SMTP TLS Reporting
draft-brotman-smtp-tlsrpt-00

Document Type Replaced Internet-Draft (individual)
Last updated 2016-04-25
Replaced by draft-ietf-uta-smtp-tlsrpt
Stream (None)
Intended RFC status (None)
Formats
Expired & archived
plain text pdf html bibtex
Stream Stream state (No stream defined)
Consensus Boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Replaced by draft-ietf-uta-smtp-tlsrpt
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-brotman-smtp-tlsrpt-00.txt

Abstract

A number of protocols exist for establishing encrypted channels between SMTP Mail Transfer Agents, including STARTTLS [RFC3207], DANE [RFC6698], and SMTP MTA STS (TODO: Add ref). These protocols can fail due to misconfiguration or active attack, leading to undelivered messages or delivery over unencrypted or unauthenticated channels. This document describes a reporting mechanism and format by which sending systems can share statistics and specific information about potential failures with recipient domains. Recipient domains can then use this information to both detect potential attackers and diagnose unintentional misconfigurations.

Authors

Daniel Margolis (dmargolis@google.com)
Alexander Brotman (alexander_brotman@cable.comcast)
Binu Ramakrishnan
Janet Jones
Mark Risher

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)