diff options
author | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
---|---|---|
committer | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
commit | 4bfd864f10b68b71482b35c818559068ef8d5797 (patch) | |
tree | e3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc4686.txt | |
parent | ea76e11061bda059ae9f9ad130a9895cc85607db (diff) |
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc4686.txt')
-rw-r--r-- | doc/rfc/rfc4686.txt | 1627 |
1 files changed, 1627 insertions, 0 deletions
diff --git a/doc/rfc/rfc4686.txt b/doc/rfc/rfc4686.txt new file mode 100644 index 0000000..fb9ee5e --- /dev/null +++ b/doc/rfc/rfc4686.txt @@ -0,0 +1,1627 @@ + + + + + + +Network Working Group J. Fenton +Request for Comments: 4686 Cisco Systems, Inc. +Category: Informational September 2006 + + + Analysis of Threats Motivating DomainKeys Identified Mail (DKIM) + +Status of This Memo + + This memo provides information for the Internet community. It does + not specify an Internet standard of any kind. Distribution of this + memo is unlimited. + +Copyright Notice + + Copyright (C) The Internet Society (2006). + +Abstract + + This document provides an analysis of some threats against Internet + mail that are intended to be addressed by signature-based mail + authentication, in particular DomainKeys Identified Mail. It + discusses the nature and location of the bad actors, what their + capabilities are, and what they intend to accomplish via their + attacks. + + + + + + + + + + + + + + + + + + + + + + + + + + +Fenton Informational [Page 1] + +RFC 4686 DKIM Threat Analysis September 2006 + + +Table of Contents + + 1. Introduction ....................................................3 + 1.1. Terminology and Model ......................................3 + 1.2. Document Structure .........................................5 + 2. The Bad Actors ..................................................6 + 2.1. Characteristics ............................................6 + 2.2. Capabilities ...............................................6 + 2.3. Location ...................................................8 + 2.3.1. Externally-Located Bad Actors .......................8 + 2.3.2. Within Claimed Originator's Administrative Unit .....8 + 2.3.3. Within Recipient's Administrative Unit ..............9 + 3. Representative Bad Acts .........................................9 + 3.1. Use of Arbitrary Identities ................................9 + 3.2. Use of Specific Identities ................................10 + 3.2.1. Exploitation of Social Relationships ...............10 + 3.2.2. Identity-Related Fraud .............................11 + 3.2.3. Reputation Attacks .................................11 + 3.2.4. Reflection Attacks .................................11 + 4. Attacks on Message Signing .....................................12 + 4.1. Attacks against Message Signatures ........................12 + 4.1.1. Theft of Private Key for Domain ....................13 + 4.1.2. Theft of Delegated Private Key .....................13 + 4.1.3. Private Key Recovery via Side Channel Attack .......14 + 4.1.4. Chosen Message Replay ..............................14 + 4.1.5. Signed Message Replay ..............................16 + 4.1.6. Denial-of-Service Attack against Verifier ..........16 + 4.1.7. Denial-of-Service Attack against Key Service .......17 + 4.1.8. Canonicalization Abuse .............................17 + 4.1.9. Body Length Limit Abuse ............................17 + 4.1.10. Use of Revoked Key ................................18 + 4.1.11. Compromise of Key Server ..........................18 + 4.1.12. Falsification of Key Service Replies ..............19 + 4.1.13. Publication of Malformed Key Records + and/or Signatures .................................19 + 4.1.14. Cryptographic Weaknesses in Signature Generation ..20 + 4.1.15. Display Name Abuse ................................21 + 4.1.16. Compromised System within Originator's Network ....21 + 4.1.17. Verification Probe Attack .........................21 + 4.1.18. Key Publication by Higher-Level Domain ............22 + 4.2. Attacks against Message Signing Practices .................23 + 4.2.1. Look-Alike Domain Names ............................23 + 4.2.2. Internationalized Domain Name Abuse ................23 + 4.2.3. Denial-of-Service Attack against Signing + Practices ..........................................24 + 4.2.4. Use of Multiple From Addresses .....................24 + 4.2.5. Abuse of Third-Party Signatures ....................24 + 4.2.6. Falsification of Sender Signing Practices Replies ..25 + + + +Fenton Informational [Page 2] + +RFC 4686 DKIM Threat Analysis September 2006 + + + 4.3. Other Attacks .............................................25 + 4.3.1. Packet Amplification Attacks via DNS ...............25 + 5. Derived Requirements ...........................................26 + 6. Security Considerations ........................................26 + 7. Informative References .........................................27 + Appendix A. Acknowledgements ......................................28 + +1. Introduction + + The DomainKeys Identified Mail (DKIM) protocol is being specified by + the IETF DKIM Working Group. The DKIM protocol defines a mechanism + by which email messages can be cryptographically signed, permitting a + signing domain to claim responsibility for the use of a given email + address. Message recipients can verify the signature by querying the + signer's domain directly to retrieve the appropriate public key, and + thereby confirm that the message was attested to by a party in + possession of the private key for the signing domain. This document + addresses threats relative to two works in progress by the DKIM + Working Group, the DKIM signature specification [DKIM-BASE] and DKIM + Sender Signing Practices [DKIM-SSP]. + + Once the attesting party or parties have been established, the + recipient may evaluate the message in the context of additional + information such as locally-maintained whitelists, shared reputation + services, and/or third-party accreditation. The description of these + mechanisms is outside the scope of the IETF DKIM Working Group + effort. By applying a signature, a good player enables a verifier to + associate a positive reputation with the message, in hopes that it + will receive preferential treatment by the recipient. + + This effort is not intended to address threats associated with + message confidentiality nor does it intend to provide a long-term + archival signature. + +1.1. Terminology and Model + + An administrative unit (AU) is the portion of the path of an email + message that is under common administration. The originator and + recipient typically develop trust relationships with the + administrative units that send and receive their email, respectively, + to perform the signing and verification of their messages. + + The origin address is the address on an email message, typically the + RFC 2822 From: address, which is associated with the alleged author + of the message and is displayed by the recipient's Mail User Agent + (MUA) as the source of the message. + + + + + +Fenton Informational [Page 3] + +RFC 4686 DKIM Threat Analysis September 2006 + + + The following diagram illustrates a typical usage flowchart for DKIM: + + +---------------------------------+ + | SIGNATURE CREATION | + | (Originating or Relaying AU) | + | | + | Sign (Message, Domain, Key) | + | | + +---------------------------------+ + | - Message (Domain, Key) + | + [Internet] + | + V + +---------------------------------+ + +-----------+ | SIGNATURE VERIFICATION | + | | | (Relaying or Delivering AU) | + | KEY | | | + | QUERY +--->| Verify (Message, Domain, Key) | + | | | | + +-----------+ +----------------+----------------+ + | - Verified Domain + +-----------+ V - [Report] + | SENDER | +----------------+----------------+ + | SIGNING | | | + | PRACTICES +--->| SIGNER EVALUATION | + | QUERY | | | + | | +---------------------------------+ + +-----------+ + + DKIM operates entirely on the content (body and selected header + fields) of the message, as defined in RFC 2822 [RFC2822]. The + transmission of messages via SMTP, defined in RFC 2821 [RFC2821], and + such elements as the envelope-from and envelope-to addresses and the + HELO domain are not relevant to DKIM verification. This is an + intentional decision made to allow verification of messages via + protocols other than SMTP, such as POP [RFC1939] and IMAP [RFC3501] + which an MUA acting as a verifier might use. + + The Sender Signing Practices Query referred to in the diagram above + is a means by which the verifier can query the alleged author's + domain to determine their practices for signing messages, which in + turn may influence their evaluation of the message. If, for example, + a message arrives without any valid signatures, and the alleged + author's domain advertises that they sign all messages, the verifier + might handle that message differently than if a signature was not + necessarily to be expected. + + + + +Fenton Informational [Page 4] + +RFC 4686 DKIM Threat Analysis September 2006 + + +1.2. Document Structure + + The remainder of this document describes the problems that DKIM might + be expected to address, and the extent to which it may be successful + in so doing. These are described in terms of the potential bad + actors, their capabilities and location in the network, and the bad + acts that they might wish to commit. + + This is followed by a description of postulated attacks on DKIM + message signing and on the use of Sender Signing Practices to assist + in the treatment of unsigned messages. A list of derived + requirements is also presented, which is intended to guide the DKIM + design and review process. + + The sections dealing with attacks on DKIM each begin with a table + summarizing the postulated attacks in each category along with their + expected impact and likelihood. The following definitions were used + as rough criteria for scoring the attacks: + + Impact: + + High: Affects the verification of messages from an entire domain + or multiple domains + + Medium: Affects the verification of messages from specific users, + Mail Transfer Agents (MTAs), and/or bounded time periods + + Low: Affects the verification of isolated individual messages + only + + Likelihood: + + High: All email users should expect this attack on a frequent + basis + + Medium: Email users should expect this attack occasionally; + frequently for a few users + + Low: Attack is expected to be rare and/or very infrequent + + + + + + + + + + + + +Fenton Informational [Page 5] + +RFC 4686 DKIM Threat Analysis September 2006 + + +2. The Bad Actors + +2.1. Characteristics + + The problem space being addressed by DKIM is characterized by a wide + range of attackers in terms of motivation, sophistication, and + capabilities. + + At the low end of the spectrum are bad actors who may simply send + email, perhaps using one of many commercially available tools, that + the recipient does not want to receive. These tools typically allow + one to falsify the origin address of messages, and may, in the + future, be capable of generating message signatures as well. + + At the next tier are what would be considered "professional" senders + of unwanted email. These attackers would deploy specific + infrastructure, including Mail Transfer Agents (MTAs), registered + domains and networks of compromised computers ("zombies") to send + messages, and in some cases to harvest addresses to which to send. + These senders often operate as commercial enterprises and send + messages on behalf of third parties. + + The most sophisticated and financially-motivated senders of messages + are those who stand to receive substantial financial benefit, such as + from an email-based fraud scheme. These attackers can be expected to + employ all of the above mechanisms and additionally may attack the + Internet infrastructure itself, including DNS cache-poisoning attacks + and IP routing attacks. + +2.2. Capabilities + + In general, the bad actors described above should be expected to have + access to the following: + + 1. An extensive corpus of messages from domains they might wish to + impersonate + + 2. Knowledge of the business aims and model for domains they might + wish to impersonate + + 3. Access to public keys and associated authorization records + associated with the domain + + and the ability to do at least some of the following: + + 1. Submit messages to MTAs and Message Submission Agents (MSAs) at + multiple locations in the Internet + + + + +Fenton Informational [Page 6] + +RFC 4686 DKIM Threat Analysis September 2006 + + + 2. Construct arbitrary message header fields, including those + claiming to be mailing lists, resenders, and other mail agents + + 3. Sign messages on behalf of domains under their control + + 4. Generate substantial numbers of either unsigned or apparently- + signed messages that might be used to attempt a denial-of-service + attack + + 5. Resend messages that may have been previously signed by the + domain + + 6. Transmit messages using any envelope information desired + + 7. Act as an authorized submitter for messages from a compromised + computer + + As noted above, certain classes of bad actors may have substantial + financial motivation for their activities, and therefore should be + expected to have more capabilities at their disposal. These include: + + 1. Manipulation of IP routing. This could be used to submit + messages from specific IP addresses or difficult-to-trace + addresses, or to cause diversion of messages to a specific + domain. + + 2. Limited influence over portions of DNS using mechanisms such as + cache poisoning. This might be used to influence message routing + or to falsify advertisements of DNS-based keys or signing + practices. + + 3. Access to significant computing resources, for example, through + the conscription of worm-infected "zombie" computers. This could + allow the bad actor to perform various types of brute-force + attacks. + + 4. Ability to eavesdrop on existing traffic, perhaps from a wireless + network. + + Either of the first two of these mechanisms could be used to allow + the bad actor to function as a man-in-the-middle between author and + recipient, if that attack is useful. + + + + + + + + + +Fenton Informational [Page 7] + +RFC 4686 DKIM Threat Analysis September 2006 + + +2.3. Location + + Bad actors or their proxies can be located anywhere in the Internet. + Certain attacks are possible primarily within the administrative unit + of the claimed originator and/or recipient domain have capabilities + beyond those elsewhere, as described in the below sections. Bad + actors can also collude by acting from multiple locations (a + "distributed bad actor"). + + It should also be noted that with the use of "zombies" and other + proxies, externally-located bad actors may gain some of the + capabilities of being located within the claimed originator's or + recipient's administrative unit. This emphasizes the importance of + appropriate security measures, such as authenticated submission of + messages, even within administrative units. + +2.3.1. Externally-Located Bad Actors + + DKIM focuses primarily on bad actors located outside of the + administrative units of the claimed originator and the recipient. + These administrative units frequently correspond to the protected + portions of the network adjacent to the originator and recipient. It + is in this area that the trust relationships required for + authenticated message submission do not exist and do not scale + adequately to be practical. Conversely, within these administrative + units, there are other mechanisms such as authenticated message + submission that are easier to deploy and more likely to be used than + DKIM. + + External bad actors are usually attempting to exploit the "any to + any" nature of email that motivates most recipient MTAs to accept + messages from anywhere for delivery to their local domain. They may + generate messages without signatures, with incorrect signatures, or + with correct signatures from domains with little traceability. They + may also pose as mailing lists, greeting cards, or other agents that + legitimately send or resend messages on behalf of others. + +2.3.2. Within Claimed Originator's Administrative Unit + + Bad actors in the form of rogue or unauthorized users or malware- + infected computers can exist within the administrative unit + corresponding to a message's origin address. Since the submission of + messages in this area generally occurs prior to the application of a + message signature, DKIM is not directly effective against these bad + actors. Defense against these bad actors is dependent upon other + means, such as proper use of firewalls, and Message Submission Agents + that are configured to authenticate the author. + + + + +Fenton Informational [Page 8] + +RFC 4686 DKIM Threat Analysis September 2006 + + + In the special case where the administrative unit is non-contiguous + (e.g., a company that communicates between branches over the external + Internet), DKIM signatures can be used to distinguish between + legitimate externally-originated messages and attempts to spoof + addresses in the local domain. + +2.3.3. Within Recipient's Administrative Unit + + Bad actors may also exist within the administrative unit of the + message recipient. These bad actors may attempt to exploit the trust + relationships that exist within the unit. Since messages will + typically only have undergone DKIM verification at the administrative + unit boundary, DKIM is not effective against messages submitted in + this area. + + For example, the bad actor may attempt to spoof a header field + indicating the results of verification. This header field would + normally be added by the verifier, which would also detect spoofed + header fields on messages it was attempting to verify. This could be + used to falsely indicate that the message was authenticated + successfully. + + As in the originator case, these bad actors can be dealt with by + controlling the submission of messages within the administrative + unit. Since DKIM permits verification to occur anywhere within the + recipient's administrative unit, these threats can also be minimized + by moving verification closer to the recipient, such as at the Mail + Delivery Agent (MDA), or on the recipient's MUA itself. + +3. Representative Bad Acts + + One of the most fundamental bad acts being attempted is the delivery + of messages that are not intended to have been sent by the alleged + originating domain. As described above, these messages might merely + be unwanted by the recipient, or might be part of a confidence scheme + or a delivery vector for malware. + +3.1. Use of Arbitrary Identities + + This class of bad acts includes the sending of messages that aim to + obscure the identity of the actual author. In some cases, the actual + sender might be the bad actor, or in other cases might be a third- + party under the control of the bad actor (e.g., a compromised + computer). + + Particularly when coupled with sender signing practices that indicate + the domain owner signs all messages, DKIM can be effective in + mitigating against the abuse of addresses not controlled by bad + + + +Fenton Informational [Page 9] + +RFC 4686 DKIM Threat Analysis September 2006 + + + actors. DKIM is not effective against the use of addresses + controlled by bad actors. In other words, the presence of a valid + DKIM signature does not guarantee that the signer is not a bad actor. + It also does not guarantee the accountability of the signer, since + DKIM does not attempt to identify the signer individually, but rather + identifies the domain that they control. Accreditation and + reputation systems and locally-maintained whitelists and blacklists + can be used to enhance the accountability of DKIM-verified addresses + and/or the likelihood that signed messages are desirable. + +3.2. Use of Specific Identities + + A second major class of bad acts involves the assertion of specific + identities in email. + + Note that some bad acts involving specific identities can sometimes + be accomplished, although perhaps less effectively, with similar + looking identities that mislead some recipients. For example, if the + bad actor is able to control the domain "examp1e.com" (note the "one" + between the p and e), they might be able to convince some recipients + that a message from admin@examp1e.com is really from + admin@example.com. Similar types of attacks using internationalized + domain names have been hypothesized where it could be very difficult + to see character differences in popular typefaces. Similarly, if + example2.com was controlled by a bad actor, the bad actor could sign + messages from bigbank.example2.com, which might also mislead some + recipients. To the extent that these domains are controlled by bad + actors, DKIM is not effective against these attacks, although it + could support the ability of reputation and/or accreditation systems + to aid the user in identifying them. + + DKIM is effective against the use of specific identities only when + there is an expectation that such messages will, in fact, be signed. + The primary means for establishing this is the use of Sender Signing + Practices (SSP), which will be specified by the IETF DKIM Working + Group. + +3.2.1. Exploitation of Social Relationships + + One reason for asserting a specific origin address is to encourage a + recipient to read and act on particular email messages by appearing + to be an acquaintance or previous correspondent that the recipient + might trust. This tactic has been used by email-propagated malware + that mail themselves to addresses in the infected host's address + book. In this case, however, the author's address may not be + falsified, so DKIM would not be effective in defending against this + act. + + + + +Fenton Informational [Page 10] + +RFC 4686 DKIM Threat Analysis September 2006 + + + It is also possible for address books to be harvested and used by an + attacker to post messages from elsewhere. DKIM could be effective in + mitigating these acts by limiting the scope of origin addresses for + which a valid signature can be obtained when sending the messages + from other locations. + +3.2.2. Identity-Related Fraud + + Bad acts related to email-based fraud often, but not always, involve + the transmission of messages using specific origin addresses of other + entities as part of the fraud scheme. The use of a specific address + of origin sometimes contributes to the success of the fraud by + helping convince the recipient that the message was actually sent by + the alleged author. + + To the extent that the success of the fraud depends on or is enhanced + by the use of a specific origin address, the bad actor may have + significant financial motivation and resources to circumvent any + measures taken to protect specific addresses from unauthorized use. + + When signatures are verified by or for the recipient, DKIM is + effective in defending against the fraudulent use of origin addresses + on signed messages. When the published sender signing practices of + the origin address indicate that all messages from that address + should be signed, DKIM further mitigates against the attempted + fraudulent use of the origin address on unsigned messages. + +3.2.3. Reputation Attacks + + Another motivation for using a specific origin address in a message + is to harm the reputation of another, commonly referred to as a + "joe-job". For example, a commercial entity might wish to harm the + reputation of a competitor, perhaps by sending unsolicited bulk email + on behalf of that competitor. It is for this reason that reputation + systems must be based on an identity that is, in practice, fairly + reliable. + +3.2.4. Reflection Attacks + + A commonly-used tactic by some bad actors is the indirect + transmission of messages by intentionally mis-addressing the message + and causing it to be "bounced", or sent to the return address (RFC + 2821 envelope-from address) on the message. In this case, the + specific identity asserted in the email is that of the actual target + of the message, to whom the message is "returned". + + DKIM does not, in general, attempt to validate the RFC2821.mailfrom + return address on messages, either directly (noting that the mailfrom + + + +Fenton Informational [Page 11] + +RFC 4686 DKIM Threat Analysis September 2006 + + + address is an element of the SMTP protocol, and not the message + content on which DKIM operates), or via the optional Return-Path + header field. Furthermore, as is noted in Section 4.4 of RFC 2821 + [RFC2821], it is common and useful practice for a message's return + path not to correspond to the origin address. For these reasons, + DKIM is not effective against reflection attacks. + +4. Attacks on Message Signing + + Bad actors can be expected to exploit all of the limitations of + message authentication systems. They are also likely to be motivated + to degrade the usefulness of message authentication systems in order + to hinder their deployment. Both the signature mechanism itself and + declarations made regarding use of message signatures (referred to + here as Sender Signing Practices or SSP) can be expected to be the + target of attacks. + +4.1. Attacks against Message Signatures + + The following is a summary of postulated attacks against DKIM + signatures: + + +---------------------------------------------+--------+------------+ + | Attack Name | Impact | Likelihood | + +---------------------------------------------+--------+------------+ + | Theft of private key for domain | High | Low | + | Theft of delegated private key | Medium | Medium | + | Private key recovery via side channel attack| High | Low | + | Chosen message replay | Low | M/H | + | Signed message replay | Low | High | + | Denial-of-service attack against verifier | High | Medium | + | Denial-of-service attack against key service| High | Medium | + | Canonicalization abuse | Low | Medium | + | Body length limit abuse | Medium | Medium | + | Use of revoked key | Medium | Low | + | Compromise of key server | High | Low | + | Falsification of key service replies | Medium | Medium | + | Publication of malformed key records and/or | High | Low | + | signatures | | | + | Cryptographic weaknesses in signature | High | Low | + | generation | | | + | Display name abuse | Medium | High | + | Compromised system within originator's | High | Medium | + | network | | | + | Verification probe attack | Medium | Medium | + | Key publication by higher-level domain | High | Low | + +---------------------------------------------+--------+------------+ + + + + +Fenton Informational [Page 12] + +RFC 4686 DKIM Threat Analysis September 2006 + + +4.1.1. Theft of Private Key for Domain + + Message signing technologies such as DKIM are vulnerable to theft of + the private keys used to sign messages. This includes "out-of-band" + means for this theft, such as burglary, bribery, extortion, and the + like, as well as electronic means for such theft, such as a + compromise of network and host security around the place where a + private key is stored. + + Keys that are valid for all addresses in a domain typically reside in + MTAs that should be located in well-protected sites, such as data + centers. Various means should be employed for minimizing access to + private keys, such as non-existence of commands for displaying their + value, although ultimately memory dumps and the like will probably + contain the keys. Due to the unattended nature of MTAs, some + countermeasures, such as the use of a pass phrase to "unlock" a key, + are not practical to use. Other mechanisms, such as the use of + dedicated hardware devices that contain the private key and perform + the cryptographic signature operation, would be very effective in + denying export of the private key to those without physical access to + the device. Such devices would almost certainly make the theft of + the key visible, so that appropriate action (revocation of the + corresponding public key) can be taken should that happen. + +4.1.2. Theft of Delegated Private Key + + There are several circumstances where a domain owner will want to + delegate the ability to sign messages for the domain to an individual + user or a third party associated with an outsourced activity such as + a corporate benefits administrator or a marketing campaign. Since + these keys may exist on less well-protected devices than the domain's + own MTAs, they will in many cases be more susceptible to compromise. + + In order to mitigate this exposure, keys used to sign such messages + can be restricted by the domain owner to be valid for signing + messages only on behalf of specific addresses in the domain. This + maintains protection for the majority of addresses in the domain. + + A related threat is the exploitation of weaknesses in the delegation + process itself. This threat can be mitigated through the use of + customary precautions against the theft of private keys and the + falsification of public keys in transit. For example, the exposure + to theft can be minimized if the delegate generates the keypair to be + used, and sends the public key to the domain owner. The exposure to + falsification (substitution of a different public key) can be reduced + if this transmission is signed by the delegate and verified by the + domain owner. + + + + +Fenton Informational [Page 13] + +RFC 4686 DKIM Threat Analysis September 2006 + + +4.1.3. Private Key Recovery via Side Channel Attack + + All popular digital signature algorithms are subject to a variety of + side channel attacks. The most well-known of these are timing + channels [Kocher96], power analysis [Kocher99], and cache timing + analysis [Bernstein04]. Most of these attacks require either + physical access to the machine or the ability to run processes + directly on the target machine. Defending against these attacks is + out of scope for DKIM. + + However, remote timing analysis (at least on local area networks) is + known to be feasible [Boneh03], particularly in server-type platforms + where the attacker can inject traffic that will immediately be + subject to the cryptographic operation in question. With enough + samples, these techniques can be used to extract private keys even in + the face of modest amounts of noise in the timing measurements. + + The three commonly proposed countermeasures against timing analysis + are: + + 1. Make the operation run in constant time. This turns out in + practice to be rather difficult. + + 2. Make the time independent of the input data. This can be + difficult, but see [Boneh03] for more details. + + 3. Use blinding. This is generally considered the best current + practice countermeasure, and while not proved generally secure is + a countermeasure against known timing attacks. It adds about + 2-10% to the cost of the operation and is implemented in many + common cryptographic libraries. Unfortunately, Digital Signature + Algorithm (DSA) and Elliptic Curve DSA (ECDSA) do not have + standard methods though some defenses may exist. + + Note that adding random delays to the operation is only a partial + countermeasure. Because the noise is generally uniformly + distributed, a large enough number of samples can be used to average + it out and extract an accurate timing signal. + +4.1.4. Chosen Message Replay + + Chosen message replay refers to the scenario where the attacker + creates a message and obtains a signature for it by sending it + through an MTA authorized by the originating domain to + himself/herself or an accomplice. They then "replay" the signed + message by sending it, using different envelope addresses, to a + (typically large) number of other recipients. + + + + +Fenton Informational [Page 14] + +RFC 4686 DKIM Threat Analysis September 2006 + + + Due to the requirement to get an attacker-generated message signed, + chosen message replay would most commonly be experienced by consumer + ISPs or others offering email accounts to clients, particularly where + there is little or no accountability to the account holder (the + attacker in this case). One approach to solving this problem is for + the domain to only sign email for clients that have passed a vetting + process to provide traceability to the message originator in the + event of abuse. At present, the low cost of email accounts (zero) + does not make it practical for any vetting to occur. It remains to + be seen whether this will be the model with signed mail as well, or + whether a higher level of trust will be required to obtain an email + signature. + + A variation on this attack involves the attacker sending a message + with the intent of obtaining a signed reply containing their original + message. The reply might come from an innocent user or might be an + automatic response such as a "user unknown" bounce message. In some + cases, this signed reply message might accomplish the attacker's + objectives if replayed. This variation on chosen message replay can + be mitigated by limiting the extent to which the original content is + quoted in automatic replies, and by the use of complementary + mechanisms such as egress content filtering. + + Revocation of the signature or the associated key is a potential + countermeasure. However, the rapid pace at which the message might + be replayed (especially with an army of "zombie" computers), compared + with the time required to detect the attack and implement the + revocation, is likely to be problematic. A related problem is the + likelihood that domains will use a small number of signing keys for a + large number of customers, which is beneficial from a caching + standpoint but is likely to result in a great deal of collateral + damage (in the form of signature verification failures) should a key + be revoked suddenly. + + Signature revocation addresses the collateral damage problem at the + expense of significant scaling requirements. At the extreme, + verifiers could be required to check for revocation of each signature + verified, which would result in very significant transaction rates. + An alternative, "revocation identifiers", has been proposed, which + would permit revocation on an intermediate level of granularity, + perhaps on a per-account basis. Messages containing these + identifiers would result in a query to a revocation database, which + might be represented in DNS. + + Further study is needed to determine if the benefits from revocation + (given the potential speed of a replay attack) outweigh the + transactional cost of querying a revocation database. + + + + +Fenton Informational [Page 15] + +RFC 4686 DKIM Threat Analysis September 2006 + + +4.1.5. Signed Message Replay + + Signed message replay refers to the retransmission of already-signed + messages to additional recipients beyond those intended by the author + or the original poster of the message. The attacker arranges to + receive a message from the victim, and then retransmits it intact but + with different envelope addresses. This might be done, for example, + to make it look like a legitimate sender of messages is sending a + large amount of spam. When reputation services are deployed, this + could damage the author's reputation or that of the author's domain. + + A larger number of domains are potential victims of signed message + replay than chosen message replay because the former does not require + the ability for the attacker to send messages from the victim domain. + However, the capabilities of the attacker are lower. Unless coupled + with another attack such as body length limit abuse, it isn't + possible for the attacker to use this, for example, for advertising. + + Many mailing lists, especially those that do not modify the content + of the message and signed header fields and hence do not invalidate + the signature, engage in a form of signed message replay. The use of + body length limits and other mechanisms to enhance the survivability + of messages effectively enhances the ability to do so. The only + things that distinguish this case from undesirable forms of signed + message replay is the intent of the replayer, which cannot be + determined by the network. + +4.1.6. Denial-of-Service Attack against Verifier + + While it takes some computing resources to sign and verify a + signature, it takes negligible computing resources to generate an + invalid signature. An attacker could therefore construct a "make + work" attack against a verifier, by sending a large number of + incorrectly-signed messages to a given verifier, perhaps with + multiple signatures each. The motivation might be to make it too + expensive to verify messages. + + While this attack is feasible, it can be greatly mitigated by the + manner in which the verifier operates. For example, it might decide + to accept only a certain number of signatures per message, limit the + maximum key size it will accept (to prevent outrageously large + signatures from causing unneeded work), and verify signatures in a + particular order. The verifier could also maintain state + representing the current signature verification failure rate and + adopt a defensive posture when attacks may be under way. + + + + + + +Fenton Informational [Page 16] + +RFC 4686 DKIM Threat Analysis September 2006 + + +4.1.7. Denial-of-Service Attack against Key Service + + An attacker might also attempt to degrade the availability of an + originator's key service, in order to cause that originator's + messages to be unverifiable. One way to do this might be to quickly + send a large number of messages with signatures that reference a + particular key, thereby creating a heavy load on the key server. + Other types of DoS attacks on the key server or the network + infrastructure serving it are also possible. + + The best defense against this attack is to provide redundant key + servers, preferably on geographically-separate parts of the Internet. + Caching also helps a great deal, by decreasing the load on + authoritative key servers when there are many simultaneous key + requests. The use of a key service protocol that minimizes the + transactional cost of key lookups is also beneficial. It is noted + that the Domain Name System has all these characteristics. + +4.1.8. Canonicalization Abuse + + Canonicalization algorithms represent a tradeoff between the survival + of the validity of a message signature and the desire not to allow + the message to be altered inappropriately. In the past, + canonicalization algorithms have been proposed that would have + permitted attackers, in some cases, to alter the meaning of a + message. + + Message signatures that support multiple canonicalization algorithms + give the signer the ability to decide the relative importance of + signature survivability and immutability of the signed content. If + an unexpected vulnerability appears in a canonicalization algorithm + in general use, new algorithms can be deployed, although it will be a + slow process because the signer can never be sure which algorithm(s) + the verifier supports. For this reason, canonicalization algorithms, + like cryptographic algorithms, should undergo a wide and careful + review process. + +4.1.9. Body Length Limit Abuse + + A body length limit is an optional indication from the signer of how + much content has been signed. The verifier can either ignore the + limit, verify the specified portion of the message, or truncate the + message to the specified portion and verify it. The motivation for + this feature is the behavior of many mailing lists that add a + trailer, perhaps identifying the list, at the end of messages. + + + + + + +Fenton Informational [Page 17] + +RFC 4686 DKIM Threat Analysis September 2006 + + + When body length limits are used, there is the potential for an + attacker to add content to the message. It has been shown that this + content, although at the end, can cover desirable content, especially + in the case of HTML messages. + + If the body length isn't specified, or if the verifier decides to + ignore the limit, body length limits are moot. If the verifier or + recipient truncates the message at the signed content, there is no + opportunity for the attacker to add anything. + + If the verifier observes body length limits when present, there is + the potential that an attacker can make undesired content visible to + the recipient. The size of the appended content makes little + difference, because it can simply be a URL reference pointing to the + actual content. Receiving MUAs can mitigate this threat by, at a + minimum, identifying the unsigned content in the message. + +4.1.10. Use of Revoked Key + + The benefits obtained by caching of key records opens the possibility + that keys that have been revoked may be used for some period of time + after their revocation. The best examples of this occur when a + holder of a key delegated by the domain administrator must be + unexpectedly deauthorized from sending mail on behalf of one or more + addresses in the domain. + + The caching of key records is normally short-lived, on the order of + hours to days. In many cases, this threat can be mitigated simply by + setting a short time-to-live (TTL) for keys not under the domain + administrator's direct control (assuming, of course, that control of + the TTL value may be specified for each record, as it can with DNS). + In some cases, such as the recovery following a stolen private key + belonging to one of the domain's MTAs, the possibility of theft and + the effort required to revoke the key authorization must be + considered when choosing a TTL. The chosen TTL must be long enough + to mitigate denial-of-service attacks and provide reasonable + transaction efficiency, and no longer. + +4.1.11. Compromise of Key Server + + Rather than by attempting to obtain a private key, an attacker might + instead focus efforts on the server used to publish public keys for a + domain. As in the key theft case, the motive might be to allow the + attacker to sign messages on behalf of the domain. This attack + provides the attacker with the additional capability to remove + legitimate keys from publication, thereby denying the domain the + ability for the signatures on its mail to verify correctly. + + + + +Fenton Informational [Page 18] + +RFC 4686 DKIM Threat Analysis September 2006 + + + In order to limit the ability to sign a message to entities + authorized by the owner of a signing domain, a relationship must be + established between the signing address and the location from which a + public key is obtained to verify the message. DKIM does this by + publishing either the public key or a reference to it within the DNS + hierarchy of the signing domain. The verifier derives the location + from which to retrieve the public key from the signing address or + domain. The security of the verification process is therefore + dependent on the security of the DNS hierarchy for the signing + domain. + + An attacker might successfully compromise the host that is the + primary key server for the signing domain, such as the domain's DNS + master server. Another approach might be to compromise a higher- + level DNS server and change the delegation of name servers for the + signing domain to others under the control of the attacker. + + This attack can be mitigated somewhat by independent monitoring to + audit the key service. Such auditing of the key service should occur + by means of zone transfers rather than queries to the zone's primary + server, so that the addition of records to the zone can be detected. + +4.1.12. Falsification of Key Service Replies + + Replies from the key service may also be spoofed by a suitably + positioned attacker. For DNS, one such way to do this is "cache + poisoning", in which the attacker provides unnecessary (and + incorrect) additional information in DNS replies, which is cached. + + DNSSEC [RFC4033] is the preferred means of mitigating this threat, + but the current uptake rate for DNSSEC is slow enough that one would + not like to create a dependency on its deployment. In the case of a + cache poisoning attack, the vulnerabilities created by this attack + are both localized and of limited duration, although records with + relatively long TTL may persist beyond the attack itself. + +4.1.13. Publication of Malformed Key Records and/or Signatures + + In this attack, the attacker publishes suitably crafted key records + or sends mail with intentionally malformed signatures, in an attempt + to confuse the verifier and perhaps disable verification altogether. + This attack is really a characteristic of an implementation + vulnerability, a buffer overflow or lack of bounds checking, for + example, rather than a vulnerability of the signature mechanism + itself. This threat is best mitigated by careful implementation and + creation of test suites that challenge the verification process. + + + + + +Fenton Informational [Page 19] + +RFC 4686 DKIM Threat Analysis September 2006 + + +4.1.14. Cryptographic Weaknesses in Signature Generation + + The cryptographic algorithms used to generate mail signatures, + specifically the hash algorithm and digital signature generation and + verification operations, may over time be subject to mathematical + techniques that degrade their security. At this writing, the SHA-1 + hash algorithm is the subject of extensive mathematical analysis that + has considerably lowered the time required to create two messages + with the same hash value. This trend can be expected to continue. + + One consequence of a weakness in the hash algorithm is a hash + collision attack. Hash collision attacks in message signing systems + involve the same person creating two different messages that have the + same hash value, where only one of the two messages would normally be + signed. The attack is based on the second message inheriting the + signature of the first. For DKIM, this means that a sender might + create a "good" message and a "bad" message, where some filter at the + signing party's site would sign the good message but not the bad + message. The attacker gets the good message signed, and then + incorporates that signature in the bad message. This scenario is not + common, but could happen, for example, at a site that does content + analysis on messages before signing them. + + Current known attacks against SHA-1 make this attack extremely + difficult to mount, but as attacks improve and computing power + becomes more readily available, such an attack could become + achievable. + + The message signature system must be designed to support multiple + signature and hash algorithms, and the signing domain must be able to + specify which algorithms it uses to sign messages. The choice of + algorithms must be published in key records, and not only in the + signature itself, to ensure that an attacker is not able to create + signatures using algorithms weaker than the domain wishes to permit. + + Because the signer and verifier of email do not, in general, + communicate directly, negotiation of the algorithms used for signing + cannot occur. In other words, a signer has no way of knowing which + algorithm(s) a verifier supports or (due to mail forwarding) where + the verifier is. For this reason, it is expected that once message + signing is widely deployed, algorithm change will occur slowly, and + legacy algorithms will need to be supported for a considerable + period. Algorithms used for message signatures therefore need to be + secure against expected cryptographic developments several years into + the future. + + + + + + +Fenton Informational [Page 20] + +RFC 4686 DKIM Threat Analysis September 2006 + + +4.1.15. Display Name Abuse + + Message signatures only relate to the address-specification portion + of an email address, while some MUAs only display (or some recipients + only pay attention to) the display name portion of the address. This + inconsistency leads to an attack where the attacker uses a From + header field such as: + + From: "Dudley DoRight" <whiplash@example.org> + + In this example, the attacker, whiplash@example.org, can sign the + message and still convince some recipients that the message is from + Dudley DoRight, who is presumably a trusted individual. Coupled with + the use of a throw-away domain or email address, it may be difficult + to hold the attacker accountable for using another's display name. + + This is an attack that must be dealt with in the recipient's MUA. + One approach is to require that the signer's address specification + (and not just the display name) be visible to the recipient. + +4.1.16. Compromised System within Originator's Network + + In many cases, MTAs may be configured to accept and sign messages + that originate within the topological boundaries of the originator's + network (i.e., within a firewall). The increasing use of compromised + systems to send email presents a problem for such policies, because + the attacker, using a compromised system as a proxy, can generate + signed mail at will. + + Several approaches exist for mitigating this attack. The use of + authenticated submission, even within the network boundaries, can be + used to limit the addresses for which the attacker may obtain a + signature. It may also help locate the compromised system that is + the source of the messages more quickly. Content analysis of + outbound mail to identify undesirable and malicious content, as well + as monitoring of the volume of messages being sent by users, may also + prevent arbitrary messages from being signed and sent. + +4.1.17. Verification Probe Attack + + As noted above, bad actors (attackers) can sign messages on behalf of + domains they control. Since they may also control the key service + (e.g., the authoritative DNS name servers for the _domainkey + subdomain), it is possible for them to observe public key lookups, + and their source, when messages are verified. + + + + + + +Fenton Informational [Page 21] + +RFC 4686 DKIM Threat Analysis September 2006 + + + One such attack, which we will refer to as a "verification probe", is + to send a message with a DKIM signature to each of many addresses in + a mailing list. The messages need not contain valid signatures, and + each instance of the message would typically use a different + selector. The attacker could then monitor key service requests and + determine which selectors had been accessed, and correspondingly + which addressees used DKIM verification. This could be used to + target future mailings at recipients who do not use DKIM + verification, on the premise that these addressees are more likely to + act on the message contents. + +4.1.18. Key Publication by Higher-Level Domain + + In order to support the ability of a domain to sign for subdomains + under its administrative control, DKIM permits the domain of a + signature (d= tag) to be any higher-level domain than the signature's + address (i= or equivalent). However, since there is no mechanism for + determining common administrative control of a subdomain, it is + possible for a parent to publish keys that are valid for any domain + below them in the DNS hierarchy. In other words, mail from the + domain example.anytown.ny.us could be signed using keys published by + anytown.ny.us, ny.us, or us, in addition to the domain itself. + + Operation of a domain always requires a trust relationship with + higher-level domains. Higher-level domains already have ultimate + power over their subdomains: they could change the name server + delegation for the domain or disenfranchise it entirely. So it is + unlikely that a higher-level domain would intentionally compromise a + subdomain in this manner. However, if higher-level domains send mail + on their own behalf, they may wish to publish keys at their own + level. Higher-level domains must employ special care in the + delegation of keys they publish to ensure that any of their + subdomains are not compromised by misuse of such keys. + + + + + + + + + + + + + + + + + + +Fenton Informational [Page 22] + +RFC 4686 DKIM Threat Analysis September 2006 + + +4.2. Attacks against Message Signing Practices + + The following is a summary of postulated attacks against signing + practices: + + +---------------------------------------------+--------+------------+ + | Attack Name | Impact | Likelihood | + +---------------------------------------------+--------+------------+ + | Look-alike domain names | High | High | + | Internationalized domain name abuse | High | High | + | Denial-of-service attack against signing | Medium | Medium | + | practices | | | + | Use of multiple From addresses | Low | Medium | + | Abuse of third-party signatures | Medium | High | + | Falsification of Sender Signing Practices | Medium | Medium | + | replies | | | + +---------------------------------------------+--------+------------+ + +4.2.1. Look-Alike Domain Names + + Attackers may attempt to circumvent signing practices of a domain by + using a domain name that is close to, but not the same as, the domain + with signing practices. For instance, "example.com" might be + replaced by "examp1e.com". If the message is not to be signed, DKIM + does not require that the domain used actually exist (although other + mechanisms may make this a requirement). Services exist to monitor + domain registrations to identify potential domain name abuse, but + naturally do not identify the use of unregistered domain names. + + A related attack is possible when the MUA does not render the domain + name in an easily recognizable format. If, for example, a Chinese + domain name is rendered in "punycode" as xn--cjsp26b3obxw7f.com, the + unfamiliarity of that representation may enable other domains to more + easily be mis-recognized as the expected domain. + + Users that are unfamiliar with internet naming conventions may also + mis-recognize certain names. For example, users may confuse + online.example.com with online-example.com, the latter of which may + have been registered by an attacker. + +4.2.2. Internationalized Domain Name Abuse + + Internationalized domain names present a special case of the look- + alike domain name attack described above. Due to similarities in the + appearance of many Unicode characters, domains (particularly those + drawing characters from different groups) may be created that are + visually indistinguishable from other, possibly high-value domains. + This is discussed in detail in Unicode Technical Report 36 [UTR36]. + + + +Fenton Informational [Page 23] + +RFC 4686 DKIM Threat Analysis September 2006 + + + Surveillance of domain registration records may point out some of + these, but there are many such similarities. As in the look-alike + domain attack above, this technique may also be used to circumvent + sender signing practices of other domains. + +4.2.3. Denial-of-Service Attack against Signing Practices + + Just as the publication of public keys by a domain can be impacted by + an attacker, so can the publication of Sender Signing Practices (SSP) + by a domain. In the case of SSP, the transmission of large amounts + of unsigned mail purporting to come from the domain can result in a + heavy transaction load requesting the SSP record. More general DoS + attacks against the servers providing the SSP records are possible as + well. This is of particular concern since the default signing + practices are "we don't sign everything", which means that SSP + failures result in the verifier's failure to heed more stringent + signing practices. + + As with defense against DoS attacks for key servers, the best defense + against this attack is to provide redundant servers, preferably on + geographically-separate parts of the Internet. Caching again helps a + great deal, and signing practices should rarely change, so TTL values + can be relatively large. + +4.2.4. Use of Multiple From Addresses + + Although this usage is never seen by most recipients, RFC 2822 + [RFC2822] permits the From address to contain multiple address + specifications. The lookup of Sender Signing Practices is based on + the From address, so if addresses from multiple domains are in the + From address, the question arises which signing practices to use. A + rule (say, "use the first address") could be specified, but then an + attacker could put a throwaway address prior to that of a high-value + domain. It is also possible for SSP to look at all addresses, and + choose the most restrictive rule. This is an area in need of further + study. + +4.2.5. Abuse of Third-Party Signatures + + In a number of situations, including mailing lists, event + invitations, and "send this article to a friend" services, the DKIM + signature on a message may not come from the originating address + domain. For this reason, "third-party" signatures, those attached by + the mailing list, invitation service, or news service, frequently + need to be regarded as having some validity. Since this effectively + makes it possible for any domain to sign any message, a sending + + + + + +Fenton Informational [Page 24] + +RFC 4686 DKIM Threat Analysis September 2006 + + + domain may publish sender signing practices stating that it does not + use such services, and accordingly that verifiers should view such + signatures with suspicion. + + However, the restrictions placed on a domain by publishing "no + third-party" signing practices effectively disallows many existing + uses of email. For the majority of domains that are unable to adopt + these practices, an attacker may with some degree of success sign + messages purporting to come from the domain. For this reason, + accreditation and reputation services, as well as locally-maintained + whitelists and blacklists, will need to play a significant role in + evaluating messages that have been signed by third parties. + +4.2.6. Falsification of Sender Signing Practices Replies + + In an analogous manner to the falsification of key service replies + described in Section 4.1.12, replies to sender signing practices + queries can also be falsified. One such attack would be to weaken + the signing practices to make unsigned messages allegedly from a + given domain appear less suspicious. Another attack on a victim + domain that is not signing messages could attempt to make the + domain's messages look more suspicious, in order to interfere with + the victim's ability to send mail. + + As with the falsification of key service replies, DNSSEC is the + preferred means of mitigating this attack. Even in the absence of + DNSSEC, vulnerabilities due to cache poisoning are localized. + +4.3. Other Attacks + + This section describes attacks against other Internet infrastructure + that are enabled by deployment of DKIM. A summary of these + postulated attacks is as follows: + + +--------------------------------------+--------+------------+ + | Attack Name | Impact | Likelihood | + +--------------------------------------+--------+------------+ + | Packet amplification attacks via DNS | N/A | Medium | + +--------------------------------------+--------+------------+ + +4.3.1. Packet Amplification Attacks via DNS + + Recently, there has been an increase in denial-of-service attacks + involving the transmission of spoofed UDP DNS requests to openly- + accessible domain name servers [US-CERT-DNS]. To the extent that the + response from the name server is larger than the request, the name + server functions as an amplifier for such an attack. + + + + +Fenton Informational [Page 25] + +RFC 4686 DKIM Threat Analysis September 2006 + + + DKIM contributes indirectly to this attack by requiring the + publication of fairly large DNS records for distributing public keys. + The names of these records are also well known, since the record + names can be determined by examining properly-signed messages. This + attack does not have an impact on DKIM itself. DKIM, however, is not + the only application that uses large DNS records, and a DNS-based + solution to this problem will likely be required. + +5. Derived Requirements + + This section lists requirements for DKIM not explicitly stated in the + above discussion. These requirements include: + + The store for key and SSP records must be capable of utilizing + multiple geographically-dispersed servers. + + Key and SSP records must be cacheable, either by the verifier + requesting them or by other infrastructure. + + The cache time-to-live for key records must be specifiable on a + per-record basis. + + The signature algorithm identifier in the message must be one of + the ones listed in a key record for the identified domain. + + The algorithm(s) used for message signatures need to be secure + against expected cryptographic developments several years in the + future. + +6. Security Considerations + + This document describes the security threat environment in which + DomainKeys Identified Mail (DKIM) is expected to provide some + benefit, and it presents a number of attacks relevant to its + deployment. + + + + + + + + + + + + + + + + +Fenton Informational [Page 26] + +RFC 4686 DKIM Threat Analysis September 2006 + + +7. Informative References + + [Bernstein04] Bernstein, D., "Cache Timing Attacks on AES", + April 2004. + + [Boneh03] Boneh, D. and D. Brumley, "Remote Timing Attacks are + Practical", Proc. 12th USENIX Security Symposium, + 2003. + + [DKIM-BASE] Allman, E., "DomainKeys Identified Mail (DKIM) + Signatures", Work in Progress, August 2006. + + [DKIM-SSP] Allman, E., "DKIM Sender Signing Practices", Work in + Progress, August 2006. + + [Kocher96] Kocher, P., "Timing Attacks on Implementations of + Diffie-Hellman, RSA, and other Cryptosystems", + Advances in Cryptology, pages 104-113, 1996. + + [Kocher99] Kocher, P., Joffe, J., and B. Yun, "Differential Power + Analysis: Leaking Secrets", Crypto '99, pages 388-397, + 1999. + + [RFC1939] Myers, J. and M. Rose, "Post Office Protocol - Version + 3", STD 53, RFC 1939, May 1996. + + [RFC2821] Klensin, J., "Simple Mail Transfer Protocol", + RFC 2821, April 2001. + + [RFC2822] Resnick, P., "Internet Message Format", RFC 2822, + April 2001. + + [RFC3501] Crispin, M., "INTERNET MESSAGE ACCESS PROTOCOL - + VERSION 4rev1", RFC 3501, March 2003. + + [RFC4033] Arends, R., Austein, R., Larson, M., Massey, D., and + S. Rose, "DNS Security Introduction and Requirements", + RFC 4033, March 2005. + + [US-CERT-DNS] US-CERT, "The Continuing Denial of Service Threat + Posed by DNS Recursion". + + [UTR36] Davis, M. and M. Suignard, "Unicode Technical Report + #36: Unicode Security Considerations", UTR 36, + July 2005. + + + + + + +Fenton Informational [Page 27] + +RFC 4686 DKIM Threat Analysis September 2006 + + +Appendix A. Acknowledgements + + The author wishes to thank Phillip Hallam-Baker, Eliot Lear, Tony + Finch, Dave Crocker, Barry Leiba, Arvel Hathcock, Eric Allman, Jon + Callas, Stephen Farrell, Doug Otis, Frank Ellermann, Eric Rescorla, + Paul Hoffman, Hector Santos, and numerous others on the ietf-dkim + mailing list for valuable suggestions and constructive criticism of + earlier versions of this document. + +Author's Address + + Jim Fenton + Cisco Systems, Inc. + MS SJ-9/2 + 170 W. Tasman Drive + San Jose, CA 95134-1706 + USA + + Phone: +1 408 526 5914 + EMail: fenton@cisco.com + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Fenton Informational [Page 28] + +RFC 4686 DKIM Threat Analysis September 2006 + + +Full Copyright Statement + + Copyright (C) The Internet Society (2006). + + This document is subject to the rights, licenses and restrictions + contained in BCP 78, and except as set forth therein, the authors + retain all their rights. + + This document and the information contained herein are provided on an + "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS + OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET + ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, + INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE + INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED + WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. + +Intellectual Property + + The IETF takes no position regarding the validity or scope of any + Intellectual Property Rights or other rights that might be claimed to + pertain to the implementation or use of the technology described in + this document or the extent to which any license under such rights + might or might not be available; nor does it represent that it has + made any independent effort to identify any such rights. Information + on the procedures with respect to rights in RFC documents can be + found in BCP 78 and BCP 79. + + Copies of IPR disclosures made to the IETF Secretariat and any + assurances of licenses to be made available, or the result of an + attempt made to obtain a general license or permission for the use of + such proprietary rights by implementers or users of this + specification can be obtained from the IETF on-line IPR repository at + http://www.ietf.org/ipr. + + The IETF invites any interested party to bring to its attention any + copyrights, patents or patent applications, or other proprietary + rights that may cover technology that may be required to implement + this standard. Please address the information to the IETF at + ietf-ipr@ietf.org. + +Acknowledgement + + Funding for the RFC Editor function is provided by the IETF + Administrative Support Activity (IASA). + + + + + + + +Fenton Informational [Page 29] + |