DMARC                                                       E. Osterweil
Internet-Draft                                                  G. Wiley
Intended status: Informational                                  Verisign
Expires: July 22, 2016                                  January 19, 2016


                       DMARC Extensions for DANE
                  draft-osterweil-dmarc-dane-names-00

Abstract

   This document proposes additions to the Domain-based Message
   Authentication, Reporting, and Conformance (DMARC) Tag Registry to
   enable Mail administrators to specify the domain-wide policies for S/
   MIME and PGP key usage in their mail domains, in conjunction with use
   of the DANE SMIMEA and OPENPGPKEY resource records.  This would mean
   adding to the authentication mechanisms specified in RFC 7489, but it
   would specify only the domain-wide policies for S/MIME and PGP, such
   as what the policies are for signing and encrypting (does the sender
   mandate it, not allow it, etc.).  This document also suggests the
   specification of the type of encoding of the left-hand sides used in
   the DANE resource records.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on July 22, 2016.

Copyright Notice

   Copyright (c) 2016 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of



Osterweil & Wiley         Expires July 22, 2016                 [Page 1]


Internet-Draft          DMARC Extensions for DANE           January 2016


   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
     1.1.  Record Locators . . . . . . . . . . . . . . . . . . . . .   4
     1.2.  MUA Awareness . . . . . . . . . . . . . . . . . . . . . .   4
     1.3.  Requirements Language . . . . . . . . . . . . . . . . . .   5
   2.  Registry Additions  . . . . . . . . . . . . . . . . . . . . .   5
     2.1.  Formal Definition . . . . . . . . . . . . . . . . . . . .   7
   3.  Examples  . . . . . . . . . . . . . . . . . . . . . . . . . .   7
   4.  Benefits  . . . . . . . . . . . . . . . . . . . . . . . . . .   8
   5.  Acknowledgements  . . . . . . . . . . . . . . . . . . . . . .   8
   6.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .   8
   7.  Security Considerations . . . . . . . . . . . . . . . . . . .   9
   8.  Normative References  . . . . . . . . . . . . . . . . . . . .  10
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  11

1.  Introduction

   This document proposes additions to the Domain-based Message
   Authentication, Reporting, and Conformance (DMARC) [RFC7489] Tag
   Registry to enable Mail administrators to specify the domain-wide
   policies for S/MIME and PGP key usage in their mail domains, in
   conjunction with use of the DANE SMIMEA [I-D.ietf-dane-smime] and
   OPENPGPKEY [I-D.ietf-dane-openpgpkey] resource records.  This would
   mean adding to the authentication mechanisms specified in RFC 7489,
   but it would specify only the domain-wide policies for Secure/
   Multipurpose Internet Mail Extensions (S/MIME) [RFC5751] and PGP,
   such as what the policies are for signing and encrypting (does the
   sender mandate it, not allow it, etc.).  This document also suggests
   the specification of the type of encoding of the left-hand sides used
   in the DANE resource records.

   DMARC is aimed to "express domain-level policies and preferences for
   message validation, disposition, and reporting that mail-receiving
   organizations can use to improve mail handling." [RFC7489].  In
   addition, consumption of DMARC records is primarily aimed at
   receiving SMTP server.  Consideration for including S/MIME is
   discussed in [RFC7489] Appendix A.1.  There, the document lists
   several reasons why S/MIME was not a proper fit for DMARC, initially.
   However, with recent work in the DANE working group on an SMIMEA DNS




Osterweil & Wiley         Expires July 22, 2016                 [Page 2]


Internet-Draft          DMARC Extensions for DANE           January 2016


   RR type, the previous obstacles for broad S/MIME deployment have
   either disappeared, or are now surmountable.

   Previous concerns for incorporating S/MIME into DMARC include:

   o  The previous implicit requirements for a "heavyweight ... PKI" are
      now obviated by DANE's use of DNS [RFC1035] and the DNS Security
      Extension (DNSSEC) [RFC4035].

   o  Deployment of DANE's SMIMEA record will operationally benefit from
      the additions proposed in this document, and this directly
      addresses the previous concern that incorporating S/MIME semantics
      into DMARC "would neither cause nor enable a substantial increase
      in the accuracy of the overall mechanism."

   o  Finally, DMARC focuses on "authentication at the domain level,"
      but recent work in the DANE working group has raised the issue
      that domain-level policies (including LHS encoding and
      canonicalization) are domain level policies that need to be
      learned by receiving side domains in order to learn S/MIME keys
      for users.  Senders must learn their receivers' policies for
      encryption and receivers must learn senders' policies in order to
      properly perform signature verification.

   The enhancements added by this document (as additions to DMARC's
   "DMARC Tag Registry") are to enable S/MIME (and Open PGP) with DANE,
   and will allow:

   o  Mail senders to have an option to ingest DMARC records (whereas
      before, DMARC was primarily focused on the mail receiver).  Mail
      senders will now, optionally, be able to ascertain:

      *  What (if any) are the signing or encryption requirements of a
         domain?

      *  What is the encoding technique for LHS portions of an email
         address?

      *  What is the canonicalization policy of LHS portions of email
         addresses in a domain?

   o  Mail receivers to learn:

      *  Does a sending domain have any mandatory signing or encryption
         rules for outbound emails?

      *  What is the encoding technique for LHS portions of an email
         address?



Osterweil & Wiley         Expires July 22, 2016                 [Page 3]


Internet-Draft          DMARC Extensions for DANE           January 2016


      *  What is the canonicalization policy of LHS portions of email
         addresses in a domain?

1.1.  Record Locators

   The per-user records such as SMIMEA and OPENPGPKEY specify that the
   LHS of an email address be encoded so that it can be used to locate
   an RR published for a specific user.  Some domains may opt for hashed
   labels (such as SHA224), some may opt for Base32 encoded labels, etc.
   In addition, specifying the canonicalization of case for LHS lookups
   ensures that mail domains can choose how to encode the LHS and how
   Mail User Agents (MUAs) can learn this.  An MUA MUST query the DNS
   for an SMIMEA or OPENPGPKEY record using the canonicalization and
   encoding policy in the DMARC records for the domain.  For example, a
   mail address like "JSmith@example.com" can be down-cased and SHA224
   hashed to become:
   "b7b7da967f26e6ee45e4eeb92ce64cd126a39635c83e8ac6c3f68649", and MUAs
   must be able to learn these domain-level conventions.

   The LHS of the email address in the RFC5322.From field is used to
   locate the SMIMEA or OPENPGPKEY record that provides signing keys.

   The reason that canonicalization and encoding policy discovery is
   important for senders and receivers is because there is considerable
   debate regarding which algorithms for canonicalization and encoding
   of the LHS of email addresses should be used to construct the labels
   that comprise the domain name of a RR.  Some large email providers
   have chosen to implement canonicalization that is not consistent with
   the standard.

   Using the additions to DMARC described in this document a domain may
   publish its canonicalization algorithm which will allow accurate
   construction of the labels for a record corresponding to a specific
   email address.

   Domains which choose to encode the LHS of a canonicalized email
   address may prefer a hash rather than a simple encoding to address
   privacy concerns, inhibit zone walking, or for other reasons.  The
   additions in this document provide a means for a domain to publish an
   encoding algorithm, which will allow mail receivers and senders to
   accurately construct the labels for a record corresponding to a
   specific email address.

1.2.  MUA Awareness

   The previous specification of DMARC is almost entirely relevant to
   the MTA and transparent to the end user.  The additions in this
   document are also relevant to the MUA, even though an MTA/MDA may use



Osterweil & Wiley         Expires July 22, 2016                 [Page 4]


Internet-Draft          DMARC Extensions for DANE           January 2016


   the policy published in a DMARC record using these new tags, For
   example a mail user who composes a message can be warned that the
   domain to which the message is directed requires that all messages be
   signed by the sender.

1.3.  Requirements Language

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC 2119 [RFC2119].

2.  Registry Additions

   This document outlines six types of domain-level policies that MAY be
   needed by either sender mail domains or receiver mail domains: 1)
   DANE LHS Encoding: "danelhse", 2) DANE LHS Canonicalization:
   "danelhsc", 3) DANE Receiving-side Signing Policy: "danersp", 4) DANE
   Receiving-side Encryption Policy: "danerep", 5) DANE Sending-side
   Signing Policy: "danessp", and 6) DANE Sending-side Encryption
   Policy: "danesep".

   As specified in [RFC7489], DMARC follows the extensible "tag-value"
   syntax.

   o  "danelhse": (plain-text; OPTIONAL; default is "L0".)  Indicates
      how an email address is encoded in the corresponding label in DNS.
      The value is a concatenation of 'F' (LHS with domain) or 'L' (LHS
      only) which indicates whether the domain part is included in the
      encoding.  Valid values are:

         F0: Truncated SHA256, [RFC4846], LHS and domain

         F1: SHA224, LHS and domain

         F2: Base32, [RFC4648], LHS and domain

         L0: Truncated SHA256, [RFC4846], LHS only

         L1: SHA224, LHS only

         L2: Base32, [RFC4648], LHS only

   o  "danelhsc": (plain-text; OPTIONAL; default is "lc".)  Indicates
      how the LHS component of email addresses in the domain are
      canonicalized before being encoded.  Valid values are:

         lc: Lower case




Osterweil & Wiley         Expires July 22, 2016                 [Page 5]


Internet-Draft          DMARC Extensions for DANE           January 2016


         uc: Upper case

         lcid: Lower case, ignore dots (as in some very large email
         service providers)

         none: No canonicalization rules are implemented, domain-wide.

   o  "danersp": (plain-text; OPTIONAL; default is "optional") Indicates
      what (if any) requirements a receiving domain has on whether email
      SHOULD be signed in order to be accepted.  Valid values are:

         required: Emails MUST be signed

         optional: Emails MAY be signed

         forbidden: Emails MUST NOT be signed

      The signing policy indicated by this tag refers to signing using
      (for example) SMIMEA or OPENPGPKEY records associated with the
      sender's email address in the domain.

   o  "danerep": (plain-text; OPTIONAL; default is "optional") Indicates
      what (if any) requirements a receiving domain has on whether email
      SHOULD be encrypted in order to be accepted.  Valid values are:

         required: Emails MUST be encrypted

         optional: Emails MAY be encrypted

         forbidden: Emails MUST NOT be encrypted

   o  "danessp": (plain-text; OPTIONAL; default is "optional") Indicates
      what (if any) requirements a sending domain has on whether a
      receiving domain SHOULD consider email originating from the
      sending domain legitimate.  Valid values are:

         required: Emails MUST be signed

         optional: Emails MAY be signed

         forbidden: Emails MUST NOT be signed

      The signing policy indicated by this tag refers to signing using
      SMIMEA or OPENPGPKEY records associated with the sender's email
      address in the domain.

   o  "danesep": (plain-text; OPTIONAL; default is "optional") Indicates
      what (if any) requirements a sending domain has on whether a



Osterweil & Wiley         Expires July 22, 2016                 [Page 6]


Internet-Draft          DMARC Extensions for DANE           January 2016


      receiving domain SHOULD consider email originating from the
      sending domain legitimate.  Valid values are:

         required: Emails MUST be encrypted

         optional: Emails MAY be encrypted

         forbidden: Emails MUST NOT be encrypted

2.1.  Formal Definition

   The formal definition of the tag-values above, using Section 2.1 is:

      danelhse ::= [ <F> | <L> ] + [ <0> | <1> | <2> ]

      danelhsc ::= <uc> | <lc> | <lcid> | <none>

      danersp ::= <required> | <optional> | <forbidden>

      danerep ::= <required> | <optional> | <forbidden>

      danessp ::= <required> | <optional> | <forbidden>

      danesep ::= <required> | <optional> | <forbidden>

3.  Examples

   These examples explore some permutations of the additions in this
   document but do not explore the uses of tags already present in
   DMARC.  The existing policy tags are not relevant but are included
   for context.

   In the following example TXT record, the domain has published a
   policy indicating that email addresses used to locate SMIMEA or
   OPENPGPKEY records should be converted to lower case and then the LHS
   and domain are encoded using base32.

      "v=DMARC1; p=none; danelhsc=lc; danelhse=F2;
      rua=mailto:postmaster@example.com; "

   In the following example TXT record, the domain has published a
   policy indicating that messages sent to the domain must be signed by
   the sender.

      "v=DMARC1; p=none; danersp=required;
      rua=mailto:postmaster@example.com; "





Osterweil & Wiley         Expires July 22, 2016                 [Page 7]


Internet-Draft          DMARC Extensions for DANE           January 2016


4.  Benefits

   These additions give mail administrators semantics to address
   policies around how their domains should handle email with (for
   example) S/MIME protections.  They also remove guesswork around how
   mail domains should handle DANE key learning.

   By recognizing the current approach to canonicalization by large
   scale email implementations these additions make it possible to
   accommodate existing widely deployed policies.

5.  Acknowledgements

   This draft was was greatly benefited by feedback from Danny
   McPherson.  In addition, helpful insights were given my Doug
   Montgomery.

6.  IANA Considerations

   This memo includes a request to IANA to update the IANA sub-registry
   called "DMARC Tag Registry".  The sub-registry will need new
   "current" tags





























Osterweil & Wiley         Expires July 22, 2016                 [Page 8]


Internet-Draft          DMARC Extensions for DANE           January 2016


   +---------+------------------------------+--------+-----------------+
   | Tag     | Ref                          | Status | Description     |
   | Name    |                              |        |                 |
   +---------+------------------------------+--------+-----------------+
   | danelhs | draft-osterweil-dmarc-dane-  | curren | How is the LHS  |
   | e       | names                        | t      | encoded into    |
   |         |                              |        | DNS             |
   | danelhs | draft-osterweil-dmarc-dane-  | curren | How is canonica |
   | c       | names                        | t      | lization is     |
   |         |                              |        | handled when    |
   |         |                              |        | encoding lhs    |
   |         |                              |        | into DNS        |
   | danersp | draft-osterweil-dmarc-dane-  | curren | What is a       |
   |         | names                        | t      | receiving       |
   |         |                              |        | policy for      |
   |         |                              |        | signing (around |
   |         |                              |        | S/MIME using    |
   |         |                              |        | DANE) for a     |
   |         |                              |        | mail domain     |
   | danerep | draft-osterweil-dmarc-dane-  | curren | What is a       |
   |         | names                        | t      | receiving       |
   |         |                              |        | policy for      |
   |         |                              |        | encryption      |
   |         |                              |        | (around S/MIME  |
   |         |                              |        | using DANE) for |
   |         |                              |        | a mail domain   |
   | danessp | draft-osterweil-dmarc-dane-  | curren | What is the     |
   |         | names                        | t      | sending policy  |
   |         |                              |        | for signing     |
   |         |                              |        | (around S/MIME  |
   |         |                              |        | w/ DANE) for a  |
   |         |                              |        | mail domain     |
   | danesep | draft-osterweil-dmarc-dane-  | curren | What is the     |
   |         | names                        | t      | sending policy  |
   |         |                              |        | for encryption  |
   |         |                              |        | (around S/MIME  |
   |         |                              |        | w/ DANE) for a  |
   |         |                              |        | mail domain     |
   +---------+------------------------------+--------+-----------------+

                             Table 1: New tags

7.  Security Considerations

   The tag-values specified in this document disambiguate important
   issues around DANE-based key learning.  These values give mail
   administrators a new facility to securely announce their domain




Osterweil & Wiley         Expires July 22, 2016                 [Page 9]


Internet-Draft          DMARC Extensions for DANE           January 2016


   policies around end-user signing and encryption.  This work further
   enables key discovery for DANE protocols.

8.  Normative References

   [I-D.ietf-dane-openpgpkey]
              Wouters, P., "Using DANE to Associate OpenPGP public keys
              with email addresses", April 2015.

   [I-D.ietf-dane-smime]
              Hoffman, P. and J. Schlyter, "Using Secure DNS to
              Associate Certificates with Domain Names For S/MIME", July
              2013.

   [RFC1035]  Mockapetris, P., "Domain names - implementation and
              specification", STD 13, RFC 1035, November 1987.

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119, March 1997.

   [RFC4035]  Arends, R., Austein, R., Larson, M., Massey, D., and S.
              Rose, "Protocol Modifications for the DNS Security
              Extensions", RFC 4035, March 2005.

   [RFC4648]  Josefsson, S., "The Base16, Base32, and Base64 Data
              Encodings", RFC 4648, October 2006.

   [RFC4846]  Klensin, J., Ed. and D. Thaler, Ed., "Independent
              Submissions to the RFC Editor", RFC 4846, DOI 10.17487/
              RFC4846, July 2007,
              <http://www.rfc-editor.org/info/rfc4846>.

   [RFC5751]  Ramsdell, B. and S. Turner, "Secure/Multipurpose Internet
              Mail Extensions (S/MIME) Version 3.2 Message
              Specification", RFC 5751, DOI 10.17487/RFC5751, January
              2010, <http://www.rfc-editor.org/info/rfc5751>.

   [RFC6376]  Crocker, D., Ed., Hansen, T., Ed., and M. Kucherawy, Ed.,
              "DomainKeys Identified Mail (DKIM) Signatures", STD 76,
              RFC 6376, DOI 10.17487/RFC6376, September 2011,
              <http://www.rfc-editor.org/info/rfc6376>.

   [RFC7208]  Kitterman, S., "Sender Policy Framework (SPF) for
              Authorizing Use of Domains in Email, Version 1", RFC 7208,
              DOI 10.17487/RFC7208, April 2014,
              <http://www.rfc-editor.org/info/rfc7208>.





Osterweil & Wiley         Expires July 22, 2016                [Page 10]


Internet-Draft          DMARC Extensions for DANE           January 2016


   [RFC7489]  Kucherawy, M., Ed. and E. Zwicky, Ed., "Domain-based
              Message Authentication, Reporting, and Conformance
              (DMARC)", RFC 7489, DOI 10.17487/RFC7489, March 2015,
              <http://www.rfc-editor.org/info/rfc7489>.

Authors' Addresses

   Eric Osterweil
   Verisign
   Reston, VA
   USA

   Email: eosterweil@verisign.com


   Glen Wiley
   Verisign
   Reston, VA
   USA

   Email: gwiley@verisign.com






























Osterweil & Wiley         Expires July 22, 2016                [Page 11]