<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.2.9 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!ENTITY RFC2119 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC5234 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.5234.xml">
<!ENTITY RFC5322 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.5322.xml">
<!ENTITY RFC5598 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.5598.xml">
<!ENTITY RFC6376 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.6376.xml">
<!ENTITY RFC6377 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.6377.xml">
<!ENTITY RFC6532 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.6532.xml">
<!ENTITY RFC7208 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7208.xml">
<!ENTITY RFC7405 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7405.xml">
<!ENTITY RFC8174 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
<!ENTITY RFC7942 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7942.xml">
<!ENTITY RFC7489 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7489.xml">
<!ENTITY RFC7960 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7960.xml">
<!ENTITY SELF "this document">
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-dmarc-arc-protocol-20" category="exp">

  <front>
    <title abbrev="ARC-Protocol">Authenticated Received Chain (ARC) Protocol</title>

    <author initials="K." surname="Andersen" fullname="Kurt Andersen">
      <organization>LinkedIn</organization>
      <address>
        <postal>
          <street>1000 West Maude Ave</street>
          <city>Sunnyvale</city>
          <region>California</region>
          <code>94085</code>
          <country>USA</country>
        </postal>
        <email>kurt+ietf@drkurt.com</email>
      </address>
    </author>
    <author initials="B." surname="Long" fullname="Brandon Long" role="editor">
      <organization>Google</organization>
      <address>
        <email>blong@google.com</email>
      </address>
    </author>
    <author initials="S." surname="Blank" fullname="Seth Blank" role="editor">
      <organization>Valimail</organization>
      <address>
        <email>seth@valimail.com</email>
      </address>
    </author>
    <author initials="M." surname="Kucherawy" fullname="Murray Kucherawy" role="editor">
      <organization>TDP</organization>
      <address>
        <email>superuser@gmail.com</email>
      </address>
    </author>

    <date year="2018" month="November"/>

    <area>art</area>
    <workgroup>DMARC Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>The Authenticated Received Chain (ARC) protocol provides an authenticated
“chain of custody” for a message, allowing each entity that handles the message
to see what entities handled it before, and to see what the message’s
authentication assessment was at each step in the handling.</t>

<t>ARC allows Internet Mail Handlers to attach assertions of message
authentication assessment to individual messages. As messages traverse ARC-enabled
Internet Mail Handlers, additional ARC assertions can be attached to messages
to form ordered sets of ARC assertions that represent the authentication assessment
at each step of message handling paths.</t>

<t>ARC-enabled Internet Mail Handlers can process sets of ARC assertions to inform
message disposition decisions, to identify Internet Mail Handlers that might
break existing authentication mechanisms, and to convey original authentication
assessments across trust boundaries.</t>



    </abstract>


  </front>

  <middle>


<section anchor="intro" title="Introduction">

<t>The utility of widely deployed email authentication technologies such as Sender
Policy Framework (SPF) <xref target="RFC7208"/> and DomainKeys Identified Mail (DKIM)
<xref target="RFC6376"/> is impacted by the processing of Internet Mail by intermediate
handlers. This impact is thoroughly documented in the defining documents for
SPF and DKIM and further discussed in <xref target="RFC6377"/> and <xref target="RFC7960"/>.</t>

<t>DMARC <xref target="RFC7489"/> also relies upon SPF and DKIM authentication mechanisms.
Failures of authentication caused by the actions of intermediate handlers can
cause legitimate mail to be incorrectly rejected or misdirected.</t>

<t>Authenticated Received Chain (ARC) creates a mechanism for individual Internet
Mail Handlers to add their authentication assessment to a message’s
ordered set of handling results. ARC encapsulates the authentication assessment in a
DKIM signature derivative to grant other handlers the ability to verify the
authenticity of the individual assessment assertion as well as the aggregate
set and sequence of results.</t>

<t>Ordered sets of authentication assessments can be used by ARC-enabled Internet Mail
Handlers to inform message handling disposition, to identify where alteration
of message content might have occurred, and to provide additional trace
information for use in understanding message handling paths.</t>

</section>
<section anchor="general-concepts" title="General Concepts">

<t>ARC is loosely based on concepts from evidence collection. Evidence is usually
collected, labeled, stored, and transported in specific ways to preserve the
state of evidence and to document all processing steps.</t>

<section anchor="evidence" title="Evidence">

<t>In ARC’s situation, the “evidence” is a message’s authentication assessment at any
point along the delivery path between origination and final delivery.
Determination of message authentication can be affected when intermediate
handlers modify message content (header fields and/or body content), route
messages through unforeseen paths, or change envelope information.</t>

<t>The authentication assessment for a message is determined upon receipt of a
message and documented in the Authentication-Results header field(s). ARC
extends this mechanism to survive transit through intermediary ADMDs.</t>

<t>Because the first-hand determination of an authentication assessment can never
be reproduced by other handlers, the assertion of the authentication assessment
is more akin to testimony by a verifiable party than hard evidence which can be
independently evaluated.</t>

</section>
<section anchor="custody" title="Custody">

<t>“Custody” refers to when an Internet Mail Handler processes a message. When a
handler takes custody of a message, the handler becomes a custodian and
attaches their own evidence (authentication assessment upon receipt) to the
message if they are ARC-enabled. Evidence is added in such a way so that future
handlers can verify the authenticity of both evidence and custody.</t>

</section>
<section anchor="chain-of-custody" title="Chain of Custody">

<t>The “chain of custody” of ARC is the entire set of evidence and custody that
travels with a message.</t>

</section>
<section anchor="validation-of-chain-of-custody" title="Validation of Chain of Custody">

<!-- Done: review and update from Crocker -->
<!-- adjusted to use testimony/assertion lingo -->

<t>Any ARC-enabled Internet Mail Handler can validate the entire set of custody
and the authentication assessments asserted by each party to yield a valid Chain of
Custody. If the evidence-supplying custodians can be trusted, then the
validated Chain of Custody describes the (possibly changing) authentication
assessment as the message traveled through various custodians.</t>

<t>Even though a message’s authentication assessment might have changed, the validated
chain of custody can be used to determine if the changes (and the custodians
responsible for the changes) can be tolerated.</t>

</section>
</section>
<section anchor="terminology-and-definitions" title="Terminology and Definitions">

<t>This section defines terms used in the rest of the document.</t>

<t>Readers should to be familiar with the contents, core concepts, and definitions
found in <xref target="RFC5598"/>. The potential roles of transit services in the delivery of
email are directly relevant.</t>

<t>Language, syntax (including some ABNF constructs), and concepts are imported
from DKIM <xref target="RFC6376"/>. Specific references to DKIM are made throughout this
document.  The following terms are imported from <xref target="RFC5598"/>:</t>

<t><list style="symbols">
  <t>ADministrative Management Domain (ADMD), Section 2.3</t>
  <t>Message Transfer Agents (MTA), Section 4.3.2</t>
  <t>Message Submission Agent (MSA), Section 4.3.1</t>
  <t>Message Delivery Agent (MDA), Section 4.3.3</t>
</list></t>

<t>Syntax descriptions use Augmented BNF (ABNF) <xref target="RFC5234"/> and <xref target="RFC7405"/>.</t>

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL
NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”,
“MAY”, and “OPTIONAL” in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
These words may also appear in this document in
lower case as plain English words, absent their normative meanings.</t>

<section anchor="arc-set-defn" title="ARC Set">

<t><xref target="hdr-defn"/> introduces three (3) ARC header fields which are added to a
message by an ARC-enabled internet mail handler. Together, these three header
fields compose a single “ARC Set”. An ARC Set provides the means for an
Internet Mail Handler to attach an authentication assessment to a message in a manner
that can be verified by future handlers. A single message can contain multiple
ARC Sets.</t>

<t>In general concept terms, an ARC Set represents Evidence and Custody.</t>

</section>
<section anchor="arc-chain-defn" title="Authenticated Received Chain (ARC)">

<t>The sequence of ARC Sets attached to a message at a given time is called the
Authenticated Received Chain. An Authenticated Received Chain is the record of
individual authentication assessments as a message traverses through
ARC-participating ADMDs.</t>

<t>The first attachment of an ARC Set to a message causes an Authenticated
Received Chain to be created. Additional attachments of ARC Sets cause the
Authenticated Received Chain to be extended.</t>

<t>In General concept terms, an Authenticated Received Chain represents Chain of Custody.</t>

</section>
<section anchor="internet-mail-handlers-intermediaries" title="Internet Mail Handlers / Intermediaries">

<t>Internet Mail Handlers process and deliver messages across the Internet and
include MSAs, MTAs, MDAs, gateways, and mailing lists as defined in <xref target="RFC5598"/>.</t>

<t>Throughout this document the term “intermediaries” refers to the both regular
MTAs as well as delivery/reposting agents such as mailing lists covered within
the scope of <xref target="RFC5598"/>’s transit services.</t>

<t>“Intermediaries” and “Internet Mail Handlers” are used synonymously throughout 
this document.</t>

</section>
<section anchor="authentication-assessment" title="Authentication Assessment">

<t>The Authentication Assessment which is affixed to a message as part of each ARC
Set consists of the “authres-payload” <xref target="I-D-7601bis"/>. For the integrity of an
ARC Set, the Authentication Assessment only needs to be properly encapsulated
within the ARC Set as defined below <xref target="hdr-defn"/>. The accuracy or syntax of the
authres-payload field does not affect the validity of the ARC chain itself.</t>

</section>
<section anchor="sign_v_seal" title="Signing vs Sealing">

<t>Signing is the process of affixing a digital signature to a message as a header
field, such as when a DKIM-Signature (as in <xref target="RFC6376"/> section 2.1), or an AMS
or AS is added. Sealing is when an ADMD affixes a complete and valid ARC Set to
a message creating or continuing an Authenticated Received Chain.</t>

</section>
<section anchor="sealer" title="Sealer">

<t>A Sealer is an Internet Mail Handler that attaches a complete and valid ARC Set
to a message.</t>

<t>In general concept terms, a Sealer adds its testimony (assertion of authentication
assessment) and proof of custody to the Chain of Custody.</t>

</section>
<section anchor="validator" title="Validator">

<t>A Validator is an ARC-enabled Internet Mail Handler that evaluates an
Authenticated Received Chain for validity and content. The process of
evaluation of the individual ARC Sets that compose an Authenticated Received
Chain is described in <xref target="validate-actions"/>.</t>

<t>In general concept terms, a Validator inspects the Chain of Custody to
determine the content and validity of individual Evidence supplied by
custodians.</t>

</section>
<section anchor="imported-abnf-tokens" title="Imported ABNF Tokens">

<t>The following ABNF tokens are imported:</t>

<t><list style="symbols">
  <t>tag-list (<xref target="RFC6376"/> section 3.2)</t>
  <t>authres-payload (<xref target="I-D-7601bis"/> section 2.2)</t>
  <t>cfws (<xref target="RFC5322"/> section 3.2.2)</t>
</list></t>

</section>
<section anchor="common-abnf-tokens" title="Common ABNF Tokens">

<t>The following ABNF tokens are used elsewhere in this document:</t>

<figure><artwork><![CDATA[
position     = 1*2DIGIT                         ; 1 - 50
instance     = [CFWS] %s"i" [CFWS] "=" 
               [CFWS] position 
chain-status = ("none" / "fail" / "pass")
seal-cv-tag  = %s"cv" [CFWS] "=" 
               [CFWS] chain-status
]]></artwork></figure>

</section>
</section>
<section anchor="protocol-elements" title="Protocol Elements">

<section anchor="hdr-defn" title="ARC Header Fields">

<t>ARC introduces three new header fields. Syntax for new header fields adapts
existing specifications. This document only describes where ARC-specific
changes in syntax and semantics differ from existing specifications.</t>

<section anchor="aar-defn" title="ARC-Authentication-Results (AAR)">

<t>The ARC-Authentication-Results (AAR) header field records the message
authentication assessment as processed by an ARC-participating ADMD at message
arrival time.</t>

<t>In general concept terms, the AAR header field is where Evidence is recorded by
a custodian.</t>

<t>The AAR header field is similar in syntax and semantics to an
Authentication-Results field <xref target="I-D-7601bis"/>, with two (2) differences:</t>

<t><list style="symbols">
  <t>the name of the header field itself;</t>
  <t>the presence of the “instance tag”. Additional information on the “instance
tag” can be found in <xref target="i-defn"/>.</t>
</list></t>

<t>The formal ABNF for the AAR header field is:</t>

<figure><artwork><![CDATA[
arc-info = instance [CFWS] ";" authres-payload
arc-authres-header = "ARC-Authentication-Results:" [CFWS] arc-info
]]></artwork></figure>

<t>Because there is only one AAR allowed per ARC set, the AAR MUST contain the
combined authres-payload with all of the authentication results from within the
participating ADMD, regardless of how many Authentication-Results header fields
are attached to the message.</t>

<!-- Done: consider note that syntax violating authres-payloads do not 
affect the validity of the ARC set? Move to usage doc...

Also note that any failures of sealers to properly construct the authres-payload
do not invalidate the ARC set as long as they are properly encapsulated within
the AS signature.
-->

</section>
<section anchor="ams-defn" title="ARC-Message-Signature (AMS)">

<t>The ARC-Message-Signature (AMS) header field allows an ARC-participating ADMD
to convey some responsibility (custodianship) for a message and possible
message modifications to future ARC-participating custodians.</t>

<t>In general concept terms, the AMS header field identifies a custodian.</t>

<t>The AMS header field has the same syntax and semantics as the DKIM-Signature
field <xref target="RFC6376"/>, with three (3) differences:</t>

<t><list style="symbols">
  <t>the name of the header field itself;</t>
  <t>no version tag (“v”) is defined for the AMS header field. As required 
for undefined
tags (in <xref target="RFC6376"/>), if seen, a version tag MUST be ignored;</t>
  <t>the “i” (AUID) tag is not imported from DKIM; instead, this tag is replaced 
by the “instance tag” as defined in <xref target="i-defn"/>;</t>
</list></t>

<t>ARC places no requirements on the selectors and/or domains used for the AMS
header field signatures.</t>

<t>The formal ABNF for the AMS header field is:</t>

<figure><artwork><![CDATA[
arc-ams-info = instance [CFWS] ";" tag-list
arc-message-signature = "ARC-Message-Signature:" [CFWS] arc-ams-info
]]></artwork></figure>

<t>To reduce the chances of accidental invalidation of AMS signatures:</t>

<t><list style="symbols">
  <t>AMS header fields are added by ARC-participating ADMDs as messages exit the
ADMD. AMS header fields SHOULD be attached so that any modifications made by
the ADMD are included in the signature of the AMS header field.</t>
  <t>Authentication-Results header fields MUST NOT be included in AMS signatures
as they are likely to be deleted by downstream ADMDs (per 
<xref target="I-D-7601bis"/> Section 5).</t>
  <t>ARC-related header fields (ARC-Authentication-Results, ARC-Message-Signature,
ARC-Seal) MUST NOT be included in the list of header fields covered by the
signature of the AMS header field.</t>
</list></t>

<t>To preserve the ability to verify the integrity of a message, the signature of
the AMS header field SHOULD include any DKIM-Signature header fields already
present in the message.</t>

</section>
<section anchor="as-defn" title="ARC-Seal (AS)">

<t>The ARC-Seal (AS) header field permits ARC-participating
ADMDs to verify the integrity of AAR header fields and corresponding AMS
header fields.</t>

<t>In general concept terms, the AS header field is how custodians bind their
authentication assessments (testimonial) into a Chain of Custody so that
Validators can inspect individual evidence and custodians.</t>

<t>The AS header field is similar in syntax and semantics to DKIM-Signatures
<xref target="RFC6376"/>, with the following differences:</t>

<t><list style="symbols">
  <t>the “i” (AUID) tag is not imported from DKIM; instead, this tag is replaced 
by the “instance tag” as defined in <xref target="i-defn"/>;</t>
  <t>the signature of the AS header field does not cover the body of the
message and therefore there is no ‘bh’ tag. The signature of the AS header 
field only covers specific header fields as defined in <xref target="as-hdrs"/>;</t>
  <t>no body canonicalization is performed as the AS signature does not cover the
body of a message;</t>
  <t>only “relaxed” header field canonicalization (<xref target="RFC6376"/> section 3.4.2) is used;</t>
  <t>the only supported tags are “i” (from <xref target="i-defn"/> of this document), and
“a”, “b”, “d, “s”, “t” from <xref target="RFC6376"/> Section 3.5. Note especially that
the DKIM “h” tag is NOT allowed and if found, MUST result in a cv status
of “fail” (for more information see <xref target="as-hdrs"/>);</t>
  <t>an additional tag, “cv” (“seal-cv-tag” in the ARC-Seal ABNF definition) is
used to communicate Chain Validation Status to subsequent ADMDs.</t>
</list></t>

<t>ARC places no requirements on the selectors and/or domains used for the AS
header field signatures.</t>

<t>The formal ABNF for the AS header field is:</t>

<figure><artwork><![CDATA[
arc-as-info = instance [CFWS] ";" tag-list
arc-seal = "ARC-Seal:" [CFWS] arc-as-info
]]></artwork></figure>

</section>
<section anchor="internationalized-email-eai" title="Internationalized Email (EAI)">

<t>In internationalized messages <xref target="RFC6532"/> many header fields can contain UTF-8
as well as ASCII text.  The changes for EAI are all inherited from DKIM as
updated by <xref target="draft-levine-eaiauth"/> and Authentication-Results as updated
in <xref target="I-D-7601bis"/>, but are called out here for emphasis.</t>

<t>In all ARC header fields, the d= s= tags can contain U-labels.  In all tags,
non-ASCII characters need not be quoted in dkim-quoted-printable.</t>

<t>The AAR header allows UTF-8 in the same places that A-R does, as
described in <xref target="I-D-7601bis"/>.</t>

</section>
</section>
<section anchor="arc-set" title="ARC Set">

<t>An “ARC Set” is a single collection of three ARC header fields (AAR, AMS, and AS).
ARC header fields of an ARC Set share the same “instance” value.</t>

<t>By adding all ARC header fields to a message, an ARC Sealer adds an ARC Set to a
message. A description of how Sealers add an ARC Set to a message is found in
<xref target="sealer-actions"/>.</t>

<section anchor="i-defn" title="Instance Tags">

<t>Instance tags describe which ARC header fields belong to an ARC Set. Each ARC
header field of an ARC Set shares the same instance tag value.</t>

<t>Instance tag values are integers that begin at 1 and are incremented by each
addition of an ARC Set. Through the incremental values of instance tags, an ARC
Validator can determine the order in which ARC Sets were added to a message.</t>

<t>Instance tag values can range from 1-50 (inclusive).</t>

<!-- TBD: Dave's comment to cite technical/operational concerns -->

<t><spanx style="emph">INFORMATIONAL:</spanx> The upper limit of 50 was picked based on some initial
observations reported by early working group members. The value was chosen so
as to balance the risk of excessive header field growth <xref target="big-hf-risk"/> against
expert opinion regarding the probability of long-tail but non-looping
multiple-intermediary mail flows.  Longer ARC chains will also impose load on
validators and DNS to support additional verification steps.  Observed
quantities of “Received” header fields was also considered in establishing this
as an experimental initial value.</t>

<t>Valid ARC Sets MUST have exactly one instance of each ARC header field (AAR,
AMS, and AS) for a given instance value and signing algorithm.</t>

<t>For handling multiple signing algorithms, see <xref target="ARC-MULTI"/>.</t>

</section>
</section>
<section anchor="authenticated-received-chain" title="Authenticated Received Chain">

<t>An Authenticated Received Chain is an ordered collection of ARC Sets. As ARC
Sets are enumerated sets of ARC header fields, an Authenticated Received Chain
represents the output of message authentication assessments along the handling path
of ARC-enabled processors.</t>

<t>Authentication Assessments determined at each step of the ARC-enabled
handling path is present in an Authenticated Received Chain in the form of AAR
header fields. The ability to verify the identity of message handlers and the
integrity of message content is provided by AMS header fields. AS header fields
allow messages handlers to validate the assertions, order and sequence of the
Authenticated Received Chain itself.</t>

<t>In general concept terms, an Authenticated Received Chain represents a
message’s Chain of Custody. Validators can consult a message’s Chain of Custody
to gain insight regarding each custodian of a message and the Evidence
collected by each custodian.</t>

</section>
<section anchor="cv-defn" title="Chain Validation Status">

<t>The state of the Authenticated Received Chain at a specific processing step is
called the “Chain Validation Status”. Chain Validation Status information is
communicated in several ways:</t>

<t><list style="symbols">
  <t>the AS header field in the “cv” tag, and</t>
  <t>as part of Authentication-Results and AAR header field(s).</t>
</list></t>

<t>Chain Validation Status has one of three possible values:</t>

<t><list style="symbols">
  <t>none: There was no Authenticated Received Chain on the message when it
arrived for validation. Typically, this occurs when a message is received
directly from a message’s original Message Transfer Agent (MTA) or Message
Submission Agent (MSA), or from an upstream Internet Mail Handler that is not
participating in ARC handling.</t>
  <t>fail: The message contains an Authenticated Received Chain whose validation
failed.</t>
  <t>pass: The message contains an Authenticated Received Chain whose validation
succeeded.</t>
</list></t>

</section>
</section>
<section anchor="protocol-actions" title="Protocol Actions">

<t>ARC-enabled Internet Mail Handlers generally act as both ARC Validators (when
receiving messages) and ARC Sealers (when sending messages onward, not originated
locally).</t>

<!-- moved from end of section - outcome -->

<t>An Authenticated Received Chain with a Chain Validation Status of “pass” (or “none”)
allows Internet Mail Handlers to ascertain:</t>

<t><list style="symbols">
  <t>all ARC-participating ADMDs that claim responsibility for handling (and
possibly modifying) the message in transit;</t>
  <t>the authentication assessments of the message as determined by each ADMD 
(from AAR header fields).</t>
</list></t>

<t>With this information, Internet Mail Handlers MAY inform local policy
decisions regarding disposition of messages that experience authentication
failure due to intermediate processing.</t>

<section anchor="sealer-actions" title="Sealer Actions">

<t>To “seal” a message, an ARC Sealer adds an ARC Set (the three ARC header fields
AAR, AMS, and AS) to a message. All ARC header fields in an ARC Set share the
same instance tag value.</t>

<t>To perform Sealing (aka to build and attach a new ARC Set), the following
actions must be taken by an ARC Sealer when presented with a message:</t>

<t><list style="numbers">
  <t>All message modifications (including adding DKIM-Signature header field(s)) 
  MUST be performed before Sealing.</t>
  <t>If the message already contains an Authenticated Received Chain with the
  most recent AS reporting “cv=fail”, then there is no need to proceed and the
  algorithm stops here.</t>
  <t>Calculate the instance value: if the message already contains an Authenticated
  Received Chain, the instance value is 1 more than the highest instance number
  found in the Authenticated Received Chain. If no Authenticated Received Chain
  exists, the instance value is 1.</t>
  <t>Using the calculated instance value, generate and attach a complete ARC set
  to the message as follows:  <list style="numbers">
      <t>Generate and attach an ARC-Authentication-Results header field as defined in <xref target="aar-defn"/>.</t>
      <t>Generate and attach an ARC-Message-Signature header field as defined in <xref target="ams-defn"/>.</t>
      <t>Generate and attach an ARC-Seal header field using the AS definition found in <xref target="as-defn"/>, 
 the prescribed headers defined in <xref target="as-hdrs"/>, and the Chain Validation Status as 
 determined during ARC Validation.</t>
    </list></t>
</list></t>

<!-- Done: confirm proper sub-numbering above -->

<section anchor="as-hdrs" title="Header Fields To Include In ARC-Seal Signatures">

<!-- Done: refer to John L's text -->

<t>The ARC-Seal is generated in a manner similar to how DKIM-Signatures are added
to messages (<xref target="RFC6376"/>, section 3.7), with explicit requirements on the header
fields and ordering of those fields.</t>

<t>The signature of an AS header field signs a canonicalized form of the ARC Set
header field values. The ARC set header field values are supplied to the hash
function in increasing instance order, starting at 1, and include the ARC Set
being added at the time of Sealing the message.</t>

<t>Within an ARC Set, header fields are supplied to the hash function in the
following order:</t>

<t><list style="numbers">
  <t>ARC-Authentication-Results</t>
  <t>ARC-Message-Signature</t>
  <t>ARC-Seal</t>
</list></t>

<t>Note that when an Authenticated Received Chain has failed validation, the
signing scope for the ARC-Seal is modified as specified in <xref target="cv-fail-case"/>.</t>

</section>
<section anchor="cv-fail-case" title="Marking and Sealing “cv=fail” (Invalid) Chains">

<t>In the case of a failed Authenticated Received Chain, the header fields
included in the signature scope of the AS header field b= value MUST only
include the ARC Set header fields created by the MTA which detected the
malformed chain, as if this newest ARC Set was the only set present.</t>

<t><spanx style="emph">INFORMATIONAL</spanx>: This approach is mandated to handle the case of a malformed or
otherwise invalid Authenticated Received Chain. There is no way to generate a
deterministic set of AS header fields (<xref target="as-hdrs"/>) in most cases of invalid
chains.</t>

</section>
<section anchor="only-one-authenticated-received-chain-per-message" title="Only One Authenticated Received Chain Per Message">

<t>A message can have only one Authenticated Received Chain on it at a time. Once
broken, the chain cannot be continued, as the chain of custody is no longer
valid and responsibility for the message has been lost. For further discussion
of this topic and the design restriction which prevents chain continuation or
re-establishment, see <xref target="ARC-USAGE"/>.</t>

</section>
<section anchor="broad-ability-to-seal" title="Broad Ability to Seal">

<t>ARC is not solely intended for perimeter MTAs. Any Internet Mail Handler
MAY seal a message by adding a complete ARC set, whether or not they have 
modified or are aware of having modified the message. For additional
information, see <xref target="trust-boundaries"/>.</t>

</section>
<section anchor="sealing-is-always-safe" title="Sealing is Always Safe">

<t>The utility of an Authenticated Received Chain is limited to very specific cases.
Authenticated Received Chains are designed to provide additional information to
an Internet Mail Handler when evaluating messages for delivery in the context
of authentication failures. Specifically:</t>

<t><list style="symbols">
  <t>Properly adding an ARC Set to a message does not damage or invalidate an
existing Authenticated Received Chain.</t>
  <t>Sealing an Authenticated Received Chain when a message has not been modified
does not negatively affect the chain.</t>
  <t>Validating a message exposes no new threat vectors (see 
<xref target="security-consider"/>).</t>
  <t>An ADMD may choose to Seal all inbound messages whether or not a message has
been modified or will be retransmitted.</t>
</list></t>

</section>
</section>
<section anchor="validate-actions" title="Validator Actions">

<t>A validator performs the following steps, in sequence, to process an
Authenticated Received Chain. Canonicalization, hash functions, and signature
validation methods are imported from <xref target="RFC6376"/> section 5.</t>

<t><list style="numbers">
  <t>Collect all ARC Sets currently attached to the message.
  <list style="symbols">
      <t>If there are none, the Chain Validation Status is “none” and the algorithm 
stops here.</t>
      <t>The maximum number of ARC Sets that can be attached to a message is 50. If 
more than the maximum number exist the Chain Validation Status is “fail” and 
the algorithm stops here.</t>
      <t>In the following algorithm, the maximum discovered ARC instance value is 
referred to as “N”.</t>
    </list></t>
  <t>If the Chain Validation Status of the highest instance value ARC Set is “fail”,
  then the Chain Validation status is “fail” and the algorithm stops here.</t>
  <t>Validate the structure of the Authenticated Received Chain. A valid ARC has
  the following conditions:  <list style="numbers">
      <t>Each ARC Set MUST contain exactly one each of the three ARC header fields
(AAR, AMS, and AS).</t>
      <t>The instance values of the ARC Sets MUST form a continuous sequence from
1..N with no gaps or repetition.</t>
      <t>The “cv” value for all ARC-Seal header fields MUST NOT be “fail”. For ARC
Sets with instance values &gt; 1, the values MUST be “pass”. For the ARC Set
with instance value = 1, the value MUST be “none”.</t>
    </list>
<list style="symbols">
      <t>If any of these conditions are not met, the Chain Validation Status is “fail”
and the algorithm stops here.</t>
    </list></t>
  <t>Validate the AMS with the greatest instance value (most recent). If
  validation fails, then the Chain Validation Status is “fail” and the algorithm
  stops here.</t>
  <t><spanx style="emph">OPTIONAL:</spanx> Determine the “oldest-pass” value from the ARC Set by validating
  each prior AMS beginning with the N-1 and proceeding in decreasing order to the
  AMS with the instance value of 1:  <list style="numbers">
      <t>If an AMS fails to validate (for instance value “M”), then set the
  oldest-pass value to the lowest AMS instance value which passed (M+1) and go to
  the next step (there is no need to check any other (older) AMS header fields). This 
  does not affect the validity of the Authenticated Received Chain.</t>
      <t>If all AMS header fields verify, set the oldest-pass value to zero (0).</t>
    </list></t>
  <t>Validate each AS beginning with the greatest instance value and proceeding
  in decreasing order to the AS with the instance value of 1. If any AS fails to
  validate, the Chain Validation Status is “fail” and the algorithm stops here.</t>
  <t>If the algorithm reaches this step, then the Chain Validation Status is
  “pass”, and the algorithm is complete.</t>
</list></t>

<t>The end result of this Validation algorithm SHOULD be included within the
Authentication-Results header field for the ADMD.</t>

<t>As with a DKIM signature (<xref target="RFC6376"/> section 6.3) which fails verification, a
message with an Authenticated Received Chain with a Chain Validation status of
“fail” MUST be treated the same as a message with no Authenticated Received
Chain.</t>

<t><spanx style="emph">INFORMATIONAL</spanx>: Recipients of an invalid or failing Authenticated Received Chain
can use that information as part of a wider handling context. ARC adoption
cannot be assumed by intermediaries; many intermediaries will continue to
modify messages without adding ARC Seals.</t>

<section anchor="all-failures-are-permanent" title="All Failures Are Permanent">

<t>Authenticated Received Chains represent the traversal of messages through one
or more intermediaries. All errors, including DNS failures, become
unrecoverable and are considered permanent.</t>

<t>Any error validating an Authenticated Received Chain results in a Chain
Validation Status of “fail”. For further discussion of this topic and the design
restriction which prevents chain continuation or re-establishment, see
<xref target="ARC-USAGE"/>.</t>

</section>
<section anchor="responding-to-arc-validation-failures-during-the-smtp-transaction" title="Responding to ARC Validation Failures During the SMTP Transaction">

<t>If an ARC Validator determines that the incoming message fails authentication
checks (potentially including ARC validation), the Validator MAY signal the
breakage through the extended SMTP response code 5.7.29 “ARC validation failure”
and corresponding SMTP basic response code. Validators MAY use the more
general 5.7.28 “Multiple authentication checks failed” instead.</t>

</section>
</section>
</section>
<section anchor="communication-of-validation-results" title="Communication of Validation Results">

<t>Chain Validation Status (described in <xref target="cv-defn"/>) is communicated via
Authentication-Results (and AAR) header fields using the auth method “arc”.
This auth method is described in <xref target="iana-auth"/>.</t>

<t>If necessary data is available, the ptypes and properties defined in 
<xref target="iana-ptypes"/> SHOULD be recorded in an Authentication-Results header field:</t>

<t><list style="symbols">
  <t>smtp.remote-ip - The address of the connection-initiating SMTP server, 
from which the message is being relayed.</t>
  <t>header.oldest-pass - The instance number of the oldest AMS that still
validates, or 0 if all pass.</t>
</list></t>

</section>
<section anchor="use-cases" title="Use Cases">

<t>This section explores several messaging handling use cases that are addressed
by ARC.</t>

<section anchor="trust-boundaries" title="Communicate Authentication Assessment Across Trust Boundaries">

<t>When an intermediary ADMD adds an ARC Set to a message’s Authenticated Received
Chain (or creates the initial ARC Set), the ADMD communicates its authentication
assessment to the next ARC-participating ADMD in the message handling path.</t>

<t>If ARC-enabled ADMDs are trusted, Authenticated Received Chains can be used to
bridge administrative boundaries.</t>

<section anchor="message-scanning-services" title="Message Scanning Services">

<t>Message services are available to perform anti-spam, anti-malware, and
anti-phishing scanning. Such services typically remove malicious content,
replace HTTP links in messages with sanitized links, and/or attach footers to
messages advertising the abilities of the message scanning service. These
modifications almost always break signature-based authentication (such as
DKIM).</t>

<t>Scanning services typically require clients to point MX records of an Internet
domain to the scanning service. Messages destined for the Internet domain are
initially delivered to the scanning service. Once scanning is performed,
messages are then routed to the client’s own mail handling infrastructure.
Re-routing messages in this way almost always breaks path-based authentication
(such as SPF).</t>

<t>Message scanning services can attach Authenticated Received Chains to messages
to communicate authentication assessment into client ADMDs. Clients can then
benefit from the message scanning service while processing messages as if the
client’s infrastructure were the original destination of the Internet domain’s
MX record.</t>

</section>
<section anchor="multi-tier-mta-processing" title="Multi-tier MTA Processing">

<t>Large message processing infrastructure is often divided into several
processing tiers that can break authentication information between tiers. For
example, a large site may maintain a cluster of MTAs dedicated to connection
handling and enforcement of IP-based reputation filtering. A secondary cluster
of MTAs may be dedicated and optimized for content-based processing of
messages.</t>

<t>Authenticated Received Chains can be used to communicate authentication assessment
between processing tiers.</t>

</section>
<section anchor="mailing-lists" title="Mailing Lists">

<t>Mailing lists take delivery of messages and re-post them to subscribers. A full
description of authentication-related mailing list issues can be found in
<xref target="RFC7960"/> Section 3.2.3.</t>

<t>Mailing list services can implement ARC to convey the authentication
assessment of posted messages sent to the list’s subscriber base. The ADMDs of the
mailing list subscribers can then use the Authenticated Received Chain to
determine the authentication assessment of the original message before mailing list
handling.</t>

</section>
</section>
<section anchor="inform-message-disposition-decisions" title="Inform Message Disposition Decisions">

<t>Intermediaries often break authentication through content modification,
interfere with path-based authentication (such as SPF), and strip
authentication results (if an MTA removes Authentication-Results header
fields).</t>

<t>Authenticated Received Chains allow ARC Validators to:</t>

<t><list style="numbers">
  <t>identify ARC-enabled ADMDs that break authentication while processing
  messages;</t>
  <t>gain extended visibility into the authentication-preserving abilities of
  ADMDs that relay messages into ARC-enabled ADMDs.</t>
</list></t>

<t>Through the collection of ARC-related data, an ADMD can identify handling paths
that have broken authentication.</t>

<t>An Authenticated Received Chain allows an Internet Mail Handler to potentially
base decisions of message disposition on authentication assessments provided by
different ADMDs.</t>

<section anchor="dmarc-local-policy-overrides" title="DMARC Local Policy Overrides">

<t>DMARC introduces a policy model where Domain Owners can request email receivers
to reject or quarantine messages that fail DMARC alignment. Interoperability
issues between DMARC and indirect email flows are documented in <xref target="RFC7960"/>.</t>

<t>Authenticated Received Chains allow DMARC processors to consider authentication
assessments provided by other ADMDs. As a matter of local policy, a DMARC processor
MAY choose to accept the authentication assessments provided by an Authenticated
Received Chain when determining if a message is DMARC compliant.</t>

<t>When an Authenticated Received Chain is used to determine message disposition,
the DMARC processor can communicate this local policy decision to Domain Owners
as described in <xref target="dmarc-rpt"/>.</t>

</section>
<section anchor="dmarc-rpt" title="DMARC Reporting">

<t>DMARC-enabled receivers indicate when ARC Validation influences DMARC-related
local policy decisions. When an ARC-enabled handler generates a DMARC report,
it MAY indicate the influence of ARC on their local policy decision(s) 
by adding a reason of “local_policy” with a comment string
(per <xref target="RFC7489"/> Appendix C) containing a list of data
discovered during ARC Validation, which at a minimum includes:</t>

<t><list style="symbols">
  <t>the Chain Validation Status,</t>
  <t>the domain and selector for each AS,</t>
  <t>the originating IP address from the first ARC Set:</t>
</list></t>

<figure><artwork><![CDATA[
EXAMPLE:

<policy_evaluated>
  <disposition>none</disposition>
  <dkim>fail</dkim>
  <spf>fail</spf>
  <reason>
   <type>local_policy</type>
   <comment>arc=pass as[2].d=d2.example as[2].s=s2 
     as[1].d=d1.example as[1].s=s3 
     remote-ip[1]=10.10.10.13</comment>
  </reason>
</policy_evaluated>
]]></artwork></figure>

<t>In the above example DMARC XML reporting fragment, data relating to specific
validated ARC Sets are enumerated using array syntax (eg, “as[2]” means AS
header field with instance value of 2). d2.example is the Sealing domain for
ARC Set #2 (i=2) and d1.example is the Sealing domain for ARC Set #1 (i=1).</t>

<t>Depending on the reporting practices of intermediate message handlers, Domain
Owners may receive multiple DMARC reports for a single message. Receivers of 
DMARC reports should be aware of this behaviour and make the necessary
accommodations.</t>

</section>
</section>
</section>
<section anchor="privacy-consider" title="Privacy Considerations">

<t>The Authenticated Received Chain provides a verifiable record of the handlers
for a message. This record may include Personally Identifiable Information such
as IP address(es) and domain names. Such information is also included in existing
non-ARC related header fields such as the “Received” header fields.</t>

</section>
<section anchor="security-consider" title="Security Considerations">

<t>The Security Considerations of <xref target="RFC6376"/> and <xref target="I-D-7601bis"/> apply directly
to this specification.</t>

<t>As with other domain authentication technologies (such as SPF, DKIM, and
DMARC), ARC makes no claims about the semantic content of messages.</t>

<section anchor="big-hf-risk" title="Increased Header Field Size">

<t>Inclusion of Authenticated Received Chains into messages may cause issues for
older or constrained MTAs due to increased total header field size. Large header
field blocks, in general, may cause failures to deliver or other outage scenarios for
such MTAs. ARC itself would not cause problems.</t>

</section>
<section anchor="dns-impact" title="DNS Operations">

<t>The validation of an Authenticated Received Chain composed of N ARC Sets can
require up to 2*N DNS queries (not including any DNS redirection mechanisms
which can increase the total number of queries). This leads to two
considerations:</t>

<t><list style="numbers">
  <t>An attacker can send a message to an ARC participant with a concocted
sequence of ARC Sets bearing the domains of intended victims, and all of them
will be queried by the participant until a failure is discovered. DNS caching
and the difficulty of forging the signature values should limit the extent of
this load to domains under control of the attacker. Query traffic pattern
analysis may expose information about downstream validating ADMD
infrastructure.</t>
  <t>DKIM only performs one DNS query per signature, while ARC can introduce many
(per chain). Absent caching, slow DNS responses can cause SMTP timeouts; and
backlogged delivery queues on Validating systems. This could be exploited as a
DoS attack.</t>
</list></t>

</section>
<section anchor="message-content-suspicion" title="Message Content Suspicion">

<t>Recipients are cautioned to treat messages bearing Authenticated Received
Chains with the same suspicion applied to all other messages. This includes
appropriate content scanning and other checks for potentially malicious
content.</t>

<t>ARC authenticates the identity of some email handling actors.  It does not make
any assessment of their trustworthiness.</t>

<t>Just as passing message authentication is not an indication of message safety,
forwarding that information through the mechanism of ARC is also not an
indication of message safety.  Even if all ARC-enabled ADMDs are trusted, ADMDs
may have become compromised, may miss unsafe content, or may not properly
authenticate messages.</t>

</section>
<section anchor="message-sealer-suspicion" title="Message Sealer Suspicion">

<t>Recipients are cautioned to treat every Sealer of the ARC Chain with suspicion.
Just as with a validated DKIM signature, responsibility for message handling is
attributed to the Sealing domain, but whether or not that Sealer is a malicious
actor is out of scope of the authentication mechanism.  Since ARC aids message
delivery in the event of an authentication failure, ARC Sealers should be
treated with suspicion, so that a malicious actor cannot Seal spam or other
fraudulent messages to aid their delivery, too.</t>

</section>
<section anchor="replay-attacks" title="Replay Attacks">

<t>Since ARC inherits heavily from DKIM, it has similar attack vectors. In
particular, the Replay Attack described in <xref target="RFC6376"/> section 8.6 is
potentially amplified by ARC’s chained statuses. In an ARC replay attack, a
malicious actor would take an intact and passing ARC Chain, and then resend it
to many recipients without making any modifications that invalidate the latest
AMS or AS. The impact to a receiver would be more DNS lookups and signature
evaluations. This scope of this attack can be limited by caching DNS queries
and following the same signing scope guidance from
<xref target="RFC6376"/> section 5.4.1.</t>

</section>
</section>
<section anchor="iana-considerations" title="IANA Considerations">

<t>[[ <spanx style="strong">Note to the RFC Editors:</spanx> “dkim - header - s” is defined in
<xref target="I-D-7601bis"/>. Please adjust the list below as appropriate. ]]</t>

<t>This draft introduces three new headers fields and updates the Email
Authentication Parameters registry with one new authentication method and
several status codes.</t>

<section anchor="iana-auth" title="Email Authentication Results Names Registry Update">

<t>This draft adds one Auth Method with three Codes to the IANA “Email
Authentication Result Names” registry:</t>

<t><list style="symbols">
  <t>Auth Method : arc<vspace />
Code: “none”, “pass”, “fail”<vspace />
Specification: &SELF; 2.2<vspace />
Status: active</t>
</list></t>

</section>
<section anchor="iana-ptypes" title="Email Authentication Methods Registry Update">

<t>This draft adds several new items to the Email Authentication Methods registry,
most recently defined in <xref target="I-D-7601bis"/>:</t>

<t><list style="symbols">
  <t>Method: arc<vspace />
Definition: &SELF;<vspace />
ptype: smtp<vspace />
Property: remote-ip<vspace />
Value: IP address of originating SMTP connection<vspace />
Status: active<vspace />
Version: 1</t>
  <t>Method: arc<vspace />
Definition: &SELF;<vspace />
ptype: header<vspace />
Property: oldest-pass<vspace />
Value: The instance id of the oldest validating AMS, or 0 if they all pass 
  (see <xref target="validate-actions"/>)<vspace />
Status: active<vspace />
Version: 1</t>
  <t>Method: dkim<vspace />
Definition: <xref target="I-D-7601bis"/><vspace />
ptype: header<vspace />
Property: s<vspace />
Value: value of signature “s” tag<vspace />
Status: active<vspace />
Version: 1</t>
</list></t>

</section>
<section anchor="iana-headers" title="Definitions of the ARC header fields">

<t>This specification adds three new header fields to the “Permanent Message
Header Field Registry”, as follows:</t>

<t><list style="symbols">
  <t>Header field name: ARC-Seal<vspace />
Applicable protocol: mail<vspace />
Status: Experimental<vspace />
Author/Change controller: IETF<vspace />
Specification document(s): &SELF;<vspace />
Related information: <xref target="RFC6376"/></t>
  <t>Header field name: ARC-Message-Signature<vspace />
Applicable protocol: mail<vspace />
Status: Experimental<vspace />
Author/Change controller: IETF<vspace />
Specification document(s): &SELF;<vspace />
Related information: <xref target="RFC6376"/></t>
  <t>Header field name: ARC-Authentication-Results<vspace />
Applicable protocol: mail<vspace />
Status: Experimental<vspace />
Author/Change controller: IETF<vspace />
Specification document(s): &SELF;<vspace />
Related information: <xref target="I-D-7601bis"/></t>
</list></t>

</section>
<section anchor="new-enhanced-status-code-arc-validation" title="New Enhanced Status Code - ARC Validation">

<t>The following value should be added to the <xref target="ENHANCED-STATUS"/> registry, as follows:</t>

<t><list style="symbols">
  <t>Code: X.7.29<vspace />
Sample Text: ARC validation failure<vspace />
Associated basic status code: 550<vspace />
Description: This status code may be returned when
   a message fails multiple authentication checks,
   including ARC validation<vspace />
Reference: &SELF;<vspace />
Submitter: K. Andersen<vspace />
Change controller: IESG</t>
</list></t>

</section>
</section>
<section anchor="exp-consider" title="Experimental Considerations">

<t>The ARC protocol is designed to address common interoperability issues
introduced by intermediate message handlers. Interoperability issues are
described in <xref target="RFC6377"/> and <xref target="RFC7960"/>.</t>

<t>As the ARC protocol is implemented by Internet Mail Handlers over time, the
following should be evaluated in order to determine the success of the protocol
in accomplishing the intended benefits.</t>

<section anchor="success-consideration" title="Success Consideration">

<t>In an attempt to deliver legitimate messages that users desire, many receivers
use heuristic-based methods to identify messages that arrive via indirect
delivery paths.</t>

<t>ARC will be a success if the presence of Authenticated Received Chains allows
for improved decision making when processing legitimate messages, specifically 
resulting in equal or better delivery rates than achieve through the use of 
heuristic approaches.</t>

</section>
<section anchor="failure-considerations" title="Failure Considerations">

<t>ARC should function without introducing significant new vectors for abuse (see
<xref target="security-consider"/>). If unforeseen vectors are enabled by ARC, then
this protocol will be a failure. Note that weaknesses inherent in the mail
protocols ARC is built upon (such as DKIM replay attacks and other known
issues) are not new vectors which can be attributed to this specification.</t>

</section>
<section anchor="open-questions" title="Open Questions">

<t>The following open questions are academic and have no clear answer at the time
of the development of the protocol. However, additional deployments should be
able to gather the necessary data to answer some or all of them.</t>

<section anchor="value-of-the-arc-seal-as-header-field" title="Value of the ARC-Seal (AS) Header Field">

<t>Data should be collected to show if the ARC-Seal (AS) provides value beyond the
ARC Message Signature (AMS) for either making delivery decisions or catching
malicious actors trying to craft or replay malicious chains.</t>

</section>
<section anchor="usage-andor-signals-from-multiple-selectors-andor-domains-in-arc-sets" title="Usage and/or signals from multiple selectors and/or domains in ARC sets">

<t>Any selectors and/or (sub)domains (under the control of the sealing ADMD) may be 
used for ARC header field signatures.</t>

<t>While implementers may choose to use various selectors and/or
domains for ARC set header fields, no compelling argument for or against such
usage has been made within the working group. As such we have chosen to allow
maximum freedom for the experimental definition of this protocol.</t>

<t>Wider deployment experience and higher volumes of traffic may show whether this
is useful.</t>

</section>
<section anchor="dns-overhead" title="DNS Overhead">

<t>Longer Authenticated Received Chains will require more queries to retrieve the
keys for validating the chain. While this is not believed to be a security
issue (see <xref target="dns-impact"/>), it is unclear how much overhead will truly
be added.  This is similar to some of the initial processing and query load
concerns which were debated at the time of the DKIM specification development.</t>

<t>Data should be collected to better understand usable length and distribution of
lengths found in valid Authenticated Received Chains along with the DNS
impact of processing Authenticated Received Chains.</t>

<t>An effective operational maximum will have to be developed through deployment
experience in the field.</t>

</section>
<section anchor="what-trace-information-is-valuable" title="What Trace Information is Valuable">

<t>There are several edge cases where the information in the AAR can make the
difference between message delivery or rejection. For example, if there is a
well known mailing list that seals with ARC but doesn’t do its own initial DMARC
enforcement, an Internet Mail Handler with this knowledge could make a delivery
decision based upon the authentication information it sees in the corresponding
AAR header field.</t>

<t>Certain trace information in the AAR is useful/necessary in the construction of
DMARC reports.</t>

<t>Further, certain receivers believe the entire set of trace information would be valuable
to feed into machine learning systems to identify fraud and/or provide other
signals related to message delivery.</t>

<t>At this point, however, it is unclear what trace information will be valuable
for all receivers, regardless of size.</t>

<t>Data should be collected on what trace information receivers are using that
provides useful signals that affect deliverability, and what portions of the
trace data are left untouched or provide no useful information.</t>

<t>Since many such systems are intentionally proprietary or confidential to
prevent gaming by abusers, it may not be viable to reliably answer this
particular question. The evolving nature of attacks can also shift the
landscape of “useful” information over time.</t>

</section>
</section>
</section>
<section anchor="implstat" title="Implementation Status">

<t>[[ Note to the RFC Editor: Please remove this section before
publication along with the reference to <xref target="RFC7942"/>. ]]</t>

<t>This section records the status of known implementations of the protocol
defined by this specification at the time of posting of this Internet-Draft,
and is based on a proposal described in <xref target="RFC7942"/>.  The description of
implementations in this section is intended to assist the IETF in its decision
processes in progressing drafts to RFCs.  Please note that the listing of any
individual implementation here does not imply endorsement by the IETF.
Furthermore, no effort has been spent to verify the information presented here
that was supplied by IETF contributors.  This is not intended as, and must not
be construed to be, a catalog of available implementations or their features.
Readers are advised to note that other implementations may exist.</t>

<t>This information is known to be correct as of the eighth interoperability
test event which was held on 2018-03-17 at IETF101.</t>

<t>For a few of the implementations, later status information was available as
of August 2018.</t>

<section anchor="gmail-test-reflector-and-incoming-validation" title="GMail test reflector and incoming validation">

<t>Organization: Google<vspace />
   Description: Internal production implementation with both debug
     analysis and validating + sealing pass-through function<vspace />
   Status of Operation: Production - Incoming Validation<vspace />
   Coverage: Full spec implemented as of <xref target="ARC-DRAFT-14"/><vspace />
   Licensing: Proprietary - Internal only<vspace />
   Implementation Notes:</t>

<t><list style="symbols">
  <t>Full functionality was demonstrated during the interop testing on 2018-03-17.</t>
</list></t>

<t>Contact Info: <eref target="mailto:arc-discuss@dmarc.org">arc-discuss@dmarc.org</eref></t>

</section>
<section anchor="aol-test-reflector-and-internal-tagging" title="AOL test reflector and internal tagging">

<t>Organization: AOL<vspace />
  Description: Internal prototype implementation with both debug
    analysis and validating + sealing pass-through function<vspace />
  Status of Operation: Beta<vspace />
  Coverage: ARC Chain validity status checking is operational, but only
    applied to email addresses enrolled in the test program.
    This system conforms to <xref target="ARC-DRAFT-05"/><vspace />
  Licensing: Proprietary - Internal only<vspace />
  Implementation Notes:</t>

<t><list style="symbols">
  <t>2017-07-15: Full functionality verified during the interop testing.</t>
  <t>2018-06: Partially retired but still accessible by special request
  due to the in process evolution of the AOL mail infrastructure to the
  integrated OATH environment. The implementation was based on the Apache
  James DKIM code base and may be contributed back to that project in 
  the future.</t>
</list></t>

<t>Contact Info: <eref target="mailto:arc-discuss@dmarc.org">arc-discuss@dmarc.org</eref></t>

</section>
<section anchor="dkimpy" title="dkimpy">

<t>Organization: dkimpy developers/Scott Kitterman<vspace />
   Description: Python DKIM package<vspace />
   Status of Operation: Production<vspace />
   Coverage:</t>

<t><list style="symbols">
  <t>2017-07-15: The internal test suite is incomplete, but the command line
   developmental version of validator was demonstrated to interoperate with
   the Google and AOL implementations during the interop on 2017-07-15 and the
   released version passes the tests in <xref target="ARC-TEST"/>
   <eref target="https://github.com/Valimail/arc_test_suite">arc_test_suite</eref> with both python and python3.</t>
</list></t>

<t>Licensing: Open/Other (same as dkimpy package = BCD version 2)<vspace />
   Contact Info: https://launchpad.net/dkimpy</t>

</section>
<section anchor="openarc" title="OpenARC">

<t>Organization: TDP/Murray Kucherawy<vspace />
  Description: Implementation of milter functionality related to the OpenDKIM
    and OpenDMARC packages<vspace />
  Status of Operation: Beta<vspace />
  Coverage: Built to support <xref target="ARC-DRAFT-14"/><vspace />
  Licensing: Open/Other (same as OpenDKIM and OpenDMARC packages)<vspace />
  Implementation Notes:</t>

<t><list style="symbols">
  <t>Known issues have been resolved with release X</t>
</list></t>

<t>Contact Info: <eref target="mailto:arc-discuss@dmarc.org">arc-discuss@dmarc.org</eref>, <eref target="mailto:openarc-users@openarc.org">openarc-users@openarc.org</eref></t>

</section>
<section anchor="mailman-3x-patch" title="Mailman 3.x patch">

<t>Organization: Mailman development team<vspace />
  Description: Integrated ARC capabilities within the Mailman 3.2 package<vspace />
  Status of Operation: Patch submitted<vspace />
  Coverage: Based on OpenARC<vspace />
  Licensing: Same as mailman package - GPL<vspace />
  Implementation Notes:</t>

<t><list style="symbols">
  <t>Appears to work properly in at least one beta deployment, but
  waiting on acceptance of the pull request into the mainline of
  mailman development</t>
</list></t>

<t>Contact Info: https://www.gnu.org/software/mailman/contact.html</t>

</section>
<section anchor="copernicamailerq-web-based-validation" title="Copernica/MailerQ web-based validation">

<t>Organization: Copernica<vspace />
  Description: Web-based validation of ARC-signed messages<vspace />
  Status of Operation: Beta<vspace />
  Coverage: Built to support <xref target="ARC-DRAFT-05"/><vspace />
  Licensing: On-line usage only<vspace />
  Implementation Notes:</t>

<t><list style="symbols">
  <t>Released 2016-10-24</t>
  <t>Requires full message content to be pasted into a web form found at
http://arc.mailerq.com/ (warning - https is not supported).</t>
  <t>An additional instance of an ARC signature can be added if one is
willing to paste a private key into an unsecured web form.</t>
  <t>2017-07-15: Testing shows that results match the other implementations
listed in this section.</t>
</list></t>

<t>Contact Info: https://www.copernica.com/</t>

</section>
<section anchor="rspamd" title="Rspamd">

<t>Organization: Rspamd community<vspace />
  Description: ARC signing and verification module<vspace />
  Status of Operation: Production, though deployment usage is unknown<vspace />
  Coverage: Built to support <xref target="ARC-DRAFT-14"/><vspace />
  Licensing: Open source<vspace />
  Implementation Notes:</t>

<t><list style="symbols">
  <t>2017-06-12: Released with version 1.6.0</t>
  <t>2017-07-15: Testing during the interop showed that the validation functionality
  interoperated with the Google, AOL, dkimpy and MailerQ implementations</t>
</list></t>

<t>Contact Info: https://rspamd.com/doc/modules/arc.html and https://github.com/vstakhov/rspamd</t>

</section>
<section anchor="perl-maildkim-module" title="PERL MAIL::DKIM module">

<t>Organization: FastMail<vspace />
  Description: Email domain authentication (sign and/or verify) module, 
previously included SPF / DKIM / DMARC, now has ARC added<vspace />
  Status of Operation: Production, deployment usage unknown<vspace />
  Coverage: Built to support <xref target="ARC-DRAFT-10"/><vspace />
  Licensing: Open Source<vspace />
  Implementation Notes:</t>

<t><list style="symbols">
  <t>2017-12-15: v0.50 released with full test set passing for ARC</t>
</list></t>

<t>Contact Info: http://search.cpan.org/~mbradshaw/Mail-DKIM-0.50/</t>

</section>
<section anchor="perl-mailmilterauthentication-module" title="PERL Mail::Milter::Authentication module">

<t>Organization: FastMail<vspace />
  Description: Email domain authentication milter, uses MAIL::DKIM (see above)<vspace />
  Status of Operation: Initial validation completed during IETF99 hackathon with some follow-on work 
  during the week<vspace />
  Coverage: Built to support <xref target="ARC-DRAFT-14"/><vspace />
  Licensing: Open Source<vspace />
  Implementation Notes:</t>

<t><list style="symbols">
  <t>2017-07-15: Validation functionality which interoperates with Gmail, AOL, dkimpy was demonstrated; later in
  the week of IETF99, the signing functionality was reported to be working</t>
  <t>2017-07-20: ARC functionality has not yet been pushed back to the github repo but should be showing up soon</t>
</list></t>

<t>Contact Info: https://github.com/fastmail/authentication_milter</t>

</section>
<section anchor="sympa-list-manager" title="Sympa List Manager">

<t>Organization: Sympa Dev Community<vspace />
  Description: Work in progress<vspace />
  Status of Operation: Work in progress<vspace />
  Coverage: unknown<vspace />
  Licensing: open source<vspace />
  Implementation Notes:</t>

<t><list style="symbols">
  <t>2018-01-05: Tracked as https://github.com/sympa-community/sympa/issues/153</t>
</list></t>

<t>Contact Info: https://github.com/sympa-community</t>

</section>
<section anchor="oracle-messaging-server" title="Oracle Messaging Server">

<t>Organization: Oracle<vspace />
  Description:<vspace />
  Status of Operation: Initial development work during IETF99 hackathon. Framework code is complete,
    crypto functionality requires integration with libsodium<vspace />
  Coverage: Work in progress<vspace />
  Licensing: Unknown<vspace />
  Implementation Notes:</t>

<t><list style="symbols">
  <t>2018-03: Protocol handling components are completed, but crypto is not yet functional.</t>
</list></t>

<t>Contact Info: Chris Newman, Oracle</t>

</section>
<section anchor="messagesystems-momentum-and-powermta-platforms" title="MessageSystems Momentum and PowerMTA platforms">

<t>Organization: MessageSystems/SparkPost<vspace />
  Description: OpenARC integration into the LUA-enabled Momentum processing space<vspace />
  Status of Operation: Beta<vspace />
  Coverage: Same as OpenARC<vspace />
  Licensing: Unknown<vspace />
  Implementation Notes:</t>

<t><list style="symbols">
  <t>Initial deployments for validation expected in mid-2018.</t>
</list></t>

<t>Contact Info: TBD
  <!-- TBD: check w/ Juan & Elliott regarding listing them here --></t>

</section>
<section anchor="exim" title="Exim">

<t>Organization: Exim developers<vspace />
  Status of Operation: Operational; requires specific enabling for compile.<vspace />
  Coverage: Full spec implemented as of <xref target="ARC-DRAFT-13"/><vspace />
  Licensing: GPL<vspace />
  Contact Info: exim-users@exim.org<vspace />
  Implementation notes:</t>

<t><list style="symbols">
  <t>Implemented as of Exim 4.91</t>
</list></t>

</section>
<section anchor="halon-mta" title="Halon MTA">

<t>Organization: Halon<vspace />
  Status of Operation: Operational as of May 2018<vspace />
  Coverage: Full spec implemented as of <xref target="ARC-DRAFT-14"/><vspace />
  Licensing: Commercial, trial version available for download<vspace />
  Contact Info: https://halon.io<vspace />
  Implementation notes:</t>

<t><list style="symbols">
  <t>GPL’d library with ARC capabilities: https://github.com/halon/libdkimpp</t>
</list></t>

</section>
<section anchor="iij" title="IIJ">

<t>Organization: Internet Initiative Japan (IIJ) 
  Status of Operation: Operational as of October 2018<vspace />
  Coverage: Full spec implemented as of &SELF;<vspace />
  Licensing: Internal<vspace />
  Contact Info: https://www.iij.ad.jp/en/<vspace />
  Implementation notes:</t>

<t><list style="symbols">
  <t>Internal MTA implementation validated during the ARC interop exercise in mid-October 2018</t>
</list></t>

</section>
</section>


  </middle>

  <back>

    <references title='Normative References'>

&RFC2119;
&RFC5234;
&RFC5322;
&RFC5598;
&RFC6376;
&RFC6377;
&RFC6532;
&RFC7208;
&RFC7405;
&RFC8174;
<reference anchor="draft-levine-eaiauth" target="https://tools.ietf.org/html/draft-levine-appsarea-eaiauth-03">
  <front>
    <title>E-mail Authentication for Internationalized Mail</title>
    <author initials="J." surname="Levine" fullname="John Levine">
      <organization></organization>
    </author>
    <date year="2018" month="August" day="11"/>
  </front>
</reference>
<reference anchor="I-D-7601bis" target="https://datatracker.ietf.org/doc/draft-ietf-dmarc-rfc7601bis/">
  <front>
    <title>Message Header Field for Indicating Message Authentication Status</title>
    <author initials="M." surname="Kucherawy" fullname="Murray Kucherawy">
      <organization></organization>
    </author>
    <date year="2018" month="February" day="07"/>
  </front>
</reference>


    </references>

    <references title='Informative References'>

&RFC7942;
&RFC7489;
&RFC7960;
<reference anchor="ENHANCED-STATUS" target="http://www.iana.org/assignments/smtp-enhanced-status-codes/smtp-enhanced-status-codes.xhtml">
  <front>
    <title>IANA SMTP Enhanced Status Codes</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="ARC-DRAFT-14" target="https://tools.ietf.org/html/draft-ietf-dmarc-arc-protocol-14">
  <front>
    <title>Authenticated Received Chain (ARC) Protocol (I-D-14)</title>
    <author initials="K." surname="Andersen" fullname="Kurt Andersen">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="ARC-DRAFT-13" target="https://tools.ietf.org/html/draft-ietf-dmarc-arc-protocol-13">
  <front>
    <title>Authenticated Received Chain (ARC) Protocol (I-D-13)</title>
    <author initials="K." surname="Andersen" fullname="Kurt Andersen">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="ARC-DRAFT-10" target="https://tools.ietf.org/html/draft-ietf-dmarc-arc-protocol-10">
  <front>
    <title>Authenticated Received Chain (ARC) Protocol (I-D-10)</title>
    <author initials="K." surname="Andersen" fullname="Kurt Andersen">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="ARC-DRAFT-05" target="https://tools.ietf.org/html/draft-ietf-dmarc-arc-protocol-05">
  <front>
    <title>Authenticated Received Chain (ARC) Protocol (I-D-05)</title>
    <author initials="K." surname="Andersen" fullname="Kurt Andersen">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="ARC-USAGE" target="https://tools.ietf.org/html/draft-ietf-dmarc-arc-usage-05">
  <front>
    <title>Recommended Usage of the ARC Headers</title>
    <author initials="S." surname="Jones" fullname="Steven Jones">
      <organization></organization>
    </author>
    <author initials="T." surname="Adams" fullname="Trent Adams">
      <organization></organization>
    </author>
    <author initials="J." surname="Rae-Grant" fullname="John Rae-Grant">
      <organization></organization>
    </author>
    <author initials="K." surname="Andersen" fullname="Kurt Andersen">
      <organization></organization>
    </author>
    <date year="2018" month="April"/>
  </front>
</reference>
<reference anchor="ARC-MULTI" target="https://tools.ietf.org/html/draft-ietf-dmarc-arc-multi-02">
  <front>
    <title>Using Multiple Signing Algorithms with ARC</title>
    <author initials="K." surname="Andersen" fullname="Kurt Andersen">
      <organization></organization>
    </author>
    <date year="2018" month="June"/>
  </front>
</reference>
<reference anchor="ARC-TEST" target="https://github.com/Valimail/arc_test_suite">
  <front>
    <title>ARC Test Suite</title>
    <author initials="S." surname="Blank" fullname="Seth Blank">
      <organization></organization>
    </author>
    <date year="2017" month="January"/>
  </front>
</reference>


    </references>


<section anchor="appendix-a-design-requirements" title="Appendix A - Design Requirements">

<t>The specification of the ARC framework is driven by the following high-level
goals, security considerations, and practical operational requirements.</t>

<section anchor="primary-design-criteria" title="Primary Design Criteria">

<t><list style="symbols">
  <t>Provide a verifiable “chain of custody” for email messages;</t>
  <t>Not require changes for originators of email;</t>
  <t>Support the verification of the ARC header field set by each hop in the
handling chain;</t>
  <t>Work at Internet scale; and</t>
  <t>Provide a trustable mechanism for the communication of Authentication-Results
across trust boundaries.</t>
</list></t>

</section>
<section anchor="out-of-scope" title="Out of Scope">

<t>ARC is not a trust framework. Users of the ARC header fields are cautioned against
making unsubstantiated conclusions when encountering a “broken” ARC sequence.</t>

</section>
</section>
<section anchor="appendix-b-example-usage" title="Appendix B - Example Usage">

<t>The following message is an example of one which has passed through several 
intermediary handlers, some of which have modified the message and others which
have not:</t>

<figure><artwork><![CDATA[
Return-Path: <jqd@d1.example>
Received: from example.org (example.org [208.69.40.157])
    by gmail.example with ESMTP id d200mr22663000ykb.93.1421363207
    for <fmartin@example.com>; Thu, 14 Jan 2015 15:02:40 -0800 (PST)
Received: from segv.d1.example (segv.d1.example [72.52.75.15])
    by lists.example.org (8.14.5/8.14.5) with ESMTP id t0EKaNU9010123
    for <arc@example.org>; Thu, 14 Jan 2015 15:01:30 -0800 (PST)
    (envelope-from jqd@d1.example)
Received: from [10.10.10.131] (w-x-y-z.dsl.static.isp.com [w.x.y.z])
    (authenticated bits=0)
    by segv.d1.example with ESMTP id t0FN4a8O084569;
    Thu, 14 Jan 2015 15:00:01 -0800 (PST)
    (envelope-from jqd@d1.example)
Received: from mail-ob0-f188.google.example (mail-ob0-f188.google.example
    [208.69.40.157]) by clochette.example.org with ESMTP id
    d200mr22663000ykb.93.1421363268
    for <fmartin@example.org>; Thu, 14 Jan 2015 15:03:15 -0800 (PST)
ARC-Seal: i=3; a=rsa-sha256; cv=pass; d=clochette.example.org; s=
        clochette; t=12345; b=CU87XzXlNlk5X/yW4l73UvPUcP9ivwYWxyBWcVrRs7
        +HPx3K05nJhny2fvymbReAmOA9GTH/y+k9kEc59hAKVg==
ARC-Message-Signature: i=3; a=rsa-sha256; c=relaxed/relaxed; d=
        clochette.example.org; h=message-id:date:from:to:subject; s=
        clochette; t=12345; bh=KWSe46TZKCcDbH4klJPo+tjk5LWJnVRlP5pvjXFZY
        LQ=; b=o71vwyLsK+Wm4cOSlirXoRwzEvi0vqIjd/2/GkYFYlSd/GGfKzkAgPqxf
        K7ccBMP7Zjb/mpeggswHjEMS8x5NQ==
ARC-Authentication-Results: i=3; clochette.example.org; spf=fail
    smtp.from=jqd@d1.example; dkim=fail (512-bit key)
    header.i=@d1.example; dmarc=fail; arc=pass (as.2.gmail.example=pass,
    ams.2.gmail.example=pass, as.1.lists.example.org=pass,
    ams.1.lists.example.org=fail (message has been altered))
Authentication-Results: clochette.example.org; spf=fail
    smtp.from=jqd@d1.example; dkim=fail (512-bit key)
    header.i=@d1.example; dmarc=fail; arc=pass (as.2.gmail.example=pass, 
    ams.2.gmail.example=pass, as.1.lists.example.org=pass, 
    ams.1.lists.example.org=fail (message has been altered))
ARC-Seal: i=2; a=rsa-sha256; cv=pass; d=gmail.example; s=20120806; t=
        12345; b=Zpukh/kJL4Q7Kv391FKwTepgS56dgHIcdhhJZjsalhqkFIQQAJ4T9BE
        8jjLXWpRNuh81yqnT1/jHn086RwezGw==
ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=
        gmail.example; h=message-id:date:from:to:subject; s=20120806; t=
        12345; bh=KWSe46TZKCcDbH4klJPo+tjk5LWJnVRlP5pvjXFZYLQ=; b=CVoG44
        cVZvoSs2mMig2wwqPaJ4OZS5XGMCegWqQs1wvRZJS894tJM0xO1RJLgCPsBOxdA5
        9WSqI9s9DfyKDfWg==
ARC-Authentication-Results: i=2; gmail.example; spf=fail
    smtp.from=jqd@d1.example; dkim=fail (512-bit key)
    header.i=@example.org; dmarc=fail; arc=pass (as.1.lists.example.org=pass, 
    ams.1.lists.example.org=pass)
ARC-Seal: i=1; a=rsa-sha256; cv=none; d=lists.example.org; s=dk-lists;
         t=12345; b=TlCCKzgk3TrAa+G77gYYO8Fxk4q/Ml0biqduZJeOYh6+0zhwQ8u/
        lHxLi21pxu347isLSuNtvIagIvAQna9a5A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=
        lists.example.org; h=message-id:date:from:to:subject; s=
        dk-lists; t=12345; bh=KWSe46TZKCcDbH4klJPo+tjk5LWJnVRlP5pvjXFZYL
        Q=; b=DsoD3n3hiwlrN1ma8IZQFgZx8EDO7Wah3hUjIEsYKuShRKYB4LwGUiKD5Y
        yHgcIwGHhSc/4+ewYqHMWDnuFxiQ==
ARC-Authentication-Results: i=1; lists.example.org; spf=pass smtp.mfrom=jqd@d1.example;
    dkim=pass (512-bit key) header.i=@d1.example;
    dmarc=pass
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=d1.example; h=
        message-id:date:from:to:subject; s=origin2015; bh=bIxxaeIQvmOBdT
        AitYfSNFgzPP4=; b=qKjd5fYibKXWWIcMKCgRYuo1vJ2fD+IAQPjX+uamXIGY2Q
        0HjQ+Lq3/yHzG3JHJp6780/nKQPOWt2UDJQrJkEA==
Message-ID: <54B84785.1060301@d1.example>
Date: Thu, 14 Jan 2015 15:00:01 -0800
From: John Q Doe <jqd@d1.example>
To: arc@dmarc.example
Subject: [List 2] Example 1

Hey gang,
This is a test message.
--J.
]]></artwork></figure>

</section>
<section anchor="acknowledgements" title="Acknowledgements">

<t>This draft originated with the work of OAR-Dev Group.</t>

<t>The authors thank all of the OAR-Dev and the subsequent DMARC-WG group for the
ongoing help and though-provoking discussions from all the participants,
especially: Alex Brotman, Brandon Long, Dave Crocker, Elizabeth Zwicky, Franck
Martin, Greg Colburn, J. Trent Adams, John Rae-Grant, Mike Hammer, Mike Jones,
Steve Jones, Terry Zink, Tim Draegen, Gene Shuman, Scott Kitterman, Bron
Gondwana.</t>

<t>Grateful appreciation is extended to the people who provided feedback through
the discuss mailing list.</t>

</section>
<section anchor="comments-and-feedback" title="Comments and Feedback">

<t>Please address all comments, discussions, and questions to <eref target="mailto:dmarc@ietf.org">dmarc@ietf.org</eref>.
Earlier discussions can be found at <eref target="mailto:arc-discuss@dmarc.org">arc-discuss@dmarc.org</eref>.  Interop
discussions planning can be found at <eref target="mailto:arc-interop@dmarc.org">arc-interop@dmarc.org</eref>.</t>

<t>Some introductory material for less technical people can be found at
<eref target="https://arc-spec.org">https://arc-spec.org</eref>.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

