SMTP TLS Reporting

Document Type Replaced Internet-Draft (individual)
Authors Daniel Margolis  , Alex Brotman  , Binu Ramakrishnan  , Janet Jones  , Mark Risher 
Last updated 2016-04-25
Replaced by RFC 8460
Stream (None)
Intended RFC status (None)
Expired & archived
pdf htmlized (tools) htmlized bibtex
Stream Stream state (No stream defined)
Consensus Boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Replaced by draft-ietf-uta-smtp-tlsrpt
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at


A number of protocols exist for establishing encrypted channels between SMTP Mail Transfer Agents, including STARTTLS [RFC3207], DANE [RFC6698], and SMTP MTA STS (TODO: Add ref). These protocols can fail due to misconfiguration or active attack, leading to undelivered messages or delivery over unencrypted or unauthenticated channels. This document describes a reporting mechanism and format by which sending systems can share statistics and specific information about potential failures with recipient domains. Recipient domains can then use this information to both detect potential attackers and diagnose unintentional misconfigurations.


Daniel Margolis (
Alex Brotman (
Binu Ramakrishnan
Janet Jones
Mark Risher

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)