summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc9091.txt
diff options
context:
space:
mode:
Diffstat (limited to 'doc/rfc/rfc9091.txt')
-rw-r--r--doc/rfc/rfc9091.txt684
1 files changed, 684 insertions, 0 deletions
diff --git a/doc/rfc/rfc9091.txt b/doc/rfc/rfc9091.txt
new file mode 100644
index 0000000..dfc5477
--- /dev/null
+++ b/doc/rfc/rfc9091.txt
@@ -0,0 +1,684 @@
+
+
+
+
+Internet Engineering Task Force (IETF) S. Kitterman
+Request for Comments: 9091 fTLD Registry Services
+Category: Experimental T. Wicinski, Ed.
+ISSN: 2070-1721 July 2021
+
+
+ Experimental Domain-Based Message Authentication, Reporting, and
+ Conformance (DMARC) Extension for Public Suffix Domains
+
+Abstract
+
+ Domain-based Message Authentication, Reporting, and Conformance
+ (DMARC), defined in RFC 7489, permits a domain-controlling
+ organization to express domain-level policies and preferences for
+ message validation, disposition, and reporting, which a mail-
+ receiving organization can use to improve mail handling.
+
+ DMARC distinguishes the portion of a name that is a Public Suffix
+ Domain (PSD), below which Organizational Domain names are created.
+ The basic DMARC capability allows Organizational Domains to specify
+ policies that apply to their subdomains, but it does not give that
+ capability to PSDs. This document describes an extension to DMARC to
+ fully enable DMARC functionality for PSDs.
+
+ Some implementations of DMARC consider a PSD to be ineligible for
+ DMARC enforcement. This specification addresses that case.
+
+Status of This Memo
+
+ This document is not an Internet Standards Track specification; it is
+ published for examination, experimental implementation, and
+ evaluation.
+
+ This document defines an Experimental Protocol for the Internet
+ community. This document is a product of the Internet Engineering
+ Task Force (IETF). It represents the consensus of the IETF
+ community. It has received public review and has been approved for
+ publication by the Internet Engineering Steering Group (IESG). Not
+ all documents approved by the IESG are candidates for any level of
+ Internet Standard; see Section 2 of RFC 7841.
+
+ Information about the current status of this document, any errata,
+ and how to provide feedback on it may be obtained at
+ https://www.rfc-editor.org/info/rfc9091.
+
+Copyright Notice
+
+ Copyright (c) 2021 IETF Trust and the persons identified as the
+ document authors. All rights reserved.
+
+ This document is subject to BCP 78 and the IETF Trust's Legal
+ Provisions Relating to IETF Documents
+ (https://trustee.ietf.org/license-info) in effect on the date of
+ publication of this document. Please review these documents
+ carefully, as they describe your rights and restrictions with respect
+ to this document. Code Components extracted from this document must
+ include Simplified BSD License text as described in Section 4.e of
+ the Trust Legal Provisions and are provided without warranty as
+ described in the Simplified BSD License.
+
+Table of Contents
+
+ 1. Introduction
+ 1.1. Example
+ 1.2. Discussion
+ 2. Terminology and Definitions
+ 2.1. Conventions Used in This Document
+ 2.2. Public Suffix Domain (PSD)
+ 2.3. Organizational Domain
+ 2.4. Longest PSD
+ 2.5. Public Suffix Operator (PSO)
+ 2.6. PSO-Controlled Domain Names
+ 2.7. Non-existent Domains
+ 3. PSD DMARC Updates to DMARC Requirements
+ 3.1. General Updates
+ 3.2. Changes in Section 6.3 ("General Record Format")
+ 3.3. Changes in Section 6.4 ("Formal Definition")
+ 3.4. Changes in Section 6.5 ("Domain Owner Actions")
+ 3.5. Changes in Section 6.6.1 ("Extract Author Domain")
+ 3.6. Changes in Section 6.6.3 ("Policy Discovery")
+ 3.7. Changes in Section 7 ("DMARC Feedback")
+ 4. Privacy Considerations
+ 5. Security Considerations
+ 6. IANA Considerations
+ 7. References
+ 7.1. Normative References
+ 7.2. Informative References
+ Appendix A. PSD DMARC Privacy Concern Mitigation Experiment
+ Appendix B. DMARC PSD Registry Examples
+ B.1. DMARC PSD DNS Query Service
+ B.2. DMARC PSD Registry
+ B.3. DMARC PSD PSL Extension
+ Appendix C. Implementations
+ C.1. Authheaders Module
+ C.2. Zdkimfilter Module
+ Acknowledgements
+ Authors' Addresses
+
+1. Introduction
+
+ DMARC [RFC7489] provides a mechanism for publishing organizational
+ policy information to email receivers. DMARC allows policy to be
+ specified for both individual domains and for Organizational Domains
+ and their subdomains within a single organization.
+
+ To determine the Organizational Domain for a message under
+ evaluation, and thus where to look for a policy statement, DMARC
+ makes use of a public suffix list. The process for doing this can be
+ found in Section 3.2 of the DMARC specification [RFC7489].
+ Currently, the most common public suffix list being used is the one
+ maintained by the Mozilla Foundation and made public at
+ <https://publicsuffix.org>.
+
+ In the basic DMARC model, Public Suffix Domains (PSDs) are not
+ Organizational Domains and are thus not subject to DMARC processing.
+ In DMARC, domains fall into one of three categories: Organizational
+ Domains, subdomains of Organizational Domains, or PSDs. A PSD can
+ only publish DMARC policy for itself and not for any subdomains under
+ it. In some cases, this limitation allows for the abuse of non-
+ existent organizational-level domains and hampers identification of
+ domain abuse in email.
+
+ This document specifies experimental updates to the DMARC
+ specification [RFC7489] in an attempt to mitigate this abuse.
+
+1.1. Example
+
+ As an example, imagine a Top-Level Domain (TLD), ".example", that has
+ public subdomains for government and commercial use (".gov.example"
+ and ".com.example"). The maintainer of a list of such a PSD
+ structure would include entries for both of these subdomains, thereby
+ indicating that they are PSDs, below which Organizational Domains can
+ be registered. Suppose further that there exists a legitimate domain
+ called "tax.gov.example", registered within ".gov.example".
+
+ By exploiting the typically unauthenticated nature of email, there
+ are regular malicious campaigns to impersonate this organization that
+ use similar-looking ("cousin") domains such as "t4x.gov.example".
+ Such domains are not registered.
+
+ Within the ".gov.example" public suffix, use of DMARC has been
+ mandated, so "gov.example" publishes the following DMARC DNS record:
+
+ _dmarc.gov.example. IN TXT ( "v=DMARC1; p=reject;"
+ "rua=mailto:dmc@dmarc.svc.gov.example" )
+
+ This DMARC record provides policy and a reporting destination for
+ mail sent from @gov.example. Similarly, "tax.gov.example" will have
+ a DMARC record that specifies policy for mail sent from addresses
+ @tax.gov.example. However, due to DMARC's current method of
+ discovering and applying policy at the Organizational Domain level,
+ the non-existent Organizational Domain of @t4x.gov.example does not
+ and cannot fall under a DMARC policy.
+
+ Defensively registering all variants of "tax" is not a scalable
+ strategy. The intent of this specification, therefore, is to enhance
+ the DMARC discovery method by enabling an agent receiving such a
+ message to be able to determine that a relevant policy is present at
+ "gov.example", which is precluded by the current DMARC specification.
+
+1.2. Discussion
+
+ This document provides a simple extension to [RFC7489] to allow
+ operators of Public Suffix Domains (PSDs) to:
+
+ * Express policy at the level of the PSD that covers all
+ Organizational Domains that do not explicitly publish DMARC
+ records
+
+ * Extend the DMARC policy query functionality to detect and process
+ such a policy
+
+ * Describe receiver feedback for such policies
+
+ * Provide controls to mitigate potential privacy considerations
+ associated with this extension
+
+ This document also provides a new DMARC tag to indicate requested
+ handling policy for non-existent subdomains. This is provided
+ specifically to support phased deployment of PSD DMARC but is
+ expected to be useful more generally. Undesired rejection risks for
+ mail purporting to be from domains that do not exist are
+ substantially lower than for those that do, so the operational risk
+ of requesting harsh policy treatment (e.g., reject) is lower.
+
+ As an additional benefit, the PSD DMARC extension clarifies existing
+ requirements. Based on the requirements of [RFC7489], DMARC should
+ function above the organizational level for exact domain matches
+ (i.e., if a DMARC record were published for "example", then mail from
+ example@example should be subject to DMARC processing). Testing has
+ revealed that this is not consistently applied in different
+ implementations.
+
+ There are two types of Public Suffix Operators (PSOs) for which this
+ extension would be useful and appropriate:
+
+ Branded PSDs (e.g., ".google"):
+ These domains are effectively Organizational Domains as discussed
+ in [RFC7489]. They control all subdomains of the tree. These are
+ effectively private domains but listed in the current public
+ suffix list. They are treated as public for DMARC purposes. They
+ require the same protections as DMARC Organizational Domains but
+ are currently unable to benefit from DMARC.
+
+ Multi-organization PSDs that require DMARC usage (e.g., ".bank"):
+ Because existing Organizational Domains using this PSD have their
+ own DMARC policy, the applicability of this extension is for non-
+ existent domains. The extension allows the brand protection
+ benefits of DMARC to extend to the entire PSD, including cousin
+ domains of registered organizations.
+
+ Due to the design of DMARC and the nature of the Internet email
+ architecture [RFC5598], there are interoperability issues associated
+ with DMARC deployment. These are discussed in "Interoperability
+ Issues between Domain-based Message Authentication, Reporting, and
+ Conformance (DMARC) and Indirect Email Flows" [RFC7960]. These
+ issues are not typically applicable to PSDs since they (e.g., the
+ ".gov.example" used above) do not typically send mail.
+
+2. Terminology and Definitions
+
+ This section defines terms used in the rest of the document.
+
+2.1. Conventions Used in This Document
+
+ The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
+ "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
+ "OPTIONAL" in this document are to be interpreted as described in
+ BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all
+ capitals, as shown here.
+
+2.2. Public Suffix Domain (PSD)
+
+ The global Internet Domain Name System (DNS) is documented in
+ numerous RFCs. It defines a tree of names starting with root, ".",
+ immediately below which are Top-Level Domain names such as ".com" and
+ ".us". The domain name structure consists of a tree of names, each
+ of which is made of a sequence of words ("labels") separated by
+ period characters. The root of the tree is simply called ".". The
+ Internet community at large, through processes and policies external
+ to this work, selects points in this tree at which to register domain
+ names "owned" by independent organizations. Real-world examples are
+ ".com", ".org", ".us", and ".gov.uk". Names at which such
+ registrations occur are called "Public Suffix Domains (PSDs)", and a
+ registration consists of a label selected by the registrant to which
+ a desirable PSD is appended. For example, "ietf.org" is a registered
+ domain name, and ".org" is its PSD.
+
+2.3. Organizational Domain
+
+ The term "Organizational Domain" is defined in Section 3.2 of
+ [RFC7489].
+
+2.4. Longest PSD
+
+ The longest PSD is the Organizational Domain with one label removed.
+ It names the immediate parent node of the Organizational Domain in
+ the DNS namespace tree.
+
+2.5. Public Suffix Operator (PSO)
+
+ A Public Suffix Operator is an organization that manages operations
+ within a PSD, particularly the DNS records published for names at and
+ under that domain name.
+
+2.6. PSO-Controlled Domain Names
+
+ PSO-Controlled Domain Names are names in the DNS that are managed by
+ a PSO and are not available for use as Organizational Domains. PSO-
+ Controlled Domain Names may have one (e.g., ".com") or more (e.g.,
+ ".co.uk") name components, depending on PSD policy.
+
+2.7. Non-existent Domains
+
+ For DMARC purposes, a non-existent domain is a domain for which there
+ is an NXDOMAIN or NODATA response for A, AAAA, and MX records. This
+ is a broader definition than that in [RFC8020].
+
+3. PSD DMARC Updates to DMARC Requirements
+
+ To participate in this experiment, implementations should interpret
+ [RFC7489] as described in the following subsections.
+
+3.1. General Updates
+
+ References to "Domain Owners" also apply to PSOs.
+
+3.2. Changes in Section 6.3 ("General Record Format")
+
+ The following paragraph is added to this section. A new tag is added
+ after "fo":
+
+ | np: Requested Mail Receiver policy for non-existent subdomains
+ | (plain-text; OPTIONAL). Indicates the policy to be enacted by
+ | the Receiver at the request of the Domain Owner. It applies
+ | only to non-existent subdomains of the domain queried and not
+ | to either existing subdomains or the domain itself. Its syntax
+ | is identical to that of the "p" tag defined below. If the "np"
+ | tag is absent, the policy specified by the "sp" tag (if the
+ | "sp" tag is present) or the policy specified by the "p" tag (if
+ | the "sp" tag is absent) MUST be applied for non-existent
+ | subdomains. Note that "np" will be ignored for DMARC records
+ | published on subdomains of Organizational Domains and PSDs due
+ | to the effect of the DMARC policy discovery mechanism described
+ | in Section 6.6.3 of [RFC7489].
+
+ The following tag definitions from DMARC are updated:
+
+ p: The sentence 'Policy applies to the domain queried and to
+ subdomains, unless subdomain policy is explicitly described using
+ the "sp" tag' is updated to read 'Policy applies to the domain
+ queried and to subdomains, unless subdomain policy is explicitly
+ described using the "sp" or "np" tags.'
+
+ sp: The sentence 'If absent, the policy specified by the "p" tag
+ MUST be applied for subdomains' is updated to read 'If both the
+ "sp" tag is absent and the "np" tag is either absent or not
+ applicable, the policy specified by the "p" tag MUST be applied
+ for subdomains.'
+
+3.3. Changes in Section 6.4 ("Formal Definition")
+
+ The ABNF [RFC5234] for DMARC is updated to include a new definition,
+ "dmarc-nprequest":
+
+ dmarc-nprequest = "np" *WSP "=" *WSP
+ ( "none" / "quarantine" / "reject" )
+
+ The "dmarc-record" definition is also updated to include the
+ following:
+
+ dmarc-record = dmarc-version dmarc-sep
+ [dmarc-request]
+ [dmarc-sep dmarc-srequest]
+ [dmarc-sep dmarc-auri]
+ [dmarc-sep dmarc-furi]
+ [dmarc-sep dmarc-adkim]
+ [dmarc-sep dmarc-aspf]
+ [dmarc-sep dmarc-ainterval]
+ [dmarc-sep dmarc-fo]
+ [dmarc-sep dmarc-rfmt]
+ [dmarc-sep dmarc-percent]
+ [dmarc-sep]
+ [dmarc-sep dmarc-nprequest]
+ ; components other than dmarc-version and
+ ; dmarc-request may appear in any order
+
+3.4. Changes in Section 6.5 ("Domain Owner Actions")
+
+ In addition to the DMARC Domain Owner actions, PSOs that require use
+ of DMARC and participate in PSD DMARC ought to make that information
+ available to receivers. This document is an experimental mechanism
+ for doing so; see the description in Appendix B.
+
+3.5. Changes in Section 6.6.1 ("Extract Author Domain")
+
+ Experience with DMARC has shown that some implementations short-
+ circuit messages, bypassing DMARC policy application, when the domain
+ name extracted by the receiver (from the RFC5322.From domain) is on
+ the public suffix list used by the receiver. This negates the
+ capability being created by this specification. Therefore, the
+ following paragraph is appended to Section 6.6.1 of the DMARC
+ specification [RFC7489]:
+
+ | Note that domain names that appear on a public suffix list are not
+ | exempt from DMARC policy application and reporting.
+
+3.6. Changes in Section 6.6.3 ("Policy Discovery")
+
+ A new step is added between steps 3 and 4:
+
+ | 3A. If the set is now empty and the longest PSD ([RFC9091],
+ | Section 2.4) of the Organizational Domain is one that the
+ | receiver has determined is acceptable for PSD DMARC (based on
+ | the data in one of the DMARC PSD Registry Examples described in
+ | Appendix B of [RFC9091]), the Mail Receiver MUST query the DNS
+ | for a DMARC TXT record at the DNS domain matching the longest
+ | PSD in place of the RFC5322.From domain in the message (if
+ | different). A possibly empty set of records is returned.
+
+ As an example, for a message with the Organizational Domain of
+ "example.compute.cloudcompany.com.example", the query for PSD DMARC
+ would use "compute.cloudcompany.com.example" as the longest PSD. The
+ receiver would check to see if that PSD is listed in the DMARC PSD
+ Registry, and if so, perform the policy lookup at
+ "_dmarc.compute.cloudcompany.com.example".
+
+ Note: Because the PSD policy query comes after the Organizational
+ Domain policy query, PSD policy is not used for Organizational
+ Domains that have published a DMARC policy. Specifically, this is
+ not a mechanism to provide feedback addresses (RUA/RUF) when an
+ Organizational Domain has declined to do so.
+
+3.7. Changes in Section 7 ("DMARC Feedback")
+
+ The following paragraph is added to this section:
+
+ | Operational note for PSD DMARC: For PSOs, feedback for non-
+ | existent domains is desirable and useful, just as it is for org-
+ | level DMARC operators. See Section 4 of [RFC9091] for discussion
+ | of privacy considerations for PSD DMARC.
+
+4. Privacy Considerations
+
+ These privacy considerations are developed based on the requirements
+ of [RFC6973]. Additionally, the privacy considerations of [RFC7489]
+ apply to the mechanisms described by this document. To participate
+ in this experiment, implementations should be aware of the privacy
+ considerations described in this section. If this experiment is
+ successful, this section should be incorporated into the "Privacy
+ Considerations" section as "Feedback Leakage".
+
+ Providing feedback reporting to PSOs can, in some cases, cause
+ information to leak out of an organization to the PSO. This leakage
+ could potentially be utilized as part of a program of pervasive
+ surveillance (see [RFC7624]). There are roughly three cases to
+ consider:
+
+ Single Organization PSDs (e.g., ".google"):
+ RUA and RUF reports based on PSD DMARC have the potential to
+ contain information about emails related to entities managed by
+ the organization. Since both the PSO and the Organizational
+ Domain Owners are common, there is no additional privacy risk for
+ either normal or non-existent domain reporting due to PSD DMARC.
+
+ Multi-organization PSDs that require DMARC usage (e.g., ".bank"):
+ Reports based on PSD DMARC will only be generated for domains that
+ do not publish a DMARC policy at the organizational or host level.
+ For domains that do publish the required DMARC policy records, the
+ feedback reporting addresses (RUA and RUF) of the organization (or
+ hosts) will be used. The only direct risk of feedback leakage for
+ these PSDs are for Organizational Domains that are out of
+ compliance with PSD policy. Data on non-existent cousin domains
+ would be sent to the PSO.
+
+ Multi-organization PSDs (e.g., ".com") that do not mandate DMARC
+ usage:
+ Privacy risks for Organizational Domains that have not deployed
+ DMARC within such PSDs are significant. For non-DMARC
+ Organizational Domains, all DMARC feedback will be directed to the
+ PSO. PSD DMARC is opt out (by publishing a DMARC record at the
+ Organizational Domain level) instead of opt in, which would be the
+ more desirable characteristic. This means that any non-DMARC
+ Organizational Domain would have its Feedback Reports redirected
+ to the PSO. The content of such reports, particularly for
+ existing domains, is privacy sensitive.
+
+ PSOs will receive feedback on non-existent domains, which may be
+ similar to existing Organizational Domains. Feedback related to such
+ cousin domains have a small risk of carrying information related to
+ an actual Organizational Domain. To minimize this potential concern,
+ PSD DMARC feedback MUST be limited to Aggregate Reports. Feedback
+ Reports carry more detailed information and present a greater risk.
+
+ Due to the inherent privacy and security risks associated with PSD
+ DMARC for Organizational Domains in multi-organization PSDs that do
+ not participate in DMARC, any feedback reporting related to multi-
+ organizational PSDs MUST be limited to non-existent domains except in
+ cases where the reporter knows that PSO requires use of DMARC (by
+ checking the DMARC PSD Registry).
+
+5. Security Considerations
+
+ This document does not change the security considerations of
+ [RFC7489] and [RFC7960].
+
+ The risks of the issues identified in Section 12.3 of [RFC7489] ("DNS
+ Security") are amplified by PSD DMARC. In particular, consequences
+ of DNS cache poisoning (or name chaining) are increased because a
+ successful attack would potentially have a much wider scope (see
+ [RFC3833] for details).
+
+ The risks of the issues identified in Section 12.5 of [RFC7489]
+ ("External Reporting Addresses") are amplified by PSD DMARC. By
+ design, PSD DMARC causes unrequested reporting of feedback to
+ entities external to the Organizational Domain. This is discussed in
+ more detail in Section 4.
+
+6. IANA Considerations
+
+ IANA has added a new tag to the "DMARC Tag Registry" in the "Domain-
+ based Message Authentication, Reporting, and Conformance (DMARC)
+ Parameters" registry. The "Status" column is defined in Section 11.4
+ of [RFC7489].
+
+ The new entry is as follows:
+
+ +==========+===========+=========+=============================+
+ | Tag Name | Reference | Status | Description |
+ +==========+===========+=========+=============================+
+ | np | RFC 9091 | current | Requested handling policy |
+ | | | | for non-existent subdomains |
+ +----------+-----------+---------+-----------------------------+
+
+ Table 1
+
+
+7. References
+
+7.1. Normative References
+
+ [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
+ Requirement Levels", BCP 14, RFC 2119,
+ DOI 10.17487/RFC2119, March 1997,
+ <https://www.rfc-editor.org/info/rfc2119>.
+
+ [RFC5234] Crocker, D., Ed. and P. Overell, "Augmented BNF for Syntax
+ Specifications: ABNF", STD 68, RFC 5234,
+ DOI 10.17487/RFC5234, January 2008,
+ <https://www.rfc-editor.org/info/rfc5234>.
+
+ [RFC7489] Kucherawy, M., Ed. and E. Zwicky, Ed., "Domain-based
+ Message Authentication, Reporting, and Conformance
+ (DMARC)", RFC 7489, DOI 10.17487/RFC7489, March 2015,
+ <https://www.rfc-editor.org/info/rfc7489>.
+
+ [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
+ 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
+ May 2017, <https://www.rfc-editor.org/info/rfc8174>.
+
+7.2. Informative References
+
+ [PSD-DMARC]
+ "Public Suffix Domain DMARC", <https://psddmarc.org/>.
+
+ [RFC3833] Atkins, D. and R. Austein, "Threat Analysis of the Domain
+ Name System (DNS)", RFC 3833, DOI 10.17487/RFC3833, August
+ 2004, <https://www.rfc-editor.org/info/rfc3833>.
+
+ [RFC5598] Crocker, D., "Internet Mail Architecture", RFC 5598,
+ DOI 10.17487/RFC5598, July 2009,
+ <https://www.rfc-editor.org/info/rfc5598>.
+
+ [RFC6973] Cooper, A., Tschofenig, H., Aboba, B., Peterson, J.,
+ Morris, J., Hansen, M., and R. Smith, "Privacy
+ Considerations for Internet Protocols", RFC 6973,
+ DOI 10.17487/RFC6973, July 2013,
+ <https://www.rfc-editor.org/info/rfc6973>.
+
+ [RFC7624] Barnes, R., Schneier, B., Jennings, C., Hardie, T.,
+ Trammell, B., Huitema, C., and D. Borkmann,
+ "Confidentiality in the Face of Pervasive Surveillance: A
+ Threat Model and Problem Statement", RFC 7624,
+ DOI 10.17487/RFC7624, August 2015,
+ <https://www.rfc-editor.org/info/rfc7624>.
+
+ [RFC7960] Martin, F., Ed., Lear, E., Ed., Draegen, T., Ed., Zwicky,
+ E., Ed., and K. Andersen, Ed., "Interoperability Issues
+ between Domain-based Message Authentication, Reporting,
+ and Conformance (DMARC) and Indirect Email Flows",
+ RFC 7960, DOI 10.17487/RFC7960, September 2016,
+ <https://www.rfc-editor.org/info/rfc7960>.
+
+ [RFC8020] Bortzmeyer, S. and S. Huque, "NXDOMAIN: There Really Is
+ Nothing Underneath", RFC 8020, DOI 10.17487/RFC8020,
+ November 2016, <https://www.rfc-editor.org/info/rfc8020>.
+
+ [RFC8126] Cotton, M., Leiba, B., and T. Narten, "Guidelines for
+ Writing an IANA Considerations Section in RFCs", BCP 26,
+ RFC 8126, DOI 10.17487/RFC8126, June 2017,
+ <https://www.rfc-editor.org/info/rfc8126>.
+
+Appendix A. PSD DMARC Privacy Concern Mitigation Experiment
+
+ The experiment being performed has three different questions that are
+ looking to be addressed in this document.
+
+ * Section 3.2 modifies policy discovery to add an additional DNS
+ lookup. To determine if this lookup is useful, PSDs will add
+ additional DMARC records in place and will analyze the DMARC
+ reports. Success will be determined if a consensus of PSDs that
+ publish DMARC records are able to collect useful data.
+
+ * Section 3.2 adds the "np" tag for non-existent subdomains (DNS
+ NXDOMAIN). PSOs wishing to test this will add this flag to their
+ DMARC record and will analyze DMARC reports for deployment.
+ Success will be determined if organizations find explicitly
+ blocking non-existent subdomains desirable and that doing so
+ provides added value.
+
+ * Section 4 discusses three cases where providing feedback could
+ cause information to leak out of an organization. This experiment
+ will analyze the Feedback Reports generated for each case to
+ determine if there is information leakage.
+
+Appendix B. DMARC PSD Registry Examples
+
+ To facilitate experimentation around mitigation of data leakage,
+ samples of the DNS-based and IANA-like registries are available at
+ [PSD-DMARC].
+
+B.1. DMARC PSD DNS Query Service
+
+ A sample stand-alone DNS query service is available at [PSD-DMARC].
+ It was developed based on the contents suggested for an IANA registry
+ in an earlier draft version of this document. Usage of the service
+ is described at [PSD-DMARC].
+
+B.2. DMARC PSD Registry
+
+ [PSD-DMARC] provides an IANA-like DMARC Public Suffix Domain (PSD)
+ Registry as a stand-alone DNS query service. It follows the contents
+ and structure described below. There is a Comma-Separated Value
+ (CSV) version of the listed PSDs that is suitable for use in build
+ updates for PSD DMARC-capable software.
+
+ PSDs that are deploying DMARC and are participating in PSD DMARC must
+ register their public suffix domain in this new registry. The
+ requirement has to be documented in a manner that satisfies the terms
+ of Expert Review, per [RFC8126]. The Designated Expert needs to
+ confirm that provided documentation adequately describes PSD policy
+ to require Domain Owners to use DMARC or that all Domain Owners are
+ part of a single organization with the PSO.
+
+ The authoritative registry can be found here: <https://psddmarc.org>
+
+B.3. DMARC PSD PSL Extension
+
+ [PSD-DMARC] provides a file formatted like the Public Suffix List
+ (PSL) in order to facilitate identification of PSD DMARC
+ participants. Contents are functionally identical to the IANA-like
+ registry but presented in a different format.
+
+ When using this approach, the input domain of the extension lookup is
+ supposed to be the output domain of the regular PSL lookup, i.e., the
+ Organizational Domain. This alternative data approach is potentially
+ useful since DMARC implementations already need to be able to parse
+ the data format, so it should be easier to implement.
+
+Appendix C. Implementations
+
+ There are two known implementations of PSD DMARC available for
+ testing.
+
+C.1. Authheaders Module
+
+ The authheaders Python module and command line tool is available for
+ download or installation from Pypi (Python Packaging Index).
+
+ It supports both use of the DNS-based query service and download of
+ the CSV registry file from [PSD-DMARC].
+
+C.2. Zdkimfilter Module
+
+ The zdkimfilter module is a separately available add-on to Courier-
+ MTA.
+
+ Mostly used for DomainKeys Identified Mail (DKIM) signing, it can be
+ configured to also verify, apply DMARC policies, and send Aggregate
+ Reports. For PSD DMARC, it uses the PSL extension list approach,
+ which is available from [PSD-DMARC].
+
+Acknowledgements
+
+ Thanks to the following individuals for their contributions (both
+ public and private) to improving this document: Kurt Andersen, Seth
+ Blank, Dave Crocker, Heather Diaz, Tim Draegen, Zeke Hendrickson,
+ Andrew Kennedy, John Levine, Dr. Ian Levy, Craig Schwartz, Alessandro
+ Vesely, and Tim Wicinski.
+
+ A special mention to Dave Crocker for coming up with the name.
+
+Authors' Addresses
+
+ Scott Kitterman
+ fTLD Registry Services
+ Suite 400
+ 600 13th Street, NW
+ Washington, DC 20005
+ United States of America
+
+ Phone: +1 301 325-5475
+ Email: scott@kitterman.com
+
+
+ Tim Wicinski (editor)
+ Elkins, WV 26241
+ United States of America
+
+ Email: tjw.ietf@gmail.com