<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.14 (Ruby 3.1.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-robinson-dkim2-message-examples-00" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.29.0 -->
  <front>
    <title abbrev="DKIM2 Message Examples">DKIM2 Message Examples</title>
    <seriesInfo name="Internet-Draft" value="draft-robinson-dkim2-message-examples-00"/>
    <author initials="A." surname="Robinson" fullname="Allen Robinson">
      <organization>Google Inc.</organization>
      <address>
        <email>arobins@google.com</email>
      </address>
    </author>
    <author initials="T." surname="Herkula" fullname="Tobias Herkula">
      <organization>1&amp;1 Mail &amp; Media GmbH</organization>
      <address>
        <email>tobias.herkula@1und1.de</email>
      </address>
    </author>
    <date year="2025" month="June" day="30"/>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 35?>

<t>This memo provides examples of how DKIM2 would apply to common email usage
scenarios.</t>
    </abstract>
  </front>
  <middle>
    <?line 40?>

<section anchor="dkim2-message-examples">
      <name>DKIM2 Message Examples</name>
      <section anchor="introduction">
        <name>Introduction</name>
        <t>This draft provides a collection of email message scenarios, along with the
proposed way that DKIM2 could operate under those scenarios.</t>
      </section>
      <section anchor="document-conventions">
        <name>Document Conventions</name>
        <t>Terminology from <xref target="RFC5598"/> is used extensively throughout this document.</t>
        <ul spacing="normal">
          <li>
            <t>"Transaction" represents an interaction between two ADMDs.</t>
          </li>
          <li>
            <t>"Origin" refers to the first ADMD involved in the delivery of the message.</t>
          </li>
          <li>
            <t>"Destination" refers to the final ADMD involved in the delivery of the
message.</t>
          </li>
          <li>
            <t>"DKIM2-Signature" as the header field name is a placeholder. The
standardization process will involve coming to consensus on a name for the
field.</t>
          </li>
          <li>
            <t>DKIM2-Signature field values will not contain the bh= tag.</t>
          </li>
          <li>
            <t>DKIM2-Signature field values will contain a simplified b= tag, where "PASS"
means the signature can be verified against the message as-is,
"PASS_AFTER_UNDO_MODS" means pass after applying DKIM2 modification
algebra to the message, and "FAIL" means an unrecoverable signature.</t>
          </li>
          <li>
            <t>DKIM2-Modification is a human-consumable description of the changes, in lieu
of having a rough definition of what the machine-consumable modification
algebra should look like.</t>
          </li>
          <li>
            <t>DKIM-Signature header fields are not included. These can safely be present
in DKIM2 messages, but do not contribute to the DKIM2-oriented handling of a
message.</t>
          </li>
          <li>
            <t>The destination address header fields 5322.To, 5322.Cc, 5322.Bcc are left
out. These are not relevant to DKIM2, since there is no requirement that
5321.To have any relationship to the values contained in those header
fields.</t>
          </li>
          <li>
            <t>Other mandatory <xref target="RFC5322"/> headers fields that aren't relevant to DKIM2
processing will also be left out.</t>
          </li>
          <li>
            <t>"Alignment" needs further definition in the context of DKIM2, but for now it
is being used with the same meaning as DMARC alignment, as defined in
<xref target="RFC7489"/>.</t>
          </li>
          <li>
            <t>==== delimiters are used to indicate the start and end of the SMTP
(<xref target="RFC5321"/>) transaction, and are not part of the transaction's content.</t>
          </li>
        </ul>
      </section>
      <section anchor="scenarios">
        <name>Scenarios</name>
        <section anchor="direct-delivery">
          <name>Direct delivery</name>
          <t>This is the common case for email. The initial ADMD has a message to be
delivered somewhere, and the ADMD that is on the receiving end of that SMTP
transaction is that message's final destination.</t>
          <t>Transaction: Origin to destination</t>
          <artwork><![CDATA[
====
MAIL FROM: <a@origin.example>
RCPT TO: <b@destination.example>
DATA
DKIM2-Signature: i=1; d=origin.example; s=key1; mf=a@origin.example;
    rt=b@destination.example; b=PASS
From: <a@origin.example>

A Message!
====
]]></artwork>
          <t>In the initial transaction of a DKIM2 signed message, the signing domain must be
aligned with the domain in 5322.From. Note that the mf= and 5321.MailFrom are
equal, but they do not need to be equal to the 5322.From.</t>
          <t>In every DKIM2 transaction, it is required that the topmost (highest i=)
DKIM2-Signature's signing domain be aligned with the domain in that signature's
mf= tag, and that the mf= tag be equal to the 5321.MailFrom for that
transaction. Alignment of these domains is a mitigation for backscatter, and it
is left to the system operator to prevent local backscatter (ex.
acct1@example.com misusing 5321.MailFrom of acct2@example.com).</t>
          <t>In every DKIM2 transaction, it is required that the topmost DKIM2-Signature's
rt= be equal to the 5321.RcptTo for that transaction. This equality is a
mitigation for message replay, by making delivery to any other mailbox (even at
the same host) be not authenticated by DKIM2. Acceptance of messages that don't
authenticate with DKIM2 is a matter of local policy.</t>
        </section>
        <section anchor="autoforwarding-no-alteration">
          <name>Autoforwarding (no alteration)</name>
          <t>This is often called the "alumni forwarder" scenario, but many other forwarding
services exist. An ADMD has a message to send, and the destination is an address
at another ADMD acting as a forwarding service. The forwarding service resends
the message to another ADMD, which is the final destination for the message.</t>
          <t>In this scenario, it is assumed that the forwarding service does not alter the
message at all.</t>
          <t>Transaction: Origin to forwarder</t>
          <artwork><![CDATA[
====
MAIL FROM: <a@origin.example>
RCPT TO: <b@alias.example>
DATA
DKIM2-Signature: i=1; d=origin.example; s=key1; mf=a@origin.example;
    rt=b@alias.example; b=PASS
From: <a@origin.example>

A Message!
====
]]></artwork>
          <t>Transaction: Forwarder to destination</t>
          <artwork><![CDATA[
====
MAIL FROM: <b@alias.example>
RCPT TO: <c@destination.example>
DATA
DKIM2-Signature: i=2; d=alias.example; s=key4321; mf=b@alias.example;
    rt=c@destination.example; b=PASS
DKIM2-Signature: i=1; d=origin.example; s=key1; mf=a@origin.example;
    rt=b@alias.example; b=PASS
From: <a@origin.example>

A Message!
====
]]></artwork>
          <t>In the forwarding transaction, the i=2 signing domain is aligned to the
5321.MailFrom and the domain in i=1 rt=. There is no requirement that i=2
signing be aligned with 5322.From.</t>
          <t>DMARC requirements can be satisfied in both transactions, because there is a
passing signature aligned with the 5322.From.</t>
        </section>
        <section anchor="mailing-list-no-alteration">
          <name>Mailing list (no alteration)</name>
          <t>This operates like an autoforwarder. The only difference is that these systems
are expected to re-deliver to multiple destinations instead of just one.</t>
          <t>Transaction: Origin to mailing list</t>
          <artwork><![CDATA[
====
MAIL FROM: <a@origin.example>
RCPT TO: <m@list.example>
DATA
DKIM2-Signature: i=1; d=origin.example; s=key1; mf=a@origin.example;
    rt=m@list.example; b=PASS
From: <a@origin.example>

A Message!
====
]]></artwork>
          <t>Transaction: Mailing list to destination</t>
          <artwork><![CDATA[
====
MAIL FROM: <m@list.example>
RCPT TO: <b@subscriber.example>
DATA
DKIM2-Signature: i=2; d=list.example; s=key50; mf=m@list.example;
    rt=b@subscriber.example; b=PASS
DKIM2-Signature: i=1; d=origin.example; s=key1; mf=a@origin.example;
    rt=m@list.example; b=PASS
From: <a@origin.example>

A Message!
====
]]></artwork>
        </section>
        <section anchor="mailing-list-with-alteration">
          <name>Mailing list (with alteration)</name>
          <t>Similar to the non-modifying mailing list case, but with modifications of the
message (body, 5322.Subject, etc.) that invalidate the signature in i=1.</t>
          <t>Transaction: Origin to mailing list</t>
          <artwork><![CDATA[
====
MAIL FROM: <a@origin.example>
RCPT TO: <m@list.example>
DATA
DKIM2-Signature: i=1; d=origin.example; s=key1; mf=a@origin.example;
    rt=m@list.example; b=PASS
From: <a@origin.example>

A Message!
====
]]></artwork>
          <t>Transaction: Mailing list to destination</t>
          <artwork><![CDATA[
====
MAIL FROM: <m@list.example>
RCPT TO: <b@subscriber.example>
DATA
DKIM2-Signature: i=2; d=list.example; s=key1; mf=m@list.example;
    rt=b@subscriber.example; b=PASS
DKIM2-Modification: i=2; delta="Appended a line"
DKIM2-Signature: i=1; d=origin.example; s=key50; mf=a@origin.example;
    rt=m@list.example; b=PASS_AFTER_UNDO_MODS
From: <a@origin.example>

A Message!
Click https://list.example/unsubscribe to unsubscribe from this.
====
]]></artwork>
          <t>It is unclear whether the second transaction can be considered to satisfy
origin.example's DMARC requirements, as origin.example's signature did not pass
on the message as presented.</t>
        </section>
        <section anchor="mailing-list-with-alteration-and-from-munging">
          <name>Mailing list (with alteration and From munging)</name>
          <t>Further modification, where the mailing list also changes the 5322.From header
field to something else. This is done in today's ecosystem to allow for delivery
of modified messages sent from domains with DMARC policies.</t>
          <t>Transaction: Origin to mailing list</t>
          <artwork><![CDATA[
====
MAIL FROM: <a@origin.example>
RCPT TO: <m@list.example>
DATA
DKIM2-Signature: i=1; d=origin.example; s=key1; mf=a@origin.example;
    rt=m@list.example; b=PASS
From: <a@origin.example>

A Message!
====
]]></artwork>
          <t>Transaction: Mailing list to destination</t>
          <artwork><![CDATA[
====
MAIL FROM: <m@list.example>
RCPT TO: <b@subscriber.example>
DATA
DKIM2-Signature: i=2; d=list.example; s=key1; mf=m@list.example;
    rt=b@subscriber.example; b=PASS
DKIM2-Modification: i=2;
    delta="Appended a line; From used to be "a@origin.example""
DKIM2-Signature: i=1; d=origin.example; s=key50; mf=a@origin.example;
    rt=m@list.example; b=PASS_AFTER_UNDO_MODS
From: "a via list" <m@list.example>

A Message!
Click https://list.example/unsubscribe to unsubscribe from this.
====
]]></artwork>
          <t>DMARC is satisfied by this message. There is a signature from the domain of
5322.From that passes on the message being presented, and the original 5322.From
isn't visible unless the receiving system decides that that's an appropriate
thing to do.</t>
          <t>It should be required that any changes 5322.From be included in a signature
where the signing domain aligns with the new 5322.From, similar to how i=1 must
align with the message's original 5322.From.</t>
        </section>
        <section anchor="sending-on-behalf-of-another-domain">
          <name>Sending on behalf of another domain</name>
          <t>There are scenarios in which one ADMD is sending messages on behalf of another
ADMD. A common example of this is Email Service Providers (ESPs) that send
promotional mail on behalf of their customers.</t>
          <t>Transaction: Origin to destination</t>
          <artwork><![CDATA[
====
MAIL FROM: <something@esp.example>
RCPT TO: <abc@destination.example>
DATA
DKIM2-Signature: i=2; d=esp.example; s=espkey;
    mf=something@esp.example; rt=abc@destination.example; b=PASS
DKIM2-SIGNATURE: i=1; d=brand.example; s=brandkey;
    mf=something@brand.example; rt=something@esp.example; b=PASS
From: "Brand coupons" <no-reply@brand.example>

Here are some coupons for our Brand products!
====
]]></artwork>
          <t>Despite being originated from the ESP directly, DKIM2's requirement that the i=1
d= tag have alignment with both the 5321.MailFrom and 5322.From means that
scenarios like this will require two signatures at origination. The first
satisfies the requirement that the signature be aligned with 5322.From, and the
second satisfies the requirement that the topmost signature's mf= tag be equal
to the 5321.MailFrom of the transaction.</t>
          <t>Generation of two signatures is only required when the ESP needs to use a
5321.MailFrom that is not aligned with 5322.From. If this is not required, the
mail can be sent using a single signature that aligns with both.</t>
        </section>
      </section>
      <section anchor="iana-considerations">
        <name>IANA Considerations</name>
        <t>None.</t>
      </section>
      <section anchor="security-considerations">
        <name>Security Considerations</name>
        <t>Security considerations for DKIM2 will be included in the protocol document.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC5598">
        <front>
          <title>Internet Mail Architecture</title>
          <author fullname="D. Crocker" initials="D." surname="Crocker"/>
          <date month="July" year="2009"/>
          <abstract>
            <t>Over its thirty-five-year history, Internet Mail has changed significantly in scale and complexity, as it has become a global infrastructure service. These changes have been evolutionary, rather than revolutionary, reflecting a strong desire to preserve both its installed base and its usefulness. To collaborate productively on this large and complex system, all participants need to work from a common view of it and use a common language to describe its components and the interactions among them. But the many differences in perspective currently make it difficult to know exactly what another participant means. To serve as the necessary common frame of reference, this document describes the enhanced Internet Mail architecture, reflecting the current service. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5598"/>
        <seriesInfo name="DOI" value="10.17487/RFC5598"/>
      </reference>
      <reference anchor="RFC5321">
        <front>
          <title>Simple Mail Transfer Protocol</title>
          <author fullname="J. Klensin" initials="J." surname="Klensin"/>
          <date month="October" year="2008"/>
          <abstract>
            <t>This document is a specification of the basic protocol for Internet electronic mail transport. It consolidates, updates, and clarifies several previous documents, making all or parts of most of them obsolete. It covers the SMTP extension mechanisms and best practices for the contemporary Internet, but does not provide details about particular extensions. Although SMTP was designed as a mail transport and delivery protocol, this specification also contains information that is important to its use as a "mail submission" protocol for "split-UA" (User Agent) mail reading systems and mobile environments. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5321"/>
        <seriesInfo name="DOI" value="10.17487/RFC5321"/>
      </reference>
      <reference anchor="RFC5322">
        <front>
          <title>Internet Message Format</title>
          <author fullname="P. Resnick" initials="P." role="editor" surname="Resnick"/>
          <date month="October" year="2008"/>
          <abstract>
            <t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of "electronic mail" messages. This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, "Standard for the Format of ARPA Internet Text Messages", updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5322"/>
        <seriesInfo name="DOI" value="10.17487/RFC5322"/>
      </reference>
      <reference anchor="RFC7489">
        <front>
          <title>Domain-based Message Authentication, Reporting, and Conformance (DMARC)</title>
          <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy"/>
          <author fullname="E. Zwicky" initials="E." role="editor" surname="Zwicky"/>
          <date month="March" year="2015"/>
          <abstract>
            <t>Domain-based Message Authentication, Reporting, and Conformance (DMARC) is a scalable mechanism by which a mail-originating organization can express domain-level policies and preferences for message validation, disposition, and reporting, that a mail-receiving organization can use to improve mail handling.</t>
            <t>Originators of Internet Mail need to be able to associate reliable and authenticated domain identifiers with messages, communicate policies about messages that use those identifiers, and report about mail using those identifiers. These abilities have several benefits: Receivers can provide feedback to Domain Owners about the use of their domains; this feedback can provide valuable insight about the management of internal operations and the presence of external domain name abuse.</t>
            <t>DMARC does not produce or encourage elevated delivery privilege of authenticated email. DMARC is a mechanism for policy distribution that enables increasingly strict handling of messages that fail authentication checks, ranging from no action, through altered delivery, up to message rejection.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7489"/>
        <seriesInfo name="DOI" value="10.17487/RFC7489"/>
      </reference>
    </references>
    <?line 344?>

<section anchor="changes-from-earlier-versions">
      <name>Changes from Earlier Versions</name>
      <t>[[This section to be removed by RFC Editor]]</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
