<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.3.37 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-freed-smtp-limits-03" category="std">

  <front>
    <title abbrev="LIMITS Extension">The LIMITS SMTP Service Extension</title>

    <author initials="N." surname="Freed" fullname="Ned Freed">
      <organization>Oracle</organization>
      <address>
        <email>ned.freed@mrochek.com</email>
      </address>
    </author>

    <date year="2021" month="July" day="12"/>

    <area>Art</area>
    
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document defines a “Limits” extension for the Simple Mail
Transfer Protocol (SMTP), including submisssion, as well as the
Local Mail Transfer Protocol (LMTP). It also defines an associated
limit registry. This extension provides the means for an SMTP, submission,
or LMTP server to inform the client of limits the server intends to apply
to the protocol during the current session. The client is then able to adapt
its behavior in order to conform to those limits.</t>



    </abstract>


  </front>

  <middle>


<section anchor="problems" title="Introduction">

<t>The Simple Mail Transfer Protocol  provides the ability to
transfer <xref target="SMTP"/> or submit <xref target="SUBMIT"/> multiple email messages
from one host to another, each with multiple recipients, using a
single or multiple connections.</t>

<t>The Local Mail Transfer Protocol <xref target="LMTP"/> provides the ability to
deliver messages to a system without its own mail queues. Like
SMTP, it allows multiple messages with multiple recipients.</t>

<t>In order to conserve resources as well as protect themselves from
malicious clients, it is necessary for servers to enforce limits
on various aspects of the protocol, e.g., a limit on the number
of recipients that can be specified in a single transaction.</t>

<t>Additionally, servers may also wish to alter the limits they
apply depending on their assessment of the reputation of a particular
client.</t>

<t>The variability of the limits that may be in effect creates a
situation where clients may inadvertently exceed a particular server’s
limits, causing servers to respond with temporary (or in some
cases, permanent) errors. This in turn can lead to delays or even
failures in message transfer.</t>

<t>The “Limits” extension provides the means for a server
to inform a client about specific limits in effect for
a particular SMTP or LMTP session in the EHLO or LHLO command response.
This information, combined with the
inherent flexibility of these protocols, makes it possible for clients
to avoid server errors and the problems they cause.</t>

<t>SMTP and LMTP servers have always been able to announce a limit using
distinguished syntax in a reply, but this approach requires that the
client first needs to issue a command.  The mechanism specified here
avoids the overhead of that approach by announcing limits prior to any
substantive interaction.</t>

<t>Limits are registered with the IANA. Each registration includes
the limit name, value syntax, and a description of its semantics.</t>

</section>
<section anchor="Terminology" title="Terminology">

<t>In this document, the key words “MUST”, “MUST NOT”, “REQUIRED”,
“SHALL”, “SHALL NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “MAY”,
and “OPTIONAL” are to be interpreted as described in BCP 14, RFC 2119
<xref target="KEYWORDS"/>.</t>

<t>This specification uses the Augmented Backus-Naur Form
<xref target="ABNF"/> notation and its core rules to define the
formal syntax of the “Limits” extension.</t>

<t>This specification makes extensive use of the terminology specified
and used in <xref target="SMTP"/>.</t>

</section>
<section anchor="Extension" title="The “Limits” SMTP Extension">

<t>Extensions to SMTP are defined in Section 2.2 of <xref target="SMTP"/>. <xref target="LMTP"/>
inherits SMTP’s extension mechanism.</t>

<t>The name of the extension is “Limits”. Servers implementing this
extension advertise an additional “LIMITS” EHLO (LHLO in LMTP) keyword. The
associated parameter is used by the server to communicate one or
more limits, each with an optional value, to the client. The syntax
of the parameter is:</t>

<figure><artwork type="abnf"><![CDATA[
  limits-param = limit-name-value 0*[SP limit-name-value]
  limit-name-value = limit-name ["=" limit-value]
  limit-name = 1*(ALPHA / DIGIT / "-" / "_")
  limit-value = 1*(%x21-3A / %x3C-7E) ; Any VCHAR except ";"

]]></artwork></figure>

<t>This extension introduces no new SMTP commands, and does not
alter any existing command. However, it is possible for a
LIMITS parameter to be associated with another SMTP extension
that does these things.</t>

<section anchor="limits" title="Limits">

<t>In order to achieve consistent behavior, all limits MUST be
registered with the IANA, as described below.</t>

</section>
<section anchor="limit-naming-conventions" title="Limit Naming Conventions">

<t>Limit names MUST be comprehensible, but also should
be kept as short as possible. The use of commonly understood
abbreviations, e.g., “MAX” for “maximum”, is encouraged.</t>

<t>When a limit is associated with a particular command, its name
SHOULD begin with the name of that command.</t>

<t>Limit names SHOULD end with one or more terms that describe
the type of limit.</t>

</section>
<section anchor="interaction-with-pipelining" title="Interaction With Pipelining">

<t>The “Pipelining” extension <xref target="PIPELINING"/> is commonly used
to improve performance, especially over high latency
connections. Pipelining allows entire transaction
to be sent without checking responses and in some cases it may be
possible to send multiple transactions.</t>

<t>The use of pipelining affects limits in an important way: Since
a pipelining client cannot check intermediate command responses
without stalling the pipeline, it cannot count the number of
succesful versus failed responses and adjust its behavior accordingly.
Limit designers need to take this into account.</t>

<t>For example, it may seem like it would be better to impose a limit
on the number of succesful RCPT TO commands as opposed to the
way the RCPTMAX limit is specified in <xref target="RCPTMAX"/> below. But
counting the total number of RCPT TOs is simple, whereas
counting the number of successful RCPT TO stalls the pipeline.</t>

</section>
<section anchor="varying-limits" title="Varying Limits">

<t>This extension provides an announcement as part of the reply to
an EHLO command. Some servers vary their limits, as a session
progresses, based  on their obtaining more information.
This extension does not attempt to handle in-session limit changes.</t>

</section>
<section anchor="interaction-with-smtp-minimums" title="Interaction With SMTP Minimums">

<t>Section 4.5.3.1 of <xref target="SMTP"/> specifies minimum values for
various server sizes, limits, and timeouts, e.g., servers must
accept a minimum of 100 RCPT TO commands (section 4.5.3.1.8).
Unfortunately, the  reality is that servers routinely impose smaller
limits than what SMTP requires, and when this is done it’s especially
important for clients to be aware that this is happening.</t>

<t>For this reason there is no requirement that the limits
advertised by this extension comply with the minimums imposed
by SMTP.</t>

</section>
<section anchor="multiple-ehlo-commands" title="Multiple EHLO Commands">

<t>These protocols require that the EHLO command (LHLO in LMTP) be
reissued under certain circumstances, e.g., after successful
authentication <xref target="AUTH"/> or negotiation of a security layer <xref target="STARTTLS"/>.</t>

<t>Servers MAY return updated limits any time the protocol requires
clients to reissue the EHLO command. Clients MUST discard any
previous limits in favor of those provided by the most recent
EHLO. This includes the case where the original EHLO provided
a set of limits but the subsequent EHLO did not; in this
case the client MUST act as if no limits were communicated.</t>

</section>
<section anchor="syntax-errors-in-the-limits-parameter-value" title="Syntax Errors in the LIMITS Parameter Value">

<t>Syntax errors in the basic parameter syntax are best handled by
ignoring the value in its entirety; in this case clients SHOULD
proceed as if the LIMITS extension wasn’t used.</t>

<t>Syntax errors in the value syntax of a specific limit are
best handled by ignoring that limit; in this case the client
SHOULD proceed as if that limit wasn’t specified.</t>

<t>It is possible that future specification may create
multiple limits that are interrelated in some way; in this case
that specification MUST specify how an error in one limit’s 
value syntax affects the other limits.</t>

</section>
<section anchor="caching-of-limit-settings-between-sessions" title="Caching of Limit Settings Between Sessions">

<t>Clients MAY cache limits determined during one session
and use them to optimize their behavior for subsequent
sessions. However, since servers are free to adjust their
limits at any time, clients MUST be able to accommodate
any limit changes that occur between sessions.</t>

</section>
</section>
<section anchor="initial-limits" title="Initial Limits">

<t>An initial set of limits are specified in the following sections.</t>

<section anchor="mailmax-limit" title="MAILMAX Limit">

<t>Name: MAILMAX</t>

<t>Value syntax: %x31-39 0*5DIGIT ; 0 not allowed, 6 digit maximum</t>

<t>Description: MAILMAX specifies the maximum number of transactions
(MAIL FROM commands) the server will accept in a single session. The
count includes all MAIL FROM commands, regardless of whether they
succeed or fail.</t>

<t>Restrictions: None.</t>

<t>Security Considerations: See <xref target="Seccons"/></t>

</section>
<section anchor="RCPTMAX" title="RCPTMAX Limit">

<t>Name: RCPTMAX</t>

<t>Value syntax:  %x31-39 0*5DIGIT ; 0 not allowed, 6 digit maximum</t>

<t>Description: RCPTMAX specifies the maximum number of RCPT TO commands
the server will accept in a single transaction. It is not a limit
on the actual number of recipients the message ends up being sent to;
a single RCPT TO command may produce multiple recipients or, in the
event of an error, none.</t>

<t>Restrictions: None.</t>

<t>Security Considerations: See <xref target="Seccons"/></t>

</section>
<section anchor="rcptdomainmax-limit" title="RCPTDOMAINMAX Limit">

<t>Name: RCPTDOMAINMAX</t>

<t>Value syntax:  %x31-39 0*5DIGIT ; 0 not allowed, 6 digit maximum</t>

<t>Description: RCPTDOMAINMAX specifies the maximum number of different domains
that can appear in a recipient (RCPT TO) address within a single
session. This limit is imposed by some servers that bind to
a specific internal delivery mechanism on receipt of the first
RCPT TO command.</t>

<t>Restrictions: None.</t>

<t>Security Considerations: See <xref target="Seccons"/></t>

</section>
</section>
<section anchor="example" title="Example">

<t>A server announces two limits it implements to the client, along
with various other supported extensions, as follows:</t>

<figure><artwork><![CDATA[
S: [wait for open connection]
C: [open connection to server]
S: 220 mail.example.com ESMTP service ready
C: EHLO example.org
S: 250-mail.example.com
S: 250-SMTPUTF8
S: 250-LIMTIS RCPTMAX=20 MAILMAX=5
S: 250-SIZE 100000000
S: 250-8BITMIME
S: 250-ENHANCEDSTATUSCODES
S: 250-PIPELINING
S: 250-CHUNKING
S: 250 STARTTLS

]]></artwork></figure>

<t>The client now knows to limit the number of recipients in a transaction
to twenty and the number of transaction in a session to five.</t>

</section>
<section anchor="Seccons" title="Security Considerations">

<t>A malicious server can use limits to overly constrain client behavior,
causing excessive use of client resources.</t>

<t>A malicious client may use the limits a server advertises to optimize
the delivery of unwanted messages.</t>

<t>A man-in-the-middle attack on unprotected SMTP connections can
be used to cause clients to misbehave, which in turn could result
in delivery delays or failures. Loss of reputation for the client
could also occur.</t>

<t>All that said, decades of operational experience with the
SMTP “SIZE” extension <xref target="SIZE"/>, which provides servers with the
ability to indicate message size, indicates that such abuse is
rare and unlikely to be a significant problem.</t>

<t>Use of the Limits extension to provide client-specific information - as 
opposed to general server limits - unavoidably provides senders with
feedback about their reputation. Malicious senders can exploit this
in various ways, e.g., start by sending good email and then, once their
reputation is established, sending bad email.</t>

</section>
<section anchor="iana-considerations" title="IANA Considerations">

<section anchor="smtp-service-extension-registry" title="SMTP Service Extension Registry">

<t>The IANA is requested to add “LIMITS” to the SMTP Service
Extension Registry:</t>

<figure><artwork><![CDATA[
Keywords: LIMITS
Description: Server limits
Reference: [RFCxxxx]

]]></artwork></figure>

</section>
<section anchor="smtp-server-limits-registry" title="SMTP Server Limits Registry">

<t>The IANA is requested to create a new registry for SMTP
server limits. The policy for this registry is “Specification Required”.
Registry entries consist of three required values:</t>

<t><list style="numbers">
  <t>The name of the limit</t>
  <t>The syntax of the limit value, if the limit has one. Use of <xref target="ABNF"/>
is preferred but not required.</t>
  <t>A description of the limit’s semantics</t>
  <t>Restrictions, if any, on the use of the limit. If the limit is specific
to any of SMTP, message submission, or LMTP, it should be documented
here.</t>
  <t>Security considerations for the limit</t>
</list></t>

<t>The IANA is also requested to register the limits specified in
this document.</t>

</section>
</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference anchor='KEYWORDS' target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='PIPELINING' target='https://www.rfc-editor.org/info/rfc2920'>
<front>
<title>SMTP Service Extension for Command Pipelining</title>
<author fullname='N. Freed' initials='N.' surname='Freed'><organization/></author>
<date month='September' year='2000'/>
<abstract><t>This memo defines an extension to the Simple Mail Transfer Protocol (SMTP) service whereby a server can indicate the extent of its ability to accept multiple commands in a single Transmission Control Protocol (TCP) send operation.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='60'/>
<seriesInfo name='RFC' value='2920'/>
<seriesInfo name='DOI' value='10.17487/RFC2920'/>
</reference>



<reference anchor='ABNF' target='https://www.rfc-editor.org/info/rfc5234'>
<front>
<title>Augmented BNF for Syntax Specifications: ABNF</title>
<author fullname='D. Crocker' initials='D.' role='editor' surname='Crocker'><organization/></author>
<author fullname='P. Overell' initials='P.' surname='Overell'><organization/></author>
<date month='January' year='2008'/>
<abstract><t>Internet technical specifications often need to define a formal syntax.  Over the years, a modified version of Backus-Naur Form (BNF), called Augmented BNF (ABNF), has been popular among many Internet specifications.  The current specification documents ABNF. It balances compactness and simplicity with reasonable representational power.  The differences between standard BNF and ABNF involve naming rules, repetition, alternatives, order-independence, and value ranges.  This specification also supplies additional rule definitions and encoding for a core lexical analyzer of the type common to several Internet specifications.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='68'/>
<seriesInfo name='RFC' value='5234'/>
<seriesInfo name='DOI' value='10.17487/RFC5234'/>
</reference>



<reference anchor='SMTP' target='https://www.rfc-editor.org/info/rfc5321'>
<front>
<title>Simple Mail Transfer Protocol</title>
<author fullname='J. Klensin' initials='J.' surname='Klensin'><organization/></author>
<date month='October' year='2008'/>
<abstract><t>This document is a specification of the basic protocol for Internet electronic mail transport.  It consolidates, updates, and clarifies several previous documents, making all or parts of most of them obsolete.  It covers the SMTP extension mechanisms and best practices for the contemporary Internet, but does not provide details about particular extensions.  Although SMTP was designed as a mail transport and delivery protocol, this specification also contains information that is important to its use as a &quot;mail submission&quot; protocol for &quot;split-UA&quot; (User Agent) mail reading systems and mobile environments.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5321'/>
<seriesInfo name='DOI' value='10.17487/RFC5321'/>
</reference>




    </references>

    <references title='Informative References'>





<reference anchor='SIZE' target='https://www.rfc-editor.org/info/rfc1870'>
<front>
<title>SMTP Service Extension for Message Size Declaration</title>
<author fullname='J. Klensin' initials='J.' surname='Klensin'><organization/></author>
<author fullname='N. Freed' initials='N.' surname='Freed'><organization/></author>
<author fullname='K. Moore' initials='K.' surname='Moore'><organization/></author>
<date month='November' year='1995'/>
<abstract><t>This memo defines an extension to the SMTP service whereby an SMTP client and server may interact to give the server an opportunity to decline to accept a message (perhaps temporarily) based on the client's estimate of the message size.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='10'/>
<seriesInfo name='RFC' value='1870'/>
<seriesInfo name='DOI' value='10.17487/RFC1870'/>
</reference>



<reference anchor='LMTP' target='https://www.rfc-editor.org/info/rfc2033'>
<front>
<title>Local Mail Transfer Protocol</title>
<author fullname='J. Myers' initials='J.' surname='Myers'><organization/></author>
<date month='October' year='1996'/>
<abstract><t>SMTP [SMTP] [HOST-REQ] and its service extensions [ESMTP] provide a mechanism for transferring mail reliably and efficiently.  The design of the SMTP protocol effectively requires the server to manage a mail delivery queue.  This memo provides information for the Internet community.  This memo does not specify an Internet standard of any kind.</t></abstract>
</front>
<seriesInfo name='RFC' value='2033'/>
<seriesInfo name='DOI' value='10.17487/RFC2033'/>
</reference>



<reference anchor='STARTTLS' target='https://www.rfc-editor.org/info/rfc3207'>
<front>
<title>SMTP Service Extension for Secure SMTP over Transport Layer Security</title>
<author fullname='P. Hoffman' initials='P.' surname='Hoffman'><organization/></author>
<date month='February' year='2002'/>
<abstract><t>This document describes an extension to the SMTP (Simple Mail Transfer Protocol) service that allows an SMTP server and client to use TLS (Transport Layer Security) to provide private, authenticated communication over the Internet.  This gives SMTP agents the ability to protect some or all of their communications from eavesdroppers and attackers.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3207'/>
<seriesInfo name='DOI' value='10.17487/RFC3207'/>
</reference>



<reference anchor='AUTH' target='https://www.rfc-editor.org/info/rfc4954'>
<front>
<title>SMTP Service Extension for Authentication</title>
<author fullname='R. Siemborski' initials='R.' role='editor' surname='Siemborski'><organization/></author>
<author fullname='A. Melnikov' initials='A.' role='editor' surname='Melnikov'><organization/></author>
<date month='July' year='2007'/>
<abstract><t>This document defines a Simple Mail Transport Protocol (SMTP) extension whereby an SMTP client may indicate an authentication mechanism to the server, perform an authentication protocol exchange, and optionally negotiate a security layer for subsequent protocol interactions during this session.  This extension includes a profile of the Simple Authentication and Security Layer (SASL) for SMTP.</t><t>This document obsoletes RFC 2554.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4954'/>
<seriesInfo name='DOI' value='10.17487/RFC4954'/>
</reference>



<reference anchor='SUBMIT' target='https://www.rfc-editor.org/info/rfc6409'>
<front>
<title>Message Submission for Mail</title>
<author fullname='R. Gellens' initials='R.' surname='Gellens'><organization/></author>
<author fullname='J. Klensin' initials='J.' surname='Klensin'><organization/></author>
<date month='November' year='2011'/>
<abstract><t>This memo splits message submission from message relay, allowing each service to operate according to its own rules (for security, policy, etc.), and specifies what actions are to be taken by a submission server.</t><t>Message relay is unaffected, and continues to use SMTP over port 25.</t><t>When conforming to this document, message submission uses the protocol specified here, normally over port 587.</t><t>This separation of function offers a number of benefits, including the ability to apply specific security or policy requirements.   [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='72'/>
<seriesInfo name='RFC' value='6409'/>
<seriesInfo name='DOI' value='10.17487/RFC6409'/>
</reference>




    </references>


<section anchor="acknowledgements" title="Acknowledgements">

<t>A lot of people have helped make this specification possible. The author wishes
to thank Claus Assmann, Laura Atkins, Alex Brotman, Richard Clayton,
Dave Crocker, Viktor Dukhovni,  Arnt Gulbrandsen, Jeremy Harris, Todd Herr,
Mike Hillyer, Matthias Leisi, John Klensin, Valdis Klētnieks,
John Levine, Alexey Melnikov, Keith Moore, Michael Peddemors, Hector Santos,
George Schlossnagle, Rolf E. Sonneveld, and Alessandro Vesely for their
contributions and reviews.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

