<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.23 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-benecke-cfbl-address-header-10" category="exp" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="CFBL Address Header">Complaint Feedback Loop Address Header</title>

    <author initials="J." surname="Benecke" fullname="Jan-Philipp Benecke">
      <organization>CleverReach GmbH &amp; Co. KG</organization>
      <address>
        <postal>
          <street>Schafjueckenweg 2</street>
          <city>Rastede</city>
          <code>26180</code>
          <country>Germany</country>
        </postal>
        <phone>+49 4402 97390-16</phone>
        <email>jpb@cleverreach.com</email>
      </address>
    </author>

    <date year="2023" month="February" day="24"/>

    <area>art</area>
    <workgroup>Network Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document describes a method that allows a Message Originator to specify a complaint feedback loop (FBL) address as a message header field.
Also, it defines the rules for processing and forwarding such a complaint.
The motivation for this arises out of the absence of a standardized and automated way to provide Mailbox Providers with an address for a complaint feedback loop.
Currently, providing and maintaining such an address is a manual and time-consuming process for Message Originators and Mailbox Providers.</t>

<t>The mechanism specified in this document is being published as an experiment, to gauge interest of, and gather feedback from implementers and deployers. This document is produced through the Independent RFC stream
and was not subject to the IETF's approval process.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction-and-motivation"><name>Introduction and Motivation</name>
<t>The topic and goal of this document is to extend the complaint feedback loop recommendations described in <xref target="RFC6449"/> with an automated way to provide the necessary information to Mailbox Providers, 
to report message handling actions taken by message recipients, such as "mark as spam", back to the Message Originator.</t>

<t>As described in <xref target="RFC6449"/>, the registration for such a complaint feedback loop needs to be done manually by a human at any Mailbox Provider who provides a complaint feedback loop.
The key underpinning of <xref target="RFC6449"/> is that access to the complaint feedback loop is a privilege, and that Mailbox Providers are not prepared to send feedback to anyone they cannot reasonably believe are legitimate.
However, manual registration and management can be quite time-consuming if there are new feedback loops rising up, or if the Message Originator wants to add new IP addresses or DKIM domains.
In addition, a manual process is not well suited and/or feasible for smaller Mailbox Providers.
Because of the manual process involved, the Message Originator has to go through all providers again, delete his existing subscriptions and register with their new complaint address.</t>

<t>Here we propose that Message Originators add a header field without the need to manually register with each Feedback Provider., and that willing Mailbox Providers can use it to send the Feedback Messages to the specified complaint address.  This simplification or extension of a manual registration and verification process would be another advantage for the Mailbox Providers.</t>

<t>A new message header field, rather than a new DNS record, was chosen to easily distinguish between multiple Message Originators without requiring user or administrator intervention.
For example, if a company uses multiple systems, each system can set this header field on its own without requiring users or administrators to make any changes to their DNS.
No additional DNS lookup is required of the Mailbox Provider side to obtain the complaint address.</t>

<t>The proposed mechanism is capable of being operated in compliance with the data privacy laws.</t>

<t>Nevertheless, the described mechanism below potentially permits a kind of man-in-the-middle attack between the domain owner and the recipient.
A bad actor can generate forged reports to be "from" a domain name the bad actor is attacking and send this reports to the complaint feedback loop address.
These fake messages can result in a number of actions, such as blocking of accounts or deactivating recipient addresses.
This potential harm and others are described with potential countermeasures in <xref target="security-considerations"></xref>.</t>

<t>In summary, this document has the following objectives:</t>

<t><list style="symbols">
  <t>Allow Message Originators to signal that a complaint address exists without requiring manual registration with all providers.</t>
  <t>Allow Mailbox Providers to obtain a complaint address without developing their own manual registration process.</t>
  <t>Be able to provide a complaint address to smaller Mailbox Providers who do not have a feedback loop in place</t>
  <t>Provide a data privacy safe option for a complaint feedback loop.</t>
</list></t>

<section anchor="scope-of-this-experiment"><name>Scope of this Experiment</name>
<t>The CFBL-Address header field and the CFBL-Feedback-ID header field comprise an experiment. 
Participation in this experiment consists of adding the CFBL-Address header field on Message Originators side or by using the CFBL-Address header field to send Feedback Messages to the provided address on Mailbox Provider side.
Feedback on the results of this experiment can be emailed to the author, raised as an issue at https://github.com/jpbede/rfc-cfbl-address-header/ or can be emailed to the IETF cfbl mailing list (cfbl@ietf.org).</t>

<t>The goal of this experiment is to answer the following questions based on real-world deployments:</t>

<t><list style="symbols">
  <t>Is there interest among Message Originator and Mailbox Providers?</t>
  <t>If the Mailbox Provider adds this capability, will it be used by the Message Originators?</t>
  <t>If the Message Originator adds this capability, will it be used by the Mailbox Providers?</t>
  <t>Does the presence of the CFBL-Address and CFBL-Feedback-ID header field introduce additional security issues?</t>
  <t>What additional security measures/checks need to be performed at the Mailbox Provider before a Feedback Message is sent?</t>
  <t>What additional security measures/checks need to be performed at the Message Originator after a Feedback Message is received?</t>
</list></t>

<t>This experiment will be considered successful if the CFBL-Address header field is used by a leading Mailbox Provider in a country and by at least two Message Originators within the next two years
and these parties successfully use the address specified in the header field to exchange Feedback Messages.</t>

<t>If this experiment is successful and these header fields prove to be valuable and popular, the header fields may be taken to the IETF for
further discussion and revision.</t>

</section>
<section anchor="how-cfbl-differs-from-one-click-unsubscribe"><name>How CFBL differs from One-Click-Unsubscribe</name>
<t>For good reasons, the One-Click-Unsubscribe <xref target="RFC8058"/> signaling already exists, which may have several interests in common with this document.
However, this header field requires the List-Unsubscribe header field, whose purpose is to provide the link to unsubscribe from a list.
For this reason, this header field is only used by operators of broadcast marketing lists or mailing lists, not in normal email traffic.</t>

<t>The main interest of this document now is to provide an automated way to signal Mailbox Providers an address for a complaint feedback loop.
It is the obligation of the Message Originator to decide for themselves what action to take after receiving a notification; this is not the subject of this document.
Nevertheless, there is discussion about possible actions and their possible harm in <xref target="security-considerations"></xref>.</t>

</section>
</section>
<section anchor="definitions"><name>Definitions</name>
<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this 
document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>

<t>The key word "CFBL" in this document is the abbreviation for "complaint feedback loop" and will hereafter be used.</t>

<t>Unless otherwise noted, the terminology used in this document is taken from <xref target="RFC6449"/>.</t>

</section>
<section anchor="requirements"><name>Requirements</name>

<section anchor="received-message"><name>Received Message</name>
<t>This section describes the requirements that a received message, the message that is sent from the Message Originator to the Mailbox Provider and about which a report is to be sent later, must meet.</t>

<section anchor="strict"><name>Strict</name>
<t>If the domain in the <xref target="RFC5322"/>.From and the domain in the CFBL-Address header field are identical, this domain MUST be covered by a valid
<xref target="DKIM"/> signature. In this case, the DKIM "d=" parameter and the <xref target="RFC5322"/>.From field have identical DNS domains.
This signature MUST meet the requirements described in <xref target="received-message-dkim-signature"></xref>.</t>

<t>The following example meets this case:</t>

<figure><artwork><![CDATA[
Return-Path: <sender@mailer.example.com>
From: Awesome Newsletter <newsletter@example.com>
To: receiver@example.org
Subject: Super awesome deals for you
CFBL-Address: fbl@example.com; report=arf
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@mailer.example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com; s=news;
       h=Subject:From:To:Message-ID:CFBL-Feedback-ID:CFBL-Address;

This is a super awesome newsletter.
]]></artwork></figure>

</section>
<section anchor="relaxed"><name>Relaxed</name>
<t>If the domain in CFBL-Address is a child domain of the <xref target="RFC5322"/>.From, the <xref target="RFC5322"/>.From domain MUST be covered by a valid <xref target="DKIM"/> signature. 
In this case, the DKIM "d=" parameter and the <xref target="RFC5322"/>.From domain have a identical (Example 1) or parent (Example 2) DNS domains.
This signature MUST meet the requirements described in <xref target="received-message-dkim-signature"></xref>.</t>

<t>Example 1:</t>

<figure><artwork><![CDATA[
Return-Path: <sender@mailer.example.com>
From: Awesome Newsletter <newsletter@example.com>
To: receiver@example.org
Subject: Super awesome deals for you
CFBL-Address: fbl@mailer.example.com; report=arf
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@mailer.example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com;
      h=Content-Type:Subject:From:To:Message-ID:
      CFBL-Feedback-ID:CFBL-Address;

This is a super awesome newsletter.
]]></artwork></figure>

<t>Example 2:</t>

<figure><artwork><![CDATA[
Return-Path: <sender@mailer.example.com>
From: Awesome Newsletter <newsletter@mailer.example.com>
To: receiver@example.org
Subject: Super awesome deals for you
CFBL-Address: fbl@mailer.example.com; report=arf
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@mailer.example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com;
      h=Content-Type:Subject:From:To:Message-ID:
      CFBL-Feedback-ID:CFBL-Address;

This is a super awesome newsletter.
]]></artwork></figure>

</section>
<section anchor="third-party-address"><name>Third Party Address</name>
<t>If the domain in <xref target="RFC5322"/>.From differs from the domain in the CFBL-Address header field, the domain of the CFBL-Address header field MUST be covered by an additional valid <xref target="DKIM"/> signature.
Both signatures MUST meet the requirements described in <xref target="received-message-dkim-signature"></xref>.</t>

<t>This double DKIM signature ensures that both, the domain owner of the <xref target="RFC5322"/>.From domain and the domain owner of the CFBL-Address domain, agree who should receive the Feedback Messages.</t>

<t>The following example meets this case:</t>

<figure><artwork><![CDATA[
Return-Path: <sender@super-saas-mailer.com>
From: Awesome Newsletter <newsletter@example.com>
To: receiver@example.org
Subject: Super awesome deals for you
CFBL-Address: fbl@super-saas-mailer.com; report=arf
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=super-saas-mailer.com; s=system;
       h=Subject:From:To:Message-ID:CFBL-Feedback-ID:CFBL-Address;
DKIM-Signature: v=1; a=rsa-sha256; d=example.com; s=news;
       h=Subject:From:To:Message-ID:CFBL-Feedback-ID:CFBL-Address;
       
This is a super awesome newsletter.
]]></artwork></figure>

<t>An Email Service Provider may accept pre-signed messages from its Message Authors, making it impossible for it to apply the double signature described above, 
in which case the double signature MUST BE omitted and the Email Service Provider MUST sign with its domain.
Therefore, the pre-signed message MUST NOT include "CFBL-Address" and "CFBL-Feedback-ID" in its h= tag.</t>

<t>This way the Email Service Provider has the possibility to accept the pre-signed messages and can inject their own CFBL-Address.</t>

<t>Due to this granted exception a malicious actor can destroy this possibility with over-signing. This potential harm is described in <xref target="security-considerations"></xref>.</t>

<t>The following example meets this case:</t>

<figure><artwork><![CDATA[
Return-Path: <newsletter@example.com>
From: Awesome Newsletter <newsletter@example.com>
To: receiver@example.org
Subject: Super awesome deals for you
CFBL-Address: fbl@super-saas-mailer.com; report=arf
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com; s=news;
       h=Subject:From:To:Message-ID;
DKIM-Signature: v=1; a=rsa-sha256; d=super-saas-mailer.com; s=system;
       h=Subject:From:To:Message-ID:CFBL-Feedback-ID:CFBL-Address;

This is a super awesome newsletter.
]]></artwork></figure>

</section>
<section anchor="received-message-dkim-signature"><name>DKIM Signature</name>
<t>When present, CFBL-Address and CFBL-Feedback-ID header fields MUST be included in the "h=" tag of the aforementioned valid DKIM-Signature.</t>

<t>If the domain has neither the required coverage by a valid DKIM signature nor the required header field coverage by the "h=" tag, the Mailbox Provider SHALL NOT send a report message.</t>

</section>
</section>
<section anchor="cfbl-feedback-id-header-field"><name>CFBL-Feedback-ID Header Field</name>
<t>The Message Originator MAY include a CFBL-Feedback-ID header field in its messages out of various reasons, e.g. their feedback loop processing system can't do anything with the Message-ID header field.</t>

<t>It is RECOMMENDED that the header field include a hard to forge protection component such as an <xref target="HMAC"/> using a secret key, instead of a plain-text string.</t>

</section>
<section anchor="receiving-report-address"><name>Receiving Report Address</name>
<t>The receiving report address provided in the CFBL-Address header field MUST accept <xref target="ARF"/> reports.</t>

<t>The Message Originator can OPTIONALLY request a <xref target="XARF"/> report, as described in <xref target="xarf-report"></xref>.</t>

</section>
<section anchor="complaint-report"><name>Feedback Message</name>
<t>The Feedback Message (sent by Mailbox Provider to the address provided in the CFBL-Address header field) MUST have a valid <xref target="DKIM"/> signature.</t>

<t>If the message does not have the required valid <xref target="DKIM"/> signature, the Message Originator SHALL NOT process this Feedback Message.</t>

<t>The Feedback Message MUST be a <xref target="ARF"/> or <xref target="XARF"/> report.
If the Message Originator requests it (described in <xref target="xarf-report"></xref>), and it is technically possible for the Mailbox Provider to do so, the Feedback Message MUST be a <xref target="XARF"/> report, otherwise the Feedback Message MUST be a <xref target="ARF"/> report.</t>

<t>The <xref target="ARF"/> or <xref target="XARF"/> report MUST contain the Message-ID <xref target="MAIL"/>.
If present, the header field "CFBL-Feedback-ID" of the received message MUST be added additionally to the <xref target="ARF"/> or <xref target="XARF"/> report.</t>

<t>The Mailbox Provider MAY omit or redact, as described in <xref target="RFC6590"/>, all further header fields and/or body to comply with any data-regulation laws.</t>

<section anchor="xarf-report"><name>XARF Report</name>
<t>A Message Originator wishing to receive a <xref target="XARF"/> report MUST append "report=xarf" to the <xref target="cfbl-address-header-field">CFBL-Address header field</xref>.
The report parameter is separated from the report address by a ";".</t>

<t>The resulting header field would look like the following:</t>

<figure><artwork><![CDATA[
CFBL-Address: fbl@example.com; report=xarf
]]></artwork></figure>

</section>
</section>
</section>
<section anchor="implementation"><name>Implementation</name>

<section anchor="message-originator"><name>Message Originator</name>
<t>A Message Originator who wishes to use this new mechanism to receive Feedback Messages MUST include a CFBL-Address header field in their messages.</t>

<t>It is RECOMMENDED that these Feedback Messages be processed automatically. Each Message Originator must decide for themselves what action to take after receiving a Feedback Message.</t>

<t>The Message Originator MUST take action to address the described requirements in <xref target="requirements"></xref>.</t>

</section>
<section anchor="mailbox-provider"><name>Mailbox Provider</name>
<t>A Mailbox Provider who wants to collect user actions that indicate the message was not wanted and send a Feedback Message to the Message Originator, 
they MAY query the CFBL-Address header field and forward the report to the provided complaint feedback loop address.</t>

<t>The Mailbox Provider MUST validate and take action to address the described requirements in <xref target="requirements"></xref>.</t>

</section>
</section>
<section anchor="header-field-syntax"><name>Header Field Syntax</name>

<section anchor="cfbl-address-header-field"><name>CFBL-Address</name>
<t>The following ABNF imports fields, WSP, CRLF and addr-spec from <xref target="MAIL"/>.</t>

<figure><sourcecode type="abnf"><![CDATA[
fields =/ cfbl-address

cfbl-address = "CFBL-Address:" 0*1WSP addr-spec
               [";" 0*1WSP report-format] CRLF

report-format = "report=" ("arf" / "xarf")
]]></sourcecode></figure>

</section>
<section anchor="cfbl-feedback-id"><name>CFBL-Feedback-ID</name>
<t>The following ABNF imports fields, WSP, CRLF and atext from <xref target="MAIL"/>.</t>

<figure><sourcecode type="abnf"><![CDATA[
fields =/ cfbl-feedback-id

cfbl-feedback-id = "CFBL-Feedback-ID:" 0*1WSP fid CRLF

fid = 1*(atext / ":")
]]></sourcecode></figure>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>
<t>This section discusses possible security issues, and their possible solutions, of a complaint feedback loop address header field.</t>

<section anchor="attacks-on-the-feedback-loop-address"><name>Attacks on the Feedback Loop Address</name>
<t>Like any other email address, a complaint feedback loop address can be an attack vector for malicious messages.
For example, complaint feedback loop addresses can be flooded with spam.
This is an existing problem with any existing email address and is not created by this document.</t>

</section>
<section anchor="automatic-suspension-of-an-account"><name>Automatic Suspension of an Account</name>
<t>Receiving a Feedback Message regarding a Message Author can cause the Message Author to be unreachable if an automatic account suspension occurs too quickly.
An example: someone sends an invitation to their friends. For some reason, someone marks this message as spam.</t>

<t>Now, if there is too fast automatic account suspension, the Message Author's account will be blocked and the Message Author will not be able to access their emails 
or is able to send further messages, depending on the account suspension the Message Originator has chosen.</t>

<t>Message Originators must take appropriate measures to prevent too fast account suspensions.
Message Originators therefore have - mostly proprietary - ways to assess the trustworthiness of an account.
For example, Message Originators may take into account the age of the account and/or any previous account suspension before suspending an account.</t>

</section>
<section anchor="enumeration-attacks-provoking-unsubscription"><name>Enumeration Attacks / Provoking Unsubscription</name>
<t>A malicious person may send a series of spoofed ARF messages to known complaint feedback loop addresses and attempt to guess a Message-ID/CFBL-Feedback-ID or any other identifiers.
The malicious person may attempt to mass unsubscribe/suspend if such an automated system is in place.
This is also an existing problem with the current feedback loop implementation and/or One-Click Unsubscription <xref target="RFC8058"/>.</t>

<t>The Message Originator must take appropriate measures, a countermeasure would be, that the CFBL-Feedback-ID header field, 
if used, use a hard-to-forge component such as a <xref target="HMAC"/> with a secret key instead of a plaintext string to make an enumeration attack impossible.</t>

</section>
<section anchor="data-privacy"><name>Data Privacy</name>
<t>The provision of such a header field itself does not pose a data privacy issue.
The resulting ARF/XARF report sent by the Mailbox Provider to the Message Originator may violate a data privacy law because it may contain personal data.</t>

<t>This document already addresses some parts of this problem and describes a data privacy safe way to send a Feedback Message.
As described in <xref target="complaint-report"></xref>, the Mailbox Provider can omit the entire body and/or header field and send only the required fields.
As recommended in <xref target="RFC6590"/>, the Mailbox Provider can also redact the data in question.
Nevertheless, each Mailbox Provider must consider for itself whether this implementation is acceptable and complies with existing data privacy laws in their country.</t>

<t>As described in <xref target="complaint-report"></xref> and in <xref target="cfbl-feedback-id-header-field"></xref>, it is also strongly RECOMMENDED that the Message-ID and, if used, the CFBL-Feedback-ID.
contain a component that is difficult to forge, such as a <xref target="HMAC"/> that uses a secret key, rather than a plaintext string.
See <xref target="hmac-example"></xref> for an example.</t>

</section>
<section anchor="abusing-for-validity-and-existence-queries"><name>Abusing for Validity and Existence Queries</name>
<t>This mechanism could be abused to determine the validity and existence of an email address, which exhibits another potential data privacy issue.
Now, if the Mailbox Provider has an automatic process to generate a Feedback Message for a received message, it may not be doing the mailbox owner any favors.
As the Mailbox Provider now generates an automatic Feedback Message for the received message, the Mailbox Provider now proves to the Message Originator that this mailbox exists for sure, because it is based on a manual action of the mailbox owner.</t>

<t>The receiving Mailbox Provider must take appropriate measures. One possible countermeasure could be, for example, pre-existing reputation data, usually proprietary data.
Using this data, the Mailbox Provider can assess the trustworthiness of a Message Originator and decide whether to send a Feedback Message based on this information.</t>

</section>
<section anchor="over-signing-when-accepting-pre-signed-emails"><name>Over-Signing when Accepting Pre-Signed Emails</name>
<t>When accepting pre-signed mails, a malicious actor can destroy the possibility of adding the CFBL-Address header field by the Email Service Provider, with "over-signing".
The methode "over-signing" is described in <xref section="5.4" sectionFormat="of" target="DKIM"/>.</t>

<t>The Email Service Provider must take appropriate measures.
Email Service Providers therefore have - mostly proprietary - methods for assessing the trustworthiness of an account and decide on this basis whether to accept pre-signed messages.</t>

</section>
</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<section anchor="cfbl-address"><name>CFBL-Address</name>
<t>The IANA is requested to register a new header field, per <xref target="RFC3864"/>, into the "Provisional Message Header Field Names" registry:</t>

<figure><sourcecode type="abnf"><![CDATA[
Header field name: CFBL-Address
  
Applicable protocol: mail

Status: provisional

Author/Change controller: Jan-Philipp Benecke <jpb@cleverreach.com>

Specification document: this document
]]></sourcecode></figure>

</section>
<section anchor="cfbl-feedback-id-1"><name>CFBL-Feedback-ID</name>
<t>The IANA is requested to register a new header field, per <xref target="RFC3864"/>, into the "Provisional Message Header Field Names" registry:</t>

<figure><sourcecode type="abnf"><![CDATA[
Header field name: CFBL-Feedback-ID

Applicable protocol: mail

Status: provisional

Author/Change controller: Jan-Philipp Benecke <jpb@cleverreach.com>

Specification document: this document
]]></sourcecode></figure>

</section>
</section>
<section anchor="examples"><name>Examples</name>
<t>For simplicity the DKIM header field has been shortened, and some tags have been omitted.</t>

<section anchor="simple"><name>Simple</name>
<t>Email about the report will be generated:</t>

<figure><artwork><![CDATA[
Return-Path: <sender@mailer.example.com>
From: Awesome Newsletter <newsletter@example.com>
To: me@example.net
Subject: Super awesome deals for you
CFBL-Address: fbl@example.com; report=arf
CFBL-Feedback-ID: 111:222:333:4444
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@mailer.example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com; s=news;
       h=Subject:From:To:Message-ID:CFBL-Feedback-ID:CFBL-Address;

This is a super awesome newsletter.
]]></artwork></figure>

<t>Resulting ARF report:</t>

<figure><artwork><![CDATA[
------=_Part_240060962_1083385345.1592993161900
Content-Type: message/feedback-report
Content-Transfer-Encoding: 7bit

Feedback-Type: abuse
User-Agent: FBL/0.1
Version: 0.1
Original-Mail-From: sender@mailer.example.com
Arrival-Date: Tue, 23 Jun 2020 06:31:38 GMT
Reported-Domain: example.com
Source-IP: 192.0.2.1

------=_Part_240060962_1083385345.1592993161900
Content-Type: text/rfc822; charset=UTF-8
Content-Transfer-Encoding: 7bit

Return-Path: <sender@mailer.example.com>
From: Awesome Newsletter <newsletter@example.com>
To: me@example.net
Subject: Super awesome deals for you
CFBL-Address: fbl@example.com; report=arf
CFBL-Feedback-ID: 111:222:333:4444
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@mailer.example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com; s=news;
       h=Subject:From:To:Message-ID:CFBL-Feedback-ID:CFBL-Address;

This is a super awesome newsletter.
------=_Part_240060962_1083385345.1592993161900--
]]></artwork></figure>

</section>
<section anchor="data-privacy-safe-report"><name>Data Privacy Safe Report</name>
<t>Email about the report will be generated:</t>

<figure><artwork><![CDATA[
Return-Path: <sender@mailer.example.com>
From: Awesome Newsletter <newsletter@example.com>
To: me@example.net
Subject: Super awesome deals for you
CFBL-Address: fbl@example.com; report=arf
CFBL-Feedback-ID: 111:222:333:4444
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@mailer.example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com; s=news;
       h=Subject:From:To:Message-ID:CFBL-Feedback-ID:CFBL-Address;

This is a super awesome newsletter.
]]></artwork></figure>

<t>Resulting ARF report contains only the CFBL-Feedback-ID:</t>

<figure><artwork><![CDATA[
------=_Part_240060962_1083385345.1592993161900
Content-Type: message/feedback-report
Content-Transfer-Encoding: 7bit

Feedback-Type: abuse
User-Agent: FBL/0.1
Version: 0.1
Original-Mail-From: sender@mailer.example.com
Arrival-Date: Tue, 23 Jun 2020 06:31:38 GMT
Reported-Domain: example.com
Source-IP: 2001:DB8::25

------=_Part_240060962_1083385345.1592993161900
Content-Type: text/rfc822-headers; charset=UTF-8
Content-Transfer-Encoding: 7bit

CFBL-Feedback-ID: 111:222:333:4444
------=_Part_240060962_1083385345.1592993161900--
]]></artwork></figure>

</section>
<section anchor="hmac-example"><name>Data Privacy Safe Report with HMAC</name>
<t>Email about the report will be generated:</t>

<figure><artwork><![CDATA[
Return-Path: <sender@mailer.example.com>
From: Awesome Newsletter <newsletter@example.com>
To: me@example.net
Subject: Super awesome deals for you
CFBL-Address: fbl@example.com; report=arf
CFBL-Feedback-ID: 3789e1ae1938aa2f0dfdfa48b20d8f8bc6c21ac34fc5023d
       63f9e64a43dfedc0
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@mailer.example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com; s=news;
       h=Subject:From:To:Message-ID:CFBL-Feedback-ID:CFBL-Address;

This is a super awesome newsletter.
]]></artwork></figure>

<t>Resulting ARF report contains only the CFBL-Feedback-ID:</t>

<figure><artwork><![CDATA[
------=_Part_240060962_1083385345.1592993161900
Content-Type: message/feedback-report
Content-Transfer-Encoding: 7bit

Feedback-Type: abuse
User-Agent: FBL/0.1
Version: 0.1
Original-Mail-From: sender@mailer.example.com
Arrival-Date: Tue, 23 Jun 2020 06:31:38 GMT
Reported-Domain: example.com
Source-IP: 2001:DB8::25

------=_Part_240060962_1083385345.1592993161900
Content-Type: text/rfc822-headers; charset=UTF-8
Content-Transfer-Encoding: 7bit

CFBL-Feedback-ID: 3789e1ae1938aa2f0dfdfa48b20d8f8bc6c21ac34fc5023d
       63f9e64a43dfedc0
------=_Part_240060962_1083385345.1592993161900--
]]></artwork></figure>

</section>
</section>
<section anchor="acknowledgments"><name>Acknowledgments</name>
<t>Technical and editorial reviews were provided by the colleagues at CleverReach, 
the colleagues at Certified Senders Alliance and eco.de, Levent Ulucan (Inxmail), 
Arne Allisat and Tobias Herkula (1&amp;1 Mail &amp; Media) and Sven Krohlas (BFK Edv-consulting).</t>

</section>


  </middle>

  <back>


    <references title='Normative References'>

<reference anchor="XARF" >
  <front>
    <title>eXtended Abuse Reporting Format</title>
    <author >
      <organization>Abusix</organization>
    </author>
    <date />
  </front>
  <seriesInfo name="Web" value="https://github.com/abusix/xarf"/>
</reference>




<reference anchor='RFC6449'>
<front>
<title>Complaint Feedback Loop Operational Recommendations</title>
<author fullname='J. Falk' initials='J.' role='editor' surname='Falk'><organization/></author>
<date month='November' year='2011'/>
<abstract><t>Complaint Feedback Loops similar to those described herein have existed for more than a decade, resulting in many de facto standards and best practices.  This document is an attempt to codify, and thus clarify, the ways that both providers and consumers of these feedback mechanisms intend to use the feedback, describing some already common industry practices.</t><t>This document is the result of cooperative efforts within the Messaging Anti-Abuse Working Group, a trade organization separate from the IETF.  The original MAAWG document upon which this document is based was published in April, 2010.  This document does not represent the consensus of the IETF; rather it is being published as an Informational RFC to make it widely available to the Internet community and simplify reference to this material from IETF work. This document is not an Internet Standards Track specification; it is published for informational purposes.</t></abstract>
</front>
<seriesInfo name='RFC' value='6449'/>
<seriesInfo name='DOI' value='10.17487/RFC6449'/>
</reference>



<reference anchor='RFC2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='RFC8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<date month='May' year='2017'/>
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>



<reference anchor='RFC5322'>
<front>
<title>Internet Message Format</title>
<author fullname='P. Resnick' initials='P.' role='editor' surname='Resnick'><organization/></author>
<date month='October' year='2008'/>
<abstract><t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of &quot;electronic mail&quot; messages.  This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, &quot;Standard for the Format of ARPA Internet Text Messages&quot;, updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5322'/>
<seriesInfo name='DOI' value='10.17487/RFC5322'/>
</reference>



<reference anchor='DKIM'>
<front>
<title>DomainKeys Identified Mail (DKIM) Signatures</title>
<author fullname='D. Crocker' initials='D.' role='editor' surname='Crocker'><organization/></author>
<author fullname='T. Hansen' initials='T.' role='editor' surname='Hansen'><organization/></author>
<author fullname='M. Kucherawy' initials='M.' role='editor' surname='Kucherawy'><organization/></author>
<date month='September' year='2011'/>
<abstract><t>DomainKeys Identified Mail (DKIM) permits a person, role, or organization that owns the signing domain to claim some responsibility for a message by associating the domain with the message.  This can be an author's organization, an operational relay, or one of their agents.  DKIM separates the question of the identity of the Signer of the message from the purported author of the message.  Assertion of responsibility is validated through a cryptographic signature and by querying the Signer's domain directly to retrieve the appropriate public key.  Message transit from author to recipient is through relays that typically make no substantive change to the message content and thus preserve the DKIM signature.</t><t>This memo obsoletes RFC 4871 and RFC 5672.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='76'/>
<seriesInfo name='RFC' value='6376'/>
<seriesInfo name='DOI' value='10.17487/RFC6376'/>
</reference>



<reference anchor='ARF'>
<front>
<title>An Extensible Format for Email Feedback Reports</title>
<author fullname='Y. Shafranovich' initials='Y.' surname='Shafranovich'><organization/></author>
<author fullname='J. Levine' initials='J.' surname='Levine'><organization/></author>
<author fullname='M. Kucherawy' initials='M.' surname='Kucherawy'><organization/></author>
<date month='August' year='2010'/>
<abstract><t>This document defines an extensible format and MIME type that may be used by mail operators to report feedback about received email to other parties.  This format is intended as a machine-readable replacement for various existing report formats currently used in Internet email.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5965'/>
<seriesInfo name='DOI' value='10.17487/RFC5965'/>
</reference>



<reference anchor='MAIL'>
<front>
<title>Internet Message Format</title>
<author fullname='P. Resnick' initials='P.' role='editor' surname='Resnick'><organization/></author>
<date month='October' year='2008'/>
<abstract><t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of &quot;electronic mail&quot; messages.  This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, &quot;Standard for the Format of ARPA Internet Text Messages&quot;, updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5322'/>
<seriesInfo name='DOI' value='10.17487/RFC5322'/>
</reference>




    </references>

    <references title='Informative References'>





<reference anchor='RFC8058'>
<front>
<title>Signaling One-Click Functionality for List Email Headers</title>
<author fullname='J. Levine' initials='J.' surname='Levine'><organization/></author>
<author fullname='T. Herkula' initials='T.' surname='Herkula'><organization/></author>
<date month='January' year='2017'/>
<abstract><t>This document describes a method for signaling a one-click function for the List-Unsubscribe email header field.  The need for this arises out of the actuality that mail software sometimes fetches URLs in mail header fields, and thereby accidentally triggers unsubscriptions in the case of the List-Unsubscribe header field.</t></abstract>
</front>
<seriesInfo name='RFC' value='8058'/>
<seriesInfo name='DOI' value='10.17487/RFC8058'/>
</reference>



<reference anchor='HMAC'>
<front>
<title>HMAC: Keyed-Hashing for Message Authentication</title>
<author fullname='H. Krawczyk' initials='H.' surname='Krawczyk'><organization/></author>
<author fullname='M. Bellare' initials='M.' surname='Bellare'><organization/></author>
<author fullname='R. Canetti' initials='R.' surname='Canetti'><organization/></author>
<date month='February' year='1997'/>
<abstract><t>This document describes HMAC, a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative cryptographic hash function, e.g., MD5, SHA-1, in combination with a secret shared key.  The cryptographic strength of HMAC depends on the properties of the underlying hash function.  This memo provides information for the Internet community.  This memo does not specify an Internet standard of any kind</t></abstract>
</front>
<seriesInfo name='RFC' value='2104'/>
<seriesInfo name='DOI' value='10.17487/RFC2104'/>
</reference>



<reference anchor='RFC6590'>
<front>
<title>Redaction of Potentially Sensitive Data from Mail Abuse Reports</title>
<author fullname='J. Falk' initials='J.' role='editor' surname='Falk'><organization/></author>
<author fullname='M. Kucherawy' initials='M.' role='editor' surname='Kucherawy'><organization/></author>
<date month='April' year='2012'/>
<abstract><t>Email messages often contain information that might be considered private or sensitive, per either regulation or social norms.  When such a message becomes the subject of a report intended to be shared with other entities, the report generator may wish to redact or elide the sensitive portions of the message.  This memo suggests one method for doing so effectively.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6590'/>
<seriesInfo name='DOI' value='10.17487/RFC6590'/>
</reference>



<reference anchor='RFC3864'>
<front>
<title>Registration Procedures for Message Header Fields</title>
<author fullname='G. Klyne' initials='G.' surname='Klyne'><organization/></author>
<author fullname='M. Nottingham' initials='M.' surname='Nottingham'><organization/></author>
<author fullname='J. Mogul' initials='J.' surname='Mogul'><organization/></author>
<date month='September' year='2004'/>
<abstract><t>This specification defines registration procedures for the message header fields used by Internet mail, HTTP, Netnews and other applications.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='90'/>
<seriesInfo name='RFC' value='3864'/>
<seriesInfo name='DOI' value='10.17487/RFC3864'/>
</reference>




    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

