{"draft":"draft-ietf-dmarc-arc-protocol-23","doc_id":"RFC8617","title":"The Authenticated Received Chain (ARC) Protocol","authors":["K. Andersen","B. Long, Ed.","S. Blank, Ed.","M. Kucherawy, Ed."],"format":["ASCII","HTML"],"page_count":"35","pub_status":"EXPERIMENTAL","status":"EXPERIMENTAL","source":"Domain-based Message Authentication, Reporting & Conformance","abstract":"The Authenticated Received Chain (ARC) protocol provides an\r\nauthenticated \"chain of custody\" for a message, allowing each entity\r\nthat handles the message to see what entities handled it before and\r\nwhat the message's authentication assessment was at each step in the\r\nhandling.\r\n\r\nARC allows Internet Mail Handlers to attach assertions of message\r\nauthentication assessment to individual messages. As messages\r\ntraverse ARC-enabled Internet Mail Handlers, additional ARC assertions\r\ncan be attached to messages to form ordered sets of ARC assertions\r\nthat represent the authentication assessment at each step of the\r\nmessage-handling paths.\r\n\r\nARC-enabled Internet Mail Handlers can process sets of ARC assertions\r\nto inform message disposition decisions, identify Internet Mail\r\nHandlers that might break existing authentication mechanisms, and\r\nconvey original authentication assessments across trust boundaries.","pub_date":"July 2019","keywords":["DKIM","DMARC","signature","email","domian authentication","email authentication"],"obsoletes":[],"obsoleted_by":[],"updates":[],"updated_by":[],"see_also":[],"doi":"10.17487\/RFC8617","errata_url":"https:\/\/www.rfc-editor.org\/errata\/rfc8617"}