signature=7e7e67fec24a64ab17cc7208b624644f,draft-akagiri-mail-divide-01

Network Working Group T. Akagiri

Internet-Draft Regumi, Inc.

Intended status: Experimental G. Yasutaka

Expires: January 28, 2018 Rakuten, Inc.

K. Okada

T. Hayashi

Lepidum Co. Ltd.

M. Kase

Individual Contributor

July 27, 2017

Mail Divide Framework

draft-akagiri-mail-divide-01

Abstract

Mail Divide Framework (MDF) is a recipient driven partitioning

framework for E-Mail delivery. A protocol to divide mail delivery at

the source of the message is defined in this draft. A mechanism

called Reputation Service Provider is also introduced so that a

third-party authority can assure senders' trust. With MDF,

subdomaining is used for category-specific MTA designation. Senders

decide which category the outgoing mail belongs. It then looks up

DNS TXT record to find whether the recipient advertises a specific

server for that category. The specified server puts the received

mail into a corresponding per-category inbox for the user.

Status of This Memo

This Internet-Draft is submitted in full conformance with the

provisions of BCP 78 and BCP 79.

Internet-Drafts are working documents of the Internet Engineering

Task Force (IETF). Note that other groups may also distribute

working documents as Internet-Drafts. The list of current Internet-

Drafts is at http://datatracker.ietf.org/drafts/current/.

Internet-Drafts are draft documents valid for a maximum of six months

and may be updated, replaced, or obsoleted by other documents at any

time. It is inappropriate to use Internet-Drafts as reference

material or to cite them other than as "work in progress."

This Internet-Draft will expire on January 28, 2018.

Akagiri, et al. Expires January 28, 2018 [Page 1]

Internet-Draft MDF July 2017

Copyright Notice

Copyright (c) 2017 IETF Trust and the persons identified as the

document authors. All rights reserved.

This document is subject to BCP 78 and the IETF Trust's Legal

Provisions Relating to IETF Documents

(http://trustee.ietf.org/license-info) in effect on the date of

publication of this document. Please review these documents

carefully, as they describe your rights and restrictions with respect

to this document. Code Components extracted from this document must

include Simplified BSD License text as described in Section 4.e of

the Trust Legal Provisions and are provided without warranty as

described in the Simplified BSD License.

Table of Contents

1. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3

1.1. Key Words . . . . . . . . . . . . . . . . . . . . . . . . 3

1.2. Mail Divide Framework (MDF) . . . . . . . . . . . . . . . 3

1.3. Mail Category . . . . . . . . . . . . . . . . . . . . . . 3

1.4. Reputation Service Provider (RSP) . . . . . . . . . . . . 4

1.5. DIVIDE record . . . . . . . . . . . . . . . . . . . . . . 4

1.6. Imported Definitions . . . . . . . . . . . . . . . . . . 4

1.7. Message Handling Agent Definitions . . . . . . . . . . . 4

2. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 4

3. Operational Overview . . . . . . . . . . . . . . . . . . . . 6

3.1. Preparation . . . . . . . . . . . . . . . . . . . . . . . 7

3.1.1. Advertise Receiver Policy . . . . . . . . . . . . . . 7

3.2. Sending in MDF . . . . . . . . . . . . . . . . . . . . . 7

3.2.1. Submission with category . . . . . . . . . . . . . . 7

3.2.2. Looking Up DIVIDE Records . . . . . . . . . . . . . . 7

3.2.3. Subdomaining Recipient Domain . . . . . . . . . . . . 8

3.2.4. Transmitting Mail . . . . . . . . . . . . . . . . . . 8

3.3. Receiving in MDF . . . . . . . . . . . . . . . . . . . . 8

3.3.1. Sender Authentication . . . . . . . . . . . . . . . . 8

3.3.2. Reputation Lookup . . . . . . . . . . . . . . . . . . 8

3.3.3. Headers and Envelope Handling . . . . . . . . . . . . 9

3.3.4. Deliver to Specific Inbox . . . . . . . . . . . . . . 9

3.3.5. Read the mail . . . . . . . . . . . . . . . . . . . . 9

4. Mail Categories . . . . . . . . . . . . . . . . . . . . . . . 9

5. DIVIDE Records . . . . . . . . . . . . . . . . . . . . . . . 11

5.1. DNS Resource Records Syntax . . . . . . . . . . . . . . . 11

5.2. Multiple DNS Records . . . . . . . . . . . . . . . . . . 12

5.3. Record Size . . . . . . . . . . . . . . . . . . . . . . . 12

6. Reputation Service Providers . . . . . . . . . . . . . . . . 12

6.1. White-list Management . . . . . . . . . . . . . . . . . . 13

6.2. Reputation Query and Result Caching . . . . . . . . . . . 13

Akagiri, et al. Expires January 28, 2018 [Page 2]

Internet-Draft MDF July 2017

6.3. Evaluation and Feedback . . . . . . . . . . . . . . . . . 14

7. Result Handling . . . . . . . . . . . . . . . . . . . . . . . 14

8. Mailing-list . . . . . . . . . . . . . . . . . . . . . . . . 14

9. Multi-hop Delivery . . . . . . . . . . . . . . . . . . . . . 14

10. Security Considerations . . . . . . . . . . . . . . . . . . . 15

10.1. DNS Spoofing . . . . . . . . . . . . . . . . . . . . . . 15

11. Privacy Considerations . . . . . . . . . . . . . . . . . . . 15

11.1. DNS queries . . . . . . . . . . . . . . . . . . . . . . 15

11.2. Reputation queries . . . . . . . . . . . . . . . . . . . 15

12. References . . . . . . . . . . . . . . . . . . . . . . . . . 16

12.1. Normative References . . . . . . . . . . . . . . . . . . 16

12.2. Informative References . . . . . . . . . . . . . . . . . 17

Appendix A. Collected ABNF . . . . . . . . . . . . . . . . . . . 17

Appendix B. Contributors and Acknowledgements . . . . . . . . . 18

Appendix C. IANA Considerations . . . . . . . . . . . . . . . . 18

C.1. The DIVIDE DNS Resoruce Record Type . . . . . . . . . . . 18

C.2. Email Authentication Methods . . . . . . . . . . . . . . 18

C.3. Email Authentication Property Types . . . . . . . . . . . 18

C.4. Reputation Applications Registry . . . . . . . . . . . . 18

Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 18

1. Terminology

1.1. Key Words

The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",

"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and

"OPTIONAL" in this document are to be interpreted as described

[RFC2119].

1.2. Mail Divide Framework (MDF)

A recipient driven partitioning framework for E-Mail delivery.

Receivers advertise that it prepares a separate delivery path, or

receiving MTA, for a specific category of mail messages. MDF

provides a mechanism to advertise and lookup category specific

settings, and evaluate conformance of senders via RSPs.

1.3. Mail Category

The intended purpose of each mail message, such as communication,

notification, etc. MDF requires that the definition of a Mail

Category is agreed upon among senders, receivers, and RSPs.

Akagiri, et al. Expires January 28, 2018 [Page 3]

Internet-Draft MDF July 2017

1.4. Reputation Service Provider (RSP)

Reputation Service Provider keeps track of a white list of MDF-

conforming senders. Receiving party can perform a query to see how a

specific sender is conforming to MDF.

1.5. DIVIDE record

A DNS TXT resource record that advertises receiver's trust policy.

DIVIDE record specifies that a mail message under a category is

received by a specific subdomain.

1.6. Imported Definitions

ABNF (Augmented Backus-Naur Form) ABNF is defined in [RFC5234], as

are the tokens "ALPHA", "DIGIT", and "SP" (space).

The tokens "Local-part", "Domain", "address-literal" and "Mailbox"

are defined in [RFC5321].

"dot-atom", "quoted-string", "comment", "CFWS" (comment folded white

space), "FWS" (folded white space), and "CRLF" (carriage-return/

line-feed) are defined in [RFC5322].

1.7. Message Handling Agent Definitions

This document is concerned with message delivery and handling. The

following agents are defined in [RFC6409]:

o Message Submission Agent (MSA)

o Message Transfer Agent (MTA)

o Message User Agent (MUA)

Message Delivery Agent (MDA) receives messages and put them into

users' mailbox. (non-normative reference [RFC5598])

2. Introduction

Current E-Mail traffic is flooded with Unsolicited Bulk E-Mail (UBE,

aka spam). Traditional approaches against them were detecting and

filtering them out from the network and user inboxes. In this

document, another approach is presented. Instead of removing SPAM

from the mail delivery network, we introduce a new partitioned

delivery network for messages that are not SPAM.

Akagiri, et al. Expires January 28, 2018 [Page 4]

Internet-Draft MDF July 2017

It is possible to categorize E-Mail messages by their purposes. For

example, communication messages usually expect replies. Typical

communication messages thus show bi-directional exchange between

peers. On the other hand, notification messages such as order

confirmations or development activity updates are uni-directional.

E-Mail traffic in each categories may show different characteristics.

For example, communication messages have problems like outbound bulk

messages from a compromised account. Notification messages have

risks of sender spoofing and phishing. Therefore, E-Mail abuse can

be efficiently detected and filtered out if we have a different

message delivery path per category.

This document defines a protocol by which domain owners may assign

separate MTAs for each category of mail. This is done by

subdomaining the receiving domain, while keeping the Local-part of

the recipient. Subdomaining have an advantage that the separation

can happen in transport layer. This effectively separates mail

delivery paths at the source of the messages, as if a drainage divide

does for water.

Compliant domain holders publish DIVIDE records that specify a

subdomain for each mail category that it is willing to receive.

DIVIDE records are defined as DNS TXT Resource Records similar to SPF

[RFC7208] records. Compliant mail senders use the published DIVIDE

records to find the destination MTA according to the category of the

mail being sent. Receiver also specifies which method is used to

authenticate the sender: DMARC [RFC7489], DKIM [RFC6376], SenderID

[RFC4406], PRF [RFC4407], or SPF [RFC7208].

To make this framework effective, senders must label outgoing

messages with correct categories. Senders that abusively categorize

messages should be detected and removed from the network. A

mechanism called Reputation Service Provider is also introduced so

that a third-party authority can assure senders' trust. This enables

per-category white-listing at the receivers' desired level of

strictness.

MDF provides the following advantages:

o a separate message delivery network per message category

o a separate message inbox per message category

o trust-based messaging

o receivers may advertise preferred sender authentication mechanism

per category

Akagiri, et al. Expires January 28, 2018 [Page 5]

Internet-Draft MDF July 2017

o reputation based sender white-listing

o senders pay for trust, not receivers

3. Operational Overview

Figure 1 shows the overview of a mail transmission with Mail Divide

Framework.

In this figure, solid lines indicate the flow of a message. Double

lines indicate communications other than message deliveries (DNS

queries, reputation queries over HTTPS).

.

Sender side Receiver side

. beta.example.com

.

alpha.example.org .

. c.beta.example.com

. +-------+ (4) Reputation rsp.example.org

(3) Add subdomain . | | Query +------------+

and transmit +-------> MTA +=================> Reputation |

RCPT: bob@c.beta.example.com | +------+ | Service |

| . +-------+ | | Provider |

| . | +------------+

| . | (5) Add Authentication-

| . | Results Header

(1) | . beta.example.com |

Submit +-------+ | . +-------+ | +-------+

+----+ | MSA/ | | . | | | | |

|User+----> MTA +--+ . | MTA | +--> MDA |

+----+ | | . | | | |

+---++--+ . +--++---+ +---+---+

|| . || |

(2) Lookup || . || | (7) Read

MDF || . || (0) Advertise | +-----+ +----+

|| . || Receiver | |Inbox| +->User|

|| . +--vv---+ Policy | +-----+ | +----+

|| . | | | |

+==============> DNS | | +-----+ |

. | | +-->Comm +--+

. +-------+ +-----+

_divide.beta.example.com (6) Store in category

specific inbox

Akagiri, et al. Expires January 28, 2018 [Page 6]

Internet-Draft MDF July 2017

3.1. Preparation

3.1.1. Advertise Receiver Policy

Step (0): the receiver advertises its divide path per category with a

DIVIDE record.

Administrator of the mail-receiving domain designs per-category path

partition. For example, "beta.example.com" separates communication

and notification to "c.beta.example.com" and "n.beta.example.com",

respectively. All other categories should go to "beta.example.com".

"beta.example.com" builds a DNS TXT Resource Record to express these,

as described in Section 5.1. It puts the record in its DNS under

"_divide.beta.example.com".

v=DIVIDE1\; a=DMARC p=comm:c rsp=rsp.example.org;

a=DMARC p=notif:n rsp=reputation.example.com

The "rsp=" part specifies an RSP associated for each category.

Sender's reputation should be managed by this RSP so that the

receiver can decide whether it trusts the sender.

3.2. Sending in MDF

3.2.1. Submission with category

Step (1): a user submits a mail message.

MUA/MSA assigns a category to the message according to the context.

If the user is a notification sender system, assign "notification".

If the user is a human and the message is a reply, assign

"communication".

For example, when "alice@alpha.example.org" sends a communication

message to "bob@beta.example.com", the MSA of

"alice@alpha.example.org" assigns "communication" to the message.

3.2.2. Looking Up DIVIDE Records

Step (2): Sender's MTA looks up MDF policy of the recipient domain.

The final MTA in "alpha.example.org" is going to transmit the message

to "beta.example.com".

It first looks up DNS under "_divide.beta.example.com" and finds a

DNS TXT Resource Record with "v=DIVIDE1". It now knows that

beta.example.com uses Mail Divide Framework.

Akagiri, et al. Expires January 28, 2018 [Page 7]

Internet-Draft MDF July 2017

3.2.3. Subdomaining Recipient Domain

Step (3): Set destination to the divided mail server.

The record has entries for "p=comm:c" and "p=notif:n". This

specifies messages in category "communication" should be sent to

recipient's subdomain "c", namely, "c.beta.example.com"; similarly

category "notification" to "n.beta.example.com".

Since the message from alice to bob has the category "communication",

sender's MTA SHOULD choose "c" as target subdomain. It creates a new

envelope RCPT address (as defined in [RFC5321])

"bob@c.beta.example.com".

Note that the header To: (as defined in [RFC5322]) MUST stay intact.

3.2.4. Transmitting Mail

Now the mail is sent from "alpha.example.org" to

"c.beta.example.com". This is done with ordinary mail transfer

protocol, SMTP [RFC5321].

The sender's MTA authenticates itself with DMARC, in this example,

according to the DIVIDE record specifies.

3.3. Receiving in MDF

When "c.beta.example.com" receives the mail, it verifies the sender's

identity and reputation. The result of the verification is added to

the message as Authentication-Results header.

3.3.1. Sender Authentication

Sender's identity is verified by DMARC, DKIM, SPF, etc. according to

the authentication method specified in the DIVIDE record.

3.3.2. Reputation Lookup

Step (4): Reputation Lookup

The recipient MTA "c.beta.example.com" is specifically configured to

receive messages that are categorized as "communication" according to

MDF. It should verify whether the sender complies with MDF, i.e. not

sending spam mail under a category label "communication".

The recipient MTA makes a query to a reputation server as defined in

Repute protocol [RFC7072]. New assertion-types are introduced to

specify MDF mail categories. If the obtained reputation rate is

Akagiri, et al. Expires January 28, 2018 [Page 8]

Internet-Draft MDF July 2017

acceptable, the recipient MTA continue processing the message.

Otherwise it should reject the message and return a 5xx status.

3.3.3. Headers and Envelope Handling

Step (5): Add Headers and revert RCPT

At this point, the receiver MTA has verified that the sender conforms

to MDF. The mail message is transmitted to the MDA with an

Authentication-Results header, which is defined in [RFC7410]. MDF

specific parameters are added to the Authentication-Results header.

Authentication-Results: c.beta.example.com;

dkim=pass (good signature) header.d=alpha.example.org;

divide=pass policy.category=communication

Upon forwarding the mail message to the MDA, the receiver MTA MAY

remove the category subdomain from the envelope RCPT. This reverts

the final recipient to "bob@beta.example.com".

3.3.4. Deliver to Specific Inbox

Step (6): Put the message into a specific inbox for the category

MDA looks at Authentication-Results header of the mail message and

will find "divide=pass" field that indicates this mail has been

transported via MDF-conformed partitioned delivery path. The MDA

puts the message into a separate inbox for the user. In this

example, it is "Comm" folder in the user bob's IMAP server.

3.3.5. Read the mail

Step (7): Find the mail as partitioned

The user reads the newly received mail in the "Comm" folder. The MUA

looks at the Authentication-Results header to know this is a

partitioned mail. It displays a prominent sign to the user that the

sender is trusted.

4. Mail Categories

For the purpose of MDF, mail messages are categorized into the

following types:

Akagiri, et al. Expires January 28, 2018 [Page 9]

Internet-Draft MDF July 2017

+---------------+---------+-----------------------------------------+

| Category | Label | Description |

+---------------+---------+-----------------------------------------+

| communication | comm | A message intended to become a part of |

| | | a bidirectional conversation. |

| | | |

| transaction | trans | A message regarding money |

| | | transaction/purchase confirmation. |

| | | |

| notification | notif | An one-way message to report an event. |

| | | No reply is usually expected. |

| | | |

| promotion | promo | An advertisement message. |

| | | |

| mailing-list | ml | A message delivered from a mailing-list |

| | | server to the members of that list. |

| | | |

| multi-hop | mh | A message is delivered through multi- |

| | | hop path. |

| | | |

| default | default | Fallback category when none of the |

| | | above is applicable, or specified. |

+---------------+---------+-----------------------------------------+

In MDF, the definition of a category SHOULD be agreed upon among

senders, receivers, and RSPs so that the reputation feedback works

well. DIVIDE records express the receiver's view what categories of

message it is willing to receive by separate servers. Each category

is advertised in the DIVIDE record with corresponding label.

The sender decides whether the mail message to be sent falls into any

of the receiver-designated categories. If a category is found

suitable to describe the message, it is used for subdomaining the

recipient address.

"default" category is used as a fallback. When the message category

is "communication" and the sender does not advertise "p=comm" in the

DIVIDE record, the sender looks for "p=default". If an entry

corresponding "default" is found, it is used. Otherwise, the message

is sent without MDF.

Mail Category for a message MAY be decided by user-interaction, by

MSA's context analysis, or by other means. For example, when an

outgoing MTA is configured specifically for notification, it can use

"notification" for all messages.

Akagiri, et al. Expires January 28, 2018 [Page 10]

Internet-Draft MDF July 2017

"mailing-list" and "multi-hop" do not describe the contents of a

message. These instead correspond to delivery mechanisms. See

sections Section 8 and Section 9 for details.

5. DIVIDE Records

Domain administrators declare DIVIDE specific DNS TXT records to

specify DIVIDE configurations similar to SPF and DMARC.

Henceforward, we call this TXT records as "DIVIDE records" in this

document. We will show the details of the DIVIDE record in this

section.

5.1. DNS Resource Records Syntax

A DIVIDE record is a DNS record that declares separated receiving

servers for each Mail Categories, together with sender authentication

policy and RSPs.

A DIVIDE record is declared to the "_divide" subdomain of target

domains. The MSAs in the mail source domains query the TXT records

for the mail destination domains to obtain the appropriate subdomains

to deliver the mail messages. For example, if the destination domain

of a mail message is "example.com", the MSA located inside the source

domain of the message make a query to find the TXT record for

"_divide.example.com".

The generic formats of DIVIDE records are:

_divide IN TXT "divide specific text"

_divide.example.com. IN TXT "divide specific text"

Multiple parts separated with semicolons compose the "divide specific

text". These parts are called "Entry" in this document. Each Entry

has several tags detailed in the following part of this section.

Amongst each Entry in a DIVIDE record, the first Entry MUST be the

one containing only a v (Version) tag. Currently, the only available

value for the v tags is DIVIDE1.

The table below shows tag parameters of a DIVIDE Entry. Every tag in

this table is mandatory for each DIVIDE Entry.

Akagiri, et al. Expires January 28, 2018 [Page 11]

Internet-Draft MDF July 2017

+-----+-----------+-----------------------+-------------------------+

| Tag | Format | Value | Notes |

+-----+-----------+-----------------------+-------------------------+

| a | a=XXX | SPF, PRA, SenderID, | to declare the |

| | | DKIM, DMARC | authentication method |

| | | | |

| p | p=XXX:YYY | XXX=comm, trans, | bind DIVIDE category |

| | | notif, promo, ml, mh, | and mail destination |

| | | default | subdomains. |

| | | | |

| | | YYY="subdomain name | "none" to specify no |

| | | to be added", or | subdomaining. |

| | | "none" | |

| | | | |

| rsp | rsp=XXX | FQDN or IP address of | specify an RSP for this |

| | | an RSP | DIVIDE entry. |

+-----+-----------+-----------------------+-------------------------+

Note that a DIVIDE record does not cover subdomains under the

declared domain. For example, when an operator desires to add a

DIVIDE record for "_divide.a.example.com." in addition to the one for

"_divide.example.com.", the operator MUST add a new record for

"_divide.a.example.com.".

5.2. Multiple DNS Records

Operators MUST NOT declare more than one DIVIDE record for each (sub)

domain.

5.3. Record Size

As discussed in section 3.4 of [RFC7208], a DIVIDE record size SHOULD

be small enough to fit in a single UDP packet of a DNS answer. When

a DNS answer data size becomes greater than 512 octets, old DNS

server implementations might fallback to TCP. The fallbacks may

cause the performance degradations to the DNS answer procedures. In

[RFC7208], it is recommended to adjust the length of the DNS name and

the TXT record bound to it SHOULD be under 450 octets. The DIVIDE

records SHOULD follow this guideline.

6. Reputation Service Providers

Reputation Service Provider keeps track of a white list of MDF-

conforming senders. Receiving party can perform a query to see how a

specific sender is conforming to MDF. Reputation reporting

architecture [RFC7070] is adopted in MDF.

Akagiri, et al. Expires January 28, 2018 [Page 12]

Internet-Draft MDF July 2017

6.1. White-list Management

MDF's effectiveness depends on whether the senders correctly label

mail messages for the purpose of DIVIDE record lookup and selecting

the receiving servers. If an abusive server sends SPAM messages to

"c.beta.example.com", the advantage of the traffic separation is

diluted. When a sender labels a message as "communication", the

degree of how this labeling is correct is evaluated and accumulated

as a reputation of this sender for the category "communication". An

RSP maintain reputation for sending domains associated with a set of

Mail Categories.

When a sending party is not known to the RSP that the recipient

trusts, the sender SHOULD NOT be treated as MDF-conforming in the

message handling. This is to prevent abusive senders from sending

messages to MDF specific inboxes, by always using a new name and

expect that a bad reputation would not be built in the RSP.

After looking up the DIVIDE record, the sending MTA SHOULD check

whether it has already registered itself to the RSP specified by the

recipient. If it has not, it SHOULD fall back to non-MDF mail

delivery. In the meantime it registers itself to the specified RSP.

Once it is recognized as MDF-conforming by the RSP, it can use MDF

for the message delivery.

Methods to register a sender to an RSP are beyond the scope of this

document.

Note that a receiver MAY specify itself as the RSP. In that case,

MDF is applied only by an explicit consent between the sender and the

receiver.

6.2. Reputation Query and Result Caching

Receiving MTA can make a reputation query for the sender domain for

the category of the received message, to the RSP that it trust. The

query can be performed as defined in [RFC7072].

[RFC7072] defines a URL template for a query as follows:

https://{service}/{application}/{subject}/{assertion}

For the purpose of MDF, the application context "email-divide" is

used. Mail Category is used for assertion.

The query result can be cached according to "expires" field in the

response, as described in Section 5 in [RFC7071].

Akagiri, et al. Expires January 28, 2018 [Page 13]

Internet-Draft MDF July 2017

An "https" URL with an HTTP over TLS transport SHOULD be used for

privacy reasons. See Section 11.2.

6.3. Evaluation and Feedback

Abuse or improper categorization of received message SHOULD be

reported to RSPs. ARF format [RFC6650] can be used for this purpose.

Methods of evaluating how the received message is correctly labeled

for the Mail Category are beyond the scope of this document.

7. Result Handling

When the receiver MTA verified the sender is MDF-conforming, it

generates an Authentication-Results header [RFC7410]. The header is

added as the message is transmitted to the MDA.

MDA looks at Authentication-Results header of the mail message and

see whether the message is delivered via MDF partitioned delivery

network. The MDA puts the message into a separate inbox for the

user.

The MUA identify the Authentication-Results header and make prominent

sign on the display that the mail is delivered via MDF and verified

its trust. For example, it MAY display a green icon to show that the

mail message is verified in MDF.

8. Mailing-list

Mailing-list servers reformat the posted message and deliver it to

list members. SPF can be used to authenticate the resending sender.

Mail Category "ml" is reserved for this purpose, to accommodate a

specifically configured authentication policy. Receiving server can

advertise a separate RSP that is used for mailing-list senders than

for communication.

For example the following DIVIDE Entry declares the mailing-list

servers MUST authenticate itself with SPF and the trust is managed by

"ml.repute.example.org".

a=SPF p=ml:ml rsp=ml.repute.example.org

9. Multi-hop Delivery

Mail Category "multi_hop" is reserved so that the recipient can

express a policy for multi-hop messages.

For example,

Akagiri, et al. Expires January 28, 2018 [Page 14]

Internet-Draft MDF July 2017

o "a=spf p=multi_hop:mh" expresses that the receiving server rejects

multi-hop messages.

o "a=dkim p=multi_hop:mh" expresses it accepts multi-hop messages

only if DKIM authentication is used.

10. Security Considerations

10.1. DNS Spoofing

[TBD] Use DNSSEC if necessary.

11. Privacy Considerations

11.1. DNS queries

Sender MTA looks up a DIVIDE record under the subdomain "_divide" of

the recipient domain. Watching for DNS queries can reveal that the

sender is going to use MDF for the following outgoing mail. However,

a "_divide" query does not reveal which category is in question.

After a successful DIVIDE lookup, the sender looks up the recipient

subdomain's MX records. When MDF is in use, the domain depends on

the category of the mail. This indicates that watching on MX queries

can reveal the category of the mail that the sender is going to

transmit. This is inevitable unless DNS queries are encrypted. A

BoF on this topic was held in IETF-89, Encryption of DNS requests for

confidentiality (dnse). Future works from that group can mitigate

this risk.

11.2. Reputation queries

Queries for reputation server is performed according to [RFC7072].

[RFC7072] defines HTTP based query and optionally HTTPS can be used.

When a recipient MTA receives a mail for a category subdomain, it

does a query to the corresponding reputation server. The query

indicates the category of the mail in question in the "{assertion}"

part of the URL. Thus there is a risk that the category can be

observed by watching the traffic between sender and the receiver,

combined with reputation queries.

To mitigate this risk, reputation query SHOULD be performed over

HTTPS (HTTP over TLS), for the purpose of MDF.

Akagiri, et al. Expires January 28, 2018 [Page 15]

Internet-Draft MDF July 2017

12. References

12.1. Normative References

[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate

Requirement Levels", BCP 14, RFC 2119,

DOI 10.17487/RFC2119, March 1997,

.

[RFC4406] Lyon, J. and M. Wong, "Sender ID: Authenticating E-Mail",

RFC 4406, DOI 10.17487/RFC4406, April 2006,

.

[RFC4407] Lyon, J., "Purported Responsible Address in E-Mail

Messages", RFC 4407, DOI 10.17487/RFC4407, April 2006,

.

[RFC5234] Crocker, D., Ed. and P. Overell, "Augmented BNF for Syntax

Specifications: ABNF", STD 68, RFC 5234,

DOI 10.17487/RFC5234, January 2008,

.

[RFC5321] Klensin, J., "Simple Mail Transfer Protocol", RFC 5321,

DOI 10.17487/RFC5321, October 2008,

.

[RFC5322] Resnick, P., Ed., "Internet Message Format", RFC 5322,

DOI 10.17487/RFC5322, October 2008,

.

[RFC6376] Crocker, D., Ed., Hansen, T., Ed., and M. Kucherawy, Ed.,

"DomainKeys Identified Mail (DKIM) Signatures", STD 76,

RFC 6376, DOI 10.17487/RFC6376, September 2011,

.

[RFC6409] Gellens, R. and J. Klensin, "Message Submission for Mail",

STD 72, RFC 6409, DOI 10.17487/RFC6409, November 2011,

.

[RFC7070] Borenstein, N. and M. Kucherawy, "An Architecture for

Reputation Reporting", RFC 7070, DOI 10.17487/RFC7070,

November 2013, .

[RFC7071] Borenstein, N. and M. Kucherawy, "A Media Type for

Reputation Interchange", RFC 7071, DOI 10.17487/RFC7071,

November 2013, .

Akagiri, et al. Expires January 28, 2018 [Page 16]

Internet-Draft MDF July 2017

[RFC7072] Borenstein, N. and M. Kucherawy, "A Reputation Query

Protocol", RFC 7072, DOI 10.17487/RFC7072, November 2013,

.

[RFC7208] Kitterman, S., "Sender Policy Framework (SPF) for

Authorizing Use of Domains in Email, Version 1", RFC 7208,

DOI 10.17487/RFC7208, April 2014,

.

[RFC7410] Kucherawy, M., "A Property Types Registry for the

Authentication-Results Header Field", RFC 7410,

DOI 10.17487/RFC7410, December 2014,

.

[RFC7489] Kucherawy, M., Ed. and E. Zwicky, Ed., "Domain-based

Message Authentication, Reporting, and Conformance

(DMARC)", RFC 7489, DOI 10.17487/RFC7489, March 2015,

.

12.2. Informative References

[RFC5598] Crocker, D., "Internet Mail Architecture", RFC 5598,

DOI 10.17487/RFC5598, July 2009,

.

[RFC6650] Falk, J. and M. Kucherawy, Ed., "Creation and Use of Email

Feedback Reports: An Applicability Statement for the Abuse

Reporting Format (ARF)", RFC 6650, DOI 10.17487/RFC6650,

June 2012, .

[RFC7073] Borenstein, N. and M. Kucherawy, "A Reputation Response

Set for Email Identifiers", RFC 7073,

DOI 10.17487/RFC7073, November 2013,

.

Appendix A. Collected ABNF

The following syntax specification of the DIVIDE record uses ABNF

[RFC5234]. Terms not defined here are taken from [RFC5321].

Akagiri, et al. Expires January 28, 2018 [Page 17]

Internet-Draft MDF July 2017

divide-record = divide-version

[divide-sep divide-authentication]

[divide-sep divide-policy]

[divide-sep divide-provider]

; components other than divide-version

; may appear in any order

divide-version = "v" *WSP "=" *WSP

%x44 %x49 %x56 %x49 %x44 %x45 %x31

divide-sep = *WSP %x3b *WSP

divide-authentication = "a" *WSP "=" *WSP

( "SPF" / "PRA" / "SenderID" /

"DKIM" / "DMARC" )

divide-policy = "P" *WSP "=" *WSP

( "comm" / "trans" /

"notif"/ "promo" / "ml" / "mh" )

%x3a Domain

divide-provider = "rsp" *WSP "=" *WSP ( Domain / address-literal )

Appendix B. Contributors and Acknowledgements

Appendix C. IANA Considerations

C.1. The DIVIDE DNS Resoruce Record Type

[TBD]

C.2. Email Authentication Methods

[TBD]

C.3. Email Authentication Property Types

[TBD]

C.4. Reputation Applications Registry

[TBD]

Authors' Addresses

Akagiri, et al. Expires January 28, 2018 [Page 18]

Internet-Draft MDF July 2017

Takehito Akagiri

Regumi, Inc.

Email: akagiri@regumi.net

Genki Yasutaka

Rakuten, Inc.

Email: genki.yasutaka@rakuten.com

Kouji Okada

Lepidum Co. Ltd.

Email: okd@lepidum.co.jp

Tatsuya Hayashi

Lepidum Co. Ltd.

Email: hayashi@lepidum.co.jp

Masaki Kase

Individual Contributor

Email: kase.masaki@softest.jp

Akagiri, et al. Expires January 28, 2018 [Page 19]

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值