Skip to main content

SMTP TLS Reporting
draft-brotman-smtp-tlsrpt-00

Document Type Replaced Internet-Draft (individual)
Expired & archived
Authors Daniel Margolis , Alex Brotman , Binu Ramakrishnan , Janet Jones , Mark Risher
Last updated 2016-04-25
Replaced by draft-ietf-uta-smtp-tlsrpt
RFC stream (None)
Intended RFC status (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Replaced by draft-ietf-uta-smtp-tlsrpt
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

A number of protocols exist for establishing encrypted channels between SMTP Mail Transfer Agents, including STARTTLS [RFC3207], DANE [RFC6698], and SMTP MTA STS (TODO: Add ref). These protocols can fail due to misconfiguration or active attack, leading to undelivered messages or delivery over unencrypted or unauthenticated channels. This document describes a reporting mechanism and format by which sending systems can share statistics and specific information about potential failures with recipient domains. Recipient domains can then use this information to both detect potential attackers and diagnose unintentional misconfigurations.

Authors

Daniel Margolis
Alex Brotman
Binu Ramakrishnan
Janet Jones
Mark Risher

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)