Internet Engineering Task Force (IETF) Category: Standards Track April 2011 ISSN:

Similar documents
Internet Engineering Task Force (IETF) Updates: 5451 March 2012 Category: Standards Track ISSN:

Internet Engineering Task Force (IETF) September Indicating Handling States in Trace Fields

Internet Engineering Task Force (IETF) Request for Comments: 6522 STD: 73 January 2012 Obsoletes: 3462 Category: Standards Track ISSN:

Internet Engineering Task Force (IETF) Updates: 6376 January 2018 Category: Standards Track ISSN:

Internet Engineering Task Force (IETF) Category: Standards Track ISSN: January 2011

Internet Engineering Task Force (IETF) Category: Informational. May IEEE Information Element for the IETF

Internet Engineering Task Force (IETF) Request for Comments: ISSN: November 2013

Internet Engineering Task Force (IETF) Request for Comments: Category: Standards Track. Cisco May 2012

Internet Engineering Task Force (IETF) Updates: 4326 June 2014 Category: Standards Track ISSN:

Internet Engineering Task Force (IETF) October This document establishes an IETF URN Sub-namespace for use with OAuth-related specifications.

Internet Engineering Task Force (IETF) Request for Comments: ISSN: November 2011

Internet Engineering Task Force (IETF) Request for Comments: Category: Standards Track May 2011 ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 6028 Category: Experimental ISSN: October 2010

Internet Engineering Task Force (IETF) Request for Comments: 7504 June 2015 Updates: 1846, 5321 Category: Standards Track ISSN:

Internet Engineering Task Force (IETF) Category: Informational March 2016 ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 6591 April 2012 Category: Standards Track ISSN:

Internet Engineering Task Force (IETF) Request for Comments: ISSN: August 2010

D. Crocker, Ed. Updates: RFC4871 June 10, 2009 (if approved) Intended status: Standards Track Expires: December 12, 2009

Internet Engineering Task Force (IETF) Category: Standards Track. Enterprise Architects February 2012

Internet Engineering Task Force (IETF) Request for Comments: ISSN: January 2010

Internet Engineering Task Force (IETF) Request for Comments: 7319 BCP: 191 July 2014 Category: Best Current Practice ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 5736 Category: Informational. ICANN January 2010

Internet Engineering Task Force (IETF) Request for Comments: 6441 BCP: 171 November 2011 Category: Best Current Practice ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 6694 August 2012 Category: Informational ISSN:

Internet Engineering Task Force (IETF) Updates: 5322 March 2013 Category: Standards Track ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 7725 Category: Standards Track February 2016 ISSN:

Internet Engineering Task Force (IETF) Category: Standards Track ISSN: July 2012

Internet Engineering Task Force (IETF) Request for Comments: ISSN: Y. Umaoka IBM December 2010

Internet Engineering Task Force (IETF) Request for Comments: 7189 Category: Standards Track March 2014 ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 6725 Category: Standards Track August 2012 ISSN:

D. Crocker, Ed. Intended status: Standards Track January 25, 2009 Expires: July 29, 2009

Internet Engineering Task Force (IETF) Request for Comments: 6440 Category: Standards Track. Huawei December 2011

Internet Engineering Task Force (IETF) Category: Standards Track. March 2017

Internet Engineering Task Force (IETF) Request for Comments: ISSN: March 2018

Internet Engineering Task Force (IETF) Category: Standards Track March 2011 ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 8142 Category: Standards Track April 2017 ISSN:

Internet Engineering Task Force (IETF) Category: Standards Track ISSN: S. Previdi. Cisco Systems

Internet Engineering Task Force (IETF) Category: Standards Track ISSN: March 2010

Applicability Statement: DNS Security (DNSSEC) DNSKEY Algorithm Implementation Status

Internet Engineering Task Force (IETF) Request for Comments: 6379 Obsoletes: 4869 Category: Informational October 2011 ISSN:

Internet Engineering Task Force (IETF) April Elliptic Curve Digital Signature Algorithm (DSA) for DNSSEC

February Copyright (c) 2009 IETF Trust and the persons identified as the document authors. All rights reserved.

Internet Engineering Task Force (IETF) Request for Comments: ISSN: October 2011

Internet Engineering Task Force (IETF) Request for Comments: ISSN: March 2016

Internet Engineering Task Force (IETF) Huawei Technologies November 2013

Internet Engineering Task Force (IETF) Request for Comments: 6858 March 2013 Updates: 3501 Category: Standards Track ISSN:

Internet Engineering Task Force (IETF) June Network Time Protocol (NTP) Server Option for DHCPv6

Internet Engineering Task Force (IETF) BCP: 183 May 2013 Category: Best Current Practice ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 6686 Category: Informational July 2012 ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 6061 Category: Informational January 2011 ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 6034 Category: Standards Track October 2010 ISSN:

Internet Engineering Task Force (IETF) Request for Comments: J. Haas Juniper Networks March 2019

Internet Engineering Task Force (IETF) Request for Comments: 8035 Updates: 5761 November 2016 Category: Standards Track ISSN:

Internet Engineering Task Force (IETF) Category: Standards Track October 2014 ISSN:

Internet Engineering Task Force (IETF) Request for Comments: ISSN: July 2014

Internet Engineering Task Force (IETF) Request for Comments: 7193 Category: Informational. J. Schaad Soaring Hawk Consulting April 2014

Request for Comments: 7314 Category: Experimental July 2014 ISSN: Extension Mechanisms for DNS (EDNS) EXPIRE Option.

Internet Engineering Task Force (IETF) January 2014

Internet Engineering Task Force (IETF) Request for Comments: Category: Standards Track ISSN: September 2015

Internet Engineering Task Force (IETF) Request for Comments: Google K. Patel Cisco Systems August 2015

Internet Engineering Task Force (IETF) Request for Comments: 7537 Updates: 4379, L. Andersson S. Aldrin Huawei Technologies May 2015

Internet Engineering Task Force (IETF) Request for Comments: Category: Standards Track. July 2014

Internet Engineering Task Force (IETF) Updates: 2474 August 2018 Category: Standards Track ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 5725 Category: Standards Track ISSN: February 2010

Internet Engineering Task Force (IETF) Cisco Systems, Inc. April 2015

Internet Engineering Task Force (IETF) Request for Comments: Category: Standards Track ISSN: February 2016

Internet Engineering Task Force (IETF) Request for Comments: 8055 Category: Standards Track. January 2017

Internet Engineering Task Force (IETF) Request for Comments: 7660 Category: Standards Track. October 2015

Internet Engineering Task Force (IETF) Request for Comments: 8297 Category: Experimental December 2017 ISSN:

Internet Engineering Task Force (IETF) Request for Comments: November 2015

Internet Engineering Task Force (IETF) Category: Informational October 2013 ISSN:

Internet Engineering Task Force (IETF) ISSN: April 2014

Internet Engineering Task Force (IETF) Request for Comments: 7601 August 2015 Obsoletes: 7001, 7410 Category: Standards Track ISSN:

Internet Engineering Task Force (IETF) Request for Comments: March 2012

Internet Engineering Task Force (IETF) Request for Comments: 8516 Category: Standards Track January 2019 ISSN:

Category: Standards Track Cisco Systems D. Tappan Consultant October 2009

Internet Engineering Task Force (IETF) Request for Comments: 8069 Category: Informational February 2017 ISSN:

Request for Comments: 7912 Category: Informational June 2016 ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 7809 Updates: 4791 March 2016 Category: Standards Track ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 6309

Internet Engineering Task Force (IETF) Request for Comments: 8050 Category: Standards Track ISSN: May 2017

Internet Engineering Task Force (IETF) Request for Comments: 8441 Updates: 6455 September 2018 Category: Standards Track ISSN:

Internet Engineering Task Force (IETF) Category: Informational. August IANA Registration for the Cryptographic Algorithm Object Identifier Range

Internet Engineering Task Force (IETF) Request for Comments: Obsoletes: 1652 Category: Standards Track

Internet Engineering Task Force (IETF) Request for Comments: ISSN: October 2012

Internet Engineering Task Force (IETF) Request for Comments: November 2010

Internet Engineering Task Force (IETF) ISSN: April 2014

Internet Engineering Task Force (IETF) Request for Comments: 7330 Category: Standards Track. Cisco Systems August 2014

Moving the Undeployed TCP Extensions RFC 1072, RFC 1106, RFC 1110, RFC 1145, RFC 1146, RFC 1379, RFC 1644, and RFC 1693 to Historic Status.

Updates: 6126 May 2015 Category: Experimental ISSN: Extension Mechanism for the Babel Routing Protocol

Internet Engineering Task Force (IETF) Request for Comments: 7001 September 2013 Obsoletes: 5451, 6577 Category: Standards Track ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 7125 Category: Informational. February 2014

Internet Engineering Task Force (IETF) Request for Comments: ISSN: April 2011

Internet Engineering Task Force (IETF) Category: Standards Track. A. Langley Google Inc. E. Stephan Orange July 2014

Internet Engineering Task Force (IETF) Request for Comments: 7881 Category: Standards Track. Big Switch Networks July 2016

Internet Engineering Task Force (IETF) Request for Comments: April Internet Small Computer System Interface (iscsi) SCSI Features Update

Internet Engineering Task Force (IETF) Request for Comments: 8336 Category: Standards Track. March 2018

Internet Engineering Task Force (IETF) Request for Comments: 7213 Category: Standards Track. M. Bocci Alcatel-Lucent June 2014

Internet Engineering Task Force (IETF) Request for Comments: 7192 Category: Standards Track April 2014 ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 8186 Category: Standards Track. June 2017

Transcription:

Internet Engineering Task Force (IETF) M. Kucherawy Request for Comments: 6212 Cloudmark, Inc. Category: Standards Track April 2011 ISSN: 2070-1721 Authentication-Results Registration for Vouch by Reference Results Abstract This memo updates the registry of properties in Authentication- Results: message header fields to allow relaying of the results of a Vouch By Reference query. Status of This Memo This is an Internet Standards Track document. This document is a product of the Internet Engineering Task Force (IETF). It represents the consensus of the IETF community. It has received public review and has been approved for publication by the Internet Engineering Steering Group (IESG). Further information on Internet Standards is available in Section 2 of RFC 5741. Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at http://www.rfc-editor.org/info/rfc6212. Copyright Notice Copyright (c) 2011 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust s Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Kucherawy Standards Track [Page 1]

Table of Contents 1. Introduction...2 2. Keywords...2 3. Discussion...2 4. Definition...3 5. IANA Considerations...4 6. Security Considerations...5 7. References...5 7.1. Normative References...5 7.2. Informative References...5 Appendix A. Authentication-Results Examples...6 A.1. VBR Results...6 Appendix B. Acknowledgements...7 1. Introduction [AUTHRES] defined a new header field for electronic mail messages that presents the results of a message authentication effort in a machine-readable format. In the interim, a proposal for rudimentary domain-level reputation assessment, called Vouch By Reference, [VBR] was published and is now beginning to see popular use. This memo thus registers an additional reporting property allowing a VBR result to be relayed as an annotation in a message header. 2. Keywords The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [KEYWORDS]. 3. Discussion Vouch By Reference [VBR] introduced a mechanism by which a message receiver can query a "vouching" service to determine whether or not a trusted third party is willing to state that mail from a particular source can be considered legitimate. When this assessment is done at an inbound border mail gateway, it would be useful to relay the result of that assessment to internal mail entities such as filters or user agents. Reactions to the information contained in an Authentication-Results header field that contains VBR (or any) results are not specified here, as they are entirely a matter of local policy at the receiver. Kucherawy Standards Track [Page 2]

4. Definition This memo adds to the "Email Authentication Methods" registry, created by IANA upon publication of [AUTHRES], the following: o The method "vbr"; and o Associated with that method, the properties (reporting items) "header.md" and "header.mv". If "header.md" is present, its value MUST be the DNS domain name about which a VBR query was made. If "header.mv" is present, its value MUST be the DNS domain name that was queried as the potential voucher for the "header.md" domain. If the VBR query was made based on the content of a "VBR-Info" header field present on an incoming message, "header.md" is typically taken from the "md" tag of the "VBR-Info" header field, and "header.mv" is typically one of the values of the "mv" tag in the "VBR-Info" header field on that message. However, [VBR] permits a different mechanism for selection of the subject domain and/or list of vouchers, ignoring those present in any "VBR-Info" header field the message might have included. A server could even conduct a VBR query when no "VBR-Info" field was present, based on locally configured policy options. Where such mechanisms are applied, the verifying server MAY generate an Authentication-Results field to relay the results of the VBR query. This memo also adds to the "Email Authentication Result Names" registry the following result codes and definitions: none: No valid VBR-Info header was found in the message, or a domain name to be queried could not be determined. pass: A VBR query was completed, and the vouching service queried gave a positive response. fail: A VBR query was completed, and the vouching service queried did not give a positive response, or the message contained multiple VBR-Info header fields with different "mc" values (see [VBR]). temperror: A VBR query was attempted but could not be completed due to some error that is likely transient in nature, such as a temporary DNS error. A later attempt may produce a final result. Kucherawy Standards Track [Page 3]

permerror: A VBR query was attempted but could not be completed due to some error that is likely not transient in nature, such as a permanent DNS error. A later attempt is unlikely to produce a final result. 5. IANA Considerations Per [IANA], the following items have been added to the "Email Authentication Methods" registry: Method Defined ptype property value vbr RFC 6212 header md DNS domain name used as the subject of a VBR query vbr RFC 6212 header mv DNS domain name of the entity acting as the voucher Also, the following items have been added to the "Email Authentication Result Names" registry: Code Existing/New Defined In Method Meaning none existing RFC 5451 vbr Section 4 of pass existing RFC 5451 vbr Section 4 of fail existing RFC 5451 vbr Section 4 of temperror existing RFC 5451 vbr Section 4 of permerror existing RFC 5451 vbr Section 4 of Kucherawy Standards Track [Page 4]

6. Security Considerations This memo creates a mechanism for relaying [VBR] results using the structure already defined by [AUTHRES]. The Security Considerations sections of those documents should be consulted. 7. References 7.1. Normative References [AUTHRES] Kucherawy, M., "Message Header Field for Indicating Message Authentication Status", RFC 5451, April 2009. [KEYWORDS] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997. [VBR] Hoffman, P., Levine, J., and A. Hathcock, "Vouch By Reference", RFC 5518, April 2009. 7.2. Informative References [IANA] Narten, T. and H. Alvestrand, "Guidelines for Writing an IANA Considerations Section in RFCs", BCP 26, RFC 5226, May 2008. Kucherawy Standards Track [Page 5]

Appendix A. Authentication-Results Examples This section presents an example of the use of this new header field to indicate VBR results. A.1. VBR Results A message that triggered a VBR query, returning a result: Authentication-Results: mail-router.example.net; dkim=pass (good signature) header.d=newyork.example.com header.b=oineo8hg; vbr=pass (voucher.example.net) header.md=newyork.example.com header.mv=voucher.example.org Received: from newyork.example.com (newyork.example.com [192.0.2.250]) by mail-router.example.net (8.11.6/8.11.6) for <recipient@example.net> with ESMTP id i7pk0sh7021929; Fri, Feb 15 2002 17:19:22-0800 DKIM-Signature: v=1; a=rsa-sha256; s=rashani; d=newyork.example.com; t=1188964191; c=relaxed/simple; h=from:date:to:vbr-info:message-id:subject; bh=seu28nfs9fuzgd/psr7anysby3jtdaq3xv9xpqts0m7=; b=oineo8hgn/gnunsg... 9n9ODSNFSDij3= From: sender@newyork.example.com Date: Fri, Feb 15 2002 16:54:30-0800 To: meetings@example.net VBR-Info: md=newyork.example.com; mc=list; mv=voucher.example.org Message-Id: <12345.abc@newyork.example.com> Subject: here s a sample Example 1: Header Field Reporting Results from a VBR Query Here we see an example of a message that was signed using DomainKeys Identified Mail (DKIM) and that also included a VBR-Info header field. On receipt, it is found that the "md=" field in the latter and the "d=" field in the former matched, and also that the DKIM signature verified, so a VBR query was performed. The vouching service, voucher.example.org, indicated that the sender can be trusted, so a "pass" result is included in the Authentication-Results field affixed prior to delivery. Kucherawy Standards Track [Page 6]

Appendix B. Acknowledgements The author wishes to acknowledge the following for their review and constructive criticism of this proposal: JD Falk, John Levine, and Alessandro Vesely. Author s Address Murray S. Kucherawy Cloudmark, Inc. 128 King St., 2nd Floor San Francisco, CA 94107 US Phone: +1 415 946 3800 EMail: msk@cloudmark.com Kucherawy Standards Track [Page 7]