<?xml version="1.0" encoding="UTF-8"?>
<reference anchor="I-D.kucherawy-dkim-anti-replay" target="https://datatracker.ietf.org/doc/html/draft-kucherawy-dkim-anti-replay-02">
   <front>
      <title>Replay-Resistant DomainKeys Identified Mail (DKIM) Signatures</title>
      <author initials="M." surname="Kucherawy" fullname="Murray Kucherawy">
         </author>
      <date month="November" day="14" year="2022" />
      <abstract>
	 <t>   DomainKeys Identified Mail (DKIM) provides a digital signature
   mechanism for Internet messages, allowing a domain name owner to
   affix its domain name in a way that can be cryptographically
   validated.

   DKIM signatures protect the integrity of the message header and body
   only.  By design, it decoupled itself from the transport and storage
   mechanisms used to handle messages.  This gives rise to a possible
   replay attack, but the original DKIM specification fell short of
   providing a mitigation strategy.  This document presents an optional
   method for binding a signature to a specific recipient or set of
   recipients so that broader replay attacks can be mitigated.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-kucherawy-dkim-anti-replay-02" />
   
</reference>
