Vouch by Reference

Vouch by Reference (VBR) is a protocol used in Internet mail systems for implementing sender certification by third-party entities. Independent certification providers vouch for the reputation of senders by verifying the domain name that is associated with transmitted electronic mail. VBR information can be used by a message transfer agent, a mail delivery agent or by an email client.

The protocol is intended to become a standard for email sender certification, and is described in RFC 5518.[1]

Contents

Operation

Email sender

A user of a VBR email certification service signs its messages using DomainKeys Identified Mail (DKIM) by including a VBR-Info field in the signed header. The sender may also use the Sender Policy Framework, but only the receiving MTA can reliably verify a domain name with this technique. The VBR-Info: header field contains the domain name that is certified, typically the responsible domain in a DKIM signature, the type of content in the message, and a list of domain names of services that the sender expects to vouch for the sender for that kind of content.

Email receiver

Using DKIM, an email receiver can verify that the message is properly signed, thus verifying the domain that is responsible for the message. It can verify, using the Domain Name System, that the vouching service actually vouches for that type of content for that domain. To do so, the receiver queries a TXT resource record for the name composed:

 <domain.name>._vouch.<certifier.host.name>

The returned data, if any, is a space-delimited list of all the types that the service certifies, given as lowercase ASCII. The types defined are transaction, list, and all.

Implementations and variations

OpenDKIM and MDaemon by Alt-N Technologies have been among the first software implementations of VBR. OpenDKIM provides a milter as well as a standalone library. Roaring Penguin Software's CanIt anti-spam filter supports VBR as of version 7.0.8 released on 2010-11-09.[2]

Spamhaus has released The Spamhaus Whitelist[3] that includes a domain based whitelist, the DWL, where a domain name can be queried as, e.g., dwltest.com._vouch.dwl.spamhaus.org. Although the standard only specifies TXT resource records, following a long established DNSBL practice, Spamhaus has also assigned A resource records with values 127.0.2.0/24 for whitelist return codes. The possibility to query an address may allow easier deployment of existing code. However, their techfaq [4] recommends checking the domain (the value of the d= tag) of a valid DKIM-Signature by querying the corresponding TXT record, and their howto [5] gives details about inserting VBR-Info header fields in messages signed by whitelisted domains.

References

  1. ^ RFC 5518, "Vouch By Reference", P. Hoffman, J. Levine, A. Hathcock (April 2009)
  2. ^ "CanIt 7.0.8 Release Announcement". http://www.roaringpenguin.com/node/653. Retrieved 2010-11-09. 
  3. ^ Quentin Jenkins (2010-09-26). "Spamhaus Releases The Spamhaus Whitelist". News. http://www.spamhaus.org/news.lasso?article=662. Retrieved 2010-09-27. 
  4. ^ "Whitelist Technical FAQ". http://www.spamhauswhitelist.com/en/techfaq.php. Retrieved 2010-10-03. 
  5. ^ "How to Use". http://www.spamhauswhitelist.com/en/usage.html. Retrieved 2010-11-09.