associated with a
401 role such as content author. Trust is a broad and complex
402 topic and trust mechanisms are subject to highly creative
403 attacks. The real-world efficacy of
404 bindings between the "i=" value and other identities is not
405 well established, nor is its vulnerability to subversion by
406 an attacker. Hence reliance on the use of these options
407 should be strictly limited. In particular, it is not at all
408 clear to what extent a typical end-user recipient can rely on
409 any assurances that might be made by successful use of the
410 "i=" options.
411
412 Corrected Text:
413
414 i=
415
416 The Agent or User Identifier (AUID) on behalf of which the SDID
417 is taking responsibility (dkim-quoted-printable; OPTIONAL,
418 default is an empty Local-part followed by an "@" followed by
419 the domain from the "d=" tag).
420
421 The syntax is a standard email address where the Local-part MAY
422 be omitted. The domain part of the address MUST be the same
423 as, or a subdomain of the value of, the "d=" tag.
424
425 Internationalized domain names MUST be converted using the
426 steps listed in Section 4 of [RFC3490] using the "ToASCII"
427 function.
428
429 ABNF:
430
431 sig-i-tag = %x69 [FWS] "=" [FWS]
432 [ Local-part ] "@" domain-name
433
434 The AUID is specified as having the same syntax as an email
435 address, but is not required to have the same semantics.
436 Notably, the domain name is not required to be registered in
437 the DNS -- so it might not resolve in a query -- and the Local-
438 part MAY be drawn from a namespace that does not contain the
439 user's mailbox. The details of the structure and semantics for
440 the namespace are determined by the Signer. Any knowledge or
441 use of those details by verifiers or assessors is outside the
442 scope of the DKIM Signing specification. The Signer MAY choose
443 to use the same namespace for its AUIDs as its users' email
444 addresses or MAY choose other means of representing its users.
445 However, the signer SHOULD use the same AUID for each message
446 intended to be evaluated as being within the same sphere of
447
448
449
450Crocker Standards Track [Page 8]
451
452RFC 5672 RFC 4871 Update August 2009
453
454
455 responsibility, if it wishes to offer receivers the option of
456 using the AUID as a stable identifier that is finer grained
457 than the SDID.
458
459 INFORMATIVE NOTE: The Local-part of the "i=" tag is optional
460 because, in some cases, a signer may not be able to establish a
461 verified individual identity. In such cases, the signer might
462 wish to assert that although it is willing to go as far as
463 signing for the domain, it is unable or unwilling to commit to
464 an individual user name within their domain. It can do so by
465 including the domain part but not the Local-part of the
466 identity.
467
46811. RFC 4871, Section 3.8, Signing by Parent Domains
469
470 Original Text:
471
472 e.g., a key record for the domain example.com can be used to
473 verify messages where the signing identity ("i=" tag of the
474 signature) is sub.example.com, or even sub1.sub2.example.com. In
475 order to limit the capability of such keys when this is not
476 intended, the "s" flag may be set in the "t=" tag of the key
477 record to constrain the validity of the record to exactly the
478 domain of the signing identity. If the referenced key record
479 contains the "s" flag as part of the "t=" tag, the domain of the
480 signing identity ("i=" flag) MUST be the same as that of the d=
481 domain. If this flag is absent, the domain of the signing
482 identity MUST be the same as, or a subdomain of, the d= domain.
483
484 Corrected Text:
485
486 ...for example, a key record for the domain example.com can be
487 used to verify messages where the AUID ("i=" tag of the signature)
488 is sub.example.com, or even sub1.sub2.example.com. In order to
489 limit the capability of such keys when this is not intended, the
490 "s" flag MAY be set in the "t=" tag of the key record, to
491 constrain the validity of the domain of the AUID. If the
492 referenced key record contains the "s" flag as part of the "t="
493 tag, the domain of the AUID ("i=" flag) MUST be the same as that
494 of the SDID (d=) domain. If this flag is absent, the domain of
495 the AUID MUST be the same as, or a subdomain of, the SDID.
496
497
498
499
500
501
502
503
504
505
506Crocker Standards Track [Page 9]
507
508RFC 5672 RFC 4871 Update August 2009
509
510
51112. RFC 4871, Section 3.9, Relationship between SDID and AUID
512
513 Original Text: (None. New section. Additional text.)
514
515 Corrected Text:
516
517 DKIM's primary task is to communicate from the Signer to a
518 recipient-side Identity Assessor a single Signing Domain
519 Identifier (SDID) that refers to a responsible identity. DKIM MAY
520 optionally provide a single responsible Agent or User Identifier
521 (AUID).
522
523 Hence, DKIM's mandatory output to a receive-side Identity Assessor
524 is a single domain name. Within the scope of its use as DKIM
525 output, the name has only basic domain name semantics; any
526 possible owner-specific semantics are outside the scope of DKIM.
527 That is, within its role as a DKIM identifier, additional
528 semantics cannot be assumed by an Identity Assessor.
529
530 A receive-side DKIM verifier MUST communicate the Signing Domain
531 Identifier (d=) to a consuming Identity Assessor module and MAY
532 communicate the Agent or User Identifier (i=) if present.
533
534 To the extent that a receiver attempts to intuit any structured
535 semantics for either of the identifiers, this is a heuristic
536 function that is outside the scope of DKIM's specification and
537 semantics. Hence, it is relegated to a higher-level service, such
538 as a delivery handling filter that integrates a variety of inputs
539 and performs heuristic analysis of them.
540
541 INFORMATIVE DISCUSSION: This document does not require the value
542 of the SDID or AUID to match the identifier in any other message
543 header field. This requirement is, instead, an assessor policy
544 issue. The purpose of such a linkage would be to authenticate the
545 value in that other header field. This, in turn, is the basis for
546 applying a trust assessment based on the identifier value. Trust
547 is a broad and complex topic and trust mechanisms are subject to
548 highly creative attacks. The real-world efficacy of any but the
549 most basic bindings between the SDID or AUID and other identities
550 is not well established, nor is its vulnerability to subversion by
551 an attacker. Hence, reliance on the use of such bindings should
552 be strictly limited. In particular, it is not at all clear to
553 what extent a typical end-user recipient can rely on any
554 assurances that might be made by successful use of the SDID or
555 AUID.
556
557
558
559
560
561
562Crocker Standards Track [Page 10]
563
564RFC 5672 RFC 4871 Update August 2009
565
566
56713. RFC 4871, Section 6.3, Interpret Results/Apply Local Policy
568
569 Original Text:
570
571 It is beyond the scope of this specification to describe what
572 actions a verifier system should make, but an authenticated email
573 presents an opportunity to a receiving system that unauthenticated
574 email cannot. Specifically, an authenticated email creates a
575 predictable identifier by which other decisions can reliably be
576 managed, such as trust and reputation. Conversely,
577 unauthenticated email lacks a reliable identifier that can be used
578 to assign trust and reputation.
579
580 Corrected Text:
581
582 It is beyond the scope of this specification to describe what
583 actions an Identity Assessor can make, but mail carrying a
584 validated SDID presents an opportunity to an Identity Assessor
585 that unauthenticated email does not. Specifically, an
586 authenticated email creates a predictable identifier by which
587 other decisions can reliably be managed, such as trust and
588 reputation.
589
59014. RFC 4871, Section 6.3, Interpret Results/Apply Local Policy
591
592 Original Text:
593
594 Once the signature has been verified, that information MUST be
595 conveyed to higher-level systems (such as explicit allow/
596 whitelists and reputation systems) and/or to the end user. If the
597 message is signed on behalf of any address other than that in the
598 From: header field, the mail system SHOULD take pains to ensure
599 that the actual signing identity is clear to the reader.
600
601 Corrected Text:
602
603 Once the signature has been verified, that information MUST be
604 conveyed to the Identity Assessor (such as an explicit allow/
605 whitelist and reputation system) and/or to the end user. If the
606 SDID is not the same as the address in the From: header field, the
607 mail system SHOULD take pains to ensure that the actual SDID is
608 clear to the reader.
609
610
611
612
613
614
615
616
617
618Crocker Standards Track [Page 11]
619
620RFC 5672 RFC 4871 Update August 2009
621
622
62315. RFC 4871, Appendix D, MUA Considerations
624
625 Original Text:
626
627 The tendency is to have the MUA highlight the address associated
628 with this signing identity in some way, in an attempt to show the
629 user the address from which the mail was sent.
630
631 Corrected Text:
632
633 The tendency is to have the MUA highlight the SDID, in an attempt
634 to show the user the identity that is claiming responsibility for
635 the message.
636
63716. Security Considerations
638
639 This Update clarifies core details about DKIM's payload. As such, it
640 affects interoperability, semantic characterization, and the
641 expectations for the identifiers carried with a DKIM signature.
642 Clarification of these details is likely to limit misinterpretation
643 of DKIM's semantics. Since DKIM is fundamentally a security
644 protocol, this should improve its security characteristics.
645
64617. Normative References
647
648 [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
649 Requirement Levels", BCP 14, RFC 2119, March 1997.
650
651 [RFC3490] Faltstrom, P., Hoffman, P., and A. Costello,
652 "Internationalizing Domain Names in Applications (IDNA)",
653 RFC 3490, March 2003.
654
655 [RFC4871] Allman, E., Callas, J., Delany, M., Libbey, M., Fenton,
656 J., and M. Thomas, "DomainKeys Identified Mail (DKIM)
657 Signatures", RFC 4871, May 2007.
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674Crocker Standards Track [Page 12]
675
676RFC 5672 RFC 4871 Update August 2009
677
678
679Appendix A. ABNF Fragments
680
681 This appendix contains the full set of corrected ABNF fragments
682 defined in this document.
683
684 Copyright (c) 2009 IETF Trust and the persons identified as authors
685 of the code. All rights reserved.
686
687 Redistribution and use in source and binary forms, with or without
688 modification, are permitted provided that the following conditions
689 are met:
690
691 - Redistributions of source code must retain the above copyright
692 notice, this list of conditions and the following disclaimer.
693
694 - Redistributions in binary form must reproduce the above copyright
695 notice, this list of conditions and the following disclaimer in the
696 documentation and/or other materials provided with the
697 distribution.
698
699 - Neither the name of Internet Society, IETF or IETF Trust, nor the
700 names of specific contributors, may be used to endorse or promote
701 products derived from this software without specific prior written
702 permission.
703
704 THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
705 'AS IS' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
706 LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
707 A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
708 OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
709 SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
710 LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
711 DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
712 THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
713 (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
714 OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
715
716 This version of this MIB module is part of RFC 5672; see the RFC
717 itself for full legal notices.
718
719 sig-d-tag = %x64 [FWS] "=" [FWS] domain-name
720 domain-name = sub-domain 1*("." sub-domain)
721 ; from RFC 5321 Domain,
722 but excluding address-literal
723
724 sig-i-tag = %x69 [FWS] "=" [FWS]
725 [ Local-part ] "@" domain-name
726
727
728
729
730Crocker Standards Track [Page 13]
731
732RFC 5672 RFC 4871 Update August 2009
733
734
735Appendix B. Acknowledgements
736
737 This document was initially formulated by an ad hoc design team,
738 comprising: Jon Callas, D. Crocker, J. D. Falk, Michael Hammer, Tony
739 Hansen, Murray Kucherawy, John Levine, Jeff Macdonald, Ellen Siegel,
740 and Wietse Venema. The final version of the document was developed
741 through vigorous discussion in the IETF DKIM working group.
742
743Author's Address
744
745 D. Crocker (editor)
746 Brandenburg InternetWorking
747
748 Phone: +1.408.246.8253
749 EMail: dcrocker@bbiw.net
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786Crocker Standards Track [Page 14]
787
788