<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.3.37 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-freed-smtp-limits-02" category="std">

  <front>
    <title abbrev="LIMITS Extension">The LIMITS SMTP Service Extension</title>

    <author initials="N." surname="Freed" fullname="Ned Freed">
      <organization>Oracle</organization>
      <address>
        <email>ned.freed@mrochek.com</email>
      </address>
    </author>

    <date year="2021" month="April" day="18"/>

    <area>Art</area>
    
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document defines a “Limits” extension for the Simple Mail
Transfer Protocol (SMTP), including submisssion, as well as the
Local Mail Transfer Protocol (LMTP). It also defines an associated
limit registry. This extension provides the means for an SMTP, submission,
or LMTP server to inform the client of limits the server intends to apply
to the protocol during the current session. The client is then able adapt
its behavior in order to conform to those limits.</t>



    </abstract>


  </front>

  <middle>


<section anchor="problems" title="Introduction">

<t>The Simple Mail Transfer Protocol  provides the ability to
transfer <xref target="SMTP"/> or submit <xref target="SUBMIT"/> multiple email messages
from one host to another, each with multiple recipients, using a
single or multiple connections.</t>

<t>The Local Mail Transfer Protocol <xref target="LMTP"/> provides the ability to
deliver messages to a system without its own mail queues. Like
SMTP, it allows multiple messages with multiple recipients.</t>

<t>In order to conserve resources as well as protect themselves from
malicious clients, it is necessary for servers to enforce limits
on various aspects of the protocol, e.g., a limit on the number
of recipients that can be specified in a single transaction.</t>

<t>Additionally, servers may also wish to alter the limits they
apply depending on their assessment of the reputation of a particular
client.</t>

<t>The variability of the limits that may be in effect creates a
situation where clients may inadvertently exceed a particular server’s
limits, causing servers to respond with temporary (or in some
cases, permanent) errors. This in turn can lead to delays or even
failures in message transfer.</t>

<t>SMTP and LMTP servers have always been able to announce a limit using
distinguished syntax in a reply, but this approach requires that the
client first needed to issue a command.  The mechanism specified here
avoids the overhead of that approach by announcing limits prior to any
substantive interaction.</t>

<t>The “Limits” extension provides the means for a server
to inform a client about specific limits in effect for
a particular SMTP or LMTP session. This information, combined with the
inherent flexibility of these protocols, makes it possible for clients
to avoid server errors and the problems they cause.</t>

<t>Limits are registered with the IANA. Each registration includes
the limit name, value syntax, and a description of its semantics.</t>

</section>
<section anchor="Terminology" title="Terminology">

<t>In this document, the key words “MUST”, “MUST NOT”, “REQUIRED”,
“SHALL”, “SHALL NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “MAY”,
and “OPTIONAL” are to be interpreted as described in BCP 14, RFC 2119
<xref target="KEYWORDS"/>.</t>

<t>This specification uses the Augmented Backus-Naur Form
<xref target="ABNF"/> notation and its core rules to define the
formal syntax of the “Limits” extension.</t>

<t>This specification makes extensive use of the terminology specified
and used in <xref target="SMTP"/>.</t>

</section>
<section anchor="Extension" title="The “Limits” SMTP Extension">

<t>Extensions to SMTP are defined in Section 2.2 of <xref target="SMTP"/>. <xref target="LMTP"/>
inherits SMTP’s extension mechanism.</t>

<t>The name of the extension is “Limits”. Servers implementing this
extension advertise an additional “LIMITS” EHLO (LHLO in LMTP) keyword. The
associated parameter is used by the server to communicate one or
more limits, each with an optional value, to the client. The syntax
of the parameter is:</t>

<figure><artwork type="abnf"><![CDATA[
  limits-param = limit-name-value 0*[SP limit-name-value]
  limit-name-value = limit-name ["=" limit-value]
  limit-name = 1*(ALPHA / DIGIT / "-" / "_")
  limit-value = 1*(%x21-3A / %x3C-7E) ; Any VCHAR except ";"

]]></artwork></figure>

<t>This extension introduces no new SMTP commands, and does not
alter any existing command. However, it is possible for a
LIMITS parameter to be associated with another SMTP extension
that does these things.</t>

<section anchor="limits" title="Limits">

<t>In order to achieve consistent behavior, all limits MUST be
registered with the IANA, as described below.</t>

</section>
<section anchor="limit-naming-conventions" title="Limit Naming Conventions">

<t>Limit names MUST be comprehensible, but also should
be kept as short as possible. The use of commonly understood
abbreviation, e.g., “MAX” for “maximum”, is encouraged.</t>

<t>When a limit is associated with a particular command, its name
SHOULD begin with the name of that command.</t>

<t>Limit names SHOULD end with one or more terms that describe
the type of limit.</t>

</section>
<section anchor="interaction-with-pipelining" title="Interaction With Pipelining">

<t>The “Pipelining” extension <xref target="PIPELINING"/> is commonly used
to improve performance, especially over high latency
connections. Pipelining allows entire transaction
to be sent without checking responses and in some cases it may be
possible to send multiple transactions.</t>

<t>The use of pipelining affects limits in an important way: Since
a pipelining client cannot check intermediate command responses
without stalling the pipeline, it cannot count the number of
succesful versus failed responses and adjust its behavior accordingly.
Limit designers need to take this into account.</t>

<t>For example, it may seem like it would be better to impose a limit
on the number of succesful RCPT TO commands as opposed to the
way the RCPTMAX limit is specified in <xref target="RCPTMAX"/> below. But
counting the total number of RCPT TOs is simple, whereas
counting the number of successful RCPT TO stalls the pipeline.</t>

</section>
<section anchor="varying-limits" title="Varying Limits">

<t>This extension provides an announcement as part of the reply to
an EHLO command. Some servers vary their limits, as a session
progresses, based  on their obtaining more information.
This extension does not attempt to hand in-session limit changes.</t>

</section>
<section anchor="interaction-with-smtp-minimums" title="Interaction With SMTP Minimums">

<t>Section 4.5.3.1 of <xref target="SMTP"/> specifies minimum values for
various server sizes, limits, and timeouts, e.g., servers must
accept a minimum of 100 RCPT TO commands (section 4.5.3.1.8).
Unfortunately, the  reality is that servers routinely impose smaller
limits than what SMTP requires, and when this is done it’s especially
important for clients to be aware that this is happening.</t>

<t>For this reason there is no requirement that the limits
advertised by this extension comply with the minimums imposed
by SMTP.</t>

</section>
<section anchor="multiple-ehlo-commands" title="Multiple EHLO Commands">

<t>These protocols require that the EHLO command (LHLO in LMTP) be
reissued under certain circumstances, e.g., after successful
authentication <xref target="AUTH"/> or negotiation of a security layer <xref target="STARTTLS"/>.</t>

<t>Servers MAY update their limits any time the protocol requires
clients to reissue the EHLO command. Clients MUST discard any
previous limits in favor of those provided by the most recent
EHLO. This includes the case where the original EHLO provided
a set of limits but the subsequent EHLO did not; in this
case the client MUST act as if no limits were communicated.</t>

</section>
<section anchor="caching-of-limit-settings-between-sessions" title="Caching of limit settings between sessions">

<t>Clients MAY cache limits determined during one session
and use them to optimize their behavior for subsequent
sessions. However, since servers are free to adjust their
limits at any time, clients MUST be able to accommodate
any limit changes that occur between sessions.</t>

</section>
</section>
<section anchor="initial-limits" title="Initial Limits">

<t>An initial set of limits are specified in the following sections.</t>

<section anchor="mailmax-limit" title="MAILMAX Limit">

<t>Name: MAILMAX</t>

<t>Value syntax: %x31-39 0*5DIGIT ; 0 not allowed, 6 digit maximum</t>

<t>Description: MAILMAX specifies the maximum number of transactions
(MAIL FROM commands) the server will accept in a single session. The
count includes all MAIL FROM commands, regardless of whether they
succeed or fail.</t>

<t>Restrictions: None.</t>

<t>Security Considerations: See <xref target="Seccons"/></t>

</section>
<section anchor="RCPTMAX" title="RCPTMAX Limit">

<t>Name: RCPTMAX</t>

<t>Value syntax:  %x31-39 0*5DIGIT ; 0 not allowed, 6 digit maximum</t>

<t>Description: RCPTMAX specifies the maximum number of RCPT TO commands
the server will accept in a single transaction. It is not a limit
on the actual number of recipients the message ends up being sent to;
a single RCPT TO command may produce multiple recipients or, in the
event of an error, none.</t>

<t>Restrictions: None.</t>

<t>Security Considerations: See <xref target="Seccons"/></t>

</section>
<section anchor="rcptdomainmax-limit" title="RCPTDOMAINMAX Limit">

<t>Name: RCPTDOMAINMAX</t>

<t>Value syntax:  %x31-39 0*5DIGIT ; 0 not allowed, 6 digit maximum</t>

<t>Description: RCPTDOMAINMAX specifies the maximum number of different domains
that can appear in a recipient (RCPT TO) address within a single
session. This limit is imposed by some servers that bind to
a specific internal delivery mechanism on receipt of the first
RCPT TO command.</t>

<t>Restrictions: None.</t>

<t>Security Considerations: See <xref target="Seccons"/></t>

</section>
</section>
<section anchor="Seccons" title="Security Considerations">

<t>A malicious server can use limits to overly constrain client behavior,
causing excessive use of client resources.</t>

<t>A malicious client may use the limits a server advertises to optimize
the delivery of unwanted messages.</t>

<t>A man-in-the-middle attack on unprotected SMTP connections can
be used to cause clients to misbehave, which in turn could result
in delivery delays or failures. Loss of reputation for the client
could also occur.</t>

<t>All that said, decades of operational experience with the
SMTP “SIZE” extension <xref target="SIZE"/>, which provides servers with the
ability to indicate message size, indicates that such abuse is
rare and unlikely to be a significant problem.</t>

</section>
<section anchor="iana-considerations" title="IANA Considerations">

<section anchor="smtp-service-extension-registry" title="SMTP Service Extension Registry">

<t>The IANA is requested to add “LIMITS” to the SMTP Service
Extension Registry:</t>

<figure><artwork><![CDATA[
Keywords: LIMITS
Description: Server limits
Reference: [RFCxxxx]

]]></artwork></figure>

</section>
<section anchor="smtp-server-limits-registry" title="SMTP Server Limits Registry">

<t>The IANA is requested to create a new registry for SMTP
server limits. The policy for this registry is “Specification Required”.
Registry entries consist of three required values:</t>

<t><list style="numbers">
  <t>The name of the limit</t>
  <t>The syntax of the limit value, if the limit has one. Use of <xref target="ABNF"/>
is preferred but not required.</t>
  <t>A description of the limit’s semantics</t>
  <t>Restrictions, if any, on the use of the limit. If the limit is specific
to any of SMTP, message submission, or LMTP, it should be documented
here.</t>
  <t>Security considerations for the limit</t>
</list></t>

<t>The IANA is also requested to register the limits specified in
this document.</t>

</section>
</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference anchor='KEYWORDS' target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='PIPELINING' target='https://www.rfc-editor.org/info/rfc2920'>
<front>
<title>SMTP Service Extension for Command Pipelining</title>
<author fullname='N. Freed' initials='N.' surname='Freed'><organization/></author>
<date month='September' year='2000'/>
<abstract><t>This memo defines an extension to the Simple Mail Transfer Protocol (SMTP) service whereby a server can indicate the extent of its ability to accept multiple commands in a single Transmission Control Protocol (TCP) send operation.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='60'/>
<seriesInfo name='RFC' value='2920'/>
<seriesInfo name='DOI' value='10.17487/RFC2920'/>
</reference>



<reference anchor='ABNF' target='https://www.rfc-editor.org/info/rfc5234'>
<front>
<title>Augmented BNF for Syntax Specifications: ABNF</title>
<author fullname='D. Crocker' initials='D.' role='editor' surname='Crocker'><organization/></author>
<author fullname='P. Overell' initials='P.' surname='Overell'><organization/></author>
<date month='January' year='2008'/>
<abstract><t>Internet technical specifications often need to define a formal syntax.  Over the years, a modified version of Backus-Naur Form (BNF), called Augmented BNF (ABNF), has been popular among many Internet specifications.  The current specification documents ABNF. It balances compactness and simplicity with reasonable representational power.  The differences between standard BNF and ABNF involve naming rules, repetition, alternatives, order-independence, and value ranges.  This specification also supplies additional rule definitions and encoding for a core lexical analyzer of the type common to several Internet specifications.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='68'/>
<seriesInfo name='RFC' value='5234'/>
<seriesInfo name='DOI' value='10.17487/RFC5234'/>
</reference>



<reference anchor='SMTP' target='https://www.rfc-editor.org/info/rfc5321'>
<front>
<title>Simple Mail Transfer Protocol</title>
<author fullname='J. Klensin' initials='J.' surname='Klensin'><organization/></author>
<date month='October' year='2008'/>
<abstract><t>This document is a specification of the basic protocol for Internet electronic mail transport.  It consolidates, updates, and clarifies several previous documents, making all or parts of most of them obsolete.  It covers the SMTP extension mechanisms and best practices for the contemporary Internet, but does not provide details about particular extensions.  Although SMTP was designed as a mail transport and delivery protocol, this specification also contains information that is important to its use as a &quot;mail submission&quot; protocol for &quot;split-UA&quot; (User Agent) mail reading systems and mobile environments.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5321'/>
<seriesInfo name='DOI' value='10.17487/RFC5321'/>
</reference>




    </references>

    <references title='Informative References'>





<reference anchor='SIZE' target='https://www.rfc-editor.org/info/rfc1870'>
<front>
<title>SMTP Service Extension for Message Size Declaration</title>
<author fullname='J. Klensin' initials='J.' surname='Klensin'><organization/></author>
<author fullname='N. Freed' initials='N.' surname='Freed'><organization/></author>
<author fullname='K. Moore' initials='K.' surname='Moore'><organization/></author>
<date month='November' year='1995'/>
<abstract><t>This memo defines an extension to the SMTP service whereby an SMTP client and server may interact to give the server an opportunity to decline to accept a message (perhaps temporarily) based on the client's estimate of the message size.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='10'/>
<seriesInfo name='RFC' value='1870'/>
<seriesInfo name='DOI' value='10.17487/RFC1870'/>
</reference>



<reference anchor='LMTP' target='https://www.rfc-editor.org/info/rfc2033'>
<front>
<title>Local Mail Transfer Protocol</title>
<author fullname='J. Myers' initials='J.' surname='Myers'><organization/></author>
<date month='October' year='1996'/>
<abstract><t>SMTP [SMTP] [HOST-REQ] and its service extensions [ESMTP] provide a mechanism for transferring mail reliably and efficiently.  The design of the SMTP protocol effectively requires the server to manage a mail delivery queue.  This memo provides information for the Internet community.  This memo does not specify an Internet standard of any kind.</t></abstract>
</front>
<seriesInfo name='RFC' value='2033'/>
<seriesInfo name='DOI' value='10.17487/RFC2033'/>
</reference>



<reference anchor='STARTTLS' target='https://www.rfc-editor.org/info/rfc3207'>
<front>
<title>SMTP Service Extension for Secure SMTP over Transport Layer Security</title>
<author fullname='P. Hoffman' initials='P.' surname='Hoffman'><organization/></author>
<date month='February' year='2002'/>
<abstract><t>This document describes an extension to the SMTP (Simple Mail Transfer Protocol) service that allows an SMTP server and client to use TLS (Transport Layer Security) to provide private, authenticated communication over the Internet.  This gives SMTP agents the ability to protect some or all of their communications from eavesdroppers and attackers.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3207'/>
<seriesInfo name='DOI' value='10.17487/RFC3207'/>
</reference>



<reference anchor='AUTH' target='https://www.rfc-editor.org/info/rfc4954'>
<front>
<title>SMTP Service Extension for Authentication</title>
<author fullname='R. Siemborski' initials='R.' role='editor' surname='Siemborski'><organization/></author>
<author fullname='A. Melnikov' initials='A.' role='editor' surname='Melnikov'><organization/></author>
<date month='July' year='2007'/>
<abstract><t>This document defines a Simple Mail Transport Protocol (SMTP) extension whereby an SMTP client may indicate an authentication mechanism to the server, perform an authentication protocol exchange, and optionally negotiate a security layer for subsequent protocol interactions during this session.  This extension includes a profile of the Simple Authentication and Security Layer (SASL) for SMTP.</t><t>This document obsoletes RFC 2554.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4954'/>
<seriesInfo name='DOI' value='10.17487/RFC4954'/>
</reference>



<reference anchor='SUBMIT' target='https://www.rfc-editor.org/info/rfc6409'>
<front>
<title>Message Submission for Mail</title>
<author fullname='R. Gellens' initials='R.' surname='Gellens'><organization/></author>
<author fullname='J. Klensin' initials='J.' surname='Klensin'><organization/></author>
<date month='November' year='2011'/>
<abstract><t>This memo splits message submission from message relay, allowing each service to operate according to its own rules (for security, policy, etc.), and specifies what actions are to be taken by a submission server.</t><t>Message relay is unaffected, and continues to use SMTP over port 25.</t><t>When conforming to this document, message submission uses the protocol specified here, normally over port 587.</t><t>This separation of function offers a number of benefits, including the ability to apply specific security or policy requirements.   [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='72'/>
<seriesInfo name='RFC' value='6409'/>
<seriesInfo name='DOI' value='10.17487/RFC6409'/>
</reference>




    </references>


<section anchor="acknowledgements" title="Acknowledgements">

<t>A lot of people have helped make this specification possible. The author wishes
to thank Claus Assmann, Laura Atkins, Alex Brotman, Dave Crocker, Viktor Dukhovni, 
Jeremy Harris, Todd Herr, Matthias Leisi, John Klensin, Valdis Klētnieks,
John Levine, Alexey Melnikov, Keith Moore, Michael Peddemors, Rolf E. Sonneveld,
and Alessandro Vesely for their contributions.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

