TOC 
Network Working GroupF. Ellermann
Internet-Draftxyzzy
Intended status: ExperimentalNovember 15, 2007
Expires: May 18, 2008 


Sender Policy Framework: SPF Options
draft-ellermann-spf-options-02

Status of this Memo

By submitting this Internet-Draft, each author represents that any applicable patent or other IPR claims of which he or she is aware have been or will be disclosed, and any of which he or she becomes aware will be disclosed, in accordance with Section 6 of BCP 79.

Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts.

Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as “work in progress.”

The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt.

The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html.

This Internet-Draft will expire on May 18, 2008.

Abstract

In discussions about the Sender Policy Framework (SPF) users often wanted to add optional properties to their sender policies. The modifier match_subdomains=yes made it into early SPF drafts. This memo proposes a general syntax for a modifier op= for this purpose.



Table of Contents

1.  Introduction
2.  Motivation
3.  op: options
    3.1.  The optional "pra" property
    3.2.  The optional "auth" property
4.  Acknowledgements
5.  Security Considerations
6.  IANA Considerations
7.  References
    7.1.  Normative References
    7.2.  Informative References
Appendix A.  Document History
§  Author's Address
§  Intellectual Property and Copyright Statements




 TOC 

1.  Introduction

The key words "MAY, "MUST", "MUST NOT", and "NOT RECOMMENDED" in this memo are to be interpreted as described in [RFC2119] (Bradner, S., “Key words for use in RFCs to Indicate Requirement Levels,” March 1997.). One line of syntax uses the ABNF defined in [I‑D.crocker‑rfc4234bis] (Crocker, D. and P. Overell, “Augmented BNF for Syntax Specifications: ABNF,” October 2007.).

Readers should be familiar with [RFC2821] (Klensin, J., “Simple Mail Transfer Protocol,” April 2001.), [RFC4409] (Gellens, R. and J. Klensin, “Message Submission for Mail,” April 2006.), and the SPF terminology in [RFC4408] (Wong, M. and W. Schlitt, “Sender Policy Framework (SPF) for Authorizing Use of Domains in E-Mail, Version 1,” April 2006.). See [RFC4949] (Shirey, R., “Internet Security Glossary, Version 2,” August 2007.) for an Internet Security Glossary.

Comments and questions should be sent to the SPF-Discuss mailing list http://dir.gmane.org/gmane.mail.spam.spf.discuss.



 TOC 

2.  Motivation

The SPF community often discussed optional yes, no, or similar modifiers. SPF allows the introduction of new modifiers without a new SPF version under two conditions:

  1. All SPF implementations can safely ignore the new modifier.
  2. Implementations supporting the new modifier interpret all policies without this modifier like all other conforming implementations.

The op modifier is a shorthand for optional properties and "opt-in" procedures. The length of SPF policies is limited. Instead of separate modifiers as in...

IN SPF v=spf1 o1=yes p2=no q3=1

...the op modifier allows the shorter notation...

IN SPF v=spf1 op=o1.nop2.q3

...for hypothetical properties o1, nop2, and q3. Please note that a policy without one of these properties does not implicitly have any "opposite" property. Existing sender policies and implementations may not know these properties. They are also free to ignore known properties intentionally.

It is possible to define a hypothetical property p2 as the opposite of nop2, and to specify it explicitly in a sender policy. The definitions could state that p2 and nop2 must not be used together.



 TOC 

3.  op: options

The op modifier introduces a dot-separated list of optional properties. New properties can be defined in additional documents in the same way as new SPF modifiers.

At most one op modifier is allowed in an SPF sender policy. It is a good idea to specify an op modifier before the first directive. An ABNF specification for options:

    options = "op=" name *( "." name )

Property names can be given in any order, it is no syntax error to specify the same property more than once. The term <name> for the names of individual properties is defined in [RFC4408] (Wong, M. and W. Schlitt, “Sender Policy Framework (SPF) for Authorizing Use of Domains in E-Mail, Version 1,” April 2006.).

An initial set of properties is defined below: pra, and auth.

In theory a modifier could be defined to have an effect on the evaluation of "included" policies. This is not the case for the predefined (in [RFC4408] (Wong, M. and W. Schlitt, “Sender Policy Framework (SPF) for Authorizing Use of Domains in E-Mail, Version 1,” April 2006.)) modifiers exp and redirect, and op follows this role model.

In theory a modifier could be defined to have an effect on the evaluation of "continuation records" when following a redirect modifier. This is not the case for the predefined exp modifier, and op follows this role model.



 TOC 

3.1.  The optional "pra" property

The pra property indicates that the sender policy MAY be also evaluated for the "PRA" identity also known as "Purported Responsible Address" and defined in [RFC4407] (Lyon, J., “Purported Responsible Address in E-Mail Messages,” April 2006.).

Please note that many cases exist, where the "PRA" identity differs from the "MAIL FROM" identity, and that classic SPF sender policies are generally not designed to work with the "PRA" identity.

Enforced submission rights for Message Submission Agents (MSAs) in [RFC4409] (Gellens, R. and J. Klensin, “Message Submission for Mail,” April 2006.) do not guarantee a match of any address in the 2822-From header field with the "MAIL FROM" identity, and they also do not guarantee the presence of a matching 2822-Sender header field. For more details about these problems see [RFC2822] (Resnick, P., “Internet Message Format,” April 2001.) and compare sections 6.1 and 8.1 in [RFC4409] (Gellens, R. and J. Klensin, “Message Submission for Mail,” April 2006.).



 TOC 

3.2.  The optional "auth" property

The auth property indicates that the domain owner not only authorizes the hosts that "Pass" the sender policy to send mail using the domain in the "MAIL FROM" and "HELO" identities, but that the domain owner also asserts those uses of the domain to be authentic, i.e. not forged.

In particular, this means that any authorized hosts that are shared with other domains are guaranteed to prevent cross-user forgery (see [RFC4408] (Wong, M. and W. Schlitt, “Sender Policy Framework (SPF) for Authorizing Use of Domains in E-Mail, Version 1,” April 2006.), section 10.4). This is often the case for MSAs as defined in [RFC4409] (Gellens, R. and J. Klensin, “Message Submission for Mail,” April 2006.), but many MSAs and smart hosts still allow to use any "MAIL FROM" identity after a successful authentication.

For details about enforced submission rights see [RFC4409] (Gellens, R. and J. Klensin, “Message Submission for Mail,” April 2006.). Example:

IN SPF v=spf1 op=auth +a ?include:example.com -all

Please note that the auth property has no technical effect. It is arguably better to use a "Neutral" mechanism for any shared smart host, and to use "Pass" only if the MSA enforces submission rights.



 TOC 

4.  Acknowledgements

Many persons on the SPF-Discuss mailing list contributed to the ideas published in this memo. Special thanks for this and completely different reasons to April Lorenzen, Bruce Lilly, Chris Hayes, Hector Santos, Julian Mehnle, Keith Moore, Meng Weng Wong, Scott Kitterman, Stuart D. Gathman, Wayne Schlitt, and William Leibzon.

Bill Fenner's xml2rfc validator and ABNF checker were a great help in the creation of (not only) this memo. The same goes for various great IETF tools written by Henrik Levkowetz.



 TOC 

5.  Security Considerations

Please consult the security considerations in [RFC4409] (Gellens, R. and J. Klensin, “Message Submission for Mail,” April 2006.) and [RFC4408] (Wong, M. and W. Schlitt, “Sender Policy Framework (SPF) for Authorizing Use of Domains in E-Mail, Version 1,” April 2006.). A sender policy is only a claim by the domain owner, this can be a spammer or an attacker.

The SPF specification [RFC4408] (Wong, M. and W. Schlitt, “Sender Policy Framework (SPF) for Authorizing Use of Domains in E-Mail, Version 1,” April 2006.) explains why checking other identities except from the "HELO" and "MAIL FROM" identities against SPF version 1 records is NOT RECOMMENDED without explicit approval of the domain owner.

While the pra property offers a way for this explicit approval in the case of a "PRA" identity, it does not solve any of the underlying technical problems with this approach. Receivers should treat all PRA-results with utmost care.



 TOC 

6.  IANA Considerations

The creation of a IANA registry for additional SPF modifiers not limited to op= and/or for additional properties might be desirable in the future, but at this time it's unnecessary.



 TOC 

7.  References



 TOC 

7.1. Normative References

[RFC2119] Bradner, S., “Key words for use in RFCs to Indicate Requirement Levels,” BCP 14, RFC 2119, March 1997 (TXT, HTML, XML).
[RFC4408] Wong, M. and W. Schlitt, “Sender Policy Framework (SPF) for Authorizing Use of Domains in E-Mail, Version 1,” RFC 4408, April 2006 (TXT).
[RFC4409] Gellens, R. and J. Klensin, “Message Submission for Mail,” RFC 4409, April 2006 (TXT).
[I-D.crocker-rfc4234bis] Crocker, D. and P. Overell, “Augmented BNF for Syntax Specifications: ABNF,” draft-crocker-rfc4234bis-01 (work in progress), October 2007 (TXT, PDF).


 TOC 

7.2. Informative References

[RFC2821] Klensin, J., “Simple Mail Transfer Protocol,” RFC 2821, April 2001 (TXT).
[RFC2822] Resnick, P., “Internet Message Format,” RFC 2822, April 2001 (TXT).
[RFC4407] Lyon, J., “Purported Responsible Address in E-Mail Messages,” RFC 4407, April 2006 (TXT).
[RFC4949] Shirey, R., “Internet Security Glossary, Version 2,” RFC 4949, August 2007 (TXT).


 TOC 

Appendix A.  Document History

This appendix should not be published in an RFC.

For [draft-ellermann-spf-options-00] the last [draft-spf-6-3-options-10] was renamed and submitted as Internet draft (I-D). A note that it should be not implemented before that time was removed - apparently no additional SPF modifiers have been implemented so far.

The first revision of the I-D (version 01) got a reference to [RFC4949] (Shirey, R., “Internet Security Glossary, Version 2,” August 2007.) for the improved auth section. More acronyms are expanded on first usage.

Version 02 is a maintenance update removing the [draft-spf-6-3-options] (2004-2006) history. RFC 2828 was replaced by [RFC4949] (Shirey, R., “Internet Security Glossary, Version 2,” August 2007.), and RFC 4234 was replaced by [I‑D.crocker‑rfc4234bis] (Crocker, D. and P. Overell, “Augmented BNF for Syntax Specifications: ABNF,” October 2007.). The popular demand for helo and nohelo options over the years was near zero, they are now removed.



 TOC 

Author's Address

  Frank Ellermann
  xyzzy
  Hamburg, Germany
Email:  hmdmhdfmhdjmzdtjmzdtzktdkztdjz@gmail.com
URI:  http://purl.net/xyzzy/


 TOC 

Full Copyright Statement

Intellectual Property

Acknowledgment