<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.3.21 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-benecke-cfbl-address-header-01" category="exp">

  <front>
    <title abbrev="CFBL Address Header">Complaint Feedback Loop Address Header</title>

    <author initials="J." surname="Benecke" fullname="Jan-Philipp Benecke">
      <organization>CleverReach GmbH &amp; Co. KG</organization>
      <address>
        <postal>
          <street>Schafjueckenweg 2</street>
          <city>Rastede</city>
          <code>26180</code>
          <country>Germany</country>
        </postal>
        <phone>+49 4402 97390-16</phone>
        <email>jpb@cleverreach.com</email>
      </address>
    </author>

    <date year="2021" month="July" day="01"/>

    <area>art</area>
    <workgroup>Network Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document describes a method to allow a mail sender to specify a complaint feedback loop address as an email header
and how a mail receiver can use it. This document also defines the rules for processing and forwarding such a complaint.
The motivation for this arises out of the absence of a standardized and automated way to provide a complaint feedback loop address to mailbox providers.
Currently, providing and maintaining such an address to a mailbox provider is a manual and time-consuming process.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction-and-motivation" title="Introduction and Motivation">
<t>For a long time there is a way to forward manual complaints back to e.g. a broadcast marketing list operator.
The mailbox provider provides a so-called feedback loop <xref target="RFC6449"/>. This feedback loop is being used to give e.g. operators of broadcast marketing lists 
feedback about resulting complaints from their marketing mailings. Those complaints are based on manual user interaction e.g. IMAP movement to "Junk".</t>

<t>As described in <xref target="RFC6449"/> the registration for such a feedback loop needs to be done manually by a human at any FBL provider he wants to receive complaints from.
Which can be quite time-consuming if there are new feedback loops rising up, or the mail sender wants to add new ip addresses or DKIM domains.
Besides, a manual process isn't well suitable and/or doable for smaller mailbox providers.</t>

<t>The change of such a complaint address e.g. due to an infrastructure change is another problem. 
Due to this manual process the mail sender needs to go through all providers again and delete his existing subscriptions and re-signup with the new complaint address.</t>

<t>This document addresses this problem with a new email header.
It extends the described complaint feedback loop recommendations in <xref target="RFC6449"/> with an automated way to provide the complaint feedback loop address to mail receiver.</t>

<t>Mail senders can add this header and willing mailbox provider can use this header to forward the generated report to the provided complaint address.
The mail sender just needs to add a email header and isn't required to signup manually at every feedback loop provider.
Another benefit would be the mailbox provider doesn't need to develop a manual registration process and verification process.</t>

<t>A new email header has been chosen over a new DNS record in favour to be able to easily distinguish between
multiple broadcast marketing list operators / mail senders, without the intervention of its users or administrators.
For example, if a company uses multiple sending systems, each system can set this header on their own, without the need of a change that has to be done by its users or administrators.
On the side of the mailbox provider, there is no need to do an additional DNS query to get the complaint address.</t>

<t>This document has been created with GDPR and other data-regulation laws in mind and to address the resulting problems 
in providing an automated complaint feedback loop address, as the email may contain personal data.</t>

<t>Summarised this document has following goals:</t>

<t><list style="symbols">
  <t>Allow mail senders to signal that there is a complaint address without a manual registration at all providers.</t>
  <t>Have a way for mailbox provider to get a complaint address without developing an own manual registration process.</t>
  <t>Be able to provide a complaint address to smaller mailbox providers who do not have a feedback loop registration process.</t>
  <t>Provide a GDPR compliant way for a complaint feedback loop</t>
</list></t>

</section>
<section anchor="definitions" title="Definitions">

<t>The keywords "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD",
"SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/>
when, and only when, they appear in all capitals, as shown here.</t>

<t>The keyword "FBL" in this document is the abbreviation for "feedback loop" and will hereafter be used.</t>

<t>The keyword "CFBL" in this document is the abbreviation for "complaint feedback loop" and will hereafter be used.</t>

<t>The keyword "MBP" in this document is the abbreviation for "mailbox provider" and will hereafter be used.</t>

</section>
<section anchor="requirements" title="Requirements">

<section anchor="complaining-about-an-email" title="Complaining about an email">
<t>The email (sent by mail sender/broadcast marketing list operator) about which a complaint should be sent MUST have at least a valid <xref target="DKIM"/> signature.
The aforementioned valid DKIM signature MUST cover at least the Complaint-FBL-Address header domain. 
It is RECOMMENDED that the DKIM signature aligns with the Complaint-FBL-Address header domain and the From header <xref target="MAIL"/> domain where possible.
The Complaint-FBL-Address header MUST be included in the "h=" tag of the aforementioned valid DKIM-Signature.</t>

<t>If the message isn't properly aligned, nor it does have the required header coverage by the "h=" tag of a valid DKIM-Signature, the MBP SHALL NOT send a report email.</t>

<t>This ensures that only reports are sent to the complaint address that are based on an authenticated email.</t>

</section>
<section anchor="report-email" title="Report email">
<t>The report email (sent by MBP to mail sender) MUST have a valid <xref target="DKIM"/> signature and MUST cover the From header <xref target="MAIL"/> domain.</t>

<t>If the message does not have the required valid <xref target="DKIM"/>, the mail sender SHALL NOT process this email.</t>

<t>It is highly RECOMMENDED that the mail sender does further plausibility checks.</t>

</section>
</section>
<section anchor="implementation" title="Implementation">

<section anchor="mail-senders" title="Mail senders">
<t>A mail sender that wishes to receive complaints about their mailings MUST place a Complaint-FBL-Address header in the message.
The mail sender MAY place a CFBL-Feedback-ID header in the message out of various reasons.</t>

<t>The receiving complaint FBL address, placed in the message, MUST accept by default <xref target="ARF"/> compatible reports.</t>

<t>The mail sender can OPTIONAL request, as described in <xref target="xarf-report"></xref>, a <xref target="XARF"/> compatible report.
The MBP MAY send a <xref target="XARF"/> compatible report, if it is technical possible, otherwise a <xref target="ARF"/> compatible reports will be sent.</t>

<t>It is highly RECOMMENDED processing these reports automatically. Each mail sender MUST decide on their own which measure they take after receiving a report.</t>

<t>The mail sender MUST take action to address the described requirements in <xref target="requirements"></xref>.</t>

</section>
<section anchor="mailbox-provider" title="Mailbox provider">
<t>An MBP MAY process the complaint and forward it to the complaint FBL address.</t>

<t>If the MBP wants to process the complaints and forwards it, he MUST query the Complaint-FBL-Address header.</t>

<t>By default, an <xref target="ARF"/> compatible report MUST be sent when a manual action has been taken e.g., when a receiver marks a mail as spam, 
by clicking the "This is spam"-button in any web portal or by moving a mail to junk folder, this includes also <xref target="IMAP"/> and <xref target="POP3"/> movements.
The MBP SHALL NOT send any report when an automatic decisions has been made, e.g. spam filtering.</t>

<t>The MBP SHOULD send a <xref target="XARF"/> compatible report, if the mail sender requests it as described in <xref target="xarf-report"></xref>.
If this is not possible a <xref target="ARF"/> compatible report MUST be sent.</t>

<t>The MBP MUST validate and take action to address the described requirements in <xref target="requirements"></xref>.</t>

</section>
</section>
<section anchor="complaint-report" title="Complaint report">
<t>The complaint report (sent by MBP to mail sender) MUST be an <xref target="ARF"/> report by default.
The complaint report MAY be an <xref target="XARF"/> report, if the mail sender requests it, and the MBP can send it.</t>

<t>The report MUST contain at least the Message-ID <xref target="MAIL"/>. If present, the header "CFBL-Feedback-ID" of the complaining email MUST be added additionally.</t>

<t>The MBP MAY omit all further headers and/or body to comply with any data-regulation laws.</t>

<t>It is highly RECOMMENDED that, if used, the CFBL-Feedback-ID includes a hard to forge component such as an <xref target="HMAC"/> using a secret
key, instead of a plain-text string.</t>

<section anchor="xarf-report" title="XARF compatible report">
<t>A mail sender that wishes to receive a <xref target="XARF"/> compatible report, MUST append "report=xarf" to the <xref target="cfbl-address-header">Complaint-FBL-Address header</xref>.
The resulting header would be the following:</t>

<figure><artwork><![CDATA[
Complaint-FBL-Address: fbl@example.com; report=xarf
]]></artwork></figure>

</section>
</section>
<section anchor="header-syntax" title="Header Syntax">

<section anchor="cfbl-address-header" title="Complaint-FBL-Address">
<t>The following ABNF imports fields, WSP, CRLF and addr-spec from <xref target="MAIL"/>.</t>

<figure><artwork type="abnf"><![CDATA[
fields /= cfbl-address

cfbl-address = "Complaint-FBL-Address:" 0*1WSP addr-spec 
               [";" 0*1WSP report-format] CRLF

report-format = "report=" ("arf" / "xarf")
]]></artwork></figure>

</section>
<section anchor="cfbl-feedback-id" title="CFBL-Feedback-ID">
<t>The following ABNF imports fields, WSP, CRLF and atext from <xref target="MAIL"/>.</t>

<figure><artwork type="abnf"><![CDATA[
fields /= cfbl-feedback-id

cfbl-feedback-id = "CFBL-Feedback-ID:" 0*1WSP fid CRLF

fid = 1*(atext / ":")
]]></artwork></figure>

</section>
</section>
<section anchor="security-considerations" title="Security Considerations">
<t>This section discusses possible security issues, and their possible solutions, of a complaint FBL address header.</t>

<section anchor="attacks-on-the-fbl-address" title="Attacks on the FBL address">
<t>As any other email address, a complaint FBL addresses can be an attack vector for malicious emails. 
The complaint FBL addresses can be for example flooded with spam. 
This is an existing problem with any existing email address and isn't newly created by this document.</t>

<t>The broadcast marketing lists operator/mail sender must take appropriated measures.
One possible countermeasure would be a rate limit on the delivering IP.
However, this should be done with caution, the normal FBL email traffic must not be impaired.</t>

</section>
<section anchor="automatic-suspension-of-an-account" title="Automatic suspension of an account">
<t>Sending a FBL report against a mailbox may lead into an inaccessibility for the account owner, if there is a too quick automatic account suspension. 
For example, someone sends a invitation to his friends. For somewhat reason someone marks this mail as spam.
Now, if there is an too quick automatic account suspension in place, the senders account will be suspended, and the sender can't access his mails anymore.</t>

<t>MBPs and mail senders MUST take appropriate measures to prevent this.
MBPs and mail senders have therefore, mostly proprietary, ways to evaluate the trustworthiness of an account.
For example MBPs and mail senders can consider the account age and/or any other account suspension that happened beforehand, before an account gets suspended.</t>

</section>
<section anchor="enumeration-attacks-provoking-unsubscription" title="Enumeration attacks / provoking unsubscription">
<t>A malicious person can send a bunch of forged ARF reports to a known complaint FBL addresses and try to guess a Message-ID/CFBL-Feedback-ID.
He might try to do a mass-unsubscription of a complete marketing list. This is also an already existing problem with the current FBL implementation.</t>

<t>The receiving broadcast marketing lists operator/mail sender must take appropriated measures.</t>

<t>As a countermeasure it is recommended that the Message-ID and, if used, CFBL-Feedback-ID uses a hard to forge component such as an <xref target="HMAC"/> using a secret
key, instead of a plain-text string, to make an enumeration attack impossible.</t>

<t>If it is impossible for the broadcast marketing lists operator/mail sender to use a hard to forge component, the broadcast marketing lists operator/mail sender
should take measures to avoid enumeration attacks.</t>

</section>
<section anchor="gdpr-and-other-data-regulation-laws" title="GDPR and other data-regulation laws">
<t>Providing such a header itself doesn't produce a data-regulation law problem.
The resulting ARF report, that is sent to the mail sender by the MBP, may conflict with a data-regulation law, as it may contain personal data.</t>

<t>This document already addresses some parts of this problem and describes a data-regulation law safe way to send a FBL report.
As described in <xref target="complaint-report"></xref>, the MBP may omit the complete body and/or headers and just sends the required fields.
Nevertheless, each MBP must consider on their own, if this implementation is acceptable and complies with the existing data-regulation laws.</t>

<t>As described in <xref target="complaint-report"></xref>, it is also highly RECOMMENDED that the Message-ID and, if used, the CFBL-Feedback-ID 
includes a hard to forge component such as an <xref target="HMAC"/> using a secret key, instead of a plain-text string.
See <xref target="hmac-example"></xref> for an example.</t>

<t>Using HMAC, or any other hard to forge component, ensures that only the mail sender has knowledge about the data.</t>

</section>
</section>
<section anchor="iana-considerations" title="IANA Considerations">

<section anchor="complaint-fbl-address" title="Complaint-FBL-Address">
<t>The IANA is requested to register a new header field, per <xref target="RFC3864"/>, into the "Permanent Message Header Field Names" registry:</t>

<figure><artwork type="abnf"><![CDATA[
Header field name: Complaint-FBL-Address
  
Applicable protocol: mail

Status: experimental

Author/Change controller: Jan-Philipp Benecke <jpb@cleverreach.com>

Specification document: this document
]]></artwork></figure>

</section>
<section anchor="cfbl-feedback-id-1" title="CFBL-Feedback-ID">
<t>The IANA is requested to register a new header field, per <xref target="RFC3864"/>, into the "Permanent Message Header Field Names" registry:</t>

<figure><artwork type="abnf"><![CDATA[
Header field name: CFBL-Feedback-ID

Applicable protocol: mail

Status: experimental

Author/Change controller: Jan-Philipp Benecke <jpb@cleverreach.com>

Specification document: this document
]]></artwork></figure>

</section>
</section>
<section anchor="examples" title="Examples">
<t>For simplicity the DKIM header has been shortened, and some tags has been omitted.</t>

<section anchor="simple" title="Simple">
<t>Email about the report will be generated:</t>

<figure><artwork><![CDATA[
Return-Path: <sender@mailer.example.com>
From: Awesome Newsletter <newsletter@example.com>
To: me@example.net
Subject: Super awesome deals for you
Complaint-FBL-Address: fbl@example.com; report=arf
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@mailer.example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com;
       h=Content-Type:Subject:From:To:Message-ID:
       CFBL-Feedback-ID:Complaint-FBL-Address;

This is a super awesome newsletter.
]]></artwork></figure>

<t>Resulting ARF report:</t>

<figure><artwork><![CDATA[
------=_Part_240060962_1083385345.1592993161900
Content-Type: message/feedback-report
Content-Transfer-Encoding: 7bit

Feedback-Type: abuse
User-Agent: FBL/0.1
Version: 0.1
Original-Mail-From: sender@mailer.example.com
Arrival-Date: Tue, 23 Jun 2020 06:31:38 GMT
Reported-Domain: example.com
Source-Ip: 192.0.2.1

------=_Part_240060962_1083385345.1592993161900
Content-Type: text/rfc822; charset=UTF-8
Content-Transfer-Encoding: 7bit

Return-Path: <sender@mailer.example.com>
From: Awesome Newsletter <newsletter@example.com>
To: me@example.net
Subject: Super awesome deals for you
Complaint-FBL-Address: fbl@example.com; report=arf
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@mailer.example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com;
       h=Content-Type:Subject:From:To:Message-ID:
       CFBL-Feedback-ID:Complaint-FBL-Address;

This is a super awesome newsletter.
------=_Part_240060962_1083385345.1592993161900--
]]></artwork></figure>

</section>
<section anchor="gdpr-safe-report" title="GDPR safe report">
<t>Email about the report will be generated:</t>

<figure><artwork><![CDATA[
Return-Path: <sender@mailer.example.com>
From: Awesome Newsletter <newsletter@example.com>
To: me@example.net
Subject: Super awesome deals for you
Complaint-FBL-Address: fbl@example.com; report=arf
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@mailer.example.com>
CFBL-Feedback-ID: 111:222:333:4444
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com;
       h=Content-Type:Subject:From:To:Message-ID:
       CFBL-Feedback-ID:Complaint-FBL-Address;

This is a super awesome newsletter.
]]></artwork></figure>

<t>Resulting ARF report contains only the CFBL-Feedback-ID:</t>

<figure><artwork><![CDATA[
------=_Part_240060962_1083385345.1592993161900
Content-Type: message/feedback-report
Content-Transfer-Encoding: 7bit

Feedback-Type: abuse
User-Agent: FBL/0.1
Version: 0.1
Original-Mail-From: sender@mailer.example.com
Arrival-Date: Tue, 23 Jun 2020 06:31:38 GMT
Reported-Domain: example.com
Source-Ip: 192.0.2.1

------=_Part_240060962_1083385345.1592993161900
Content-Type: text/rfc822-headers; charset=UTF-8
Content-Transfer-Encoding: 7bit

CFBL-Feedback-ID: 111:222:333:4444
------=_Part_240060962_1083385345.1592993161900--
]]></artwork></figure>

</section>
<section anchor="hmac-example" title="GDPR safe report with HMAC">
<t>Email about the report will be generated:</t>

<figure><artwork><![CDATA[
Return-Path: <sender@mailer.example.com>
From: Awesome Newsletter <newsletter@example.com>
To: me@example.net
Subject: Super awesome deals for you
Complaint-FBL-Address: fbl@example.com; report=arf
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@mailer.example.com>
CFBL-Feedback-ID: 3789e1ae1938aa2f0dfdfa48b20d8f8bc6c21ac34fc5023d
       63f9e64a43dfedc0
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com;
       h=Content-Type:Subject:From:To:Message-ID:
       CFBL-Feedback-ID:Complaint-FBL-Address;

This is a super awesome newsletter.
]]></artwork></figure>

<t>Resulting ARF report contains only the CFBL-Feedback-ID:</t>

<figure><artwork><![CDATA[
------=_Part_240060962_1083385345.1592993161900
Content-Type: message/feedback-report
Content-Transfer-Encoding: 7bit

Feedback-Type: abuse
User-Agent: FBL/0.1
Version: 0.1
Original-Mail-From: sender@mailer.example.com
Arrival-Date: Tue, 23 Jun 2020 06:31:38 GMT
Reported-Domain: example.com
Source-Ip: 192.0.2.1

------=_Part_240060962_1083385345.1592993161900
Content-Type: text/rfc822-headers; charset=UTF-8
Content-Transfer-Encoding: 7bit

CFBL-Feedback-ID: 3789e1ae1938aa2f0dfdfa48b20d8f8bc6c21ac34fc5023d
       63f9e64a43dfedc0
------=_Part_240060962_1083385345.1592993161900--
]]></artwork></figure>

</section>
</section>
<section anchor="acknowledgments" title="Acknowledgments">
<t>Technical and editorial reviews and comments were provided by the colleagues at CleverReach, the colleagues at Certified Senders Alliance,
Arne Allisat and Tobias Herkula (1&amp;1 Mail &amp; Media) and Sven Krohlas (BFK Edv-consulting).</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>

<reference anchor="XARF" >
  <front>
    <title>eXtended Abuse Reporting Format</title>
    <author >
      <organization>Abusix</organization>
    </author>
    <date />
  </front>
  <seriesInfo name="Web" value="https://github.com/abusix/xarf"/>
</reference>




<reference  anchor="RFC2119" target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></author>
<date year='1997' month='March' />
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference  anchor="RFC8174" target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author initials='B.' surname='Leiba' fullname='B. Leiba'><organization /></author>
<date year='2017' month='May' />
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>



<reference  anchor="DKIM" target='https://www.rfc-editor.org/info/rfc6376'>
<front>
<title>DomainKeys Identified Mail (DKIM) Signatures</title>
<author initials='D.' surname='Crocker' fullname='D. Crocker' role='editor'><organization /></author>
<author initials='T.' surname='Hansen' fullname='T. Hansen' role='editor'><organization /></author>
<author initials='M.' surname='Kucherawy' fullname='M. Kucherawy' role='editor'><organization /></author>
<date year='2011' month='September' />
<abstract><t>DomainKeys Identified Mail (DKIM) permits a person, role, or organization that owns the signing domain to claim some responsibility for a message by associating the domain with the message.  This can be an author's organization, an operational relay, or one of their agents.  DKIM separates the question of the identity of the Signer of the message from the purported author of the message.  Assertion of responsibility is validated through a cryptographic signature and by querying the Signer's domain directly to retrieve the appropriate public key.  Message transit from author to recipient is through relays that typically make no substantive change to the message content and thus preserve the DKIM signature.</t><t>This memo obsoletes RFC 4871 and RFC 5672.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='76'/>
<seriesInfo name='RFC' value='6376'/>
<seriesInfo name='DOI' value='10.17487/RFC6376'/>
</reference>



<reference  anchor="MAIL" target='https://www.rfc-editor.org/info/rfc5322'>
<front>
<title>Internet Message Format</title>
<author initials='P.' surname='Resnick' fullname='P. Resnick' role='editor'><organization /></author>
<date year='2008' month='October' />
<abstract><t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of &quot;electronic mail&quot; messages.  This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, &quot;Standard for the Format of ARPA Internet Text Messages&quot;, updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5322'/>
<seriesInfo name='DOI' value='10.17487/RFC5322'/>
</reference>



<reference  anchor="ARF" target='https://www.rfc-editor.org/info/rfc5965'>
<front>
<title>An Extensible Format for Email Feedback Reports</title>
<author initials='Y.' surname='Shafranovich' fullname='Y. Shafranovich'><organization /></author>
<author initials='J.' surname='Levine' fullname='J. Levine'><organization /></author>
<author initials='M.' surname='Kucherawy' fullname='M. Kucherawy'><organization /></author>
<date year='2010' month='August' />
<abstract><t>This document defines an extensible format and MIME type that may be used by mail operators to report feedback about received email to other parties.  This format is intended as a machine-readable replacement for various existing report formats currently used in Internet email.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5965'/>
<seriesInfo name='DOI' value='10.17487/RFC5965'/>
</reference>




    </references>

    <references title='Informative References'>





<reference  anchor="RFC6449" target='https://www.rfc-editor.org/info/rfc6449'>
<front>
<title>Complaint Feedback Loop Operational Recommendations</title>
<author initials='J.' surname='Falk' fullname='J. Falk' role='editor'><organization /></author>
<date year='2011' month='November' />
<abstract><t>Complaint Feedback Loops similar to those described herein have existed for more than a decade, resulting in many de facto standards and best practices.  This document is an attempt to codify, and thus clarify, the ways that both providers and consumers of these feedback mechanisms intend to use the feedback, describing some already common industry practices.</t><t>This document is the result of cooperative efforts within the Messaging Anti-Abuse Working Group, a trade organization separate from the IETF.  The original MAAWG document upon which this document is based was published in April, 2010.  This document does not represent the consensus of the IETF; rather it is being published as an Informational RFC to make it widely available to the Internet community and simplify reference to this material from IETF work. This document is not an Internet Standards Track specification; it is published for informational purposes.</t></abstract>
</front>
<seriesInfo name='RFC' value='6449'/>
<seriesInfo name='DOI' value='10.17487/RFC6449'/>
</reference>



<reference  anchor="IMAP" target='https://www.rfc-editor.org/info/rfc3501'>
<front>
<title>INTERNET MESSAGE ACCESS PROTOCOL - VERSION 4rev1</title>
<author initials='M.' surname='Crispin' fullname='M. Crispin'><organization /></author>
<date year='2003' month='March' />
<abstract><t>The Internet Message Access Protocol, Version 4rev1 (IMAP4rev1) allows a client to access and manipulate electronic mail messages on a server. IMAP4rev1 permits manipulation of mailboxes (remote message folders) in a way that is functionally equivalent to local folders.  IMAP4rev1 also provides the capability for an offline client to resynchronize with the server. IMAP4rev1 includes operations for creating, deleting, and renaming mailboxes, checking for new messages, permanently removing messages, setting and clearing flags, RFC 2822 and RFC 2045 parsing, searching, and selective fetching of message attributes, texts, and portions thereof.  Messages in IMAP4rev1 are accessed by the use of numbers. These numbers are either message sequence numbers or unique identifiers. IMAP4rev1 supports a single server.  A mechanism for accessing configuration information to support multiple IMAP4rev1 servers is discussed in RFC 2244. IMAP4rev1 does not specify a means of posting mail; this function is handled by a mail transfer protocol such as RFC 2821.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3501'/>
<seriesInfo name='DOI' value='10.17487/RFC3501'/>
</reference>



<reference  anchor="POP3" target='https://www.rfc-editor.org/info/rfc1939'>
<front>
<title>Post Office Protocol - Version 3</title>
<author initials='J.' surname='Myers' fullname='J. Myers'><organization /></author>
<author initials='M.' surname='Rose' fullname='M. Rose'><organization /></author>
<date year='1996' month='May' />
<abstract><t>The Post Office Protocol - Version 3 (POP3) is intended to permit a workstation to dynamically access a maildrop on a server host in a useful fashion.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='53'/>
<seriesInfo name='RFC' value='1939'/>
<seriesInfo name='DOI' value='10.17487/RFC1939'/>
</reference>



<reference  anchor="HMAC" target='https://www.rfc-editor.org/info/rfc2104'>
<front>
<title>HMAC: Keyed-Hashing for Message Authentication</title>
<author initials='H.' surname='Krawczyk' fullname='H. Krawczyk'><organization /></author>
<author initials='M.' surname='Bellare' fullname='M. Bellare'><organization /></author>
<author initials='R.' surname='Canetti' fullname='R. Canetti'><organization /></author>
<date year='1997' month='February' />
<abstract><t>This document describes HMAC, a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative cryptographic hash function, e.g., MD5, SHA-1, in combination with a secret shared key.  The cryptographic strength of HMAC depends on the properties of the underlying hash function.  This memo provides information for the Internet community.  This memo does not specify an Internet standard of any kind</t></abstract>
</front>
<seriesInfo name='RFC' value='2104'/>
<seriesInfo name='DOI' value='10.17487/RFC2104'/>
</reference>



<reference  anchor="RFC3864" target='https://www.rfc-editor.org/info/rfc3864'>
<front>
<title>Registration Procedures for Message Header Fields</title>
<author initials='G.' surname='Klyne' fullname='G. Klyne'><organization /></author>
<author initials='M.' surname='Nottingham' fullname='M. Nottingham'><organization /></author>
<author initials='J.' surname='Mogul' fullname='J. Mogul'><organization /></author>
<date year='2004' month='September' />
<abstract><t>This specification defines registration procedures for the message header fields used by Internet mail, HTTP, Netnews and other applications.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='90'/>
<seriesInfo name='RFC' value='3864'/>
<seriesInfo name='DOI' value='10.17487/RFC3864'/>
</reference>




    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

