rfc7601v2.txt | rfc7601.txt | |||
---|---|---|---|---|
skipping to change at page 2, line 26 | skipping to change at page 2, line 26 | |||
1.5.4. Other Terms . . . . . . . . . . . . . . . . . . . . . 8 | 1.5.4. Other Terms . . . . . . . . . . . . . . . . . . . . . 8 | |||
1.6. Trust Environment . . . . . . . . . . . . . . . . . . . . 8 | 1.6. Trust Environment . . . . . . . . . . . . . . . . . . . . 8 | |||
2. Definition and Format of the Header Field . . . . . . . . . . 9 | 2. Definition and Format of the Header Field . . . . . . . . . . 9 | |||
2.1. General Description . . . . . . . . . . . . . . . . . . . 9 | 2.1. General Description . . . . . . . . . . . . . . . . . . . 9 | |||
2.2. Formal Definition . . . . . . . . . . . . . . . . . . . . 10 | 2.2. Formal Definition . . . . . . . . . . . . . . . . . . . . 10 | |||
2.3. Property Types (ptypes) and Properties . . . . . . . . . 12 | 2.3. Property Types (ptypes) and Properties . . . . . . . . . 12 | |||
2.4. The "policy" ptype . . . . . . . . . . . . . . . . . . . 13 | 2.4. The "policy" ptype . . . . . . . . . . . . . . . . . . . 13 | |||
2.5. Authentication Identifier Field . . . . . . . . . . . . . 14 | 2.5. Authentication Identifier Field . . . . . . . . . . . . . 14 | |||
2.6. Version Tokens . . . . . . . . . . . . . . . . . . . . . 15 | 2.6. Version Tokens . . . . . . . . . . . . . . . . . . . . . 15 | |||
2.7. Defined Methods and Result Values . . . . . . . . . . . . 15 | 2.7. Defined Methods and Result Values . . . . . . . . . . . . 15 | |||
2.7.1. DKIM and DomainKeys . . . . . . . . . . . . . . . . . 15 | 2.7.1. DKIM and DomainKeys . . . . . . . . . . . . . . . . . 16 | |||
2.7.2. SPF and Sender ID . . . . . . . . . . . . . . . . . . 17 | 2.7.2. SPF and Sender ID . . . . . . . . . . . . . . . . . . 18 | |||
2.7.3. "iprev" . . . . . . . . . . . . . . . . . . . . . . . 18 | 2.7.3. "iprev" . . . . . . . . . . . . . . . . . . . . . . . 19 | |||
2.7.4. SMTP AUTH . . . . . . . . . . . . . . . . . . . . . . 19 | 2.7.4. SMTP AUTH . . . . . . . . . . . . . . . . . . . . . . 20 | |||
2.7.5. Other Registered Codes . . . . . . . . . . . . . . . 20 | 2.7.5. Other Registered Codes . . . . . . . . . . . . . . . 21 | |||
2.7.6. Extension Methods . . . . . . . . . . . . . . . . . . 20 | 2.7.6. Extension Methods . . . . . . . . . . . . . . . . . . 21 | |||
2.7.7. Extension Result Codes . . . . . . . . . . . . . . . 21 | 2.7.7. Extension Result Codes . . . . . . . . . . . . . . . 22 | |||
3. The "iprev" Authentication Method . . . . . . . . . . . . . . 22 | 3. The "iprev" Authentication Method . . . . . . . . . . . . . . 22 | |||
4. Adding the Header Field to a Message . . . . . . . . . . . . 23 | 4. Adding the Header Field to a Message . . . . . . . . . . . . 23 | |||
4.1. Header Field Position and Interpretation . . . . . . . . 24 | 4.1. Header Field Position and Interpretation . . . . . . . . 25 | |||
4.2. Local Policy Enforcement . . . . . . . . . . . . . . . . 25 | 4.2. Local Policy Enforcement . . . . . . . . . . . . . . . . 26 | |||
5. Removing Existing Header Fields . . . . . . . . . . . . . . . 26 | 5. Removing Existing Header Fields . . . . . . . . . . . . . . . 26 | |||
6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 27 | 6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 27 | |||
6.1. The Authentication-Results Header Field . . . . . . . . . 27 | 6.1. The Authentication-Results Header Field . . . . . . . . . 27 | |||
6.2. "Email Authentication Methods" Registry Description . . . 27 | 6.2. "Email Authentication Methods" Registry Description . . . 28 | |||
6.3. "Email Authentication Methods" Registry Update . . . . . 28 | 6.3. "Email Authentication Methods" Registry Update . . . . . 29 | |||
6.4. "Email Authentication Property Types" Registry . . . . . 30 | 6.4. "Email Authentication Property Types" Registry . . . . . 30 | |||
6.5. "Email Authentication Result Names" Description . . . . . 30 | 6.5. "Email Authentication Result Names" Description . . . . . 31 | |||
6.6. "Email Authentication Result Names" Update . . . . . . . 31 | 6.6. "Email Authentication Result Names" Update . . . . . . . 32 | |||
6.7. SMTP Enhanced Status Codes . . . . . . . . . . . . . . . 32 | 6.7. SMTP Enhanced Status Codes . . . . . . . . . . . . . . . 33 | |||
7. Security Considerations . . . . . . . . . . . . . . . . . . . 32 | 7. Security Considerations . . . . . . . . . . . . . . . . . . . 33 | |||
7.1. Forged Header Fields . . . . . . . . . . . . . . . . . . 32 | 7.1. Forged Header Fields . . . . . . . . . . . . . . . . . . 33 | |||
7.2. Misleading Results . . . . . . . . . . . . . . . . . . . 34 | 7.2. Misleading Results . . . . . . . . . . . . . . . . . . . 35 | |||
7.3. Header Field Position . . . . . . . . . . . . . . . . . . 34 | 7.3. Header Field Position . . . . . . . . . . . . . . . . . . 35 | |||
7.4. Reverse IP Query Denial-of-Service Attacks . . . . . . . 35 | 7.4. Reverse IP Query Denial-of-Service Attacks . . . . . . . 35 | |||
7.5. Mitigation of Backscatter . . . . . . . . . . . . . . . . 35 | 7.5. Mitigation of Backscatter . . . . . . . . . . . . . . . . 36 | |||
7.6. Internal MTA Lists . . . . . . . . . . . . . . . . . . . 35 | 7.6. Internal MTA Lists . . . . . . . . . . . . . . . . . . . 36 | |||
7.7. Attacks against Authentication Methods . . . . . . . . . 35 | 7.7. Attacks against Authentication Methods . . . . . . . . . 36 | |||
7.8. Intentionally Malformed Header Fields . . . . . . . . . . 35 | 7.8. Intentionally Malformed Header Fields . . . . . . . . . . 36 | |||
7.9. Compromised Internal Hosts . . . . . . . . . . . . . . . 36 | 7.9. Compromised Internal Hosts . . . . . . . . . . . . . . . 36 | |||
7.10. Encapsulated Instances . . . . . . . . . . . . . . . . . 36 | 7.10. Encapsulated Instances . . . . . . . . . . . . . . . . . 37 | |||
7.11. Reverse Mapping . . . . . . . . . . . . . . . . . . . . . 36 | 7.11. Reverse Mapping . . . . . . . . . . . . . . . . . . . . . 37 | |||
8. References . . . . . . . . . . . . . . . . . . . . . . . . . 36 | 8. References . . . . . . . . . . . . . . . . . . . . . . . . . 37 | |||
8.1. Normative References . . . . . . . . . . . . . . . . . . 37 | 8.1. Normative References . . . . . . . . . . . . . . . . . . 37 | |||
8.2. Informative References . . . . . . . . . . . . . . . . . 37 | 8.2. Informative References . . . . . . . . . . . . . . . . . 38 | |||
Appendix A. Legacy MUAs . . . . . . . . . . . . . . . . . . . . 40 | Appendix A. Legacy MUAs . . . . . . . . . . . . . . . . . . . . 42 | |||
Appendix B. Authentication-Results Examples . . . . . . . . . . 41 | Appendix B. Authentication-Results Examples . . . . . . . . . . 42 | |||
B.1. Trivial Case; Header Field Not Present . . . . . . . . . 41 | B.1. Trivial Case; Header Field Not Present . . . . . . . . . 42 | |||
B.2. Nearly Trivial Case; Service Provided, but No | B.2. Nearly Trivial Case; Service Provided, but No | |||
Authentication Done . . . . . . . . . . . . . . . . . . . 41 | Authentication Done . . . . . . . . . . . . . . . . . . . 43 | |||
B.3. Service Provided, Authentication Done . . . . . . . . . . 42 | B.3. Service Provided, Authentication Done . . . . . . . . . . 44 | |||
B.4. Service Provided, Several Authentications Done, Single | B.4. Service Provided, Several Authentications Done, Single | |||
MTA . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 | MTA . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 | |||
B.5. Service Provided, Several Authentications Done, Different | B.5. Service Provided, Several Authentications Done, Different | |||
MTAs . . . . . . . . . . . . . . . . . . . . . . . . . . 44 | MTAs . . . . . . . . . . . . . . . . . . . . . . . . . . 46 | |||
B.6. Service Provided, Multi-tiered Authentication Done . . . 45 | B.6. Service Provided, Multi-tiered Authentication Done . . . 48 | |||
B.7. Comment-Heavy Example . . . . . . . . . . . . . . . . . . 47 | B.7. Comment-Heavy Example . . . . . . . . . . . . . . . . . . 49 | |||
Appendix C. Operational Considerations about Message | Appendix C. Operational Considerations about Message | |||
Authentication . . . . . . . . . . . . . . . . . . . 48 | Authentication . . . . . . . . . . . . . . . . . . . 50 | |||
Appendix D. Changes since RFC 7001 . . . . . . . . . . . . . . . 49 | Appendix D. Changes since RFC 7001 . . . . . . . . . . . . . . . 51 | |||
Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . 51 | Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . 53 | |||
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 51 | Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 53 | |||
1. Introduction | 1. Introduction | |||
This document describes a header field called Authentication-Results | This document describes a header field called Authentication-Results | |||
for electronic mail messages that presents the results of a message | for electronic mail messages that presents the results of a message | |||
authentication effort in a machine-readable format. The intent of | authentication effort in a machine-readable format. The intent of | |||
the header field is to create a place to collect such data when | the header field is to create a place to collect such data when | |||
message authentication mechanisms are in use so that a Mail User | message authentication mechanisms are in use so that a Mail User | |||
Agent (MUA) and downstream filters can make filtering decisions and/ | Agent (MUA) and downstream filters can make filtering decisions and/ | |||
or provide a recommendation to the user as to the validity of the | or provide a recommendation to the user as to the validity of the | |||
skipping to change at page 32, line 12 | skipping to change at page 32, line 42 | |||
"auth", and "iprev" methods have had their "Specification" fields | "auth", and "iprev" methods have had their "Specification" fields | |||
replaced as follows: | replaced as follows: | |||
dkim: Section 2.7.1 of this document (RFC 7601) | dkim: Section 2.7.1 of this document (RFC 7601) | |||
domainkeys: Section 2.7.1 of this document (RFC 7601) | domainkeys: Section 2.7.1 of this document (RFC 7601) | |||
spf: for "hardfail", Section 2.4.2 of [RFC5451]; for all others, | spf: for "hardfail", Section 2.4.2 of [RFC5451]; for all others, | |||
Section 2.7.2 of this document (RFC 7601) | Section 2.7.2 of this document (RFC 7601) | |||
sender-id: for "hardfail", Section 2.4.2 of [RFC5451] ; for all | sender-id: for "hardfail", Section 2.4.2 of [RFC5451]; for all | |||
others, Section 2.7.2 of this document (RFC 7601) | others, Section 2.7.2 of this document (RFC 7601) | |||
auth: Section 2.7.4 of this document (RFC 7601) | auth: Section 2.7.4 of this document (RFC 7601) | |||
iprev: Section 2.7.3 of this document (RFC 7601) | iprev: Section 2.7.3 of this document (RFC 7601) | |||
o All entries for "dkim-adsp" that were missing an explicit | o All entries for "dkim-adsp" that were missing an explicit | |||
reference to a defining document now reference [ADSP] in their | reference to a defining document now reference [ADSP] in their | |||
"Specification" fields. | "Specification" fields. | |||
skipping to change at page 37, line 4 | skipping to change at page 37, line 31 | |||
7.11. Reverse Mapping | 7.11. Reverse Mapping | |||
Although Section 3 of this memo includes explicit support for the | Although Section 3 of this memo includes explicit support for the | |||
"iprev" method, its value as an authentication mechanism is limited. | "iprev" method, its value as an authentication mechanism is limited. | |||
Implementers of both this proposal and agents that use the data it | Implementers of both this proposal and agents that use the data it | |||
relays are encouraged to become familiar with the issues raised by | relays are encouraged to become familiar with the issues raised by | |||
[DNSOP-REVERSE] when deciding whether or not to include support for | [DNSOP-REVERSE] when deciding whether or not to include support for | |||
"iprev". | "iprev". | |||
8. References | 8. References | |||
8.1. Normative References | 8.1. Normative References | |||
[ABNF] Crocker, D., Ed. and P. Overell, "Augmented BNF for Syntax | [ABNF] Crocker, D., Ed. and P. Overell, "Augmented BNF for Syntax | |||
Specifications: ABNF", STD 68, RFC 5234, DOI 10.17487/ | Specifications: ABNF", STD 68, RFC 5234, | |||
RFC5234, January 2008, | DOI 10.17487/RFC5234, January 2008, | |||
<http://www.rfc-editor.org/info/rfc5234>. | <http://www.rfc-editor.org/info/rfc5234>. | |||
[IANA-HEADERS] | [IANA-HEADERS] | |||
Klyne, G., Nottingham, M., and J. Mogul, "Registration | Klyne, G., Nottingham, M., and J. Mogul, "Registration | |||
Procedures for Message Header Fields", BCP 90, RFC 3864, | Procedures for Message Header Fields", BCP 90, RFC 3864, | |||
DOI 10.17487/RFC3864, September 2004, | DOI 10.17487/RFC3864, September 2004, | |||
<http://www.rfc-editor.org/info/rfc3864>. | <http://www.rfc-editor.org/info/rfc3864>. | |||
[KEYWORDS] | [KEYWORDS] | |||
Bradner, S., "Key words for use in RFCs to Indicate | Bradner, S., "Key words for use in RFCs to Indicate | |||
Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/ | Requirement Levels", BCP 14, RFC 2119, | |||
RFC2119, March 1997, | DOI 10.17487/RFC2119, March 1997, | |||
<http://www.rfc-editor.org/info/rfc2119>. | <http://www.rfc-editor.org/info/rfc2119>. | |||
[MAIL] Resnick, P., Ed., "Internet Message Format", RFC 5322, DOI | [MAIL] Resnick, P., Ed., "Internet Message Format", RFC 5322, | |||
10.17487/RFC5322, October 2008, | DOI 10.17487/RFC5322, October 2008, | |||
<http://www.rfc-editor.org/info/rfc5322>. | <http://www.rfc-editor.org/info/rfc5322>. | |||
[MIME] Freed, N. and N. Borenstein, "Multipurpose Internet Mail | [MIME] Freed, N. and N. Borenstein, "Multipurpose Internet Mail | |||
Extensions (MIME) Part One: Format of Internet Message | Extensions (MIME) Part One: Format of Internet Message | |||
Bodies", RFC 2045, DOI 10.17487/RFC2045, November 1996, | Bodies", RFC 2045, DOI 10.17487/RFC2045, November 1996, | |||
<http://www.rfc-editor.org/info/rfc2045>. | <http://www.rfc-editor.org/info/rfc2045>. | |||
[SMTP] Klensin, J., "Simple Mail Transfer Protocol", RFC 5321, | [SMTP] Klensin, J., "Simple Mail Transfer Protocol", RFC 5321, | |||
DOI 10.17487/RFC5321, October 2008, | DOI 10.17487/RFC5321, October 2008, | |||
<http://www.rfc-editor.org/info/rfc5321>. | <http://www.rfc-editor.org/info/rfc5321>. | |||
8.2. Informative References | 8.2. Informative References | |||
[ADSP] Allman, E., Fenton, J., Delany, M., and J. Levine, | [ADSP] Allman, E., Fenton, J., Delany, M., and J. Levine, | |||
"DomainKeys Identified Mail (DKIM) Author Domain Signing | "DomainKeys Identified Mail (DKIM) Author Domain Signing | |||
Practices (ADSP)", RFC 5617, DOI 10.17487/RFC5617, August | Practices (ADSP)", RFC 5617, DOI 10.17487/RFC5617, August | |||
2009, <http://www.rfc-editor.org/info/rfc5617>. | 2009, <http://www.rfc-editor.org/info/rfc5617>. | |||
[AR-VBR] Kucherawy, M., "Authentication-Results Registration for | [AR-VBR] Kucherawy, M., "Authentication-Results Registration for | |||
Vouch by Reference Results", RFC 6212, DOI 10.17487/ | Vouch by Reference Results", RFC 6212, | |||
RFC6212, April 2011, | DOI 10.17487/RFC6212, April 2011, | |||
<http://www.rfc-editor.org/info/rfc6212>. | <http://www.rfc-editor.org/info/rfc6212>. | |||
[ATPS] Kucherawy, M., "DomainKeys Identified Mail (DKIM) | [ATPS] Kucherawy, M., "DomainKeys Identified Mail (DKIM) | |||
Authorized Third-Party Signatures", RFC 6541, DOI | Authorized Third-Party Signatures", RFC 6541, | |||
10.17487/RFC6541, February 2012, | DOI 10.17487/RFC6541, February 2012, | |||
<http://www.rfc-editor.org/info/rfc6541>. | <http://www.rfc-editor.org/info/rfc6541>. | |||
[AUTH] Siemborski, R., Ed. and A. Melnikov, Ed., "SMTP Service | [AUTH] Siemborski, R., Ed. and A. Melnikov, Ed., "SMTP Service | |||
Extension for Authentication", RFC 4954, DOI 10.17487/ | Extension for Authentication", RFC 4954, | |||
RFC4954, July 2007, | DOI 10.17487/RFC4954, July 2007, | |||
<http://www.rfc-editor.org/info/rfc4954>. | <http://www.rfc-editor.org/info/rfc4954>. | |||
[AUTH-ESC] | [AUTH-ESC] | |||
Kucherawy, M., "Email Authentication Status Codes", RFC | Kucherawy, M., "Email Authentication Status Codes", | |||
7372, DOI 10.17487/RFC7372, September 2014, | RFC 7372, DOI 10.17487/RFC7372, September 2014, | |||
<http://www.rfc-editor.org/info/rfc7372>. | <http://www.rfc-editor.org/info/rfc7372>. | |||
[DKIM] Crocker, D., Ed., Hansen, T., Ed., and M. Kucherawy, Ed., | [DKIM] Crocker, D., Ed., Hansen, T., Ed., and M. Kucherawy, Ed., | |||
"DomainKeys Identified Mail (DKIM) Signatures", STD 76, | "DomainKeys Identified Mail (DKIM) Signatures", STD 76, | |||
RFC 6376, DOI 10.17487/RFC6376, September 2011, | RFC 6376, DOI 10.17487/RFC6376, September 2011, | |||
<http://www.rfc-editor.org/info/rfc6376>. | <http://www.rfc-editor.org/info/rfc6376>. | |||
[DMARC] Kucherawy, M., Ed. and E. Zwicky, Ed., "Domain-based | [DMARC] Kucherawy, M., Ed. and E. Zwicky, Ed., "Domain-based | |||
Message Authentication, Reporting, and Conformance | Message Authentication, Reporting, and Conformance | |||
(DMARC)", RFC 7489, DOI 10.17487/RFC7489, March 2015, | (DMARC)", RFC 7489, DOI 10.17487/RFC7489, March 2015, | |||
<http://www.rfc-editor.org/info/rfc7489>. | <http://www.rfc-editor.org/info/rfc7489>. | |||
[DNS] Mockapetris, P., "Domain names - implementation and | [DNS] Mockapetris, P., "Domain names - implementation and | |||
specification", STD 13, RFC 1035, DOI 10.17487/RFC1035, | specification", STD 13, RFC 1035, DOI 10.17487/RFC1035, | |||
November 1987, <http://www.rfc-editor.org/info/rfc1035>. | November 1987, <http://www.rfc-editor.org/info/rfc1035>. | |||
[DNS-IP6] Thomson, S., Huitema, C., Ksinant, V., and M. Souissi, | [DNS-IP6] Thomson, S., Huitema, C., Ksinant, V., and M. Souissi, | |||
"DNS Extensions to Support IP Version 6", RFC 3596, DOI | "DNS Extensions to Support IP Version 6", RFC 3596, | |||
10.17487/RFC3596, October 2003, | DOI 10.17487/RFC3596, October 2003, | |||
<http://www.rfc-editor.org/info/rfc3596>. | <http://www.rfc-editor.org/info/rfc3596>. | |||
[DNSOP-REVERSE] | [DNSOP-REVERSE] | |||
Senie, D. and A. Sullivan, "Considerations for the use of | Senie, D. and A. Sullivan, "Considerations for the use of | |||
DNS Reverse Mapping", Work in Progress, draft-ietf-dnsop- | DNS Reverse Mapping", Work in Progress, draft-ietf-dnsop- | |||
reverse-mapping-considerations-06, March 2008. | reverse-mapping-considerations-06, March 2008. | |||
[DOMAINKEYS] | [DOMAINKEYS] | |||
Delany, M., "Domain-Based Email Authentication Using | Delany, M., "Domain-Based Email Authentication Using | |||
Public Keys Advertised in the DNS (DomainKeys)", RFC 4870, | Public Keys Advertised in the DNS (DomainKeys)", RFC 4870, | |||
DOI 10.17487/RFC4870, May 2007, | DOI 10.17487/RFC4870, May 2007, | |||
<http://www.rfc-editor.org/info/rfc4870>. | <http://www.rfc-editor.org/info/rfc4870>. | |||
[DSN] Moore, K. and G. Vaudreuil, "An Extensible Message Format | [DSN] Moore, K. and G. Vaudreuil, "An Extensible Message Format | |||
for Delivery Status Notifications", RFC 3464, DOI | for Delivery Status Notifications", RFC 3464, | |||
10.17487/RFC3464, January 2003, | DOI 10.17487/RFC3464, January 2003, | |||
<http://www.rfc-editor.org/info/rfc3464>. | <http://www.rfc-editor.org/info/rfc3464>. | |||
[EMAIL-ARCH] | [EMAIL-ARCH] | |||
Crocker, D., "Internet Mail Architecture", RFC 5598, DOI | Crocker, D., "Internet Mail Architecture", RFC 5598, | |||
10.17487/RFC5598, July 2009, | DOI 10.17487/RFC5598, July 2009, | |||
<http://www.rfc-editor.org/info/rfc5598>. | <http://www.rfc-editor.org/info/rfc5598>. | |||
[IANA-CONSIDERATIONS] | [IANA-CONSIDERATIONS] | |||
Narten, T. and H. Alvestrand, "Guidelines for Writing an | Narten, T. and H. Alvestrand, "Guidelines for Writing an | |||
IANA Considerations Section in RFCs", BCP 26, RFC 5226, | IANA Considerations Section in RFCs", BCP 26, RFC 5226, | |||
DOI 10.17487/RFC5226, May 2008, | DOI 10.17487/RFC5226, May 2008, | |||
<http://www.rfc-editor.org/info/rfc5226>. | <http://www.rfc-editor.org/info/rfc5226>. | |||
[IMAP] Crispin, M., "INTERNET MESSAGE ACCESS PROTOCOL - VERSION | [IMAP] Crispin, M., "INTERNET MESSAGE ACCESS PROTOCOL - VERSION | |||
4rev1", RFC 3501, DOI 10.17487/RFC3501, March 2003, | 4rev1", RFC 3501, DOI 10.17487/RFC3501, March 2003, | |||
skipping to change at page 39, line 29 | skipping to change at page 40, line 10 | |||
[POP3] Myers, J. and M. Rose, "Post Office Protocol - Version 3", | [POP3] Myers, J. and M. Rose, "Post Office Protocol - Version 3", | |||
STD 53, RFC 1939, DOI 10.17487/RFC1939, May 1996, | STD 53, RFC 1939, DOI 10.17487/RFC1939, May 1996, | |||
<http://www.rfc-editor.org/info/rfc1939>. | <http://www.rfc-editor.org/info/rfc1939>. | |||
[PRA] Lyon, J., "Purported Responsible Address in E-Mail | [PRA] Lyon, J., "Purported Responsible Address in E-Mail | |||
Messages", RFC 4407, DOI 10.17487/RFC4407, April 2006, | Messages", RFC 4407, DOI 10.17487/RFC4407, April 2006, | |||
<http://www.rfc-editor.org/info/rfc4407>. | <http://www.rfc-editor.org/info/rfc4407>. | |||
[RFC5451] Kucherawy, M., "Message Header Field for Indicating | [RFC5451] Kucherawy, M., "Message Header Field for Indicating | |||
Message Authentication Status", RFC 5451, DOI 10.17487/ | Message Authentication Status", RFC 5451, | |||
RFC5451, April 2009, | DOI 10.17487/RFC5451, April 2009, | |||
<http://www.rfc-editor.org/info/rfc5451>. | <http://www.rfc-editor.org/info/rfc5451>. | |||
[RFC6008] Kucherawy, M., "Authentication-Results Registration for | [RFC6008] Kucherawy, M., "Authentication-Results Registration for | |||
Differentiating among Cryptographic Results", RFC 6008, | Differentiating among Cryptographic Results", RFC 6008, | |||
DOI 10.17487/RFC6008, September 2010, | DOI 10.17487/RFC6008, September 2010, | |||
<http://www.rfc-editor.org/info/rfc6008>. | <http://www.rfc-editor.org/info/rfc6008>. | |||
[RFC6577] Kucherawy, M., "Authentication-Results Registration Update | [RFC6577] Kucherawy, M., "Authentication-Results Registration Update | |||
for Sender Policy Framework (SPF) Results", RFC 6577, DOI | for Sender Policy Framework (SPF) Results", RFC 6577, | |||
10.17487/RFC6577, March 2012, | DOI 10.17487/RFC6577, March 2012, | |||
<http://www.rfc-editor.org/info/rfc6577>. | <http://www.rfc-editor.org/info/rfc6577>. | |||
[RFC7001] Kucherawy, M., "Message Header Field for Indicating | [RFC7001] Kucherawy, M., "Message Header Field for Indicating | |||
Message Authentication Status", RFC 7001, DOI 10.17487/ | Message Authentication Status", RFC 7001, | |||
RFC7001, September 2013, | DOI 10.17487/RFC7001, September 2013, | |||
<http://www.rfc-editor.org/info/rfc7001>. | <http://www.rfc-editor.org/info/rfc7001>. | |||
[RFC7410] Kucherawy, M., "A Property Types Registry for the | [RFC7410] Kucherawy, M., "A Property Types Registry for the | |||
Authentication-Results Header Field", RFC 7410, DOI | Authentication-Results Header Field", RFC 7410, | |||
10.17487/RFC7410, December 2014, | DOI 10.17487/RFC7410, December 2014, | |||
<http://www.rfc-editor.org/info/rfc7410>. | <http://www.rfc-editor.org/info/rfc7410>. | |||
[RRVS] Mills, W. and M. Kucherawy, "The Require-Recipient-Valid- | [RRVS] Mills, W. and M. Kucherawy, "The Require-Recipient-Valid- | |||
Since Header Field and SMTP Service Extension", RFC 7293, | Since Header Field and SMTP Service Extension", RFC 7293, | |||
DOI 10.17487/RFC7293, July 2014, | DOI 10.17487/RFC7293, July 2014, | |||
<http://www.rfc-editor.org/info/rfc7293>. | <http://www.rfc-editor.org/info/rfc7293>. | |||
[SECURITY] | [SECURITY] | |||
Rescorla, E. and B. Korver, "Guidelines for Writing RFC | Rescorla, E. and B. Korver, "Guidelines for Writing RFC | |||
Text on Security Considerations", BCP 72, RFC 3552, DOI | Text on Security Considerations", BCP 72, RFC 3552, | |||
10.17487/RFC3552, July 2003, | DOI 10.17487/RFC3552, July 2003, | |||
<http://www.rfc-editor.org/info/rfc3552>. | <http://www.rfc-editor.org/info/rfc3552>. | |||
[SENDERID] | [SENDERID] | |||
Lyon, J. and M. Wong, "Sender ID: Authenticating E-Mail", | Lyon, J. and M. Wong, "Sender ID: Authenticating E-Mail", | |||
RFC 4406, DOI 10.17487/RFC4406, April 2006, | RFC 4406, DOI 10.17487/RFC4406, April 2006, | |||
<http://www.rfc-editor.org/info/rfc4406>. | <http://www.rfc-editor.org/info/rfc4406>. | |||
[SMIME-REG] | [SMIME-REG] | |||
Melnikov, A., "Authentication-Results Registration for S/ | Melnikov, A., "Authentication-Results Registration for S/ | |||
MIME Signature Verification", RFC 7281, DOI 10.17487/ | MIME Signature Verification", RFC 7281, | |||
RFC7281, June 2014, | DOI 10.17487/RFC7281, June 2014, | |||
<http://www.rfc-editor.org/info/rfc7281>. | <http://www.rfc-editor.org/info/rfc7281>. | |||
[SPF] Kitterman, S., "Sender Policy Framework (SPF) for | [SPF] Kitterman, S., "Sender Policy Framework (SPF) for | |||
Authorizing Use of Domains in Email, Version 1", RFC 7208, | Authorizing Use of Domains in Email, Version 1", RFC 7208, | |||
DOI 10.17487/RFC7208, April 2014, | DOI 10.17487/RFC7208, April 2014, | |||
<http://www.rfc-editor.org/info/rfc7208>. | <http://www.rfc-editor.org/info/rfc7208>. | |||
[VBR] Hoffman, P., Levine, J., and A. Hathcock, "Vouch By | [VBR] Hoffman, P., Levine, J., and A. Hathcock, "Vouch By | |||
Reference", RFC 5518, DOI 10.17487/RFC5518, April 2009, | Reference", RFC 5518, DOI 10.17487/RFC5518, April 2009, | |||
<http://www.rfc-editor.org/info/rfc5518>. | <http://www.rfc-editor.org/info/rfc5518>. | |||
End of changes. 29 change blocks. | ||||
72 lines changed or deleted | 73 lines changed or added | |||
This html diff was produced by rfcdiff 1.41. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ |