Creation and Use of Email Feedback Reports:
An Applicability Statement for the Abuse Reporting
Format (ARF)
draft-ietf-marf-as-14
Abstract
RFC 5965 defines an extensible, machine-readable
format intended for mail operators to report
feedback about received email to other parties.
This Applicability Statement describes common
methods for utilizing this format for reporting
both abuse and authentication failure events.
Mailbox Providers of any size, mail sending
entities, and end users can use these methods as
a basis to create procedures that best suit
them. Some related optional mechanisms are
also discussed.
Status of this Memo
This Internet-Draft is submitted in full
conformance with the provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current
Internet-Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any time.
It is inappropriate to use Internet-Drafts as reference material or to cite
them other than as “work in progress.”
This Internet-Draft will expire on October 21, 2012.
Copyright Notice
Copyright (c) 2012 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1.
Introduction
1.1.
Discussion
2.
Definitions
3.
Solicited and Unsolicited Reports
4.
Generating And Handling Solicited Abuse Reports
4.1.
General Considerations for Feedback Providers
4.2.
Where To Send Reports
4.3.
What To Put In Reports
4.4.
General Considerations for Feedback Consumers
4.5.
What To Expect
4.6.
What To Do With Reports
5.
Generating and Handling Unsolicited Abuse Reports
5.1.
General Considerations
5.2.
When To Generate Reports
5.3.
Where To Send Reports
5.4.
What To Put In Reports
5.5.
What To Do With Reports
6.
Generating Automatic Authentication Failure Reports
7.
IANA Considerations
8.
Security Considerations
8.1.
In Other Documents
8.2.
Forgeries
8.3.
Amplification Attacks
8.4.
Automatic Generation
8.5.
Reporting Multiple Incidents
9.
Acknowledgements
10.
References
10.1.
Normative References
10.2.
Informative References
§
Authors' Addresses
1.
Introduction
The Abuse Reporting Format (ARF) was initially
developed for two very specific use cases.
Initially, it was intended to be used for
reporting feedback between large email operators,
or from large email operators to end user network
access operators, any of whom could be presumed to
have automated abuse-handling systems.
Secondarily, it is used by those same large mail
operators to send those same reports to other
entities, including those involved in sending bulk
email for commercial purposes. In either case,
the reports would be triggered by direct end user
action such as clicking on a "report spam" button
in their email client.
Though other uses for the format defined in
[RFC5965] (Shafranovich, Y., Levine, J., and M. Kucherawy, “An Extensible Format for Email Feedback Reports,” August 2010.) have been discussed (and
may be documented similarly in the future), abuse
remains the primary application, with a small
amount of adoption of extensions that enable
authentication failure reporting.
This Applicability Statement provides direction
for using the Abuse Reporting Format (ARF) in
both contexts. It also includes some statements
about the use of ARF in conjunction with other email
technologies.
The purpose for reporting abusive messages is to
stop recurrences. The methods described in this
document focus on automating abuse reporting as
much as practical, so as to minimize the work of
a site's abuse team. There are further reasons why
abuse feedback generation is worthwhile, such as
instruction of mail filters or reputation trackers,
or to initiate investigations of particularly
egregious abuses. These other applications are
not discussed in this memo.
Further introduction to this topic may be found
in [RFC6449] (Falk, J., “Complaint Feedback Loop Operational Recommendations,” November 2011.).
1.1.
Discussion
[RFC Editor: please remove this section prior
to publication.]
This document is being discussed within
the IETF MARF Working Group, on the
marf@ietf.org mailing list.
2.
Definitions
The key words "MUST", "MUST NOT",
"REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED",
"MAY", and "OPTIONAL" in this document are
to be interpreted as described in
[RFC2119] (Bradner, S., “Key words for use in RFCs to Indicate Requirement Levels,” March 1997.), and are intended
to replace the Requirement Levels
described in Section 3.3 of
[RFC2026] (Bradner, S., “The Internet Standards Process -- Revision 3,” October 1996.).
Some of the terminology used in this
document is taken from
[RFC5598] (Crocker, D., “Internet Mail Architecture,” July 2009.).
"Mailbox Provider" refers to an
organization that accepts, stores, and
offers access to [RFC5322] (Resnick, P., Ed., “Internet Message Format,” October 2008.)
messages ("email messages") for end users.
Such an organization has typically
implemented SMTP
([RFC5321] (Klensin, J., “Simple Mail Transfer Protocol,” October 2008.)), and might
provide access to messages through IMAP
([RFC3501] (Crispin, M., “INTERNET MESSAGE ACCESS PROTOCOL - VERSION 4rev1,” March 2003.)), POP
([RFC1939] (Myers, J. and M. Rose, “Post Office Protocol - Version 3,” May 1996.)), a proprietary
interface designed for HTTP
([RFC2616] (Fielding, R., Gettys, J., Mogul, J., Frystyk, H., Masinter, L., Leach, P., and T. Berners-Lee, “Hypertext Transfer Protocol -- HTTP/1.1,” June 1999.)), or a
proprietary protocol.
3.
Solicited and Unsolicited Reports
The original application of [RFC5965] (Shafranovich, Y., Levine, J., and M. Kucherawy, “An Extensible Format for Email Feedback Reports,” August 2010.),
and still by far the most common, is when two mail
systems make a private agreement to exchange abuse
reports, usually reports due to recipients manually
reporting messages as spam. We refer to these as
solicited reports.
Other uses for ARF involve such reports sent between parties
that don't know each other. These unsolicited reports
are sent without prior arrangement between the parties
as to the context and meaning of the reports, so the
constraints on how these unsolicited reports need to be
structured such that the reports generated are likely to
be useful to the recipient, to what address(es) they
can usefully be sent, what issues the can be used to
report, and how they can be handled by the receiver
of the report are very different.
The two cases are covered separately in following sections.
4.
Generating And Handling Solicited Abuse Reports
[The numbered items in these subsections are not
intended to be in a paricular sequence. The
numbers are here during document development to
make it easier to identify the items for
discussion, and will be removed before
publication.]
4.1.
General Considerations for Feedback Providers
- A Mailbox Provider receives reports of
abusive or unwanted mail from its users,
most often by providing a "report spam"
button (or similar nomenclature) in the
MUA (Mail User Agent). The method of transferring
this
message and any associated metadata from
the MUA to the Mailbox Provider's ARF
processing system is not defined by any
standards document, but is discussed
further in Section 3.2 of
[RFC6449] (Falk, J., “Complaint Feedback Loop Operational Recommendations,” November 2011.). Policy concerns
related to the collection of this data
are discussed in Section 3.4 of
[RFC6449] (Falk, J., “Complaint Feedback Loop Operational Recommendations,” November 2011.).
- To implement the recommendations of this
memo, the reports are formatted per
[RFC5965] (Shafranovich, Y., Levine, J., and M. Kucherawy, “An Extensible Format for Email Feedback Reports,” August 2010.),
and transmitted as an email message
([RFC5322] (Resnick, P., Ed., “Internet Message Format,” October 2008.)), typically
using SMTP ([RFC5321] (Klensin, J., “Simple Mail Transfer Protocol,” October 2008.)).
- Ongoing maintenance of an ARF processing
system is discussed in Section 3.6 of
[RFC6449] (Falk, J., “Complaint Feedback Loop Operational Recommendations,” November 2011.).
4.2.
Where To Send Reports
- The Mailbox Provider SHOULD NOT send reports
to addresses that have not explicitly requested
them. A valid deviation might be the result of
local policy instructions. The process whereby
such parties may request the reports is discussed
in Section 3.5 of [RFC6449] (Falk, J., “Complaint Feedback Loop Operational Recommendations,” November 2011.).
4.3.
What To Put In Reports
- The reports SHOULD use "Feedback-Type: abuse",
for its type. Although a Mailbox Provider
generating the reports can use other types
appropriate to the nature of the abuse being
reported, the operator receiving the reports might
not treat different feedback types
differently.
- The following fields are optional in
[RFC5965] (Shafranovich, Y., Levine, J., and M. Kucherawy, “An Extensible Format for Email Feedback Reports,” August 2010.), but SHOULD be used in
this context when their corresponding values are
available: Original-Mail-From, Arrival-Date,
Source-IP, Original-Rcpt-To. Other
optional fields can be included, as the
implementer feels is appropriate.
- User-identifiable data MAY be obscured as
described in
[I‑D.IETF‑MARF‑REDACTION] (Falk, JD. and M. Kucherawy, Ed., “Redaction of Potentially Sensitive Data from Mail Abuse Reports,” March 2011.).
4.4.
General Considerations for Feedback Consumers
- ARF report streams are established
proactively between Feedback Providers and
Feedback Consumers. Recommendations for preparing
to make that request are discussed in
Section 4.1 of [RFC6449] (Falk, J., “Complaint Feedback Loop Operational Recommendations,” November 2011.).
- Operators MUST be able to accept ARF
[RFC5965] (Shafranovich, Y., Levine, J., and M. Kucherawy, “An Extensible Format for Email Feedback Reports,” August 2010.) reports as email messages
[RFC5322] (Resnick, P., Ed., “Internet Message Format,” October 2008.) over
SMTP [RFC5321] (Klensin, J., “Simple Mail Transfer Protocol,” October 2008.). These
and other types of email messages that
can be received are discussed in
Section 4.2 of [RFC6449] (Falk, J., “Complaint Feedback Loop Operational Recommendations,” November 2011.).
- Recipients of feedback reports that are part
of formal feedback arrangements have to be capable
of handling large volumes of reports. This
could require automation of report processing.
Discussion of this can be found in Section 4.4 of
[RFC6449] (Falk, J., “Complaint Feedback Loop Operational Recommendations,” November 2011.).
4.5.
What To Expect
- An automated report processing system MUST
accept all Feedback-Types defined in
[RFC5965] (Shafranovich, Y., Levine, J., and M. Kucherawy, “An Extensible Format for Email Feedback Reports,” August 2010.) or extensions to
it. However, Mailbox Providers might only make
use of the "abuse" Feedback-Type. Therefore,
report receivers might be required to do additional
analysis to separate different types of abuse
reports after receipt if they do not have prior
specific knowledge of the sender of the
report.
- Reports receivers MUST accept reports that have
obscured their user-identifiable data as described
in [I‑D.IETF‑MARF‑REDACTION] (Falk, JD. and M. Kucherawy, Ed., “Redaction of Potentially Sensitive Data from Mail Abuse Reports,” March 2011.).
That document also discusses the handling of
such reports. This technique is also discussed in
Section 4.4 of [RFC6449] (Falk, J., “Complaint Feedback Loop Operational Recommendations,” November 2011.).
4.6.
What To Do With Reports
- Section 4.3 of [RFC6449] (Falk, J., “Complaint Feedback Loop Operational Recommendations,” November 2011.) discusses
actions that mail operators might take upon
receiving a report (or multiple reports).
5.
Generating and Handling Unsolicited Abuse Reports
[The numbered items in these subsections are not
intended to be in a paricular sequence. The numbers are
here during document development to make it easier to
identify the items for discussion, and will be removed
before publication.]
5.1.
General Considerations
- It is essential for report recipients to be capable
of throttling reports being sent to avoid damage
to their own installations. Therefore, Feedback
Providers MUST provide a way for report
recipients to request that no further reports be
sent. Unfortunately, no standardized mechanism
for such requests exists to date, and all
existing mechanisms for meeting this requirement
are out-of-band.
- Message authentication is generally a good
idea, but it is especially important to
encourage credibility of and thus response
to unsolicited reports. Therefore, as
with any other message, Feedback Providers
sending unsolicited reports SHOULD
send reports that will pass Sender Policy
Framework ([RFC4408] (Wong, M. and W. Schlitt, “Sender Policy Framework (SPF) for Authorizing Use of Domains in E-Mail, Version 1,” April 2006.))
and/or DomainKeys Identified Mail
([RFC6376] (Crocker, D., Hansen, T., and M. Kucherawy, “DomainKeys Identified Mail (DKIM) Signatures,” September 2011.)) checks.
5.2.
When To Generate Reports
- Handling of unsolicited reports has a
significant cost to the receiver. Senders
of unsolicited reports, especially those
sending large volumes of them
automatically SHOULD NOT send reports that cannot
be used as a basis for action by the recipient,
whether this is due to the report being sent about
an incident that is not abuse-related, the
report being sent to an email address that
won't result in action, or the content or
format of the report being hard for the
recipient to read or use.
- Feedback Providers SHOULD NOT report all mail sent
from a particular sender merely because
some of it is determined to be abusive.
- Mechanical reports of mail that "looks
like" spam, based solely on the results
of inline content analysis tools, SHOULD
NOT be sent since, because of their
subjective nature, they are unlikely to
provide a basis for the recipient to take
action. Complaints generated by end users about
mail that is determined by them to be abusive,
or mail delivered to "spam trap" or "honeypot"
addresses, are far more likely to be accurate.
- If a Feedback Provider applies SPF to
arriving messages, a report SHOULD NOT be
generated to the RFC5321.MailFrom domain
if the SPF evaluation produced a "Fail",
"SoftFail", "TempError" or "PermError"
report, as no reliable assertion or assumption
can be made that use of the domain was
authorized. A valid exception would be specific
knowledge that the SPF result is not
definitive for that domain under those
circumstances (for example, a message that
is also DKIM-signed by the same domain,
and that signature validates).
5.3.
Where To Send Reports
- Rather than generating feedback reports themselves,
MUAs SHOULD make abuse reports back to their
mailbox providers so that they can generate and
send ARF messages on behalf of end users (see
Section 3.2 of [RFC6449] (Falk, J., “Complaint Feedback Loop Operational Recommendations,” November 2011.)). This
allows centralized processing and tracking of
reports, and provides training input to filtering
systems. There is, however, no standard mechanism
for this signaling between MUAs and mailbox
providers to trigger abuse reports.
- Feedback Providers SHOULD NOT send reports to
recipients that are uninvolved or only
peripherally involved. For example, they
SHOULD NOT send reports to the operator
of every Autonomous System in the path
between the apparent originating system
and the operator generating the
report. Instead, they need to send reports to
recipients that are both responsible for
the messages and are able to do something
about them.
- Deciding where to send an unsolicited
report will typically rely on heuristics.
Abuse addresses in WHOIS ([RFC3912] (Daigle, L., “WHOIS Protocol Specification,” September 2004.))
records of the IP address relaying the subject
message and/or of the domain name found in the
results of a PTR ("reverse lookup") query
on that address are likely reasonable
candidates, as is the abuse@domain role
address (see [RFC2142] (Crocker, D., “MAILBOX NAMES FOR COMMON SERVICES, ROLES AND FUNCTIONS,” May 1997.)) of
related domains. Unsolicited reports
SHOULD NOT be sent to email addresses that
are not clearly intended to handle abuse reports.
Legitimate candidates include those found in
WHOIS records or on a web site that either
are explicitly described as an abuse contact, or
are of the form "abuse@domain".
- Where an abusive message is authenticated using a
domain-level authentication technology
such as DKIM ([RFC6376] (Crocker, D., Hansen, T., and M. Kucherawy, “DomainKeys Identified Mail (DKIM) Signatures,” September 2011.))
or SPF ([RFC4408] (Wong, M. and W. Schlitt, “Sender Policy Framework (SPF) for Authorizing Use of Domains in E-Mail, Version 1,” April 2006.)), the
domain that has been verified by the
authentication mechanism is often a
reasonable candidate for receiving
feedback about the message. For DKIM,
though, while the authenticated domain
has some responsibility for the mail sent,
it can be a poor contact point for abuse
issues (for example, it could represent
the message's author but not its sender,
it could identify the bad actor
responsible for the message, or it could
refer to a domain that cannot receive mail
at all).
- Often, unsolicited reports will have no meaning
if sent to abuse reporting addresses belonging to
the abusive parties themselves. In fact, it is
possible that such reports might reveal information
about complainants. Reports SHOULD NOT be
sent to such addresses if they can be identified
beforehand, except where the abusive party
is known to be responsive to such reports.
5.4.
What To Put In Reports
- Reports SHOULD use "Feedback-Type: abuse",
but can use other types as appropriate.
However, the Mailbox Provider generating
the reports cannot assume that the
operator receiving the reports will treat
different Feedback-Types differently.
- Reports SHOULD include the following
optional fields whenever their corresponding
values are available and applicable to the report:
Original-Mail-From, Arrival-Date,
Source-IP, Original-Rcpt-To. Other
optional fields can be included, as the
implementer feels is appropriate.
- Experience suggests use of ARF is
advisable in most contexts. Automated
recipient systems can handle abuse reports
sent in ARF format at least as well as any
other format such as plain text, with or
without a copy of the message attached.
That holds even for systems that did not
request ARF format reports, assuming such
reports are generated considering the possibility
of recipients that don't use automated ARF
parsing. Anyone sending unsolicited
reports in ARF format can legitimately
presume that some recipients will only be
able to access the human readable (first,
text/plain) part of it, and SHOULD include
all information needed also in this part.
Further, they SHOULD ensure that the
report is readable when viewed as plain
text, to give low-end ticketing systems as
much assistance as possible. In extreme
cases, failure to take these steps may result
in the report being discarded or ignored.
5.5.
What To Do With Reports
- Receivers of unsolicited reports
can take advantage of the
standardized parts of the ARF format to
automate processing. Independent of the
sender of the report, they can improve
processing by separating valid from invalid reports
by, for example, looking for references
to IP address ranges, domains, and
mailboxes for which the recipient
organization is responsible in the copy of
the reported message, and by correlating
multiple reports of similar messages to
identify bulk senders.
- Per Section 4.4 of
[RFC6449] (Falk, J., “Complaint Feedback Loop Operational Recommendations,” November 2011.), a network
service provider MAY use ARF data for
automated forwarding of feedback messages
to the originating customer.
- Published abuse mailbox addresses SHOULD
NOT reject non-ARF messages based solely on
the format, as generation of ARF messages can
occasionally be unavailable or not
applicable. Deviation from this requirement
could be done due to local policy decisions
regarding other message criteria.
- Although [RFC6449] (Falk, J., “Complaint Feedback Loop Operational Recommendations,” November 2011.) suggests
that replying to feedback is not useful,
in the case of receipt of ARF reports
where no feedback arrangement has been
established, a non-automated reply might be
desirable to indicate what action resulted
from the complaint, heading off more severe
filtering by the Feedback Provider. In
addition, using an address that cannot
receive replies precludes any requests for
additional information, and increases the
likelihood that further reports will be
discarded or blocked. Thus, a Feedback
Provider sending unsolicited reports
SHOULD NOT generate reports for which a reply
cannot be received. Where an
unsolicited report results in the
establishment of contact with a
responsible and responsive party, this can
be saved for future complaint handling and
possible establishment of a formal
(solicited) feedback arrangement. See
Section 3.5 of [RFC6449] (Falk, J., “Complaint Feedback Loop Operational Recommendations,” November 2011.)
for a discussion of establishment of
feedback arrangements.
6.
Generating Automatic Authentication Failure Reports
[These numbered items are not intended to be in a
paricular sequence. The numbers are here during
document development to make it easier to identify
the items for discussion, and will be removed
before publication.]
There are some cases where report generation is
caused by automation rather than user request.
A specific example of this is reporting, using
the ARF format (or extensions to it), of messages
that fail particular message authentication checks.
Examples of this include
[I‑D.IETF‑MARF‑DKIM‑REPORTING] (Kucherawy, M., “Extensions to DKIM for Failure Reporting,” January 2012.)
and [I‑D.IETF‑MARF‑SPF‑REPORTING] (Kitterman, S., “SPF Authentication Failure Reporting using the Abuse Report Format,” January 2012.).
The considerations presented below apply in those
cases.
The applicability statement for this use case
is somewhat smaller as many of the issues
associated with abuse reports are not relevant
to reports about authentication failures.
- Automatic feedback generators MUST select
recipients based on data provided by the report
recipient. In particular, recipients MUST NOT be
selected using heuristics.
- If the message under evaluation by the
Verifier is an ARF
([RFC5965] (Shafranovich, Y., Levine, J., and M. Kucherawy, “An Extensible Format for Email Feedback Reports,” August 2010.))
message, a report MUST NOT be automatically
generated.
- The message for a new report sent via SMTP MUST
be constructed so as to avoid amplification
attacks, deliberate or otherwise. The envelope
sender address of the report MUST be chosen so
that these reports will not generate mail loops.
Similar to Section 2 of [RFC3464] (Moore, K. and G. Vaudreuil, “An Extensible Message Format for Delivery Status Notifications,” January 2003.),
the envelope sender address of the report MUST be
chosen to ensure that no feedback reports will
be issued in response to the report itself.
Therefore, when an SMTP transaction is used to send
a report, the MAIL FROM command SHOULD use the
NULL reverse-path, i.e., "MAIL FROM:<>". An
exception to this would be the use of a
reverse-path selected such that SPF checks on
the report will pass; in such cases, the operator
will need to make provisions to avoid the
amplification attack or mail loop via other
means.
- Reports SHOULD use
"Feedback-Type: auth-failure", but MAY use
other types as appropriate. However, the
Mailbox Provider generating the reports
cannot assume that the operator
receiving the reports will treat different
Feedback-Types differently.
- These reports SHOULD include the following
optional fields, although they are optional
in [RFC5965] (Shafranovich, Y., Levine, J., and M. Kucherawy, “An Extensible Format for Email Feedback Reports,” August 2010.), whenever their
corresponding values are available:
Original-Mail-From, Arrival-Date,
Source-IP, Original-Rcpt-To. Other
optional fields can be included, as the
implementer feels is appropriate.
7.
IANA Considerations
[RFC Editor: please remove this section prior to
publication.]
This document has no IANA actions.
8.
Security Considerations
8.1.
In Other Documents
Implementers are strongly urged to review,
at a minimum, the Security Considerations
sections of [RFC5965] (Shafranovich, Y., Levine, J., and M. Kucherawy, “An Extensible Format for Email Feedback Reports,” August 2010.) and
[RFC6449] (Falk, J., “Complaint Feedback Loop Operational Recommendations,” November 2011.).
8.2.
Forgeries
Feedback Providers that relay user
complaints directly, rather than by
reference to a stored message (e.g.,
IMAP or POP), could be duped into sending
a complaint about a message that the
complaining user never actually received,
as an attack on the purported originator
of the falsified message. Feedback
Providers need to be resilient to such
attack methods.
Also, these reports may be forged as
easily as ordinary Internet electronic
mail. User agents and automatic mail
handling facilities (such as mail
distribution list exploders) that wish
to make automatic use of reports of any
kind should take appropriate precautions
to minimize the potential damage from
denial-of-service attacks.
Perhaps the simplest means of mitigating
this threat is to assert that these
reports should themselves be signed with
something like DKIM or authorized by SPF.
On the other hand,
if there is a problem with the DKIM
infrastructure at the Verifier, signing
DKIM failure reports may produce reports
that aren't trusted or even accepted by
their intended recipients. Similar issues
could exist with SPF evaluation. Use of
both technologies can mitigate this risk
to a degree.
8.3.
Amplification Attacks
Failure to comply with the recommendations
regarding selection of the envelope sender
can lead to amplification denial-of-service
attacks.
8.4.
Automatic Generation
ARF ([RFC5965] (Shafranovich, Y., Levine, J., and M. Kucherawy, “An Extensible Format for Email Feedback Reports,” August 2010.)) reports have
historically been generated individually
as a result of some kind of human request,
such as someone clicking a "Report Abuse"
button in a mail reader. In contrast, the
mechanisms described in some extension
documents (i.e.,
[I‑D.IETF‑MARF‑DKIM‑REPORTING] (Kucherawy, M., “Extensions to DKIM for Failure Reporting,” January 2012.)
and
[I‑D.IETF‑MARF‑SPF‑REPORTING] (Kitterman, S., “SPF Authentication Failure Reporting using the Abuse Report Format,” January 2012.))
are focused around automated reporting.
This obviously implies the potential for
much larger volumes or frequency of
messages, and thus greater mail system
load (both for Feedback Providers and
report receivers).
Those mechanisms are primarily intended
for use in generating reports to aid
implementers of DKIM
([RFC6376] (Crocker, D., Hansen, T., and M. Kucherawy, “DomainKeys Identified Mail (DKIM) Signatures,” September 2011.)),
ADSP ([RFC5617] (Allman, E., Fenton, J., Delany, M., and J. Levine, “DomainKeys Identified Mail (DKIM) Author Domain Signing Practices (ADSP),” August 2009.)), and
SPF ([RFC4408] (Wong, M. and W. Schlitt, “Sender Policy Framework (SPF) for Authorizing Use of Domains in E-Mail, Version 1,” April 2006.)), and other
related
protocols during development and debugging.
They are not generally intended for
prolonged forensic use, specifically
because of these load concerns. However,
extended use is possible by ADMDs that
want to keep a close watch for fraud or
infrastructure problems. It is important
to consider the impact of doing so on both
Feedback Providers and the requesting
ADMDs.
A sender requesting these reports can
cause its mail servers to be overwhelmed
if it sends out signed messages whose
signatures fail to verify for some reason,
provoking a large number of reports from
Feedback Providers. Similarly, a Feedback
Provider could be overwhelmed by a large
volume of messages requesting reports
whose signatures fail to validate, as
those now need to send reports back to
the signer.
Limiting the rate of generation of these
messages may be appropriate but threatens
to inhibit the distribution of important
and possibly time-sensitive
information.
In general ARF feedback loop terms, it is
often suggested that Feedback Providers
only create these (or any) ARF reports
after an out-of-band arrangement has been
made between two parties. These extension
mechanisms then become ways to adjust
parameters of an authorized abuse report
feedback loop that is configured and
activated by private agreement rather than
starting to send them automatically based
solely on data found in the messages,
which may have unintended
consequences.
8.5.
Reporting Multiple Incidents
If it is known that a particular host
generates abuse reports upon certain
incidents, an attacker could forge a high
volume of messages that will trigger such
a report. The recipient of the report
could then be innundated with reports.
This could easily be extended to a
distributed denial-of-service attack by
finding a number of report-generating
servers.
The incident count referenced in
ARF ([RFC5965] (Shafranovich, Y., Levine, J., and M. Kucherawy, “An Extensible Format for Email Feedback Reports,” August 2010.)) provides a
limited
form of mitigation. The host generating
reports can elect to send reports only
periodically, with each report
representing a number of identical or
nearly-identical incidents. One might
even do something inverse-exponentially,
sending reports for each of the first ten
incidents, then every tenth incident up
to 100, then every 100th incident up to
1000, etc., until some period of relative
quiet after which the limitation
resets.
The use of this for "nearly-identical"
incidents in particular causes a
degradation in reporting quality, however.
If for example a large number of pieces of
spam arrive from one attacker, a reporting
agent could decide only to send a report
about a fraction of those messages. While
this averts a flood of reports to a
system administrator, the precise details
of each incident are similarly not
sent.
Other rate limiting provisions might be
considered, including detection of a
temporary failure response from the report
destination and thus halting report
generation to that destination for some
period, or simply imposing or negotiating
a hard limit on the number of reports to
be sent to a particular receiver in a
given time frame.
9.
Acknowledgements
The author and editor wish to thank
Steve Atkins,
John Levine,
Shmuel Metz,
S. Moonesamy,
and
Alessandro Vesely
for their contributions to this memo.
All of the Best Practices referenced by this document are
found in [RFC6449] (Falk, J., “Complaint Feedback Loop Operational Recommendations,” November 2011.), written within the
Collaboration Committee of the Messaging Anti-Abuse
Working Group (MAAWG).
Finally, the original author wishes to thank the doctors
and staff at the University of Texas MD Anderson Cancer
Center for doing what they do.
10.
References
10.1. Normative References
| [RFC2119] |
Bradner, S., “Key words for use in RFCs to Indicate Requirement Levels,” BCP 14, RFC 2119, March 1997 (TXT, HTML, XML). |
| [RFC5321] |
Klensin, J., “Simple Mail Transfer Protocol,” RFC 5321, October 2008 (TXT). |
| [RFC5322] |
Resnick, P., Ed., “Internet Message Format,” RFC 5322, October 2008 (TXT, HTML, XML). |
| [RFC5598] |
Crocker, D., “Internet Mail Architecture,” RFC 5598, July 2009 (TXT, PDF). |
| [RFC5965] |
Shafranovich, Y., Levine, J., and M. Kucherawy, “An Extensible Format for Email Feedback Reports,” RFC 5965, August 2010 (TXT). |
10.2. Informative References
| [I-D.IETF-MARF-DKIM-REPORTING] |
Kucherawy, M., “Extensions to DKIM for Failure Reporting,” draft-ietf-marf-dkim-reporting (work in progress), January 2012. |
| [I-D.IETF-MARF-REDACTION] |
Falk, JD. and M. Kucherawy, Ed., “Redaction of Potentially Sensitive Data from Mail Abuse Reports,” draft-ietf-marf-redaction (work in progress), March 2011. |
| [I-D.IETF-MARF-SPF-REPORTING] |
Kitterman, S., “SPF Authentication Failure Reporting using
the Abuse Report Format,” draft-ietf-marf-spf-reporting (work in progress), January 2012. |
| [RFC1939] |
Myers, J. and M. Rose, “Post Office Protocol - Version 3,” STD 53, RFC 1939, May 1996 (TXT). |
| [RFC2026] |
Bradner, S., “The Internet Standards Process -- Revision 3,” BCP 9, RFC 2026, October 1996 (TXT). |
| [RFC2142] |
Crocker, D., “MAILBOX NAMES FOR COMMON SERVICES, ROLES AND FUNCTIONS,” RFC 2142, May 1997 (TXT, HTML, XML). |
| [RFC2616] |
Fielding, R., Gettys, J., Mogul, J., Frystyk, H., Masinter, L., Leach, P., and T. Berners-Lee, “Hypertext Transfer Protocol -- HTTP/1.1,” RFC 2616, June 1999 (TXT, PS, PDF, HTML, XML). |
| [RFC3464] |
Moore, K. and G. Vaudreuil, “An Extensible Message Format for Delivery Status Notifications,” RFC 3464, January 2003 (TXT). |
| [RFC3501] |
Crispin, M., “INTERNET MESSAGE ACCESS PROTOCOL - VERSION 4rev1,” RFC 3501, March 2003 (TXT). |
| [RFC3912] |
Daigle, L., “WHOIS Protocol Specification,” RFC 3912, September 2004 (TXT). |
| [RFC4408] |
Wong, M. and W. Schlitt, “Sender Policy Framework (SPF) for Authorizing Use of Domains in E-Mail, Version 1,” RFC 4408, April 2006 (TXT). |
| [RFC5617] |
Allman, E., Fenton, J., Delany, M., and J. Levine, “DomainKeys Identified Mail (DKIM) Author Domain Signing Practices (ADSP),” RFC 5617, August 2009 (TXT). |
| [RFC6376] |
Crocker, D., Hansen, T., and M. Kucherawy, “DomainKeys Identified Mail (DKIM) Signatures,” RFC 6376, September 2011 (TXT). |
| [RFC6449] |
Falk, J., “Complaint Feedback Loop Operational Recommendations,” RFC 6449, November 2011 (TXT). |
Authors' Addresses