SMTP TLS Reporting

The information below is for an old version of the document
Document Type None Internet-Draft (uta WG)
Last updated 2017-07-12 (latest revision 2017-05-31)
Replaces draft-brotman-smtp-tlsrpt
Stream IETF
Intended RFC status (None)
Expired & archived
pdf htmlized bibtex
Additional URLs
- Mailing list discussion
Stream WG state (None)
Document shepherd No shepherd assigned
IESG IESG state Unknown state
Consensus Boilerplate Unknown
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at


A number of protocols exist for establishing encrypted channels between SMTP Mail Transfer Agents, including STARTTLS [RFC3207], DANE [RFC6698], and MTA-STS (TODO: Add ref). These protocols can fail due to misconfiguration or active attack, leading to undelivered messages or delivery over unencrypted or unauthenticated channels. This document describes a reporting mechanism and format by which sending systems can share statistics and specific information about potential failures with recipient domains. Recipient domains can then use this information to both detect potential attackers and diagnose unintentional misconfigurations.


Daniel Margolis (
Alexander Brotman (
Binu Ramakrishnan
Janet Jones
Mark Risher

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)