<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.2.9 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!ENTITY RFC2119 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC5234 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.5234.xml">
<!ENTITY RFC5322 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.5322.xml">
<!ENTITY RFC5598 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.5598.xml">
<!ENTITY RFC6376 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.6376.xml">
<!ENTITY RFC6377 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.6377.xml">
<!ENTITY RFC6532 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.6532.xml">
<!ENTITY RFC7208 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7208.xml">
<!ENTITY RFC7405 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7405.xml">
<!ENTITY RFC8174 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
<!ENTITY RFC7942 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7942.xml">
<!ENTITY RFC7489 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7489.xml">
<!ENTITY RFC7960 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7960.xml">
<!ENTITY SELF "this document">
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-dmarc-arc-protocol-19" category="exp">

  <front>
    <title abbrev="ARC-Protocol">Authenticated Received Chain (ARC) Protocol</title>

    <author initials="K." surname="Andersen" fullname="Kurt Andersen">
      <organization>LinkedIn</organization>
      <address>
        <postal>
          <street>1000 West Maude Ave</street>
          <city>Sunnyvale</city>
          <region>California</region>
          <code>94085</code>
          <country>USA</country>
        </postal>
        <email>kurta@linkedin.com</email>
      </address>
    </author>
    <author initials="B." surname="Long" fullname="Brandon Long" role="editor">
      <organization>Google</organization>
      <address>
        <email>blong@google.com</email>
      </address>
    </author>
    <author initials="S." surname="Blank" fullname="Seth Blank" role="editor">
      <organization>Valimail</organization>
      <address>
        <email>seth@valimail.com</email>
      </address>
    </author>
    <author initials="M." surname="Kucherawy" fullname="Murray Kucherawy" role="editor">
      <organization>TDP</organization>
      <address>
        <email>superuser@gmail.com</email>
      </address>
    </author>

    <date year="2018" month="November"/>

    <area>art</area>
    <workgroup>DMARC Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>The Authenticated Received Chain (ARC) protocol provides an authenticated
“chain of custody” for a message, allowing each entity that handles the message
to see what entities handled it before, and to see what the message’s
authentication assessment was at each step in the handling.</t>

<t>ARC allows Internet Mail Handlers to attach assertions of message
authentication assessment to individual messages. As messages traverse ARC-enabled
Internet Mail Handlers, additional ARC assertions can be attached to messages
to form ordered sets of ARC assertions that represent the authentication assessment
at each step of message handling paths.</t>

<t>ARC-enabled Internet Mail Handlers can process sets of ARC assertions to inform
message disposition decisions, to identify Internet Mail Handlers that might
break existing authentication mechanisms, and to convey original authentication
assessments across trust boundaries.</t>



    </abstract>


  </front>

  <middle>


<section anchor="intro" title="Introduction">

<t>The utility of widely deployed email authentication technologies such as Sender
Policy Framework (SPF) <xref target="RFC7208"/> and DomainKeys Identified Mail (DKIM)
<xref target="RFC6376"/> is impacted by the processing of Internet Mail by intermediate
handlers. This impact is thoroughly documented in the defining documents for
SPF and DKIM and further discussed in <xref target="RFC6377"/> and <xref target="RFC7960"/>.</t>

<t>DMARC <xref target="RFC7489"/> also relies upon SPF and DKIM authentication mechanisms.
Failures of authentication caused by the actions of intermediate handlers can
cause legitimate mail to be incorrectly rejected or misdirected.</t>

<t>Authenticated Received Chain (ARC) creates a mechanism for individual Internet
Mail Handlers to add their authentication assessment to a message’s
ordered set of handling results. ARC encapsulates the authentication assessment in a
DKIM signature derivative to grant other handlers the ability to verify the
authenticity of the individual assessment assertion as well as the aggregate
set and sequence of results.</t>

<t>Ordered sets of authentication assessments can be used by ARC-enabled Internet Mail
Handlers to inform message handling disposition, to identify where alteration
of message content might have occurred, and to provide additional trace
information for use in understanding message handling paths.</t>

</section>
<section anchor="general-concepts" title="General Concepts">

<t>ARC is loosely based on concepts from evidence collection. Evidence is usually
collected, labeled, stored, and transported in specific ways to preserve the
state of evidence and to document all processing steps.</t>

<section anchor="evidence" title="Evidence">

<t>In ARC’s situation, the “evidence” is a message’s authentication assessment at any
point along the delivery path between origination and final delivery.
Determination of message authentication can be affected when intermediate
handlers modify message content (header fields and/or body content), route
messages through unforeseen paths, or change envelope information.</t>

<t>The authentication assessment for a message is determined upon receipt of a
message and documented in the Authentication-Results header field(s). ARC
extends this mechanism to survive transit through intermediary ADMDs.</t>

<t>Because the first-hand determination of an authentication assessment can never
be reproduced by other handlers, the assertion of the authentication assessment
is more akin to testimony by a verifiable party than hard evidence which can be
independently evaluated.</t>

</section>
<section anchor="custody" title="Custody">

<t>“Custody” refers to when an Internet Mail Handler processes a message. When a
handler takes custody of a message, the handler becomes a custodian and
attaches their own evidence (authentication assessment upon receipt) to the
message if they are ARC-enabled. Evidence is added in such a way so that future
handlers can verify the authenticity of both evidence and custody.</t>

</section>
<section anchor="chain-of-custody" title="Chain of Custody">

<t>The “chain of custody” of ARC is the entire set of evidence and custody that
travels with a message.</t>

</section>
<section anchor="validation-of-chain-of-custody" title="Validation of Chain of Custody">

<!-- Done: review and update from Crocker -->
<!-- adjusted to use testimony/assertion lingo -->

<t>Any ARC-enabled Internet Mail Handler can validate the entire set of custody
and the authentication assessments asserted by each party to yield a valid Chain of
Custody. If the evidence-supplying custodians can be trusted, then the
validated Chain of Custody describes the (possibly changing) authentication
assessment as the message traveled through various custodians.</t>

<t>Even though a message’s authentication assessment might have changed, the validated
chain of custody can be used to determine if the changes (and the custodians
responsible for the changes) can be tolerated.</t>

</section>
</section>
<section anchor="terminology-and-definitions" title="Terminology and Definitions">

<t>This section defines terms used in the rest of the document.</t>

<t>Readers should to be familiar with the contents, core concepts, and definitions
found in <xref target="RFC5598"/>. The potential roles of transit services in the delivery of
email are directly relevant.</t>

<t>Language, syntax (including some ABNF constructs), and concepts are imported
from DKIM <xref target="RFC6376"/>. Specific references to DKIM are made throughout this
document.  The following terms are imported from <xref target="RFC5598"/>:</t>

<t><list style="symbols">
  <t>ADministrative Management Domain (ADMD), Section 2.3</t>
  <t>Message Transfer Agents (MTA), Section 4.3.2</t>
  <t>Message Submission Agent (MSA), Section 4.3.1</t>
  <t>Message Delivery Agent (MDA), Section 4.3.3</t>
</list></t>

<t>Syntax descriptions use Augmented BNF (ABNF) <xref target="RFC5234"/> and <xref target="RFC7405"/>.</t>

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL
NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”,
“MAY”, and “OPTIONAL” in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
These words may also appear in this document in
lower case as plain English words, absent their normative meanings.</t>

<section anchor="arc-set-defn" title="ARC Set">

<t><xref target="hdr-defn"/> introduces three (3) ARC header fields which are added to a
message by an ARC-enabled internet mail handler. Together, these three header
fields compose a single “ARC Set”. An ARC Set provides the means for an
Internet Mail Handler to attach an authentication assessment to a message in a manner
that can be verified by future handlers. A single message can contain multiple
ARC Sets.</t>

<t>In general concept terms, an ARC Set represents Evidence and Custody.</t>

</section>
<section anchor="arc-chain-defn" title="Authenticated Received Chain (ARC)">

<t>The sequence of ARC Sets attached to a message at a given time is called the
Authenticated Received Chain. An Authenticated Received Chain is the record of
individual authentication assessments as a message traverses through
ARC-participating ADMDs.</t>

<t>The first attachment of an ARC Set to a message causes an Authenticated
Received Chain to be created. Additional attachments of ARC Sets cause the
Authenticated Received Chain to be extended.</t>

<t>In General concept terms, an Authenticated Received Chain represents Chain of Custody.</t>

</section>
<section anchor="internet-mail-handlers-intermediaries" title="Internet Mail Handlers / Intermediaries">

<t>Internet Mail Handlers process and deliver messages across the Internet and
include MSAs, MTAs, MDAs, gateways, and mailing lists as defined in <xref target="RFC5598"/>.</t>

<t>Throughout this document the term “intermediaries” refers to the both regular
MTAs as well as delivery/reposting agents such as mailing lists covered within
the scope of <xref target="RFC5598"/>’s transit services.</t>

<t>“Intermediaries” and “Internet Mail Handlers” are used synonymously throughout 
this document.</t>

</section>
<section anchor="authentication-assessment" title="Authentication Assessment">

<t>The Authentication Assessment which is affixed to a message as part of each ARC
Set consists of the “authres-payload” <xref target="I-D-7601bis"/>. For the integrity of an
ARC Set, the Authentication Assessment only needs to be properly encapsulated
within the ARC Set as defined below <xref target="hdr-defn"/>. The accuracy or syntax of the
authres-payload field does not affect the validity of the ARC chain itself.</t>

</section>
<section anchor="sign_v_seal" title="Signing vs Sealing">

<t>Signing is the process of affixing a digital signature to a message as a header
field, such as when a DKIM-Signature (as in <xref target="RFC6376"/> section 2.1), or an AMS
or AS is added. Sealing is when an ADMD affixes a complete and valid ARC Set to
a message creating or continuing an Authenticated Received Chain.</t>

</section>
<section anchor="sealer" title="Sealer">

<t>A Sealer is an Internet Mail Handler that attaches a complete and valid ARC Set
to a message.</t>

<t>In general concept terms, a Sealer adds its testimony (assertion of authentication
assessment) and proof of custody to the Chain of Custody.</t>

</section>
<section anchor="validator" title="Validator">

<t>A Validator is an ARC-enabled Internet Mail Handler that evaluates an
Authenticated Received Chain for validity and content. The process of
evaluation of the individual ARC Sets that compose an Authenticated Received
Chain is described in <xref target="validate-actions"/>.</t>

<t>In general concept terms, a Validator inspects the Chain of Custody to
determine the content and validity of individual Evidence supplied by
custodians.</t>

</section>
<section anchor="imported-abnf-tokens" title="Imported ABNF Tokens">

<t>The following ABNF tokens are imported:</t>

<t><list style="symbols">
  <t>tag-list (<xref target="RFC6376"/> section 3.2)</t>
  <t>authres-payload (<xref target="I-D-7601bis"/> section 2.2)</t>
  <t>cfws (<xref target="RFC5322"/> section 3.2.2)</t>
</list></t>

</section>
<section anchor="common-abnf-tokens" title="Common ABNF Tokens">

<t>The following ABNF tokens are used elsewhere in this document:</t>

<figure><artwork><![CDATA[
position     = 1*2DIGIT                         ; 1 - 50
instance     = [CFWS] %s"i" [CFWS] "=" 
               [CFWS] position 
chain-status = ("none" / "fail" / "pass")
seal-cv-tag  = %s"cv" [CFWS] "=" 
               [CFWS] chain-status
]]></artwork></figure>

</section>
</section>
<section anchor="protocol-elements" title="Protocol Elements">

<section anchor="hdr-defn" title="ARC Header Fields">

<t>ARC introduces three new header fields. Syntax for new header fields adapts
existing specifications. This document only describes where ARC-specific
changes in syntax and semantics differ from existing specifications.</t>

<section anchor="aar-defn" title="ARC-Authentication-Results (AAR)">

<t>The ARC-Authentication-Results (AAR) header field records the message
authentication assessment as processed by an ARC-participating ADMD at message
arrival time.</t>

<t>In general concept terms, the AAR header field is where Evidence is recorded by
a custodian.</t>

<t>The AAR header field is similar in syntax and semantics to an
Authentication-Results field <xref target="I-D-7601bis"/>, with two (2) differences:</t>

<t><list style="symbols">
  <t>the name of the header field itself;</t>
  <t>the presence of the “instance tag”. Additional information on the “instance
tag” can be found in <xref target="i-defn"/>.</t>
</list></t>

<t>The formal ABNF for the AAR header field is:</t>

<figure><artwork><![CDATA[
arc-info = instance [CFWS] ";" authres-payload
arc-authres-header = "ARC-Authentication-Results:" [CFWS] arc-info
]]></artwork></figure>

<t>Because there is only one AAR allowed per ARC set, the AAR MUST contain the
combined authres-payload with all of the authentication results from within the
participating ADMD, regardless of how many Authentication-Results header fields
are attached to the message.</t>

<!-- Done: consider note that syntax violating authres-payloads do not 
affect the validity of the ARC set? Move to usage doc...

Also note that any failures of sealers to properly construct the authres-payload
do not invalidate the ARC set as long as they are properly encapsulated within
the AS signature.
-->

</section>
<section anchor="ams-defn" title="ARC-Message-Signature (AMS)">

<t>The ARC-Message-Signature (AMS) header field allows an ARC-participating ADMD
to convey some responsibility (custodianship) for a message and possible
message modifications to future ARC-participating custodians.</t>

<t>In general concept terms, the AMS header field identifies a custodian.</t>

<t>The AMS header field has the same syntax and semantics as the DKIM-Signature
field <xref target="RFC6376"/>, with three (3) differences:</t>

<t><list style="symbols">
  <t>the name of the header field itself;</t>
  <t>no version tag (“v”) is defined for the AMS header field. As required 
for undefined
tags (in <xref target="RFC6376"/>), if seen, a version tag MUST be ignored;</t>
  <t>the “i” (AUID) tag is not imported from DKIM; instead, this tag is replaced 
by the “instance tag” as defined in <xref target="i-defn"/>;</t>
</list></t>

<t>ARC places no requirements on the selectors and/or domains used for the AMS
header field signatures.</t>

<t>The formal ABNF for the AMS header field is:</t>

<figure><artwork><![CDATA[
arc-ams-info = instance [CFWS] ";" tag-list
arc-message-signature = "ARC-Message-Signature:" [CFWS] arc-ams-info
]]></artwork></figure>

<t>To reduce the chances of accidental invalidation of AMS signatures:</t>

<t><list style="symbols">
  <t>AMS header fields are added by ARC-participating ADMDs as messages exit the
ADMD. AMS header fields SHOULD be attached so that any modifications made by
the ADMD are included in the signature of the AMS header field.</t>
  <t>Authentication-Results header fields MUST NOT be included in AMS signatures
as they are likely to be deleted by downstream ADMDs (per 
<xref target="I-D-7601bis"/> Section 5).</t>
  <t>ARC-related header fields (ARC-Authentication-Results, ARC-Message-Signature,
ARC-Seal) MUST NOT be included in the list of header fields covered by the
signature of the AMS header field.</t>
</list></t>

<t>To preserve the ability to verify the integrity of a message, the signature of
the AMS header field SHOULD include any DKIM-Signature header fields already
present in the message.</t>

</section>
<section anchor="as-defn" title="ARC-Seal (AS)">

<t>The ARC-Seal (AS) header field permits ARC-participating
ADMDs to verify the integrity of AAR header fields and corresponding AMS
header fields.</t>

<t>In general concept terms, the AS header field is how custodians bind their
authentication assessments (testimonial) into a Chain of Custody so that
Validators can inspect individual evidence and custodians.</t>

<t>The AS header field is similar in syntax and semantics to DKIM-Signatures
<xref target="RFC6376"/>, with the following differences:</t>

<t><list style="symbols">
  <t>the “i” (AUID) tag is not imported from DKIM; instead, this tag is replaced 
by the “instance tag” as defined in <xref target="i-defn"/>;</t>
  <t>the signature of the AS header field does not cover the body of the
message and therefore there is no ‘bh’ tag. The signature of the AS header 
field only covers specific header fields as defined in <xref target="as-hdrs"/>;</t>
  <t>no body canonicalization is performed as the AS signature does not cover the
body of a message;</t>
  <t>only “relaxed” header field canonicalization (<xref target="RFC6376"/> section 3.4.2) is used;</t>
  <t>the only supported tags are “i” (from <xref target="i-defn"/> of this document), and
“a”, “b”, “d, “s”, “t” from <xref target="RFC6376"/> Section 3.5. Note especially that
the DKIM “h” tag is NOT allowed and if found, MUST result in a cv status
of “fail” (for more information see <xref target="as-hdrs"/>);</t>
  <t>an additional tag, “cv” (“seal-cv-tag” in the ARC-Seal ABNF definition) is
used to communicate Chain Validation Status to subsequent ADMDs.</t>
</list></t>

<t>ARC places no requirements on the selectors and/or domains used for the AS
header field signatures.</t>

<t>The formal ABNF for the AS header field is:</t>

<figure><artwork><![CDATA[
arc-as-info = instance [CFWS] ";" tag-list
arc-seal = "ARC-Seal:" [CFWS] arc-as-info
]]></artwork></figure>

</section>
<section anchor="internationalized-email-eai" title="Internationalized Email (EAI)">

<t>In internationalized messages <xref target="RFC6532"/> many header fields can contain UTF-8
as well as ASCII text.  The changes for EAI are all inherited from DKIM as
updated by <xref target="draft-levine-eaiauth"/> and Authentication-Results as updated
in <xref target="I-D-7601bis"/>, but are called out here for emphasis.</t>

<t>In all ARC header fields, the d= s= tags can contain U-labels.  In all tags,
non-ASCII characters need not be quoted in dkim-quoted-printable.</t>

<t>The AAR header allows UTF-8 in the same places that A-R does, as
described in <xref target="I-D-7601bis"/>.</t>

</section>
</section>
<section anchor="arc-set" title="ARC Set">

<t>An “ARC Set” is a single collection of three ARC header fields (AAR, AMS, and AS).
ARC header fields of an ARC Set share the same “instance” value.</t>

<t>By adding all ARC header fields to a message, an ARC Sealer adds an ARC Set to a
message. A description of how Sealers add an ARC Set to a message is found in
<xref target="sealer-actions"/>.</t>

<section anchor="i-defn" title="Instance Tags">

<t>Instance tags describe which ARC header fields belong to an ARC Set. Each ARC
header field of an ARC Set shares the same instance tag value.</t>

<t>Instance tag values are integers that begin at 1 and are incremented by each
addition of an ARC Set. Through the incremental values of instance tags, an ARC
Validator can determine the order in which ARC Sets were added to a message.</t>

<t>Instance tag values can range from 1-50 (inclusive).</t>

<!-- TBD: Dave's comment to cite technical/operational concerns -->

<t><spanx style="emph">INFORMATIONAL:</spanx> The upper limit of 50 was picked based on some initial
observations reported by early working group members. The value was chosen so
as to balance the risk of excessive header field growth <xref target="big-hf-risk"/> against
expert opinion regarding the probability of long-tail but non-looping
multiple-intermediary mail flows.  Longer ARC chains will also impose load on
validators and DNS to support additional verification steps.  Observed
quantities of “Received” header fields was also considered in establishing this
as an experimental initial value.</t>

<t>Valid ARC Sets MUST have exactly one instance of each ARC header field (AAR,
AMS, and AS) for a given instance value and signing algorithm.</t>

<t>For handling multiple signing algorithms, see <xref target="ARC-MULTI"/>.</t>

</section>
</section>
<section anchor="authenticated-received-chain" title="Authenticated Received Chain">

<t>An Authenticated Received Chain is an ordered collection of ARC Sets. As ARC
Sets are enumerated sets of ARC header fields, an Authenticated Received Chain
represents the output of message authentication assessments along the handling path
of ARC-enabled processors.</t>

<t>Authentication Assessments determined at each step of the ARC-enabled
handling path is present in an Authenticated Received Chain in the form of AAR
header fields. The ability to verify the identity of message handlers and the
integrity of message content is provided by AMS header fields. AS header fields
allow messages handlers to validate the assertions, order and sequence of the
Authenticated Received Chain itself.</t>

<t>In general concept terms, an Authenticated Received Chain represents a
message’s Chain of Custody. Validators can consult a message’s Chain of Custody
to gain insight regarding each custodian of a message and the Evidence
collected by each custodian.</t>

</section>
<section anchor="cv-defn" title="Chain Validation Status">

<t>The state of the Authenticated Received Chain at a specific processing step is
called the “Chain Validation Status”. Chain Validation Status information is
communicated in several ways:</t>

<t><list style="symbols">
  <t>the AS header field in the “cv” tag, and</t>
  <t>as part of Authentication-Results and AAR header field(s).</t>
</list></t>

<t>Chain Validation Status has one of three possible values:</t>

<t><list style="symbols">
  <t>none: There was no Authenticated Received Chain on the message when it
arrived for validation. Typically, this occurs when a message is received
directly from a message’s original Message Transfer Agent (MTA) or Message
Submission Agent (MSA), or from an upstream Internet Mail Handler that is not
participating in ARC handling.</t>
  <t>fail: The message contains an Authenticated Received Chain whose validation
failed.</t>
  <t>pass: The message contains an Authenticated Received Chain whose validation
succeeded.</t>
</list></t>

</section>
</section>
<section anchor="protocol-actions" title="Protocol Actions">

<t>ARC-enabled Internet Mail Handlers generally act as both ARC Validators (when
receiving messages) and ARC Sealers (when sending messages onward, not originated
locally).</t>

<!-- moved from end of section - outcome -->

<t>An Authenticated Received Chain with a Chain Validation Status of “pass” (or “none”)
allows Internet Mail Handlers to ascertain:</t>

<t><list style="symbols">
  <t>all ARC-participating ADMDs that claim responsibility for handling (and
possibly modifying) the message in transit;</t>
  <t>the authentication assessments of the message as determined by each ADMD 
(from AAR header fields).</t>
</list></t>

<t>With this information, Internet Mail Handlers MAY inform local policy
decisions regarding disposition of messages that experience authentication
failure due to intermediate processing.</t>

<section anchor="sealer-actions" title="Sealer Actions">

<t>To “seal” a message, an ARC Sealer adds an ARC Set (the three ARC header fields
AAR, AMS, and AS) to a message. All ARC header fields in an ARC Set share the
same instance tag value.</t>

<t>To perform Sealing (aka to build and attach a new ARC Set), the following
actions must be taken by an ARC Sealer when presented with a message:</t>

<t><list style="numbers">
  <t>All message modifications (including adding DKIM-Signature header field(s)) 
  MUST be performed before Sealing.</t>
  <t>If the message already contains an Authenticated Received Chain with the
  most recent AS reporting “cv=fail”, then there is no need to proceed and the
  algorithm stops here.</t>
  <t>Calculate the instance value: if the message already contains an Authenticated
  Received Chain, the instance value is 1 more than the highest instance number
  found in the Authenticated Received Chain. If no Authenticated Received Chain
  exists, the instance value is 1.</t>
  <t>Using the calculated instance value, generate and attach a complete ARC set
  to the message as follows:  <list style="numbers">
      <t>Generate and attach an ARC-Authentication-Results header field as defined in <xref target="aar-defn"/>.</t>
      <t>Generate and attach an ARC-Message-Signature header field as defined in <xref target="ams-defn"/>.</t>
      <t>Generate and attach an ARC-Seal header field using the AS definition found in <xref target="as-defn"/>, 
 the prescribed headers defined in <xref target="as-hdrs"/>, and the Chain Validation Status as 
 determined during ARC Validation.</t>
    </list></t>
</list></t>

<!-- Done: confirm proper sub-numbering above -->

<section anchor="as-hdrs" title="Header Fields To Include In ARC-Seal Signatures">

<!-- Done: refer to John L's text -->

<t>The ARC-Seal is generated in a manner similar to how DKIM-Signatures are added
to messages (<xref target="RFC6376"/>, section 3.7), with explicit requirements on the header
fields and ordering of those fields.</t>

<t>The signature of an AS header field signs a canonicalized form of the ARC Set
header field values. The ARC set header field values are supplied to the hash
function in increasing instance order, starting at 1, and include the ARC Set
being added at the time of Sealing the message.</t>

<t>Within an ARC Set, header fields are supplied to the hash function in the
following order:</t>

<t><list style="numbers">
  <t>ARC-Authentication-Results</t>
  <t>ARC-Message-Signature</t>
  <t>ARC-Seal</t>
</list></t>

<t>Note that when an Authenticated Received Chain has failed validation, the
signing scope for the ARC-Seal is modified as specified in <xref target="cv-fail-case"/>.</t>

</section>
<section anchor="cv-fail-case" title="Marking and Sealing “cv=fail” (Invalid) Chains">

<t>In the case of a failed Authenticated Received Chain, the header fields
included in the signature scope of the AS header field b= value MUST only
include the ARC Set header fields created by the MTA which detected the
malformed chain, as if this newest ARC Set was the only set present.</t>

<t><spanx style="emph">INFORMATIONAL</spanx>: This approach is mandated to handle the case of a malformed or
otherwise invalid Authenticated Received Chain. There is no way to generate a
deterministic set of AS header fields (<xref target="as-hdrs"/>) in most cases of invalid
chains.</t>

</section>
<section anchor="only-one-authenticated-received-chain-per-message" title="Only One Authenticated Received Chain Per Message">

<t>A message can have only one Authenticated Received Chain on it at a time. Once
broken, the chain cannot be continued, as the chain of custody is no longer
valid and responsibility for the message has been lost. For further discussion
of this topic and the design restriction which prevents chain continuation or
re-establishment, see <xref target="ARC-USAGE"/>.</t>

</section>
<section anchor="broad-ability-to-seal" title="Broad Ability to Seal">

<t>ARC is not solely intended for perimeter MTAs. Any Internet Mail Handler
MAY seal a message by adding a complete ARC set, whether or not they have 
modified or are aware of having modified the message. For additional
information, see <xref target="trust-boundaries"/>.</t>

</section>
<section anchor="sealing-is-always-safe" title="Sealing is Always Safe">

<t>The utility of an Authenticated Received Chain is limited to very specific cases.
Authenticated Received Chains are designed to provide additional information to
an Internet Mail Handler when evaluating messages for delivery in the context
of authentication failures. Specifically:</t>

<t><list style="symbols">
  <t>Properly adding an ARC Set to a message does not damage or invalidate an
existing Authenticated Received Chain.</t>
  <t>Sealing an Authenticated Received Chain when a message has not been modified
does not negatively affect the chain.</t>
  <t>Validating a message exposes no new threat vectors (see 
<xref target="security-consider"/>).</t>
  <t>An ADMD may choose to Seal all inbound messages whether or not a message has
been modified or will be retransmitted.</t>
</list></t>

</section>
</section>
<section anchor="validate-actions" title="Validator Actions">

<t>A validator performs the following steps, in sequence, to process an
Authenticated Received Chain. Canonicalization, hash functions, and signature
validation methods are imported from <xref target="RFC6376"/> section 5.</t>

<t><list style="numbers">
  <t>Collect all ARC Sets currently attached to the message.
  <list style="symbols">
      <t>If there are none, the Chain Validation Status is “none” and the algorithm 
stops here.</t>
      <t>The maximum number of ARC Sets that can be attached to a message is 50. If 
more than the maximum number exist the Chain Validation Status is “fail” and 
the algorithm stops here.</t>
      <t>In the following algorithm, the maximum discovered ARC instance value is 
referred to as “N”.</t>
    </list></t>
  <t>If the Chain Validation Status of the highest instance value ARC Set is “fail”,
  then the Chain Validation status is “fail” and the algorithm stops here.</t>
  <t>Validate the structure of the Authenticated Received Chain. A valid ARC has
  the following conditions:  <list style="numbers">
      <t>Each ARC Set MUST contain exactly one each of the three ARC header fields
(AAR, AMS, and AS).</t>
      <t>The instance values of the ARC Sets MUST form a continuous sequence from
1..N with no gaps or repetition.</t>
      <t>The “cv” value for all ARC-Seal header fields MUST NOT be “fail”. For ARC
Sets with instance values &gt; 1, the values MUST be “pass”. For the ARC Set
with instance value = 1, the value MUST be “none”.</t>
    </list>
<list style="symbols">
      <t>If any of these conditions are not met, the Chain Validation Status is “fail”
and the algorithm stops here.</t>
    </list></t>
  <t>Validate the AMS with the greatest instance value (most recent). If
  validation fails, then the Chain Validation Status is “fail” and the algorithm
  stops here.</t>
  <t><spanx style="emph">OPTIONAL:</spanx> Determine the “oldest-pass” value from the ARC Set by validating
  each prior AMS beginning with the N-1 and proceeding in decreasing order to the
  AMS with the instance value of 1:  <list style="numbers">
      <t>If an AMS fails to validate (for instance value “M”), then set the
  oldest-pass value to the lowest AMS instance value which passed (M+1) and go to
  the next step (there is no need to check any other (older) AMS header fields). This 
  does not affect the validity of the Authenticated Received Chain.</t>
      <t>If all AMS header fields verify, set the oldest-pass value to zero (0).</t>
    </list></t>
  <t>Validate each AS beginning with the greatest instance value and proceeding
  in decreasing order to the AS with the instance value of 1. If any AS fails to
  validate, the Chain Validation Status is “fail” and the algorithm stops here.</t>
  <t>If the algorithm reaches this step, then the Chain Validation Status is
  “pass”, and the algorithm is complete.</t>
</list></t>

<t>The end result of this Validation algorithm SHOULD be included within the
Authentication-Results header field for the ADMD.</t>

<t>As with a DKIM signature (<xref target="RFC6376"/> section 6.3) which fails verification, a
message with an Authenticated Received Chain with a Chain Validation status of
“fail” MUST be treated the same as a message with no Authenticated Received
Chain.</t>

<t><spanx style="emph">INFORMATIONAL</spanx>: Recipients of an invalid or failing Authenticated Received Chain
can use that information as part of a wider handling context. ARC adoption
cannot be assumed by intermediaries; many intermediaries will continue to
modify messages without adding ARC Seals.</t>

<section anchor="all-failures-are-permanent" title="All Failures Are Permanent">

<t>Authenticated Received Chains represent the traversal of messages through one
or more intermediaries. All errors, including DNS failures, become
unrecoverable and are considered permanent.</t>

<t>Any error validating an Authenticated Received Chain results in a Chain
Validation Status of “fail”. For further discussion of this topic and the design
restriction which prevents chain continuation or re-establishment, see
<xref target="ARC-USAGE"/>.</t>

</section>
<section anchor="responding-to-arc-validation-failures-during-the-smtp-transaction" title="Responding to ARC Validation Failures During the SMTP Transaction">

<t>If an ARC Validator determines that the incoming message fails authentication
checks (potentially including ARC validation), the Validator MAY signal the
breakage through the extended SMTP response code 5.7.29 “ARC validation failure”
and corresponding SMTP basic response code. Validators MAY use the more
general 5.7.28 “Multiple authentication checks failed” instead.</t>

</section>
</section>
</section>
<section anchor="communication-of-validation-results" title="Communication of Validation Results">

<t>Chain Validation Status (described in <xref target="cv-defn"/>) is communicated via
Authentication-Results (and AAR) header fields using the auth method “arc”.
This auth method is described in <xref target="iana-auth"/>.</t>

<t>If necessary data is available, the ptypes and properties defined in 
<xref target="iana-ptypes"/> SHOULD be recorded in an Authentication-Results header field:</t>

<t><list style="symbols">
  <t>smtp.remote-ip - The address of the connection-initiating SMTP server, 
from which the message is being relayed.</t>
  <t>header.oldest-pass - The instance number of the oldest AMS that still
validates, or 0 if all pass.</t>
</list></t>

</section>
<section anchor="use-cases" title="Use Cases">

<t>This section explores several messaging handling use cases that are addressed
by ARC.</t>

<section anchor="trust-boundaries" title="Communicate Authentication Assessment Across Trust Boundaries">

<t>When an intermediary ADMD adds an ARC Set to a message’s Authenticated Received
Chain (or creates the initial ARC Set), the ADMD communicates its authentication
assessment to the next ARC-participating ADMD in the message handling path.</t>

<t>If ARC-enabled ADMDs are trusted, Authenticated Received Chains can be used to
bridge administrative boundaries.</t>

<section anchor="message-scanning-services" title="Message Scanning Services">

<t>Message services are available to perform anti-spam, anti-malware, and
anti-phishing scanning. Such services typically remove malicious content,
replace HTTP links in messages with sanitized links, and/or attach footers to
messages advertising the abilities of the message scanning service. These
modifications almost always break signature-based authentication (such as
DKIM).</t>

<t>Scanning services typically require clients to point MX records of an Internet
domain to the scanning service. Messages destined for the Internet domain are
initially delivered to the scanning service. Once scanning is performed,
messages are then routed to the client’s own mail handling infrastructure.
Re-routing messages in this way almost always breaks path-based authentication
(such as SPF).</t>

<t>Message scanning services can attach Authenticated Received Chains to messages
to communicate authentication assessment into client ADMDs. Clients can then
benefit from the message scanning service while processing messages as if the
client’s infrastructure were the original destination of the Internet domain’s
MX record.</t>

</section>
<section anchor="multi-tier-mta-processing" title="Multi-tier MTA Processing">

<t>Large message processing infrastructure is often divided into several
processing tiers that can break authentication information between tiers. For
example, a large site may maintain a cluster of MTAs dedicated to connection
handling and enforcement of IP-based reputation filtering. A secondary cluster
of MTAs may be dedicated and optimized for content-based processing of
messages.</t>

<t>Authenticated Received Chains can be used to communicate authentication assessment
between processing tiers.</t>

</section>
<section anchor="mailing-lists" title="Mailing Lists">

<t>Mailing lists take delivery of messages and re-post them to subscribers. A full
description of authentication-related mailing list issues can be found in
<xref target="RFC7960"/> Section 3.2.3.</t>

<t>Mailing list services can implement ARC to convey the authentication
assessment of posted messages sent to the list’s subscriber base. The ADMDs of the
mailing list subscribers can then use the Authenticated Received Chain to
determine the authentication assessment of the original message before mailing list
handling.</t>

</section>
</section>
<section anchor="inform-message-disposition-decisions" title="Inform Message Disposition Decisions">

<t>Intermediaries often break authentication through content modification,
interfere with path-based authentication (such as SPF), and strip
authentication results (if an MTA removes Authentication-Results header
fields).</t>

<t>Authenticated Received Chains allow ARC Validators to:</t>

<t><list style="numbers">
  <t>identify ARC-enabled ADMDs that break authentication while processing
  messages;</t>
  <t>gain extended visibility into the authentication-preserving abilities of
  ADMDs that relay messages into ARC-enabled ADMDs.</t>
</list></t>

<t>Through the collection of ARC-related data, an ADMD can identify handling paths
that have broken authentication.</t>

<t>An Authenticated Received Chain allows an Internet Mail Handler to potentially
base decisions of message disposition on authentication assessments provided by
different ADMDs.</t>

<section anchor="dmarc-local-policy-overrides" title="DMARC Local Policy Overrides">

<t>DMARC introduces a policy model where Domain Owners can request email receivers
to reject or quarantine messages that fail DMARC alignment. Interoperability
issues between DMARC and indirect email flows are documented in <xref target="RFC7960"/>.</t>

<t>Authenticated Received Chains allow DMARC processors to consider authentication
assessments provided by other ADMDs. As a matter of local policy, a DMARC processor
MAY choose to accept the authentication assessments provided by an Authenticated
Received Chain when determining if a message is DMARC compliant.</t>

<t>When an Authenticated Received Chain is used to determine message disposition,
the DMARC processor can communicate this local policy decision to Domain Owners
as described in <xref target="dmarc-rpt"/>.</t>

</section>
<section anchor="dmarc-rpt" title="DMARC Reporting">

<t>DMARC-enabled receivers indicate when ARC Validation influences DMARC-related
local policy decisions. When an ARC-enabled handler generates a DMARC report,
it MAY indicate the influence of ARC on their local policy decision(s) 
by adding a reason of “local_policy” with a comment string
(per <xref target="RFC7489"/> Appendix C) containing a list of data
discovered during ARC Validation, which at a minimum includes:</t>

<t><list style="symbols">
  <t>the Chain Validation Status,</t>
  <t>the domain and selector for each AS,</t>
  <t>the originating IP address from the first ARC Set:</t>
</list></t>

<figure><artwork><![CDATA[
EXAMPLE:

<policy_evaluated>
  <disposition>none</disposition>
  <dkim>fail</dkim>
  <spf>fail</spf>
  <reason>
   <type>local_policy</type>
   <comment>arc=pass as[2].d=d2.example as[2].s=s2 
     as[1].d=d1.example as[1].s=s3 
     remote-ip[1]=10.10.10.13</comment>
  </reason>
</policy_evaluated>
]]></artwork></figure>

<t>In the above example DMARC XML reporting fragment, data relating to specific
validated ARC Sets are enumerated using array syntax (eg, “as[2]” means AS
header field with instance value of 2). d2.example is the Sealing domain for
ARC Set #2 (i=2) and d1.example is the Sealing domain for ARC Set #1 (i=1).</t>

<t>Depending on the reporting practices of intermediate message handlers, Domain
Owners may receive multiple DMARC reports for a single message. Receivers of 
DMARC reports should be aware of this behaviour and make the necessary
accommodations.</t>

</section>
</section>
</section>
<section anchor="privacy-consider" title="Privacy Considerations">

<t>The Authenticated Received Chain provides a verifiable record of the handlers
for a message. This record may include Personally Identifiable Information such
as IP address(es) and domain names. Such information is also included in existing
non-ARC related header fields such as the “Received” header fields.</t>

</section>
<section anchor="security-consider" title="Security Considerations">

<t>The Security Considerations of <xref target="RFC6376"/> and <xref target="I-D-7601bis"/> apply directly
to this specification.</t>

<t>As with other domain authentication technologies (such as SPF, DKIM, and
DMARC), ARC makes no claims about the semantic content of messages.</t>

<section anchor="big-hf-risk" title="Increased Header Field Size">

<t>Inclusion of Authenticated Received Chains into messages may cause issues for
older or constrained MTAs due to increased total header field size. Large header
field blocks, in general, may cause failures to deliver or other outage scenarios for
such MTAs. ARC itself would not cause problems.</t>

</section>
<section anchor="dns-impact" title="DNS Operations">

<t>The validation of an Authenticated Received Chain composed of N ARC Sets can
require up to 2*N DNS queries (not including any DNS redirection mechanisms
which can increase the total number of queries). This leads to two
considerations:</t>

<t><list style="numbers">
  <t>An attacker can send a message to an ARC participant with a concocted
sequence of ARC Sets bearing the domains of intended victims, and all of them
will be queried by the participant until a failure is discovered. DNS caching
and the difficulty of forging the signature values should limit the extent of
this load to domains under control of the attacker. Query traffic pattern
analysis may expose information about downstream validating ADMD
infrastructure.</t>
  <t>DKIM only performs one DNS query per signature, while ARC can introduce many
(per chain). Absent caching, slow DNS responses can cause SMTP timeouts; and
backlogged delivery queues on Validating systems. This could be exploited as a
DoS attack.</t>
</list></t>

</section>
<section anchor="message-content-suspicion" title="Message Content Suspicion">

<t>Recipients are cautioned to treat messages bearing Authenticated Received
Chains with the same suspicion applied to all other messages. This includes
appropriate content scanning and other checks for potentially malicious
content.</t>

<t>ARC authenticates the identity of some email handling actors.  It does not make
any assessment of their trustworthiness.</t>

<t>Just as passing message authentication is not an indication of message safety,
forwarding that information through the mechanism of ARC is also not an
indication of message safety.  Even if all ARC-enabled ADMDs are trusted, ADMDs
may have become compromised, may miss unsafe content, or may not properly
authenticate messages.</t>

</section>
<section anchor="message-sealer-suspicion" title="Message Sealer Suspicion">

<t>Recipients are cautioned to treat every Sealer of the ARC Chain with suspicion.
Just as with a validated DKIM signature, responsibility for message handling is
attributed to the Sealing domain, but whether or not that Sealer is a malicious
actor is out of scope of the authentication mechanism.  Since ARC aids message
delivery in the event of an authentication failure, ARC Sealers should be
treated with suspicion, so that a malicious actor cannot Seal spam or other
fraudulent messages to aid their delivery, too.</t>

</section>
<section anchor="replay-attacks" title="Replay Attacks">

<t>Since ARC inherits heavily from DKIM, it has similar attack vectors. In
particular, the Replay Attack described in <xref target="RFC6376"/> section 8.6 is
potentially amplified by ARC’s chained statuses. In an ARC replay attack, a
malicious actor would take an intact and passing ARC Chain, and then resend it
to many recipients without making any modifications that invalidate the latest
AMS or AS. The impact to a receiver would be more DNS lookups and signature
evaluations. This scope of this attack can be limited by caching DNS queries
and following the same signing scope guidance from
<xref target="RFC6376"/> section 5.4.1.</t>

</section>
</section>
<section anchor="iana-considerations" title="IANA Considerations">

<t>[[ <spanx style="strong">Note to the RFC Editors:</spanx> “dkim - header - s” is defined in
<xref target="I-D-7601bis"/>. Please adjust the list below as appropriate. ]]</t>

<t>This draft introduces three new headers fields and updates the Email
Authentication Parameters registry with one new authentication method and
several status codes.</t>

<section anchor="iana-auth" title="Email Authentication Results Names Registry Update">

<t>This draft adds one Auth Method with three Codes to the IANA “Email
Authentication Result Names” registry:</t>

<t><list style="symbols">
  <t>Auth Method : arc<vspace />
Code: “none”, “pass”, “fail”<vspace />
Specification: &SELF; 2.2<vspace />
Status: active</t>
</list></t>

</section>
<section anchor="iana-ptypes" title="Email Authentication Methods Registry Update">

<t>This draft adds several new items to the Email Authentication Methods registry,
most recently defined in <xref target="I-D-7601bis"/>:</t>

<t><list style="symbols">
  <t>Method: arc<vspace />
Definition: &SELF;<vspace />
ptype: smtp<vspace />
Property: remote-ip<vspace />
Value: IP address of originating SMTP connection<vspace />
Status: active<vspace />
Version: 1</t>
  <t>Method: arc<vspace />
Definition: &SELF;<vspace />
ptype: header<vspace />
Property: oldest-pass<vspace />
Value: The instance id of the oldest validating AMS, or 0 if they all pass 
  (see <xref target="validate-actions"/>)<vspace />
Status: active<vspace />
Version: 1</t>
  <t>Method: dkim<vspace />
Definition: <xref target="I-D-7601bis"/><vspace />
ptype: header<vspace />
Property: s<vspace />
Value: value of signature “s” tag<vspace />
Status: active<vspace />
Version: 1</t>
</list></t>

</section>
<section anchor="iana-headers" title="Definitions of the ARC header fields">

<t>This specification adds three new header fields to the “Permanent Message
Header Field Registry”, as follows:</t>

<t><list style="symbols">
  <t>Header field name: ARC-Seal<vspace />
Applicable protocol: mail<vspace />
Status: draft<vspace />
Author/Change controller: IETF<vspace />
Specification document(s): &SELF;<vspace />
Related information: <xref target="RFC6376"/></t>
  <t>Header field name: ARC-Message-Signature<vspace />
Applicable protocol: mail<vspace />
Status: draft<vspace />
Author/Change controller: IETF<vspace />
Specification document(s): &SELF;<vspace />
Related information: <xref target="RFC6376"/></t>
  <t>Header field name: ARC-Authentication-Results<vspace />
Applicable protocol: mail<vspace />
Status: standard<vspace />
Author/Change controller: IETF<vspace />
Specification document(s): &SELF;<vspace />
Related information: <xref target="I-D-7601bis"/></t>
</list></t>

</section>
<section anchor="new-enhanced-status-code-arc-validation" title="New Enhanced Status Code - ARC Validation">

<t>The following value should be added to the <xref target="ENHANCED-STATUS"/> registry, as follows:</t>

<t><list style="symbols">
  <t>Code: X.7.29<vspace />
Sample Text: ARC validation failure<vspace />
Associated basic status code: 550<vspace />
Description: This status code may be returned when
   a message fails multiple authentication checks,
   including ARC validation<vspace />
Reference: &SELF;<vspace />
Submitter: K. Andersen<vspace />
Change controller: IESG</t>
</list></t>

</section>
</section>
<section anchor="exp-consider" title="Experimental Considerations">

<t>The ARC protocol is designed to address common interoperability issues
introduced by intermediate message handlers. Interoperability issues are
described in <xref target="RFC6377"/> and <xref target="RFC7960"/>.</t>

<t>As the ARC protocol is implemented by Internet Mail Handlers over time, the
following should be evaluated in order to determine the success of the protocol
in accomplishing the intended benefits.</t>

<section anchor="success-consideration" title="Success Consideration">

<t>In an attempt to deliver legitimate messages that users desire, many receivers
use heuristic-based methods to identify messages that arrive via indirect
delivery paths.</t>

<t>ARC will be a success if the presence of Authenticated Received Chains allows
for improved decision making when processing legitimate messages, specifically 
resulting in equal or better delivery rates than achieve through the use of 
heuristic approaches.</t>

</section>
<section anchor="failure-considerations" title="Failure Considerations">

<t>ARC should function without introducing significant new vectors for abuse (see
<xref target="security-consider"/>). If unforeseen vectors are enabled by ARC, then
this protocol will be a failure. Note that weaknesses inherent in the mail
protocols ARC is built upon (such as DKIM replay attacks and other known
issues) are not new vectors which can be attributed to this specification.</t>

</section>
<section anchor="open-questions" title="Open Questions">

<t>The following open questions are academic and have no clear answer at the time
of the development of the protocol. However, additional deployments should be
able to gather the necessary data to answer some or all of them.</t>

<section anchor="value-of-the-arc-seal-as-header-field" title="Value of the ARC-Seal (AS) Header Field">

<t>Data should be collected to show if the ARC-Seal (AS) provides value beyond the
ARC Message Signature (AMS) for either making delivery decisions or catching
malicious actors trying to craft or replay malicious chains.</t>

</section>
<section anchor="usage-andor-signals-from-multiple-selectors-andor-domains-in-arc-sets" title="Usage and/or signals from multiple selectors and/or domains in ARC sets">

<t>Any selectors and/or (sub)domains (under the control of the sealing ADMD) may be 
used for ARC header field signatures.</t>

<t>While implementers may choose to use various selectors and/or
domains for ARC set header fields, no compelling argument for or against such
usage has been made within the working group. As such we have chosen to allow
maximum freedom for the experimental definition of this protocol.</t>

<t>Wider deployment experience and higher volumes of traffic may show whether this
is useful.</t>

</section>
<section anchor="dns-overhead" title="DNS Overhead">

<t>Longer Authenticated Received Chains will require more queries to retrieve the
keys for validating the chain. While this is not believed to be a security
issue (see <xref target="dns-impact"/>), it is unclear how much overhead will truly
be added.  This is similar to some of the initial processing and query load
concerns which were debated at the time of the DKIM specification development.</t>

<t>Data should be collected to better understand usable length and distribution of
lengths found in valid Authenticated Received Chains along with the DNS
impact of processing Authenticated Received Chains.</t>

<t>An effective operational maximum will have to be developed through deployment
experience in the field.</t>

</section>
<section anchor="what-trace-information-is-valuable" title="What Trace Information is Valuable">

<t>There are several edge cases where the information in the AAR can make the
difference between message delivery or rejection. For example, if there is a
well known mailing list that seals with ARC but doesn’t do its own initial DMARC
enforcement, an Internet Mail Handler with this knowledge could make a delivery
decision based upon the authentication information it sees in the corresponding
AAR header field.</t>

<t>Certain trace information in the AAR is useful/necessary in the construction of
DMARC reports.</t>

<t>Further, certain receivers believe the entire set of trace information would be valuable
to feed into machine learning systems to identify fraud and/or provide other
signals related to message delivery.</t>

<t>At this point, however, it is unclear what trace information will be valuable
for all receivers, regardless of size.</t>

<t>Data should be collected on what trace information receivers are using that
provides useful signals that affect deliverability, and what portions of the
trace data are left untouched or provide no useful information.</t>

<t>Since many such systems are intentionally proprietary or confidential to
prevent gaming by abusers, it may not be viable to reliably answer this
particular question. The evolving nature of attacks can also shift the
landscape of “useful” information over time.</t>

</section>
</section>
</section>
<section anchor="implstat" title="Implementation Status">

<t>[[ Note to the RFC Editor: Please remove this section before
publication along with the reference to <xref target="RFC7942"/>. ]]</t>

<t>This section records the status of known implementations of the protocol
defined by this specification at the time of posting of this Internet-Draft,
and is based on a proposal described in <xref target="RFC7942"/>.  The description of
implementations in this section is intended to assist the IETF in its decision
processes in progressing drafts to RFCs.  Please note that the listing of any
individual implementation here does not imply endorsement by the IETF.
Furthermore, no effort has been spent to verify the information presented here
that was supplied by IETF contributors.  This is not intended as, and must not
be construed to be, a catalog of available implementations or their features.
Readers are advised to note that other implementations may exist.</t>

<t>This information is known to be correct as of the eighth interoperability
test event which was held on 2018-03-17 at IETF101.</t>

<t>For a few of the implementations, later status information was available as
of August 2018.</t>

<section anchor="gmail-test-reflector-and-incoming-validation" title="GMail test reflector and incoming validation">

<t>Organization: Google<vspace />
   Description: Internal production implementation with both debug
     analysis and validating + sealing pass-through function<vspace />
   Status of Operation: Production - Incoming Validation<vspace />
   Coverage: Full spec implemented as of <xref target="ARC-DRAFT-14"/><vspace />
   Licensing: Proprietary - Internal only<vspace />
   Implementation Notes:</t>

<t><list style="symbols">
  <t>Full functionality was demonstrated during the interop testing on 2018-03-17.</t>
</list></t>

<t>Contact Info: <eref target="mailto:arc-discuss@dmarc.org">arc-discuss@dmarc.org</eref></t>

</section>
<section anchor="aol-test-reflector-and-internal-tagging" title="AOL test reflector and internal tagging">

<t>Organization: AOL<vspace />
  Description: Internal prototype implementation with both debug
    analysis and validating + sealing pass-through function<vspace />
  Status of Operation: Beta<vspace />
  Coverage: ARC Chain validity status checking is operational, but only
    applied to email addresses enrolled in the test program.
    This system conforms to <xref target="ARC-DRAFT-05"/><vspace />
  Licensing: Proprietary - Internal only<vspace />
  Implementation Notes:</t>

<t><list style="symbols">
  <t>2017-07-15: Full functionality verified during the interop testing.</t>
  <t>2018-06: Partially retired but still accessible by special request
  due to the in process evolution of the AOL mail infrastructure to the
  integrated OATH environment. The implementation was based on the Apache
  James DKIM code base and may be contributed back to that project in 
  the future.</t>
</list></t>

<t>Contact Info: <eref target="mailto:arc-discuss@dmarc.org">arc-discuss@dmarc.org</eref></t>

</section>
<section anchor="dkimpy" title="dkimpy">

<t>Organization: dkimpy developers/Scott Kitterman<vspace />
   Description: Python DKIM package<vspace />
   Status of Operation: Production<vspace />
   Coverage:</t>

<t><list style="symbols">
  <t>2017-07-15: The internal test suite is incomplete, but the command line
   developmental version of validator was demonstrated to interoperate with
   the Google and AOL implementations during the interop on 2017-07-15 and the
   released version passes the tests in <xref target="ARC-TEST"/>
   <eref target="https://github.com/Valimail/arc_test_suite">arc_test_suite</eref> with both python and python3.</t>
</list></t>

<t>Licensing: Open/Other (same as dkimpy package = BCD version 2)<vspace />
   Contact Info: https://launchpad.net/dkimpy</t>

</section>
<section anchor="openarc" title="OpenARC">

<t>Organization: TDP/Murray Kucherawy<vspace />
  Description: Implementation of milter functionality related to the OpenDKIM
    and OpenDMARC packages<vspace />
  Status of Operation: Beta<vspace />
  Coverage: Built to support <xref target="ARC-DRAFT-14"/><vspace />
  Licensing: Open/Other (same as OpenDKIM and OpenDMARC packages)<vspace />
  Implementation Notes:</t>

<t><list style="symbols">
  <t>Known issues have been resolved with release X</t>
</list></t>

<t>Contact Info: <eref target="mailto:arc-discuss@dmarc.org">arc-discuss@dmarc.org</eref>, <eref target="mailto:openarc-users@openarc.org">openarc-users@openarc.org</eref></t>

</section>
<section anchor="mailman-3x-patch" title="Mailman 3.x patch">

<t>Organization: Mailman development team<vspace />
  Description: Integrated ARC capabilities within the Mailman 3.2 package<vspace />
  Status of Operation: Patch submitted<vspace />
  Coverage: Based on OpenARC<vspace />
  Licensing: Same as mailman package - GPL<vspace />
  Implementation Notes:</t>

<t><list style="symbols">
  <t>Appears to work properly in at least one beta deployment, but
  waiting on acceptance of the pull request into the mainline of
  mailman development</t>
</list></t>

<t>Contact Info: https://www.gnu.org/software/mailman/contact.html</t>

</section>
<section anchor="copernicamailerq-web-based-validation" title="Copernica/MailerQ web-based validation">

<t>Organization: Copernica<vspace />
  Description: Web-based validation of ARC-signed messages<vspace />
  Status of Operation: Beta<vspace />
  Coverage: Built to support <xref target="ARC-DRAFT-05"/><vspace />
  Licensing: On-line usage only<vspace />
  Implementation Notes:</t>

<t><list style="symbols">
  <t>Released 2016-10-24</t>
  <t>Requires full message content to be pasted into a web form found at
http://arc.mailerq.com/ (warning - https is not supported).</t>
  <t>An additional instance of an ARC signature can be added if one is
willing to paste a private key into an unsecured web form.</t>
  <t>2017-07-15: Testing shows that results match the other implementations
listed in this section.</t>
</list></t>

<t>Contact Info: https://www.copernica.com/</t>

</section>
<section anchor="rspamd" title="Rspamd">

<t>Organization: Rspamd community<vspace />
  Description: ARC signing and verification module<vspace />
  Status of Operation: Production, though deployment usage is unknown<vspace />
  Coverage: Built to support <xref target="ARC-DRAFT-14"/><vspace />
  Licensing: Open source<vspace />
  Implementation Notes:</t>

<t><list style="symbols">
  <t>2017-06-12: Released with version 1.6.0</t>
  <t>2017-07-15: Testing during the interop showed that the validation functionality
  interoperated with the Google, AOL, dkimpy and MailerQ implementations</t>
</list></t>

<t>Contact Info: https://rspamd.com/doc/modules/arc.html and https://github.com/vstakhov/rspamd</t>

</section>
<section anchor="perl-maildkim-module" title="PERL MAIL::DKIM module">

<t>Organization: FastMail<vspace />
  Description: Email domain authentication (sign and/or verify) module, 
previously included SPF / DKIM / DMARC, now has ARC added<vspace />
  Status of Operation: Production, deployment usage unknown<vspace />
  Coverage: Built to support <xref target="ARC-DRAFT-10"/><vspace />
  Licensing: Open Source<vspace />
  Implementation Notes:</t>

<t><list style="symbols">
  <t>2017-12-15: v0.50 released with full test set passing for ARC</t>
</list></t>

<t>Contact Info: http://search.cpan.org/~mbradshaw/Mail-DKIM-0.50/</t>

</section>
<section anchor="perl-mailmilterauthentication-module" title="PERL Mail::Milter::Authentication module">

<t>Organization: FastMail<vspace />
  Description: Email domain authentication milter, uses MAIL::DKIM (see above)<vspace />
  Status of Operation: Initial validation completed during IETF99 hackathon with some follow-on work 
  during the week<vspace />
  Coverage: Built to support <xref target="ARC-DRAFT-14"/><vspace />
  Licensing: Open Source<vspace />
  Implementation Notes:</t>

<t><list style="symbols">
  <t>2017-07-15: Validation functionality which interoperates with Gmail, AOL, dkimpy was demonstrated; later in
  the week of IETF99, the signing functionality was reported to be working</t>
  <t>2017-07-20: ARC functionality has not yet been pushed back to the github repo but should be showing up soon</t>
</list></t>

<t>Contact Info: https://github.com/fastmail/authentication_milter</t>

</section>
<section anchor="sympa-list-manager" title="Sympa List Manager">

<t>Organization: Sympa Dev Community<vspace />
  Description: Work in progress<vspace />
  Status of Operation: Work in progress<vspace />
  Coverage: unknown<vspace />
  Licensing: open source<vspace />
  Implementation Notes:</t>

<t><list style="symbols">
  <t>2018-01-05: Tracked as https://github.com/sympa-community/sympa/issues/153</t>
</list></t>

<t>Contact Info: https://github.com/sympa-community</t>

</section>
<section anchor="oracle-messaging-server" title="Oracle Messaging Server">

<t>Organization: Oracle<vspace />
  Description:<vspace />
  Status of Operation: Initial development work during IETF99 hackathon. Framework code is complete,
    crypto functionality requires integration with libsodium<vspace />
  Coverage: Work in progress<vspace />
  Licensing: Unknown<vspace />
  Implementation Notes:</t>

<t><list style="symbols">
  <t>2018-03: Protocol handling components are completed, but crypto is not yet functional.</t>
</list></t>

<t>Contact Info: Chris Newman, Oracle</t>

</section>
<section anchor="messagesystems-momentum-and-powermta-platforms" title="MessageSystems Momentum and PowerMTA platforms">

<t>Organization: MessageSystems/SparkPost<vspace />
  Description: OpenARC integration into the LUA-enabled Momentum processing space<vspace />
  Status of Operation: Beta<vspace />
  Coverage: Same as OpenARC<vspace />
  Licensing: Unknown<vspace />
  Implementation Notes:</t>

<t><list style="symbols">
  <t>Initial deployments for validation expected in mid-2018.</t>
</list></t>

<t>Contact Info: TBD
  <!-- TBD: check w/ Juan & Elliott regarding listing them here --></t>

</section>
<section anchor="exim" title="Exim">

<t>Organization: Exim developers<vspace />
  Status of Operation: Operational; requires specific enabling for compile.<vspace />
  Coverage: Full spec implemented as of <xref target="ARC-DRAFT-13"/><vspace />
  Licensing: GPL<vspace />
  Contact Info: exim-users@exim.org<vspace />
  Implementation notes:</t>

<t><list style="symbols">
  <t>Implemented as of Exim 4.91</t>
</list></t>

</section>
<section anchor="halon-mta" title="Halon MTA">

<t>Organization: Halon<vspace />
  Status of Operation: Operational as of May 2018<vspace />
  Coverage: Full spec implemented as of <xref target="ARC-DRAFT-14"/><vspace />
  Licensing: Commercial, trial version available for download<vspace />
  Contact Info: https://halon.io<vspace />
  Implementation notes:</t>

<t><list style="symbols">
  <t>GPL’d library with ARC capabilities: https://github.com/halon/libdkimpp</t>
</list></t>

</section>
<section anchor="iij" title="IIJ">

<t>Organization: Internet Initiative Japan (IIJ) 
  Status of Operation: Operational as of October 2018<vspace />
  Coverage: Full spec implemented as of &SELF;<vspace />
  Licensing: Internal<vspace />
  Contact Info: https://www.iij.ad.jp/en/<vspace />
  Implementation notes:</t>

<t><list style="symbols">
  <t>Internal MTA implementation validated during the ARC interop exercise in mid-October 2018</t>
</list></t>

</section>
</section>


  </middle>

  <back>

    <references title='Normative References'>

&RFC2119;
&RFC5234;
&RFC5322;
&RFC5598;
&RFC6376;
&RFC6377;
&RFC6532;
&RFC7208;
&RFC7405;
&RFC8174;
<reference anchor="draft-levine-eaiauth" target="https://tools.ietf.org/html/draft-levine-appsarea-eaiauth-03">
  <front>
    <title>E-mail Authentication for Internationalized Mail</title>
    <author initials="J." surname="Levine" fullname="John Levine">
      <organization></organization>
    </author>
    <date year="2018" month="August" day="11"/>
  </front>
</reference>
<reference anchor="I-D-7601bis" target="https://datatracker.ietf.org/doc/draft-ietf-dmarc-rfc7601bis/">
  <front>
    <title>Message Header Field for Indicating Message Authentication Status</title>
    <author initials="M." surname="Kucherawy" fullname="Murray Kucherawy">
      <organization></organization>
    </author>
    <date year="2018" month="February" day="07"/>
  </front>
</reference>


    </references>

    <references title='Informative References'>

&RFC7942;
&RFC7489;
&RFC7960;
<reference anchor="ENHANCED-STATUS" target="http://www.iana.org/assignments/smtp-enhanced-status-codes/smtp-enhanced-status-codes.xhtml">
  <front>
    <title>IANA SMTP Enhanced Status Codes</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="ARC-DRAFT-14" target="https://tools.ietf.org/html/draft-ietf-dmarc-arc-protocol-14">
  <front>
    <title>Authenticated Received Chain (ARC) Protocol (I-D-14)</title>
    <author initials="K." surname="Andersen" fullname="Kurt Andersen">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="ARC-DRAFT-13" target="https://tools.ietf.org/html/draft-ietf-dmarc-arc-protocol-13">
  <front>
    <title>Authenticated Received Chain (ARC) Protocol (I-D-13)</title>
    <author initials="K." surname="Andersen" fullname="Kurt Andersen">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="ARC-DRAFT-10" target="https://tools.ietf.org/html/draft-ietf-dmarc-arc-protocol-10">
  <front>
    <title>Authenticated Received Chain (ARC) Protocol (I-D-10)</title>
    <author initials="K." surname="Andersen" fullname="Kurt Andersen">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="ARC-DRAFT-05" target="https://tools.ietf.org/html/draft-ietf-dmarc-arc-protocol-05">
  <front>
    <title>Authenticated Received Chain (ARC) Protocol (I-D-05)</title>
    <author initials="K." surname="Andersen" fullname="Kurt Andersen">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="ARC-USAGE" target="https://tools.ietf.org/html/draft-ietf-dmarc-arc-usage-05">
  <front>
    <title>Recommended Usage of the ARC Headers</title>
    <author initials="S." surname="Jones" fullname="Steven Jones">
      <organization></organization>
    </author>
    <author initials="T." surname="Adams" fullname="Trent Adams">
      <organization></organization>
    </author>
    <author initials="J." surname="Rae-Grant" fullname="John Rae-Grant">
      <organization></organization>
    </author>
    <author initials="K." surname="Andersen" fullname="Kurt Andersen">
      <organization></organization>
    </author>
    <date year="2018" month="April"/>
  </front>
</reference>
<reference anchor="ARC-MULTI" target="https://tools.ietf.org/html/draft-ietf-dmarc-arc-multi-02">
  <front>
    <title>Using Multiple Signing Algorithms with ARC</title>
    <author initials="K." surname="Andersen" fullname="Kurt Andersen">
      <organization></organization>
    </author>
    <date year="2018" month="June"/>
  </front>
</reference>
<reference anchor="ARC-TEST" target="https://github.com/Valimail/arc_test_suite">
  <front>
    <title>ARC Test Suite</title>
    <author initials="S." surname="Blank" fullname="Seth Blank">
      <organization></organization>
    </author>
    <date year="2017" month="January"/>
  </front>
</reference>


    </references>


<section anchor="appendix-a-design-requirements" title="Appendix A - Design Requirements">

<t>The specification of the ARC framework is driven by the following high-level
goals, security considerations, and practical operational requirements.</t>

<section anchor="primary-design-criteria" title="Primary Design Criteria">

<t><list style="symbols">
  <t>Provide a verifiable “chain of custody” for email messages;</t>
  <t>Not require changes for originators of email;</t>
  <t>Support the verification of the ARC header field set by each hop in the
handling chain;</t>
  <t>Work at Internet scale; and</t>
  <t>Provide a trustable mechanism for the communication of Authentication-Results
across trust boundaries.</t>
</list></t>

</section>
<section anchor="out-of-scope" title="Out of Scope">

<t>ARC is not a trust framework. Users of the ARC header fields are cautioned against
making unsubstantiated conclusions when encountering a “broken” ARC sequence.</t>

</section>
</section>
<section anchor="appendix-b-example-usage" title="Appendix B - Example Usage">

<t>The following message is an example of one which has passed through several 
intermediary handlers, some of which have modified the message and others which
have not:</t>

<figure><artwork><![CDATA[
Return-Path: <jqd@d1.example>
Received: from example.org (example.org [208.69.40.157])
    by gmail.example with ESMTP id d200mr22663000ykb.93.1421363207
    for <fmartin@example.com>; Thu, 14 Jan 2015 15:02:40 -0800 (PST)
Received: from segv.d1.example (segv.d1.example [72.52.75.15])
    by lists.example.org (8.14.5/8.14.5) with ESMTP id t0EKaNU9010123
    for <arc@example.org>; Thu, 14 Jan 2015 15:01:30 -0800 (PST)
    (envelope-from jqd@d1.example)
Received: from [10.10.10.131] (w-x-y-z.dsl.static.isp.com [w.x.y.z])
    (authenticated bits=0)
    by segv.d1.example with ESMTP id t0FN4a8O084569;
    Thu, 14 Jan 2015 15:00:01 -0800 (PST)
    (envelope-from jqd@d1.example)
Received: from mail-ob0-f188.google.example (mail-ob0-f188.google.example
    [208.69.40.157]) by clochette.example.org with ESMTP id
    d200mr22663000ykb.93.1421363268
    for <fmartin@example.org>; Thu, 14 Jan 2015 15:03:15 -0800 (PST)
ARC-Seal: i=3; a=rsa-sha256; cv=pass; d=clochette.example.org; s=
        clochette; t=12345; b=CU87XzXlNlk5X/yW4l73UvPUcP9ivwYWxyBWcVrRs7
        +HPx3K05nJhny2fvymbReAmOA9GTH/y+k9kEc59hAKVg==
ARC-Message-Signature: i=3; a=rsa-sha256; c=relaxed/relaxed; d=
        clochette.example.org; h=message-id:date:from:to:subject; s=
        clochette; t=12345; bh=KWSe46TZKCcDbH4klJPo+tjk5LWJnVRlP5pvjXFZY
        LQ=; b=o71vwyLsK+Wm4cOSlirXoRwzEvi0vqIjd/2/GkYFYlSd/GGfKzkAgPqxf
        K7ccBMP7Zjb/mpeggswHjEMS8x5NQ==
ARC-Authentication-Results: i=3; clochette.example.org; spf=fail
    smtp.from=jqd@d1.example; dkim=fail (512-bit key)
    header.i=@d1.example; dmarc=fail; arc=pass (as.2.gmail.example=pass,
    ams.2.gmail.example=pass, as.1.lists.example.org=pass,
    ams.1.lists.example.org=fail (message has been altered))
Authentication-Results: clochette.example.org; spf=fail
    smtp.from=jqd@d1.example; dkim=fail (512-bit key)
    header.i=@d1.example; dmarc=fail; arc=pass (as.2.gmail.example=pass, 
    ams.2.gmail.example=pass, as.1.lists.example.org=pass, 
    ams.1.lists.example.org=fail (message has been altered))
ARC-Seal: i=2; a=rsa-sha256; cv=pass; d=gmail.example; s=20120806; t=
        12345; b=Zpukh/kJL4Q7Kv391FKwTepgS56dgHIcdhhJZjsalhqkFIQQAJ4T9BE
        8jjLXWpRNuh81yqnT1/jHn086RwezGw==
ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=
        gmail.example; h=message-id:date:from:to:subject; s=20120806; t=
        12345; bh=KWSe46TZKCcDbH4klJPo+tjk5LWJnVRlP5pvjXFZYLQ=; b=CVoG44
        cVZvoSs2mMig2wwqPaJ4OZS5XGMCegWqQs1wvRZJS894tJM0xO1RJLgCPsBOxdA5
        9WSqI9s9DfyKDfWg==
ARC-Authentication-Results: i=2; gmail.example; spf=fail
    smtp.from=jqd@d1.example; dkim=fail (512-bit key)
    header.i=@example.org; dmarc=fail; arc=pass (as.1.lists.example.org=pass, 
    ams.1.lists.example.org=pass)
ARC-Seal: i=1; a=rsa-sha256; cv=none; d=lists.example.org; s=dk-lists;
         t=12345; b=TlCCKzgk3TrAa+G77gYYO8Fxk4q/Ml0biqduZJeOYh6+0zhwQ8u/
        lHxLi21pxu347isLSuNtvIagIvAQna9a5A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=
        lists.example.org; h=message-id:date:from:to:subject; s=
        dk-lists; t=12345; bh=KWSe46TZKCcDbH4klJPo+tjk5LWJnVRlP5pvjXFZYL
        Q=; b=DsoD3n3hiwlrN1ma8IZQFgZx8EDO7Wah3hUjIEsYKuShRKYB4LwGUiKD5Y
        yHgcIwGHhSc/4+ewYqHMWDnuFxiQ==
ARC-Authentication-Results: i=1; lists.example.org; spf=pass smtp.mfrom=jqd@d1.example;
    dkim=pass (512-bit key) header.i=@d1.example;
    dmarc=pass
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=d1.example; h=
        message-id:date:from:to:subject; s=origin2015; bh=bIxxaeIQvmOBdT
        AitYfSNFgzPP4=; b=qKjd5fYibKXWWIcMKCgRYuo1vJ2fD+IAQPjX+uamXIGY2Q
        0HjQ+Lq3/yHzG3JHJp6780/nKQPOWt2UDJQrJkEA==
Message-ID: <54B84785.1060301@d1.example>
Date: Thu, 14 Jan 2015 15:00:01 -0800
From: John Q Doe <jqd@d1.example>
To: arc@dmarc.example
Subject: [List 2] Example 1

Hey gang,
This is a test message.
--J.
]]></artwork></figure>

</section>
<section anchor="acknowledgements" title="Acknowledgements">

<t>This draft originated with the work of OAR-Dev Group.</t>

<t>The authors thank all of the OAR-Dev and the subsequent DMARC-WG group for the
ongoing help and though-provoking discussions from all the participants,
especially: Alex Brotman, Brandon Long, Dave Crocker, Elizabeth Zwicky, Franck
Martin, Greg Colburn, J. Trent Adams, John Rae-Grant, Mike Hammer, Mike Jones,
Steve Jones, Terry Zink, Tim Draegen, Gene Shuman, Scott Kitterman, Bron
Gondwana.</t>

<t>Grateful appreciation is extended to the people who provided feedback through
the discuss mailing list.</t>

</section>
<section anchor="comments-and-feedback" title="Comments and Feedback">

<t>Please address all comments, discussions, and questions to <eref target="mailto:dmarc@ietf.org">dmarc@ietf.org</eref>.
Earlier discussions can be found at <eref target="mailto:arc-discuss@dmarc.org">arc-discuss@dmarc.org</eref>.  Interop
discussions planning can be found at <eref target="mailto:arc-interop@dmarc.org">arc-interop@dmarc.org</eref>.</t>

<t>Some introductory material for less technical people can be found at
<eref target="https://arc-spec.org">https://arc-spec.org</eref>.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

