rfc7601v2.txt   rfc7601.txt 
skipping to change at page 2, line 26 skipping to change at page 2, line 26
1.5.4. Other Terms . . . . . . . . . . . . . . . . . . . . . 8 1.5.4. Other Terms . . . . . . . . . . . . . . . . . . . . . 8
1.6. Trust Environment . . . . . . . . . . . . . . . . . . . . 8 1.6. Trust Environment . . . . . . . . . . . . . . . . . . . . 8
2. Definition and Format of the Header Field . . . . . . . . . . 9 2. Definition and Format of the Header Field . . . . . . . . . . 9
2.1. General Description . . . . . . . . . . . . . . . . . . . 9 2.1. General Description . . . . . . . . . . . . . . . . . . . 9
2.2. Formal Definition . . . . . . . . . . . . . . . . . . . . 10 2.2. Formal Definition . . . . . . . . . . . . . . . . . . . . 10
2.3. Property Types (ptypes) and Properties . . . . . . . . . 12 2.3. Property Types (ptypes) and Properties . . . . . . . . . 12
2.4. The "policy" ptype . . . . . . . . . . . . . . . . . . . 13 2.4. The "policy" ptype . . . . . . . . . . . . . . . . . . . 13
2.5. Authentication Identifier Field . . . . . . . . . . . . . 14 2.5. Authentication Identifier Field . . . . . . . . . . . . . 14
2.6. Version Tokens . . . . . . . . . . . . . . . . . . . . . 15 2.6. Version Tokens . . . . . . . . . . . . . . . . . . . . . 15
2.7. Defined Methods and Result Values . . . . . . . . . . . . 15 2.7. Defined Methods and Result Values . . . . . . . . . . . . 15
2.7.1. DKIM and DomainKeys . . . . . . . . . . . . . . . . . 15 2.7.1. DKIM and DomainKeys . . . . . . . . . . . . . . . . . 16
2.7.2. SPF and Sender ID . . . . . . . . . . . . . . . . . . 17 2.7.2. SPF and Sender ID . . . . . . . . . . . . . . . . . . 18
2.7.3. "iprev" . . . . . . . . . . . . . . . . . . . . . . . 18 2.7.3. "iprev" . . . . . . . . . . . . . . . . . . . . . . . 19
2.7.4. SMTP AUTH . . . . . . . . . . . . . . . . . . . . . . 19 2.7.4. SMTP AUTH . . . . . . . . . . . . . . . . . . . . . . 20
2.7.5. Other Registered Codes . . . . . . . . . . . . . . . 20 2.7.5. Other Registered Codes . . . . . . . . . . . . . . . 21
2.7.6. Extension Methods . . . . . . . . . . . . . . . . . . 20 2.7.6. Extension Methods . . . . . . . . . . . . . . . . . . 21
2.7.7. Extension Result Codes . . . . . . . . . . . . . . . 21 2.7.7. Extension Result Codes . . . . . . . . . . . . . . . 22
3. The "iprev" Authentication Method . . . . . . . . . . . . . . 22 3. The "iprev" Authentication Method . . . . . . . . . . . . . . 22
4. Adding the Header Field to a Message . . . . . . . . . . . . 23 4. Adding the Header Field to a Message . . . . . . . . . . . . 23
4.1. Header Field Position and Interpretation . . . . . . . . 24 4.1. Header Field Position and Interpretation . . . . . . . . 25
4.2. Local Policy Enforcement . . . . . . . . . . . . . . . . 25 4.2. Local Policy Enforcement . . . . . . . . . . . . . . . . 26
5. Removing Existing Header Fields . . . . . . . . . . . . . . . 26 5. Removing Existing Header Fields . . . . . . . . . . . . . . . 26
6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 27 6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 27
6.1. The Authentication-Results Header Field . . . . . . . . . 27 6.1. The Authentication-Results Header Field . . . . . . . . . 27
6.2. "Email Authentication Methods" Registry Description . . . 27 6.2. "Email Authentication Methods" Registry Description . . . 28
6.3. "Email Authentication Methods" Registry Update . . . . . 28 6.3. "Email Authentication Methods" Registry Update . . . . . 29
6.4. "Email Authentication Property Types" Registry . . . . . 30 6.4. "Email Authentication Property Types" Registry . . . . . 30
6.5. "Email Authentication Result Names" Description . . . . . 30 6.5. "Email Authentication Result Names" Description . . . . . 31
6.6. "Email Authentication Result Names" Update . . . . . . . 31 6.6. "Email Authentication Result Names" Update . . . . . . . 32
6.7. SMTP Enhanced Status Codes . . . . . . . . . . . . . . . 32 6.7. SMTP Enhanced Status Codes . . . . . . . . . . . . . . . 33
7. Security Considerations . . . . . . . . . . . . . . . . . . . 32 7. Security Considerations . . . . . . . . . . . . . . . . . . . 33
7.1. Forged Header Fields . . . . . . . . . . . . . . . . . . 32 7.1. Forged Header Fields . . . . . . . . . . . . . . . . . . 33
7.2. Misleading Results . . . . . . . . . . . . . . . . . . . 34 7.2. Misleading Results . . . . . . . . . . . . . . . . . . . 35
7.3. Header Field Position . . . . . . . . . . . . . . . . . . 34 7.3. Header Field Position . . . . . . . . . . . . . . . . . . 35
7.4. Reverse IP Query Denial-of-Service Attacks . . . . . . . 35 7.4. Reverse IP Query Denial-of-Service Attacks . . . . . . . 35
7.5. Mitigation of Backscatter . . . . . . . . . . . . . . . . 35 7.5. Mitigation of Backscatter . . . . . . . . . . . . . . . . 36
7.6. Internal MTA Lists . . . . . . . . . . . . . . . . . . . 35 7.6. Internal MTA Lists . . . . . . . . . . . . . . . . . . . 36
7.7. Attacks against Authentication Methods . . . . . . . . . 35 7.7. Attacks against Authentication Methods . . . . . . . . . 36
7.8. Intentionally Malformed Header Fields . . . . . . . . . . 35 7.8. Intentionally Malformed Header Fields . . . . . . . . . . 36
7.9. Compromised Internal Hosts . . . . . . . . . . . . . . . 36 7.9. Compromised Internal Hosts . . . . . . . . . . . . . . . 36
7.10. Encapsulated Instances . . . . . . . . . . . . . . . . . 36 7.10. Encapsulated Instances . . . . . . . . . . . . . . . . . 37
7.11. Reverse Mapping . . . . . . . . . . . . . . . . . . . . . 36 7.11. Reverse Mapping . . . . . . . . . . . . . . . . . . . . . 37
8. References . . . . . . . . . . . . . . . . . . . . . . . . . 36 8. References . . . . . . . . . . . . . . . . . . . . . . . . . 37
8.1. Normative References . . . . . . . . . . . . . . . . . . 37 8.1. Normative References . . . . . . . . . . . . . . . . . . 37
8.2. Informative References . . . . . . . . . . . . . . . . . 37 8.2. Informative References . . . . . . . . . . . . . . . . . 38
Appendix A. Legacy MUAs . . . . . . . . . . . . . . . . . . . . 40 Appendix A. Legacy MUAs . . . . . . . . . . . . . . . . . . . . 42
Appendix B. Authentication-Results Examples . . . . . . . . . . 41 Appendix B. Authentication-Results Examples . . . . . . . . . . 42
B.1. Trivial Case; Header Field Not Present . . . . . . . . . 41 B.1. Trivial Case; Header Field Not Present . . . . . . . . . 42
B.2. Nearly Trivial Case; Service Provided, but No B.2. Nearly Trivial Case; Service Provided, but No
Authentication Done . . . . . . . . . . . . . . . . . . . 41 Authentication Done . . . . . . . . . . . . . . . . . . . 43
B.3. Service Provided, Authentication Done . . . . . . . . . . 42 B.3. Service Provided, Authentication Done . . . . . . . . . . 44
B.4. Service Provided, Several Authentications Done, Single B.4. Service Provided, Several Authentications Done, Single
MTA . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 MTA . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
B.5. Service Provided, Several Authentications Done, Different B.5. Service Provided, Several Authentications Done, Different
MTAs . . . . . . . . . . . . . . . . . . . . . . . . . . 44 MTAs . . . . . . . . . . . . . . . . . . . . . . . . . . 46
B.6. Service Provided, Multi-tiered Authentication Done . . . 45 B.6. Service Provided, Multi-tiered Authentication Done . . . 48
B.7. Comment-Heavy Example . . . . . . . . . . . . . . . . . . 47 B.7. Comment-Heavy Example . . . . . . . . . . . . . . . . . . 49
Appendix C. Operational Considerations about Message Appendix C. Operational Considerations about Message
Authentication . . . . . . . . . . . . . . . . . . . 48 Authentication . . . . . . . . . . . . . . . . . . . 50
Appendix D. Changes since RFC 7001 . . . . . . . . . . . . . . . 49 Appendix D. Changes since RFC 7001 . . . . . . . . . . . . . . . 51
Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . 51 Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . 53
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 51 Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 53
1. Introduction 1. Introduction
This document describes a header field called Authentication-Results This document describes a header field called Authentication-Results
for electronic mail messages that presents the results of a message for electronic mail messages that presents the results of a message
authentication effort in a machine-readable format. The intent of authentication effort in a machine-readable format. The intent of
the header field is to create a place to collect such data when the header field is to create a place to collect such data when
message authentication mechanisms are in use so that a Mail User message authentication mechanisms are in use so that a Mail User
Agent (MUA) and downstream filters can make filtering decisions and/ Agent (MUA) and downstream filters can make filtering decisions and/
or provide a recommendation to the user as to the validity of the or provide a recommendation to the user as to the validity of the
skipping to change at page 32, line 12 skipping to change at page 32, line 42
"auth", and "iprev" methods have had their "Specification" fields "auth", and "iprev" methods have had their "Specification" fields
replaced as follows: replaced as follows:
dkim: Section 2.7.1 of this document (RFC 7601) dkim: Section 2.7.1 of this document (RFC 7601)
domainkeys: Section 2.7.1 of this document (RFC 7601) domainkeys: Section 2.7.1 of this document (RFC 7601)
spf: for "hardfail", Section 2.4.2 of [RFC5451]; for all others, spf: for "hardfail", Section 2.4.2 of [RFC5451]; for all others,
Section 2.7.2 of this document (RFC 7601) Section 2.7.2 of this document (RFC 7601)
sender-id: for "hardfail", Section 2.4.2 of [RFC5451] ; for all sender-id: for "hardfail", Section 2.4.2 of [RFC5451]; for all
others, Section 2.7.2 of this document (RFC 7601) others, Section 2.7.2 of this document (RFC 7601)
auth: Section 2.7.4 of this document (RFC 7601) auth: Section 2.7.4 of this document (RFC 7601)
iprev: Section 2.7.3 of this document (RFC 7601) iprev: Section 2.7.3 of this document (RFC 7601)
o All entries for "dkim-adsp" that were missing an explicit o All entries for "dkim-adsp" that were missing an explicit
reference to a defining document now reference [ADSP] in their reference to a defining document now reference [ADSP] in their
"Specification" fields. "Specification" fields.
skipping to change at page 37, line 4 skipping to change at page 37, line 31
7.11. Reverse Mapping 7.11. Reverse Mapping
Although Section 3 of this memo includes explicit support for the Although Section 3 of this memo includes explicit support for the
"iprev" method, its value as an authentication mechanism is limited. "iprev" method, its value as an authentication mechanism is limited.
Implementers of both this proposal and agents that use the data it Implementers of both this proposal and agents that use the data it
relays are encouraged to become familiar with the issues raised by relays are encouraged to become familiar with the issues raised by
[DNSOP-REVERSE] when deciding whether or not to include support for [DNSOP-REVERSE] when deciding whether or not to include support for
"iprev". "iprev".
8. References 8. References
8.1. Normative References 8.1. Normative References
[ABNF] Crocker, D., Ed. and P. Overell, "Augmented BNF for Syntax [ABNF] Crocker, D., Ed. and P. Overell, "Augmented BNF for Syntax
Specifications: ABNF", STD 68, RFC 5234, DOI 10.17487/ Specifications: ABNF", STD 68, RFC 5234,
RFC5234, January 2008, DOI 10.17487/RFC5234, January 2008,
<http://www.rfc-editor.org/info/rfc5234>. <http://www.rfc-editor.org/info/rfc5234>.
[IANA-HEADERS] [IANA-HEADERS]
Klyne, G., Nottingham, M., and J. Mogul, "Registration Klyne, G., Nottingham, M., and J. Mogul, "Registration
Procedures for Message Header Fields", BCP 90, RFC 3864, Procedures for Message Header Fields", BCP 90, RFC 3864,
DOI 10.17487/RFC3864, September 2004, DOI 10.17487/RFC3864, September 2004,
<http://www.rfc-editor.org/info/rfc3864>. <http://www.rfc-editor.org/info/rfc3864>.
[KEYWORDS] [KEYWORDS]
Bradner, S., "Key words for use in RFCs to Indicate Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/ Requirement Levels", BCP 14, RFC 2119,
RFC2119, March 1997, DOI 10.17487/RFC2119, March 1997,
<http://www.rfc-editor.org/info/rfc2119>. <http://www.rfc-editor.org/info/rfc2119>.
[MAIL] Resnick, P., Ed., "Internet Message Format", RFC 5322, DOI [MAIL] Resnick, P., Ed., "Internet Message Format", RFC 5322,
10.17487/RFC5322, October 2008, DOI 10.17487/RFC5322, October 2008,
<http://www.rfc-editor.org/info/rfc5322>. <http://www.rfc-editor.org/info/rfc5322>.
[MIME] Freed, N. and N. Borenstein, "Multipurpose Internet Mail [MIME] Freed, N. and N. Borenstein, "Multipurpose Internet Mail
Extensions (MIME) Part One: Format of Internet Message Extensions (MIME) Part One: Format of Internet Message
Bodies", RFC 2045, DOI 10.17487/RFC2045, November 1996, Bodies", RFC 2045, DOI 10.17487/RFC2045, November 1996,
<http://www.rfc-editor.org/info/rfc2045>. <http://www.rfc-editor.org/info/rfc2045>.
[SMTP] Klensin, J., "Simple Mail Transfer Protocol", RFC 5321, [SMTP] Klensin, J., "Simple Mail Transfer Protocol", RFC 5321,
DOI 10.17487/RFC5321, October 2008, DOI 10.17487/RFC5321, October 2008,
<http://www.rfc-editor.org/info/rfc5321>. <http://www.rfc-editor.org/info/rfc5321>.
8.2. Informative References 8.2. Informative References
[ADSP] Allman, E., Fenton, J., Delany, M., and J. Levine, [ADSP] Allman, E., Fenton, J., Delany, M., and J. Levine,
"DomainKeys Identified Mail (DKIM) Author Domain Signing "DomainKeys Identified Mail (DKIM) Author Domain Signing
Practices (ADSP)", RFC 5617, DOI 10.17487/RFC5617, August Practices (ADSP)", RFC 5617, DOI 10.17487/RFC5617, August
2009, <http://www.rfc-editor.org/info/rfc5617>. 2009, <http://www.rfc-editor.org/info/rfc5617>.
[AR-VBR] Kucherawy, M., "Authentication-Results Registration for [AR-VBR] Kucherawy, M., "Authentication-Results Registration for
Vouch by Reference Results", RFC 6212, DOI 10.17487/ Vouch by Reference Results", RFC 6212,
RFC6212, April 2011, DOI 10.17487/RFC6212, April 2011,
<http://www.rfc-editor.org/info/rfc6212>. <http://www.rfc-editor.org/info/rfc6212>.
[ATPS] Kucherawy, M., "DomainKeys Identified Mail (DKIM) [ATPS] Kucherawy, M., "DomainKeys Identified Mail (DKIM)
Authorized Third-Party Signatures", RFC 6541, DOI Authorized Third-Party Signatures", RFC 6541,
10.17487/RFC6541, February 2012, DOI 10.17487/RFC6541, February 2012,
<http://www.rfc-editor.org/info/rfc6541>. <http://www.rfc-editor.org/info/rfc6541>.
[AUTH] Siemborski, R., Ed. and A. Melnikov, Ed., "SMTP Service [AUTH] Siemborski, R., Ed. and A. Melnikov, Ed., "SMTP Service
Extension for Authentication", RFC 4954, DOI 10.17487/ Extension for Authentication", RFC 4954,
RFC4954, July 2007, DOI 10.17487/RFC4954, July 2007,
<http://www.rfc-editor.org/info/rfc4954>. <http://www.rfc-editor.org/info/rfc4954>.
[AUTH-ESC] [AUTH-ESC]
Kucherawy, M., "Email Authentication Status Codes", RFC Kucherawy, M., "Email Authentication Status Codes",
7372, DOI 10.17487/RFC7372, September 2014, RFC 7372, DOI 10.17487/RFC7372, September 2014,
<http://www.rfc-editor.org/info/rfc7372>. <http://www.rfc-editor.org/info/rfc7372>.
[DKIM] Crocker, D., Ed., Hansen, T., Ed., and M. Kucherawy, Ed., [DKIM] Crocker, D., Ed., Hansen, T., Ed., and M. Kucherawy, Ed.,
"DomainKeys Identified Mail (DKIM) Signatures", STD 76, "DomainKeys Identified Mail (DKIM) Signatures", STD 76,
RFC 6376, DOI 10.17487/RFC6376, September 2011, RFC 6376, DOI 10.17487/RFC6376, September 2011,
<http://www.rfc-editor.org/info/rfc6376>. <http://www.rfc-editor.org/info/rfc6376>.
[DMARC] Kucherawy, M., Ed. and E. Zwicky, Ed., "Domain-based [DMARC] Kucherawy, M., Ed. and E. Zwicky, Ed., "Domain-based
Message Authentication, Reporting, and Conformance Message Authentication, Reporting, and Conformance
(DMARC)", RFC 7489, DOI 10.17487/RFC7489, March 2015, (DMARC)", RFC 7489, DOI 10.17487/RFC7489, March 2015,
<http://www.rfc-editor.org/info/rfc7489>. <http://www.rfc-editor.org/info/rfc7489>.
[DNS] Mockapetris, P., "Domain names - implementation and [DNS] Mockapetris, P., "Domain names - implementation and
specification", STD 13, RFC 1035, DOI 10.17487/RFC1035, specification", STD 13, RFC 1035, DOI 10.17487/RFC1035,
November 1987, <http://www.rfc-editor.org/info/rfc1035>. November 1987, <http://www.rfc-editor.org/info/rfc1035>.
[DNS-IP6] Thomson, S., Huitema, C., Ksinant, V., and M. Souissi, [DNS-IP6] Thomson, S., Huitema, C., Ksinant, V., and M. Souissi,
"DNS Extensions to Support IP Version 6", RFC 3596, DOI "DNS Extensions to Support IP Version 6", RFC 3596,
10.17487/RFC3596, October 2003, DOI 10.17487/RFC3596, October 2003,
<http://www.rfc-editor.org/info/rfc3596>. <http://www.rfc-editor.org/info/rfc3596>.
[DNSOP-REVERSE] [DNSOP-REVERSE]
Senie, D. and A. Sullivan, "Considerations for the use of Senie, D. and A. Sullivan, "Considerations for the use of
DNS Reverse Mapping", Work in Progress, draft-ietf-dnsop- DNS Reverse Mapping", Work in Progress, draft-ietf-dnsop-
reverse-mapping-considerations-06, March 2008. reverse-mapping-considerations-06, March 2008.
[DOMAINKEYS] [DOMAINKEYS]
Delany, M., "Domain-Based Email Authentication Using Delany, M., "Domain-Based Email Authentication Using
Public Keys Advertised in the DNS (DomainKeys)", RFC 4870, Public Keys Advertised in the DNS (DomainKeys)", RFC 4870,
DOI 10.17487/RFC4870, May 2007, DOI 10.17487/RFC4870, May 2007,
<http://www.rfc-editor.org/info/rfc4870>. <http://www.rfc-editor.org/info/rfc4870>.
[DSN] Moore, K. and G. Vaudreuil, "An Extensible Message Format [DSN] Moore, K. and G. Vaudreuil, "An Extensible Message Format
for Delivery Status Notifications", RFC 3464, DOI for Delivery Status Notifications", RFC 3464,
10.17487/RFC3464, January 2003, DOI 10.17487/RFC3464, January 2003,
<http://www.rfc-editor.org/info/rfc3464>. <http://www.rfc-editor.org/info/rfc3464>.
[EMAIL-ARCH] [EMAIL-ARCH]
Crocker, D., "Internet Mail Architecture", RFC 5598, DOI Crocker, D., "Internet Mail Architecture", RFC 5598,
10.17487/RFC5598, July 2009, DOI 10.17487/RFC5598, July 2009,
<http://www.rfc-editor.org/info/rfc5598>. <http://www.rfc-editor.org/info/rfc5598>.
[IANA-CONSIDERATIONS] [IANA-CONSIDERATIONS]
Narten, T. and H. Alvestrand, "Guidelines for Writing an Narten, T. and H. Alvestrand, "Guidelines for Writing an
IANA Considerations Section in RFCs", BCP 26, RFC 5226, IANA Considerations Section in RFCs", BCP 26, RFC 5226,
DOI 10.17487/RFC5226, May 2008, DOI 10.17487/RFC5226, May 2008,
<http://www.rfc-editor.org/info/rfc5226>. <http://www.rfc-editor.org/info/rfc5226>.
[IMAP] Crispin, M., "INTERNET MESSAGE ACCESS PROTOCOL - VERSION [IMAP] Crispin, M., "INTERNET MESSAGE ACCESS PROTOCOL - VERSION
4rev1", RFC 3501, DOI 10.17487/RFC3501, March 2003, 4rev1", RFC 3501, DOI 10.17487/RFC3501, March 2003,
skipping to change at page 39, line 29 skipping to change at page 40, line 10
[POP3] Myers, J. and M. Rose, "Post Office Protocol - Version 3", [POP3] Myers, J. and M. Rose, "Post Office Protocol - Version 3",
STD 53, RFC 1939, DOI 10.17487/RFC1939, May 1996, STD 53, RFC 1939, DOI 10.17487/RFC1939, May 1996,
<http://www.rfc-editor.org/info/rfc1939>. <http://www.rfc-editor.org/info/rfc1939>.
[PRA] Lyon, J., "Purported Responsible Address in E-Mail [PRA] Lyon, J., "Purported Responsible Address in E-Mail
Messages", RFC 4407, DOI 10.17487/RFC4407, April 2006, Messages", RFC 4407, DOI 10.17487/RFC4407, April 2006,
<http://www.rfc-editor.org/info/rfc4407>. <http://www.rfc-editor.org/info/rfc4407>.
[RFC5451] Kucherawy, M., "Message Header Field for Indicating [RFC5451] Kucherawy, M., "Message Header Field for Indicating
Message Authentication Status", RFC 5451, DOI 10.17487/ Message Authentication Status", RFC 5451,
RFC5451, April 2009, DOI 10.17487/RFC5451, April 2009,
<http://www.rfc-editor.org/info/rfc5451>. <http://www.rfc-editor.org/info/rfc5451>.
[RFC6008] Kucherawy, M., "Authentication-Results Registration for [RFC6008] Kucherawy, M., "Authentication-Results Registration for
Differentiating among Cryptographic Results", RFC 6008, Differentiating among Cryptographic Results", RFC 6008,
DOI 10.17487/RFC6008, September 2010, DOI 10.17487/RFC6008, September 2010,
<http://www.rfc-editor.org/info/rfc6008>. <http://www.rfc-editor.org/info/rfc6008>.
[RFC6577] Kucherawy, M., "Authentication-Results Registration Update [RFC6577] Kucherawy, M., "Authentication-Results Registration Update
for Sender Policy Framework (SPF) Results", RFC 6577, DOI for Sender Policy Framework (SPF) Results", RFC 6577,
10.17487/RFC6577, March 2012, DOI 10.17487/RFC6577, March 2012,
<http://www.rfc-editor.org/info/rfc6577>. <http://www.rfc-editor.org/info/rfc6577>.
[RFC7001] Kucherawy, M., "Message Header Field for Indicating [RFC7001] Kucherawy, M., "Message Header Field for Indicating
Message Authentication Status", RFC 7001, DOI 10.17487/ Message Authentication Status", RFC 7001,
RFC7001, September 2013, DOI 10.17487/RFC7001, September 2013,
<http://www.rfc-editor.org/info/rfc7001>. <http://www.rfc-editor.org/info/rfc7001>.
[RFC7410] Kucherawy, M., "A Property Types Registry for the [RFC7410] Kucherawy, M., "A Property Types Registry for the
Authentication-Results Header Field", RFC 7410, DOI Authentication-Results Header Field", RFC 7410,
10.17487/RFC7410, December 2014, DOI 10.17487/RFC7410, December 2014,
<http://www.rfc-editor.org/info/rfc7410>. <http://www.rfc-editor.org/info/rfc7410>.
[RRVS] Mills, W. and M. Kucherawy, "The Require-Recipient-Valid- [RRVS] Mills, W. and M. Kucherawy, "The Require-Recipient-Valid-
Since Header Field and SMTP Service Extension", RFC 7293, Since Header Field and SMTP Service Extension", RFC 7293,
DOI 10.17487/RFC7293, July 2014, DOI 10.17487/RFC7293, July 2014,
<http://www.rfc-editor.org/info/rfc7293>. <http://www.rfc-editor.org/info/rfc7293>.
[SECURITY] [SECURITY]
Rescorla, E. and B. Korver, "Guidelines for Writing RFC Rescorla, E. and B. Korver, "Guidelines for Writing RFC
Text on Security Considerations", BCP 72, RFC 3552, DOI Text on Security Considerations", BCP 72, RFC 3552,
10.17487/RFC3552, July 2003, DOI 10.17487/RFC3552, July 2003,
<http://www.rfc-editor.org/info/rfc3552>. <http://www.rfc-editor.org/info/rfc3552>.
[SENDERID] [SENDERID]
Lyon, J. and M. Wong, "Sender ID: Authenticating E-Mail", Lyon, J. and M. Wong, "Sender ID: Authenticating E-Mail",
RFC 4406, DOI 10.17487/RFC4406, April 2006, RFC 4406, DOI 10.17487/RFC4406, April 2006,
<http://www.rfc-editor.org/info/rfc4406>. <http://www.rfc-editor.org/info/rfc4406>.
[SMIME-REG] [SMIME-REG]
Melnikov, A., "Authentication-Results Registration for S/ Melnikov, A., "Authentication-Results Registration for S/
MIME Signature Verification", RFC 7281, DOI 10.17487/ MIME Signature Verification", RFC 7281,
RFC7281, June 2014, DOI 10.17487/RFC7281, June 2014,
<http://www.rfc-editor.org/info/rfc7281>. <http://www.rfc-editor.org/info/rfc7281>.
[SPF] Kitterman, S., "Sender Policy Framework (SPF) for [SPF] Kitterman, S., "Sender Policy Framework (SPF) for
Authorizing Use of Domains in Email, Version 1", RFC 7208, Authorizing Use of Domains in Email, Version 1", RFC 7208,
DOI 10.17487/RFC7208, April 2014, DOI 10.17487/RFC7208, April 2014,
<http://www.rfc-editor.org/info/rfc7208>. <http://www.rfc-editor.org/info/rfc7208>.
[VBR] Hoffman, P., Levine, J., and A. Hathcock, "Vouch By [VBR] Hoffman, P., Levine, J., and A. Hathcock, "Vouch By
Reference", RFC 5518, DOI 10.17487/RFC5518, April 2009, Reference", RFC 5518, DOI 10.17487/RFC5518, April 2009,
<http://www.rfc-editor.org/info/rfc5518>. <http://www.rfc-editor.org/info/rfc5518>.
 End of changes. 29 change blocks. 
72 lines changed or deleted 73 lines changed or added

This html diff was produced by rfcdiff 1.41. The latest version is available from http://tools.ietf.org/tools/rfcdiff/