DMARC E. Osterweil
Internet-Draft G. Wiley
Intended status: Informational Verisign
Expires: July 22, 2016 January 19, 2016

DMARC Extensions for DANE
draft-osterweil-dmarc-dane-names-00

Abstract

This document proposes additions to the Domain-based Message Authentication, Reporting, and Conformance (DMARC) Tag Registry to enable Mail administrators to specify the domain-wide policies for S/MIME and PGP key usage in their mail domains, in conjunction with use of the DANE SMIMEA and OPENPGPKEY resource records. This would mean adding to the authentication mechanisms specified in RFC 7489, but it would specify only the domain-wide policies for S/MIME and PGP, such as what the policies are for signing and encrypting (does the sender mandate it, not allow it, etc.). This document also suggests the specification of the type of encoding of the left-hand sides used in the DANE resource records.

Status of This Memo

This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.

Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at http://datatracker.ietf.org/drafts/current/.

Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."

This Internet-Draft will expire on July 22, 2016.

Copyright Notice

Copyright (c) 2016 IETF Trust and the persons identified as the document authors. All rights reserved.

This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.


Table of Contents

1. Introduction

This document proposes additions to the Domain-based Message Authentication, Reporting, and Conformance (DMARC) [RFC7489] Tag Registry to enable Mail administrators to specify the domain-wide policies for S/MIME and PGP key usage in their mail domains, in conjunction with use of the DANE SMIMEA [I-D.ietf-dane-smime] and OPENPGPKEY [I-D.ietf-dane-openpgpkey] resource records. This would mean adding to the authentication mechanisms specified in RFC 7489, but it would specify only the domain-wide policies for Secure/Multipurpose Internet Mail Extensions (S/MIME) [RFC5751] and PGP, such as what the policies are for signing and encrypting (does the sender mandate it, not allow it, etc.). This document also suggests the specification of the type of encoding of the left-hand sides used in the DANE resource records.

DMARC is aimed to "express domain-level policies and preferences for message validation, disposition, and reporting that mail-receiving organizations can use to improve mail handling." [RFC7489]. In addition, consumption of DMARC records is primarily aimed at receiving SMTP server. Consideration for including S/MIME is discussed in [RFC7489] Appendix A.1. There, the document lists several reasons why S/MIME was not a proper fit for DMARC, initially. However, with recent work in the DANE working group on an SMIMEA DNS RR type, the previous obstacles for broad S/MIME deployment have either disappeared, or are now surmountable.

Previous concerns for incorporating S/MIME into DMARC include:

The enhancements added by this document (as additions to DMARC's "DMARC Tag Registry") are to enable S/MIME (and Open PGP) with DANE, and will allow:

1.1. Record Locators

The per-user records such as SMIMEA and OPENPGPKEY specify that the LHS of an email address be encoded so that it can be used to locate an RR published for a specific user. Some domains may opt for hashed labels (such as SHA224), some may opt for Base32 encoded labels, etc. In addition, specifying the canonicalization of case for LHS lookups ensures that mail domains can choose how to encode the LHS and how Mail User Agents (MUAs) can learn this. An MUA MUST query the DNS for an SMIMEA or OPENPGPKEY record using the canonicalization and encoding policy in the DMARC records for the domain. For example, a mail address like "JSmith@example.com" can be down-cased and SHA224 hashed to become: "b7b7da967f26e6ee45e4eeb92ce64cd126a39635c83e8ac6c3f68649", and MUAs must be able to learn these domain-level conventions.

The LHS of the email address in the RFC5322.From field is used to locate the SMIMEA or OPENPGPKEY record that provides signing keys.

The reason that canonicalization and encoding policy discovery is important for senders and receivers is because there is considerable debate regarding which algorithms for canonicalization and encoding of the LHS of email addresses should be used to construct the labels that comprise the domain name of a RR. Some large email providers have chosen to implement canonicalization that is not consistent with the standard.

Using the additions to DMARC described in this document a domain may publish its canonicalization algorithm which will allow accurate construction of the labels for a record corresponding to a specific email address.

Domains which choose to encode the LHS of a canonicalized email address may prefer a hash rather than a simple encoding to address privacy concerns, inhibit zone walking, or for other reasons. The additions in this document provide a means for a domain to publish an encoding algorithm, which will allow mail receivers and senders to accurately construct the labels for a record corresponding to a specific email address.

1.2. MUA Awareness

The previous specification of DMARC is almost entirely relevant to the MTA and transparent to the end user. The additions in this document are also relevant to the MUA, even though an MTA/MDA may use the policy published in a DMARC record using these new tags, For example a mail user who composes a message can be warned that the domain to which the message is directed requires that all messages be signed by the sender.

1.3. Requirements Language

The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119 [RFC2119].

2. Registry Additions

This document outlines six types of domain-level policies that MAY be needed by either sender mail domains or receiver mail domains: 1) DANE LHS Encoding: "danelhse", 2) DANE LHS Canonicalization: "danelhsc", 3) DANE Receiving-side Signing Policy: "danersp", 4) DANE Receiving-side Encryption Policy: "danerep", 5) DANE Sending-side Signing Policy: "danessp", and 6) DANE Sending-side Encryption Policy: "danesep".

As specified in [RFC7489], DMARC follows the extensible "tag-value" syntax.

2.1. Formal Definition

The formal definition of the tag-values above, using Section 2.1 is:

3. Examples

These examples explore some permutations of the additions in this document but do not explore the uses of tags already present in DMARC. The existing policy tags are not relevant but are included for context.

In the following example TXT record, the domain has published a policy indicating that email addresses used to locate SMIMEA or OPENPGPKEY records should be converted to lower case and then the LHS and domain are encoded using base32.

In the following example TXT record, the domain has published a policy indicating that messages sent to the domain must be signed by the sender.

4. Benefits

These additions give mail administrators semantics to address policies around how their domains should handle email with (for example) S/MIME protections. They also remove guesswork around how mail domains should handle DANE key learning.

By recognizing the current approach to canonicalization by large scale email implementations these additions make it possible to accommodate existing widely deployed policies.

5. Acknowledgements

This draft was was greatly benefited by feedback from Danny McPherson. In addition, helpful insights were given my Doug Montgomery.

6. IANA Considerations

This memo includes a request to IANA to update the IANA sub-registry called "DMARC Tag Registry". The sub-registry will need new "current" tags

New tags
Tag Name Ref Status Description
danelhse draft-osterweil-dmarc-dane-names current How is the LHS encoded into DNS
danelhsc draft-osterweil-dmarc-dane-names current How is canonicalization is handled when encoding lhs into DNS
danersp draft-osterweil-dmarc-dane-names current What is a receiving policy for signing (around S/MIME using DANE) for a mail domain
danerep draft-osterweil-dmarc-dane-names current What is a receiving policy for encryption (around S/MIME using DANE) for a mail domain
danessp draft-osterweil-dmarc-dane-names current What is the sending policy for signing (around S/MIME w/ DANE) for a mail domain
danesep draft-osterweil-dmarc-dane-names current What is the sending policy for encryption (around S/MIME w/ DANE) for a mail domain

7. Security Considerations

The tag-values specified in this document disambiguate important issues around DANE-based key learning. These values give mail administrators a new facility to securely announce their domain policies around end-user signing and encryption. This work further enables key discovery for DANE protocols.

8. Normative References

[I-D.ietf-dane-openpgpkey] Wouters, P., "Using DANE to Associate OpenPGP public keys with email addresses", April 2015.
[I-D.ietf-dane-smime] Hoffman, P. and J. Schlyter, "Using Secure DNS to Associate Certificates with Domain Names For S/MIME", July 2013.
[RFC1035] Mockapetris, P., "Domain names - implementation and specification", STD 13, RFC 1035, DOI 10.17487/RFC1035, November 1987.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, March 1997.
[RFC4035] Arends, R., Austein, R., Larson, M., Massey, D. and S. Rose, "Protocol Modifications for the DNS Security Extensions", RFC 4035, DOI 10.17487/RFC4035, March 2005.
[RFC4648] Josefsson, S., "The Base16, Base32, and Base64 Data Encodings", RFC 4648, DOI 10.17487/RFC4648, October 2006.
[RFC4846] Klensin, J. and D. Thaler, "Independent Submissions to the RFC Editor", RFC 4846, DOI 10.17487/RFC4846, July 2007.
[RFC5751] Ramsdell, B. and S. Turner, "Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.2 Message Specification", RFC 5751, DOI 10.17487/RFC5751, January 2010.
[RFC6376] Crocker, D., Hansen, T. and M. Kucherawy, "DomainKeys Identified Mail (DKIM) Signatures", STD 76, RFC 6376, DOI 10.17487/RFC6376, September 2011.
[RFC7208] Kitterman, S., "Sender Policy Framework (SPF) for Authorizing Use of Domains in Email, Version 1", RFC 7208, DOI 10.17487/RFC7208, April 2014.
[RFC7489] Kucherawy, M. and E. Zwicky, "Domain-based Message Authentication, Reporting, and Conformance (DMARC)", RFC 7489, DOI 10.17487/RFC7489, March 2015.

Authors' Addresses

Eric Osterweil Verisign Reston, VA USA EMail: eosterweil@verisign.com
Glen Wiley Verisign Reston, VA USA EMail: gwiley@verisign.com