diff options
Diffstat (limited to 'doc/rfc/rfc6650.txt')
-rw-r--r-- | doc/rfc/rfc6650.txt | 843 |
1 files changed, 843 insertions, 0 deletions
diff --git a/doc/rfc/rfc6650.txt b/doc/rfc/rfc6650.txt new file mode 100644 index 0000000..9d9f2dc --- /dev/null +++ b/doc/rfc/rfc6650.txt @@ -0,0 +1,843 @@ + + + + + + +Internet Engineering Task Force (IETF) J. Falk +Request for Comments: 6650 Return Path +Updates: 5965 M. Kucherawy, Ed. +Category: Standards Track Cloudmark +ISSN: 2070-1721 June 2012 + + + Creation and Use of Email Feedback Reports: + An Applicability Statement for the Abuse Reporting Format (ARF) + +Abstract + + RFC 5965 defines an extensible, machine-readable format intended for + mail operators to report feedback about received email to other + parties. This applicability statement describes common methods for + utilizing this format for reporting both abuse and authentication + failure events. Mailbox Providers of any size, mail-sending + entities, and end users can use these methods as a basis to create + procedures that best suit them. Some related optional mechanisms are + also discussed. + +Status of This Memo + + This is an Internet Standards Track document. + + This document is a product of the Internet Engineering Task Force + (IETF). It represents the consensus of the IETF community. It has + received public review and has been approved for publication by the + Internet Engineering Steering Group (IESG). Further information on + Internet Standards is available in Section 2 of RFC 5741. + + Information about the current status of this document, any errata, + and how to provide feedback on it may be obtained at + http://www.rfc-editor.org/info/rfc6650. + + + + + + + + + + + + + + + + + +Falk & Kucherawy Standards Track [Page 1] + +RFC 6650 ARF AS June 2012 + + +Copyright Notice + + Copyright (c) 2012 IETF Trust and the persons identified as the + document authors. All rights reserved. + + This document is subject to BCP 78 and the IETF Trust's Legal + Provisions Relating to IETF Documents + (http://trustee.ietf.org/license-info) in effect on the date of + publication of this document. Please review these documents + carefully, as they describe your rights and restrictions with respect + to this document. Code Components extracted from this document must + include Simplified BSD License text as described in Section 4.e of + the Trust Legal Provisions and are provided without warranty as + described in the Simplified BSD License. + +Table of Contents + + 1. Introduction ....................................................3 + 2. Definitions .....................................................4 + 3. Solicited and Unsolicited Reports ...............................4 + 4. Generating and Handling Solicited Abuse Reports .................4 + 4.1. General Considerations for Feedback Providers ..............4 + 4.2. Where to Send Reports ......................................5 + 4.3. What to Put in Reports .....................................5 + 4.4. General Considerations for Feedback Consumers ..............5 + 4.5. What to Expect .............................................6 + 4.6. What to Do with Reports ....................................6 + 5. Generating and Handling Unsolicited Abuse Reports ...............6 + 5.1. General Considerations .....................................6 + 5.2. When to Generate Reports ...................................7 + 5.3. Where to Send Reports ......................................7 + 5.4. What to Put in Reports .....................................8 + 5.5. What to Do with Reports ....................................9 + 6. Generating Automatic Authentication Failure Reports ............10 + 7. Security Considerations ........................................11 + 7.1. Security Considerations in Other Documents ................11 + 7.2. Forgeries .................................................11 + 7.3. Amplification Attacks .....................................11 + 7.4. Automatic Generation ......................................11 + 7.5. Reporting Multiple Incidents ..............................12 + 8. Acknowledgements ...............................................13 + 9. References .....................................................13 + 9.1. Normative References ......................................13 + 9.2. Informative References ....................................14 + + + + + + + +Falk & Kucherawy Standards Track [Page 2] + +RFC 6650 ARF AS June 2012 + + +1. Introduction + + The Abuse Reporting Format (ARF) was initially developed for two very + specific use cases. Initially, it was intended to be used for + reporting feedback between large email operators, or from large email + operators to end user network access operators, any of whom could be + presumed to have automated abuse-handling systems. Secondarily, it + is used by those same large mail operators to send those same reports + to other entities, including those involved in sending bulk email for + commercial purposes. In either case, the reports would be triggered + by direct end user action such as clicking on a "report spam" button + in their email client. + + Though other uses for ARF as defined in [RFC5965] have been discussed + (and may be documented similarly in the future), abuse reporting + remains the primary application, with a small amount of adoption of + extensions that enable authentication failure reporting. + + This applicability statement provides direction for using ARF in both + contexts. It also includes some statements about the use of ARF in + conjunction with other email technologies. + + The purpose for reporting abusive messages is to stop recurrences. + The methods described in this document focus on automating abuse + reporting as much as practical, so as to minimize the work of a + site's abuse team. There are further reasons why abuse feedback + generation is worthwhile, such as instruction of mail filters or + reputation trackers, or initiation of investigations of particularly + egregious abuses. These other applications are not discussed in + this memo. + + Further introduction to this topic may be found in [RFC6449], which + has more information about the general topic of abuse reporting. + Many of the specific ARF guidelines in this document were taken from + the principles presented in [RFC6449]. + + At the time of publication of this document, five feedback types are + registered. This document only discusses two of them ("abuse" + [RFC5965] and "auth-failure" [RFC6591]), as they are seeing + sufficient use in practice that applicability statements can be made + about them. The others, i.e., "fraud" [RFC5965], "other" [RFC5965], + and "not-spam" [RFC6430], are either too new or too seldom used to be + included here. + + + + + + + + +Falk & Kucherawy Standards Track [Page 3] + +RFC 6650 ARF AS June 2012 + + +2. Definitions + + The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", + "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this + document are to be interpreted as described in [RFC2119] and are + intended to replace the Requirement Levels described in Section 3.3 + of [RFC2026]. + + Some of the terminology used in this document is taken from + [RFC5598]. + + "Mailbox Provider" refers to an organization that accepts, stores, + and offers access to [RFC5322] messages ("email messages") for end + users. Such an organization has typically implemented SMTP [RFC5321] + and might provide access to messages through IMAP [RFC3501], the Post + Office Protocol (POP) [RFC1939], a proprietary interface designed for + HTTP [RFC2616], or a proprietary protocol. + +3. Solicited and Unsolicited Reports + + The original, and still by far the most common, application of + [RFC5965] is when two mail systems make a private agreement to + exchange abuse reports -- usually reports due to recipients manually + reporting messages as spam. We refer to these as solicited reports. + + Other uses for ARF involve such reports sent between parties that + don't know each other. These unsolicited reports are sent without + prior arrangement between the parties as to the context and meaning + of the reports. Therefore, the constraints on how these unsolicited + reports need to be structured such that they are likely to be useful + to the recipient -- e.g., to what address(es) they can usefully be + sent, what issues they can be used to report, and how they can be + handled by the receiver of the report -- are very different. + + The two cases are covered separately in the sections that follow. + +4. Generating and Handling Solicited Abuse Reports + +4.1. General Considerations for Feedback Providers + + A Mailbox Provider receives reports of abusive or unwanted mail from + its users, most often by providing a "report spam" button (or similar + nomenclature) in the MUA (Mail User Agent). The method of + transferring this message and any associated metadata from the MUA to + the Mailbox Provider's ARF processing system is not defined by any + standards document but is discussed further in Section 3.2 of + [RFC6449]. Policy concerns related to the collection of this data + are discussed in Section 3.4 of [RFC6449]. + + + +Falk & Kucherawy Standards Track [Page 4] + +RFC 6650 ARF AS June 2012 + + + To implement the recommendations of this memo, the reports are + formatted per [RFC5965] and transmitted as an email message + [RFC5322], typically using SMTP [RFC5321]. + + Ongoing maintenance of an ARF processing system is discussed in + Section 3.6 of [RFC6449]. + +4.2. Where to Send Reports + + The Mailbox Provider SHOULD NOT send reports to addresses that have + not explicitly requested them. A valid deviation might be the result + of local policy instructions. The process whereby such parties may + request the reports is discussed in Section 3.5 of [RFC6449]. + +4.3. What to Put in Reports + + The reports SHOULD use "Feedback-Type: abuse" for the report type. + Although a Mailbox Provider generating the reports can use other + types appropriate to the nature of the abuse being reported, the + operator receiving the reports might not treat different feedback + types differently. + + The following fields are optional in [RFC5965] but SHOULD be used in + this context when their corresponding values are available: + Original-Mail-From, Arrival-Date, Source-IP, and Original-Rcpt-To. + Other optional fields can be included as deemed appropriate by the + implementer. + + User-identifiable data MAY be obscured as described in [RFC6590]. + +4.4. General Considerations for Feedback Consumers + + ARF report streams are established proactively between Feedback + Providers and Feedback Consumers. Recommendations for preparing to + request feedback are discussed in Section 4.1 of [RFC6449]. + + Operators MUST be able to accept ARF [RFC5965] reports as email + messages [RFC5322] over SMTP [RFC5321]. These messages, and other + types of email messages that can be received, are discussed in + Section 4.2 of [RFC6449]. + + Recipients of feedback reports that are part of formal feedback + arrangements have to be capable of handling large volumes of reports. + This could require automation of report processing as discussed in + Section 4.4 of [RFC6449]. + + + + + + +Falk & Kucherawy Standards Track [Page 5] + +RFC 6650 ARF AS June 2012 + + +4.5. What to Expect + + The list of valid Feedback-Types is defined in [RFC5965], which + created an IANA registry for valid values to allow for extensions. + However, to allow for handling of new types that are not yet + supported, an automated report processing system MUST NOT reject (in + the SMTP sense) a report based solely on an unknown Feedback-Type. + The automated system can simply set reports of unknown types aside + for manual handling. However, Mailbox Providers might only make use + of the "abuse" Feedback-Type. Therefore, report receivers might be + required to do additional analysis to separate different types of + abuse reports after receipt if they do not have prior specific + knowledge of the sender of the report. + + Report receivers MUST accept reports that have obscured their user- + identifiable data as described in [RFC6590]. That document also + discusses the handling of such reports. This technique is also + discussed in Section 4.4 of [RFC6449]. + +4.6. What to Do with Reports + + Section 4.3 of [RFC6449] discusses actions that mail operators might + take upon receiving a report (or multiple reports). + +5. Generating and Handling Unsolicited Abuse Reports + +5.1. General Considerations + + It is essential for report recipients to be capable of throttling + reports being sent to avoid damage to their own installations. + Therefore, Feedback Providers MUST provide a way for report + recipients to request that no further reports be sent. + Unfortunately, no standardized mechanism for such requests exists to + date, and all existing mechanisms for meeting this requirement are + out-of-band. + + Message authentication is generally a good idea, but it is especially + important to encourage credibility of, and thus response to, + unsolicited reports. Therefore, as with any other message, Feedback + Providers sending unsolicited reports SHOULD send reports that they + expect will pass the Sender Policy Framework (SPF) [RFC4408] and/or + DomainKeys Identified Mail (DKIM) [RFC6376] checks. + + + + + + + + + +Falk & Kucherawy Standards Track [Page 6] + +RFC 6650 ARF AS June 2012 + + +5.2. When to Generate Reports + + Handling of unsolicited reports has a significant cost to the report + receiver. Senders of unsolicited reports, especially those sending + large volumes of them automatically, SHOULD NOT send reports that + cannot be used as a basis for action by the recipient, whether this + is due to the report being sent about an incident that is not abuse- + related, the report being sent to an email address that won't result + in action, or the content or format of the report being hard for the + recipient to read or use. + + Feedback Providers SHOULD NOT report all mail sent from a particular + sender merely because some of it is determined to be abusive. + + Mechanical reports of mail that "looks like" spam, based solely on + the results of inline content analysis tools, SHOULD NOT be sent + since, because of their subjective nature, they are unlikely to + provide a basis for the recipient to take action. Complaints + generated by end users about mail that is determined by them to be + abusive, or mail delivered to "spam trap" or "honeypot" addresses, + are far more likely to be accurate and MAY be sent. + + If a Feedback Provider applies SPF [RFC4408] to arriving messages, a + report SHOULD NOT be generated to the RFC5321.MailFrom domain if the + SPF evaluation produced a "Fail", "SoftFail", "TempError", or + "PermError" report, as no reliable assertion or assumption can be + made that use of the domain was authorized. A valid exception would + be specific knowledge that the SPF result is not definitive for that + domain under those circumstances (for example, a message that is also + signed using DKIM [RFC6376] by the same domain, and that signature + validates). + +5.3. Where to Send Reports + + Rather than generating feedback reports themselves, MUAs SHOULD + create abuse reports and send these reports back to their Mailbox + Providers so that they can generate and send ARF messages on behalf + of end users (see Section 3.2 of [RFC6449]). This allows centralized + processing and tracking of reports, and provides training input to + filtering systems. There is, however, no standard mechanism for this + signaling between MUAs and Mailbox Providers to trigger abuse + reports. + + Feedback Providers SHOULD NOT send reports to recipients that are + uninvolved or only peripherally involved. For example, they SHOULD + NOT send reports to the operator of every Autonomous System in the + path between the apparent originating system and the operator + + + + +Falk & Kucherawy Standards Track [Page 7] + +RFC 6650 ARF AS June 2012 + + + generating the report. Instead, they need to send reports to + recipients that are both responsible for the messages and able to do + something about them. + + Deciding where to send an unsolicited report will typically rely on + heuristics. Abuse addresses in WHOIS [RFC3912] records of the IP + address relaying the subject message and/or of the domain name found + in the results of a PTR ("reverse lookup") query on that address are + likely reasonable candidates, as is the abuse@domain role address + (see [RFC2142]) of related domains. Unsolicited reports SHOULD NOT + be sent to email addresses that are not clearly intended to handle + abuse reports. Legitimate candidates include those found in WHOIS + records or on a web site that either are explicitly described as an + abuse contact or are of the form "abuse@domain". + + Where an abusive message is authenticated using a domain-level + authentication technology such as DKIM [RFC6376] or SPF [RFC4408], + the domain that has been verified by the authentication mechanism is + often a reasonable candidate for receiving feedback about the + message. For DKIM, though, while the authenticated domain has some + responsibility for the mail sent, it can be a poor contact point for + abuse issues (for example, it could represent the message's author + but not its sender, it could identify the bad actor responsible for + the message, or it could refer to a domain that cannot receive mail + at all). + + Often, unsolicited reports will have no meaning if sent to abuse + reporting addresses belonging to the abusive parties themselves. In + fact, it is possible that such reports might reveal information about + complainants. Reports SHOULD NOT be sent to such addresses if they + can be identified beforehand, except where the abusive party is known + to be responsive to such reports. + +5.4. What to Put in Reports + + Reports SHOULD use "Feedback-Type: abuse" but can use other types as + appropriate. However, the Mailbox Provider generating the reports + cannot assume that the operator receiving the reports will treat + different Feedback-Types differently. + + Reports SHOULD include the following optional fields whenever their + corresponding values are available and applicable to the report: + Original-Mail-From, Arrival-Date, Source-IP, and Original-Rcpt-To. + Other optional fields can be included as deemed appropriate by the + implementer. + + + + + + +Falk & Kucherawy Standards Track [Page 8] + +RFC 6650 ARF AS June 2012 + + + Experience suggests that the use of ARF is advisable in most + contexts. Automated recipient systems can handle abuse reports sent + in ARF at least as well as any other format such as plain text, with + or without a copy of the message attached. That holds even for + systems that did not request ARF reports, assuming such reports are + generated considering the possibility of recipients that don't use + automated ARF parsing. Anyone sending unsolicited reports in ARF can + legitimately presume that some recipients will only be able to access + the human-readable (first, text/plain) part of it and SHOULD include + all information needed also in this part. Further, they SHOULD + ensure that the report is readable when viewed as plain text, to give + low-end ticketing systems as much assistance as possible. In extreme + cases, failure to take these steps may result in the report being + discarded or ignored. + +5.5. What to Do with Reports + + Receivers of unsolicited reports can take advantage of the + standardized parts of ARF to automate processing. Independent of the + sender of the report, they can improve processing by separating valid + reports from invalid reports by, for example, looking for references + to IP address ranges, domains, and mailboxes for which the recipient + organization is responsible in the copy of the reported message, and + by correlating multiple reports of similar messages to identify bulk + email senders. + + Per Section 4.4 of [RFC6449], a network service provider MAY use ARF + data for automated forwarding of feedback messages to the originating + customer. + + Published abuse mailbox addresses SHOULD NOT reject non-ARF messages + based solely on the format, as generation of ARF messages can + occasionally be unavailable or not applicable. Deviation from this + requirement could be done due to local policy decisions regarding + other message criteria. + + Although [RFC6449] suggests that replying to feedback is not useful, + in the case of receipt of ARF reports where no feedback arrangement + has been established, a non-automated reply might be desirable to + indicate what action resulted from the complaint, heading off more + severe filtering by the Feedback Provider. In addition, using an + address that cannot receive replies precludes any requests for + additional information and increases the likelihood that further + reports will be discarded or blocked. Thus, a Feedback Provider + sending unsolicited reports SHOULD NOT generate reports for which a + reply cannot be received. Where an unsolicited report results in the + establishment of contact with a responsible and responsive party, + this data can be saved for future complaint handling and possible + + + +Falk & Kucherawy Standards Track [Page 9] + +RFC 6650 ARF AS June 2012 + + + establishment of a formal (solicited) feedback arrangement. See + Section 3.5 of [RFC6449] for a discussion of establishment of + feedback arrangements. + +6. Generating Automatic Authentication Failure Reports + + There are some cases where report generation is caused by automation + rather than user requests. A specific example of this is reporting, + using ARF (or extensions to it), of messages that fail particular + message authentication checks. Examples of this include [RFC6651] + and [RFC6652]. The considerations presented below apply in those + cases. + + The applicability statement for this use case is somewhat smaller, as + many of the issues associated with abuse reports are not relevant to + reports about authentication failures. + + Automatic feedback generators MUST select actual message recipients + based on data provided by willing report receivers. In particular, + recipients MUST NOT be selected using heuristics. + + If the message under evaluation by the Verifier is an ARF [RFC5965] + message, a report MUST NOT be automatically generated. + + The message for a new report sent via SMTP MUST be constructed so as + to avoid amplification attacks, deliberate or otherwise. The + envelope sender address of the report MUST be chosen so that these + reports will not generate mail loops. Similar to Section 2 of + [RFC3464], the envelope sender address of the report MUST be chosen + to ensure that no feedback reports will be issued in response to the + report itself. Therefore, when an SMTP transaction is used to send a + report, the MAIL FROM command SHOULD use the NULL reverse-path, i.e., + "MAIL FROM:<>". An exception to this would be the use of a reverse- + path selected such that SPF checks on the report will pass; in such + cases, the operator will need to make provisions to avoid the + amplification attack or mail loop via other means. + + Reports SHOULD use "Feedback-Type: auth-failure" but MAY use other + types as appropriate. However, the Mailbox Provider generating the + reports cannot assume that the operator receiving the reports will + treat different Feedback-Types differently. + + These reports SHOULD include the following fields, although they are + optional in [RFC5965], whenever their corresponding values are + available: Original-Mail-From, Arrival-Date, Source-IP, and + Original-Rcpt-To. Other optional fields can be included as deemed + appropriate by the implementer. + + + + +Falk & Kucherawy Standards Track [Page 10] + +RFC 6650 ARF AS June 2012 + + +7. Security Considerations + +7.1. Security Considerations in Other Documents + + Implementers are strongly urged to review, at a minimum, the Security + Considerations sections of [RFC5965] and [RFC6449]. + +7.2. Forgeries + + Feedback Providers that relay user complaints directly, rather than + by reference to a stored message (e.g., IMAP or POP), could be duped + into sending a complaint about a message that the complaining user + never actually received, as an attack on the purported originator of + the falsified message. Feedback Providers need to be resilient to + such attack methods. + + Also, these reports may be forged as easily as ordinary Internet + electronic mail. User agents and automatic mail handling facilities + (such as mail distribution list exploders) that wish to make + automatic use of reports of any kind should take appropriate + precautions to minimize the potential damage from denial-of-service + attacks. + + Perhaps the simplest means of mitigating this threat is to assert + that these reports should themselves be signed with something like + DKIM and/or authorized by something like SPF. Note, however, that if + there is a problem with the email infrastructure at either end, DKIM + and/or SPF may result in reports that aren't trusted or even accepted + by their intended recipients, so it is important to make sure those + components are properly configured. The use of both technologies in + tandem can resolve this concern to a degree, since they generally + have disjoint failure modes. + +7.3. Amplification Attacks + + Failure to comply with the recommendations regarding selection of the + envelope sender can lead to amplification denial-of-service attacks. + This is discussed in Section 6 as well as in [RFC3464]. + +7.4. Automatic Generation + + ARF [RFC5965] reports have historically been generated individually + as a result of some kind of human request, such as someone clicking a + "Report Abuse" button in a mail reader. In contrast, the mechanisms + described in some extension documents (i.e., [RFC6651] and [RFC6652]) + are focused around automated reporting. This obviously implies the + + + + + +Falk & Kucherawy Standards Track [Page 11] + +RFC 6650 ARF AS June 2012 + + + potential for much larger volumes or higher frequency of messages, + and thus greater mail system load (both for Feedback Providers and + report receivers). + + Those mechanisms are primarily intended for use in generating reports + to aid implementers of DKIM [RFC6376], Author Domain Signing + Practices (ADSP) [RFC5617], and SPF [RFC4408], and other related + protocols during development and debugging. They are not generally + intended for prolonged forensic use, specifically because of these + load concerns. However, extended use is possible by ADministrative + Management Domains (ADMDs) that want to keep a close watch for fraud + or infrastructure problems. It is important to consider the impact + of doing so on both Feedback Providers and the requesting ADMDs. + + A sender requesting these reports can cause its mail servers to be + overwhelmed if it sends out signed messages whose signatures fail to + verify for some reason, provoking a large number of reports from + Feedback Providers. Similarly, a Feedback Provider could be + overwhelmed by a large volume of messages requesting reports whose + signatures fail to validate, as the Feedback Provider now needs to + send reports back to the Signer. + + Limiting the rate of generation of these messages may be appropriate + but threatens to inhibit the distribution of important and possibly + time-sensitive information. + + In general ARF feedback loop terms, it is often suggested that + Feedback Providers only create these (or any) ARF reports after an + out-of-band arrangement has been made between two parties. These + extension mechanisms provide ways to adjust parameters of an + authorized abuse report feedback loop that is configured and + activated by private agreement. The alternative (sending reports + automatically based solely on data found in the messages) may have + unintended consequences. + +7.5. Reporting Multiple Incidents + + If it is known that a particular host generates abuse reports upon + certain incidents, an attacker could forge a high volume of messages + that will trigger such a report. The recipient of the report could + then be inundated with reports. This could easily be extended to a + distributed denial-of-service attack by finding a number of report- + generating servers. + + The incident count referenced in ARF [RFC5965] provides a limited + form of mitigation. The host that generates reports can elect to + send reports only periodically, with each report representing a + number of identical or nearly identical incidents. One might even do + + + +Falk & Kucherawy Standards Track [Page 12] + +RFC 6650 ARF AS June 2012 + + + something inverse-exponentially, sending reports for each of the + first ten incidents, then every tenth incident up to 100, then every + 100th incident up to 1000, etc., until some period of relative quiet + after which the limitation resets. + + The use of this technique for "nearly identical" incidents in + particular causes a degradation in reporting quality, however. If + for example a large number of pieces of spam arrive from one + attacker, a reporting agent could decide only to send a report about + a fraction of those messages. While this averts a flood of reports + to a system administrator, the precise details of each incident are + similarly not sent. + + Other rate-limiting provisions might be considered, such as detecting + a temporary failure response from the report destination and thus + halting report generation to that destination for some period, or + simply imposing or negotiating a hard limit on the number of reports + to be sent to a particular receiver in a given time frame. + +8. Acknowledgements + + The author and editor wish to thank Steve Atkins, John Levine, Shmuel + Metz, S. Moonesamy, and Alessandro Vesely for their contributions to + this memo. + + All of the best practices referenced by this document are found in + [RFC6449], written within the Collaboration Committee of the + Messaging Anti-Abuse Working Group (MAAWG). + + Finally, the original author wishes to thank the doctors and staff + at the University of Texas MD Anderson Cancer Center for doing what + they do. + +9. References + +9.1. Normative References + + [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate + Requirement Levels", BCP 14, RFC 2119, March 1997. + + [RFC5321] Klensin, J., "Simple Mail Transfer Protocol", RFC 5321, + October 2008. + + [RFC5322] Resnick, P., Ed., "Internet Message Format", RFC 5322, + October 2008. + + [RFC5598] Crocker, D., "Internet Mail Architecture", RFC 5598, + July 2009. + + + +Falk & Kucherawy Standards Track [Page 13] + +RFC 6650 ARF AS June 2012 + + + [RFC5965] Shafranovich, Y., Levine, J., and M. Kucherawy, "An + Extensible Format for Email Feedback Reports", RFC 5965, + August 2010. + + [RFC6591] Fontana, H., "Authentication Failure Reporting Using the + Abuse Reporting Format", RFC 6591, April 2012. + +9.2. Informative References + + [RFC1939] Myers, J. and M. Rose, "Post Office Protocol - Version 3", + STD 53, RFC 1939, May 1996. + + [RFC2026] Bradner, S., "The Internet Standards Process -- + Revision 3", BCP 9, RFC 2026, October 1996. + + [RFC2142] Crocker, D., "Mailbox Names for Common Services, Roles and + Functions", RFC 2142, May 1997. + + [RFC2616] Fielding, R., Gettys, J., Mogul, J., Frystyk, H., + Masinter, L., Leach, P., and T. Berners-Lee, "Hypertext + Transfer Protocol -- HTTP/1.1", RFC 2616, June 1999. + + [RFC3464] Moore, K. and G. Vaudreuil, "An Extensible Message Format + for Delivery Status Notifications", RFC 3464, + January 2003. + + [RFC3501] Crispin, M., "INTERNET MESSAGE ACCESS PROTOCOL - + VERSION 4rev1", RFC 3501, March 2003. + + [RFC3912] Daigle, L., "WHOIS Protocol Specification", RFC 3912, + September 2004. + + [RFC4408] Wong, M. and W. Schlitt, "Sender Policy Framework (SPF) + for Authorizing Use of Domains in E-Mail, Version 1", + RFC 4408, April 2006. + + [RFC5617] Allman, E., Fenton, J., Delany, M., and J. Levine, + "DomainKeys Identified Mail (DKIM) Author Domain Signing + Practices (ADSP)", RFC 5617, August 2009. + + [RFC6376] Crocker, D., Ed., Hansen, T., Ed., and M. Kucherawy, Ed., + "DomainKeys Identified Mail (DKIM) Signatures", RFC 6376, + September 2011. + + [RFC6430] Li, K. and B. Leiba, "Email Feedback Report Type Value: + not-spam", RFC 6430, November 2011. + + + + + +Falk & Kucherawy Standards Track [Page 14] + +RFC 6650 ARF AS June 2012 + + + [RFC6449] Falk, J., Ed., "Complaint Feedback Loop Operational + Recommendations", RFC 6449, November 2011. + + [RFC6590] Falk, J., Ed., and M. Kucherawy, Ed., "Redaction of + Potentially Sensitive Data from Mail Abuse Reports", + RFC 6590, April 2012. + + [RFC6651] Kucherawy, M., "Extensions to DomainKeys Identified Mail + (DKIM) for Failure Reporting", RFC 6651, June 2012. + + [RFC6652] Kitterman, S., "Sender Policy Framework (SPF) + Authentication Failure Reporting Using the Abuse Reporting + Format", RFC 6652, June 2012. + +Authors' Addresses + + J.D. Falk + Return Path + 100 Mathilda Place, Suite 100 + Sunnyvale, CA 94086 + USA + + URI: http://www.returnpath.net/ + + + Murray S. Kucherawy (editor) + Cloudmark + 128 King St., 2nd Floor + San Francisco, CA 94107 + US + + EMail: superuser@gmail.com + + + + + + + + + + + + + + + + + + + +Falk & Kucherawy Standards Track [Page 15] + |