<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.23 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-benecke-cfbl-address-header-12" category="exp" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="CFBL Address Header">Complaint Feedback Loop Address Header</title>

    <author initials="J." surname="Benecke" fullname="Jan-Philipp Benecke">
      <organization>CleverReach GmbH &amp; Co. KG</organization>
      <address>
        <postal>
          <street>Schafjueckenweg 2</street>
          <city>Rastede</city>
          <code>26180</code>
          <country>Germany</country>
        </postal>
        <phone>+49 4402 97390-16</phone>
        <email>jpb@cleverreach.com</email>
      </address>
    </author>

    <date year="2023" month="May" day="07"/>

    <area>art</area>
    <workgroup>Network Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document describes a method that allows a Message Originator to specify a complaint feedback loop (FBL) address as a message header field.
Also, it defines the rules for processing and forwarding such a complaint.
The motivation for this arises out of the absence of a standardized and automated way to provide Mailbox Providers with an address for a complaint feedback loop.
Currently, providing and maintaining such an address is a manual and time-consuming process for Message Originators and Mailbox Providers.</t>

<t>The mechanism specified in this document is being published as an experiment, to gauge interest of, and gather feedback from implementers and deployers. This document is produced through the Independent RFC stream
and was not subject to the IETF's approval process.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction-and-motivation"><name>Introduction and Motivation</name>
<t>This memo extends the complaint feedback loop recommendations described in {!RFC6449}}.
The reader should be familiar with the terminology and concepts in that document; terms beginning with capital letters used in this memo are described in that document.</t>

<t>As described in <xref target="RFC6449"/>, the registration for such a complaint feedback loop needs to be done manually by a human at any Mailbox Provider who provides a complaint feedback loop.
The key underpinning of <xref target="RFC6449"/> is that access to the complaint feedback loop is a privilege, and that Mailbox Providers are not prepared to send feedback to anyone they cannot reasonably believe are legitimate.
However, manual registration and management can be quite time-consuming if there are new feedback loops rising up, or if the Message Originator wants to add new IP addresses, DKIM domains or change their complaint address.
In addition, a manual process is not well suited and/or feasible for smaller Mailbox Providers.</t>

<t>Here we propose that Message Originators add a header field without the need to manually register with each Feedback Provider, and that willing Mailbox Providers can use it to send the Feedback Messages to the specified complaint address.
This simplification or extension of a manual registration and verification process would be another advantage for the Mailbox Providers.</t>

<t>A new message header field, rather than a new DNS record, was chosen to easily distinguish between multiple Message Originators without requiring user or administrator intervention.
For example, if a company uses multiple systems, each system can set this header field on its own without requiring users or administrators to make any changes to their DNS.
No additional DNS lookup is required of the Mailbox Provider side to obtain the complaint address.</t>

<t>The proposed mechanism is capable of being operated in compliance with the data privacy laws e.g. GDPR or CCPA.
As described in <xref target="data-privacy"></xref>, a Feedback Message may contain personal data, this document describes a way to omit this personal data when sending the Feedback Message and only send back a header field.</t>

<t>Nevertheless, the described mechanism below potentially permits a kind of man-in-the-middle attack between the domain owner and the recipient.
A bad actor can generate forged reports to be "from" a domain name the bad actor is attacking and send this reports to the complaint feedback loop address.
These fake messages can result in a number of actions, such as blocking of accounts or deactivating recipient addresses.
This potential harm and others are described with potential countermeasures in <xref target="security-considerations"></xref>.</t>

<t>In summary, this document has the following objectives:</t>

<t><list style="symbols">
  <t>Allow Message Originators to signal that a complaint address exists without requiring manual registration with all providers.</t>
  <t>Allow Mailbox Providers to obtain a complaint address without developing their own manual registration process.</t>
  <t>Be able to provide a complaint address to smaller Mailbox Providers who do not have a feedback loop in place</t>
  <t>Provide a data privacy safe option for a complaint feedback loop.</t>
</list></t>

<section anchor="scope-of-this-experiment"><name>Scope of this Experiment</name>
<t>The CFBL-Address header field and the CFBL-Feedback-ID header field comprise an experiment. 
Participation in this experiment consists of adding the CFBL-Address header field on Message Originators side or by using the CFBL-Address header field to send Feedback Messages to the provided address on Mailbox Provider side.
Feedback on the results of this experiment can be emailed to the author, raised as an issue at https://github.com/jpbede/rfc-cfbl-address-header/ or can be emailed to the IETF cfbl mailing list (cfbl@ietf.org).</t>

<t>The goal of this experiment is to answer the following questions based on real-world deployments:</t>

<t><list style="symbols">
  <t>Is there interest among Message Originator and Mailbox Providers?</t>
  <t>If the Mailbox Provider adds this capability, will it be used by the Message Originators?</t>
  <t>If the Message Originator adds this capability, will it be used by the Mailbox Providers?</t>
  <t>Does the presence of the CFBL-Address and CFBL-Feedback-ID header field introduce additional security issues?</t>
  <t>What additional security measures/checks need to be performed at the Mailbox Provider before a Feedback Message is sent?</t>
  <t>What additional security measures/checks need to be performed at the Message Originator after a Feedback Message is received?</t>
</list></t>

<t>This experiment will be considered successful if the CFBL-Address header field is used by a leading Mailbox Provider and by at least two Message Originators within the next two years
and these parties successfully use the address specified in the header field to exchange Feedback Messages.</t>

<t>If this experiment is successful and these header fields prove to be valuable and popular, the header fields may be taken to the IETF for
further discussion and revision.</t>

</section>
<section anchor="how-cfbl-differs-from-one-click-unsubscribe"><name>How CFBL differs from One-Click-Unsubscribe</name>
<t>For good reasons, the One-Click-Unsubscribe <xref target="RFC8058"/> signaling already exists, which may have several interests in common with this document.
However, this header field requires the List-Unsubscribe header field, whose purpose is to provide the link to unsubscribe from a list.
For this reason, this header field is only used by operators of broadcast marketing lists or mailing lists, not in normal email traffic.</t>

</section>
</section>
<section anchor="definitions"><name>Definitions</name>
<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this 
document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>

<t>The key word "CFBL" in this document is the abbreviation for "complaint feedback loop" and will hereafter be used.</t>

<t>Syntax descriptions use ABNF <xref target="RFC5234"/> <xref target="RFC7405"/>.</t>

</section>
<section anchor="requirements"><name>Requirements</name>

<section anchor="received-message"><name>Received Message</name>
<t>This section describes the requirements that a received message, the message that is sent from the Message Originator to the Mailbox Provider and about which a report is to be sent later, must meet.</t>

<section anchor="strict"><name>Strict</name>
<t>If the domain in the <xref target="RFC5322"/>.From and the domain in the CFBL-Address header field are identical, this domain MUST be matched by a valid
<xref target="DKIM"/> signature. In this case, the DKIM "d=" parameter and the <xref target="RFC5322"/>.From field have identical domains.
This signature MUST meet the requirements described in <xref target="received-message-dkim-signature"></xref>.</t>

<t>The following example meets this case:</t>

<figure><artwork><![CDATA[
Return-Path: <sender@mailer.example.com>
From: Awesome Newsletter <newsletter@example.com>
To: receiver@example.org
Subject: Super awesome deals for you
CFBL-Address: fbl@example.com; report=arf
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@mailer.example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com; s=news;
       h=Subject:From:To:Message-ID:CFBL-Feedback-ID:CFBL-Address;

This is a super awesome newsletter.
]]></artwork></figure>

</section>
<section anchor="relaxed"><name>Relaxed</name>
<t>If the domain in CFBL-Address header field is a child domain of the <xref target="RFC5322"/>.From, the <xref target="RFC5322"/>.From domain MUST be matched by a valid <xref target="DKIM"/> signature. 
In this case, the DKIM "d=" parameter and the <xref target="RFC5322"/>.From domain have a identical (Example 1) or parent (Example 2) domain.
This signature MUST meet the requirements described in <xref target="received-message-dkim-signature"></xref>.</t>

<t>Example 1:</t>

<figure><artwork><![CDATA[
Return-Path: <sender@mailer.example.com>
From: Awesome Newsletter <newsletter@mailer.example.com>
To: receiver@example.org
Subject: Super awesome deals for you
CFBL-Address: fbl@mailer.example.com; report=arf
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@mailer.example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com;
      h=Content-Type:Subject:From:To:Message-ID:
      CFBL-Feedback-ID:CFBL-Address;

This is a super awesome newsletter.
]]></artwork></figure>

<t>Example 2:</t>

<figure><artwork><![CDATA[
Return-Path: <sender@mailer.example.com>
From: Awesome Newsletter <newsletter@example.com>
To: receiver@example.org
Subject: Super awesome deals for you
CFBL-Address: fbl@mailer.example.com; report=arf
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@mailer.example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com;
      h=Content-Type:Subject:From:To:Message-ID:
      CFBL-Feedback-ID:CFBL-Address;

This is a super awesome newsletter.
]]></artwork></figure>

</section>
<section anchor="third-party-address"><name>Third Party Address</name>
<t>If the domain in <xref target="RFC5322"/>.From differs from the domain in the CFBL-Address header field, an additional valid <xref target="DKIM"/> signature MUST be added that matches the domain in the CFBL-Address header field.
The other existing valid <xref target="DKIM"/> signature MUST match the domain in the <xref target="RFC5322"/>.From header field. 
This double DKIM signature ensures that both, the domain owner of the <xref target="RFC5322"/>.From domain and the domain owner of the CFBL-Address domain, agree who should receive the Feedback Messages.
Both signature MUST meet the requirements described in <xref target="received-message-dkim-signature"></xref>.</t>

<t>The following example meets this case:</t>

<figure><artwork><![CDATA[
Return-Path: <sender@saas-mailer.example>
From: Awesome Newsletter <newsletter@example.com>
To: receiver@example.org
Subject: Super awesome deals for you
CFBL-Address: fbl@saas-mailer.example; report=arf
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=saas-mailer.example; s=system;
       h=Subject:From:To:Message-ID:CFBL-Feedback-ID:CFBL-Address;
DKIM-Signature: v=1; a=rsa-sha256; d=example.com; s=news;
       h=Subject:From:To:Message-ID:CFBL-Feedback-ID:CFBL-Address;
       
This is a super awesome newsletter.
]]></artwork></figure>

<t>An Email Service Provider may accept pre-signed messages from its Message Authors, making it impossible for it to apply the double signature described above, 
in which case the double signature MUST BE omitted and the Email Service Provider MUST sign with its domain.
Therefore, the pre-signed message MUST NOT include "CFBL-Address" and "CFBL-Feedback-ID" in its h= tag.</t>

<t>This way the Email Service Provider has the possibility to accept the pre-signed messages and can inject their own CFBL-Address.</t>

<t>The following example meets this case:</t>

<figure><artwork><![CDATA[
Return-Path: <newsletter@example.com>
From: Awesome Newsletter <newsletter@example.com>
To: receiver@example.org
Subject: Super awesome deals for you
CFBL-Address: fbl@saas-mailer.example; report=arf
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com; s=news;
       h=Subject:From:To:Message-ID;
DKIM-Signature: v=1; a=rsa-sha256; d=saas-mailer.example; s=system;
       h=Subject:From:To:Message-ID:CFBL-Feedback-ID:CFBL-Address;

This is a super awesome newsletter.
]]></artwork></figure>

</section>
<section anchor="received-message-dkim-signature"><name>DKIM Signature</name>
<t>When present, CFBL-Address and CFBL-Feedback-ID header fields MUST be included in the "h=" tag of the aforementioned valid DKIM signature.</t>

<t>If the domain is neither matched by a valid DKIM signature nor the header field is covered by the "h=" tag, the Mailbox Provider SHALL NOT send a report message.</t>

</section>
</section>
<section anchor="multiple-cfbl-address-header-fields"><name>Multiple CFBL-Address Header Fields</name>
<t>A Message can contain multiple CFBL-Address header fields.
These multiple header fields MUST be treated as a list of receive report addresses so that each address can receive a report.</t>

</section>
<section anchor="cfbl-feedback-id-header-field"><name>CFBL-Feedback-ID Header Field</name>
<t>The Message Originator MAY include a CFBL-Feedback-ID header field in its messages out of various reasons, e.g. their feedback loop processing system can't do anything with the Message-ID header field.</t>

<t>It is RECOMMENDED that the header field include a hard to forge protection component such as an <xref target="HMAC"/> using a secret key, instead of a plain-text string.</t>

</section>
<section anchor="receiving-report-address"><name>Receiving Report Address</name>
<t>The receiving report address provided in the CFBL-Address header field MUST accept <xref target="ARF"/> reports.</t>

<t>The Message Originator can OPTIONALLY request a <xref target="XARF"/> report, as described in <xref target="xarf-report"></xref>.</t>

</section>
<section anchor="complaint-report"><name>Feedback Message</name>
<t>The Feedback Message (sent by Mailbox Provider to the address provided in the CFBL-Address header field) MUST have a valid <xref target="DKIM"/> signature.
This signature MUST match the <xref target="RFC5322"/>.From domain of the Feedback Message.</t>

<t>If the message does not have the required valid <xref target="DKIM"/> signature, the Message Originator SHALL NOT process this Feedback Message.</t>

<t>The Feedback Message MUST be a <xref target="ARF"/> or <xref target="XARF"/> report.
If the Message Originator requests it (described in <xref target="xarf-report"></xref>), and it is technically possible for the Mailbox Provider to do so, the Feedback Message MUST be a <xref target="XARF"/> report, otherwise the Feedback Message MUST be a <xref target="ARF"/> report.</t>

<t>The third MIME part of the <xref target="ARF"/> or the "Samples" section of the <xref target="XARF"/> report MUST contain the Message-ID <xref target="MAIL"/> of the received message.
If present, the header field "CFBL-Feedback-ID" of the received message MUST be added additionally to the third MIME part of the <xref target="ARF"/> or to "Samples" section of the <xref target="XARF"/> report.</t>

<t>The Mailbox Provider MAY omit or redact, as described in <xref target="RFC6590"/>, all further header fields and/or body to comply with any data-regulation laws.</t>

<section anchor="xarf-report"><name>XARF Report</name>
<t>A Message Originator wishing to receive a <xref target="XARF"/> report MUST append "report=xarf" to the <xref target="cfbl-address-header-field">CFBL-Address header field</xref>.
The report parameter is separated from the report address by a ";".</t>

<t>The resulting header field would look like the following:</t>

<figure><artwork><![CDATA[
CFBL-Address: fbl@example.com; report=xarf
]]></artwork></figure>

</section>
</section>
</section>
<section anchor="implementation"><name>Implementation</name>

<section anchor="message-originator"><name>Message Originator</name>
<t>A Message Originator who wishes to use this new mechanism to receive Feedback Messages MUST include a CFBL-Address header field in their messages.</t>

<t>It is RECOMMENDED that these Feedback Messages be processed automatically. Each Message Originator must decide for themselves what action to take after receiving a Feedback Message.</t>

<t>The Message Originator MUST take action to address the described requirements in <xref target="requirements"></xref>.</t>

</section>
<section anchor="mailbox-provider"><name>Mailbox Provider</name>
<t>A Mailbox Provider who wants to collect user actions that indicate the message was not wanted and send a Feedback Message to the Message Originator, 
they MAY query the CFBL-Address header field and forward the report to the provided complaint feedback loop address.</t>

<t>The Mailbox Provider MUST validate the DKIM requirements of the received Message described in <xref target="received-message"></xref> and 
MUST take action to address the requirements described in <xref target="complaint-report"></xref> when sending Feedback Messages.</t>

</section>
</section>
<section anchor="header-field-syntax"><name>Header Field Syntax</name>

<section anchor="cfbl-address-header-field"><name>CFBL-Address</name>
<t>The following ABNF imports fields, CFWS, CRLF and addr-spec from <xref target="MAIL"/>.
Implementations of the CFBL-Address header field MUST comply with <xref target="RFC6532"/>.</t>

<figure><sourcecode type="abnf"><![CDATA[
fields =/ cfbl-address

cfbl-address = "CFBL-Address:" CFWS addr-spec
               [";" CFWS report-format] CRLF

report-format = %s"report=" (%s"arf" / %s"xarf")
]]></sourcecode></figure>

</section>
<section anchor="cfbl-feedback-id"><name>CFBL-Feedback-ID</name>
<t>The following ABNF imports fields, WSP, CRLF and atext from <xref target="MAIL"/>.</t>

<figure><sourcecode type="abnf"><![CDATA[
fields =/ cfbl-feedback-id

cfbl-feedback-id = "CFBL-Feedback-ID:" CFWS fid CRLF

fid = 1*(atext / ":" / CFWS)
]]></sourcecode></figure>

<t>Whitespace is ignored in the fid value and MUST be ignored when reassembling the original feedback id.<br />
In particular, when adding the header field the Message Originator can safely insert CFWS in the fid value in arbitrary places to conform to line-length limits.</t>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>
<t>This section discusses possible security issues, and their possible solutions, of a complaint feedback loop address header field.</t>

<section anchor="attacks-on-the-feedback-loop-address"><name>Attacks on the Feedback Loop Address</name>
<t>Like any other email address, a complaint feedback loop address can be an attack vector for malicious messages.
For example, complaint feedback loop addresses can be flooded with spam.
This is an existing problem with any existing email address and is not created by this document.</t>

</section>
<section anchor="automatic-suspension-of-an-account"><name>Automatic Suspension of an Account</name>
<t>Receiving a Feedback Message regarding a Message Author can cause the Message Author to be unreachable if an automatic account suspension occurs too quickly.
An example: someone sends an invitation to their friends. For some reason, someone marks this message as spam.</t>

<t>Now, if there is too fast automatic account suspension, the Message Author's account will be blocked and the Message Author will not be able to access their emails 
or is able to send further messages, depending on the account suspension the Message Originator has chosen.</t>

<t>Message Originators must take appropriate measures to prevent too fast account suspensions.
Message Originators therefore have - mostly proprietary - ways to assess the trustworthiness of an account.
For example, Message Originators may take into account the age of the account and/or any previous account suspension before suspending an account.</t>

</section>
<section anchor="enumeration-attacks-provoking-unsubscription"><name>Enumeration Attacks / Provoking Unsubscription</name>
<t>A malicious person may send a series of spoofed ARF messages to known complaint feedback loop addresses and attempt to guess a Message-ID/CFBL-Feedback-ID or any other identifiers.
The malicious person may attempt to mass unsubscribe/suspend if such an automated system is in place.
This is also an existing problem with the current feedback loop implementation and/or One-Click Unsubscription <xref target="RFC8058"/>.</t>

<t>The Message Originator must take appropriate measures, a countermeasure would be, that the CFBL-Feedback-ID header field, 
if used, use a hard-to-forge component such as a <xref target="HMAC"/> with a secret key instead of a plaintext string to make an enumeration attack impossible.</t>

</section>
<section anchor="data-privacy"><name>Data Privacy</name>
<t>The provision of such a header field itself does not pose a data privacy issue.
The resulting ARF/XARF report sent by the Mailbox Provider to the Message Originator may violate a data privacy law because it may contain personal data.</t>

<t>This document already addresses some parts of this problem and describes a data privacy safe way to send a Feedback Message.
As described in <xref target="complaint-report"></xref>, the Mailbox Provider can omit the entire body and/or header field and send only the required fields.
As recommended in <xref target="RFC6590"/>, the Mailbox Provider can also redact the data in question.
Nevertheless, each Mailbox Provider must consider for itself whether this implementation is acceptable and complies with existing data privacy laws in their country.</t>

<t>As described in <xref target="complaint-report"></xref> and in <xref target="cfbl-feedback-id-header-field"></xref>, it is also strongly RECOMMENDED that the Message-ID and, if used, the CFBL-Feedback-ID.
contain a component that is difficult to forge, such as a <xref target="HMAC"/> that uses a secret key, rather than a plaintext string.
See <xref target="hmac-example"></xref> for an example.</t>

</section>
<section anchor="abusing-for-validity-and-existence-queries"><name>Abusing for Validity and Existence Queries</name>
<t>This mechanism could be abused to determine the validity and existence of an email address, which exhibits another potential data privacy issue.
Now, if the Mailbox Provider has an automatic process to generate a Feedback Message for a received message, it may not be doing the mailbox owner any favors.
As the Mailbox Provider now generates an automatic Feedback Message for the received message, the Mailbox Provider now proves to the Message Originator that this mailbox exists for sure, because it is based on a manual action of the mailbox owner.</t>

<t>The receiving Mailbox Provider must take appropriate measures. One possible countermeasure could be, for example, pre-existing reputation data, usually proprietary data.
Using this data, the Mailbox Provider can assess the trustworthiness of a Message Originator and decide whether to send a Feedback Message based on this information.</t>

</section>
</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<section anchor="cfbl-address"><name>CFBL-Address</name>
<t>The IANA is requested to register a new header field, per <xref target="RFC3864"/>, into the "Provisional Message Header Field Names" registry:</t>

<figure><sourcecode type="abnf"><![CDATA[
Header field name: CFBL-Address
  
Applicable protocol: mail

Status: provisional

Author/Change controller: Jan-Philipp Benecke <jpb@cleverreach.com>

Specification document: this document
]]></sourcecode></figure>

</section>
<section anchor="cfbl-feedback-id-1"><name>CFBL-Feedback-ID</name>
<t>The IANA is requested to register a new header field, per <xref target="RFC3864"/>, into the "Provisional Message Header Field Names" registry:</t>

<figure><sourcecode type="abnf"><![CDATA[
Header field name: CFBL-Feedback-ID

Applicable protocol: mail

Status: provisional

Author/Change controller: Jan-Philipp Benecke <jpb@cleverreach.com>

Specification document: this document
]]></sourcecode></figure>

</section>
</section>
<section anchor="examples"><name>Examples</name>
<t>For simplicity the DKIM header field has been shortened, and some tags have been omitted.</t>

<section anchor="simple"><name>Simple</name>
<t>Email about the report will be generated:</t>

<figure><artwork><![CDATA[
Return-Path: <sender@mailer.example.com>
From: Awesome Newsletter <newsletter@example.com>
To: me@example.net
Subject: Super awesome deals for you
CFBL-Address: fbl@example.com; report=arf
CFBL-Feedback-ID: 111:222:333:4444
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@mailer.example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com; s=news;
       h=Subject:From:To:Message-ID:CFBL-Feedback-ID:CFBL-Address;

This is a super awesome newsletter.
]]></artwork></figure>

<t>Resulting ARF report:</t>

<figure><artwork><![CDATA[
------=_Part_240060962_1083385345.1592993161900
Content-Type: message/feedback-report
Content-Transfer-Encoding: 7bit

Feedback-Type: abuse
User-Agent: FBL/0.1
Version: 0.1
Original-Mail-From: sender@mailer.example.com
Arrival-Date: Tue, 23 Jun 2020 06:31:38 GMT
Reported-Domain: example.com
Source-IP: 192.0.2.1

------=_Part_240060962_1083385345.1592993161900
Content-Type: text/rfc822; charset=UTF-8
Content-Transfer-Encoding: 7bit

Return-Path: <sender@mailer.example.com>
From: Awesome Newsletter <newsletter@example.com>
To: me@example.net
Subject: Super awesome deals for you
CFBL-Address: fbl@example.com; report=arf
CFBL-Feedback-ID: 111:222:333:4444
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@mailer.example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com; s=news;
       h=Subject:From:To:Message-ID:CFBL-Feedback-ID:CFBL-Address;

This is a super awesome newsletter.
------=_Part_240060962_1083385345.1592993161900--
]]></artwork></figure>

</section>
<section anchor="data-privacy-safe-report"><name>Data Privacy Safe Report</name>
<t>Email about the report will be generated:</t>

<figure><artwork><![CDATA[
Return-Path: <sender@mailer.example.com>
From: Awesome Newsletter <newsletter@example.com>
To: me@example.net
Subject: Super awesome deals for you
CFBL-Address: fbl@example.com; report=arf
CFBL-Feedback-ID: 111:222:333:4444
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@mailer.example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com; s=news;
       h=Subject:From:To:Message-ID:CFBL-Feedback-ID:CFBL-Address;

This is a super awesome newsletter.
]]></artwork></figure>

<t>Resulting ARF report contains only the CFBL-Feedback-ID:</t>

<figure><artwork><![CDATA[
------=_Part_240060962_1083385345.1592993161900
Content-Type: message/feedback-report
Content-Transfer-Encoding: 7bit

Feedback-Type: abuse
User-Agent: FBL/0.1
Version: 0.1
Original-Mail-From: sender@mailer.example.com
Arrival-Date: Tue, 23 Jun 2020 06:31:38 GMT
Reported-Domain: example.com
Source-IP: 2001:DB8::25

------=_Part_240060962_1083385345.1592993161900
Content-Type: text/rfc822-headers; charset=UTF-8
Content-Transfer-Encoding: 7bit

CFBL-Feedback-ID: 111:222:333:4444
------=_Part_240060962_1083385345.1592993161900--
]]></artwork></figure>

</section>
<section anchor="hmac-example"><name>Data Privacy Safe Report with HMAC</name>
<t>Email about the report will be generated:</t>

<figure><artwork><![CDATA[
Return-Path: <sender@mailer.example.com>
From: Awesome Newsletter <newsletter@example.com>
To: me@example.net
Subject: Super awesome deals for you
CFBL-Address: fbl@example.com; report=arf
CFBL-Feedback-ID: 3789e1ae1938aa2f0dfdfa48b20d8f8bc6c21ac34fc5023d
       63f9e64a43dfedc0
Message-ID: <a37e51bf-3050-2aab-1234-543a0828d14a@mailer.example.com>
Content-Type: text/plain; charset=utf-8
DKIM-Signature: v=1; a=rsa-sha256; d=example.com; s=news;
       h=Subject:From:To:Message-ID:CFBL-Feedback-ID:CFBL-Address;

This is a super awesome newsletter.
]]></artwork></figure>

<t>Resulting ARF report contains only the CFBL-Feedback-ID:</t>

<figure><artwork><![CDATA[
------=_Part_240060962_1083385345.1592993161900
Content-Type: message/feedback-report
Content-Transfer-Encoding: 7bit

Feedback-Type: abuse
User-Agent: FBL/0.1
Version: 0.1
Original-Mail-From: sender@mailer.example.com
Arrival-Date: Tue, 23 Jun 2020 06:31:38 GMT
Reported-Domain: example.com
Source-IP: 2001:DB8::25

------=_Part_240060962_1083385345.1592993161900
Content-Type: text/rfc822-headers; charset=UTF-8
Content-Transfer-Encoding: 7bit

CFBL-Feedback-ID: 3789e1ae1938aa2f0dfdfa48b20d8f8bc6c21ac34fc5023d
       63f9e64a43dfedc0
------=_Part_240060962_1083385345.1592993161900--
]]></artwork></figure>

</section>
</section>
<section anchor="acknowledgments"><name>Acknowledgments</name>
<t>Technical and editorial reviews were provided by the colleagues at CleverReach, 
the colleagues at Certified Senders Alliance and eco.de, 
Arne Allisat, Tobias Herkula and Levent Ulucan (1&amp;1 Mail &amp; Media) and Sven Krohlas (BFK Edv-consulting).</t>

</section>


  </middle>

  <back>


    <references title='Normative References'>

<reference anchor="XARF" >
  <front>
    <title>eXtended Abuse Reporting Format</title>
    <author >
      <organization>Abusix</organization>
    </author>
    <date />
  </front>
  <seriesInfo name="Web" value="https://github.com/abusix/xarf"/>
</reference>




<reference anchor='RFC6449'>
<front>
<title>Complaint Feedback Loop Operational Recommendations</title>
<author fullname='J. Falk' initials='J.' role='editor' surname='Falk'><organization/></author>
<date month='November' year='2011'/>
<abstract><t>Complaint Feedback Loops similar to those described herein have existed for more than a decade, resulting in many de facto standards and best practices.  This document is an attempt to codify, and thus clarify, the ways that both providers and consumers of these feedback mechanisms intend to use the feedback, describing some already common industry practices.</t><t>This document is the result of cooperative efforts within the Messaging Anti-Abuse Working Group, a trade organization separate from the IETF.  The original MAAWG document upon which this document is based was published in April, 2010.  This document does not represent the consensus of the IETF; rather it is being published as an Informational RFC to make it widely available to the Internet community and simplify reference to this material from IETF work. This document is not an Internet Standards Track specification; it is published for informational purposes.</t></abstract>
</front>
<seriesInfo name='RFC' value='6449'/>
<seriesInfo name='DOI' value='10.17487/RFC6449'/>
</reference>



<reference anchor='RFC2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='RFC8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<date month='May' year='2017'/>
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>



<reference anchor='RFC5234'>
<front>
<title>Augmented BNF for Syntax Specifications: ABNF</title>
<author fullname='D. Crocker' initials='D.' role='editor' surname='Crocker'><organization/></author>
<author fullname='P. Overell' initials='P.' surname='Overell'><organization/></author>
<date month='January' year='2008'/>
<abstract><t>Internet technical specifications often need to define a formal syntax.  Over the years, a modified version of Backus-Naur Form (BNF), called Augmented BNF (ABNF), has been popular among many Internet specifications.  The current specification documents ABNF. It balances compactness and simplicity with reasonable representational power.  The differences between standard BNF and ABNF involve naming rules, repetition, alternatives, order-independence, and value ranges.  This specification also supplies additional rule definitions and encoding for a core lexical analyzer of the type common to several Internet specifications.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='68'/>
<seriesInfo name='RFC' value='5234'/>
<seriesInfo name='DOI' value='10.17487/RFC5234'/>
</reference>



<reference anchor='RFC7405'>
<front>
<title>Case-Sensitive String Support in ABNF</title>
<author fullname='P. Kyzivat' initials='P.' surname='Kyzivat'><organization/></author>
<date month='December' year='2014'/>
<abstract><t>This document extends the base definition of ABNF (Augmented Backus-Naur Form) to include a way to specify US-ASCII string literals that are matched in a case-sensitive manner.</t></abstract>
</front>
<seriesInfo name='RFC' value='7405'/>
<seriesInfo name='DOI' value='10.17487/RFC7405'/>
</reference>



<reference anchor='RFC5322'>
<front>
<title>Internet Message Format</title>
<author fullname='P. Resnick' initials='P.' role='editor' surname='Resnick'><organization/></author>
<date month='October' year='2008'/>
<abstract><t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of &quot;electronic mail&quot; messages.  This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, &quot;Standard for the Format of ARPA Internet Text Messages&quot;, updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5322'/>
<seriesInfo name='DOI' value='10.17487/RFC5322'/>
</reference>



<reference anchor='DKIM'>
<front>
<title>DomainKeys Identified Mail (DKIM) Signatures</title>
<author fullname='D. Crocker' initials='D.' role='editor' surname='Crocker'><organization/></author>
<author fullname='T. Hansen' initials='T.' role='editor' surname='Hansen'><organization/></author>
<author fullname='M. Kucherawy' initials='M.' role='editor' surname='Kucherawy'><organization/></author>
<date month='September' year='2011'/>
<abstract><t>DomainKeys Identified Mail (DKIM) permits a person, role, or organization that owns the signing domain to claim some responsibility for a message by associating the domain with the message.  This can be an author's organization, an operational relay, or one of their agents.  DKIM separates the question of the identity of the Signer of the message from the purported author of the message.  Assertion of responsibility is validated through a cryptographic signature and by querying the Signer's domain directly to retrieve the appropriate public key.  Message transit from author to recipient is through relays that typically make no substantive change to the message content and thus preserve the DKIM signature.</t><t>This memo obsoletes RFC 4871 and RFC 5672.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='76'/>
<seriesInfo name='RFC' value='6376'/>
<seriesInfo name='DOI' value='10.17487/RFC6376'/>
</reference>



<reference anchor='ARF'>
<front>
<title>An Extensible Format for Email Feedback Reports</title>
<author fullname='Y. Shafranovich' initials='Y.' surname='Shafranovich'><organization/></author>
<author fullname='J. Levine' initials='J.' surname='Levine'><organization/></author>
<author fullname='M. Kucherawy' initials='M.' surname='Kucherawy'><organization/></author>
<date month='August' year='2010'/>
<abstract><t>This document defines an extensible format and MIME type that may be used by mail operators to report feedback about received email to other parties.  This format is intended as a machine-readable replacement for various existing report formats currently used in Internet email.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5965'/>
<seriesInfo name='DOI' value='10.17487/RFC5965'/>
</reference>



<reference anchor='MAIL'>
<front>
<title>Internet Message Format</title>
<author fullname='P. Resnick' initials='P.' role='editor' surname='Resnick'><organization/></author>
<date month='October' year='2008'/>
<abstract><t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of &quot;electronic mail&quot; messages.  This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, &quot;Standard for the Format of ARPA Internet Text Messages&quot;, updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5322'/>
<seriesInfo name='DOI' value='10.17487/RFC5322'/>
</reference>



<reference anchor='RFC6532'>
<front>
<title>Internationalized Email Headers</title>
<author fullname='A. Yang' initials='A.' surname='Yang'><organization/></author>
<author fullname='S. Steele' initials='S.' surname='Steele'><organization/></author>
<author fullname='N. Freed' initials='N.' surname='Freed'><organization/></author>
<date month='February' year='2012'/>
<abstract><t>Internet mail was originally limited to 7-bit ASCII.  MIME added support for the use of 8-bit character sets in body parts, and also defined an encoded-word construct so other character sets could be used in certain header field values.  However, full internationalization of electronic mail requires additional enhancements to allow the use of Unicode, including characters outside the ASCII repertoire, in mail addresses as well as direct use of Unicode in header fields like &quot;From:&quot;, &quot;To:&quot;, and &quot;Subject:&quot;, without requiring the use of complex encoded-word constructs.  This document specifies an enhancement to the Internet Message Format and to MIME that allows use of Unicode in mail addresses and most header field content.</t><t>This specification updates Section 6.4 of RFC 2045 to eliminate the restriction prohibiting the use of non-identity content-transfer- encodings on subtypes of &quot;message/&quot;.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6532'/>
<seriesInfo name='DOI' value='10.17487/RFC6532'/>
</reference>




    </references>

    <references title='Informative References'>





<reference anchor='RFC8058'>
<front>
<title>Signaling One-Click Functionality for List Email Headers</title>
<author fullname='J. Levine' initials='J.' surname='Levine'><organization/></author>
<author fullname='T. Herkula' initials='T.' surname='Herkula'><organization/></author>
<date month='January' year='2017'/>
<abstract><t>This document describes a method for signaling a one-click function for the List-Unsubscribe email header field.  The need for this arises out of the actuality that mail software sometimes fetches URLs in mail header fields, and thereby accidentally triggers unsubscriptions in the case of the List-Unsubscribe header field.</t></abstract>
</front>
<seriesInfo name='RFC' value='8058'/>
<seriesInfo name='DOI' value='10.17487/RFC8058'/>
</reference>



<reference anchor='HMAC'>
<front>
<title>HMAC: Keyed-Hashing for Message Authentication</title>
<author fullname='H. Krawczyk' initials='H.' surname='Krawczyk'><organization/></author>
<author fullname='M. Bellare' initials='M.' surname='Bellare'><organization/></author>
<author fullname='R. Canetti' initials='R.' surname='Canetti'><organization/></author>
<date month='February' year='1997'/>
<abstract><t>This document describes HMAC, a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative cryptographic hash function, e.g., MD5, SHA-1, in combination with a secret shared key.  The cryptographic strength of HMAC depends on the properties of the underlying hash function.  This memo provides information for the Internet community.  This memo does not specify an Internet standard of any kind</t></abstract>
</front>
<seriesInfo name='RFC' value='2104'/>
<seriesInfo name='DOI' value='10.17487/RFC2104'/>
</reference>



<reference anchor='RFC6590'>
<front>
<title>Redaction of Potentially Sensitive Data from Mail Abuse Reports</title>
<author fullname='J. Falk' initials='J.' role='editor' surname='Falk'><organization/></author>
<author fullname='M. Kucherawy' initials='M.' role='editor' surname='Kucherawy'><organization/></author>
<date month='April' year='2012'/>
<abstract><t>Email messages often contain information that might be considered private or sensitive, per either regulation or social norms.  When such a message becomes the subject of a report intended to be shared with other entities, the report generator may wish to redact or elide the sensitive portions of the message.  This memo suggests one method for doing so effectively.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6590'/>
<seriesInfo name='DOI' value='10.17487/RFC6590'/>
</reference>



<reference anchor='RFC3864'>
<front>
<title>Registration Procedures for Message Header Fields</title>
<author fullname='G. Klyne' initials='G.' surname='Klyne'><organization/></author>
<author fullname='M. Nottingham' initials='M.' surname='Nottingham'><organization/></author>
<author fullname='J. Mogul' initials='J.' surname='Mogul'><organization/></author>
<date month='September' year='2004'/>
<abstract><t>This specification defines registration procedures for the message header fields used by Internet mail, HTTP, Netnews and other applications.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='90'/>
<seriesInfo name='RFC' value='3864'/>
<seriesInfo name='DOI' value='10.17487/RFC3864'/>
</reference>




    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

