<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.3.37 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-freed-smtp-limits-01" category="std">

  <front>
    <title abbrev="LIMITS Extension">The LIMITS SMTP Service Extension</title>

    <author initials="N." surname="Freed" fullname="Ned Freed">
      <organization>Oracle</organization>
      <address>
        <email>ned.freed@mrochek.com</email>
      </address>
    </author>

    <date year="2021" month="March" day="15"/>

    <area>Art</area>
    
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document defines a “Limits” extension for the Simple Mail
Transfer Protocol (SMTP) and an associated limit registry.
This extension provides the means for an SMTP server to inform the
SMTP client of limits the server intends to apply to the protocol
during the current SMTP session. The client is then able adapt its
behavior in order to conform to those limits.</t>



    </abstract>


  </front>

  <middle>


<section anchor="problems" title="Introduction">

<t>The Simple Mail Transfer Protocol <xref target="SMTP"/> provides the ability to
transfer multiple email messages from one host to another, each with
multiple recipients, using a single or multiple connections.</t>

<t>In order to conserve resources as well as protect themselves from
malicious clients, it is necessary for servers to enforce limits
on various aspects of the protocol, e.g., a limit on the number
of recipients that can be specified in a single transaction.</t>

<t>Additionally, servers may also wish to alter the limits they
apply depending on their assessment of the reputation of a particular
client.</t>

<t>The variability of the limits that may be in effect creates a
situation where clients may inadvertently exceed a particular server’s
limits, causing servers to respond with temporary (or in some
cases, permanent) errors. This in turn can lead to delays or even
failures in message transfer.</t>

<t>SMTP servers have always been able to announce a limit, in a 
reply, which means that the client first needed to issue a command.  The 
mechanism specified here avoids the overhead of that interactions, by 
announcing limits prior to any substantive interaction.</t>

<t>The “Limits” extension provides the means for a server
to inform a client about specific limits in effect for
a particular SMTP session. This information, combined with the
inherent flexibility of SMTP, makes it possible for clients
to avoid server errors and the problems they cause.</t>

<t>Limits are registered with the IANA. Each registration includes
the limit name, value syntax, and a description of its semantics.</t>

</section>
<section anchor="Terminology" title="Terminology">

<t>In this document, the key words “MUST”, “MUST NOT”, “REQUIRED”,
“SHALL”, “SHALL NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “MAY”,
and “OPTIONAL” are to be interpreted as described in BCP 14, RFC 2119
<xref target="KEYWORDS"/>.</t>

<t>This specification uses the Augmented Backus-Naur Form
<xref target="ABNF"/> notation and its core rules to define the
formal syntax of the “Limits” extension.</t>

<t>This specification makes extensive use of the terminology specified
and used in <xref target="SMTP"/>.</t>

</section>
<section anchor="Extension" title="The “Limits” SMTP Extension">

<t>Extensions to SMTP are defined in Section 2.2 of <xref target="SMTP"/>.</t>

<t>The name of the extension is “Limits”. Servers implementing this
extension advertise an additional “LIMITS” EHLO keyword. The
associated parameter is used by the server to communicate one or
more limits, each with an optional value, to the client. The syntax
of the parameter is:</t>

<figure><artwork type="abnf"><![CDATA[
  limits-param = limit-name-value [SP limit-name-value]
  limit-name-value = limit-name ["=" limit-value]
  limit-name = 1*(ALPHA / DIGIT / "-" / "_")
  limit-value = 1*(%x21-3A / %x3C-7E) ; Any VCHAR except ";"

]]></artwork></figure>

<t>This extension introduces no new SMTP commands, and does not
alter any existing command. However, it is possible for a
LIMITS parameter to be associated with another SMTP extension
that does these things.</t>

<section anchor="limits" title="Limits">

<t>In order to achieve consistent behavior, all limits MUST be
registered with the IANA, as described below.</t>

</section>
<section anchor="limit-naming-conventions" title="Limit Naming Conventions">

<t>Limit names MUST be comprehensible, but also should
be kept as short as possible. The use of commonly understood
abbreviation, e.g., “MAX” for “maximum”, is encouraged.</t>

<t>When a limit is associated with a particular SMTP, its name
SHOULD begin with the name of that command.</t>

<t>Limit names SHOULD end with one or more terms that describe
the type of limit.</t>

</section>
<section anchor="interaction-with-pipelining" title="Interaction With Pipelining">

<t>The SMTP “Pipelining” extension <xref target="PIPELINING"/> is commonly used
to improve SMTP performance, especially over high latency
connections. Pipelining allows entire transaction
to be sent without checking responses and in some cases it may be
possible to send multiple transactions.</t>

<t>The use of pipelining affects limits in an important way: Since
a pipelining client cannot check intermediate command responses
without stalling the pipeline, it cannot count the number of
succesful versus failed responses and adjust its behavior accordingly.
Limit designers need to take this into account.</t>

<t>For example, it may seem like it would be better to impose a limit
on the number of succesful RCPT TO commands as opposed to the
way the RCPTMAX limit is specified in <xref target="RCPTMAX"/> below. But
counting the total number of RCPT TOs is simple, whereas
counting the number of successful RCPT TO stalls the pipeline.</t>

</section>
<section anchor="varying-limits" title="Varying Limits">

<t>This extension provides an announcement as part of the reply to
an EHLO command. Some servers vary their limits, as a session
progresses, based  on their obtaining more information.
This extension does not  cover in-session limitation changes.</t>

</section>
<section anchor="interaction-with-smtp-minimums" title="Interaction With SMTP Minimums">

<t>Section 4.5.3.1 of <xref target="SMTP"/> specifies minimum values for
various server sizes, limits, and timeouts, e.g., servers must
accept a minimum of 100 RCPT TO commands (section 4.5.3.1.8).
Unfortunately, the  reality is that servers routinely impose smaller
limits than what SMTP requires, and when this is done it’s especially
important for clients to be aware that this is happening.</t>

<t>For this reason there is no requirement that the limits
advertised by this extension comply with the minimums imposed
by SMTP.</t>

</section>
<section anchor="multiple-ehlo-commands" title="Multiple EHLO Commands">

<t>SMTP requires that EHLO command be reissued Under certain
circumstances, e.g., after successful authentication <xref target="AUTH"/>
or negotiation of a security layer <xref target="STARTTLS"/>.</t>

<t>Servers MAY update their limits any time the protocol requires
clients to reissue the EHLO command. Clients MUST discard any
previous limits in favor of those provided by the most recent
EHLO. This includes the case where the original EHLO provided
a set of limits but the subsequent EHLO did not; in this
case the client MUST act as if no limits were communicated.</t>

</section>
</section>
<section anchor="initial-limits" title="Initial Limits">

<t>An initial set of limits are specified in the following sections.</t>

<section anchor="mailmax-limit" title="MAILMAX Limit">

<t>Name: MAILMAX</t>

<t>Value syntax: %x30-39 0*5DIGIT ; 0 not allowed, 6 digit maximum</t>

<t>Description: RCPTMAX specifies the maximum number of transactions
(MAIL FROM commands) the SMTP will accept in a single session. The
count includes all MAIL FROM commands, regardless of whether they
succeed or fail.</t>

<t>Security Considerations: See <xref target="Seccons"/></t>

</section>
<section anchor="RCPTMAX" title="RCPTMAX Limit">

<t>Name: RCPTMAX</t>

<t>Value syntax:  %x30-39 0*5DIGIT ; 0 not allowed, 6 digit maximum</t>

<t>Description: RCPTMAX specifies the maximum number of RCPT TO commands
the SMTP will accept in a single transaction. It is not a limit
on the actual number of recipients the message ends up being sent to;
a single RCPT TO command may produce multiple recipients or, in the
event of an error, none.</t>

<t>Security Considerations: See <xref target="Seccons"/></t>

</section>
<section anchor="rcptdomainmax-limit" title="RCPTDOMAINMAX Limit">

<t>Name: RCPTDOMAINMAX</t>

<t>Value syntax:  %x30-39 0*5DIGIT ; 0 not allowed, 6 digit maximum</t>

<t>Description: RCPTMAX specifies the maximum number of different domains
that can appear in a recipient (RCPT TO) address within a single
SMTP session. This limit is imposed by some servers that bind to
a specific internal delivery mechanism on receipt of the first
RCPT TO command.</t>

<t>Security Considerations: See <xref target="Seccons"/></t>

</section>
</section>
<section anchor="Seccons" title="Security Considerations">

<t>A malicious server can use limits to overly constrain client behavior,
causing excessive use of client resources.</t>

<t>A malicious client may use the limits a server advertises to optimize
the delivery of unwanted messages.</t>

<t>A man-in-the-middle attack on unprotected SMTP connections can
be used to cause clients to misbehave, which in turn could result
in delivery delays or failures. Loss of reputation for the client
could also occur.</t>

<t>All that said, decades of operational experience with the
SMTP “SIZE” extension <xref target="SIZE"/>, which provides servers with the
ability to indicate message size, indicates that such abuse is
rare and unlikely to be a significant problem.</t>

</section>
<section anchor="iana-considerations" title="IANA Considerations">

<section anchor="smtp-service-extension-registry" title="SMTP Service Extension Registry">

<t>The IANA is requested to add “LIMITS” to the SMTP Service
Extension Registry:</t>

<figure><artwork><![CDATA[
Keywords: LIMITS
Description: Server limits
Reference: [RFCxxxx]

]]></artwork></figure>

</section>
<section anchor="smtp-server-limits-registry" title="SMTP Server Limits Registry">

<t>The IANA is requested to create a new registry for SMTP
server limits. The policy for this registry is “Specification Required”.
Registry entries consist of three required values:</t>

<t><list style="numbers">
  <t>The name of the limit</t>
  <t>The syntax of the limit value, if the limit has one. Use of <xref target="ABNF"/>
is preferred but not required.</t>
  <t>A description of the limit’s semantics</t>
  <t>Security considerations for the limit</t>
</list></t>

<t>The IANA is also requested to register the limits specified in
this document.</t>

</section>
</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference anchor='KEYWORDS' target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='ABNF' target='https://www.rfc-editor.org/info/rfc5234'>
<front>
<title>Augmented BNF for Syntax Specifications: ABNF</title>
<author fullname='D. Crocker' initials='D.' role='editor' surname='Crocker'><organization/></author>
<author fullname='P. Overell' initials='P.' surname='Overell'><organization/></author>
<date month='January' year='2008'/>
<abstract><t>Internet technical specifications often need to define a formal syntax.  Over the years, a modified version of Backus-Naur Form (BNF), called Augmented BNF (ABNF), has been popular among many Internet specifications.  The current specification documents ABNF. It balances compactness and simplicity with reasonable representational power.  The differences between standard BNF and ABNF involve naming rules, repetition, alternatives, order-independence, and value ranges.  This specification also supplies additional rule definitions and encoding for a core lexical analyzer of the type common to several Internet specifications.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='68'/>
<seriesInfo name='RFC' value='5234'/>
<seriesInfo name='DOI' value='10.17487/RFC5234'/>
</reference>



<reference anchor='SMTP' target='https://www.rfc-editor.org/info/rfc5321'>
<front>
<title>Simple Mail Transfer Protocol</title>
<author fullname='J. Klensin' initials='J.' surname='Klensin'><organization/></author>
<date month='October' year='2008'/>
<abstract><t>This document is a specification of the basic protocol for Internet electronic mail transport.  It consolidates, updates, and clarifies several previous documents, making all or parts of most of them obsolete.  It covers the SMTP extension mechanisms and best practices for the contemporary Internet, but does not provide details about particular extensions.  Although SMTP was designed as a mail transport and delivery protocol, this specification also contains information that is important to its use as a &quot;mail submission&quot; protocol for &quot;split-UA&quot; (User Agent) mail reading systems and mobile environments.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5321'/>
<seriesInfo name='DOI' value='10.17487/RFC5321'/>
</reference>



<reference anchor='PIPELINING' target='https://www.rfc-editor.org/info/rfc2920'>
<front>
<title>SMTP Service Extension for Command Pipelining</title>
<author fullname='N. Freed' initials='N.' surname='Freed'><organization/></author>
<date month='September' year='2000'/>
<abstract><t>This memo defines an extension to the Simple Mail Transfer Protocol (SMTP) service whereby a server can indicate the extent of its ability to accept multiple commands in a single Transmission Control Protocol (TCP) send operation.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='60'/>
<seriesInfo name='RFC' value='2920'/>
<seriesInfo name='DOI' value='10.17487/RFC2920'/>
</reference>




    </references>

    <references title='Informative References'>





<reference anchor='STARTTLS' target='https://www.rfc-editor.org/info/rfc3207'>
<front>
<title>SMTP Service Extension for Secure SMTP over Transport Layer Security</title>
<author fullname='P. Hoffman' initials='P.' surname='Hoffman'><organization/></author>
<date month='February' year='2002'/>
<abstract><t>This document describes an extension to the SMTP (Simple Mail Transfer Protocol) service that allows an SMTP server and client to use TLS (Transport Layer Security) to provide private, authenticated communication over the Internet.  This gives SMTP agents the ability to protect some or all of their communications from eavesdroppers and attackers.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3207'/>
<seriesInfo name='DOI' value='10.17487/RFC3207'/>
</reference>



<reference anchor='AUTH' target='https://www.rfc-editor.org/info/rfc4954'>
<front>
<title>SMTP Service Extension for Authentication</title>
<author fullname='R. Siemborski' initials='R.' role='editor' surname='Siemborski'><organization/></author>
<author fullname='A. Melnikov' initials='A.' role='editor' surname='Melnikov'><organization/></author>
<date month='July' year='2007'/>
<abstract><t>This document defines a Simple Mail Transport Protocol (SMTP) extension whereby an SMTP client may indicate an authentication mechanism to the server, perform an authentication protocol exchange, and optionally negotiate a security layer for subsequent protocol interactions during this session.  This extension includes a profile of the Simple Authentication and Security Layer (SASL) for SMTP.</t><t>This document obsoletes RFC 2554.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4954'/>
<seriesInfo name='DOI' value='10.17487/RFC4954'/>
</reference>



<reference anchor='SIZE' target='https://www.rfc-editor.org/info/rfc1870'>
<front>
<title>SMTP Service Extension for Message Size Declaration</title>
<author fullname='J. Klensin' initials='J.' surname='Klensin'><organization/></author>
<author fullname='N. Freed' initials='N.' surname='Freed'><organization/></author>
<author fullname='K. Moore' initials='K.' surname='Moore'><organization/></author>
<date month='November' year='1995'/>
<abstract><t>This memo defines an extension to the SMTP service whereby an SMTP client and server may interact to give the server an opportunity to decline to accept a message (perhaps temporarily) based on the client's estimate of the message size.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='10'/>
<seriesInfo name='RFC' value='1870'/>
<seriesInfo name='DOI' value='10.17487/RFC1870'/>
</reference>




    </references>


<section anchor="acknowledgements" title="Acknowledgements">

<t>A lot of people have helped make this specification possible. The author wishes
to thank Laura Atkins, Alex Brotman, Dave Crocker, Viktor Dukhovni, 
Jeremy Harris, Todd Herr, Matthias Leisi ,
John Klensin, John Levine, and Michael Peddemors for their contributions.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

