<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.23 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-benecke-cfbl-address-header-11" category="exp" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="CFBL Address Header">Complaint Feedback Loop Address Header</title>

    <author initials="J." surname="Benecke" fullname="Jan-Philipp Benecke">
      <organization>CleverReach GmbH &amp; Co. KG</organization>
      <address>
        <postal>
          <street>Schafjueckenweg 2</street>
          <city>Rastede</city>
          <code>26180</code>
          <country>Germany</country>
        </postal>
        <phone>+49 4402 97390-16</phone>
        <email>jpb@cleverreach.com</email>
      </address>
    </author>

    <date year="2023" month="May" day="06"/>

    <area>art</area>
    <workgroup>Network Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document describes a method that allows a Message Originator to specify a complaint feedback loop (FBL) address as a message header field.
Also, it defines the rules for processing and forwarding such a complaint.
The motivation for this arises out of the absence of a standardized and automated way to provide Mailbox Providers with an address for a complaint feedback loop.
Currently, providing and maintaining such an address is a manual and time-consuming process for Message Originators and Mailbox Providers.</t>

<t>The mechanism specified in this document is being published as an experiment, to gauge interest of, and gather feedback from implementers and deployers. This document is produced through the Independent RFC stream
and was not subject to the IETF's approval process.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction-and-motivation"><name>Introduction and Motivation</name>
<t>The topic and goal of this document is to extend the complaint feedback loop recommendations described in <xref target="RFC6449"/> (the terminology used in this document hereafter is taken from there) with an automated way 
to provide the necessary information to Mailbox Providers, to report message handling actions taken by message recipients, such as "mark as spam", back to the Message Originator.</t>

<t>As described in <xref target="RFC6449"/>, the registration for such a complaint feedback loop needs to be done manually by a human at any Mailbox Provider who provides a complaint feedback loop.
The key underpinning of <xref target="RFC6449"/> is that access to the complaint feedback loop is a privilege, and that Mailbox Providers are not prepared to send feedback to anyone they cannot reasonably believe are legitimate.
However, manual registration and management can be quite time-consuming if there are new feedback loops rising up, or if the Message Originator wants to add new IP addresses, DKIM domains or change their complaint address.
In addition, a manual process is not well suited and/or feasible for smaller Mailbox Providers.</t>

<t>Here we propose that Message Originators add a header field without the need to manually register with each Feedback Provider, and that willing Mailbox Providers can use it to send the Feedback Messages to the specified complaint address.
This simplification or extension of a manual registration and verification process would be another advantage for the Mailbox Providers.</t>

<t>A new message header field, rather than a new DNS record, was chosen to easily distinguish between multiple Message Originators without requiring user or administrator intervention.
For example, if a company uses multiple systems, each system can set this header field on its own without requiring users or administrators to make any changes to their DNS.
No additional DNS lookup is required of the Mailbox Provider side to obtain the complaint address.</t>

<t>The proposed mechanism is capable of being operated in compliance with the data privacy laws e.g. GDPR or CCPA.</t>

<t>Nevertheless, the described mechanism below potentially permits a kind of man-in-the-middle attack between the domain owner and the recipient.
A bad actor can generate forged reports to be "from" a domain name the bad actor is attacking and send this reports to the complaint feedback loop address.
These fake messages can result in a number of actions, such as blocking of accounts or deactivating recipient addresses.
This potential harm and others are described with potential countermeasures in <xref target="security-considerations"></xref>.</t>

<t>In summary, this document has the following objectives:</t>

<t><list style="symbols">
  <t>Allow Message Originators to signal that a complaint address exists without requiring manual registration with all providers.</t>
  <t>Allow Mailbox Providers to obtain a complaint address without developing their own manual registration process.</t>
  <t>Be able to provide a complaint address to smaller Mailbox Providers who do not have a feedback loop in place</t>
  <t>Provide a data privacy safe option for a complaint feedback loop.</t>
</list></t>

<section anchor="scope-of-this-experiment"><name>Scope of this Experiment</name>
<t>The CFBL-Address header field and the CFBL-Feedback-ID header field comprise an experiment. 
Participation in this experiment consists of adding the CFBL-Address header field on Message Originators side or by using the CFBL-Address header field to send Feedback Messages to the provided address on Mailbox Provider side.
Feedback on the results of this experiment can be emailed to the author, raised as an issue at https://github.com/jpbede/rfc-cfbl-address-header/ or can be emailed to the IETF cfbl mailing list (cfbl@ietf.org).</t>

<t>The goal of this experiment is to answer the following questions based on real-world deployments:</t>

<t><list style="symbols">
  <t>Is there interest among Message Originator and Mailbox Providers?</t>
  <t>If the Mailbox Provider adds this capability, will it be used by the Message Originators?</t>
  <t>If the Message Originator adds this capability, will it be used by the Mailbox Providers?</t>
  <t>Does the presence of the CFBL-Address and CFBL-Feedback-ID header field introduce additional security issues?</t>
  <t>What additional security measures/checks need to be performed at the Mailbox Provider before a Feedback Message is sent?</t>
  <t>What additional security measures/checks need to be performed at the Message Originator after a Feedback Message is received?</t>
</list></t>

<t>This experiment will be considered successful if the CFBL-Address header field is used by a leading Mailbox Provider and by at least two Message Originators within the next two years
and these parties successfully use the address specified in the header field to exchange Feedback Messages.</t>

<t>If this experiment is successful and these header fields prove to be valuable and popular, the header fields may be taken to the IETF for
further discussion and revision.</t>

</section>
<section anchor="how-cfbl-differs-from-one-click-unsubscribe"><name>How CFBL differs from One-Click-Unsubscribe</name>
<t>For good reasons, the One-Click-Unsubscribe <xref target="RFC8058"/> signaling already exists, which may have several interests in common with this document.
However, this header field requires the List-Unsubscribe header field, whose purpose is to provide the link to unsubscribe from a list.
For this reason, this header field is only used by operators of broadcast marketing lists or mailing lists, not in normal email traffic.</t>

</section>
</section>
<section anchor="definitions"><name>Definitions</name>
<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this 
document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>

<t>The key word "CFBL" in this document is the abbreviation for "complaint feedback loop" and will hereafter be used.</t>

<t>Syntax descriptions use ABNF <xref target="RFC5234"/> <xref target="RFC7405"/>.</t>

</section>
<section anchor="requirements"><name>Requirements</name>

<section anchor="received-message"><name>Received Message</name>
<t>This section describes the requirements that a received message, the message that is sent from the Message Originator to the Mailbox Provider and about which a report is to be sent later, must meet.</t>

<section anchor="strict"><name>Strict</name>
<t>If the domain in the <xref target="RFC5322"/>.From and the domain in the CFBL-Address header field are identical, this domain MUST be matched by a valid
<xref target="DKIM"/> signature. In this case, the DKIM "d=" parameter and the <xref target="RFC5322"/>.From field have identical domains.
This signature MUST meet the requirements described in <xref target="received-message-dkim-signature"></xref>.</t>

<t>The following example meets this case:</t>

<figure><artwork><![CDATA[
Return-Path: <sender@mailer.example.com>
From: Awesome Newsletter <newsletter@example.com>
To: receiver@example.org
Subject: Super awesome deals for you
CFBL-Address: fbl@example.com; report=arf
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@mailer.example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com; s=news;
       h=Subject:From:To:Message-ID:CFBL-Feedback-ID:CFBL-Address;

This is a super awesome newsletter.
]]></artwork></figure>

</section>
<section anchor="relaxed"><name>Relaxed</name>
<t>If the domain in CFBL-Address header field is a child domain of the <xref target="RFC5322"/>.From, the <xref target="RFC5322"/>.From domain MUST be matched by a valid <xref target="DKIM"/> signature. 
In this case, the DKIM "d=" parameter and the <xref target="RFC5322"/>.From domain have a identical (Example 1) or parent (Example 2) domain.
This signature MUST meet the requirements described in <xref target="received-message-dkim-signature"></xref>.</t>

<t>Example 1:</t>

<figure><artwork><![CDATA[
Return-Path: <sender@mailer.example.com>
From: Awesome Newsletter <newsletter@mailer.example.com>
To: receiver@example.org
Subject: Super awesome deals for you
CFBL-Address: fbl@mailer.example.com; report=arf
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@mailer.example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com;
      h=Content-Type:Subject:From:To:Message-ID:
      CFBL-Feedback-ID:CFBL-Address;

This is a super awesome newsletter.
]]></artwork></figure>

<t>Example 2:</t>

<figure><artwork><![CDATA[
Return-Path: <sender@mailer.example.com>
From: Awesome Newsletter <newsletter@example.com>
To: receiver@example.org
Subject: Super awesome deals for you
CFBL-Address: fbl@mailer.example.com; report=arf
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@mailer.example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com;
      h=Content-Type:Subject:From:To:Message-ID:
      CFBL-Feedback-ID:CFBL-Address;

This is a super awesome newsletter.
]]></artwork></figure>

</section>
<section anchor="third-party-address"><name>Third Party Address</name>
<t>If the domain in <xref target="RFC5322"/>.From differs from the domain in the CFBL-Address header field, an additional valid <xref target="DKIM"/> signature MUST be added that matches the domain in the CFBL-Address header field.
The other existing valid <xref target="DKIM"/> signature MUST match the domain in the <xref target="RFC5322"/>.From header field. 
This double DKIM signature ensures that both, the domain owner of the <xref target="RFC5322"/>.From domain and the domain owner of the CFBL-Address domain, agree who should receive the Feedback Messages.
Both signature MUST meet the requirements described in <xref target="received-message-dkim-signature"></xref>.</t>

<t>The following example meets this case:</t>

<figure><artwork><![CDATA[
Return-Path: <sender@saas-mailer.example>
From: Awesome Newsletter <newsletter@example.com>
To: receiver@example.org
Subject: Super awesome deals for you
CFBL-Address: fbl@saas-mailer.example; report=arf
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=saas-mailer.example; s=system;
       h=Subject:From:To:Message-ID:CFBL-Feedback-ID:CFBL-Address;
DKIM-Signature: v=1; a=rsa-sha256; d=example.com; s=news;
       h=Subject:From:To:Message-ID:CFBL-Feedback-ID:CFBL-Address;
       
This is a super awesome newsletter.
]]></artwork></figure>

<t>An Email Service Provider may accept pre-signed messages from its Message Authors, making it impossible for it to apply the double signature described above, 
in which case the double signature MUST BE omitted and the Email Service Provider MUST sign with its domain.
Therefore, the pre-signed message MUST NOT include "CFBL-Address" and "CFBL-Feedback-ID" in its h= tag.</t>

<t>This way the Email Service Provider has the possibility to accept the pre-signed messages and can inject their own CFBL-Address.</t>

<t>The following example meets this case:</t>

<figure><artwork><![CDATA[
Return-Path: <newsletter@example.com>
From: Awesome Newsletter <newsletter@example.com>
To: receiver@example.org
Subject: Super awesome deals for you
CFBL-Address: fbl@saas-mailer.example; report=arf
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com; s=news;
       h=Subject:From:To:Message-ID;
DKIM-Signature: v=1; a=rsa-sha256; d=saas-mailer.example; s=system;
       h=Subject:From:To:Message-ID:CFBL-Feedback-ID:CFBL-Address;

This is a super awesome newsletter.
]]></artwork></figure>

</section>
<section anchor="received-message-dkim-signature"><name>DKIM Signature</name>
<t>When present, CFBL-Address and CFBL-Feedback-ID header fields MUST be included in the "h=" tag of the aforementioned valid DKIM signature.</t>

<t>If the domain is neither matched by a valid DKIM signature nor the header field is covered by the "h=" tag, the Mailbox Provider SHALL NOT send a report message.</t>

</section>
</section>
<section anchor="multiple-cfbl-address-header-fields"><name>Multiple CFBL-Address Header Fields</name>
<t>A Message can only have exactly one CFBL-Address header field. All further occurrences of the CFBL-Address header field MUST be ignored after the first valid occurrence.</t>

</section>
<section anchor="cfbl-feedback-id-header-field"><name>CFBL-Feedback-ID Header Field</name>
<t>The Message Originator MAY include a CFBL-Feedback-ID header field in its messages out of various reasons, e.g. their feedback loop processing system can't do anything with the Message-ID header field.</t>

<t>It is RECOMMENDED that the header field include a hard to forge protection component such as an <xref target="HMAC"/> using a secret key, instead of a plain-text string.</t>

</section>
<section anchor="receiving-report-address"><name>Receiving Report Address</name>
<t>The receiving report address provided in the CFBL-Address header field MUST accept <xref target="ARF"/> reports.</t>

<t>The Message Originator can OPTIONALLY request a <xref target="XARF"/> report, as described in <xref target="xarf-report"></xref>.</t>

</section>
<section anchor="complaint-report"><name>Feedback Message</name>
<t>The Feedback Message (sent by Mailbox Provider to the address provided in the CFBL-Address header field) MUST have a valid <xref target="DKIM"/> signature.
This signature MUST match the <xref target="RFC5322"/>.From domain of the Feedback Message.</t>

<t>If the message does not have the required valid <xref target="DKIM"/> signature, the Message Originator SHALL NOT process this Feedback Message.</t>

<t>The Feedback Message MUST be a <xref target="ARF"/> or <xref target="XARF"/> report.
If the Message Originator requests it (described in <xref target="xarf-report"></xref>), and it is technically possible for the Mailbox Provider to do so, the Feedback Message MUST be a <xref target="XARF"/> report, otherwise the Feedback Message MUST be a <xref target="ARF"/> report.</t>

<t>The third MIME part of the <xref target="ARF"/> or the "Samples" section of the <xref target="XARF"/> report MUST contain the Message-ID <xref target="MAIL"/> of the received message.
If present, the header field "CFBL-Feedback-ID" of the received message MUST be added additionally to the third MIME part of the <xref target="ARF"/> or to "Samples" section of the <xref target="XARF"/> report.</t>

<t>The Mailbox Provider MAY omit or redact, as described in <xref target="RFC6590"/>, all further header fields and/or body to comply with any data-regulation laws.</t>

<section anchor="xarf-report"><name>XARF Report</name>
<t>A Message Originator wishing to receive a <xref target="XARF"/> report MUST append "report=xarf" to the <xref target="cfbl-address-header-field">CFBL-Address header field</xref>.
The report parameter is separated from the report address by a ";".</t>

<t>The resulting header field would look like the following:</t>

<figure><artwork><![CDATA[
CFBL-Address: fbl@example.com; report=xarf
]]></artwork></figure>

</section>
</section>
</section>
<section anchor="implementation"><name>Implementation</name>

<section anchor="message-originator"><name>Message Originator</name>
<t>A Message Originator who wishes to use this new mechanism to receive Feedback Messages MUST include a CFBL-Address header field in their messages.</t>

<t>It is RECOMMENDED that these Feedback Messages be processed automatically. Each Message Originator must decide for themselves what action to take after receiving a Feedback Message.</t>

<t>The Message Originator MUST take action to address the described requirements in <xref target="requirements"></xref>.</t>

</section>
<section anchor="mailbox-provider"><name>Mailbox Provider</name>
<t>A Mailbox Provider who wants to collect user actions that indicate the message was not wanted and send a Feedback Message to the Message Originator, 
they MAY query the CFBL-Address header field and forward the report to the provided complaint feedback loop address.</t>

<t>The Mailbox Provider MUST validate the requirements described in <xref target="requirements"></xref> and 
MUST take action to address the requirements described in <xref target="requirements"></xref> when sending Feedback Messages.</t>

</section>
</section>
<section anchor="header-field-syntax"><name>Header Field Syntax</name>

<section anchor="cfbl-address-header-field"><name>CFBL-Address</name>
<t>The following ABNF imports fields, CFWS, CRLF and addr-spec from <xref target="MAIL"/>.
The CFBL-Address header field is compatible with <xref target="RFC6532"/>.</t>

<figure><sourcecode type="abnf"><![CDATA[
fields =/ cfbl-address

cfbl-address = "CFBL-Address:" CFWS addr-spec
               [";" CFWS report-format] CRLF

report-format = %s"report=" (%s"arf" / %s"xarf")
]]></sourcecode></figure>

</section>
<section anchor="cfbl-feedback-id"><name>CFBL-Feedback-ID</name>
<t>The following ABNF imports fields, WSP, CRLF and atext from <xref target="MAIL"/>.</t>

<figure><sourcecode type="abnf"><![CDATA[
fields =/ cfbl-feedback-id

cfbl-feedback-id = "CFBL-Feedback-ID:" CFWS fid CRLF

fid = 1*(atext / ":" / CFWS)
]]></sourcecode></figure>

<t>Whitespace is ignored in the fid value and MUST be ignored when reassembling the original feedback id.<br />
In particular, when adding the header field the Message Originator can safely insert CFWS in the fid value in arbitrary places to conform to line-length limits.</t>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>
<t>This section discusses possible security issues, and their possible solutions, of a complaint feedback loop address header field.</t>

<section anchor="attacks-on-the-feedback-loop-address"><name>Attacks on the Feedback Loop Address</name>
<t>Like any other email address, a complaint feedback loop address can be an attack vector for malicious messages.
For example, complaint feedback loop addresses can be flooded with spam.
This is an existing problem with any existing email address and is not created by this document.</t>

</section>
<section anchor="automatic-suspension-of-an-account"><name>Automatic Suspension of an Account</name>
<t>Receiving a Feedback Message regarding a Message Author can cause the Message Author to be unreachable if an automatic account suspension occurs too quickly.
An example: someone sends an invitation to their friends. For some reason, someone marks this message as spam.</t>

<t>Now, if there is too fast automatic account suspension, the Message Author's account will be blocked and the Message Author will not be able to access their emails 
or is able to send further messages, depending on the account suspension the Message Originator has chosen.</t>

<t>Message Originators must take appropriate measures to prevent too fast account suspensions.
Message Originators therefore have - mostly proprietary - ways to assess the trustworthiness of an account.
For example, Message Originators may take into account the age of the account and/or any previous account suspension before suspending an account.</t>

</section>
<section anchor="enumeration-attacks-provoking-unsubscription"><name>Enumeration Attacks / Provoking Unsubscription</name>
<t>A malicious person may send a series of spoofed ARF messages to known complaint feedback loop addresses and attempt to guess a Message-ID/CFBL-Feedback-ID or any other identifiers.
The malicious person may attempt to mass unsubscribe/suspend if such an automated system is in place.
This is also an existing problem with the current feedback loop implementation and/or One-Click Unsubscription <xref target="RFC8058"/>.</t>

<t>The Message Originator must take appropriate measures, a countermeasure would be, that the CFBL-Feedback-ID header field, 
if used, use a hard-to-forge component such as a <xref target="HMAC"/> with a secret key instead of a plaintext string to make an enumeration attack impossible.</t>

</section>
<section anchor="data-privacy"><name>Data Privacy</name>
<t>The provision of such a header field itself does not pose a data privacy issue.
The resulting ARF/XARF report sent by the Mailbox Provider to the Message Originator may violate a data privacy law because it may contain personal data.</t>

<t>This document already addresses some parts of this problem and describes a data privacy safe way to send a Feedback Message.
As described in <xref target="complaint-report"></xref>, the Mailbox Provider can omit the entire body and/or header field and send only the required fields.
As recommended in <xref target="RFC6590"/>, the Mailbox Provider can also redact the data in question.
Nevertheless, each Mailbox Provider must consider for itself whether this implementation is acceptable and complies with existing data privacy laws in their country.</t>

<t>As described in <xref target="complaint-report"></xref> and in <xref target="cfbl-feedback-id-header-field"></xref>, it is also strongly RECOMMENDED that the Message-ID and, if used, the CFBL-Feedback-ID.
contain a component that is difficult to forge, such as a <xref target="HMAC"/> that uses a secret key, rather than a plaintext string.
See <xref target="hmac-example"></xref> for an example.</t>

</section>
<section anchor="abusing-for-validity-and-existence-queries"><name>Abusing for Validity and Existence Queries</name>
<t>This mechanism could be abused to determine the validity and existence of an email address, which exhibits another potential data privacy issue.
Now, if the Mailbox Provider has an automatic process to generate a Feedback Message for a received message, it may not be doing the mailbox owner any favors.
As the Mailbox Provider now generates an automatic Feedback Message for the received message, the Mailbox Provider now proves to the Message Originator that this mailbox exists for sure, because it is based on a manual action of the mailbox owner.</t>

<t>The receiving Mailbox Provider must take appropriate measures. One possible countermeasure could be, for example, pre-existing reputation data, usually proprietary data.
Using this data, the Mailbox Provider can assess the trustworthiness of a Message Originator and decide whether to send a Feedback Message based on this information.</t>

</section>
</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<section anchor="cfbl-address"><name>CFBL-Address</name>
<t>The IANA is requested to register a new header field, per <xref target="RFC3864"/>, into the "Provisional Message Header Field Names" registry:</t>

<figure><sourcecode type="abnf"><![CDATA[
Header field name: CFBL-Address
  
Applicable protocol: mail

Status: provisional

Author/Change controller: Jan-Philipp Benecke <jpb@cleverreach.com>

Specification document: this document
]]></sourcecode></figure>

</section>
<section anchor="cfbl-feedback-id-1"><name>CFBL-Feedback-ID</name>
<t>The IANA is requested to register a new header field, per <xref target="RFC3864"/>, into the "Provisional Message Header Field Names" registry:</t>

<figure><sourcecode type="abnf"><![CDATA[
Header field name: CFBL-Feedback-ID

Applicable protocol: mail

Status: provisional

Author/Change controller: Jan-Philipp Benecke <jpb@cleverreach.com>

Specification document: this document
]]></sourcecode></figure>

</section>
</section>
<section anchor="examples"><name>Examples</name>
<t>For simplicity the DKIM header field has been shortened, and some tags have been omitted.</t>

<section anchor="simple"><name>Simple</name>
<t>Email about the report will be generated:</t>

<figure><artwork><![CDATA[
Return-Path: <sender@mailer.example.com>
From: Awesome Newsletter <newsletter@example.com>
To: me@example.net
Subject: Super awesome deals for you
CFBL-Address: fbl@example.com; report=arf
CFBL-Feedback-ID: 111:222:333:4444
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@mailer.example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com; s=news;
       h=Subject:From:To:Message-ID:CFBL-Feedback-ID:CFBL-Address;

This is a super awesome newsletter.
]]></artwork></figure>

<t>Resulting ARF report:</t>

<figure><artwork><![CDATA[
------=_Part_240060962_1083385345.1592993161900
Content-Type: message/feedback-report
Content-Transfer-Encoding: 7bit

Feedback-Type: abuse
User-Agent: FBL/0.1
Version: 0.1
Original-Mail-From: sender@mailer.example.com
Arrival-Date: Tue, 23 Jun 2020 06:31:38 GMT
Reported-Domain: example.com
Source-IP: 192.0.2.1

------=_Part_240060962_1083385345.1592993161900
Content-Type: text/rfc822; charset=UTF-8
Content-Transfer-Encoding: 7bit

Return-Path: <sender@mailer.example.com>
From: Awesome Newsletter <newsletter@example.com>
To: me@example.net
Subject: Super awesome deals for you
CFBL-Address: fbl@example.com; report=arf
CFBL-Feedback-ID: 111:222:333:4444
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@mailer.example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com; s=news;
       h=Subject:From:To:Message-ID:CFBL-Feedback-ID:CFBL-Address;

This is a super awesome newsletter.
------=_Part_240060962_1083385345.1592993161900--
]]></artwork></figure>

</section>
<section anchor="data-privacy-safe-report"><name>Data Privacy Safe Report</name>
<t>Email about the report will be generated:</t>

<figure><artwork><![CDATA[
Return-Path: <sender@mailer.example.com>
From: Awesome Newsletter <newsletter@example.com>
To: me@example.net
Subject: Super awesome deals for you
CFBL-Address: fbl@example.com; report=arf
CFBL-Feedback-ID: 111:222:333:4444
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@mailer.example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com; s=news;
       h=Subject:From:To:Message-ID:CFBL-Feedback-ID:CFBL-Address;

This is a super awesome newsletter.
]]></artwork></figure>

<t>Resulting ARF report contains only the CFBL-Feedback-ID:</t>

<figure><artwork><![CDATA[
------=_Part_240060962_1083385345.1592993161900
Content-Type: message/feedback-report
Content-Transfer-Encoding: 7bit

Feedback-Type: abuse
User-Agent: FBL/0.1
Version: 0.1
Original-Mail-From: sender@mailer.example.com
Arrival-Date: Tue, 23 Jun 2020 06:31:38 GMT
Reported-Domain: example.com
Source-IP: 2001:DB8::25

------=_Part_240060962_1083385345.1592993161900
Content-Type: text/rfc822-headers; charset=UTF-8
Content-Transfer-Encoding: 7bit

CFBL-Feedback-ID: 111:222:333:4444
------=_Part_240060962_1083385345.1592993161900--
]]></artwork></figure>

</section>
<section anchor="hmac-example"><name>Data Privacy Safe Report with HMAC</name>
<t>Email about the report will be generated:</t>

<figure><artwork><![CDATA[
Return-Path: <sender@mailer.example.com>
From: Awesome Newsletter <newsletter@example.com>
To: me@example.net
Subject: Super awesome deals for you
CFBL-Address: fbl@example.com; report=arf
CFBL-Feedback-ID: 3789e1ae1938aa2f0dfdfa48b20d8f8bc6c21ac34fc5023d
       63f9e64a43dfedc0
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@mailer.example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com; s=news;
       h=Subject:From:To:Message-ID:CFBL-Feedback-ID:CFBL-Address;

This is a super awesome newsletter.
]]></artwork></figure>

<t>Resulting ARF report contains only the CFBL-Feedback-ID:</t>

<figure><artwork><![CDATA[
------=_Part_240060962_1083385345.1592993161900
Content-Type: message/feedback-report
Content-Transfer-Encoding: 7bit

Feedback-Type: abuse
User-Agent: FBL/0.1
Version: 0.1
Original-Mail-From: sender@mailer.example.com
Arrival-Date: Tue, 23 Jun 2020 06:31:38 GMT
Reported-Domain: example.com
Source-IP: 2001:DB8::25

------=_Part_240060962_1083385345.1592993161900
Content-Type: text/rfc822-headers; charset=UTF-8
Content-Transfer-Encoding: 7bit

CFBL-Feedback-ID: 3789e1ae1938aa2f0dfdfa48b20d8f8bc6c21ac34fc5023d
       63f9e64a43dfedc0
------=_Part_240060962_1083385345.1592993161900--
]]></artwork></figure>

</section>
</section>
<section anchor="acknowledgments"><name>Acknowledgments</name>
<t>Technical and editorial reviews were provided by the colleagues at CleverReach, 
the colleagues at Certified Senders Alliance and eco.de, 
Arne Allisat, Tobias Herkula and Levent Ulucan (1&amp;1 Mail &amp; Media) and Sven Krohlas (BFK Edv-consulting).</t>

</section>


  </middle>

  <back>


    <references title='Normative References'>

<reference anchor="XARF" >
  <front>
    <title>eXtended Abuse Reporting Format</title>
    <author >
      <organization>Abusix</organization>
    </author>
    <date />
  </front>
  <seriesInfo name="Web" value="https://github.com/abusix/xarf"/>
</reference>




<reference anchor='RFC6449'>
<front>
<title>Complaint Feedback Loop Operational Recommendations</title>
<author fullname='J. Falk' initials='J.' role='editor' surname='Falk'><organization/></author>
<date month='November' year='2011'/>
<abstract><t>Complaint Feedback Loops similar to those described herein have existed for more than a decade, resulting in many de facto standards and best practices.  This document is an attempt to codify, and thus clarify, the ways that both providers and consumers of these feedback mechanisms intend to use the feedback, describing some already common industry practices.</t><t>This document is the result of cooperative efforts within the Messaging Anti-Abuse Working Group, a trade organization separate from the IETF.  The original MAAWG document upon which this document is based was published in April, 2010.  This document does not represent the consensus of the IETF; rather it is being published as an Informational RFC to make it widely available to the Internet community and simplify reference to this material from IETF work. This document is not an Internet Standards Track specification; it is published for informational purposes.</t></abstract>
</front>
<seriesInfo name='RFC' value='6449'/>
<seriesInfo name='DOI' value='10.17487/RFC6449'/>
</reference>



<reference anchor='RFC2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='RFC8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<date month='May' year='2017'/>
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>



<reference anchor='RFC5234'>
<front>
<title>Augmented BNF for Syntax Specifications: ABNF</title>
<author fullname='D. Crocker' initials='D.' role='editor' surname='Crocker'><organization/></author>
<author fullname='P. Overell' initials='P.' surname='Overell'><organization/></author>
<date month='January' year='2008'/>
<abstract><t>Internet technical specifications often need to define a formal syntax.  Over the years, a modified version of Backus-Naur Form (BNF), called Augmented BNF (ABNF), has been popular among many Internet specifications.  The current specification documents ABNF. It balances compactness and simplicity with reasonable representational power.  The differences between standard BNF and ABNF involve naming rules, repetition, alternatives, order-independence, and value ranges.  This specification also supplies additional rule definitions and encoding for a core lexical analyzer of the type common to several Internet specifications.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='68'/>
<seriesInfo name='RFC' value='5234'/>
<seriesInfo name='DOI' value='10.17487/RFC5234'/>
</reference>



<reference anchor='RFC7405'>
<front>
<title>Case-Sensitive String Support in ABNF</title>
<author fullname='P. Kyzivat' initials='P.' surname='Kyzivat'><organization/></author>
<date month='December' year='2014'/>
<abstract><t>This document extends the base definition of ABNF (Augmented Backus-Naur Form) to include a way to specify US-ASCII string literals that are matched in a case-sensitive manner.</t></abstract>
</front>
<seriesInfo name='RFC' value='7405'/>
<seriesInfo name='DOI' value='10.17487/RFC7405'/>
</reference>



<reference anchor='RFC5322'>
<front>
<title>Internet Message Format</title>
<author fullname='P. Resnick' initials='P.' role='editor' surname='Resnick'><organization/></author>
<date month='October' year='2008'/>
<abstract><t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of &quot;electronic mail&quot; messages.  This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, &quot;Standard for the Format of ARPA Internet Text Messages&quot;, updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5322'/>
<seriesInfo name='DOI' value='10.17487/RFC5322'/>
</reference>



<reference anchor='DKIM'>
<front>
<title>DomainKeys Identified Mail (DKIM) Signatures</title>
<author fullname='D. Crocker' initials='D.' role='editor' surname='Crocker'><organization/></author>
<author fullname='T. Hansen' initials='T.' role='editor' surname='Hansen'><organization/></author>
<author fullname='M. Kucherawy' initials='M.' role='editor' surname='Kucherawy'><organization/></author>
<date month='September' year='2011'/>
<abstract><t>DomainKeys Identified Mail (DKIM) permits a person, role, or organization that owns the signing domain to claim some responsibility for a message by associating the domain with the message.  This can be an author's organization, an operational relay, or one of their agents.  DKIM separates the question of the identity of the Signer of the message from the purported author of the message.  Assertion of responsibility is validated through a cryptographic signature and by querying the Signer's domain directly to retrieve the appropriate public key.  Message transit from author to recipient is through relays that typically make no substantive change to the message content and thus preserve the DKIM signature.</t><t>This memo obsoletes RFC 4871 and RFC 5672.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='76'/>
<seriesInfo name='RFC' value='6376'/>
<seriesInfo name='DOI' value='10.17487/RFC6376'/>
</reference>



<reference anchor='ARF'>
<front>
<title>An Extensible Format for Email Feedback Reports</title>
<author fullname='Y. Shafranovich' initials='Y.' surname='Shafranovich'><organization/></author>
<author fullname='J. Levine' initials='J.' surname='Levine'><organization/></author>
<author fullname='M. Kucherawy' initials='M.' surname='Kucherawy'><organization/></author>
<date month='August' year='2010'/>
<abstract><t>This document defines an extensible format and MIME type that may be used by mail operators to report feedback about received email to other parties.  This format is intended as a machine-readable replacement for various existing report formats currently used in Internet email.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5965'/>
<seriesInfo name='DOI' value='10.17487/RFC5965'/>
</reference>



<reference anchor='MAIL'>
<front>
<title>Internet Message Format</title>
<author fullname='P. Resnick' initials='P.' role='editor' surname='Resnick'><organization/></author>
<date month='October' year='2008'/>
<abstract><t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of &quot;electronic mail&quot; messages.  This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, &quot;Standard for the Format of ARPA Internet Text Messages&quot;, updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5322'/>
<seriesInfo name='DOI' value='10.17487/RFC5322'/>
</reference>



<reference anchor='RFC6532'>
<front>
<title>Internationalized Email Headers</title>
<author fullname='A. Yang' initials='A.' surname='Yang'><organization/></author>
<author fullname='S. Steele' initials='S.' surname='Steele'><organization/></author>
<author fullname='N. Freed' initials='N.' surname='Freed'><organization/></author>
<date month='February' year='2012'/>
<abstract><t>Internet mail was originally limited to 7-bit ASCII.  MIME added support for the use of 8-bit character sets in body parts, and also defined an encoded-word construct so other character sets could be used in certain header field values.  However, full internationalization of electronic mail requires additional enhancements to allow the use of Unicode, including characters outside the ASCII repertoire, in mail addresses as well as direct use of Unicode in header fields like &quot;From:&quot;, &quot;To:&quot;, and &quot;Subject:&quot;, without requiring the use of complex encoded-word constructs.  This document specifies an enhancement to the Internet Message Format and to MIME that allows use of Unicode in mail addresses and most header field content.</t><t>This specification updates Section 6.4 of RFC 2045 to eliminate the restriction prohibiting the use of non-identity content-transfer- encodings on subtypes of &quot;message/&quot;.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6532'/>
<seriesInfo name='DOI' value='10.17487/RFC6532'/>
</reference>




    </references>

    <references title='Informative References'>





<reference anchor='RFC8058'>
<front>
<title>Signaling One-Click Functionality for List Email Headers</title>
<author fullname='J. Levine' initials='J.' surname='Levine'><organization/></author>
<author fullname='T. Herkula' initials='T.' surname='Herkula'><organization/></author>
<date month='January' year='2017'/>
<abstract><t>This document describes a method for signaling a one-click function for the List-Unsubscribe email header field.  The need for this arises out of the actuality that mail software sometimes fetches URLs in mail header fields, and thereby accidentally triggers unsubscriptions in the case of the List-Unsubscribe header field.</t></abstract>
</front>
<seriesInfo name='RFC' value='8058'/>
<seriesInfo name='DOI' value='10.17487/RFC8058'/>
</reference>



<reference anchor='HMAC'>
<front>
<title>HMAC: Keyed-Hashing for Message Authentication</title>
<author fullname='H. Krawczyk' initials='H.' surname='Krawczyk'><organization/></author>
<author fullname='M. Bellare' initials='M.' surname='Bellare'><organization/></author>
<author fullname='R. Canetti' initials='R.' surname='Canetti'><organization/></author>
<date month='February' year='1997'/>
<abstract><t>This document describes HMAC, a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative cryptographic hash function, e.g., MD5, SHA-1, in combination with a secret shared key.  The cryptographic strength of HMAC depends on the properties of the underlying hash function.  This memo provides information for the Internet community.  This memo does not specify an Internet standard of any kind</t></abstract>
</front>
<seriesInfo name='RFC' value='2104'/>
<seriesInfo name='DOI' value='10.17487/RFC2104'/>
</reference>



<reference anchor='RFC6590'>
<front>
<title>Redaction of Potentially Sensitive Data from Mail Abuse Reports</title>
<author fullname='J. Falk' initials='J.' role='editor' surname='Falk'><organization/></author>
<author fullname='M. Kucherawy' initials='M.' role='editor' surname='Kucherawy'><organization/></author>
<date month='April' year='2012'/>
<abstract><t>Email messages often contain information that might be considered private or sensitive, per either regulation or social norms.  When such a message becomes the subject of a report intended to be shared with other entities, the report generator may wish to redact or elide the sensitive portions of the message.  This memo suggests one method for doing so effectively.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6590'/>
<seriesInfo name='DOI' value='10.17487/RFC6590'/>
</reference>



<reference anchor='RFC3864'>
<front>
<title>Registration Procedures for Message Header Fields</title>
<author fullname='G. Klyne' initials='G.' surname='Klyne'><organization/></author>
<author fullname='M. Nottingham' initials='M.' surname='Nottingham'><organization/></author>
<author fullname='J. Mogul' initials='J.' surname='Mogul'><organization/></author>
<date month='September' year='2004'/>
<abstract><t>This specification defines registration procedures for the message header fields used by Internet mail, HTTP, Netnews and other applications.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='90'/>
<seriesInfo name='RFC' value='3864'/>
<seriesInfo name='DOI' value='10.17487/RFC3864'/>
</reference>




    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

