<?xml version="1.0" encoding="utf-8"?>
<!-- name="GENERATOR" content="github.com/mmarkdown/mmark Mmark Markdown Processor - mmark.miek.nl" -->
<rfc version="3" ipr="trust200902" docName="draft-ietf-dmarc-dmarcbis-33" submissionType="IETF" category="std" xml:lang="en" xmlns:xi="http://www.w3.org/2001/XInclude" obsoletes="7489, 9091" indexInclude="true" consensus="true">

<front>
<title abbrev="DMARCbis">Domain-based Message Authentication, Reporting, and Conformance (DMARC)</title><seriesInfo value="draft-ietf-dmarc-dmarcbis-33" stream="IETF" status="standard" name="Internet-Draft"></seriesInfo>
<author initials="T." surname="Herr (ed)" fullname="Todd M. Herr"><organization>Valimail</organization><address><postal><street></street>
</postal><email>todd.herr@valimail.com</email>
</address></author><author initials="J." surname="Levine (ed)" fullname="John Levine"><organization>Standcore LLC</organization><address><postal><street></street>
</postal><email>standards@standore.com</email>
</address></author><date/>
<area>Application</area>
<workgroup>DMARC</workgroup>

<abstract>
<t>This document describes the Domain-based Message Authentication,
Reporting, and Conformance (DMARC) protocol.</t>
<t>DMARC permits the owner of an email's <eref target="#author-domain">Author Domain</eref> to enable
validation of the domain's use, to indicate the <eref target="#domain-owner">Domain Owner's</eref>
or <eref target="#public-suffix-operator">Public Suffix Operator's</eref> message handling
preference regarding failed validation, and to request reports about the
use of the domain name.  Mail receiving organizations can use this information
when evaluating handling choices for incoming mail.</t>
<t>This document obsoletes RFCs 7489 and 9091.</t>
</abstract>

</front>

<middle>

<section anchor="introduction"><name>Introduction</name>
<t>RFC EDITOR: PLEASE REMOVE THE FOLLOWING PARAGRAPH BEFORE PUBLISHING:
The source for this draft is maintained on GitHub at:
<eref target="https://github.com/ietf-wg-dmarc/draft-ietf-dmarc-dmarcbis">https://github.com/ietf-wg-dmarc/draft-ietf-dmarc-dmarcbis</eref></t>
<t>Abusive email often includes unauthorized and deceptive use of a
domain name in the &quot;From&quot; header field defined in section 3.6.2 of <xref target="RFC5322" sectionFormat="bare" relative="#" section="RFC 5322, Internet Message Format"></xref>
and referred to as RFC5322.From. The domain typically belongs to an organization
expected to be known to - and presumably trusted by - the recipient. The Sender
Policy Framework (SPF) <xref target="RFC7208"></xref> and DomainKeys Identified Mail (DKIM) <xref target="RFC6376"></xref>
protocols provide domain-level authentication but are not directly associated
with the RFC5322.From domain, also known as the <eref target="#author-domain">Author Domain</eref>.
DMARC leverages these two protocols, providing a method for Domain Owners to publish
a DNS TXT record describing the email authentication policies for the Author Domain
and to request specific handling for messages using that domain that fail validation
checks. These DNS records are called <eref target="#dmarc-policy-record">DMARC Policy Records</eref>.</t>
<t>As with SPF and DKIM, DMARC validation results in a verdict of either &quot;pass&quot; or
&quot;fail&quot;. A DMARC result of &quot;pass&quot; requires not only an SPF or DKIM pass verdict for
the email message, but also and more importantly that the domain associated with
the SPF or DKIM pass be &quot;aligned&quot; with the Author Domain in one of two
modes - &quot;relaxed&quot; or &quot;strict&quot;. Domains are said to be in &quot;relaxed alignment&quot;
if they have the same <eref target="#organizational-domain">Organizational Domain</eref>; a
domain's Organizational Domain is the domain at the top of the namespace
hierarchy for that domain while having the same administrative authority as
that domain. On the other hand, domains are in &quot;strict alignment&quot; if and only
if they are identical. The choice of required alignment mode is left to the
<eref target="#domain-owner">Domain Owner</eref> that publishes a DMARC Policy Record.</t>
<t>A DMARC pass for a message indicates only that the use of the Author Domain has been
validated for that message as authorized by the Domain Owner.  Such authorization
does not carry an explicit or implicit value assertion about that message or about
the Domain Owner, and so a DMARC pass by itself does not guarantee delivery of the
message to the recipient's Inbox.  Furthermore, a mail-receiving organization that
performs DMARC validation can choose to honor the Domain Owner's requested message
handling for validation failures, but it is not required to do so; it might
choose different actions entirely.</t>
<t>For a mail-receiving organization participating in DMARC, a message that
passes DMARC validation is part of a message stream reliably associated
with the Author Domain. Therefore, reputation assessment of that stream by
the mail-receiving organization can assume the use of that Author Domain is
authorized by the Domain Owner.  A message that fails this validation is not
necessarily associated with the Author Domain and should not affect its reputation.</t>
<t>DMARC, in the associated <xref target="I-D.ietf-dmarc-aggregate-reporting"></xref> and <xref target="I-D.ietf-dmarc-failure-reporting"></xref>
documents, also specifies a reporting framework. Using it, a mail-receiving
organization can generate regular reports about messages that use Author
Domains for which a DMARC Policy Record exists; those reports are sent to the
address(es) specified by the Domain Owner in the DMARC Policy Record. Domain Owners
can use these reports, especially the aggregate reports, not only to identify
sources of mail attempting to fraudulently use their domain, but also (and perhaps
more importantly) to flag and fix gaps in their authentication practices.  However,
as with honoring the Domain Owner's stated mail handling preference, a mail-receiving
organization supporting DMARC is under no obligation to send requested reports, although
it is recommended that they do send aggregate reports.</t>
<t>The use of DMARC creates some interoperability challenges that require due
consideration before deployment, particularly with configurations that
can cause mail to be rejected. These are discussed in <xref target="other-topics"></xref>.</t>
</section>

<section anchor="requirements"><name>Requirements</name>
<t>The following sections describe topics that guide the specification of DMARC.</t>

<section anchor="high-level-goals"><name>High-Level Goals</name>
<t>DMARC has the following high-level goals:</t>

<ul>
<li><t>Allow <eref target="#domain-owner">Domain Owners</eref> and <eref target="#public-suffix-operator">Public Suffix Operators (PSOs)</eref> to validate their email authentication deployment.</t>
</li>
<li><t>Allow Domain Owners and PSOs to assert their desired message handling
for validation failures for messages purporting to have authorship
within the domain.</t>
</li>
<li><t>Minimize implementation complexity for both senders and receivers,
as well as the impact on handling and delivery of legitimate
messages.</t>
</li>
<li><t>Reduce the amount of successfully delivered spoofed emails.</t>
</li>
<li><t>Work at Internet scale.</t>
</li>
</ul>
</section>

<section anchor="anti-phishing"><name>Anti-Phishing</name>
<t>DMARC is designed to prevent the unauthorized use of the <eref target="#author-domain">Author Domain</eref>
of an email message, a technique known as &quot;spoofing&quot;. Such unauthorized usage can
frequently be found in messages impersonating a domain belonging to a business entity,
messages that are meant to entice the recipient to provide sensitive information, such
as usernames, passwords, and financial account information. These spoofed messages are
commonly referred to as &quot;phishing&quot;.</t>
<t>DMARC can only be used to combat specific forms of exact-domain spoofing directly. DMARC
does not attempt to solve all problems with spoofed or otherwise fraudulent emails. In
particular, it does not address the use of visually similar domain names (&quot;cousin domains&quot;)
or abuse of the RFC5322.From human-readable display-name, as defined in
<xref target="RFC5322" sectionFormat="of" relative="#" section="3.4"></xref>.</t>
</section>

<section anchor="scalability"><name>Scalability</name>
<t>Scalability is a significant issue for systems that need to operate in
an environment as widely deployed as current SMTP email. For this reason,
DMARC seeks to avoid the need for third parties or pre-sending
agreements between senders and receivers. This preserves the
positive aspects of the current email infrastructure.</t>
<t>Although DMARC does not introduce third-party senders (namely
external agents authorized to send on behalf of an operator) to the
email-handling flow, it also does not preclude them.  Such third
parties are free to provide services in conjunction with DMARC.</t>
</section>

<section anchor="out-of-scope"><name>Out of Scope</name>
<t>Several topics and issues are specifically out of scope of this
work. These include the following:</t>

<ul>
<li><t>Different treatment of messages that are not authenticated (e.g.,
those that have no DKIM signature or those sent using an <eref target="#author-domain">Author
Domain</eref> for which no <eref target="#dmarc-policy-record">DMARC Policy Record</eref>
exists) versus those that fail validation;</t>
</li>
<li><t>Evaluation of anything other than RFC5322.From header field;</t>
</li>
<li><t>Multiple reporting formats;</t>
</li>
<li><t>Publishing policy other than via the DNS;</t>
</li>
<li><t>Reporting or otherwise evaluating other than the last-hop IP
address;</t>
</li>
<li><t>Attacks in the display-name portions of the RFC5322.From header field,
also known as &quot;display name&quot; attacks;</t>
</li>
<li><t>Authentication of entities other than domains, since DMARC is
built upon SPF and DKIM, which authenticate domains; and</t>
</li>
<li><t>Content analysis.</t>
</li>
</ul>
</section>
</section>

<section anchor="terminology"><name>Terminology and Definitions</name>
<t>This section defines terms used in the rest of the document.</t>

<section anchor="conventions-used-in-this-document"><name>Conventions Used in This Document</name>
<t>The key words &quot;MUST&quot;, &quot;MUST NOT&quot;, &quot;REQUIRED&quot;, &quot;SHALL&quot;, &quot;SHALL NOT&quot;, &quot;SHOULD&quot;,
&quot;SHOULD NOT&quot;, &quot;RECOMMENDED&quot;, &quot;NOT RECOMMENDED&quot;, &quot;MAY&quot;, and &quot;OPTIONAL&quot; in this
document are to be interpreted as described in BCP 14 <xref target="RFC2119"></xref> and
<xref target="RFC8174" sectionFormat="bare" relative="#" section="RFC 8174, Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words"></xref> when, and
only when, they appear in all capitals, as shown here.</t>
<t>Readers are encouraged to be familiar with the contents of
<xref target="RFC5598" sectionFormat="bare" relative="#" section="RFC 5598, Internet Mail Architecture"></xref>.  In particular, that document
defines various roles in the messaging infrastructure that can appear the same
or separate in various contexts. For example, a <eref target="#domain-owner">Domain Owner</eref> could,
via the messaging security mechanisms on which DMARC is based, delegate the
ability to send mail as the Domain Owner to a third party with
another role. This document does not address the distinctions among
such roles; the reader is encouraged to become familiar with that
material before continuing.</t>
</section>

<section anchor="definitions"><name>Definitions</name>
<t>The following sections define the terms used in this document.</t>

<section anchor="authenticated-identifiers"><name>Authenticated Identifiers</name>
<t>Authenticated Identifiers are those domain-level identifiers for which authorized
use is validated using a supported <eref target="#authentication-mechanisms">authentication mechanism</eref>.</t>
</section>

<section anchor="author-domain"><name>Author Domain</name>
<t>The domain name of the apparent author as extracted from the RFC5322.From header field.</t>
</section>

<section anchor="dmarc-policy-record"><name>DMARC Policy Record</name>
<t>A DNS TXT record published by a <eref target="#domain-owner">Domain Owner</eref> or <eref target="#public-suffix-operator">Public Suffix
Operator (PSO)</eref> to enable validation of an <eref target="#author-domain">Author
Domain's</eref> use, to indicate the Domain Owner's or PSO's message
handling preference regarding failed validation, and to request reports about the
use of the Author Domain.</t>
</section>

<section anchor="domain-owner"><name>Domain Owner</name>
<t>An entity or organization that has control of a given DNS domain,
usually by holding its registration.  Domain Owners range from complex,
globally distributed organizations to service providers working on
behalf of non-technical clients to individuals responsible for maintaining
personal domains. This specification uses this term as analogous to an
Administrative Management Domain as defined in <xref target="RFC5598"></xref>. It can also
refer to delegates, such as Report Consumers when those are outside of
their immediate management domain.</t>
</section>

<section anchor="domain-owner-policy"><name>Domain Owner Assessment Policy</name>
<t>The message handling preference expressed in a <eref target="#dmarc-policy-record">DMARC Policy Record</eref>
by the <eref target="#domain-owner">Domain Owner</eref> regarding failed validation of the <eref target="#author-domain">Author Domain</eref> is called the &quot;Domain Owner Assessment Policy&quot;. Possible values are described in
<xref target="policy-record-format"></xref>.</t>
</section>

<section anchor="enforcement"><name>Enforcement</name>
<t>Enforcement describes a state where the existing <eref target="#domain-owner-policy">Domain Owner Assessment Policy</eref>
for an <eref target="#organizational-domain">Organizational Domain</eref> and all subdomains below it
is not &quot;p=none&quot;. This state means that the Organizational Domain and its subdomains
can only be used as <eref target="#author-domain">Author Domains</eref> if they are properly validated
using the DMARC mechanism.</t>
<t>Historically, Domain Owner Assessment Policies of &quot;p=quarantine&quot; or &quot;p=reject&quot;
have been higher value signals to <eref target="#mail-receiver">Mail Receivers</eref>. Messages with Author
Domains for which such policies exist that are not validated using the DMARC mechanism
will not reach the inbox at Mail Receivers that participate in DMARC and honor the
Domain Owner's expressed handling preference.</t>
</section>

<section anchor="identifier-alignment"><name>Identifier Alignment</name>
<t>DMARC describes the concept of alignment between the <eref target="#author-domain">Author Domain</eref>
and an <eref target="#authenticated-identifiers">Authenticated Identifier</eref>, and requires
such Identifier Alignment between the two for a message to achieve a DMARC pass. DMARC
defines two states for alignment.</t>

<section anchor="relaxed-alignment"><name>Relaxed Alignment</name>
<t>When the <eref target="#author-domain">Author Domain</eref> has the same <eref target="#organizational-domain">Organizational Domain</eref>
as an <eref target="#authenticated-identifier">Authenticated Identifier</eref>, the two are said to be
in relaxed alignment.</t>
</section>

<section anchor="strict-alignment"><name>Strict Alignment</name>
<t>When the <eref target="#author-domain">Author Domain</eref> is identical to an <eref target="#authenticated-identifier">Authenticated Identifier</eref>, the two are said to be in strict alignment.</t>
</section>
</section>

<section anchor="mail-receiver"><name>Mail Receiver</name>
<t>The entity or organization that receives and processes email. Mail
Receivers operate one or more Internet-facing Mail Transport Agents (MTAs).</t>
</section>

<section anchor="monitoring-mode"><name>Monitoring Mode</name>
<t>Monitoring Mode describes a state where the existing <eref target="#domain-owner-policy">Domain Owner Assessment Policy</eref> for an
<eref target="#organizational-domain">Organizational Domain</eref> and all subdomains below it
is &quot;p=none&quot;, and the <eref target="#domain-owner">Domain Owner</eref> is receiving aggregate reports
for the Organizational Domain.  While the use of the Organizational Domain and all
its subdomains as <eref target="#author-domain">Author Domains</eref> can still be validated by a <eref target="#mail-receiver">Mail Receiver</eref> deploying the DMARC mechanism, the Domain Owner expresses no handling
preference for messages that fail DMARC validation.  The Domain Owner is, however, using
the content of the DMARC aggregate reports to make any needed adjustments to
the authentication practices for its mail streams.</t>
</section>

<section anchor="non-existent-domains"><name>Non-existent Domains</name>
<t>For DMARC purposes, a non-existent domain is consistent with the term's meaning
as described in <xref target="RFC8020" sectionFormat="bare" relative="#" section="RFC 8020, NXDOMAIN: There Really Is Nothing Underneath"></xref>. That is,
if the response code received for a query for a domain name is NXDOMAIN, then the domain name
and any possible subdomains do not exist.</t>
</section>

<section anchor="organizational-domain"><name>Organizational Domain</name>
<t>The Organizational Domain for any domain is akin to the ADMD described in
<xref target="RFC5598"></xref>. A domain's Organizational Domain is the domain at the top of
the namespace hierarchy for that domain while having the same administrative
authority as the domain. An Organizational Domain is determined by applying
the algorithm found in <xref target="dns-tree-walk"></xref></t>
</section>

<section anchor="public-suffix-domain"><name>Public Suffix Domain (PSD)</name>
<t>Some domains allow the registration of subdomains that are
&quot;owned&quot; by independent organizations.  Real-world examples of
these domains are &quot;.com&quot;, &quot;.org&quot;, &quot;.us&quot;, and &quot;.co.uk&quot;, to name just a few.
These domains are called &quot;Public Suffix Domains (PSDs)&quot;.
For example, &quot;ietf.org&quot; is a registered domain name, and &quot;.org&quot; is its PSD.</t>
</section>

<section anchor="public-suffix-operator"><name>Public Suffix Operator (PSO)</name>
<t>A Public Suffix Operator is an organization that manages operations
within a PSD, particularly the DNS records published for names at and
under that domain name.</t>
</section>

<section anchor="pso-controlled-domain-names"><name>PSO Controlled Domain Names</name>
<t>PSO-Controlled Domain Names are names in the DNS that are managed by
a PSO. PSO-controlled Domain Names may have one label (e.g., &quot;.com&quot;) or more
(e.g., &quot;.co.uk&quot;), depending on the PSD's policy.</t>
</section>

<section anchor="report-consumer"><name>Report Consumer</name>
<t>A Report Consumer is an operator that receives reports from another operator
implementing the reporting mechanisms described in the documents
<xref target="I-D.ietf-dmarc-aggregate-reporting"></xref> and <xref target="I-D.ietf-dmarc-failure-reporting"></xref>.
Such an operator might be receiving reports about messages related to a domain
for which it is the <eref target="#domain-owner">Domain Owner</eref> or <eref target="#public-suffix-operator">PSO</eref>
or reports about messages related to another operator's domain.  This term applies
collectively to the system components that receive and process these reports and
the organizations that operate them.</t>
</section>
</section>
</section>

<section anchor="overview-and-key-concepts"><name>Overview and Key Concepts</name>
<t>This section provides a general overview of the design and operation
of the DMARC environment.</t>

<section anchor="dmarc-basics"><name>DMARC Basics</name>
<t>DMARC permits a <eref target="#domain-owner">Domain Owner</eref> or <eref target="#public-suffix-operator">PSO</eref> to enable
validation of an <eref target="#author-domain">Author Domain's</eref> use in an email message, to indicate
the Domain Owner's or PSO's message handling preference regarding failed validation, and
to request reports about use of the Author Domain. A domain's <eref target="#dmarc-policy-record">DMARC Policy Record</eref> is published in DNS as a TXT record at the name created by prepending
the label &quot;_dmarc&quot; to the domain name and is retrieved through normal DNS queries.</t>
<t>DMARC's validation mechanism produces a &quot;pass&quot; result if a DMARC Policy Record exists for
the Author Domain of an email message and the Author Domain is <eref target="#identifier-alignment">aligned</eref>
with an <eref target="#authenticated-identifiers">Authenticated Identifier</eref> from that message.
When a DMARC Policy Record exists for the Author Domain and the DMARC mechanism does not
produce a &quot;pass&quot; result, the <eref target="#mail-receiver">Mail Receiver's</eref> handling of that message
can be influenced by the <eref target="#domain-owner-policy">Domain Owner Assessment Policy</eref> expressed
in the DMARC Policy Record.</t>
<t>It is important to note that the authentication mechanisms employed
by DMARC only validate the usage of a DNS domain in an email message.
They do not validate the local-part of any email address identifier
found in that message, nor do such validations carry an explicit or
implicit value assertion about that message or about the Domain Owner.</t>
<t>DMARC's reporting component involves the collection of information
about received messages using the Author Domain for periodic aggregate reports
to the Domain Owner or PSO. The parameters and format for such reports are
discussed in <xref target="I-D.ietf-dmarc-aggregate-reporting"></xref></t>
<t>A Mail Receiver participating in DMARC might also generate per-message reports
that contain information related to individual messages that fail DMARC
validation checks. Per-message failure reports are a useful source of
information when debugging deployments (if messages can be determined
to be legitimate even though failing validation) or in analyzing
attacks.  The capability for such services is enabled by DMARC but
defined in other referenced material such as
<xref target="RFC6591" sectionFormat="bare" relative="#" section="RFC 6591, Authentication Failure Reporting Using the Abuse Reporting Format"></xref> and <xref target="I-D.ietf-dmarc-failure-reporting"></xref></t>
</section>

<section anchor="use-of-rfc5322-from"><name>Use of RFC5322.From</name>
<t>One of the most obvious points of security scrutiny for DMARC is the
choice to focus on an identifier, namely the RFC5322.From address,
which is part of a body of data that has been trivially forged
throughout the history of email. This field is the one used by end
users to identify the source of the message, and so it has always
been a prime target for abuse through such forgery and other means.
That said, of all the identifiers that are part of the message itself,
this is the only one required to be present. A message without a single,
properly formed RFC5322.From header field does not comply with
<xref target="RFC5322"></xref>, and handling such a message is outside of the scope of this specification.</t>
</section>

<section anchor="authentication-mechanisms"><name>Authentication Mechanisms</name>
<t>The following mechanisms for determining <eref target="#authenticated-identifiers">Authenticated Identifiers</eref> are supported in this version of DMARC:</t>

<ul>
<li><t>DKIM, <xref target="RFC6376"></xref>, which provides a domain-level identifier in the content of
the &quot;d=&quot; tag of a validated DKIM-Signature header field.</t>
</li>
<li><t>SPF, <xref target="RFC7208"></xref>, which can validate the uses of both the domain found in
an SMTP <xref target="RFC5321"></xref> HELO/EHLO command (the HELO identity) and the domain
found in an SMTP MAIL command (the MAIL FROM identity).  DMARC relies solely
on SPF validation of the MAIL FROM identity. Section 2.4 of <xref target="RFC7208"></xref> describes
the determination of the MAIL FROM identity for cases in which the SMTP MAIL
command has a null path, i.e., the mailbox composed of the local-part &quot;postmaster&quot;
and the HELO identity.</t>
</li>
</ul>
</section>

<section anchor="identifier-alignment-explained"><name>Identifier Alignment Explained</name>
<t>DMARC validates the authorized use of the <eref target="#author-domain">Author Domain</eref> by requiring
either that it have the same <eref target="#organizational-domain">Organizational Domain</eref> as an
<eref target="#authenticated-identifier">Authenticated Identifier</eref> (a condition known as &quot;<eref target="#relaxed-alignment">Relaxed
Alignment</eref>&quot;) or that it be identical to the Authenticated Identifier
 (a condition known as &quot;<eref target="#strict-alignment">Strict Alignment</eref>&quot;). The choice of relaxed
or strict alignment is left to the <eref target="#domain-owner">Domain Owner</eref> and is expressed in
the domain's <eref target="#dmarc-policy-record">DMARC Policy Record</eref>. In practice, nearly all Domain
Owners have found relaxed alignment sufficient to meet their needs. Domain name comparisons
in this context are case-insensitive, per <xref target="RFC4343" sectionFormat="bare" relative="#" section="RFC 4343, DNS Case Insensitivity Clarification"></xref>.</t>
<t>The following table is meant to illustrate possible alignment conditions.</t>
<table align="left"><name>&quot;Alignment Examples&quot;
</name>
<thead>
<tr>
<th>Authenticated Identifier</th>
<th>Author Domain</th>
<th>Identifier Alignment</th>
</tr>
</thead>

<tbody>
<tr>
<td>foo.example.com</td>
<td>news.example.com</td>
<td>relaxed; the two have the same organizational domain, example.com</td>
</tr>

<tr>
<td>news.example.com</td>
<td>news.example.com</td>
<td>strict; the two are identical</td>
</tr>

<tr>
<td>foo.example.net</td>
<td>news.example.com</td>
<td>none; the two do not share a common organizational domain</td>
</tr>
</tbody>
</table><t>It is important to note that Identifier Alignment cannot occur with a
message that is not valid per <xref target="RFC5322"></xref>, particularly one with a
malformed, absent, or repeated RFC5322.From header field, since in that case
there is no reliable way to determine a <eref target="#dmarc-policy-record">DMARC Policy Record</eref>
that applies to the message. Accordingly, DMARC operation is predicated on the input
being a valid RFC5322 message object. For non-compliant cases, handling
is outside of the scope of this specification. Further discussion of this
can be found in <xref target="denial-of-dmarc-attacks"></xref>.</t>

<section anchor="dkim-identifiers"><name>DKIM-Authenticated Identifiers</name>
<t>DKIM permits a Domain Owner to claim some responsibility for a message by
associating the domain to the message. This association is done by inserting
the domain as the value of the d= tag in a DKIM-Signature header field, and the
assertion of responsibility is validated through a cryptographic signature in
the header field. If the cryptographic signature validates, then the signing domain
(i.e., the value of the d= tag) is the DKIM-Authenticated Identifier.</t>
<t>DMARC requires that Identifier Alignment is applied to the DKIM-Authenticated
Identifier because a message can bear a valid signature from any domain, even
one used by a bad actor. Therefore, a DKIM-Authenticated Identifier that does
not have Identifier Alignment with the Author Domain is not enough to validate
whether the use of the Author Domain has been authorized by its Domain Owner.</t>
<t>A single email can contain multiple DKIM signatures, and it is considered to
produce a DMARC &quot;pass&quot; result if any DKIM-Authenticated Identifier aligns with
the Author Domain.</t>
</section>

<section anchor="spf-identifiers"><name>SPF-Authenticated Identifiers</name>
<t>SPF can validate the uses of both the domain found in an SMTP HELO/EHLO command
(the HELO identity) and the domain found in an SMTP MAIL command (the MAIL FROM
identity). DMARC relies solely on SPF validation of the MAIL FROM identity. Section
2.4 of <xref target="RFC7208"></xref> describes the determination of the MAIL FROM identity for cases
in which the SMTP MAIL command has a null path, i.e., the mailbox composed of the
local-part &quot;postmaster&quot; and the HELO identity. If the use of the domain in the
MAIL FROM identity is validated by SPF, then that domain is the SPF-Authenticated
Identifier.</t>
<t>DMARC requires that Identifier Alignment is applied to the SPF-Authenticated
Identifier because any Domain Owner, even a bad actor, can publish an SPF
record for its domain and send email that will obtain an SPF pass result.
Therefore, an SPF-Authenticated Identifier that does not have Identifier
Alignment with the Author Domain is not enough to validate whether the use
of the Author Domain has been authorized by its Domain Owner.</t>
</section>

<section anchor="alignment-and-extension-technologies"><name>Alignment and Extension Technologies</name>
<t>If in the future DMARC is extended to include the use of other authentication
mechanisms, the extensions <bcp14>MUST</bcp14> allow for the assignment of a domain
as an Authenticated Identified so that alignment with the Author Domain
can be validated.</t>
</section>
</section>

<section anchor="dmarc-policy-record-explained"><name>DMARC Policy Record Explained</name>
<t>A <eref target="#domain-owner">Domain Owner</eref> or <eref target="#public-suffix-operator">PSO</eref> advertises
DMARC participation of one or more of its domains by publishing <eref target="#dmarc-policy-record">DMARC Policy Records</eref> that will apply to those domains. In doing so, Domain Owners
and PSOs indicate their handling preference regarding failed validation for email
messages using their domain in the RFC5322.From header field as well as their
desire to receive feedback about such messages in the form of aggregate and/or
failure reports.</t>
<t>DMARC Policy Records are stored as DNS TXT records in subdomains named &quot;_dmarc&quot;.
For example, the Domain Owner of &quot;example.com&quot; would publish a DMARC Policy
Record at the name &quot;_dmarc.example.com&quot;. Similarly, a <eref target="#mail-receiver">Mail Receiver</eref>
wishing to find the DMARC Policy Record for mail with an <eref target="#author-domain">Author Domain</eref>
of &quot;example.com&quot; would issue a TXT query to the DNS for the subdomain of
&quot;_dmarc.example.com&quot;.  A Domain Owner or PSO may choose not to participate in
DMARC validation by Mail Receivers simply by not publishing a DMARC Policy Record
for its Author Domain(s).</t>
<t>DMARC Policy Records can also apply to subdomains of the name at which they
are published in the DNS, if the record is published at an <eref target="#organizational-domain">Organizational
Domain</eref> for the subdomains. The <eref target="#domain-owner-policy">Domain Owner Assessment Policy</eref> that applies to the subdomains can be identical to the Domain
Owner Assessment Policy that applies to the Organizational Domain or different, depending
on the presence or absence of certain values in the DMARC Policy Record. See <xref target="policy-record-format"></xref>
for more details.</t>
<t>DMARC's use of the Domain Name Service is driven by DMARC's use of domain
names and the nature of the query it performs. The query requirement matches
with the DNS for obtaining simple parametric information. It uses an established
method of storing the information associated with the domain name targeted by
a DNS query, specifically an isolated TXT record that is restricted to the
DMARC context.  Using the DNS as the query service has the benefit of reusing
an extremely well-established operations, administration, and management
infrastructure, rather than creating a new one.</t>
<t>Per <xref target="RFC1035" sectionFormat="bare" relative="#" section="RFC 1035, Domain Names - Implementation and Specification"></xref>, a TXT record
can comprise multiple &quot;character-string&quot; objects, each with the same name. Where this is
the case, the module performing DMARC evaluation <bcp14>MUST</bcp14> concatenate these strings by joining
together the objects in order and parsing the result as a single string.</t>
<t>A Domain Owner can choose not to have some underlying authentication mechanisms
apply to DMARC evaluation of its Author Domain(s). For example, if a Domain Owner
only wants to use DKIM as the underlying authentication mechanism, then the Domain
Owner does not publish an SPF record that can produce Identifier Alignment
between an SPF-Authenticated Identifier and the Author Domain. Alternatively, if
the Domain Owner wishes to rely solely on SPF, then it can send email messages that
have no DKIM-Signature header field that would produce Identifier Alignment between
a DKIM-Authenticated Identifier and the Author Domain. Neither approach is recommended,
however.</t>
<t>A Mail Receiver implementing the DMARC mechanism gets the Domain Owner's or
PSO's published Domain Owner Assessment Policy and can use it to inform its handling decisions
for messages that undergo DMARC validation checks and do not produce a result of
pass.  Mail handling considerations based on Domain Owner Assessment Policy enforcement
are discussed below in <xref target="policy-enforcement-considerations"></xref>.</t>
</section>

<section anchor="dmarc-uris"><name>DMARC Reporting URIs</name>
<t><xref target="RFC3986" sectionFormat="bare" relative="#" section="RFC 3986, URI Generic Syntax"></xref> defines a syntax for identifying a resource. The DMARC
mechanism uses this as the format by which a <eref target="#domain-owner">Domain Owner</eref>
or <eref target="#public-suffix-organization">PSO</eref> specifies the destination for the two
report types that are supported.</t>
<t>The place such URIs are specified (see <xref target="policy-record-format"></xref>) allows
a list of these to be provided. The list of URIs is separated by commas
(ASCII 0x2c). A report <bcp14>SHOULD</bcp14> be sent to each listed URI provided in
the DMARC Policy Record.</t>
<t>A formal definition is provided in <xref target="formal-definition"></xref>.</t>
</section>

<section anchor="policy-record-format"><name>DMARC Policy Record Format</name>
<t>DMARC Policy Records follow the extensible &quot;tag-value&quot; syntax for DNS-based
key records defined in DKIM <xref target="RFC6376"></xref>.</t>
<t><xref target="iana-considerations"></xref> creates a registry for known DMARC tags and
registers the initial set defined in this document. Only tags defined
in that registry are to be processed; unknown tags <bcp14>MUST</bcp14> be ignored.</t>
<t>The following tags are valid DMARC tags:</t>

<dl>
<dt>adkim:</dt>
<dd><t>(plain-text; <bcp14>OPTIONAL</bcp14>; default is &quot;r&quot;.) Indicates whether
the <eref target="#domain-owner">Domain Owner</eref> or <eref target="#public-suffix-organization">PSO</eref> requires
strict or relaxed DKIM Identifier Alignment mode. See <xref target="dkim-identifiers"></xref> for details.
Valid values are as follows:</t>

<dl spacing="compact">
<dt>r:</dt>
<dd>relaxed mode</dd>
<dt>s:</dt>
<dd>strict mode</dd>
</dl></dd>
<dt>aspf:</dt>
<dd><t>(plain-text; <bcp14>OPTIONAL</bcp14>; default is &quot;r&quot;.)  Indicates whether
the Domain Owner or PSO requires strict or relaxed SPF Identifier Alignment
mode. See <xref target="spf-identifiers"></xref> for details. Valid values are as follows:</t>

<dl spacing="compact">
<dt>r:</dt>
<dd>relaxed mode</dd>
<dt>s:</dt>
<dd>strict mode</dd>
</dl></dd>
<dt>fo:</dt>
<dd><t>Failure reporting options (plain-text; <bcp14>OPTIONAL</bcp14>; default is &quot;0&quot;)
Provides requested options for the generation of failure reports.
Report generators may choose to adhere to the requested options.
This tag's content <bcp14>MUST</bcp14> be ignored if a &quot;ruf&quot; tag (below) is not
also specified. This tag can include one or more of the values shown here;
if more than one value is assigned to the tag, the list of values should be
separated by colons (e.g., fo=0:d).  The valid values and their meanings are:</t>

<dl spacing="compact">
<dt>0:</dt>
<dd>Generate a DMARC failure report if all underlying authentication
mechanisms fail to produce an aligned &quot;pass&quot; result.</dd>
<dt>1:</dt>
<dd>Generate a DMARC failure report if any underlying authentication
mechanism produced something other than an aligned &quot;pass&quot; result.</dd>
<dt>d:</dt>
<dd>Generate a DKIM failure report if the message had a signature
that failed evaluation, regardless of its alignment. DKIM-specific
reporting is described in <xref target="RFC6651" sectionFormat="bare" relative="#" section="RFC 6651, Extensions to DKIM for Failure Reporting"></xref>.</dd>
<dt>s:</dt>
<dd>Generate an SPF failure report if the message failed SPF
evaluation, regardless of its alignment. SPF-specific
reporting is described in <xref target="RFC6652" sectionFormat="bare" relative="#" section="RFC 6652, SPF Authentication Failure Reporting Using the Abuse Reporting Format"></xref>.</dd>
</dl></dd>
<dt>np:</dt>
<dd><t><eref target="#domain-owner-policy">Domain Owner Assessment Policy</eref> for non-existent subdomains
of the given Organizational Domain (plain-text; <bcp14>OPTIONAL</bcp14>). Indicates the message
handling preference of the Domain Owner or PSO for mail using non-existent subdomains
of the prevailing Organizational Domain and not passing DMARC validation. It applies
only to non-existent subdomains of the Organizational Domain queried and not to either
existing subdomains or the domain itself. Its syntax is identical to that of the &quot;p&quot;
tag defined below. If the &quot;np&quot; tag is absent, the policy specified by the &quot;sp&quot; tag (if
the &quot;sp&quot; tag is present) or the policy specified by the &quot;p&quot; tag, if the &quot;sp&quot;
tag is not present, <bcp14>MUST</bcp14> be applied for non-existent subdomains.</t>
</dd>
<dt>p:</dt>
<dd><t><eref target="#domain-owner-policy">Domain Owner Assessment Policy</eref> (plain-text; <bcp14>RECOMMENDED</bcp14>
for DMARC Policy Records). Indicates the message handling preference of the Domain Owner
or PSO for mail using its domain but not passing DMARC validation.
The policy applies to the domain queried and to subdomains, unless the
subdomain policy is explicitly described using the &quot;sp&quot; or &quot;np&quot; tags.
If this tag is not present in an otherwise syntactically valid DMARC
record, then the record is treated as if it included &quot;p=none&quot; (see
<xref target="dmarc-policy-discovery"></xref>). This tag is not applicable for third-party
reporting records (see <xref target="I-D.ietf-dmarc-aggregate-reporting"></xref> and <xref target="I-D.ietf-dmarc-failure-reporting"></xref>)
Possible values are as follows:</t>

<dl spacing="compact">
<dt>none:</dt>
<dd>The Domain Owner offers no expression of preference.</dd>
<dt>quarantine:</dt>
<dd>The Domain Owner considers such mail to be suspicious. It is possible
the mail is valid, although the failure creates a significant concern.</dd>
<dt>reject:</dt>
<dd>The Domain Owner considers all such failures to be a clear indication
that the use of the domain name is not valid. See <xref target="rejecting-messages"></xref>
for some discussion of SMTP rejection methods and their implications.</dd>
</dl></dd>
<dt>psd:</dt>
<dd><t>A flag indicating whether the domain is a PSD. (plain-text; <bcp14>OPTIONAL</bcp14>;
default is 'u'). Possible values are:</t>

<dl spacing="compact">
<dt>y:</dt>
<dd>PSOs include this tag with a value of 'y' to indicate that the domain
is a PSD. If a record containing this tag with a value of 'y' is found during
policy discovery, this information will be used to determine the Organizational
Domain and policy domain applicable to the message in question.</dd>
<dt>n:</dt>
<dd>The DMARC policy record is published for a domain that is not a PSD, but it is
the Organizational Domain for itself and its subdomains.</dd>
<dt>u:</dt>
<dd>The default indicates that the DMARC policy record is published for a domain
that is not a PSD, and may or may not be an Organizational Domain for itself and
its subdomains. Use the mechanism described in <xref target="dns-tree-walk"></xref> for determining
the Organizational Domain for this domain. There is no need to explicitly publish
psd=u in a DMARC Policy Record.</dd>
</dl></dd>
<dt>rua:</dt>
<dd><t>Addresses to which aggregate feedback reports are to be sent (comma-separated plain-text
list of DMARC Reporting URIs; <bcp14>OPTIONAL</bcp14>). If present, the Domain Owner is requesting
Mail Receivers to send aggregate feedback reports as defined in <xref target="I-D.ietf-dmarc-aggregate-reporting"></xref>
to the URIs listed.  Any valid URI can be specified. A Mail Receiver <bcp14>MUST</bcp14> implement support
for a &quot;mailto:&quot; URI, i.e., the ability to send a DMARC report via electronic mail. If the
tag is not provided, Mail Receivers <bcp14>MUST NOT</bcp14> generate aggregate feedback reports for
the domain.  URIs not supported by Mail Receivers <bcp14>MUST</bcp14> be ignored.
<xref target="I-D.ietf-dmarc-aggregate-reporting"></xref> also discusses considerations that apply when the
domain name of a URI differs from the domain publishing the DMARC Policy Record. See
<xref target="external-report-addresses"></xref> for additional considerations.</t>
</dd>
<dt>ruf:</dt>
<dd><t>Addresses to which message-specific failure information is to be reported
(comma-separated plain-text list of DMARC URIs; <bcp14>OPTIONAL</bcp14>). If present, the
Domain Owner is requesting Mail Receivers to send detailed failure reports about
messages that fail the DMARC evaluation in specific ways (see the &quot;fo&quot; tag above) to
the URIs listed.  Depending on the value of the &quot;fo&quot; tag, the format for such reports
is described in <xref target="I-D.ietf-dmarc-failure-reporting"></xref>, <xref target="RFC6651"></xref>, or <xref target="RFC6652"></xref>. Any
valid URI can be specified. A Mail Receiver <bcp14>MUST</bcp14> implement support for a &quot;mailto:&quot;
URI, i.e., the ability to send message-specific failure information via electronic mail.
If the tag is not provided, Mail Receivers <bcp14>MUST NOT</bcp14> generate failure reports for the
domain. URIs not supported by Mail Receivers <bcp14>MUST</bcp14> be ignored.
<xref target="I-D.ietf-dmarc-aggregate-reporting"></xref> discusses considerations that apply when
the domain name of a URI differs from that of the domain advertising the policy.
See <xref target="external-report-addresses"></xref> for additional considerations.</t>
</dd>
<dt>sp:</dt>
<dd><t>Domain Owner Assessment Policy for all subdomains of the given Organizational Domain
(plain-text; <bcp14>OPTIONAL</bcp14>). Indicates the message handling preference of the Domain Owner
or PSO for mail using an existing subdomain of the prevailing Organizational Domain for
and not passing DMARC validation. It applies only to existing subdomains of the message's
Organizational Domain in the DNS hierarchy and not to the Organizational Domain itself.
Its syntax is identical to that of the &quot;p&quot; tag defined above. If both the &quot;sp&quot; tag is
absent, and the &quot;np&quot; tag is either absent or not applicable, the policy specified by
the &quot;p&quot; tag <bcp14>MUST</bcp14> be applied for subdomains.  Note that &quot;sp&quot; will be ignored for
DMARC Policy Records published on subdomains of Organizational Domains and PSDs due
to the effect of the <eref target="#dmarc-policy-discovery">DMARC Policy Discovery</eref>.</t>
</dd>
<dt>t:</dt>
<dd><t>DMARC policy test mode (plain-text; <bcp14>OPTIONAL</bcp14>; default is 'n'). For
the Author Domain to which the DMARC Policy Record applies, the &quot;t&quot; tag serves
as a signal to the actor performing DMARC validation checks as to whether or not
the Domain Owner wishes the Domain Owner Assessment Policy declared in the &quot;p=&quot;,
&quot;sp=&quot;, and/or &quot;np=&quot; tags to actually be applied. This tag does not affect the
generation of DMARC reports, and it has no effect on any policy (p=, sp=, or np=)
that is 'none'.  See <xref target="removal-of-the-pct-tag"></xref> for further discussion of the use
of this tag.  Possible values are as follows:</t>

<dl spacing="compact">
<dt>y:</dt>
<dd>A request that the actor performing the DMARC validation check not
apply the policy, but instead apply any special handling rules it might have
in place, such as rewriting the RFC5322.From header field. The Domain Owner is
currently testing its specified DMARC assessment policy, and has an expectation
that the policy applied to any failing messages will be one level below the
specified policy. That is, if the policy is 'quarantine' and the value of the 't'
tag is 'y', a policy of 'none' will be applied to failing messages; if the policy
is 'reject' and the value of the 't' tag is 'y', a policy of 'quarantine' will be
applied to failing messages, irrespective of any other special handling rules that
might be triggered by the 't' tag having a value of 'y'.</dd>
<dt>n:</dt>
<dd>The default is a request to apply the Domain Owner Assessment Policy as specified
to any message that produces a DMARC &quot;fail&quot; result.</dd>
</dl></dd>
<dt>v:</dt>
<dd><t>Version (plain-text; <bcp14>REQUIRED</bcp14>).  Identifies the record retrieved
as a DMARC Policy Record. It <bcp14>MUST</bcp14> have the value of &quot;DMARC1&quot;. The value
of this tag <bcp14>MUST</bcp14> match precisely; if it does not or it is absent,
the entire record <bcp14>MUST</bcp14> be ignored. It <bcp14>MUST</bcp14> be the first tag in the
list.</t>
</dd>
</dl>
<t>A DMARC Policy Record <bcp14>MUST</bcp14> comply with the formal specification found
in <xref target="formal-definition"></xref> in that the &quot;v&quot; tag <bcp14>MUST</bcp14> be present and <bcp14>MUST</bcp14>
appear first. Unknown tags <bcp14>MUST</bcp14> be ignored. Syntax errors
in the remainder of the record <bcp14>MUST</bcp14> be discarded in favor of
default values (if any) or ignored outright.</t>
<t>Note that given the rules of the previous paragraph, the addition of a
new tag into the registered list of tags does not itself require a
new version of DMARC to be generated (with a corresponding change to
the &quot;v&quot; tag's value), but a change to any existing tags does require
a new version of DMARC.</t>
</section>

<section anchor="formal-definition"><name>Formal Definition</name>
<t>The formal definition of the DMARC Policy Record format, using <xref target="RFC5234" sectionFormat="bare" relative="#" section="RFC 5234, Augmented BNF for Syntax Specifications: ABNF"></xref>
and <xref target="RFC7405" sectionFormat="bare" relative="#" section="RFC 7405, Case-Sensitive String Support in ABNF"></xref>, is as follows:</t>

<artwork>  dmarc-uri     = URI
                ; &quot;URI&quot; is imported from [RFC3986]; 
                ; commas (ASCII 0x2C) and exclamation
                ; points (ASCII 0x21) MUST be 
                ; encoded

  dmarc-sep     = *WSP &quot;;&quot; *WSP

  equals        = *WSP &quot;=&quot; *WSP

  dmarc-record  = dmarc-version *(dmarc-sep dmarc-tag) [dmarc-sep] *WSP

  dmarc-tag     = 1*ALPHA equals 1*dmarc-value

  ; any printing characters but semicolon
  dmarc-value   = %x20-3A / %x3C-7E 

  dmarc-version = &quot;v&quot; equals %s&quot;DMARC1&quot; ; case sensitive

  ; specialized syntax of DMARC values
  dmarc-request = &quot;none&quot; / &quot;quarantine&quot; / &quot;reject&quot;

  dmarc-yorn    = &quot;y&quot; / &quot;n&quot;

  dmarc-psd     = &quot;y&quot; / &quot;n&quot; / &quot;u&quot;

  dmarc-rors    = &quot;r&quot; / &quot;s&quot;

  dmarc-urilist = dmarc-uri *(*WSP &quot;,&quot; *WSP dmarc-uri)

  dmarc-fo      = &quot;0&quot; / &quot;1&quot; / &quot;d&quot; / &quot;s&quot; / &quot;d:s&quot; / &quot;s:d&quot;

</artwork>
<t>&quot;Keyword&quot; is imported from <xref target="RFC5321" sectionFormat="of" relative="#" section="4.1.2"></xref>.</t>
<t>In each dmarc-tag, the dmarc-value has a syntax that depends on the tag name.
The ABNF rule for each dmarc-value is specified in the following table:</t>
<table align="left"><name>&quot;Tag Names and Values&quot;
</name>
<thead>
<tr>
<th>Tag Name</th>
<th>Value Rule</th>
</tr>
</thead>

<tbody>
<tr>
<td>p</td>
<td>dmarc-request</td>
</tr>

<tr>
<td>t</td>
<td>dmarc-yorn</td>
</tr>

<tr>
<td>psd</td>
<td>dmarc-psd</td>
</tr>

<tr>
<td>np</td>
<td>dmarc-request</td>
</tr>

<tr>
<td>sp</td>
<td>dmarc-request</td>
</tr>

<tr>
<td>adkim</td>
<td>dmarc-rors</td>
</tr>

<tr>
<td>aspf</td>
<td>dmarc-rors</td>
</tr>

<tr>
<td>rua</td>
<td>dmarc-urilist</td>
</tr>

<tr>
<td>ruf</td>
<td>dmarc-urilist</td>
</tr>

<tr>
<td>fo</td>
<td>dmarc-fo</td>
</tr>
</tbody>
</table></section>

<section anchor="flow-diagram"><name>Flow Diagram</name>

<sourcecode type="ascii-art"> +---------------+                             +--------------------+
 | Author Domain |&lt; . . . . . . . . . . . .    | Return-Path Domain |
 +---------------+                        .    +--------------------+
     |                                    .               ^
     V                                    V               .
 +-----------+     +--------+       +----------+          v
 |   MSA     |&lt;***&gt;|  DKIM  |       |   DMARC  |     +----------+
 |  Service  |     | Signer |       | Validator|&lt;***&gt;|    SPF   |
 +-----------+     +--------+       +----------+  *  | Validator|
     |                                    ^       *  +----------+
     |                                    *       *
     V                                    v       *
  +------+        (~~~~~~~~~~~~)      +------+    *  +----------+
  | sMTA |-------&gt;( other MTAs )-----&gt;| rMTA |    **&gt;|   DKIM   |
  +------+        (~~~~~~~~~~~~)      +------+       | Validator|
                                         |           +----------+
                                         |                ^
                                         V                .
                                  +-----------+           .
                    +---------+   |    MDA    |           v
                    |  User   |&lt;--| Filtering |      +-----------+
                    | Mailbox |   |  Engine   |      |   DKIM    |
                    +---------+   +-----------+      |  Signing  |
                                                     | Domain(s) |
                                                     +-----------+

  MSA = Mail Submission Agent
  MDA = Mail Delivery Agent
</sourcecode>
<t>The above diagram shows a simple flow of messages through a
DMARC-aware system. Dashed lines (e.g., --&gt;) denote the actual message
flow, dotted lines (e.g., &lt; . . &gt;) represent DNS queries used to retrieve
message policy related to the supported message authentication schemes,
and starred lines (e.g., &lt;**&gt;) indicate data exchange between message-handling
modules and message authentication modules. &quot;sMTA&quot; is the sending MTA, and
&quot;rMTA&quot; is the receiving MTA.</t>
<t>Put simply, when a message reaches a DMARC-aware rMTA, a DNS query
will be initiated to determine if a DMARC Policy Record exists that applies
to the Author Domain. If a DMARC Policy Record is found, the rMTA will use
the results of SPF and DKIM validation checks to determine DMARC validation
status. The DMARC validation status can then factor into the message handling
decision made by the recipient's mail system.</t>
<t>More details on specific actions for the parties involved can be
found in <xref target="domain-owner-actions"></xref> and <xref target="mail-receiver-actions"></xref>.</t>
</section>

<section anchor="dns-tree-walk"><name>DNS Tree Walk</name>
<t>An <eref target="#organizational-domain">Organizational Domain</eref> serves two different purposes,
depending on the context:</t>

<ul>
<li><t>The Organizational Domain of the <eref target="#author-domain">Author Domain</eref> establishes
the <eref target="#dmarc-policy-record">DMARC Policy Record</eref> for that domain when no DMARC Policy
Record is published specifically for the Author Domain. (see <xref target="dmarc-policy-discovery"></xref>)</t>
</li>
<li><t>The Organizational Domains of an <eref target="#authenticated-identifiers">Authenticated Identifier</eref>
and the Author Domain are used in determining Identifier Alignment between the two. (see
<xref target="identifier-alignment-evaluation"></xref>).</t>
</li>
</ul>
<t><xref target="RFC7489" sectionFormat="bare" relative="#" section="RFC 7489, Domain-based Message Authentication, Reporting, and Conformance (DMARC)"></xref>
defined an Organizational Domain as &quot;The domain that was registered
with a domain name registrar.&quot; This update to that document offers more
flexibility to Domain Owners, especially those with large, complex organizations
that might want to applying decentralized management to their DNS and their
DMARC Policy Records. Rather than just searching the Public Suffix List to identify
an Organizational Domain, this update defines a discovery technique known
colloquially as the &quot;DNS Tree Walk&quot;. The target of any DNS Tree Walk is a
valid DMARC Policy Record, and its use in determining an Organizational Domain
allows for publishing DMARC Policy Records at multiple points in the namespace.</t>
<t>This flexibility comes at a possible cost, however. Since the DNS Tree Walk
relies on the Mail Receiver making a series of DNS queries, the potential
exists for an ill-intentioned Domain Owner to send mail with Author Domains
with tens or even hundreds of labels for the purpose of executing a Denial
of Service Attack on the Mail Receiver.  To guard against such abuse of the
DNS, a shortcut is built into the process so that Author Domains with more
than eight labels do not result in more than eight DNS queries. Observed data
at the time of publication showed that Author Domains with up to seven labels
were in usage, and so eight was chosen as the query limit to allow for some
future expansion of the name space that did not require updating this document.</t>
<t>The generic steps for a DNS Tree Walk are as follows:</t>

<ol>
<li><t>Query the DNS for a DMARC Policy Record at the starting point for the Tree Walk.
The starting point for the DNS Tree Walk will depend on the ultimate target of
the DNS Tree Walk. <xref target="dmarc-policy-discovery"></xref> and <xref target="identifier-alignment-evaluation"></xref>
describe the possible starting points. A possibly empty set of records is returned.</t>
</li>
<li><t>Records that do not start with a &quot;v=&quot; tag that identifies the current
version of DMARC are discarded. If multiple DMARC Policy Records are
returned, they are all discarded. If a single record remains and it
contains a &quot;psd=n&quot; tag, stop.</t>
</li>
<li><t>Determine the target for additional queries (if needed; see the note
in <xref target="identifier-alignment-evaluation"></xref>), using steps 4 through 8 below.</t>
</li>
<li><t>Break the subject DNS domain name into a set of ordered labels. Assign
the count of labels to &quot;x&quot;, and number the labels from right to left; e.g.,
for &quot;a.mail.example.com&quot;, &quot;x&quot; would be assigned the value 4, &quot;com&quot; would be
label 1, &quot;example&quot; would be label 2, &quot;mail&quot; would be label 3, and so forth.</t>
</li>
<li><t>If x &lt; 8, remove the left-most (highest-numbered) label from the subject
domain. If x &gt;= 8, remove the left-most (highest-numbered) labels from the
subject domain until 7 labels remain. The resulting DNS domain name is the
new target for the next lookup.</t>
</li>
<li><t>Query the DNS for a DMARC Policy Record at the DNS domain name matching this
new target. A possibly empty set of records is returned.</t>
</li>
<li><t>Records that do not start with a &quot;v=&quot; tag that identifies the current
version of DMARC are discarded. If multiple DMARC Policy Records are returned for
a single target, they are all discarded. If a single record remains and it
contains a &quot;psd=n&quot; or &quot;psd=y&quot; tag, stop.</t>
</li>
<li><t>Determine the target for the next query by removing the left-most label
from the target of the previous query. Repeat steps 6, 7, and 8 until the
process stops or there are no more labels remaining.</t>
</li>
</ol>
<t>To illustrate, for a message with the arbitrary Author Domain of
&quot;a.b.c.d.e.f.g.h.i.j.mail.example.com&quot;, a full DNS Tree Walk would require the following
eight queries to potentially locate the DMARC Policy Record or Organizational Domain:</t>

<ul spacing="compact">
<li>_dmarc.a.b.c.d.e.f.g.h.i.j.mail.example.com</li>
<li>_dmarc.g.h.i.j.mail.example.com</li>
<li>_dmarc.h.i.j.mail.example.com</li>
<li>_dmarc.i.j.mail.example.com</li>
<li>_dmarc.j.mail.example.com</li>
<li>_dmarc.mail.example.com</li>
<li>_dmarc.example.com</li>
<li>_dmarc.com</li>
</ul>

<section anchor="dmarc-policy-discovery"><name>DMARC Policy Discovery</name>
<t>The DMARC Policy Record to be applied to an email message will be the record found at any
of the following locations, listed from highest preference to lowest:</t>

<ul spacing="compact">
<li>The Author Domain</li>
<li>The Organizational Domain of the Author Domain</li>
<li>The Public Suffix Domain of the Author Domain</li>
</ul>
<t>Policy discovery starts first with a query for a valid DMARC Policy Record at the
name created by prepending the label &quot;_dmarc&quot; to the Author Domain of the
message being evaluated. If a valid DMARC Policy Record is found there, then this is the
DMARC Policy Record to be applied to the message; however, this does not necessarily mean
that the Author Domain is the Organizational Domain to be used in Identifier
Alignment checks. Whether this is the also the Organizational Domain is dependent
on the value of the 'psd' tag, if present, or some conditions described in
<xref target="identifier-alignment-evaluation"></xref>.</t>
<t>If no valid DMARC Policy Record is found by the first query, then perform a DNS
Tree Walk to find the Author Domain's Organizational Domain or its Public
Suffix Domain. The starting point for this DNS Tree Walk is determined as
follows:</t>

<ul spacing="compact">
<li>If the Author Domain has eight or fewer labels, the starting point will be
the immediate parent domain of the Author Domain.</li>
<li>Otherwise, the starting point will be the name produced by shortening the Author
Domain as described starting in step 3 of the <xref target="dns-tree-walk"></xref>.</li>
</ul>
<t>If the DMARC Policy Record to be applied is that of the Author Domain, then the
Domain Owner Assessment Policy is taken from the p= tag of the record.</t>
<t>If the DMARC Policy Record to be applied is that of either the Organizational Domain or the
Public Suffix Domain and the Author Domain is a subdomain of that domain, then the Domain
Owner Assessment Policy is taken from the sp= tag (if any) if the Author Domain exists,
or the np= tag (if any) if the Author Domain does not exist. In the absence of
applicable sp= or np= tags, the p= tag policy is used for subdomains.</t>
<t>If a retrieved DMARC Policy Record does not contain a valid &quot;p&quot; tag, or contains an &quot;sp&quot; or
&quot;np&quot; tag that is not valid, then:</t>

<ul>
<li><t>If a &quot;rua&quot; tag is present and contains at least one syntactically valid reporting
URI, the Mail Receiver <bcp14>MUST</bcp14> act as if a record containing &quot;p=none&quot; was
retrieved and continue processing;</t>
</li>
<li><t>Otherwise, the Mail Receiver applies no DMARC processing to this message.</t>
</li>
</ul>
<t>If the set produced by the DNS Tree Walk contains no DMARC Policy Record (i.e.,
any indication that there is no such record as opposed to a transient DNS error),
Mail Receivers <bcp14>MUST NOT</bcp14> apply the DMARC mechanism to the message.</t>
<t>Handling of DNS errors when querying for the DMARC Policy Record is
left to the discretion of the Mail Receiver. For example, to ensure
minimal disruption of mail flow, transient errors could result in
delivery of the message (&quot;fail open&quot;), or they could result in the
message being temporarily rejected (i.e., an SMTP 4yx reply), which
invites the sending MTA to try again after the condition has possibly
cleared, allowing a definite DMARC conclusion to be reached (&quot;fail
closed&quot;).</t>
<t>Note: PSD policy is not used for Organizational Domains that have
published a DMARC Policy Record. Specifically, this is not a mechanism to
provide feedback addresses (rua/ruf) when an Organizational Domain has
declined to do so.</t>
</section>

<section anchor="identifier-alignment-evaluation"><name>Identifier Alignment Evaluation</name>
<t>It may be necessary to perform multiple DNS Tree Walks to determine if an
Authenticated Identifier and an Author Domain are in alignment, meaning
that they have either the same Organizational Domain (relaxed alignment) or
that they're identical (strict alignment). DNS Tree Walks done to discover an
Organizational Domain for use in Identifier Alignment Evaluation might start
at any of the following locations:</t>

<ul spacing="compact">
<li>The Author Domain of the message being evaluated.</li>
<li>The SPF-Authenticated Identifier if there is an SPF pass result for the message
being evaluated.</li>
<li>Any DKIM-Authenticated Identifier if one or more DKIM pass results exist for
the message being evaluated.</li>
</ul>
<t>Note: There is no need to perform Tree Walk searches for Organizational Domains
under any of the following conditions:</t>

<ul spacing="compact">
<li>The Author Domain and the Authenticated Identifier(s) are all the
same domain, and there is a DMARC Policy Record published for that domain.
In this case, this common domain is treated as the Organizational Domain.
For example, if the common domain in question is &quot;mail.example.com&quot;, and
there is a valid DMARC Policy Record published at _dmarc.mail.example.com,
then mail.example.com is the Organizational Domain.</li>
<li>No applicable DMARC Policy Record is discovered for the Author Domain. In
this case, the DMARC mechanism does not apply to the message in question.</li>
<li>The DMARC Policy record for the Author Domain indicates strict alignment. In
this case, a simple string comparison of the Author Domain and the Authenticated
Identifier(s) is all that is required.</li>
</ul>
<t>To discover the Organizational Domain for a domain, perform the DNS Tree Walk
described in <xref target="dns-tree-walk"></xref> as needed for any of the domains in question.</t>
<t>For each Tree Walk that retrieved valid DMARC Policy Records, select the Organizational
Domain from the domains for which valid DMARC Policy Records were retrieved from the longest
to the shortest:</t>

<ol>
<li><t>If a valid DMARC Policy Record contains the psd= tag set to 'n' (psd=n), this is the
Organizational Domain, and the selection process is complete.</t>
</li>
<li><t>If a valid DMARC Policy Record, other than the one for the domain where the tree
walk started, contains the psd= tag set to 'y' (psd=y), the Organizational
Domain is the domain one label below this one in the DNS hierarchy, and the
selection process is complete. For example, if in the course of a tree walk a DMARC
record is queried for at first _dmarc.mail.example.com and then _dmarc.example.com,
and a valid DMARC Policy Record containing the psd= tag set to 'y' is found at
_dmarc.example.com, then &quot;mail.example.com&quot; is the domain one label below &quot;example.com&quot;
in the DNS hierarchy and is thus the Organizational Domain.</t>
</li>
<li><t>Otherwise, select the DMARC Policy Record found at the name with the fewest number
of labels.  This is the Organizational Domain and the selection process is complete.</t>
</li>
</ol>
<t>If this process does not determine the Organizational Domain, then the initial target
domain is the Organizational Domain.</t>
<t>For example, given the starting domain &quot;a.mail.example.com&quot;, a search
for the Organizational Domain would require a series of DNS queries for DMARC Policy
Records starting with &quot;_dmarc.a.mail.example.com&quot; and finishing with &quot;_dmarc.com&quot;.
If there are DMARC Policy Records published at &quot;_dmarc.mail.example.com&quot; and
&quot;_dmarc.example.com&quot;, but not at &quot;_dmarc.a.mail.example.com&quot; or
&quot;_dmarc.com&quot;, then the Organizational Domain for this domain would be
&quot;example.com&quot;.</t>
<t>As another example, given the starting domain &quot;a.mail.example.com&quot;, if a
search for the Organizational Domain yields a DMARC Policy Record at &quot;_dmarc.mail.example.com&quot;
with the psd= tag set to 'n', then the Organizational Domain for this domain would
be &quot;mail.example.com&quot;.</t>
<t>As a last example, given the starting domain &quot;a.mail.example.com&quot;, if a
search for the Organizational Domain only yields a DMARC Policy Record at &quot;_dmarc.com&quot;
and that record contains the tag psd=y, then the Organizational Domain for
this domain would be &quot;example.com&quot;.</t>
</section>
</section>
</section>

<section anchor="dmarc-participation"><name>DMARC Participation</name>
<t>This section describes the actions for participating in DMARC for each of
three unique entities - Domain Owners, PSOs, and Mail Receivers.</t>

<section anchor="domain-owner-actions"><name>Domain Owner Actions</name>
<t>A <eref target="#domain-owner">Domain Owner</eref> wishing to fully participate in DMARC will
publish a <eref target="#dmarc-policy-record">DMARC Policy Record</eref> to cover each <eref target="#author-domain">Author Domain</eref> and corresponding <eref target="#organizational-domain">Organizational Domain</eref>
to which DMARC validation should apply, send email that produces at least one, and
preferably two, <eref target="#authenticated-identifiers">Authenticated Identifiers</eref> that align
with the Author Domain, and will receive and monitor the content of DMARC aggregate
reports. The following sections describe how to achieve this.</t>

<section anchor="publish-an-spf-record-for-an-aligned-domain"><name>Publish an SPF Record for an Aligned Domain</name>
<t>To configure SPF for DMARC, the Domain Owner <bcp14>MUST</bcp14> send mail that has
an RFC5321.MailFrom domain that will produce an <eref target="#spf-authenticated-identifier">SPF-Authenticated
Identifier</eref> that aligns with the
Author Domain. The SPF record for the RFC5321.MailFrom domain <bcp14>MUST</bcp14> be
constructed at a minimum to ensure an SPF pass verdict for all sources of
mail that are authorized to use RFC5321.MailFrom domain, and <bcp14>SHOULD</bcp14> be
constructed to ensure that only those authorized sources can get an SPF pass verdict.</t>
</section>

<section anchor="configure-sending-system-for-dkim-signing-using-an-aligned-domain"><name>Configure Sending System for DKIM Signing Using an Aligned Domain</name>
<t>To configure DKIM for DMARC, the Domain Owner <bcp14>MUST</bcp14> send mail that
has a DKIM-Signing domain (i.e., the d= domain in the DKIM-Signature
header field) that will produce a <eref target="#dkim-authenticated-identifier">DKIM-Aligned Identifier</eref>
that aligns with the Author Domain.</t>
</section>

<section anchor="set-up-a-mailbox-to-receive-aggregate-reports"><name>Set Up a Mailbox to Receive Aggregate Reports</name>
<t>Proper consumption and analysis of DMARC aggregate reports are essential
to any successful DMARC deployment for a Domain Owner. DMARC aggregate
reports, which are defined in <xref target="I-D.ietf-dmarc-aggregate-reporting"></xref>,
contain valuable data for the Domain Owner, showing sources of mail
using the Author Domain.</t>
</section>

<section anchor="publish-a-dmarc-policy-record-for-the-author-domain-and-organizational-domain"><name>Publish a DMARC Policy Record for the Author Domain and Organizational Domain</name>
<t>Once SPF, DKIM, and the aggregate reports mailbox are all in place,
it's time to publish a DMARC Policy Record. For best results, Domain Owners
usually start with &quot;p=none&quot;, (see <xref target="collect-and-analyze"></xref>)
with the rua tag containing a URI that references the mailbox created
in the previous step. This is commonly referred to as putting the Author
Domain into <eref target="#monitoring-mode">Monitoring Mode</eref>. If the Organizational Domain
is different from the Author Domain, a record also needs to be published for the
Organizational Domain.</t>
</section>

<section anchor="collect-and-analyze"><name>Collect and Analyze Reports</name>
<t>The reason for starting at &quot;p=none&quot; is to ensure that nothing's been
missed in the initial SPF and DKIM deployments. In all but the most
trivial setups, a Domain Owner can overlook a server here or be unaware
of a third party sending agreement there.  Starting at &quot;p=none&quot;, therefore,
takes advantage of DMARC's aggregate reporting function, with the Domain
Owner using the reports to audit its own mail streams' authentication
configurations.</t>
<t>While it is possible for a human to read aggregate reports, they are
formatted in such a way that it is recommended that they be machine-parsed,
so setting up a mailbox involves more than just the physical creation
of that mailbox. Many third-party services exist that will process DMARC
aggregate reports or the Domain Owner can create its own set of tools.
No matter which method is chosen, the ability to consume these reports and
parse the data contained in them will go a long way to ensuring a
successful deployment.</t>
</section>

<section anchor="remediate-unaligned-or-unauthenticated-mail-streams"><name>Remediate Unaligned or Unauthenticated Mail Streams</name>
<t>DMARC aggregate reports can reveal to the Domain Owner mail streams using the
Author Domain that should be passing DMARC validation checks but are not. If
the reason for the streams not passing is due to Authenticated Identifiers being
unaligned or missing entirely, then the Domain Owner wishing to fully participate
in DMARC <bcp14>MUST</bcp14> take necessary steps to address these shortcomings.</t>
</section>

<section anchor="decide-whether-to-update-domain-owner-assessment-policy-to-enforcement"><name>Decide Whether to Update Domain Owner Assessment Policy to Enforcement</name>
<t>Once the Domain Owner is satisfied that it is properly authenticating
all of its mail, then it is time to decide if it is appropriate to
change its Domain Owner Assessment Policy to <eref target="#enforcement">Enforcement</eref>.
Depending on its cadence for sending mail, it may take many months
of consuming DMARC aggregate reports before a Domain Owner reaches
the point where it is sure that it is properly authenticating all
of its mail, and the decision on which p= value to use will depend
on its needs.</t>
<t>In making this decision it is important to understand the
interoperability issues involved and problems that can result for
mailing lists and for delivery of legitimate mail. Those
issues are discussed in detail in <xref target="interoperability-considerations"></xref></t>
</section>

<section anchor="a-note-on-large-complex-organizations-and-decentralized-dns-management"><name>A Note on Large, Complex Organizations and Decentralized DNS Management</name>
<t>Large, complex organizations frequently adopt a decentralized model for
DNS management, whereby management of a subtree of the name space is delegated
to a local department by the central IT organization. In such situations, the
'psd' tag makes it possible for those local departments to declare any arbitrary
node in their subtree as an Organizational Domain. This would be accomplished by
publishing a DMARC Policy Record at that node with the psd tag set to 'n'. The
reasons that departments might declare their own Organizational Domains include a
desire to have different policy settings or reporting URIs than the DMARC Policy Record
published for the apex domain.</t>
<t>Such configurations would work in theory, and they might involve domain names with
many labels, reflecting the structure of the organization, for example:</t>

<ul spacing="compact">
<li>Apex domain (DMARC Policy Record published here): example.com</li>
<li>Zone cut domain (DMARC Policy Record with psd=n published here): b.c.d.e.f.g.example.com</li>
<li>Author Domain: mail.a.b.c.d.e.f.g.example.com</li>
</ul>
<t>However, Domain Owners should be aware that due to the anti-abuse protections
built into the <eref target="#dns-tree-walk">DNS Tree Walk</eref>, the DMARC Policy Record published
at the zone cut domain in this example will never be discovered. A Mail Receiver
performing a Tree Walk would only perform queries for these names:</t>

<ul spacing="compact">
<li>_dmarc.mail.a.b.c.d.e.f.g.example.com</li>
<li>_dmarc.c.d.e.f.g.example.com</li>
<li>_dmarc.d.e.f.g.example.com</li>
<li>_dmarc.e.f.g.example.com</li>
<li>_dmarc.f.g.example.com</li>
<li>_dmarc.g.example.com</li>
<li>_dmarc.example.com</li>
<li>_dmarc.com</li>
</ul>
<t>To avoid this circumstance, Domain Owners wishing to have a specific DMARC Policy
Record applied to a given [Author Domain]{#author-domain) longer than eight labels
<bcp14>MUST</bcp14> publish a DMARC Policy Record at that domain's location in the DNS namespace,
as such records are always queried for by Mail Receivers that participate in DMARC.
In the above example, this would mean publishing a DMARC Policy Record at the name
_dmarc.mail.a.b.c.d.e.f.g.example.com.</t>
</section>
</section>

<section anchor="pso-actions"><name>PSO Actions</name>
<t>In addition to the DMARC Domain Owner actions, if a <eref target="#public-suffix-operator">PSO</eref>
publishes a DMARC Policy Record it <bcp14>MUST</bcp14> include the psd tag (see <xref target="policy-record-format"></xref>)
with a value of 'y' (&quot;psd=y&quot;).</t>
</section>

<section anchor="mail-receiver-actions"><name>Mail Receiver Actions</name>
<t><eref target="#mail-receiver">Mail Receivers</eref> wishing to fully participate in DMARC
will apply the DMARC mechanism to inbound email messages when a <eref target="#dmarc-policy-record">DMARC
Policy Record</eref> exists that applies to the <eref target="#author-domain">Author
Domain</eref>, and will send aggregate reports to Domain
Owners that request them. Mail Receivers might also send failure reports
to Domain Owners that request them.</t>
<t>The steps for applying the DMARC mechanism to an email message can take
place during the SMTP transaction, and should do so if the Mail Receiver
plans to honor <eref target="#domain-owner-policy">Domain Owner Assessment Policies</eref> that
are at the <eref target="#enforcement">Enforcement</eref> state.</t>
<t>Many Mail Receivers perform one or both of the underlying <eref target="#authentication-mechanisms">Authentication
Mechanisms</eref> on inbound messages even in cases
where no DMARC Policy Record exists for the Author Domain of a given message,
or where the Mail Receiver is not participating in DMARC. Nothing in this
section is intended to imply that the underlying Authentication Mechanisms
should only be performed by Mail Receivers participating in DMARC.</t>
<t>The next sections describe the steps for a Mail Receiver wishing to fully
participate in DMARC.</t>

<section anchor="extract-author-domain"><name>Extract Author Domain</name>
<t>Once the email message has been transmitted to the Mail Receiver, the Mail
Receiver extracts the domain in the RFC5322.From header field as the Author
Domain. If the domain is a U-label, the domain <bcp14>MUST</bcp14> be converted to an
A-label, as described in Section 2.3 of
<xref target="RFC5890" sectionFormat="bare" relative="#" section="RFC 5890, Internationalized Domain Names for Applications (IDNA): Definitions and Document Framework"></xref>, for
further processing.</t>
<t>If zero or more than one domain is extracted, then DMARC validation is
not possible and the process terminates. In the case where more than one
domain is retrieved, the Mail Receiver <bcp14>MAY</bcp14> choose to go forward
with DMARC validation anyway. See <xref target="denial-of-dmarc-attacks"></xref> for further
discussion.</t>
</section>

<section anchor="determine-mechanism-applies"><name>Determine If The DMARC Mechanism Applies</name>
<t>If precisely one Author Domain exists for the message, then perform the
step described in [DMARC Policy Discovery] to determine if the DMARC
mechanism applies. If a <eref target="#dmarc-policy-record">DMARC Policy Record</eref> is not
discovered during this step, then the DMARC mechanism does not apply and
DMARC validation terminates for the message.</t>
</section>

<section anchor="determine-authenticated-identifiers"><name>Determine If Authenticated Identifiers Exist</name>
<t>For each Authentication Mechanism underlying DMARC, perform the required
check to determine if an <eref target="#authenticated-identifier">Authenticated Identifier</eref>
exists for the message if such check has not already been performed. Results from
each check must be preserved for later use as follows:</t>

<ul spacing="compact">
<li>For SPF, the results <bcp14>MUST</bcp14> include &quot;pass&quot; or &quot;fail&quot;, and if &quot;fail&quot;, <bcp14>SHOULD</bcp14>
include information about the reasons for failure. The results <bcp14>MUST</bcp14> further
include the domain name used to complete the SPF check.</li>
<li>For DKIM signature validation checks, for each signature checked, the
results <bcp14>MUST</bcp14> include &quot;pass&quot; or &quot;fail&quot;, and if &quot;fail&quot;, <bcp14>SHOULD</bcp14> include
information about the reasons for failure. The results <bcp14>MUST</bcp14> further include
the value of the &quot;d=&quot; and &quot;s=&quot; tags from each checked DKIM signature.</li>
</ul>
</section>

<section anchor="conduct-alignment-checks"><name>Conduct Identifier Alignment Checks If Necessary</name>
<t>For each Authenticated Identifier found in the message, the Mail Receiver checks
to see if the Authenticated Identifier is <eref target="#identifier-alignment-evaluation">aligned</eref>
with the Author Domain.</t>
</section>

<section anchor="pass-or-fail"><name>Determine DMARC &quot;Pass&quot; or &quot;Fail&quot;</name>
<t>If one or more of the Authenticated Identifiers align with the Author Domain, the
message is considered to pass the DMARC mechanism check.</t>
<t>If no Authenticated Identifiers exist for the domain, or none of the Authenticated
Identifiers align with the Author Domain, the message is considered to fail the
DMARC mechanism check.</t>
</section>

<section anchor="apply-policy"><name>Apply Policy If Appropriate</name>
<t>Email messages that fail the DMARC mechanism check are handled in accordance with
the Mail Receiver's local policies. These local policies may take into account the Domain
Owner Assessment Policy for the Author Domain at the Mail Receiver's discretion.</t>
<t>If one or more DNS queries required to perform DMARC validation on the message
do not complete due to temporary or permanent DNS errors, the message cannot be
considered to pass or fail the DMARC mechanism check. In such cases, the Domain
Owner Assessment Policy cannot be applied to the message, and any other handling
decisions for the message are left to the discretion of the Mail Receiver.</t>
<t>See <xref target="rejecting-messages"></xref> for further discussion of topics regarding rejecting messages.</t>
</section>

<section anchor="store-results-of-dmarc-processing"><name>Store Results of DMARC Processing</name>
<t>Results obtained from the application of the DMARC mechanism by the Mail Receiver
<bcp14>SHOULD</bcp14> be stored for eventual presentation back to the Domain Owner in the form of
aggregate feedback reports.  <xref target="policy-record-format"></xref> and
<xref target="I-D.ietf-dmarc-aggregate-reporting"></xref> discuss aggregate feedback.</t>
</section>

<section anchor="send-aggregate-reports"><name>Send Aggregate Reports</name>
<t>To ensure maximum usefulness for DMARC across the email ecosystem, Mail
Receivers <bcp14>SHOULD</bcp14> generate and send aggregate reports with a frequency
of at least once every 24 hours. Such reports provide Domain Owners with
insight into all mail streams using Author Domains under the Domain Owner's
control, and aid the Domain Owner in determining whether and when to transition
from <eref target="#monitoring-mode">Monitoring Mode</eref> to <eref target="#enforcement">Enforcement</eref>.</t>
</section>

<section anchor="send-failure-reports"><name>Optionally Send Failure Reports</name>
<t>Per-message failure reports can be a useful source of information for a Domain
Owner, either for debugging deployments or in analyzing attacks, and so Mail
Receivers <bcp14>MAY</bcp14> choose to send them.  Experience has shown, however, that Mail
Receivers rightly concerned about protecting user privacy have either chosen to
heavily redact the information in such reports (which can hinder their usefulness)
or not send them at all.  See <xref target="I-D.ietf-dmarc-failure-reporting"></xref> for further information.</t>
</section>
</section>

<section anchor="policy-enforcement-considerations"><name>Policy Enforcement Considerations</name>
<t>The final handling of any message is always a matter of local policy and is
left to the discretion of the Mail Receiver.</t>
<t>A DMARC pass for a message indicates only that the use of the <eref target="#author-domain">Author Domain</eref>
has been validated for that message as authorized by the <eref target="#domain-owner">Domain Owner</eref>.
Such authorization does not carry an explicit or implicit value assertion about
that message or the Domain Owner, and Mail Receivers <bcp14>MAY</bcp14> choose to reject or
quarantine a message even if it passes the DMARC validation check.  Mail Receivers
are encouraged to maintain anti-abuse technologies to combat the possibility of
DMARC-enabled criminal campaigns.</t>
<t>Mail Receivers <bcp14>MAY</bcp14> choose to accept email that fails the DMARC
validation check even if the published Domain Owner Assessment Policy
is &quot;reject&quot;. In particular, because of the considerations discussed
in <xref target="RFC7960" sectionFormat="bare" relative="#" section="RFC 7960, Interoperability Issues between DMARC and Indirect Email Flows"></xref>
and in <xref target="interoperability-considerations"></xref> of this document, it is important that Mail
Receivers not reject messages solely because of a published policy of &quot;reject&quot;, but that they apply
other knowledge and analysis to avoid situations such as rejection of
legitimate messages sent in ways that DMARC cannot describe, harm to
the operation of mailing lists, and similar.</t>
<t>If a Mail Receiver chooses not to honor the published Domain Owner
Assessment Policy to improve interoperability among mail systems, it may
increase the likelihood of accepting abusive mail.  At a minimum, Mail
Receivers <bcp14>SHOULD</bcp14> add the Authentication-Results header field (see
<xref target="RFC8601" sectionFormat="bare" relative="#" section="RFC 8601, Message Header Field for Indicating Message Authentication Status"></xref>),
and it is <bcp14>RECOMMENDED</bcp14> when delivering messages that fail the DMARC validation check.</t>
<t>When Mail Receivers deviate from a published Domain Owner
Assessment Policy during message processing they <bcp14>SHOULD</bcp14> make
available the fact of and reason for the deviation to the Domain
Owner via feedback reporting, specifically using the
&quot;PolicyOverride&quot; feature of the aggregate report defined in
<xref target="I-D.ietf-dmarc-aggregate-reporting"></xref>.</t>
<t>To enable Domain Owners to receive DMARC feedback without impacting
existing mail processing, discovered policies of &quot;p=none&quot; <bcp14>MUST NOT</bcp14>
modify existing mail handling processes.</t>
</section>
</section>

<section anchor="dmarc-feedback"><name>DMARC Feedback</name>
<t>DMARC Feedback is described in <xref target="I-D.ietf-dmarc-aggregate-reporting"></xref></t>
<t>Operational note for PSD DMARC: For PSOs, feedback for non-existent
domains is desirable and useful, just as it is for org-level DMARC
operators. See <xref target="privacy-considerations"></xref> for discussion of
Privacy Considerations for PSD DMARC.</t>
</section>

<section anchor="other-topics"><name>Other Topics</name>
<t>This section discusses some topics regarding choices made in the
development of DMARC, largely to commit the history to record.</t>

<section anchor="issues-specific-to-spf"><name>Issues Specific to SPF</name>
<t>Though DMARC does not inherently change the semantics of an SPF
policy record, historically lax enforcement of such policies has led
many to publish extremely broad records containing many extensive network
ranges. <eref target="#domain-owner">Domain Owners</eref> are strongly encouraged to carefully review
their SPF records to understand which networks are authorized to send
on behalf of the Domain Owner before publishing a DMARC Policy Record. Furthermore,
Domain Owners should periodically review their SPF records to ensure that
the authorization conveyed by the records matches the domain's current needs.</t>
<t>Some Mail Receiver architectures might implement SPF in advance of any
DMARC operations. This means that a SPF hard fail (&quot;-&quot;) prefix on a sender's
SPF mechanism, such as &quot;-all&quot;, could cause a message to be rejected early in
the SMTP transaction, before any DMARC processing takes place, if the message
fails SPF authentication checks.  Domain Owners choosing to use &quot;-all&quot; to terminate
SPF records should be aware of this, and should understand that messages that
might otherwise pass DMARC due to an aligned <eref target="#dkim-authenticated-identifiers">DKIM-Authenticated Identifier</eref> could be rejected solely due to an SPF fail.
Domain Owners and <eref target="#mail-receiver">Mail Receivers</eref> can consult the following two
documents for more discussion of the topic and best practices regarding publishing
SPF records and when to reject based solely on SPF failure:</t>

<ul spacing="compact">
<li><eref target="https://www.m3aawg.org/Managing-SPF-Records">M3AAWG Best Practices for Managing SPF Records</eref></li>
<li><eref target="https://www.m3aawg.org/sites/default/files/m3aawg-email-authentication-recommended-best-practices-09-2020.pdf">M3AAWG Email Authentication Recommended Best Practices</eref></li>
</ul>
</section>

<section anchor="dns-load-and-caching"><name>DNS Load and Caching</name>
<t><eref target="#dmarc-policy-record">DMARC Policy Records</eref> are communicated using the DNS
and therefore inherit a number of considerations related to DNS caching. The inherent
conflict between freshness and the impact of caching on the reduction
of DNS-lookup overhead should be considered from the <eref target="#mail-receiver">Mail Receiver's</eref> point of view. If <eref target="#domain-owner">Domain Owners</eref> or <eref target="#public-suffix-operator">PSOs</eref> publish a DMARC Policy Record with a very
short TTL,  the injection of large volumes of messages could cause
Mail Receivers to overwhelm the Domain Owner's DNS hosting provider.
Although this is not a concern specific to DMARC, the implications of
a very short TTL should be considered when publishing DMARC Policy
Records.</t>
<t>Conversely, long TTLs will cause records to be cached for long
periods. This can cause a critical change to a DMARC Policy Record
to go unnoticed for the length of the TTL (while waiting for DNS caches
to expire). Avoiding this problem can mean shorter TTLs, with the potential
problems described above. A balance should be sought to maintain responsiveness
of DMARC Policy Record changes while preserving the benefits of DNS caching.</t>
</section>

<section anchor="rejecting-messages"><name>Rejecting Messages</name>
<t>The DMARC mechanism calls for rejection of a message during the SMTP
session under certain circumstances. This is preferable to
generation of a Delivery Status Notification
<xref target="RFC3464" sectionFormat="bare" relative="#" section="RFC 3464, An Extensible Message Format for Delivery Status Notifications"></xref>, since fraudulent
messages caught and rejected using the DMARC mechanism would then result in the
annoying generation of such failure reports that go back to the RFC5321.MailFrom
address.</t>
<t>This synchronous rejection is typically done in one of two ways:</t>

<ul>
<li><t>Full rejection, wherein the SMTP server issues a 5xy reply code as
an indication to the SMTP client that the transaction failed; the
SMTP client is then responsible for generating a notification that
delivery failed (see <xref target="RFC5321" sectionFormat="of" relative="#" section="4.2.5"></xref>).</t>
</li>
<li><t>A &quot;silent discard&quot;, wherein the SMTP server returns a 2xy reply
code implying to the client that delivery (or, at least, relay)
was successfully completed, but then simply discarding the message
with no further action.</t>
</li>
</ul>
<t>Each of these has a cost. For instance, a silent discard can help to
prevent backscatter, but it also effectively means that the SMTP
server has to be programmed to give a false result, which can
confound external debugging efforts.</t>
<t>Similarly, the text portion of the SMTP reply may be important to
consider. For example, when rejecting a message, revealing the
reason for the rejection might give an attacker enough information to
bypass those efforts on a later attempt, though it might also assist
a legitimate client to determine the source of some local issue that
caused the rejection.</t>
<t>In the latter case, when doing an SMTP rejection, providing a clear
hint can be useful in resolving issues. A <eref target="#mail-receiver">Mail Receiver</eref>
might indicate in plain text the reason for the rejection by using the
word &quot;DMARC&quot; somewhere in the reply text. For example:</t>

<artwork>550 5.7.1 Email rejected per DMARC policy for example.com
</artwork>
<t>Many systems are able to scan the SMTP reply text to determine the nature
of the rejection. Thus, providing a machine-detectable reason for rejection
allows the problems causing rejections to be properly addressed by automated systems.</t>
<t>If a Mail Receiver elects to defer delivery due to the inability to
retrieve or apply DMARC policy, this is best done with a 4xy SMTP
reply code.</t>
</section>

<section anchor="interoperability-issues"><name>Interoperability Issues</name>
<t>DMARC limits which end-to-end scenarios can achieve a &quot;pass&quot; result.</t>
<t>Because DMARC relies on SPF <xref target="RFC7208"></xref> and/or DKIM <xref target="RFC6376"></xref> to achieve
a &quot;pass&quot;, their limitations also apply.</t>
<t>Issues specific to the use of policy mechanisms alongside DKIM are
further discussed in <xref target="RFC6377" sectionFormat="bare" relative="#" section="RFC 6377, DKIM and Mailing Lists"></xref>, particularly
Section 5.2.</t>
<t>Mail that is sent by authorized, independent third parties might not be
sent with Identifier Alignment, also preventing a &quot;pass&quot; result. A Domain
Owner can use DMARC aggregate reports to identify this mail and take steps
to address authentication shortcomings.</t>
</section>

<section anchor="interoperability-considerations"><name>Interoperability Considerations</name>
<t>As discussed in &quot;Interoperability Issues between DMARC and Indirect
Email Flows&quot; <xref target="RFC7960"></xref>, use of p=reject can be incompatible with and
cause interoperability problems to indirect message flows such as
&quot;alumni forwarders&quot;, role-based email aliases, and mailing lists
across the Internet.</t>
<t>A domain that expects to send only targeted messages to account holders
- a bank, for example - could have account holders using addresses such
as jones@alumni.example.edu (an address that relays the messages to
another address with a real mailbox) or finance@association.example
(a role-based address that does similar relaying for the current head
of finance at the association).  When such mail is delivered to the
actual recipient mailbox, it will necessarily fail SPF checks, as the
incoming IP address will be that of example.edu or association.example,
and not an address authorized for the sending domain.  DKIM signatures
will generally remain valid in these relay situations.</t>
<blockquote><t>It is therefore critical that domains that publish p=reject
<bcp14>MUST NOT</bcp14> rely solely on SPF to secure a DMARC pass, and
<bcp14>MUST</bcp14> apply valid DKIM signatures to their messages.</t>
</blockquote><t>In the case of domains that have general users who send routine email,
those that publish a <eref target="#domain-owner-policy">Domain Owner Assessment Policy</eref>
of p=reject are likely to create significant interoperability
issues. In particular, if users in such domains post messages to mailing
lists on the Internet, those messages can cause operational problems for the
mailing lists and for the subscribers to those lists, as explained below and
in <xref target="RFC7960"></xref>.</t>
<blockquote><t>It is therefore critical that domains that host users who might
post messages to mailing lists <bcp14>SHOULD NOT</bcp14> publish Domain Owner Assessment Policies
of p=reject. Any such domains wishing to publish p=reject <bcp14>SHOULD</bcp14> first
take advantage of DMARC aggregate report data for their domain to
determine the possible impact to their users, first by publishing
p=none for at least a month, followed by publishing p=quarantine for
an equally long period of time, and comparing the message disposition
results. Domains that choose to publish p=reject <bcp14>SHOULD</bcp14> either
implement policies that their users not post to Internet mailing lists
and/or inform their users that their participation in mailing lists may
be hindered.</t>
</blockquote><t>As noted in <xref target="policy-enforcement-considerations"></xref>, <eref target="#mail-receivers">Mail Receivers</eref>
need to apply more analysis than just DMARC validation in their
disposition of incoming messages.  An example of the consequences of
honoring a Domain Owner Assessment Policy of p=reject without further analysis
is that rejecting messages that have been relayed by a mailing list can cause
the Mail Receiver's users to have their subscriptions to that mailing list canceled
by the list software's automated handling of such rejections - it looks
to the list manager as though the recipient's email address is no
longer working, so the address is automatically unsubscribed.</t>
<blockquote><t>It is therefore critical that Mail Receivers <bcp14>MUST NOT</bcp14> reject
incoming messages solely on the basis of a p=reject policy by
the sending domain.  Mail Receivers must use the DMARC
policy as part of their disposition decision, along with other
knowledge and analysis.</t>
</blockquote><t>Failure to understand and abide by these considerations can cause
legitimate, sometimes important email to be rejected, can cause
operational damage to mailing lists throughout the Internet, and
can result in trouble-desk calls and complaints from the Mail Receiver's
employees, customers, and clients.</t>
<t>As a final note, one possible mitigation to the problems caused by
Domain Owners publishing a Domain Owner Assessment Policy of p=reject when
they should not or Mail Receivers rejecting messages solely on the basis of
a p=reject policy is the Authenticated Received Chain (ARC) protocol described
in <xref target="RFC8617"></xref>.  However, as of this writing, use of ARC is nascent, as is industry
experience with it in connection with DMARC.</t>
</section>
</section>

<section anchor="iana-considerations"><name>IANA Considerations</name>
<t>This section describes actions completed by IANA.</t>

<section anchor="authentication-results-method-registry-update"><name>Authentication-Results Method Registry Update</name>
<t>IANA has added the following to the &quot;Email Authentication Methods&quot;
registry:</t>
<table align="left"><name>&quot;Authentication-Results Method Registry Update&quot;
</name>
<thead>
<tr>
<th align="left">Method</th>
<th align="left">Defined</th>
<th align="left">ptype</th>
<th align="left">Property</th>
<th align="left">Value</th>
<th align="left">Status</th>
<th align="left">Version</th>
</tr>
</thead>

<tbody>
<tr>
<td align="left">dmarc</td>
<td align="left"><xref target="RFC7489"></xref></td>
<td align="left">header</td>
<td align="left">from</td>
<td align="left">the domain portion of the RFC5322.From header field</td>
<td align="left">active</td>
<td align="left">1</td>
</tr>

<tr>
<td align="left">dmarc</td>
<td align="left"><xref target="RFC7489"></xref></td>
<td align="left">policy</td>
<td align="left">dmarc</td>
<td align="left">Evaluated DMARC policy applied/to be applied after policy options including pct: and sp: have been processed. Must be none, quarantine, or reject.</td>
<td align="left">active</td>
<td align="left">1</td>
</tr>
</tbody>
</table></section>

<section anchor="authentication-results-result-registry-update"><name>Authentication-Results Result Registry Update</name>
<t>IANA has added the following in the &quot;Email Authentication Result
Names&quot; registry:</t>
<table align="left"><name>&quot;Authentication-Results Result Registry Update&quot;
</name>
<thead>
<tr>
<th align="left">Auth Method(s)</th>
<th align="left">Code</th>
<th align="left">Specification</th>
<th align="left">Status</th>
</tr>
</thead>

<tbody>
<tr>
<td align="left">dmarc</td>
<td align="left">fail</td>
<td align="left"><xref target="RFC7489"></xref> section 11.2</td>
<td align="left">active</td>
</tr>

<tr>
<td align="left">dmarc</td>
<td align="left">none</td>
<td align="left"><xref target="RFC7489"></xref> section 11.2</td>
<td align="left">active</td>
</tr>

<tr>
<td align="left">dmarc</td>
<td align="left">pass</td>
<td align="left"><xref target="RFC7489"></xref> section 11.2</td>
<td align="left">active</td>
</tr>

<tr>
<td align="left">dmarc</td>
<td align="left">permerror</td>
<td align="left"><xref target="RFC7489"></xref> section 11.2</td>
<td align="left">active</td>
</tr>

<tr>
<td align="left">dmarc</td>
<td align="left">temperror</td>
<td align="left"><xref target="RFC7489"></xref></td>
<td align="left">active</td>
</tr>
</tbody>
</table></section>

<section anchor="feedback-report-header-fields-registry-update"><name>Feedback Report Header Fields Registry Update</name>
<t>The following has been added to the &quot;Feedback Report Header Fields&quot;
registry:</t>
<table><name>&quot;Feedback Report Header Fields&quot;
</name>
<thead>
<tr>
<th align="left">Field Name</th>
<th align="left">Description</th>
<th align="left">Multiple Apperances</th>
<th align="left">Related &quot;Feedback-Type&quot;</th>
<th align="left">Reference</th>
<th align="left">Status</th>
</tr>
</thead>

<tbody>
<tr>
<td align="left">Identity-Alignment</td>
<td align="left">indicates whether the message about which a report is being generated had any identifiers in alignment as defined in <xref target="RFC7489"></xref></td>
<td align="left">No</td>
<td align="left">auth-failure</td>
<td align="left"><xref target="RFC7489"></xref></td>
<td align="left">current</td>
</tr>
</tbody>
</table></section>

<section anchor="dmarc-tag-registry"><name>DMARC Tag Registry</name>
<t>A new registry tree called &quot;Domain-based Message Authentication,
Reporting, and Conformance (DMARC) Parameters&quot; has been created.
Within it, a new sub-registry called the &quot;DMARC Tag Registry&quot; has
been created.</t>
<t>Names of DMARC tags are registered with IANA in this new
sub-registry. New entries are assigned only for values that have
been documented in a manner that satisfies the terms of Specification
Required, per
<xref target="RFC8126" sectionFormat="bare" relative="#" section="RFC 8126, Guidelines for Writing an IANA Considerations Section in RFCs"></xref>.
Each registration includes the tag name; the specification that
defines it; a brief description; and its status, which is one of &quot;current&quot;, &quot;experimental&quot;, or
&quot;historic&quot;. The Designated Expert needs to confirm that the provided
specification adequately describes the new tag and clearly presents
how it would be used within the DMARC context by Domain Owners and
Mail Receivers.</t>
<t>To avoid version compatibility issues, tags added to the DMARC
specification are to avoid changing the semantics of existing records
when processed by implementations conforming to prior specifications.</t>
<t>The initial set of entries in this registry is as follows:</t>
<table align="left"><name>&quot;DMARC Tag Registry&quot;
</name>
<thead>
<tr>
<th align="left">Tag Name</th>
<th align="left">Reference</th>
<th align="left">Status</th>
<th align="left">Description</th>
</tr>
</thead>

<tbody>
<tr>
<td align="left">adkim</td>
<td align="left">RFC 7489</td>
<td align="left">current</td>
<td align="left">DKIM alignment mode</td>
</tr>

<tr>
<td align="left">aspf</td>
<td align="left">RFC 7489</td>
<td align="left">current</td>
<td align="left">SPF alignment mode</td>
</tr>

<tr>
<td align="left">fo</td>
<td align="left">RFC 7489</td>
<td align="left">current</td>
<td align="left">Failure reporting options</td>
</tr>

<tr>
<td align="left">np</td>
<td align="left">RFC 9091</td>
<td align="left">current</td>
<td align="left">Requested handling policy for non-existent subdomains</td>
</tr>

<tr>
<td align="left">p</td>
<td align="left">RFC 7489</td>
<td align="left">current</td>
<td align="left">Requested handling policy</td>
</tr>

<tr>
<td align="left">pct</td>
<td align="left">RFC 7489</td>
<td align="left">historic</td>
<td align="left">Sampling rate</td>
</tr>

<tr>
<td align="left">psd</td>
<td align="left">[this document]</td>
<td align="left">current</td>
<td align="left">Indicates whether policy record is published by a Public Suffix Domain</td>
</tr>

<tr>
<td align="left">rf</td>
<td align="left">RFC 7489</td>
<td align="left">historic</td>
<td align="left">Failure reporting format(s)</td>
</tr>

<tr>
<td align="left">ri</td>
<td align="left">RFC 7489</td>
<td align="left">historic</td>
<td align="left">Aggregate Reporting interval</td>
</tr>

<tr>
<td align="left">rua</td>
<td align="left">RFC 7489</td>
<td align="left">current</td>
<td align="left">Reporting URI(s) for aggregate data</td>
</tr>

<tr>
<td align="left">ruf</td>
<td align="left">RFC 7489</td>
<td align="left">current</td>
<td align="left">Reporting URI(s) for failure data</td>
</tr>

<tr>
<td align="left">sp</td>
<td align="left">RFC 7489</td>
<td align="left">current</td>
<td align="left">Requested handling policy for subdomains</td>
</tr>

<tr>
<td align="left">t</td>
<td align="left">[this document]</td>
<td align="left">current</td>
<td align="left">Test mode for the specified policy</td>
</tr>

<tr>
<td align="left">v</td>
<td align="left">RFC 7489</td>
<td align="left">current</td>
<td align="left">Specification version</td>
</tr>
</tbody>
</table></section>

<section anchor="dmarc-report-format-registry"><name>DMARC Report Format Registry</name>
<t>Also, within &quot;Domain-based Message Authentication, Reporting, and
Conformance (DMARC) Parameters&quot;, a new sub-registry called &quot;DMARC
Report Format Registry&quot; has been created.</t>
<t>Names of DMARC failure reporting formats are registered with IANA
in this registry. New entries are assigned only for values that
satisfy the definition of Specification Required, per
<xref target="RFC8126"></xref>.  In addition to a reference to a permanent
specification, each registration includes the format name, a
brief description, and its status, which must be one of &quot;current&quot;,
&quot;experimental&quot;, or &quot;historic&quot;. The Designated Expert needs to
confirm that the provided specification adequately describes the
report format and clearly presents how it would be used within the
DMARC context by Domain Owners and Mail Receivers.</t>
<t>The initial entry in this registry is as follows:</t>
<table align="left"><name>&quot;DMARC Report Format Registry&quot;
</name>
<thead>
<tr>
<th>Format Name</th>
<th>Reference</th>
<th>Status</th>
<th>Description</th>
</tr>
</thead>

<tbody>
<tr>
<td>afrf</td>
<td>RFC 7489</td>
<td>current</td>
<td>Authentication Failure Reporting Format (see <xref target="RFC6591"></xref>)</td>
</tr>
</tbody>
</table></section>

<section anchor="underscored-and-globally-scoped-dns-node-names-registry"><name>Underscored and Globally Scoped DNS Node Names Registry</name>
<t>Per <xref target="RFC8552" sectionFormat="bare" relative="#" section="RFC 8852, Scoped Interpretation of DNS Resource Records through 'Underscored' Naming of Attribute Leaves"></xref>,
please add the following entry to the &quot;Underscored and Globally Scoped DNS Node Names&quot; registry:</t>
<table align="left"><name>&quot;Underscored and Globally Scoped DNS Node Names&quot; registry
</name>
<thead>
<tr>
<th>RR Type</th>
<th>_NODE NAME</th>
<th>Reference</th>
</tr>
</thead>

<tbody>
<tr>
<td>TXT</td>
<td>_dmarc</td>
<td>RFC 7489</td>
</tr>
</tbody>
</table></section>
</section>

<section anchor="privacy-considerations"><name>Privacy Considerations</name>
<t>This section discusses issues specific to private data that may be
included if DMARC reports are requested.  Issues associated with
sending aggregate reports and failure reports are addressed in
<xref target="I-D.ietf-dmarc-aggregate-reporting"></xref> and
<xref target="I-D.ietf-dmarc-failure-reporting"></xref> respectively.</t>

<section anchor="aggregate-report-considerations"><name>Aggregate Report Considerations</name>
<t>Aggregate reports may, particularly for small organizations, provide some
limited insight into email sending patterns.  As an example, in a small
organization, an aggregate report from a particular domain may be sufficient
to make the report receiver aware of sensitive personal or business
information.  If setting an rua= tag in a DMARC Policy Record, the reporting
address needs controls appropriate to the organizational requirements to
mitigate any risk associated with receiving and handling reports.</t>
<t>In the case of rua= requests for multi-organizational PSDs, additional
information leakage considerations exist.  Multi-organizational PSDs that
do not mandate DMARC use by registrants risk exposure of private data of
registrant domains if they include the rua= tag in their DMARC Policy Record.</t>
</section>

<section anchor="failure-report-considerations"><name>Failure Report Considerations</name>
<t>Failure reports do provide insight into email sending patterns, including
specific users.  If requesting failure reports, data management controls
are needed to support appropriate management of this information.  The
additional detail available through failure reports (relative to aggregate
reports) can drive a need for additional controls.  As an example, a
company may be legally restricted from receiving data related to a specific
subsidiary.  Before requesting failure reports, any such data spillage risks
have to be addressed through data management controls or publishing DMARC
records for relevant subdomains to prevent reporting on data related to
their emails.</t>
<t>Due to the nature of the email contents which may be shared through Failure
Reports, most Mail Receivers refuse to send them out of privacy concerns. Out
of band agreements between Report Consumers and Mail Receivers may be required
to address these concerns.</t>
<t>DMARC Policy Records for multi-organizational PSDs <bcp14>MUST NOT</bcp14> include the ruf= tag.</t>
</section>
</section>

<section anchor="security-considerations"><name>Security Considerations</name>
<t>This section discusses security issues and possible remediations
(where available) for DMARC.</t>

<section anchor="authentication-methods"><name>Authentication Methods</name>
<t>Security considerations from the authentication methods used by DMARC
are incorporated here by reference.</t>
<t>Both of the email authentication methods that underlie DMARC provide some
assurance that an email was transmitted by an MTA which is authorized to
do so. SPF policies map domain names to sets of authorized MTAs <xref target="RFC7208" sectionFormat="of" relative="#" section="11.4"></xref>.
Validated DKIM signatures indicate that an email was transmitted by an MTA with
access to a private key that matches the published DKIM key record.</t>
<t>Whenever mail is sent, there is a risk that an overly permissive source
may send mail that will receive a DMARC pass result that was not, in fact,
intended by the Domain Owner. These results may lead to issues when
systems interpret DMARC pass results to indicate a message is in some way
authentic. They also allow such unauthorized senders to evade the Domain
Owner's intended message handling for DMARC validation failures.</t>
<t>To avoid this risk one must ensure that no unauthorized source can add
DKIM signatures to the domain's mail or transmit mail which will evaluate
as SPF pass. If, nonetheless, a Domain Owner wishes to include a
permissive source in a domain's SPF record, the source can be excluded
from DMARC consideration by using the '?' qualifier on the SPF record
mechanism associated with that source.</t>
</section>

<section anchor="attacks-on-reporting-uris"><name>Attacks on Reporting URIs</name>
<t>URIs published in DNS TXT records are well-understood possible
targets for attack.  Specifications such as <xref target="RFC1035"></xref> and
<xref target="RFC2142" sectionFormat="bare" relative="#" section="RFC 2142, Mailbox Names for Common Services, Roles, and Functions"></xref> either
expose or cause the exposure of email addresses that could be flooded
by an attacker, for example. Records found in the DNS such as MX, NS,
and others advertise potential attack destinations. Common DNS names such
as &quot;www&quot; plainly identify the locations at which particular services can
be found, providing destinations for targeted denial-of-service or
penetration attacks.  This all means that Domain Owners will need to harden
these addresses against various attacks, including but not limited to:</t>

<ul>
<li><t>high-volume denial-of-service attacks;</t>
</li>
<li><t>deliberate construction of malformed reports intended to identify
or exploit parsing or processing vulnerabilities;</t>
</li>
<li><t>deliberate construction of reports containing false claims for the
Submitter or Reported-Domain fields, including the possibility of
false data from compromised but known Mail Receivers.</t>
</li>
</ul>
</section>

<section anchor="dns-security"><name>DNS Security</name>
<t>The DMARC mechanism and its underlying Authentication Mechanisms (SPF, DKIM)
depend on the security of the DNS. Examples of how hostile parties can
have an adverse impact on DNS traffic include:</t>

<ul>
<li><t>If they can snoop on DNS traffic, they can get an idea of who is
sending mail.</t>
</li>
<li><t>If they can block outgoing or reply DNS messages, they can prevent
systems from discovering senders' DMARC policies.</t>
</li>
<li><t>If they can send forged response packets, they can make aligned mail
appear unaligned or vice-versa.</t>
</li>
</ul>
<t>None of these threats are unique to DMARC, and they can be addressed using
a variety of techniques, including, but not limited to:</t>

<ul>
<li><t>Signing DNS records with DNSSEC <xref target="RFC4033"></xref>, which enables recipients to
validate the integrity of DNS data and
detect and discard forged responses.</t>
</li>
<li><t>DNS over TLS <xref target="RFC7858"></xref> or DNS over HTTPS <xref target="RFC8484"></xref> can mitigate snooping
and forged responses.</t>
</li>
</ul>
</section>

<section anchor="display-name-attacks"><name>Display Name Attacks</name>
<t>A common attack in messaging abuse is the presentation of false
information in the display-name portion of the RFC5322.From header field.
For example, it is possible for the email address in that field to be
an arbitrary address or domain name while containing a well-known
name (a person, brand, role, etc.) in the display name, intending to
fool the end user into believing that the name is used legitimately.</t>
<t>Such attacks, known as display name attacks, are out of scope for DMARC.</t>
</section>

<section anchor="denial-of-dmarc-attacks"><name>Denial of DMARC Processing Attacks</name>
<t>The declaration in <xref target="extract-author-domain"></xref> and elsewhere in this document
that messages that do not contain precisely one RFC5322.From domain are
outside the scope of this document exposes an attack vector that must be
taken into consideration.</t>
<t>Because such messages are outside the scope of this document, an attacker
can craft messages with multiple RFC5322.From domains, including the spoofed
domain, in an effort to bypass DMARC validation and get the fraudulent message
to be displayed by the victim's MUA with the spoofed domain successfully shown
to the victim. In those cases where such messages are not rejected due to other
reasons (for example, many such messages would violate RFC5322's requirement that
there be precisely one From: header field), care must be taken by the Mail Receiver
to recognize such messages as the threats they might be and handle them
appropriately.</t>
<t>The case of a syntactically valid multi-valued RFC5322.From field presents a
particular challenge. Experience has shown that most such messages are abusive
and/or unwanted by their recipients, and given this fact, a Mail Receiver may make a
negative disposition decision for the message prior to and instead of its being
subjected to DMARC processing. However, in a case where a Mail Receiver requires
that the message be subject to DMARC validation, a recommended approach as per
<xref target="RFC7489"></xref> is to apply the DMARC mechanism to each domain found in the RFC5322.From
field as the Author Domain and apply the most strict policy selected among the
checks that fail. Such an approach might prove useful for a small number of
Author Domains, but it is possible that applying such logic to messages with
a large number of domains (where &quot;large&quot; is defined by each Mail Receiver) will
expose the Mail Receiver to a form of denial of service attack. Limiting the number of
Author Domains processed will avoid this risk. If not all Author Domains are
processed, then the DMARC evaluation is incomplete.</t>
</section>

<section anchor="external-report-addresses"><name>External Reporting Addresses</name>
<t>To avoid abuse by bad actors, reporting addresses generally have to
be inside the domains about which reports are requested.  To
accommodate special cases such as a need to get reports about domains
that cannot actually receive mail, <xref target="I-D.ietf-dmarc-aggregate-reporting" sectionFormat="of" relative="#" section="3"></xref> describes
a DNS-based mechanism for validating approved external reporting.</t>
<t>The obvious consideration here is an increased DNS load against
domains that are claimed as external recipients. Negative caching
will mitigate this problem, but only to a limited extent, mostly
dependent on the default TTL in the domain's SOA record.</t>
<t>Where possible, external reporting is best achieved by having the
report be directed to domains that can receive mail and simply having
it automatically forwarded to the desired external destination.</t>
<t>Note that the addresses shown in the &quot;ruf&quot; tag receive more
information that might be considered private data since it is
possible for actual email content to appear in the failure reports.
The URIs identified there are thus more attractive targets for
intrusion attempts than those found in the &quot;rua&quot; tag. Moreover,
attacking the DNS of the subject domain to cause failure data to be
routed fraudulently to an attacker's systems may be an attractive
prospect. Deployment of <xref target="RFC4033"></xref> is advisable if this is a concern.</t>
</section>

<section anchor="secure-protocols"><name>Secure Protocols</name>
<t>This document encourages the use of secure transport mechanisms to
prevent the loss of private data to third parties that may be able to
monitor such transmissions. Unencrypted mechanisms should be
avoided.</t>
<t>In particular, a message that was originally encrypted or otherwise
secured might appear in a report that is not sent securely, which
could reveal private information.</t>
</section>

<section anchor="relaxed-alignment-considerations"><name>Relaxed Alignment Considerations</name>
<t>The DMARC mechanism allows both [DKIM- and SPF-Authenticated Identifiers]{#identifier-alignment-explained}
to validate authorized use of an <eref target="#author-domain">Author Domain</eref> on behalf of a <eref target="#domain-owner">Domain Owner</eref>.  If malicious or unaware users can gain control of the SPF record or DKIM selector
records for a subdomain of the Organizational Domain, the subdomain can be used to generate email
that achieves a DMARC pass on behalf of the Organizational Domain.</t>
<t>For example, an attacker who controls the SPF record for &quot;evil.example.com&quot; can send mail
that produces an SPF-Authenticated Identifier of &quot;evil.example.com&quot; with an RFC5322.From header
field containing &quot;foo@example.com&quot; that can produce a DMARC pass for mail using the Organizational
Domain (&quot;example.com&quot;) as the Author Domain.</t>
<t>The Organizational Domain Owner should be careful not to delegate control of subdomains if this is an
issue, and consider using the <eref target="#strict-alignment">Strict Alignment</eref> option if appropriate.</t>
<t>DMARC evaluation for relaxed alignment is also highly sensitive to errors in
determining the Organizational Domain if the Author Domain does not have a published
<eref target="#dmarc-policy-record">DMARC Policy Record</eref>. If an incorrectly selected Organizational
Domain is a parent of the correct Organizational Domain, then relaxed alignment could
potentially allow a malicious sender to send mail that achieves a DMARC pass verdict.
This potential exists for both the legacy <xref target="RFC7489"></xref> and current methods for determining
the organizational domain, the latter described in <xref target="identifier-alignment-evaluation"></xref>.</t>
<t>This issue is entirely avoided by the use of Strict Alignment and publishing explicit
DMARC Policy Records for all Author Domains used in an organization's email.</t>
<t>For cases where Strict Alignment is not appropriate, this issue can be
mitigated by periodically checking the DMARC Policy Records, if any, of <eref target="#public-suffix-domain">PSDs</eref>
above the Organizational Domain in the DNS tree and (for legacy <xref target="RFC7489"></xref> checking
that appropriate PSL entries remain present). If a PSD publishes a DMARC Policy Record
without the appropriate psd=y tag, Organizational Domain owners can add psd=n to their
Organizational Domain's DMARC Policy Record so that the PSD's DMARC Policy Record will
not be incorrectly interpreted to indicate that the PSD is the Organizational Domain.</t>
</section>
</section>

</middle>

<back>
<references><name>Normative References</name>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml-ids/reference.I-D.ietf-dmarc-aggregate-reporting.xml"/>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml-ids/reference.I-D.ietf-dmarc-failure-reporting.xml"/>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.1035.xml"/>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml"/>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.3986.xml"/>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4343.xml"/>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5234.xml"/>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5321.xml"/>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5322.xml"/>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5890.xml"/>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.6376.xml"/>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.6591.xml"/>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.6651.xml"/>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.6652.xml"/>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7208.xml"/>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7405.xml"/>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7489.xml"/>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7960.xml"/>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8552.xml"/>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8601.xml"/>
</references>
<references><name>Informative References</name>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.2142.xml"/>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.2308.xml"/>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.3464.xml"/>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4033.xml"/>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5598.xml"/>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.6377.xml"/>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7858.xml"/>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8020.xml"/>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8126.xml"/>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml"/>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8484.xml"/>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8617.xml"/>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.9091.xml"/>
</references>

<section anchor="technology-considerations"><name>Technology Considerations</name>
<t>This section documents some design decisions made in the
development of DMARC. Specifically addressed here are some
suggestions that were considered but not included in the design,
with explanatory text regarding the decision.</t>

<section anchor="s-mime"><name>S/MIME</name>
<t>S/MIME, or Secure Multipurpose Internet Mail Extensions, is a
standard for encrypting and signing MIME data in a message. This
was suggested and considered as a third security protocol for
authenticating the source of a message.</t>
<t>DMARC is focused on authentication at the domain level (i.e., the
Domain Owner taking responsibility for the message), while S/MIME is
really intended for user-to-user authentication and encryption. This
alone appears to make it a bad fit for DMARC's goals.</t>
<t>S/MIME also suffers from the heavyweight problem of Public Key
Infrastructure, which means that distribution of keys used to validate
signatures needs to be incorporated. In many instances, this alone
is a showstopper. There have been consistent promises that PKI
usability and deployment will improve, but these have yet to
materialize. DMARC can revisit this choice after those barriers are
addressed.</t>
<t>S/MIME has extensive deployment in specific market segments
(government, for example) but does not enjoy similar widespread
deployment over the general Internet, and this shows no signs of
changing. DKIM and SPF are both deployed widely over the general
Internet, and their adoption rates continue to be positive.</t>
<t>Finally, experiments have shown that including S/MIME support in the
initial version of DMARC would neither cause nor enable a substantial
increase in the accuracy of the overall mechanism.</t>
</section>

<section anchor="method-exclusion"><name>Method Exclusion</name>
<t>It was suggested that DMARC include a mechanism by which a Domain
Owner could instruct Mail Receivers not to attempt validation by one
of the supported methods (e.g., &quot;check DKIM, but not SPF&quot;).</t>
<t>Specifically, consider a Domain Owner that has deployed one of the
technologies and that technology fails for some messages, but such
failures don't cause enforcement action. Deploying DMARC would cause
enforcement action for policies other than &quot;none&quot;, which would appear
to exclude participation by that Domain Owner.</t>
<t>The DMARC development team evaluated the idea of policy exception
mechanisms on several occasions and invariably concluded that there
was not a strong enough use case to include them. The target audience
for DMARC does not appear to have concerns about the failure modes of
one or the other being a barrier to DMARC's adoption.</t>
<t>In the scenario described above, the Domain Owner has a few options:</t>

<ol>
<li><t>Tighten up its infrastructure to minimize the failure modes of
the single deployed technology.</t>
</li>
<li><t>Deploy the other supported authentication mechanism, to offset
the failure modes of the first.</t>
</li>
<li><t>Deploy DMARC in a reporting-only mode.</t>
</li>
</ol>
</section>

<section anchor="sender-header-field"><name>Sender Header Field</name>
<t>It has been suggested in several message authentication efforts that
the Sender header field be checked for an identifier of interest, as
the standards indicate this as the proper way to indicate a
re-mailing of content such as through a mailing list. Most recently,
it was a protocol-level option for DomainKeys, but on evolution to
DKIM, this property was removed.</t>
<t>The DMARC development team considered this and decided not to include
support for doing so for the following reasons:</t>

<ol>
<li><t>The main user protection approach is to be concerned with what
the user sees when a message is rendered. There is no consistent
behavior among MUAs regarding what to do with the content of the
Sender field, if present. Accordingly, supporting the checking of
the Sender identifier would mean applying policy to an identifier
the end user might never actually see, which can create a vector
for attack against end users by simply forging a Sender field
containing some identifier that DMARC will like.</t>
</li>
<li><t>Although it is certainly true that this is what the Sender field
is for, its use in this way is also unreliable, making it a poor
candidate for inclusion in the DMARC evaluation algorithm.</t>
</li>
<li><t>Allowing multiple ways to discover policy introduces unacceptable
ambiguity into the DMARC validation algorithm in terms of which
policy is to be applied and when.</t>
</li>
</ol>
</section>

<section anchor="domain-existence-test"><name>Domain Existence Test</name>
<t>The presence of the &quot;np&quot; tag in this specification seemingly implies that
there would be an agreed-upon standard for determining a domain's existence.</t>
<t>Since the DMARC mechanism is focused on email, one might think that the
definition of resolvable in <xref target="RFC5321"></xref> applies. Using that definition, only
names that resolve to MX Resource Records (RRs), A RRs, or AAAA RRs are deemed
to be resolvable and to exist in the DNS. This is a common practice among Mail
Receivers to determine whether or not to accept a mail message before performing
other more expensive processing.</t>
<t>The DMARC mechanism makes no such requirement for the existence of specific DNS
RRs in order for a domain to exist; instead, if any RR exists for a domain, then
the domain exists. To use the terminology from
<xref target="RFC2308" sectionFormat="bare" relative="#" section="RFC 2308, Negative Caching of DNS Queries (DNS NCACHE)"></xref>,
an &quot;NXDOMAIN&quot; response (rcode &quot;Name Error&quot;) to a DNS
query means that the domain name does not exist, while a &quot;NODATA&quot; response (rcode
&quot;NOERROR&quot;) means that the given resource record type queried for does not exist,
but the domain name does.</t>
<t>Furthermore, in keeping with <xref target="RFC8020"></xref>, if a query for a name returns NXDOMAIN,
then not only does the name not exist, every name below it in the DNS hierarchy
also does not exist.</t>
</section>

<section anchor="organizational-domain-discovery-issues"><name>Organizational Domain Discovery Issues</name>
<t>An earlier informational version of the DMARC mechanism <xref target="RFC7489"></xref>
noted that the DNS does not provide a method by which the &quot;domain of record&quot;,
or the domain that was actually registered with a domain registrar, can
be determined given an arbitrary domain name. That version further mentioned
suggestions that have been made that attempt to glean such information from
SOA or NS resource records, but these too are not fully reliable, as the
partitioning of the DNS is not always done at administrative boundaries.</t>
<t>That previous version posited that one could &quot;climb the tree&quot; to find the
Organizational Domain, but expressed concern that an attacker could exploit
this for a denial-of-service attack through sending a high number of messages
each with a relatively large number of nonsense labels, causing a Mail Receiver
to perform a large number of DNS queries in search of a DMARC Policy Record. This
version defines a method for performing a <eref target="#dns-tree-walk">DNS Tree Walk</eref>,
and further mitigates the risk of the denial-of-service attack by expressly limiting
the number of DNS queries to execute regardless of the number of labels in the domain
name.</t>
<t>Readers curious about the previous method for Organizational Domain Discovery are
directed to <xref target="RFC7489" sectionFormat="of" relative="#" section="3.2"></xref>.</t>
</section>

<section anchor="removal-of-the-pct-tag"><name>Removal of the &quot;pct&quot; Tag</name>
<t>An earlier informational version of the DMARC mechanism <xref target="RFC7489"></xref>
included a &quot;pct&quot; tag and specified all integers from 0 to 100 inclusive
as valid values for the tag. The intent of the tag was to provide domain
owners with a method to gradually change their preferred Domain Owner Assessment
Policy (the p= tag) from 'none' to 'quarantine' or from 'quarantine' to 'reject'
by requesting the stricter treatment for just a percentage of messages
that produced DMARC results of &quot;fail&quot;.</t>
<t>Operational experience showed that the pct tag was usually not accurately
applied, unless the value specified was either &quot;0&quot; or &quot;100&quot; (the default),
and the inaccuracies with other values varied widely from implementation to
implementation. The default value was easily implemented, as it required no
special processing on the part of the Mail Receiver, while the value
of &quot;0&quot; took on unintended significance as a value used by some intermediaries
and mailbox providers as an indicator to deviate from standard handling of
the message, usually by rewriting the RFC5322.From header field in an effort to
avoid DMARC failures downstream.</t>
<t>These custom actions when the pct= tag was set to &quot;0&quot; proved valuable to the
email community. In particular, header field rewriting by an intermediary meant
that a Domain Owner's aggregate reports could reveal to the Domain Owner
how much of its traffic was routing through intermediaries that don't rewrite
the RFC5322.From header field. It required work on the part of the Domain Owner to
compare aggregate reports from before and after the p= value was changed
and pct= was included in the DMARC Policy Record with a value of &quot;0&quot;, but
the data was there. Consequently, knowing how much mail was subject to
possible DMARC failure due to a lack of RFC5322.From header field rewriting by
intermediaries could assist the Domain Owner in choosing whether or not
to move from <eref target="#monitoring-mode">Monitoring Mode</eref> to <eref target="#enforcement">Enforcement</eref>
Armed with this knowledge, the Domain Owner could make an informed decision
regarding subjecting its mail traffic to possible DMARC failures based on
the Domain Owner's tolerance for such things.</t>
<t>Because of the value provided by &quot;pct=0&quot; to Domain Owners, it was logical
to keep this functionality in the protocol; at the same time, it didn't make
sense to support a tag named &quot;pct&quot; that had only two valid values. This version
of the DMARC mechanism, therefore, introduces the &quot;t&quot; tag as shorthand for &quot;testing&quot;,
with the valid values of &quot;y&quot; and &quot;n&quot;, which are meant to be analogous in their
application by mailbox providers and intermediaries to the &quot;pct&quot; tag values
&quot;0&quot; and &quot;100&quot;, respectively.</t>
</section>
</section>

<section anchor="examples"><name>Examples</name>
<t>This section illustrates both the Domain Owner side and the Mail
Receiver side of a DMARC exchange.</t>

<section anchor="identifier-alignment-examples"><name>Identifier Alignment Examples</name>
<t>The following examples illustrate the DMARC mechanism's use of
Identifier Alignment. For brevity's sake, only message header fields are
shown, as message bodies are not considered when conducting DMARC
checks.</t>

<section anchor="spf"><name>SPF</name>
<t>The following SPF examples assume that SPF produces a passing result.
Alignment cannot exist if SPF does not produce a passing result.</t>
<t>Example 1: SPF in Strict Alignment:</t>

<artwork>     MAIL FROM: &lt;sender@example.com&gt;

     From: sender@example.com
     Date: Fri, Feb 15 2002 16:54:30 -0800
     To: receiver@example.org
     Subject: here's a sample
</artwork>
<t>In this case, the RFC5321.MailFrom domain and the Author Domain are identical.
Thus, the identifiers are in Strict Alignment.</t>
<t>Example 2: SPF in Relaxed Alignment:</t>

<artwork>     MAIL FROM: &lt;sender@child.example.com&gt;

     From: sender@example.com
     Date: Fri, Feb 15 2002 16:54:30 -0800
     To: receiver@example.org
     Subject: here's a sample
</artwork>
<t>In this case, the Author Domain (example.com) is a parent of the
RFC5321.MailFrom domain. Thus, the identifiers are in relaxed alignment
because they both have the same Organizational Domain (example.com).</t>
<t>Example 3: No SPF Identifier Alignment:</t>

<artwork>     MAIL FROM: &lt;sender@example.net&gt;

     From: sender@child.example.com
     Date: Fri, Feb 15 2002 16:54:30 -0800
     To: receiver@example.org
     Subject: here's a sample
</artwork>
<t>In this case, the RFC5321.MailFrom domain that is neither the same as,
a parent of, nor a child of the Author Domain. Thus, the identifiers
are not in alignment.</t>
</section>

<section anchor="dkim"><name>DKIM</name>
<t>The examples below assume that the DKIM signatures pass validation.
Alignment cannot exist with a DKIM signature that does not validate.</t>
<t>Example 1: DKIM in Strict Alignment:</t>

<artwork>     DKIM-Signature: v=1; ...; d=example.com; ...
     From: sender@example.com
     Date: Fri, Feb 15 2002 16:54:30 -0800
     To: receiver@example.org
     Subject: here's a sample
</artwork>
<t>In this case, the DKIM &quot;d=&quot; parameter and the Author Domain have
identical DNS domains. Thus, the identifiers are in Strict Alignment.</t>
<t>Example 2: DKIM in Relaxed Alignment:</t>

<artwork>     DKIM-Signature: v=1; ...; d=example.com; ...
     From: sender@child.example.com
     Date: Fri, Feb 15 2002 16:54:30 -0800
     To: receiver@example.org
     Subject: here's a sample
</artwork>
<t>In this case, the DKIM signature's &quot;d=&quot; parameter includes a DNS
domain that is a parent of the Author Domain. Thus, the
identifiers are in relaxed alignment, as they have the same
Organizational Domain (example.com).</t>
<t>Example 3: No DKIM Identifier Alignment:</t>

<artwork>     DKIM-Signature: v=1; ...; d=example.net; ...
     From: sender@child.example.com
     Date: Fri, Feb 15 2002 16:54:30 -0800
     To: receiver@example.org
     Subject: here's a sample
</artwork>
<t>In this case, the DKIM signature's &quot;d=&quot; parameter includes a DNS
domain that is neither the same as, a parent of, nor a child of the
Author Domain. Thus, the identifiers are not in alignment.</t>
</section>
</section>

<section anchor="domain-owner-example"><name>Domain Owner Example</name>
<t>A Domain Owner that wants to use DMARC should have already deployed
and tested SPF and DKIM. The next step is to publish a DMARC Policy
Record for the Domain Owner's Organizational Domain.</t>

<section anchor="entire-domain-monitoring-mode"><name>Entire Domain, Monitoring Mode</name>
<t>The Domain Owner for &quot;example.com&quot; has deployed SPF and DKIM on
its messaging infrastructure. The Domain Owner wishes to begin using DMARC
with a policy that will solicit aggregate feedback from Mail Receivers
without affecting how the messages are processed in order to:</t>

<ul>
<li><t>Confirm that its legitimate messages are authenticating correctly</t>
</li>
<li><t>Validate that all authorized message sources have implemented
authentication measures</t>
</li>
<li><t>Determine how many messages from other sources would be affected
by publishing a Domain Owner Assessment Policy at Enforcement</t>
</li>
</ul>
<t>The Domain Owner accomplishes this by constructing a DMARC Policy Record
indicating that:</t>

<ul>
<li><t>The version of DMARC being used is &quot;DMARC1&quot; (&quot;v=DMARC1;&quot;)</t>
</li>
<li><t>Mail Receivers should not alter how they treat these messages because
of this DMARC Policy Record (&quot;p=none&quot;)</t>
</li>
<li><t>Aggregate feedback reports are sent via email to the address
&quot;dmarc-feedback@example.com&quot;
(&quot;rua=<eref target="mailto:dmarc-feedback@example.com&quot;">mailto:dmarc-feedback@example.com"</eref>)</t>
</li>
<li><t>All messages from this Organizational Domain are subject to this
policy (no &quot;t&quot; tag present, so the default of &quot;n&quot; applies).</t>
</li>
</ul>
<t>The DMARC Policy Record might look like this when retrieved using a
common command-line tool:</t>

<artwork>  % dig +short TXT _dmarc.example.com.
  &quot;v=DMARC1; p=none; rua=mailto:dmarc-feedback@example.com&quot;
</artwork>
<t>To publish such a record, the DNS administrator for the Domain Owner
creates an entry like the following in the appropriate zone file
(following the conventional zone file format):</t>

<artwork>  ; DMARC Policy Record for the domain example.com

  _dmarc  IN TXT ( &quot;v=DMARC1; p=none; &quot;
                   &quot;rua=mailto:dmarc-feedback@example.com&quot; )
</artwork>
</section>

<section anchor="entire-domain-monitoring-mode-per-message-reports"><name>Entire Domain, Monitoring Mode, Per-Message Reports</name>
<t>The Domain Owner from the previous example has used the aggregate
reporting to discover some messaging systems that had not yet
implemented DKIM correctly, but they are still seeing periodic
authentication failures. To diagnose these intermittent
problems, they wish to request per-message failure reports when
authentication failures occur.</t>
<t>Not all Mail Receivers will honor such a request, but the Domain Owner
feels that any reports it does receive will be helpful enough to
justify publishing this record. The default per-message report
format (<xref target="RFC6591"></xref>) meets the Domain Owner's needs in this scenario.</t>
<t>The Domain Owner accomplishes this by adding the following to its
DMARC Policy Record from <xref target="entire-domain-monitoring-mode"></xref>:</t>

<ul spacing="compact">
<li>Per-message failure reports are sent via email to the
address &quot;auth-reports@example.com&quot;
(&quot;ruf=<eref target="mailto:auth-reports@example.com&quot;">mailto:auth-reports@example.com"</eref>)</li>
</ul>
<t>The DMARC Policy Record might look like this when retrieved using a
common command-line tool (the output shown would appear on a single
line but is wrapped here for publication):</t>

<artwork>  % dig +short TXT _dmarc.example.com.
  &quot;v=DMARC1; p=none; rua=mailto:dmarc-feedback@example.com;
   ruf=mailto:auth-reports@example.com&quot;
</artwork>
<t>To publish such a record, the DNS administrator for the Domain Owner
might create an entry like the following in the appropriate zone file
(following the conventional zone file format):</t>

<artwork>  ; DMARC Policy Record for the domain example.com

  _dmarc  IN TXT ( &quot;v=DMARC1; p=none; &quot;
                    &quot;rua=mailto:dmarc-feedback@example.com; &quot;
                    &quot;ruf=mailto:auth-reports@example.com&quot; )
</artwork>
</section>

<section anchor="per-message-failure-reports-directed-to-third-party"><name>Per-Message Failure Reports Directed to Third Party</name>
<t>The Domain Owner from the previous example is maintaining the same
policy but now wishes to have a third party serve as a Report Consumer.
Again, not all Mail Receivers will honor this request, but those that
do may implement additional checks to validate that the third party wishes
to receive the failure reports for this domain.</t>
<t>The Domain Owner needs to alter its DMARC Policy Record from <xref target="entire-domain-monitoring-mode-per-message-reports"></xref>
as follows:</t>

<ul spacing="compact">
<li>Per-message failure reports are sent via email to the
address &quot;auth-reports@thirdparty.example.net&quot;
(&quot;ruf=<eref target="mailto:auth-reports@thirdparty.example.net&quot;">mailto:auth-reports@thirdparty.example.net"</eref>)</li>
</ul>
<t>The DMARC Policy Record might look like this when retrieved using a
common command-line tool (the output shown would appear on a single
line but is wrapped here for publication):</t>

<artwork>  % dig +short TXT _dmarc.example.com.
  &quot;v=DMARC1; p=none; rua=mailto:dmarc-feedback@example.com;
   ruf=mailto:auth-reports@thirdparty.example.net&quot;
</artwork>
<t>To publish such a record, the DNS administrator for the Domain Owner
might create an entry like the following in the appropriate zone file
(following the conventional zone file format):</t>

<artwork>  ; DMARC Policy Record for the domain example.com

  _dmarc IN TXT ( &quot;v=DMARC1; p=none; &quot;
                  &quot;rua=mailto:dmarc-feedback@example.com; &quot;
                  &quot;ruf=mailto:auth-reports@thirdparty.example.net&quot; )
</artwork>
<t>Because the address used in the &quot;ruf&quot; tag is outside the Organizational Domain
in which this record is published, conforming Mail Receivers will implement
additional checks as described in <xref target="I-D.ietf-dmarc-aggregate-reporting" sectionFormat="of" relative="#" section="3"></xref>.
To pass these additional checks, the Report Consumer's Domain Owner will need to
publish an additional DMARC Policy Record as follows:</t>

<ul spacing="compact">
<li>Given the DMARC Policy Record published by the Domain Owner at
&quot;_dmarc.example.com&quot;, the DNS administrator for the Report Consumer
will need to publish a TXT resource record at
&quot;example.com._report._dmarc.thirdparty.example.net&quot; with the value
&quot;v=DMARC1;&quot;.</li>
</ul>
<t>The resulting DMARC Policy Record might look like this when retrieved using a
common command-line tool:</t>

<artwork>  % dig +short TXT example.com._report._dmarc.thirdparty.example.net
  &quot;v=DMARC1;&quot;
</artwork>
<t>To publish such a record, the DNS administrator for example.net might
create an entry like the following in the appropriate zone file
(following the conventional zone file format):</t>

<artwork>  ; zone file for thirdparty.example.net
  ; Accept DMARC failure reports on behalf of example.com

  example.com._report._dmarc   IN   TXT    &quot;v=DMARC1;&quot;
</artwork>
</section>

<section anchor="subdomain-sampling-and-multiple-aggregate-report-uris"><name>Subdomain, Testing, and Multiple Aggregate Report URIs</name>
<t>The Domain Owner has implemented SPF and DKIM in a subdomain used for
pre-production testing of messaging services.  It now wishes to express
a handling preference for messages from this subdomain that fail DMARC validation
to indicate to participating Mail Receivers that use of this domain is not valid.</t>
<t>As a first step, it will express that it considers messages using this
subdomain that fail DMARC validation to be suspicious. The goal here
will be to enable examination of messages sent to mailboxes hosted by
participating Mail Receivers as a method for troubleshooting any existing
authentication issues. Aggregate feedback reports will be sent to
a mailbox within the Organizational Domain, and to a mailbox at a Report
Consumer selected and authorized to receive them by the Domain Owner.</t>
<t>The Domain Owner will accomplish this by constructing a DMARC Policy Record
indicating that:</t>

<ul>
<li><t>The version of DMARC being used is &quot;DMARC1&quot; (&quot;v=DMARC1;&quot;)</t>
</li>
<li><t>It is applied only to this subdomain (the DMARC Policy Record is published at
&quot;_dmarc.test.example.com&quot; and not &quot;_dmarc.example.com&quot;)</t>
</li>
<li><t>Mail Receivers are advised that the Domain Owner considers messages
that fail to authenticate to be suspicious (&quot;p=quarantine&quot;)</t>
</li>
<li><t>Aggregate feedback reports are sent via email to the
addresses &quot;dmarc-feedback@example.com&quot; and
&quot;example-tld-test@thirdparty.example.net&quot;
(&quot;rua=<eref target="mailto:dmarc-feedback@example.com">mailto:dmarc-feedback@example.com</eref>,
 <eref target="mailto:tld-test@thirdparty.example.net&quot;)">mailto:tld-test@thirdparty.example.net")</eref></t>
</li>
<li><t>The Domain Owner desires only that an actor performing a DMARC
validation check apply any special handling rules it might have
in place, such as rewriting the RFC53322.From header field; the Domain
Owner is testing its setup at this point and so does not want
the handling policy to be applied. (&quot;t=y&quot;)</t>
</li>
</ul>
<t>The DMARC Policy Record might look like this when retrieved using a
common command-line tool (the output shown would appear on a single
line but is wrapped here for publication):</t>

<artwork>  % dig +short TXT _dmarc.test.example.com
  &quot;v=DMARC1; p=quarantine; rua=mailto:dmarc-feedback@example.com,
   mailto:tld-test@thirdparty.example.net; t=y&quot;
</artwork>
<t>To publish such a record, the DNS administrator for the Domain Owner
might create an entry like the following in the appropriate zone
file:</t>

<artwork>  ; DMARC Policy Record for the domain test.example.com

  _dmarc IN  TXT  ( &quot;v=DMARC1; p=quarantine; &quot;
                    &quot;rua=mailto:dmarc-feedback@example.com,&quot;
                    &quot;mailto:tld-test@thirdparty.example.net;&quot;
                    &quot;t=y&quot; )
</artwork>
<t>Once enough time has passed to allow for collecting enough reports to
give the Domain Owner confidence that all authorized email sent using
the subdomain is properly authenticating and passing DMARC validation checks,
then the Domain Owner can update the DMARC Policy Record to indicate that it considers
validation failures to be a clear indication that use of the subdomain
is not valid. It would do this by altering the record to advise Mail Receivers
of its position on such messages (&quot;p=reject&quot;) and removing the testing flag (&quot;t=y&quot;).</t>
<t>After alteration, the DMARC Policy Record might look like this when retrieved
using a common command-line tool (the output shown would appear on a single
line but is wrapped here for publication):</t>

<artwork>  % dig +short TXT _dmarc.test.example.com
  &quot;v=DMARC1; p=reject; rua=mailto:dmarc-feedback@example.com,
   mailto:tld-test@thirdparty.example.net&quot;
</artwork>
<t>To publish such a record, the DNS administrator for the Domain Owner
might create an entry like the following in the appropriate zone
file:</t>

<artwork>  ; DMARC Policy Record for the domain test.example.com

  _dmarc IN  TXT  ( &quot;v=DMARC1; p=reject; &quot;
                    &quot;rua=mailto:dmarc-feedback@example.com,&quot;
                    &quot;mailto:tld-test@thirdparty.example.net&quot; )
</artwork>
</section>
</section>

<section anchor="mail-receiver-example"><name>Mail Receiver Example</name>
<t>A Mail Receiver that wants to participate in DMARC should already be checking
SPF and DKIM, and possess the ability to collect relevant information
from various email-processing stages to provide feedback to Domain
Owners (possibly via Report Consumers).</t>

<section anchor="smtp-session-example"><name>SMTP Session Example</name>
<t>An optimal DMARC-enabled Mail Receiver performs validation and
Identifier Alignment checking during the SMTP <xref target="RFC5321"></xref> conversation.</t>
<t>Before returning a final reply to the DATA command, the Mail
Receiver's MTA has performed:</t>

<ol>
<li><t>An SPF check to determine an SPF-Authenticated Identifier.</t>
</li>
<li><t>DKIM checks that yield one or more DKIM-Authenticated
Identifiers.</t>
</li>
<li><t>A DMARC Policy Record lookup.</t>
</li>
</ol>
<t>The presence of an Author Domain DMARC Policy Record indicates that the Mail
Receiver should continue with DMARC-specific processing before returning a
reply to the DATA command.</t>
<t>Given a DMARC Policy Record and the set of Authenticated Identifiers, the
Mail Receiver checks to see if the Authenticated Identifiers align
with the Author Domain (taking into consideration any strict versus
relaxed options found in the DMARC Policy Record).</t>
<t>For example, the following sample data is considered to be from a
piece of email originating from the Domain Owner of &quot;example.com&quot;:</t>

<artwork>  Author Domain: example.com
  SPF-authenticated Identifier: mail.example.com
  DKIM-authenticated Identifier: example.com
  DMARC Policy Record:
    &quot;v=DMARC1; p=reject; aspf=r;
     rua=mailto:dmarc-feedback@example.com&quot;
</artwork>
<t>In the above sample, the SPF-Authenticated Identifier and the
DKIM-Authenticated Identifier both align with the Author Domain. The
Mail Receiver considers the above email to pass the DMARC check, avoiding
the &quot;reject&quot; policy that is requested to be applied to email that fails
the DMARC validation check.</t>
<t>If no Authenticated Identifiers align with the Author Domain, then
the Mail Receiver applies the Domain Owner Assessment Policy. However,
before this action is taken, the Mail Receiver can consult external
information to override the Domain Owner Assessment Policy. For example,
if the Mail Receiver knows that this particular email came
from a known and trusted forwarder (that happens to break both SPF
and DKIM), then the Mail Receiver may choose to ignore the Domain
Owner Assessment Policy.</t>
<t>The Mail Receiver is now ready to reply to the DATA command. If the
DMARC check yields that the message is to be rejected, then the Mail
Receiver replies with a 5xy code to inform the sender of failure. If
the DMARC check cannot be resolved due to transient network errors,
then the Mail Receiver replies with a 4xy code to inform the sender
as to the need to reattempt delivery later. If the DMARC check
yields a passing message, then the Mail Receiver continues with
email processing, perhaps using the result of the DMARC check as an
input to additional processing modules such as a domain reputation
query.</t>
<t>Before exiting DMARC-specific processing, the Mail Receiver checks to
see if the Author Domain DMARC Policy Record requests AFRF-based reporting.
If so, then the Mail Receiver can emit an AFRF to the reporting
address supplied in the DMARC Policy Record.</t>
<t>At the exit of DMARC-specific processing, the Mail Receiver captures
(through logging or direct insertion into a data store) the result of
DMARC processing. Captured information is used to build feedback for
Domain Owner consumption. This is unnecessary if the Domain Owner
has not requested aggregate reports, i.e., no &quot;rua&quot; tag was found in
the policy record.</t>
</section>
</section>

<section anchor="treewalk-example"><name>Organizational and Policy Domain Tree Walk Examples</name>
<t>If an Author Domain has no DMARC Policy Record, a Mail Receiver uses a tree walk
to find the DMARC Policy.</t>
<t>If the DMARC Policy Record allows relaxed alignment and the SPF- or DKIM-Authenticated
Identifiers are different from the Author Domain, a Mail Receiver uses a tree walk to
discover the respective Organizational Domains to determine Identifier Alignment.</t>

<section anchor="simple-organizational-and-policy-example"><name>Simple Organizational and Policy Example</name>
<t>A Mail Receiver receives an email with:</t>

<dl spacing="compact">
<dt>Author Domain</dt>
<dd>example.com</dd>
<dt>RFC5321.MailFrom domain</dt>
<dd>example.com</dd>
<dt>DKIM signature d=</dt>
<dd>signing.example.com</dd>
</dl>
<t>In this example, _dmarc.example.com and _dmarc.signing.example.com both
have DMARC Policy Records while _dmarc.com does not. If SPF or DKIM yield pass
results, they still have to be aligned to support a DMARC pass. Since
not all domains are the same, if the alignment is relaxed then the tree
walk is performed to determine the Organizational Domain for each:</t>
<t>For the Author Domain, query _dmarc.example.com and _dmarc.com;
example.com is the last element of the DNS tree with a DMARC Policy Record, so
it is the Organizational Domain for example.com.</t>
<t>For the RFC5321.MailFrom domain, the Organizational Domain already found for
example.com is example.com, so SPF is aligned.</t>
<t>For the DKIM d= domain, query _dmarc.signing.example.com, _dmarc.example.com,
and _dmarc.com. Both signing.example.com and example.com have DMARC Policy Records,
but example.com is the highest element in the tree with a DMARC Policy Record
(it has the fewest labels), so example.com is the Organizational Domain. Since
this is also the Organizational Domain for the Author Domain, DKIM is aligned
for relaxed alignment.</t>
<t>Since both SPF and DKIM are aligned, they can be used to determine if the
message has a DMARC pass result. If the result is not pass, then the policy
domain's DMARC Policy Record is used to determine the appropriate policy. In this
case, since the RFC5322.From domain has a DMARC Policy Record, that is the policy
domain.</t>
</section>

<section anchor="deep-tree-walk-example"><name>Deep Tree Walk Example</name>
<t>A Mail Receiver receives an email with:</t>

<dl spacing="compact">
<dt>Author Domain</dt>
<dd>a.b.c.d.e.f.g.h.i.j.k.example.com</dd>
<dt>RFC5321.MailFrom domain</dt>
<dd>example.com</dd>
<dt>DKIM signature d=</dt>
<dd>signing.example.com</dd>
</dl>
<t>Both _dmarc.example.com and _dmarc.signing.example.com have DMARC Policy Records,
while _dmarc.com does not. If SPF or DKIM yield pass results, they still have
to be aligned to support a DMARC pass. Since not all domains are the same, if
the alignment is relaxed then the tree walk is performed to determine the Organizational
Domain for each:</t>
<t>For the Author Domain, query _dmarc.a.b.c.d.e.f.g.h.i.j.k.example.com,
skip to _dmarc.g.h.i.j.k.example.com, then query _dmarc.h.i.j.k.example.com,
_dmarc.i.j.k.example.com, _dmarc.j.k.example.com, _dmarc.k.example.com,
 _dmarc.example.com, and _dmarc.com. None of
a.b.c.d.e.f.g.h.i.j.k.example.com, g.h.i.j.k.example.com, h.i.j.k.example.com,
i.j.k.example.com, j.k.example.com, or k.example.com have a DMARC Policy Record.</t>
<t>Since example.com is the last element of the DNS tree with a DMARC Policy Record,
it is the Organizational Domain for a.b.c.d.e.f.g.h.i.j.k.example.com.</t>
<t>For the RFC5321.MailFrom domain, the Organizational domain already found
for example.com is example.com. SPF is aligned.</t>
<t>For the DKIM d= domain, query _dmarc.signing.example.com, _dmarc.example.com,
and _dmarc.com. Both signing.example.com and example.com have DMARC Policy Records,
but example.com is the highest element in the tree with a DMARC Policy Record, so
example.com is the Organizational Domain. Since this is also the Organizational Domain
for the Author Domain, DKIM is aligned for relaxed alignment.</t>
<t>Since both SPF and DKIM are aligned, they can be used to determine if the
message has a DMARC pass result. If the results for both are not pass, then
the policy domain's DMARC Policy Record is used to determine the appropriate policy.
In this case, the Author Domain does not have a DMARC Policy Record, so the
policy domain is the highest element in the DNS tree with a DMARC Policy Record,
example.com.</t>
</section>

<section anchor="example-with-a-psd-dmarc-policy-record"><name>Example with a PSD DMARC Policy Record</name>
<t>In rare cases, a PSD publishes a DMARC Policy Record with a psd tag, which the tree
walk must take into account.</t>
<t>A Mail Receiver receives an email with:</t>

<dl spacing="compact">
<dt>Author Domain</dt>
<dd>giant.bank.example</dd>
<dt>RFC5321.MailFrom domain</dt>
<dd>mail.giant.bank.example</dd>
<dt>DKIM signature d=</dt>
<dd>mail.mega.bank.example</dd>
</dl>
<t>In this case, _dmarc.bank.example has a DMARC Policy Record which includes the psd=y tag,
and _dmarc.example does not have a DMARC Policy Record.
While _dmarc.giant.bank.example has a DMARC Policy Record without a psd tag,
_dmarc.mega.bank.example and _dmarc.mail.mega.bank.example have no DMARC Policy Records.</t>
<t>Since the three domains are all different, tree walks find their Organizational Domains
to see which are aligned.</t>
<t>For the Author Domain giant.bank.example, the tree walk finds the DMARC Policy Record at _dmarc.giant.bank.example,
then the DMARC Policy Record at _dmarc.bank.example, and stops because of the psd=y flag.
The Organizational Domain is giant.bank.example because it is the domain directly below the one with psd=y.
Since the Organizational Domain has a DMARC Policy Record, it is also the policy domain.</t>
<t>For the RFC5321.MailFrom domain, the tree walk finds no DMARC Policy Record at _dmarc.mail.giant.bank.example,
the DMARC Policy Record at _dmarc.giant.bank.example,
then the DMARC Policy Record at _dmarc.bank.example, and stops because of the psd=y flag.
Again the Organizational Domain is giant.bank.example because it is the domain directly below the one with psd=y.
Since this is the same Organizational Domain as the Author Domain, SPF is aligned.</t>
<t>For the DKIM signature domain mail.mega.bank.example, the tree walk finds no DMARC Policy Records at
_dmarc.mail.mega.bank.example or _dmarc.mega.bank.example,
then finds the DMARC Policy Record at _dmarc.bank.example and stops because of the psd=y flag.
The Organizational Domain is mega.bank.example, so DKIM is not aligned.</t>
<t>Since SPF is aligned, it can be used to determine if the
message has a DMARC pass result.  If the result is not pass, then the policy
domain's DMARC Policy Record is used to determine the appropriate policy.</t>
</section>
</section>

<section anchor="utilization-of-aggregate-feedback-example"><name>Utilization of Aggregate Feedback: Example</name>
<t>Aggregate feedback is consumed by Domain Owners to enable their
understanding of how a given domain is being processed by the Mail
Receiver. Aggregate reporting data on emails that pass all underlying
authentication checks is used by Domain Owners to validate that their
authentication practices remain accurate. For example, if a third party
is sending on behalf of a Domain Owner, the Domain Owner can use aggregate
report data to validate ongoing authentication practices of the third party.</t>
<t>Data on email that only partially passes underlying authentication
checks provides visibility into problems that need to be addressed by
the Domain Owner. For example, if either SPF or DKIM fails to produce
an Authenticated Identifier, the Domain Owner is provided with enough
information to either directly correct the problem or understand where
authentication-breaking changes are being introduced in the email
transmission path.  If authentication-breaking changes due to email
transmission path cannot be directly corrected, then the Domain Owner at least
maintains an understanding of the effect of DMARC-based policies upon
the Domain Owner's email.</t>
<t>Data on email that fails all underlying authentication checks
provides baseline visibility on how the Domain Owner's domain is
being received at the Mail Receiver. Based on this visibility, the
Domain Owner can begin deployment of authentication technologies
across uncovered email sources, if the mail that is failing the checks
was generated by or on behalf of the Domain Owner. Data regarding
failing authentication checks can also allow the Domain Owner to
come to an understanding of how its domain is being misused.</t>
</section>
</section>

<section anchor="rfc7849-changes"><name>Changes from RFC 7489</name>
<t>This document is intended to render <xref target="RFC7489"></xref> obsolete. As one might guess,
that means there are significant differences between RFC 7489 and this
document. This section will summarize those changes.</t>

<section anchor="ietf-category"><name>IETF Category</name>
<t>RFC 7489 was not an Internet Standards Track specification; it was instead
published in the Informational Category. This document, by contrast, is intended
to be Internet Standards Track.</t>
</section>

<section anchor="changes-to-terminology-and-definitions"><name>Changes to Terminology and Definitions</name>
<t>The following changes were made to the Terminology and Definitions section.</t>

<section anchor="terms-added"><name>Terms Added</name>
<t>These terms were added:</t>

<ul spacing="compact">
<li>Domain Owner Assessment Policy</li>
<li>Enforcement</li>
<li>Monitoring Mode</li>
<li>Non-existent Domains</li>
<li>Public Suffix Domain (PSD)</li>
<li>Public Suffix Operator (PSO)</li>
<li>PSO Controlled Domain Names</li>
</ul>
</section>

<section anchor="definitions-updated"><name>Definitions Updated</name>
<t>These definitions were updated:</t>

<ul spacing="compact">
<li>Organizational Domain</li>
<li>Report Receiver (renamed to Report Consumer)</li>
</ul>
</section>
</section>

<section anchor="policy-discovery-and-organizational-domain-determination"><name>Policy Discovery and Organizational Domain Determination</name>
<t>The algorithms for DMARC policy discovery and for determining the Organizational Domain
have been changed. Specifically, reliance on the Public Suffix List (PSL) has been replaced
by a technique called a &quot;DNS Tree Walk&quot;, and the methodology for the DNS Tree Walk is explained
in detail in this document.</t>
<t>The DNS Tree Walk also incorporates PSD policy discovery, which was introduced in
<xref target="RFC9091" sectionFormat="bare" relative="#" section="RFC 9091, Experimental DMARC Extension for Public Suffix Domains"></xref>.  <xref target="RFC9091"></xref> was an Experimental
RFC, and the results of that experiment were that the RFC was not implemented as written. Instead,
this document redefines the algorithm for PSD policy discovery, and thus obsoletes <xref target="RFC9091"></xref>.</t>
</section>

<section anchor="reporting"><name>Reporting</name>
<t>Discussion of both aggregate and failure reporting have been moved to separate documents
dedicated to the topics.</t>
<t>In addition, the ability to specify a maximum report size in the DMARC URI has been removed.</t>
</section>

<section anchor="tags"><name>Tags</name>
<t>Several tags have been added to the &quot;DMARC Policy Record Format&quot; section of this document since
RFC 7489 was published, and at the same time, several others were removed.</t>

<section anchor="tags-added"><name>Tags Added:</name>

<ul spacing="compact">
<li>np - Policy for non-existent domains (Imported from <xref target="RFC9091"></xref>)</li>
<li>psd - Flag indicating whether a domain is a Public Suffix Domain</li>
<li>t - Replacement for some pct tag functionality. See <xref target="removal-of-the-pct-tag"></xref> for further discussion</li>
</ul>
</section>

<section anchor="tags-removed"><name>Tags Removed:</name>

<ul spacing="compact">
<li>pct - Tag requesting application of DMARC policy to only a percentage of messages</li>
<li>rf - Tag specifying requested format of failure reports</li>
<li>ri - Tag specifying requested interval between aggregate reports</li>
</ul>
</section>
</section>

<section anchor="expansion-of-domain-owner-actions-section"><name>Expansion of Domain Owner Actions Section</name>
<t>RFC 7489 had just two paragraphs in its Domain Owner Actions section, and while
the content of those paragraphs was correct, it was minimalist in its approach to
providing guidance to domain owners on just how to implement DMARC.</t>
<t>This document provides much more detail and explanatory text to a Domain Owner,
focusing not just on what to do to implement DMARC, but also on the reasons for
each step and the repercussions of each decision.</t>
<t>In particular, this document makes explicit that domains for general-purpose
email <bcp14>SHOULD NOT</bcp14> deploy a DMARC policy of p=reject. See <xref target="interoperability-considerations"></xref>
for further discussion of this topic.</t>
</section>

<section anchor="report-generator-recommendations"><name>Report Generator Recommendations</name>
<t>In the cases where a DMARC Policy Record specifies multiple destinations for either aggregate
reports or failure reports, RFC 7489 stated:</t>

<artwork>  Receivers **MAY** impose a limit on the number of URIs to which they
  will send reports but **MUST** support the ability to send to at least
  two.
</artwork>
<t>This document in <xref target="dmarc-uris"></xref> says:</t>

<artwork>  A report **SHOULD** be sent to each listed URI provided in the DMARC 
  record.
</artwork>
</section>

<section anchor="removal-of-rfc-7489-appendix-a-5"><name>Removal of RFC 7489 Appendix A.5</name>
<t>One of the appendices in RFC 7489, specifically <xref target="RFC7489" sectionFormat="bare" relative="#" section="Appendix A.5"></xref>,
has been removed from the text with this update. The appendix was titled
&quot;Issues with ADSP in Operation&quot; and it contained a list of issues associated
with ADSP that influenced the direction of DMARC. The ADSP protocol was moved
to &quot;Historic&quot; status in 2013 and working group consensus was that such a
discussion of ADSP's influence on DMARC was no longer relevant.</t>
</section>

<section anchor="rfc-7489-errata-summary"><name>RFC 7489 Errata Summary</name>
<t>Remove this before final submission:
    (<eref target="https://www.rfc-editor.org/styleguide/part2/#ref_errata">https://www.rfc-editor.org/styleguide/part2/#ref_errata</eref> says errata in the Reported
     state should not be referenced; they are not considered stable.)</t>
<t>This document and its companion documents (<xref target="I-D.ietf-dmarc-aggregate-reporting"></xref>
and <xref target="I-D.ietf-dmarc-failure-reporting"></xref>) address the following errata
filed against <xref target="RFC7489"></xref> since that document's publication in March,
2015.  More details on each of these can be found at
<eref target="https://www.rfc-editor.org/errata_search.php?rfc=7489">https://www.rfc-editor.org/errata_search.php?rfc=7489</eref></t>

<dl>
<dt>[Err5365] RFC Errata, Erratum ID 5365, RFC 7489, Section 7.2.1.1 <eref target="https://www.rfc-editor.org/errata/eid5365">https://www.rfc-editor.org/errata/eid5365</eref>:</dt>
<dd><t>To be addressed in <xref target="I-D.ietf-dmarc-aggregate-reporting"></xref>.</t>
</dd>
<dt>[Err5371] RFC Errata, Erratum ID 5371, RFC 7489, Section 7.2.1.1 <eref target="https://www.rfc-editor.org/errata/eid5371">https://www.rfc-editor.org/errata/eid5371</eref>:</dt>
<dd><t>To be addressed in <xref target="I-D.ietf-dmarc-aggregate-reporting"></xref>.</t>
</dd>
<dt>[Err5440] RFC Errata, Erratum ID 5440, RFC 7489, Section 7.1 <eref target="https://www.rfc-editor.org/errata/eid5440">https://www.rfc-editor.org/errata/eid5440</eref>:</dt>
<dd><t>To be addressed in <xref target="I-D.ietf-dmarc-aggregate-reporting"></xref>.</t>
</dd>
<dt>[Err5440] RFC Errata, Erratum ID 5440, RFC 7489, Sections B.2.1, B.2.3, and B.2.4 <eref target="https://www.rfc-editor.org/errata/eid5440">https://www.rfc-editor.org/errata/eid5440</eref>:</dt>
<dd><t>Addressed both in this document and in <xref target="I-D.ietf-dmarc-aggregate-reporting"></xref>.</t>
</dd>
<dt>[Err6439] RFC Errata, Erratum ID 6439, RFC 7489, Section 7.1 <eref target="https://www.rfc-editor.org/errata/eid6439">https://www.rfc-editor.org/errata/eid6439</eref>:</dt>
<dd><t>To be addressed in <xref target="I-D.ietf-dmarc-aggregate-reporting"></xref>.</t>
</dd>
<dt>[Err6485] RFC Errata, Erratum ID 6485, RFC 7489, Section 7.2.1.1 <eref target="https://www.rfc-editor.org/errata/eid6485">https://www.rfc-editor.org/errata/eid6485</eref>:</dt>
<dd><t>To be addressed in <xref target="I-D.ietf-dmarc-aggregate-reporting"></xref>.</t>
</dd>
<dt>[Err7835] RFC Errata, Erratum ID 7835, RFC 7489, Section 6.6.3 <eref target="https://www.rfc-editor.org/errata/eid7835">https://www.rfc-editor.org/errata/eid7835</eref>:</dt>
<dd><t>This erratum is in reference to the description of the process documented
in RFC 7489 for the applicable DMARC policy for an email message. The process
for doing this has drastically changed in DMARCbis, and so the text identified in
this erratum no longer exists.</t>
</dd>
<dt>[Err5151] RFC Errata, Erratum ID 5151, RFC 7489, Section 1 <eref target="https://www.rfc-editor.org/errata/eid5151">https://www.rfc-editor.org/errata/eid5151</eref>:</dt>
<dd><t>This erratum is in reference to the Introduction section of RFC 7489.
That section has been substantially rewritten in DMARCbis, and the text
at issue for this erratum no longer exists.</t>
</dd>
</dl>
</section>

<section anchor="general-editing-and-formatting"><name>General Editing and Formatting</name>
<t>A great deal of the content from RFC 7489 was preserved in this document, but much
of it was subject to either minor editing, re-ordering of sections, and/or both.</t>
</section>
</section>

<section anchor="acknowledgements" numbered="false"><name>Acknowledgements</name>
<t>This reworking of the DMARC mechanism specified in <xref target="RFC7489"></xref> is the
result of contributions from many participants in the IETF Working Group
dedicated to this effort. Although the contributors are too numerous to
mention, significant contributions were made by Kurt Andersen, Laura Atkins,
Seth Blank, Alex Brotman, Dave Crocker, Douglas E. Foster, Ned Freed,
Mike Hammer, Steven M. Jones, Scott Kitterman, Murray S. Kucherawy,
Barry Leiba, Alessandro Vesely, and Tim Wicinski.</t>
<t>The authors and contributors also recognize that this document would not
have been possible without the work done by those who had a hand in producing
<xref target="RFC7489"></xref>. The Acknowledgements section from that document is preserved
in full below.</t>
</section>

<section anchor="acknowledgements-rfc7489" numbered="false"><name>Acknowledgements - RFC 7489</name>
<t>DMARC and the draft version of this document submitted to the
Independent Submission Editor were the result of lengthy efforts by
an informal industry consortium: DMARC.org (see <eref target="https://dmarc.org">https://dmarc.org</eref>).
Participating companies included Agari, American Greetings, AOL, Bank
of America, Cloudmark, Comcast, Facebook, Fidelity Investments,
Google, JPMorgan Chase &amp; Company, LinkedIn, Microsoft, Netease,
PayPal, ReturnPath, The Trusted Domain Project, and Yahoo!.  Although
the contributors and supporters are too numerous to mention, notable
individual contributions were made by J. Trent Adams, Michael Adkins,
Monica Chew, Dave Crocker, Tim Draegen, Steve Jones, Franck Martin,
Brett McDowell, and Paul Midgen. The contributors would also like to
recognize the invaluable input and guidance that was provided early
on by J.D. Falk.</t>
<t>Additional contributions within the IETF context were made by Kurt
Andersen, Michael Jack Assels, Les Barstow, Anne Bennett, Jim Fenton,
J. Gomez, Mike Jones, Scott Kitterman, Eliot Lear, John Levine,
S. Moonesamy, Rolf Sonneveld, Henry Timmes, and Stephen J. Turnbull.</t>
</section>

</back>

</rfc>
