Skip to main content

Sieve Email Filtering: Reject and Extended Reject Extensions
draft-ietf-sieve-refuse-reject-09

Revision differences

Document history

Date Rev. By Action
2012-08-22
09 (System) post-migration administrative database adjustment to the No Objection position for Pasi Eronen
2012-08-22
09 (System) post-migration administrative database adjustment to the No Objection position for Tim Polk
2012-08-22
09 (System) post-migration administrative database adjustment to the No Objection position for Russ Housley
2008-11-26
09 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2008-11-26
09 (System) IANA Action state changed to Waiting on RFC Editor from In Progress
2008-11-26
09 (System) IANA Action state changed to In Progress from Waiting on Authors
2008-11-26
09 (System) IANA Action state changed to Waiting on Authors from In Progress
2008-11-25
09 (System) IANA Action state changed to In Progress
2008-11-20
09 Cindy Morgan State Changes to RFC Ed Queue from Approved-announcement sent by Cindy Morgan
2008-11-19
09 Amy Vezza IESG state changed to Approved-announcement sent
2008-11-19
09 Amy Vezza IESG has approved the document
2008-11-19
09 Amy Vezza Closed "Approve" ballot
2008-11-19
09 Amy Vezza State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Amy Vezza
2008-11-18
09 Tim Polk [Ballot Position Update] Position for Tim Polk has been changed to No Objection from Undefined by Tim Polk
2008-11-18
09 Tim Polk [Ballot Position Update] Position for Tim Polk has been changed to Undefined from Discuss by Tim Polk
2008-11-18
09 Pasi Eronen [Ballot Position Update] Position for Pasi Eronen has been changed to No Objection from Discuss by Pasi Eronen
2008-11-17
09 (System) New version available: draft-ietf-sieve-refuse-reject-09.txt
2008-11-17
09 Russ Housley [Ballot Position Update] Position for Russ Housley has been changed to No Objection from Discuss by Russ Housley
2008-11-17
09 (System) Sub state has been changed to AD Follow up from New Id Needed
2008-11-17
08 (System) New version available: draft-ietf-sieve-refuse-reject-08.txt
2008-09-12
09 (System) Removed from agenda for telechat - 2008-09-11
2008-09-11
09 Amy Vezza State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Amy Vezza
2008-09-11
09 David Ward [Ballot Position Update] New position, No Objection, has been recorded by David Ward
2008-09-11
09 Mark Townsley [Ballot Position Update] New position, No Objection, has been recorded by Mark Townsley
2008-09-11
09 Jon Peterson [Ballot Position Update] New position, No Objection, has been recorded by Jon Peterson
2008-09-11
09 Pasi Eronen [Ballot comment]
For reference [Joe-DoS], it'd be nice to have some more
bibliographical information (such as name(s) of author(s), and
publication venue or URL).
2008-09-11
09 Pasi Eronen
[Ballot discuss]
I have reviewed draft-ietf-sieve-refuse-reject-07. Overall, the
document looks good, but I have the following concerns that I'd like
to discuss before recommending approval …
[Ballot discuss]
I have reviewed draft-ietf-sieve-refuse-reject-07. Overall, the
document looks good, but I have the following concerns that I'd like
to discuss before recommending approval of the document:

It's a bit strange to have "Updates: 3028" (and a normative
reference to RFC 3028) here, since RFC 3028 has been obsoleted by RFC
5228
. Perhaps changing RFC 3028's entry to say "Obsoleted by RFC5228,
RFCnnnn" would better reflect the situation?

The document says the main difference between 'reject' and 'ereject'
is that the latter allows SMTP/LMTP level rejection (and there are
some details about non-ASCII strings).  I think I understand this
part, but it seems there's another difference: the former talks about
sending an MDN, while the latter sends a DSN.

I'm not that familiar with the distinction between MDNs and DSNs (and
on first reading, thought they meant the same thing), and I think the
document would benefit from short description here, reminding readers
that they're not the same thing, and explaining why 'reject' and
'ereject' do things differently.

From Carl Wallace's SecDir review:

Section 2.1: as noted in Tim's DISCUSS, the text about "return-path
verification", and discarding the message is that fails, needs some
more text explaining this step. Also, why this step doesn't apply to
the 'reject' action? (I'd think implementations of 'reject' would also
do it...).
2008-09-11
09 Pasi Eronen [Ballot Position Update] New position, Discuss, has been recorded by Pasi Eronen
2008-09-10
09 Cullen Jennings [Ballot Position Update] New position, No Objection, has been recorded by Cullen Jennings
2008-09-10
09 Cullen Jennings [Ballot comment]
Support Tim's discuss
2008-09-10
09 Ross Callon [Ballot Position Update] New position, No Objection, has been recorded by Ross Callon
2008-09-10
09 Ron Bonica [Ballot Position Update] New position, No Objection, has been recorded by Ron Bonica
2008-09-10
09 Russ Housley
[Ballot discuss]
Please consider the comments provided by Spencer Dawkins in his Gen-ART
  Review.  Spencer asked some clarity questions, and he asked two technical …
[Ballot discuss]
Please consider the comments provided by Spencer Dawkins in his Gen-ART
  Review.  Spencer asked some clarity questions, and he asked two technical
  questions  involving RFC 2119 language.  I have not seen a response to
  this review, and it deserves one.
2008-09-10
09 Russ Housley [Ballot Position Update] New position, Discuss, has been recorded by Russ Housley
2008-09-10
09 Tim Polk
[Ballot discuss]
Personal Note: As an email user, I greatly appreciate the authors and wgs efforts to defend
against joe-jobs.  Supporting message rejection before delivery …
[Ballot discuss]
Personal Note: As an email user, I greatly appreciate the authors and wgs efforts to defend
against joe-jobs.  Supporting message rejection before delivery seems like an important
step forward.  Thanks!

Second Note:  AFAIK, Carl Wallace's secdir review (submitted 8/14/08) has not received a
response, so I integrated his issues into my own review.  If his issues were addressed and
have been resolved, please let me know! 

The document reads well and is generally very clear.  There are a few issues that should be
addressed before publication, though.  I am particularly concerned about the circumstances
for silent discard and conformance requirements for ereject implementations:

(1) In section 2.1, the second ereject action is a silent discard "if a return-path
verification clearly indicates that the message has a forged return-path".

This seems underspecified.  As noted in Carl's secdir review, there is no definition
for return-path verification and (unlike actions 1 and 3) no further information in
this spec. Is there an accepted algorithm for determining a forged return-path?  If so,
a reference would be very helpful.

In the absence of a solid reference, this step is worriesome. My concern is this: silent
discard of a legitimate message in a store-and-forward application constitutes an
undetectable denial of service attack.  Email has become an essential business tool.  If
an implementor relies on bad heuristics to make this determination, the results could
be ugly.

To be clear I am not advocating removal of silent discard.  I am sure that it is quite
reasonable under specific circumstances.  I just would like the document to spell out
the circumstances where the wg believes this action to be appropriate.

(2) To expand on the second issue in Carl's secdir review, the conformance requirements for
implementations of ereject are unclear.  Section 2.1 lists three actions; the text before the
list implies that all three actions are optional to implement, and that an implementation
could conceivably support just one of the three options.

However, the sentence following the list implies that action 1 is a MUST implement which
seems consistent with the first sentence in 2.1.1.  The text in Section 2.1.2 implies that
action 3 can only be used under limited circumstances.  (There is no corresponding subsection for action 2).

Please review for clarity and consider adding a subsection to address the applicability of
action 2.

[For completeness, here is the corresponding text from Carl's review:

- The first sentence of Section 2.1.1 states "implementations that are
able to reject messages at the SMTP/LMTP level MUST do so and SHOULD use
the 550 response code".  This doesn't allow for cases where protocol
level rejection cannot be performed.  This MUST should be a SHOULD or be
followed by a list of exceptional cases.  As a MUST, it is inconsistent
with the SHOULD in section 2 that covers the list of preferred actions. ]
2008-09-10
09 Tim Polk
[Ballot discuss]
Personal Note: As an email user, I greatly appreciate the authors and wgs efforts to defend
against joe-jobs.  Supporting message rejection before delivery …
[Ballot discuss]
Personal Note: As an email user, I greatly appreciate the authors and wgs efforts to defend
against joe-jobs.  Supporting message rejection before delivery seems like an important
step forward.  Thanks!

Second Note:  AFAIK, Carl Wallace's secdir review (submitted 8/14/08) has not received a
response, so I integrated his issues into my own review.  If his issues were addressed and
have been resolved, please let me know! 

The document reads well and is generally very clear.  There are a few issues that should be
addressed before publication, though.  I am particularly concerned about the circumstances
for silent discard and conformance requirements for ereject implementations:

(1) In section 2.1, the second ereject action is a silent discard "if a return-path
verification clearly indicates that the message has a forged return-path".

This seems underspecified.  As noted in Carl's secdir review, there is no definition
for return-path verification and (unlike actions 1 and 3) no further information in
this spec. Is there an accepted algorithm for determining a forged return-path?  If so,
a reference would be very helpful.

In the absence of a solid reference, this step is worriesome. My concern is this: silent
discard of a legitimate message in a store-and-forward application constitutes an
undetectable denial of service attack.  Email has become an essential business tool.  If
an implementor relies on bad heuristics to make this determination, the results could
be ugly.

To be clear I am not advocating removal of silent discard.  I am sure that it is quite
reasonable under specific circumstances.  I just would like the document to spell out
the circumstances where the wg believes this action to be appropriate.

(2) As noted in Carl's secdir review, the conformance requirements for implementations
of ereject are unclear.  Section 2.1 lists three actions; the text before the list implies that
all three actions are optional to implement, and that an implementation could conceivably
support just one of the three options.

However, the sentence following the list implies that action 1 is a MUST implement which
seems consistent with the first sentence in 2.1.1.  The text in Section 2.1.2 implies that
action 3 can only be used under limited circumstances.  (There is no corresponding subsection for action 2).

Please review for clarity and consider adding a subsection to address the applicability of
action 2.
2008-09-10
09 Tim Polk
[Ballot comment]
Additional issues that I do consider non-blocking but should probably be addressed:

(a)  The Security Considerations begins as follows:

  The Introduction to …
[Ballot comment]
Additional issues that I do consider non-blocking but should probably be addressed:

(a)  The Security Considerations begins as follows:

  The Introduction to this document discusses why rejecting messages
  before delivery is better than accepting and bouncing them.

There is no such discussion in the Introduction, just the following:

  Further discussion highlighting the risks of generating MDNs and the
  benefits of protocol-level refusal can be found in [Joe-DoS].

This is the reference provided for [Joe-DOS]:

  [Joe-DoS]  "Mail Non-Delivery Message DDoS Attacks", 4 2004.

but I have no idea how to find that document.

I would encourage the authors to add a brief discussion describing why
rejecting messages before delivery is better than accepting and bouncing them.
There is some nice text in the Abstract that would be an excellent starting point.

(b) I thought the security considerations omitted two useful concepts. 

The first is that upgrading current implementation of reject and use of the new ereject
extension will help mitigate some of problems identified in RFC 3834.  (This document
simply notes that it doesn't make it worse.)

The second issue is the silent discard problem noted in my discuss.  Consider noting
that silent discard of legitimate messages constitutes denial of service and that
determination of a forged return-path should be performed very carefully (e.g., only
if the referenced algorithm is performed?).

(c) From Carl's review:

    The first paragraph of section 2.3 is confusing.  Why is a user
    interface allowed to silently upgrade from reject to ereject but other
    implementations are not?  Are silent downgrades OK, i.e., for cases
    where ereject is not supported? 

Perhaps this text means that sieve intrepreters cannot replace reject with ereject,
but tools that generate sieve scripts are free to switch to ereject if the descriptive
representation is still satisfied?  That would be conssitent with the remainder of
section 2.3.

(d) from Carl's review:

  Reason text uses UTF-8 to align an SMTP language extension spec.  The
  reason text value may be inappropriate even if the client and server
  negotiate the use of an SMTP extension (i.e., a different language may
  be used by the client/server).  Should UTF-8 be used here without a
  normative reference to support it?   

(e) from Carl's review:

  There are some unexpanded acronyms, minimally MUA and MTA.
2008-09-10
09 Tim Polk
[Ballot discuss]
Personal Note: As an email user, I greatly appreciate the authors and wgs efforts to defend
against joe-jobs.  Supporting message rejection before delivery …
[Ballot discuss]
Personal Note: As an email user, I greatly appreciate the authors and wgs efforts to defend
against joe-jobs.  Supporting message rejection before delivery seems like an important
step forward.  Thanks!

Second Note:  AFAIK, Carl Wallace's secdir review (submitted 8/14/08) has not received a
response, so I integrated his issues into my own review.  If his issues were addressed and
have been resolved, please let me know!

The document reads well and is generally very clear.  There are a few issues that should be
addressed before publication, though.  I am particularly concerned about the circumstances
for silent discard and conformance requirements for ereject implementations:

(1) In section 2.1, the second ereject action is a silent discard "if a return-path
verification clearly indicates that the message has a forged return-path".

This seems underspecified.  As noted in Carl's secdir review, there is no definition
for return-path verification and (unlike actions 1 and 3) no further information in
this spec. Is there an accepted algorithm for determining a forged return-path?  If so,
a reference would be very helpful.

In the absence of a solid reference, this step seems a little dangerous. My concern
is this: silent discard of a legitimate message in a store-and-forward application
constitutes an undetectable denial of service attack.  Email has become an essential
business tool.  If an implementor relies on bad heuristics to make this determination,
the results could be ugly.

(2) As noted in Carl's secdir review, the conformance requirements for implementations
of ereject are unclear.  Section 2.1 lists three actions; the text before the list implies that
all three actions are optional to implement, and that an implementation could conceivably
support just one of the three options.

However, the sentence following the list implies that action 1 is a MUST implement which
seems consistent with the first sentence in 2.1.1.  The text in Section 2.1.2 implies that
action 3 can only be used under limited circumstances.  (There is no corresponding subsection for action 2).

Please review for clarity and consider adding a subsection to address the applicability of
action 2.
2008-09-10
09 Tim Polk [Ballot Position Update] New position, Discuss, has been recorded by Tim Polk
2008-09-10
09 Tim Polk
[Ballot comment]
Personal Note: As an email user, I greatly appreciate the authors and wgs efforts to defend
against joe-jobs.  Supporting message rejection before delivery …
[Ballot comment]
Personal Note: As an email user, I greatly appreciate the authors and wgs efforts to defend
against joe-jobs.  Supporting message rejection before delivery seems like an important
step forward.  Thanks!

Second Note:  AFAIK, Carl Wallace's secdir review (submitted 8/14/08) has not received a
response, so I integrated his issues into my own review.  If his issues were addressed and
have been resolved, please let me know!

The document reads well and is generally very clear.  There are a few issues that should be
addressed before publication, though.

(1)  The Security Considerations begins as follows:

  The Introduction to this document discusses why rejecting messages
  before delivery is better than accepting and bouncing them.

There is no such discussion in the Introduction, just the following:

  Further discussion highlighting the risks of generating MDNs and the
  benefits of protocol-level refusal can be found in [Joe-DoS].

This is the reference provided for [Joe-DOS]:

  [Joe-DoS]  "Mail Non-Delivery Message DDoS Attacks", 4 2004.

but I have no idea how to find that document.

I would encourage the authors to add a brief discussion describing why
rejecting messages before delivery is better than accepting and bouncing them.
There is some nice text in the Abstract that would be an excellent starting point.

(2) In section 2.1, the second ereject action is a silent discard "if a return-path
verification clearly indicates that the message has a forged return-path".

This seems underspecified.  As noted in Carl's secdir review, there is no definition
for return-path verification and (unlike actions 1 and 3) no further information in
this spec. Is there an accepted algorithm for determining a forged return-path?  If so,
a reference would be very helpful.

In the absence of a solid reference, this step seems a little dangerous. My concern
is this: silent discard of a legitimate message in a store-and-forward application
constitutes an undetectable denial of service attack.  Email has become an essential
business tool.  If an implementor relies on bad heuristics to make this determination,
the results could be ugly.

(3) I thought the security considerations omitted two useful concepts. 

The first is that upgrading current implementation of reject and use of the new ereject
extension will help mitigate some of problems identified in RFC 3834.  (This document
simply notes that it doesn't make it worse.)

The second issue is the silent discard.  Consider noting that silent discard of legitimate
messages constitutes denial of service and that determination of a forged return-path
should be performed very carefully.


- The first sentence of Section 2.1.1 states "implementations that are
able to reject messages at the SMTP/LMTP level MUST do so and SHOULD use
the 550 response code".  This doesn't allow for cases where protocol
level rejection cannot be performed.  This MUST should be a SHOULD or be
followed by a list of exceptional cases.  As a MUST, it is inconsistent
with the SHOULD in section 2 that covers the list of preferred actions.

- The first paragraph of section 2.3 is confusing.  Why is a user
interface allowed to silently upgrade from reject to ereject but other
implementations are not?  Are silent downgrades OK, i.e., for cases
where ereject is not supported? 

- Reason text uses UTF-8 to align an SMTP language extension spec.  The
reason text value may be inappropriate even if the client and server
negotiate the use of an SMTP extension (i.e., a different language may
be used by the client/server).  Should UTF-8 be used here without a
normative reference to support it?   

- There are some unexpanded acronyms, minimally MUA and MTA.
2008-09-10
09 Jari Arkko [Ballot Position Update] New position, Yes, has been recorded by Jari Arkko
2008-09-09
09 Dan Romascanu [Ballot Position Update] New position, No Objection, has been recorded by Dan Romascanu
2008-09-09
09 Magnus Westerlund [Ballot Position Update] New position, No Objection, has been recorded by Magnus Westerlund
2008-09-04
09 Chris Newman
[Ballot comment]
I have reviewed this in detail and believe the WG formed rough
consensus around this proposal.  I believe this proposal
appropriately balances the …
[Ballot comment]
I have reviewed this in detail and believe the WG formed rough
consensus around this proposal.  I believe this proposal
appropriately balances the competing goals of i18n, joe-job defenses
and backwards compatibility.

The person objecting during IETF last call claimed that Sun Microsystems
had an economic interest in this proposal.  I am not aware of any such
economic interest (if I were aware of such an interest, I would recuse).

If the WG had rough consensus on one of the previous versions of this
draft that paid less attention to the i18n and backwards compatibility
issues, I would have voted no objection to such a draft although I do
consider this version a better proposal.
2008-09-04
09 Chris Newman [Ballot Position Update] New position, Yes, has been recorded by Chris Newman
2008-09-03
09 Lisa Dusseault Placed on agenda for telechat - 2008-09-11 by Lisa Dusseault
2008-09-03
09 Lisa Dusseault State Changes to IESG Evaluation from Waiting for AD Go-Ahead by Lisa Dusseault
2008-09-03
09 Lisa Dusseault [Ballot Position Update] New position, Yes, has been recorded for Lisa Dusseault
2008-09-03
09 Lisa Dusseault Ballot has been issued by Lisa Dusseault
2008-09-03
09 Lisa Dusseault Created "Approve" ballot
2008-08-19
09 Samuel Weiler Request for Last Call review by SECDIR Completed. Reviewer: Carl Wallace.
2008-08-11
09 Amanda Baber
IANA Last Call comments:

Action #1:
Upon approval of this document, the IANA will make the following
changes in the "Sieve Extensions" registry at
http://www.iana.org/assignments/sieve-extensions …
IANA Last Call comments:

Action #1:
Upon approval of this document, the IANA will make the following
changes in the "Sieve Extensions" registry at
http://www.iana.org/assignments/sieve-extensions

OLD:
Capability name: reject
Description:
RFC number: [RFC3028]
Contact address: Tim Showalter


NEW:
Capability name: reject
Description: adds the "reject" action for refusing delivery
of a message. The exact reason for refusal is
conveyed back to the client.
RFC number: [RFC-ietf-sieve-refuse-reject-07.txt]
Contact address: the Sieve discussion list


Action #2:

IANA will remove the following from the "Sieve Extensions" registry
at http://www.iana.org/assignments/sieve-extensions

Capability name: refuse
Description:
RFC number:      [draft-elvey-refuse-sieve-01.txt]
Contact address: Matthew Elvey
                The Elvey Partnership, LLC
                3042 Sacramento-ietf St Ste 04
                San Francisco, CA
                U.S.A.
               

Action #3:

Upon approval of this document, the IANA will make the following
assignment in the "Sieve Extensions" registry at
http://www.iana.org/assignments/sieve-extensions

Capability name: ereject
Description: adds the 'ereject' action for refusing delivery
of a message. The refusal should happen as early
as possible (e.g. at the protocol level) and might
not preserve the exact reason for refusal if it
contains non-US-ASCII text.
RFC number: [RFC-ietf-sieve-refuse-reject-07.txt]
Contact address: the Sieve discussion list

We understand the above to be the only IANA Actions for this
document.
2008-08-10
09 (System) State has been changed to Waiting for AD Go-Ahead from In Last Call by system
2008-08-06
09 Samuel Weiler Request for Last Call review by SECDIR is assigned to Carl Wallace
2008-08-06
09 Samuel Weiler Request for Last Call review by SECDIR is assigned to Carl Wallace
2008-07-27
09 Amy Vezza Last call sent
2008-07-27
09 Amy Vezza State Changes to In Last Call from Last Call Requested by Amy Vezza
2008-07-27
09 Lisa Dusseault State Changes to Last Call Requested from AD Evaluation by Lisa Dusseault
2008-07-27
09 Lisa Dusseault Last Call was requested by Lisa Dusseault
2008-07-27
09 (System) Ballot writeup text was added
2008-07-27
09 (System) Last call text was added
2008-07-27
09 (System) Ballot approval text was added
2008-07-27
09 Lisa Dusseault State Changes to AD Evaluation from Publication Requested by Lisa Dusseault
2008-07-27
09 Lisa Dusseault
SIEVE Reject and Extended Reject extension WG Chairs Write-up for IESG.

draft-ietf-sieve-refuse-reject-07.txt - Proposed Standard

  (1.a)  Who is the Document Shepherd for this document?  …
SIEVE Reject and Extended Reject extension WG Chairs Write-up for IESG.

draft-ietf-sieve-refuse-reject-07.txt - Proposed Standard

  (1.a)  Who is the Document Shepherd for this document?  Has the
          Document Shepherd personally reviewed this version of the
          document and, in particular, does he or she believe this
          version is ready for forwarding to the IESG for publication?
         
          Shepherd: Cyrus Daboo  I have
          personally reviewed this document and believe it ready for
          submission to the IESG.

  (1.b)  Has the document had adequate review both from key WG members
          and from key non-WG members?  Does the Document Shepherd have
          any concerns about the depth or breadth of the reviews that
          have been performed?
         
          It has had adequate review from WG members. Not from non-WG
          members. No concerns with the nature of those reviews.

  (1.c)  Does the Document Shepherd have concerns that the document
          needs more review from a particular or broader perspective,
          e.g., security, operational complexity, someone familiar with
          AAA, internationalization or XML?
         
          No.

  (1.d)  Does the Document Shepherd have any specific concerns or
          issues with this document that the Responsible Area Director
          and/or the IESG should be aware of?  For example, perhaps he
          or she is uncomfortable with certain parts of the document, or
          has concerns whether there really is a need for it.  In any
          event, if the WG has discussed those issues and has indicated
          that it still wishes to advance the document, detail those
          concerns here.  Has an IPR disclosure related to this document
          been filed?  If so, please include a reference to the
          disclosure and summarize the WG discussion and conclusion on
          this issue.
         
          No concerns with this document.

  (1.e)  How solid is the WG consensus behind this document?  Does it
          represent the strong concurrence of a few individuals, with
          others being silent, or does the WG as a whole understand and
          agree with it?
         
          There is strong WG consensus behind this. Whilst one
          participant did feel that the specification needed to be much
          stronger in its wording and applicablility, the consensus of
          the rest was that that would unduely be a burden to
          implementations.

  (1.f)  Has anyone threatened an appeal or otherwise indicated extreme
          discontent?  If so, please summarise the areas of conflict in
          separate email messages to the Responsible Area Director.  (It
          should be in a separate email because this questionnaire is
          entered into the ID Tracker.)
         
          No.

  (1.g)  Has the Document Shepherd personally verified that the
          document satisfies all ID nits?  (See
          http://www.ietf.org/ID-Checklist.html and
          http://tools.ietf.org/tools/idnits/).  Boilerplate checks are
          not enough; this check needs to be thorough.  Has the document
          met all formal review criteria it needs to, such as the MIB
          Doctor, media type and URI type reviews?
         
          ID nits were checked and no problems found.

  (1.h)  Has the document split its references into normative and
          informative?  Are there normative references to documents that
          are not ready for advancement or are otherwise in an unclear
          state?  If such normative references exist, what is the
          strategy for their completion?  Are there normative references
          that are downward references, as described in [RFC3967]?  If
          so, list these downward references to support the Area
          Director in the Last Call procedure for them [RFC3967].
         
          References are split into two sections. There is one normative
          reference to the LMTP specification which is an Informational
          RFC. We request a variance to allow this downref.

  (1.i)  Has the Document Shepherd verified that the document IANA
          consideration section exists and is consistent with the body
          of the document?  If the document specifies protocol
          extensions, are reservations requested in appropriate IANA
          registries?  Are the IANA registries clearly identified?  If
          the document creates a new registry, does it define the
          proposed initial contents of the registry and an allocation
          procedure for future registrations?  Does it suggest a
          reasonable name for the new registry?  See [RFC2434].  If the
          document describes an Expert Review process has Shepherd
          conferred with the Responsible Area Director so that the IESG
          can appoint the needed Expert during the IESG Evaluation?
         
          Yes.

  (1.j)  Has the Document Shepherd verified that sections of the
          document that are written in a formal language, such as XML
          code, BNF rules, MIB definitions, etc., validate correctly in
          an automated checker?
         
          Yes.

  (1.k)  The IESG approval announcement includes a Document
          Announcement Write-Up.  Please provide such a Document
          Announcement Write-Up?  Recent examples can be found in the
          "Action" announcements for approved documents.  The approval
          announcement contains the following sections:

          Technical Summary
            Relevant content can frequently be found in the abstract
            and/or introduction of the document.  If not, this may be
            an indication that there are deficiencies in the abstract
            or introduction.

          Working Group Summary
            Was there anything in WG process that is worth noting?  For
            example, was there controversy about particular points or
            were there decisions where the consensus was particularly
            rough?

          Document Quality
            Are there existing implementations of the protocol?  Have a
            significant number of vendors indicated their plan to
            implement the specification?  Are there any reviewers that
            merit special mention as having done a thorough review,
            e.g., one that resulted in important changes or a
            conclusion that the document had no substantive issues?  If
            there was a MIB Doctor, Media Type or other expert review,
            what was its course (briefly)?  In the case of a Media Type
            review, on what date was the request posted?

          Personnel
            Who is the Document Shepherd for this document?  Who is the
            Responsible Area Director? Is an IANA expert needed?

Technical Summary

The SIEVE Reject and Extended Reject extension adds back the reject
action to SIEVE 5228, and adds an extended action with additional
behavior related to carrying out the reject at SMTP time.

Working Group Summary

This document has been discussed and reviewed in the SIEVE Working Group.
There is consensus in the Working Group to publish this document
as a Proposed Standard.

Document Quality

A number of implementations of this extension have already been
developed and in some cases deployed. Most participants are eager to see
this specification published as an RFC.

Personal

Document Shepherd: Cyrus Daboo
AD: Lisa Dusseault
2008-07-27
09 Lisa Dusseault Draft Added by Lisa Dusseault in state Publication Requested
2008-05-28
07 (System) New version available: draft-ietf-sieve-refuse-reject-07.txt
2007-12-14
06 (System) New version available: draft-ietf-sieve-refuse-reject-06.txt
2007-10-05
05 (System) New version available: draft-ietf-sieve-refuse-reject-05.txt
2006-10-20
04 (System) New version available: draft-ietf-sieve-refuse-reject-04.txt
2006-07-31
03 (System) New version available: draft-ietf-sieve-refuse-reject-03.txt
2006-06-19
02 (System) New version available: draft-ietf-sieve-refuse-reject-02.txt
2006-03-05
01 (System) New version available: draft-ietf-sieve-refuse-reject-01.txt
2005-05-17
00 (System) New version available: draft-ietf-sieve-refuse-reject-00.txt