Mail Abuse Working Group | J.D. Falk |
Internet-Draft | Return Path |
Updates: 5965 (if approved) | May 15, 2011 |
Intended status: Standards Track | |
Expires: November 16, 2011 |
Creation and Use of Email Feedback Reports: An Applicability Statement for the Abuse Reporting Format (ARF)
draft-jdfalk-marf-as-00
RFC 5965 defines an extensible, machine-readable format intended for mail operators to report feedback about received email to other parties. This document describes how this format is utilized for reporting at scale between large mailbox providers, and from large mailbox providers to other sending entities.
[RFC Editor: please remove this section prior to publication.]
This document is part of the experiment to reintroduce Applicability Statements, as defined in section 3.2 of [RFC2026], to the Applications Area.
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."
This Internet-Draft will expire on November 16, 2011.
Copyright (c) 2011 IETF Trust and the persons identified as the document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.
The Abuse Reporting Format (ARF) was initially developed for two very specific use cases. First and foremost, it was intended to be used for reporting feedback between large email operators or from large email operators to end user network access operators, who could be presumed to have automated abuse-handling systems. Secondarily, it is used by those same large mail operators to send those same reports to other entities, including those involved in sending bulk email for commercial purposes. In both cases, the reports would be triggered by an end user action such as clicking on a "report spam" button in their email client.
Though other uses for the format defined in [RFC5965] have been developed (and may be documented similarly in the future), those were (and remain) the primary applications.
Further introduction to this topic may be found in [I-D.jdfalk-maawg-cfblbcp].
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119], and are intended to replace the Requirement Levels described in section 3.3 of [RFC2026].
Some of the terminology used in this document is taken from [RFC5598].
"Mailbox Provider" refers to an organization that accepts, stores, and offers access to [RFC5322] messages ("email messages") for end users. Such an organization MUST have implemented SMTP ([RFC5321]), and MAY provide access to messages through IMAP ([RFC3501]), POP ([RFC1939]), a proprietary interface designed for HTTP ([RFC2616]), or a proprietary protocol.
[RFC Editor: please remove this section prior to publication.]
This document is being discussed within the IETF MARF Working Group, on the marf@ietf.org mailing list.
This document is a product of the IETF MARF Working Group, chaired by Barry Leiba and Murray Kucherawy. The idea to present it in the form of an Applicability Statement originated (I believe) with Pete Resnick.
All of the Best Practices referenced by this document are found in [I-D.jdfalk-maawg-cfblbcp], written within the Collaboration Committee of the Messaging Anti-Abuse Working Group (MAAWG), which is described further in [I-D.jdfalk-maawg-cfblbcp].
Finally, I must thank the doctors and staff at the University of Texas MD Anderson Cancer Center for reasons which need not be explored here.
[RFC Editor: please remove this section prior to publication.]
This document has no IANA actions.
Implementers are urged to review, at a minimum, the Security Considerations sections of [RFC5965] and [I-D.jdfalk-maawg-cfblbcp].
[RFC2119] | Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997. |
[RFC5321] | Klensin, J., "Simple Mail Transfer Protocol", RFC 5321, October 2008. |
[RFC5322] | Resnick, P., "Internet Message Format", RFC 5322, October 2008. |
[RFC5965] | Shafranovich, Y., Levine, J. and M. Kucherawy, "An Extensible Format for Email Feedback Reports", RFC 5965, August 2010. |
[RFC5598] | Crocker, D., "Internet Mail Architecture", RFC 5598, July 2009. |
[RFC1939] | Myers, J.G. and M.T. Rose, "Post Office Protocol - Version 3", STD 53, RFC 1939, May 1996. |
[RFC2026] | Bradner, S., "The Internet Standards Process -- Revision 3", BCP 9, RFC 2026, October 1996. |
[RFC2505] | Lindberg, G., "Anti-Spam Recommendations for SMTP MTAs", BCP 30, RFC 2505, February 1999. |
[RFC2616] | Fielding, R., Gettys, J., Mogul, J., Frystyk, H., Masinter, L., Leach, P. and T. Berners-Lee, "Hypertext Transfer Protocol -- HTTP/1.1", RFC 2616, June 1999. |
[RFC3501] | Crispin, M., "INTERNET MESSAGE ACCESS PROTOCOL - VERSION 4rev1", RFC 3501, March 2003. |
[I-D.jdfalk-maawg-cfblbcp] | Falk, J, "Complaint Feedback Loop Operational Recommendations", Internet-Draft draft-jdfalk-maawg-cfblbcp-03, October 2011. |