Network Working Group                                          Z. Ordogh
Internet-Draft                                Research In Motion Limited
Intended status: Standards Track                          A. Vesely, Ed.
Expires: July 13, 2012                                  January 10, 2012


                    Spam reporting using IMAP: SREP
           draft-ordogh-spam-reporting-using-imap-kleansed-00

Abstract

   This is the definition of an IMAP command for reporting spam.

   Spam can be flagged using the $Junk and $NotJunk keywords.  Spam
   reporting is meant to correspond to a command to be run on the IMAP
   server, in order to tune filters and possibly mitigate further
   attempts.  This behavior can be obtained by moving message to a
   special folder that is being observed by the server.

Purpose

   This is a cleanup of an existing draft and its sole purpose is to
   discuss whether its core is good for APPSAWG.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on July 13, 2012.

Copyright Notice

   Copyright (c) 2012 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents



Ordogh & Vesely           Expires July 13, 2012                 [Page 1]


Internet-Draft                  IMAP SREP                   January 2012


   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Table of Contents

   1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  3
   2.  Conventions Used In This Document  . . . . . . . . . . . . . .  4
   3.  The SREP command . . . . . . . . . . . . . . . . . . . . . . .  4
     3.1.  Directives . . . . . . . . . . . . . . . . . . . . . . . .  5
     3.2.  Abuse types  . . . . . . . . . . . . . . . . . . . . . . .  5
     3.3.  References . . . . . . . . . . . . . . . . . . . . . . . .  6
     3.4.  Part identifiers . . . . . . . . . . . . . . . . . . . . .  6
     3.5.  Request Action . . . . . . . . . . . . . . . . . . . . . .  7
     3.6.  Responses and Results  . . . . . . . . . . . . . . . . . .  7
     3.7.  Formal Syntax  . . . . . . . . . . . . . . . . . . . . . .  8
     3.8.  Examples to report spam  . . . . . . . . . . . . . . . . . 10
     3.9.  Examples to report messages as no longer spam  . . . . . . 10
   4.  Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 11
   5.  IANA Considerations  . . . . . . . . . . . . . . . . . . . . . 11
   6.  Security Considerations  . . . . . . . . . . . . . . . . . . . 12
   7.  References . . . . . . . . . . . . . . . . . . . . . . . . . . 12
     7.1.  Normative References . . . . . . . . . . . . . . . . . . . 12
     7.2.  Informative References . . . . . . . . . . . . . . . . . . 13
   Appendix A.  Changes from original (non-kleansed) version  . . . . 13






















Ordogh & Vesely           Expires July 13, 2012                 [Page 2]


Internet-Draft                  IMAP SREP                   January 2012


1.  Introduction

   Spam reporting is the activity by which a Mailbox Provider can manage
   a feedback loop, as defined in [FBL].  That activity requires
   complaints to be collected, typically having end users hit a "Report
   Spam" button in their Mail User Agents (MUA).  This memo defines a
   new command, SREP, that identifies a message in an Internet Message
   Access Protocol [IMAP4] store and requests that it be the object of a
   complaint.  That way, a MUA that is an IMAP4 client can implement a
   "Report Spam" button and enable it according to servers'
   capabilities.

   There are a number of solutions available based on the multipart/
   report content type defined in [REPORT].  However, these solutions
   require including the message contents and hence, consume bandwidth
   to transmit the entire message.  In bandwidth-constrained
   environments --such as mobile networks-- it is highly desirable to
   send only a minimum set of information --a reference-- instead of the
   entire message.  Furthermore, it is desirable to permit individual
   server implementations to handle spam in any way these systems choose
   to: do nothing, flag, recommend deletion or relocation, perform
   deletion or relocation, and, involve any choice of spam aggregation
   in the decision process, for example the [OMA-SPAMREP].  Solutions
   that exist today employ manipulating proprietary flags in the IMAP
   storage to achieve the bare minimum, however more advanced solutions
   cannot be developed by using flags only; the IMAP server needs to be
   involved actively in the spam reporting process.

   This document specifies the syntax of the SREP command, which allows
   a client to inform the server that the user considered a message (or
   parts thereof) spam, or, that the user no longer considers a message
   (or parts thereof) spam.  Since all information about the message is
   readily available on the server, the command also allows the server
   to implement a more intelligent and accurate decision logic, which
   may be invoked when the spam is reported and the server can respond
   with its decision to the client.

   A server implementation may run a local executable or script that
   makes the relevant decisions pertaining to the spam reporting
   process.

   This document focuses only on the client-server interactions and the
   scope is limited to messages that either exist on the IMAP server,
   or, exist elsewhere and the IMAP server is configured to access them.
   Consequently, deposit- time filtering, messages that have been
   deleted, or, exist in an external storage but are accessible via an
   access protocol unknown to the IMAP server are out of scope.




Ordogh & Vesely           Expires July 13, 2012                 [Page 3]


Internet-Draft                  IMAP SREP                   January 2012


2.  Conventions Used In This Document

   In the examples, "C:" and "S:" indicate lines sent by the client or
   the server, respectively.

   The key words "MUST", "MUST NOT", "SHOULD", "SHOULD NOT", and "MAY"
   in this document are to be interpreted as described in [RFC2119].

3.  The SREP command

   The SREP command follows the conventions of [IMAP4].

   Arguments:
      directive; see Section 3.1
      OPTIONAL abuse type; see Section 3.2
      reference; see Section 3.3
      OPTIONAL list of part identifiers; see Section 3.4
      request action; see Section 3.5

   Responses; see Section 3.6:
      OPTIONAL OK response: RELOCATE
      OPTIONAL OK response: RELOCATED
      OPTIONAL OK response: DELETE
      OPTIONAL OK response: DELETED
      OPTIONAL OK response: KEYWORD

   Result:
      OK - command completed successfully
      NO - the server cannot access one or more messages (deleted or
      unauthorized)
      BAD - there was an error during processing the command (syntax or
      unsupported parameter)

   The formal syntax of the SREP command is defined in Section 3.7.

   The SREP command allows:
      - reporting spam; i.e. set the spam condition, and,
      - reporting that a message (that was reported spam earlier) is no
      longer spam; i.e. clear the spam condition.

   The SREP command may be used with any IMAP4 server implementation
   that returns "SREP" as one of the supported capabilities in response
   to the CAPABILITY command.  If the server does not indicate support
   for the SREP capability, the client MUST NOT use the SREP command.

   The SREP command may result in ambiguity, therefore the client MUST
   NOT send any commands before the result of the SREP command has been
   received, see Section 5.5 in [IMAP].



Ordogh & Vesely           Expires July 13, 2012                 [Page 4]


Internet-Draft                  IMAP SREP                   January 2012


   The command MAY be issued on one or more messages at a time, in the
   currently selected mailbox.

   The command MAY be extended in the future with new parameters
   (actions, directives, reference types, etc).  Servers MUST be able to
   recognize parameters unknown to them and respond with a BAD response
   in case they encounter such a parameter.

3.1.  Directives

   The directive argument tells the server whether a message is being
   reported as spam or as no longer spam.  The SREP command MUST include
   the directive.

   To report a spam, the directive MUST be SET.

   To report that a message is no longer considered to be a spam, the
   directive MUST be CLEAR.

   Extensions are permitted, as defined in Section 3.7.

3.2.  Abuse types

   The client may have additional information about the spam regarding
   the nature of the abuse.  When such information is available, the
   client SHOULD include the abuse type argument in the request.  When
   such information is not available, the client MUST omit the abuse
   type argument from the request.  When the directive argument is
   CLEAR, the client MUST omit the abuse type argument from the request.
   This specification uses the following abuse types defined in [ARF]:

   abuse Phishing (forgery, link manipulation, etc.): an attempt to
         divulge information from the recipient by masquerading the
         sender and/or the content(s) of the message as a trustworthy
         form of communication.
   virus Malware (virus, spyware, etc.): a malicious piece of software
         code embedded or attached to the message specifically designed
         to disrupt normal operation, gather sensitive information, gain
         unauthorized access, and/or perform other abusive behavior upon
         execution.

   Extensions are permitted, as defined in Section 3.7.  However, the
   type [NON-SPAM] is implied by the CLEAR directive, and SHOULD NOT be
   SET.







Ordogh & Vesely           Expires July 13, 2012                 [Page 5]


Internet-Draft                  IMAP SREP                   January 2012


3.3.  References

   The reference argument consists of a reference type and a reference
   value.  In general, the reference type MUST indicate the format of
   the reference while the reference value MUST contain a value
   corresponding to the indicated reference format.  To use a unique
   identifier specified in [IMAP4], the reference type MUST be UID and
   the reference value MUST be a number expressing the unique identifier
   of the message.  To use a sequence set specified in [IMAP4], the
   reference type MUST be SEQ and the reference value MUST be sequence
   numbers corresponding to the specified message sequence number set.
   To use an authorized URL specified in [URLAUTH], the reference type
   MUST be URLAUTH and the reference value MUST be an URLAUTH-authorized
   URL, authorizing the entire message.

   Extensions are permitted, as defined in Section 3.7.

3.4.  Part identifiers

   When the reference identifies one and only one message, the list of
   part identifiers MAY be included to improve the accuracy of spam
   detection.  When the reference identifies more than one message, the
   list of part identifiers MUST be omitted.

   The list of part identifiers is a parenthesized list of part
   identifiers.  Part identifiers MAY identify header fields or bodies.
   Header field identifiers MUST be prefixed with the word 'header' and
   the dot ('.') character MUST be used as the separator character.
   Header fields MUST be identified by the name of the header field.

   Example:
      The 'From' header field is identified as 'header.from'.

   Body identifiers MUST be prefixed with the word 'body' and the dot
   ('.') character MUST be used as the separator character.  Bodies MUST
   be identified by their positions within the message hierarcy, where
   the first position is 1 and the main level is 1.  To refer the entire
   body of a message (or all bodies of a multipart message), the
   separator character, the position MUST be omitted.

   Examples:
   o  The entire body of a message (or all bodies of a multipart
      message) is identified as 'body'.
   o  Considering a simple multipart message, the part following the
      first boundary is identified as 'body.1'.
   o  Considering a multipart message that includes an email attachment
      following the second boundary, and the email attachment containing
      text following the first boundary, the text within the email



Ordogh & Vesely           Expires July 13, 2012                 [Page 6]


Internet-Draft                  IMAP SREP                   January 2012


      message is identified as 'body.2.1'.
   The formal syntax of the part-id-list is defined in Section 3.7.

3.5.  Request Action

   The request action argument explicitly tells the server what to do
   with the the message.  To request a specific action from the server
   explicitly, the SREP command MUST include the request action
   argument.  To not request a specific action, the SREP command MUST
   NOT include the request action argument; in this case, the server
   MUST decide the course of action.  The client MAY specify either one
   of the following actions:
   o  The KEYWORD the client requests that only keyword(s) should be
      added to the message.  The server MUST add the appropriate
      keyword.
   o  The RELOCATE the client requests that the message should be
      relocated.  The server MUST relocate the message by copying the
      message to the destination mailbox removing the original as if
      another connected client requested this action.
   o  The DELETE the client requests that the message should be deleted.
      The server MUST delete the message as if another client performed
      this action.
   The server MUST ignore the destination mailbox in case it is nil, or,
   the request action is KEYWORD or DELETE.  It is assumed that the
   server is pre- configured with the location where user's spam
   messages are stored.  If the server is not configured with such
   information and the destination mailbox in a RELOCATE action is nil,
   or, destination mailbox in a RELOCATE action is otherwise
   inaccessible to the user (does not exist, insufficient permission,
   etc) the the server MUST reject the request (see BAD response in
   Section 3.6).  NOTE: While the DELETE action does not seem
   appropriate in case the directive argument is CLEAR, it is permitted.
   The formal syntax of the request action argument is defined in
   Section 3.7.

3.6.  Responses and Results

   The SREP command MAY result in system flag changes, keyword changes,
   message relocation, message removal, or a combination of these.

   The result of the command MUST be either OK, NO or BAD:
   o  The OK result MUST be returned only in case the server completed
      the command successfully.
   o  The NO result MUST be returned only in case the server processed
      the command successfully, but there is a problem with the
      referenced message(s) that prevents the server from completing the
      requested actions, such as one or more messages do not exist on
      the server, one or more messages are not properly authorized by



Ordogh & Vesely           Expires July 13, 2012                 [Page 7]


Internet-Draft                  IMAP SREP                   January 2012


      URLAUTH, etc.
   o  The BAD result MUST be returned only in case the server cannot
      process the command, or a configuration error is preventing the
      server from completing the requested actions.

   When the result is OK, the response to a SET directive MUST be either
   KEYWORD, RELOCATE, RELOCATED, DELETE, or DELETED.

   When the result is OK, the response to a CLEAR directive MUST be
   either KEYWORD, RELOCATE, or RELOCATED.

   The server responses are:
   o  The KEYWORD response occurs in case of an explicit request from
      the client, or, in case the server decided that only the keywords
      should be updated either because it does not wish to give any hint
      to the client, or, because it does not have sufficient
      information.  The client MAY decide what to do with the message.
   o  The RELOCATE response occurs in case the server decided that the
      message should be relocated, however leaves this action to the
      client.  The client MAY decide what to do with the message.
   o  The RELOCATED response occurs in case of an explicit request from
      the client, or, in case the server decided that the message should
      be relocated and it performed relocation of the message to the
      appropriate location before the response was sent.  The server
      MUST relocate the message by copying the message to the
      appropriate location and removing the original as if another
      connected client requested this action.
   o  The DELETE response occurs in case the server decided that the
      message should be deleted, however leaves this action to the
      client.  The client MAY decide what to do with the message.
   o  The DELETED response occurs in case of an explicit request from
      the client, or, in case the server decided that the message should
      be deleted, and performed deletion of the message before the
      response was sent.  The server MUST delete the message as if
      another client performed this action.

   The KEYWORD, RELOCATE and DELETE responses MUST include the list of
   flags/keywords that have been added or removed.  Added keywords MUST
   be prefixed with a plus sign ('+'), while removed keywords MUST be
   prefixed with a minus sign ('-').  The RELOCATED and DELETED
   responses MUST NOT include keywords.  The formal syntax of the
   actions is defined in Section 3.7.

3.7.  Formal Syntax

   This document extends the formal syntax defined in [IMAP4] using the
   Augmented Backus-Naur Form (ABNF) notation specified in [ABNF].




Ordogh & Vesely           Expires July 13, 2012                 [Page 8]


Internet-Draft                  IMAP SREP                   January 2012


   directive           = "SET" / "CLEAR" / directive-ext
   directive-ext       = atom
                         ; New directives MUST begin with "X" or be
                         ; registered with IANA as standard or
                         ; standards-track
   abuse-type          = "AT" SP abuse-type-id
   abuse-type-id       = 1*DIGIT
                         ; New abuse types MUST be registered with
                         ; IANA as standard or standards-track
   reference           = reference-type SP reference-value
   reference-type      = "UID" / "SEQ" / "URLAUTH" / reference-type-ext
   reference-type-ext  = atom
                         ; New reference types MUST begin with "X"
                         ; or be registered with IANA as standard or
                         ; standards-track
   reference-value     = uniqueid /           ; see [IMAP]
                         sequence-set /       ; see [IMAP]
                         authorized-url /     ; see [URLAUTH]
                         reference-value-ext
   authorized-url      = authimapurlfull /    ; see [URLAUTH]
                         authimapurlrump      ; see [URLAUTH]
   reference-value-ext = atom
                         ; New reference values MUST correspond to
                         ; reference-type-ext
   part-id-list        = "(" part-id *(SP part-id) ")"
   part-id             = header-id / body-id
   header-id           = "header." header-fld-name
                         ; see header-fld-name in [IMAP]
   body-id             = "body" *(. 1*DIGIT)
   request-action      = "DO" SP req-action SP destination-box
   req-action          = "KEYWORD" /
                         "RELOCATE" /
                         "DELETE"
   destination-box     = mailbox / nil
   resp-text-code      = resp-spam-actions    ; responses specific to
                                              ; this command, extending
                                              ; the resp-text-code
                                              ; defined in [IMAP]
   resp-spam-actions   = "KEYWORD" /
                         "RELOCATE" /
                         "RELOCATED" /
                         "DELETE" /
                         "DELETED"








Ordogh & Vesely           Expires July 13, 2012                 [Page 9]


Internet-Draft                  IMAP SREP                   January 2012


3.8.  Examples to report spam

   Report single message as spam; no identified parts; server only flags
   the message and hints that it should be moved:
      C: Z020 SREP SET SEQ 10
      S: Z020 OK [RELOCATE +$Junk] SREP Completed.

   Report single message as spam; header and body identified; server
   adds the appropriate flags and hints that it should be deleted:
      C: Z040 SREP SET SEQ 9 (header.from body.2)
      S: Z040 OK [DELETE (+$Junk-header.from +$Junk-body.2)] SREP
      Completed.

   Report single message as spam; no identified parts; server moves the
   message (may clear/set flags too, but that is irrelevant because the
   client will need to reconcile anyway).
      C: Z060 SREP SET SEQ 8
      S: Z060 OK [RELOCATED] SREP Completed.

   Report single message as spam; no identified parts; server deletes
   the message.
      C: Z080 SREP SET SEQ 6
      S: Z080 OK [DELETED] SREP Completed.

   Report single message as spam; no identified parts; client requests
   explicitly to delete the message, server deletes the message as the
   client requested.
      C: Z100 SREP SET SEQ 4 DO DELETE NIL
      S: Z100 OK [DELETED] SREP Completed.

3.9.  Examples to report messages as no longer spam

   Report single message as no longer spam; no identified parts; server
   only clears the appropriate flags from the message.
      C: Z020 SREP CLEAR SEQ 10
      S: A020 OK [KEYWORD -$Junk] SREP Completed.

   Report single message as no longer spam; earlier the header and body
   were identified as spam; the server clears the appropriate flags.
      C: Z040 SREP CLEAR SEQ 9
      S: A040 OK [KEYWORD (-$Junk-header.from -$Junk-body.2)] SREP
      Completed.

   Report single message as no longer spam; no identified parts; server
   moves the message (may set/clear flags, too but that is irrelevant
   because the client will need to reconcile anyway).





Ordogh & Vesely           Expires July 13, 2012                [Page 10]


Internet-Draft                  IMAP SREP                   January 2012


      C: Z060 SREP CLEAR SEQ 8
      S: A060 OK [RELOCATED] SREP Completed.

4.  Acknowledgements

   The author acknowledges and appreciates the work and comments from
   Josh Soref, Gaelle Martin-Cocher, Suresh Chitturi, Clara Severino and
   Christophe Le Thierry D'Ennequin.

5.  IANA Considerations

   This document constitutes registration of the SREP capability in the
   imap4-capabilities registry.

   SREP command directives are registered by publishing a standards
   track or IESG-approved experimental RFC.  The registry is currently
   located at: http://www.iana.org/assignments/spam- directive-registry

   SREP command abuse types are registered by publishing a standards
   track or IESG-approved experimental RFC.  The registry is currently
   located at: http://www.iana.org/assignments/spam-abuse-type- registry

   SREP command reference types are registered by publishing a standards
   track or IESG-approved experimental RFC.  The registry is currently
   located at:
   http://www.iana.org/assignments/spam-reference-type-registry

   All registries are case insensitive.

   This document constitutes the following registrations with IANA:


    IMAP SREP Directive Registry

            Directive           Reference
            ---------           ---------
            SET                 [this document]
            CLEAR               [this document]













Ordogh & Vesely           Expires July 13, 2012                [Page 11]


Internet-Draft                  IMAP SREP                   January 2012


            IMAP SREP Reference Type Registry

            Reference Type      Reference
            --------------      ---------------
            UID                 [this document]
            SEQ                 [this document]
            URLAUTH             [this document]


   Note to RFC Editor: replace "[this document]" with the RFC number
   before publication.

6.  Security Considerations

   When an aggregator service is actively involved in a deployment, the
   service provider MUST ensure that:
      - a mutual trust relation is in place between the IMAP server and
      the aggregator service, and,
      - the aggregator service does not leak any information.

   See additional security considerations in [IMAP4] and [URLAUTH],
   respectively.

7.  References

7.1.  Normative References

   [ABNF]         Crocker, D. and P. Overell, "Augmented BNF for Syntax
                  Specifications: ABNF", RFC 5234, January 2008.

   [ARF]          Shafranovich, Y., Levine, J., and M. Kucherawy, "An
                  Extensible Format for Email Feedback Reports",
                  RFC 5965, August 2010.

   [IMAP4]        Crispin, M., "INTERNET MESSAGE ACCESS PROTOCOL -
                  VERSION 4rev1", RFC 3501, March 2003.

   [NON-SPAM]     Li, K. and B. Leiba, "Email Feedback Report Type
                  Value: not-spam", RFC 6430, November 2011.

   [RFC2119]      Bradner, S., "Key words for use in RFCs to Indicate
                  Requirement Levels", BCP 14, RFC 2119, March 1997.

   [URLAUTH]      Crispin, M., "Internet Message Access Protocol (IMAP)
                  - URLAUTH Extension", RFC 4467, May 2006.






Ordogh & Vesely           Expires July 13, 2012                [Page 12]


Internet-Draft                  IMAP SREP                   January 2012


7.2.  Informative References

   [FBL]          Falk, J., "Complaint Feedback Loop Operational
                  Recommendations", RFC 6449, November 2011.

   [OMA-SPAMREP]  Open Mobile Alliance, "Mobile Spam Reporting 1.0, OMA-
                  ERP-SpamRep-V1_0".

   [REPORT]       Vaudreuil, G., "The Multipart/Report Content Type for
                  the Reporting of Mail System Administrative Messages",
                  RFC 3462, January 2003.

Appendix A.  Changes from original (non-kleansed) version

   o  Moved Abstract to Section 1 and edited it.
   o  Moved Note to Section 2 and corrected ref to 2119.
   o  Removed the type registry, also from the IANA Considerations
      section
   o  Minor editing.
   o  Add references:
      *  RFC 2119 (normative)
      *  RFC 6965 (normative)
      *  RFC 6430 (normative)
      *  RFC 6449 (informative)
   o  Removed the "Example flows" sections.  My understanding is that
      that part is subject to IPR, hence I removed IPR encumbrance along
      with it.
   o  Changed doc's category to Standard Track.
   o  Changed short title to IMAP SREP.
   o  Removed $OMAEVVM10-spam-* keywords from the examples, sticking to
      $Junk.
   o  Added myself as editor, for posting.

Authors' Addresses

   Zoltan Ordogh
   Research In Motion Limited
   1875 Buckhorn Gate
   Mississauga, Ontario  L4W 5P1
   Canada

   Phone: +19056294746x15674
   Fax:   +12892615950
   EMail: zordogh@rim.com







Ordogh & Vesely           Expires July 13, 2012                [Page 13]


Internet-Draft                  IMAP SREP                   January 2012


   Alessandro Vesely (editor)
   v. L. Anelli 13
   Milano, MI  20122
   IT

   EMail: vesely@tana.it













































Ordogh & Vesely           Expires July 13, 2012                [Page 14]