| < draft-ietf-marf-not-spam-feedback-02.txt | draft-ietf-marf-not-spam-feedback-03.txt > | |||
|---|---|---|---|---|
| marf K. Li | marf K. Li | |||
| Internet-Draft B. Leiba | Internet-Draft B. Leiba | |||
| Intended status: Standards Track Huawei Technologies | Intended status: Standards Track Huawei Technologies | |||
| Expires: March 22, 2012 September 19, 2011 | Expires: March 25, 2012 September 22, 2011 | |||
| Email Feedback Report Type Value : not-spam | Email Feedback Report Type Value : not-spam | |||
| draft-ietf-marf-not-spam-feedback-02 | draft-ietf-marf-not-spam-feedback-03 | |||
| Abstract | Abstract | |||
| This document defines a new Abuse Reporting Format (ARF) feedback | This document defines a new Abuse Reporting Format (ARF) feedback | |||
| report type value: "not-spam". It can be used to report a message | report type value: "not-spam". It can be used to report an email | |||
| that was mistakenly marked as spam. | message that was mistakenly marked as spam. | |||
| Status of this Memo | Status of this Memo | |||
| This Internet-Draft is submitted in full conformance with the | This Internet-Draft is submitted in full conformance with the | |||
| provisions of BCP 78 and BCP 79. | provisions of BCP 78 and BCP 79. | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at http://datatracker.ietf.org/drafts/current/. | Drafts is at http://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on March 22, 2012. | This Internet-Draft will expire on March 25, 2012. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2011 IETF Trust and the persons identified as the | Copyright (c) 2011 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| skipping to change at page 2, line 14 ¶ | skipping to change at page 2, line 14 ¶ | |||
| Table of Contents | Table of Contents | |||
| 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 | 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
| 1.1. Discussion . . . . . . . . . . . . . . . . . . . . . . . . . 3 | 1.1. Discussion . . . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
| 2. Feedback Report Type: Not-Spam . . . . . . . . . . . . . . . 4 | 2. Feedback Report Type: Not-Spam . . . . . . . . . . . . . . . 4 | |||
| 3. Example . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 | 3. Example . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 | |||
| 4. Security Considerations . . . . . . . . . . . . . . . . . . . 5 | 4. Security Considerations . . . . . . . . . . . . . . . . . . . 6 | |||
| 5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 6 | 5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 6 | |||
| 6. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 6 | 6. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 6 | |||
| 7. References . . . . . . . . . . . . . . . . . . . . . . . . . 6 | 7. References . . . . . . . . . . . . . . . . . . . . . . . . . 6 | |||
| 7.1. Normative References . . . . . . . . . . . . . . . . . . . . 6 | 7.1. Normative References . . . . . . . . . . . . . . . . . . . . 6 | |||
| 7.2. Informative References . . . . . . . . . . . . . . . . . . . 6 | 7.2. Informative References . . . . . . . . . . . . . . . . . . . 7 | |||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . 7 | Authors' Addresses . . . . . . . . . . . . . . . . . . . . . 7 | |||
| 1. Introduction | 1. Introduction | |||
| In RFC 5965 [RFC5965], an Abuse Reporting Format (ARF) is defined for | In RFC 5965 [RFC5965], an Abuse Reporting Format (ARF) is defined for | |||
| reporting email abuse. Currently two feedback report types are | reporting email abuse. Currently two feedback report types are | |||
| defined that are related to the spam problem, and that can be used to | defined that are related to the spam problem, and that can be used to | |||
| report abusive or fraudulent email messages: | report abusive or fraudulent email messages: | |||
| o abuse: indicates unsolicited email or some other kind of email | o abuse: indicates unsolicited email or some other kind of email | |||
| skipping to change at page 3, line 51 ¶ | skipping to change at page 3, line 51 ¶ | |||
| own, but will be considered along with other information, analysis of | own, but will be considered along with other information, analysis of | |||
| the message, etc. Because different users have different needs and | the message, etc. Because different users have different needs and | |||
| different views of what constitutes spam, reports from one user might | different views of what constitutes spam, reports from one user might | |||
| or might not be applicable to others. And because users might | or might not be applicable to others. And because users might | |||
| sometimes press a "report not spam" button accidentally, immediate | sometimes press a "report not spam" button accidentally, immediate | |||
| strong action, such as marking all similar messages as "good" based | strong action, such as marking all similar messages as "good" based | |||
| on a single report, is probably not the right approach. Recipients | on a single report, is probably not the right approach. Recipients | |||
| of "not-spam" reports need to consider what's right in their | of "not-spam" reports need to consider what's right in their | |||
| environments. | environments. | |||
| There are anti-spam systems that use "not spam" feedback today. All | There are anti-spam systems that use (non-standard) "not spam" | |||
| of them take the reports and mix them with other spam reports and | feedback today. All of them take the reports and mix them with other | |||
| other data, using their own algorithms, to determine appropriate | spam reports and other data, using their own algorithms, to determine | |||
| action. In no case do the existing systems use a "not spam" report | appropriate action. In no case do the existing systems use a "not | |||
| as an immediate, automatic override. | spam" report as an immediate, automatic override. | |||
| The feedback types "abuse" and "not-spam" can be taken as opposites. | ||||
| A mistaken "not-spam" report could be countermanded by a subsequent | ||||
| "abuse" report from the same user, and an operator could consider | ||||
| collected reports of "abuse" and "not-spam" in making future | ||||
| assessments. | ||||
| 2. Feedback Report Type: Not-Spam | 2. Feedback Report Type: Not-Spam | |||
| This document only defines a new feedback report type, "not-spam", | This document only defines a new feedback report type, "not-spam", | |||
| extending the Email Feedback Reports specification [RFC5965]. | extending the Email Feedback Reports specification [RFC5965]. | |||
| In the first MIME part of the feedback report message, the end user | In the first MIME part of the feedback report message, the end user | |||
| or the email client can add information to indicate why the message | or the email client can add information to indicate why the message | |||
| is not spam -- for example, because the originator or its domain is | is not considered as spam -- for example, because the originator or | |||
| well known. | its domain is well known. | |||
| 3. Example | 3. Example | |||
| In the example, Joe, a pharmaceuticals sales representative, has | In the example, Joe, a pharmaceuticals sales representative, has | |||
| received a message about discount pharmaceuticals. Because that is a | received a message about discount pharmaceuticals. Because that is a | |||
| frequent subject of spam email, the message has been marked as spam | frequent subject of spam email, the message has been marked as spam | |||
| -- incorrectly, in this case. Joe has reported it as "not-spam", and | -- incorrectly, in this case. Joe has reported it as "not-spam", and | |||
| this is an example of the report, shortened (the "[...etc...]" part) | this is an example of the report, shortened (the "[...etc...]" part) | |||
| for presentation here. | for presentation here. | |||
| Note that the message is DKIM-signed [I-D.ietf-dkim-rfc4871bis], a | Note that the message is DKIM-signed [RFC6376], a good security | |||
| good security practice as suggested in RFC 5965 section 8.2 | practice as suggested in RFC 5965 section 8.2 [RFC5965]. | |||
| [RFC5965]. [[anchor3: RFC Editor: please replace the DKIM citation | ||||
| with a reference to RFC 6376, once it's published.]] | ||||
| DKIM-Signature: v=1; a=rsa-sha256; s=abuse; d=example.com; | DKIM-Signature: v=1; a=rsa-sha256; s=abuse; d=example.com; | |||
| c=simple/simple; q=dns/txt; i=abusedesk@example.com; | c=simple/simple; q=dns/txt; i=abusedesk@example.com; | |||
| h=From:Date:Subject:To:Message-ID:MIME-Version:Content-Type; | h=From:Date:Subject:To:Message-ID:MIME-Version:Content-Type; | |||
| bh=iF4dMNYs/KepE0HuwfukJCDyjkduUzZFiaHqO9DMIPU=; | bh=iF4dMNYs/KepE0HuwfukJCDyjkduUzZFiaHqO9DMIPU=; | |||
| b=e+BF8DCHFGqCp7/pExleNz7pVaLEoT+uWj/8H9DoZpxFI1vNnCTDu14w5v | b=e+BF8DCHFGqCp7/pExleNz7pVaLEoT+uWj/8H9DoZpxFI1vNnCTDu14w5v | |||
| ze4mqJkldudVI0JspsYHTYeomhPklCV4F95GfwpM5W+ziUOv7AySTfygPW | ze4mqJkldudVI0JspsYHTYeomhPklCV4F95GfwpM5W+ziUOv7AySTfygPW | |||
| EerczqZwAK88//oaYCFXq3XV9T/z+zlLp3rrirKGmCMCPPcbdSGv/Eg= | EerczqZwAK88//oaYCFXq3XV9T/z+zlLp3rrirKGmCMCPPcbdSGv/Eg= | |||
| From: <abusedesk@example.com> | From: <abusedesk@example.com> | |||
| Date: Thu, 8 Mar 2005 17:40:36 EDT | Date: Thu, 8 Mar 2005 17:40:36 EDT | |||
| skipping to change at page 6, line 21 ¶ | skipping to change at page 6, line 29 ¶ | |||
| 5. IANA Considerations | 5. IANA Considerations | |||
| Registration is requested for the newly defined feedback type name: | Registration is requested for the newly defined feedback type name: | |||
| "not-spam", according to the instructions in section 7.3 of the base | "not-spam", according to the instructions in section 7.3 of the base | |||
| specification [RFC5965]. | specification [RFC5965]. | |||
| Please add the following to the "Feedback Report Type Values" | Please add the following to the "Feedback Report Type Values" | |||
| registry: | registry: | |||
| Feedback Type Name: not-spam | Feedback Type Name: not-spam | |||
| Description: Indicates that a message is not spam. This may be used | Description: Indicates that the entity providing the report does not | |||
| to correct a message that was incorrectly tagged or categorized | consider the message to be spam. This may be used to correct a | |||
| as spam. | message that was incorrectly tagged or categorized as spam. | |||
| Published in: this document | Published in: this document | |||
| Status: current | Status: current | |||
| 6. Acknowledgements | 6. Acknowledgements | |||
| The authors would like thank Murray S. Kucherawy and Bert | The authors would like thank Murray S. Kucherawy and Bert | |||
| Greevenbosch for their discussion and review, and J.D. Falk for | Greevenbosch for their discussion and review, and J.D. Falk for | |||
| suggesting some explanatory text. | suggesting some explanatory text. | |||
| 7. References | 7. References | |||
| 7.1. Normative References | 7.1. Normative References | |||
| [RFC5965] Shafranovich, Y., Levine, J., and M. Kucherawy, "An | [RFC5965] Shafranovich, Y., Levine, J., and M. Kucherawy, "An | |||
| Extensible Format for Email Feedback Reports", RFC 5965, | Extensible Format for Email Feedback Reports", RFC 5965, | |||
| August 2010. | August 2010. | |||
| 7.2. Informative References | 7.2. Informative References | |||
| [I-D.ietf-dkim-rfc4871bis] | ||||
| Crocker, D., Hansen, T., and M. Kucherawy, "DomainKeys | ||||
| Identified Mail (DKIM) Signatures", | ||||
| draft-ietf-dkim-rfc4871bis-15 (work in progress), | ||||
| July 2011. | ||||
| [I-D.ietf-marf-as] | [I-D.ietf-marf-as] | |||
| Falk, J., "Creation and Use of Email Feedback Reports: An | Falk, J., "Creation and Use of Email Feedback Reports: An | |||
| Applicability Statement for the Abuse Reporting Format | Applicability Statement for the Abuse Reporting Format | |||
| (ARF)", draft-ietf-marf-as-00 (work in progress), | (ARF)", draft-ietf-marf-as-00 (work in progress), | |||
| September 2011. | September 2011. | |||
| [OMA-SpamRep-RD] | [OMA-SpamRep-RD] | |||
| Open Mobile Alliance, "Mobile Spam Reporting | Open Mobile Alliance, "Mobile Spam Reporting | |||
| Requirements", OMA-RD-SpamRep-V1_0 20101123-C, | Requirements", OMA-RD-SpamRep-V1_0 20101123-C, | |||
| November 2010. | November 2010. | |||
| [RFC6376] Crocker, D., Hansen, T., and M. Kucherawy, "DomainKeys | ||||
| Identified Mail (DKIM) Signatures", RFC 6376, | ||||
| September 2011. | ||||
| Authors' Addresses | Authors' Addresses | |||
| Kepeng Li | Kepeng Li | |||
| Huawei Technologies | Huawei Technologies | |||
| Huawei Base, Bantian, Longgang District | Huawei Base, Bantian, Longgang District | |||
| Shenzhen, Guangdong 518129 | Shenzhen, Guangdong 518129 | |||
| P. R. China | P. R. China | |||
| Phone: +86-755-28974289 | Phone: +86-755-28974289 | |||
| Email: likepeng@huawei.com | Email: likepeng@huawei.com | |||
| End of changes. 12 change blocks. | ||||
| 27 lines changed or deleted | 29 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||