draft-ietf-marf-as-15.txt | draft-ietf-marf-as.txt | |||
---|---|---|---|---|
MARF Working Group J. Falk | MARF Working Group J. Falk | |||
Internet-Draft Return Path | Internet-Draft Return Path | |||
Updates: 5965 (if approved) M. Kucherawy, Ed. | Updates: 5965 (if approved) M. Kucherawy, Ed. | |||
Intended status: Standards Track Cloudmark | Intended status: Standards Track Cloudmark | |||
Expires: October 27, 2012 April 25, 2012 | Expires: October 27, 2012 April 25, 2012 | |||
Creation and Use of Email Feedback Reports: An Applicability Statement | Creation and Use of Email Feedback Reports: An Applicability Statement | |||
for the Abuse Reporting Format (ARF) | for the Abuse Reporting Format (ARF) | |||
draft-ietf-marf-as-15 | draft-ietf-marf-as-16 | |||
Abstract | Abstract | |||
RFC 5965 defines an extensible, machine-readable format intended for | RFC 5965 defines an extensible, machine-readable format intended for | |||
mail operators to report feedback about received email to other | mail operators to report feedback about received email to other | |||
parties. This Applicability Statement describes common methods for | parties. This Applicability Statement describes common methods for | |||
utilizing this format for reporting both abuse and authentication | utilizing this format for reporting both abuse and authentication | |||
failure events. Mailbox Providers of any size, mail sending | failure events. Mailbox Providers of any size, mail sending | |||
entities, and end users can use these methods as a basis to create | entities, and end users can use these methods as a basis to create | |||
procedures that best suit them. Some related optional mechanisms are | procedures that best suit them. Some related optional mechanisms are | |||
skipping to change at page 3, line 45 | skipping to change at page 3, line 45 | |||
memo. | memo. | |||
Further introduction to this topic may be found in [RFC6449], which | Further introduction to this topic may be found in [RFC6449], which | |||
is effectively an Applicability Statement written outside of the IETF | is effectively an Applicability Statement written outside of the IETF | |||
and thus never achieved IETF consensus. Much of the content for that | and thus never achieved IETF consensus. Much of the content for that | |||
document was input to this one. | document was input to this one. | |||
At the time of publication of this document, five feedback types are | At the time of publication of this document, five feedback types are | |||
registered. This document only discusses two of them ("abuse" and | registered. This document only discusses two of them ("abuse" and | |||
"auth-failure") as they are seeing sufficient use in practice that | "auth-failure") as they are seeing sufficient use in practice that | |||
applicability statements can be made about them. The others are | applicability statements can be made about them. The others, i.e., | |||
either too new or too seldomly used to be included here. | "fraud" [RFC5965] and "not-spam" [RFC6430], are either too new or too | |||
seldomly used to be included here. | ||||
1.1. Discussion | 1.1. Discussion | |||
[RFC Editor: please remove this section prior to publication.] | [RFC Editor: please remove this section prior to publication.] | |||
This document is being discussed within the IETF MARF Working Group, | This document is being discussed within the IETF MARF Working Group, | |||
on the marf@ietf.org mailing list. | on the marf@ietf.org mailing list. | |||
2. Definitions | 2. Definitions | |||
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | |||
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | |||
document are to be interpreted as described in [RFC2119], and are | document are to be interpreted as described in [RFC2119], and are | |||
intended to replace the Requirement Levels described in Section 3.3 | intended to replace the Requirement Levels described in Section 3.3 | |||
of [RFC2026]. | of [RFC2026]. | |||
skipping to change at page 6, line 12 | skipping to change at page 6, line 12 | |||
email messages that can be received are discussed in Section 4.2 | email messages that can be received are discussed in Section 4.2 | |||
of [RFC6449]. | of [RFC6449]. | |||
3. Recipients of feedback reports that are part of formal feedback | 3. Recipients of feedback reports that are part of formal feedback | |||
arrangements have to be capable of handling large volumes of | arrangements have to be capable of handling large volumes of | |||
reports. This could require automation of report processing. | reports. This could require automation of report processing. | |||
Discussion of this can be found in Section 4.4 of [RFC6449]. | Discussion of this can be found in Section 4.4 of [RFC6449]. | |||
4.5. What To Expect | 4.5. What To Expect | |||
1. An automated report processing system MUST accept all Feedback- | 1. The list of vaild Feedback-Types is defined in [RFC5965], which | |||
Types defined in [RFC5965] or extensions to it. This means the | created an IANA registry for valid values to allow for | |||
implementers need to provide mechanisms to add support for new | extensions. However, an automated report processing system MUST | |||
types as they are defined and registered, possibly including new | NOT reject (in the SMTP sense) a report based on an unknown | |||
processing steps (such as when new reporting fields are added to | Feedback-Type, to allow for handling of new types that are not | |||
a type). However, Mailbox Providers might only make use of the | yet supported. The automated system can simply set reports of | |||
"abuse" Feedback-Type. Therefore, report receivers might be | unknown types aside for manual handling. However, Mailbox | |||
required to do additional analysis to separate different types of | Providers might only make use of the "abuse" Feedback-Type. | |||
abuse reports after receipt if they do not have prior specific | Therefore, report receivers might be required to do additional | |||
knowledge of the sender of the report. | analysis to separate different types of abuse reports after | |||
receipt if they do not have prior specific knowledge of the | ||||
sender of the report. | ||||
2. Reports receivers MUST accept reports that have obscured their | 2. Reports receivers MUST accept reports that have obscured their | |||
user-identifiable data as described in [RFC6590]. That document | user-identifiable data as described in [RFC6590]. That document | |||
also discusses the handling of such reports. This technique is | also discusses the handling of such reports. This technique is | |||
also discussed in Section 4.4 of [RFC6449]. | also discussed in Section 4.4 of [RFC6449]. | |||
4.6. What To Do With Reports | 4.6. What To Do With Reports | |||
1. Section 4.3 of [RFC6449] discusses actions that mail operators | 1. Section 4.3 of [RFC6449] discusses actions that mail operators | |||
might take upon receiving a report (or multiple reports). | might take upon receiving a report (or multiple reports). | |||
skipping to change at page 11, line 36 | skipping to change at page 11, line 37 | |||
Also, these reports may be forged as easily as ordinary Internet | Also, these reports may be forged as easily as ordinary Internet | |||
electronic mail. User agents and automatic mail handling facilities | electronic mail. User agents and automatic mail handling facilities | |||
(such as mail distribution list exploders) that wish to make | (such as mail distribution list exploders) that wish to make | |||
automatic use of reports of any kind should take appropriate | automatic use of reports of any kind should take appropriate | |||
precautions to minimize the potential damage from denial-of-service | precautions to minimize the potential damage from denial-of-service | |||
attacks. | attacks. | |||
Perhaps the simplest means of mitigating this threat is to assert | Perhaps the simplest means of mitigating this threat is to assert | |||
that these reports should themselves be signed with something like | that these reports should themselves be signed with something like | |||
DKIM or authorized by SPF. On the other hand, if there is a problem | DKIM and/or authorized by something like SPF. Note, however, that if | |||
with the DKIM infrastructure at the Verifier, signing DKIM failure | there is a problem with the email infrastructure at either end, DKIM | |||
reports may produce reports that aren't trusted or even accepted by | and/or SPF may result in reports that aren't trusted or even accepted | |||
their intended recipients. Similar issues could exist with SPF | by their intended recipients, so it is important to make sure those | |||
evaluation. Use of both technologies can mitigate this risk to a | components are properly configured. Use of both technologies in | |||
degree. | tandem can resolve this concern to a degree since they generally have | |||
disjoint failure modes. | ||||
8.3. Amplification Attacks | 8.3. Amplification Attacks | |||
Failure to comply with the recommendations regarding selection of the | Failure to comply with the recommendations regarding selection of the | |||
envelope sender can lead to amplification denial-of-service attacks. | envelope sender can lead to amplification denial-of-service attacks. | |||
This is discussed in Section 6 as well as in [RFC3464]. | This is discussed in Section 6 as well as in [RFC3464]. | |||
8.4. Automatic Generation | 8.4. Automatic Generation | |||
ARF ([RFC5965]) reports have historically been generated individually | ARF ([RFC5965]) reports have historically been generated individually | |||
skipping to change at page 15, line 16 | skipping to change at page 15, line 16 | |||
for Authorizing Use of Domains in E-Mail, Version 1", | for Authorizing Use of Domains in E-Mail, Version 1", | |||
RFC 4408, April 2006. | RFC 4408, April 2006. | |||
[RFC5617] Allman, E., Fenton, J., Delany, M., and J. Levine, | [RFC5617] Allman, E., Fenton, J., Delany, M., and J. Levine, | |||
"DomainKeys Identified Mail (DKIM) Author Domain Signing | "DomainKeys Identified Mail (DKIM) Author Domain Signing | |||
Practices (ADSP)", RFC 5617, August 2009. | Practices (ADSP)", RFC 5617, August 2009. | |||
[RFC6376] Crocker, D., Hansen, T., and M. Kucherawy, "DomainKeys | [RFC6376] Crocker, D., Hansen, T., and M. Kucherawy, "DomainKeys | |||
Identified Mail (DKIM) Signatures", RFC 6376, | Identified Mail (DKIM) Signatures", RFC 6376, | |||
September 2011. | September 2011. | |||
[RFC6430] Li, K. and B. Leiba, "Email Feedback Report Type Value: | ||||
not-spam", RFC 6430, November 2011. | ||||
[RFC6449] Falk, J., "Complaint Feedback Loop Operational | [RFC6449] Falk, J., "Complaint Feedback Loop Operational | |||
Recommendations", RFC 6449, November 2011. | Recommendations", RFC 6449, November 2011. | |||
[RFC6590] Falk, J. and M. Kucherawy, "Redaction of Potentially | [RFC6590] Falk, J. and M. Kucherawy, "Redaction of Potentially | |||
Sensitive Data from Mail Abuse Reports", RFC 6590, | Sensitive Data from Mail Abuse Reports", RFC 6590, | |||
April 2012. | April 2012. | |||
Authors' Addresses | Authors' Addresses | |||
End of changes. 6 change blocks. | ||||
20 lines changed or deleted | 26 lines changed or added | |||
This html diff was produced by rfcdiff 1.33. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ |