draft-ietf-marf-as-15.txt   draft-ietf-marf-as.txt 
MARF Working Group J. Falk MARF Working Group J. Falk
Internet-Draft Return Path Internet-Draft Return Path
Updates: 5965 (if approved) M. Kucherawy, Ed. Updates: 5965 (if approved) M. Kucherawy, Ed.
Intended status: Standards Track Cloudmark Intended status: Standards Track Cloudmark
Expires: October 27, 2012 April 25, 2012 Expires: October 27, 2012 April 25, 2012
Creation and Use of Email Feedback Reports: An Applicability Statement Creation and Use of Email Feedback Reports: An Applicability Statement
for the Abuse Reporting Format (ARF) for the Abuse Reporting Format (ARF)
draft-ietf-marf-as-15 draft-ietf-marf-as-16
Abstract Abstract
RFC 5965 defines an extensible, machine-readable format intended for RFC 5965 defines an extensible, machine-readable format intended for
mail operators to report feedback about received email to other mail operators to report feedback about received email to other
parties. This Applicability Statement describes common methods for parties. This Applicability Statement describes common methods for
utilizing this format for reporting both abuse and authentication utilizing this format for reporting both abuse and authentication
failure events. Mailbox Providers of any size, mail sending failure events. Mailbox Providers of any size, mail sending
entities, and end users can use these methods as a basis to create entities, and end users can use these methods as a basis to create
procedures that best suit them. Some related optional mechanisms are procedures that best suit them. Some related optional mechanisms are
skipping to change at page 3, line 45 skipping to change at page 3, line 45
memo. memo.
Further introduction to this topic may be found in [RFC6449], which Further introduction to this topic may be found in [RFC6449], which
is effectively an Applicability Statement written outside of the IETF is effectively an Applicability Statement written outside of the IETF
and thus never achieved IETF consensus. Much of the content for that and thus never achieved IETF consensus. Much of the content for that
document was input to this one. document was input to this one.
At the time of publication of this document, five feedback types are At the time of publication of this document, five feedback types are
registered. This document only discusses two of them ("abuse" and registered. This document only discusses two of them ("abuse" and
"auth-failure") as they are seeing sufficient use in practice that "auth-failure") as they are seeing sufficient use in practice that
applicability statements can be made about them. The others are applicability statements can be made about them. The others, i.e.,
either too new or too seldomly used to be included here. "fraud" [RFC5965] and "not-spam" [RFC6430], are either too new or too
seldomly used to be included here.
1.1. Discussion 1.1. Discussion
[RFC Editor: please remove this section prior to publication.] [RFC Editor: please remove this section prior to publication.]
This document is being discussed within the IETF MARF Working Group, This document is being discussed within the IETF MARF Working Group,
on the marf@ietf.org mailing list. on the marf@ietf.org mailing list.
2. Definitions 2. Definitions
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119], and are document are to be interpreted as described in [RFC2119], and are
intended to replace the Requirement Levels described in Section 3.3 intended to replace the Requirement Levels described in Section 3.3
of [RFC2026]. of [RFC2026].
skipping to change at page 6, line 12 skipping to change at page 6, line 12
email messages that can be received are discussed in Section 4.2 email messages that can be received are discussed in Section 4.2
of [RFC6449]. of [RFC6449].
3. Recipients of feedback reports that are part of formal feedback 3. Recipients of feedback reports that are part of formal feedback
arrangements have to be capable of handling large volumes of arrangements have to be capable of handling large volumes of
reports. This could require automation of report processing. reports. This could require automation of report processing.
Discussion of this can be found in Section 4.4 of [RFC6449]. Discussion of this can be found in Section 4.4 of [RFC6449].
4.5. What To Expect 4.5. What To Expect
1. An automated report processing system MUST accept all Feedback- 1. The list of vaild Feedback-Types is defined in [RFC5965], which
Types defined in [RFC5965] or extensions to it. This means the created an IANA registry for valid values to allow for
implementers need to provide mechanisms to add support for new extensions. However, an automated report processing system MUST
types as they are defined and registered, possibly including new NOT reject (in the SMTP sense) a report based on an unknown
processing steps (such as when new reporting fields are added to Feedback-Type, to allow for handling of new types that are not
a type). However, Mailbox Providers might only make use of the yet supported. The automated system can simply set reports of
"abuse" Feedback-Type. Therefore, report receivers might be unknown types aside for manual handling. However, Mailbox
required to do additional analysis to separate different types of Providers might only make use of the "abuse" Feedback-Type.
abuse reports after receipt if they do not have prior specific Therefore, report receivers might be required to do additional
knowledge of the sender of the report. analysis to separate different types of abuse reports after
receipt if they do not have prior specific knowledge of the
sender of the report.
2. Reports receivers MUST accept reports that have obscured their 2. Reports receivers MUST accept reports that have obscured their
user-identifiable data as described in [RFC6590]. That document user-identifiable data as described in [RFC6590]. That document
also discusses the handling of such reports. This technique is also discusses the handling of such reports. This technique is
also discussed in Section 4.4 of [RFC6449]. also discussed in Section 4.4 of [RFC6449].
4.6. What To Do With Reports 4.6. What To Do With Reports
1. Section 4.3 of [RFC6449] discusses actions that mail operators 1. Section 4.3 of [RFC6449] discusses actions that mail operators
might take upon receiving a report (or multiple reports). might take upon receiving a report (or multiple reports).
skipping to change at page 11, line 36 skipping to change at page 11, line 37
Also, these reports may be forged as easily as ordinary Internet Also, these reports may be forged as easily as ordinary Internet
electronic mail. User agents and automatic mail handling facilities electronic mail. User agents and automatic mail handling facilities
(such as mail distribution list exploders) that wish to make (such as mail distribution list exploders) that wish to make
automatic use of reports of any kind should take appropriate automatic use of reports of any kind should take appropriate
precautions to minimize the potential damage from denial-of-service precautions to minimize the potential damage from denial-of-service
attacks. attacks.
Perhaps the simplest means of mitigating this threat is to assert Perhaps the simplest means of mitigating this threat is to assert
that these reports should themselves be signed with something like that these reports should themselves be signed with something like
DKIM or authorized by SPF. On the other hand, if there is a problem DKIM and/or authorized by something like SPF. Note, however, that if
with the DKIM infrastructure at the Verifier, signing DKIM failure there is a problem with the email infrastructure at either end, DKIM
reports may produce reports that aren't trusted or even accepted by and/or SPF may result in reports that aren't trusted or even accepted
their intended recipients. Similar issues could exist with SPF by their intended recipients, so it is important to make sure those
evaluation. Use of both technologies can mitigate this risk to a components are properly configured. Use of both technologies in
degree. tandem can resolve this concern to a degree since they generally have
disjoint failure modes.
8.3. Amplification Attacks 8.3. Amplification Attacks
Failure to comply with the recommendations regarding selection of the Failure to comply with the recommendations regarding selection of the
envelope sender can lead to amplification denial-of-service attacks. envelope sender can lead to amplification denial-of-service attacks.
This is discussed in Section 6 as well as in [RFC3464]. This is discussed in Section 6 as well as in [RFC3464].
8.4. Automatic Generation 8.4. Automatic Generation
ARF ([RFC5965]) reports have historically been generated individually ARF ([RFC5965]) reports have historically been generated individually
skipping to change at page 15, line 16 skipping to change at page 15, line 16
for Authorizing Use of Domains in E-Mail, Version 1", for Authorizing Use of Domains in E-Mail, Version 1",
RFC 4408, April 2006. RFC 4408, April 2006.
[RFC5617] Allman, E., Fenton, J., Delany, M., and J. Levine, [RFC5617] Allman, E., Fenton, J., Delany, M., and J. Levine,
"DomainKeys Identified Mail (DKIM) Author Domain Signing "DomainKeys Identified Mail (DKIM) Author Domain Signing
Practices (ADSP)", RFC 5617, August 2009. Practices (ADSP)", RFC 5617, August 2009.
[RFC6376] Crocker, D., Hansen, T., and M. Kucherawy, "DomainKeys [RFC6376] Crocker, D., Hansen, T., and M. Kucherawy, "DomainKeys
Identified Mail (DKIM) Signatures", RFC 6376, Identified Mail (DKIM) Signatures", RFC 6376,
September 2011. September 2011.
[RFC6430] Li, K. and B. Leiba, "Email Feedback Report Type Value:
not-spam", RFC 6430, November 2011.
[RFC6449] Falk, J., "Complaint Feedback Loop Operational [RFC6449] Falk, J., "Complaint Feedback Loop Operational
Recommendations", RFC 6449, November 2011. Recommendations", RFC 6449, November 2011.
[RFC6590] Falk, J. and M. Kucherawy, "Redaction of Potentially [RFC6590] Falk, J. and M. Kucherawy, "Redaction of Potentially
Sensitive Data from Mail Abuse Reports", RFC 6590, Sensitive Data from Mail Abuse Reports", RFC 6590,
April 2012. April 2012.
Authors' Addresses Authors' Addresses
 End of changes. 6 change blocks. 
20 lines changed or deleted 26 lines changed or added

This html diff was produced by rfcdiff 1.33. The latest version is available from http://tools.ietf.org/tools/rfcdiff/