Internet Draft: SMTP Message Submission. Expires: 12 September 1998 MCI 12 March SMTP Message Submission. Status of this Memo:

Size: px
Start display at page:

Download "Internet Draft: SMTP Message Submission. Expires: 12 September 1998 MCI 12 March SMTP Message Submission. Status of this Memo:"

Transcription

1 HTTP/ OK Date: Tue, 09 Apr :04:29 GMT Server: Apache/ (Unix) Last-Modified: Mon, 27 Apr :29:00 GMT ETag: "2e9a07-b c" Accept-Ranges: bytes Content-Length: Connection: close Content-Type: text/plain Internet Draft: SMTP Message Submission Document: draft-gellens-submit-06.txt Expires: 12 September 1998 R. Gellens QUALCOMM, Incorporated J. Klensin MCI 12 March 1997 SMTP Message Submission Status of this Memo: This document is an Internet Draft. Internet Drafts are working documents of the Internet Engineering Task Force (IETF), its Areas, and its Working Groups. Note that other groups may also distribute working documents as Internet Drafts. Internet Drafts are draft documents valid for a maximum of six months. Internet Drafts may be updated, replaced, or obsoleted by other documents at any time. It is not appropriate to use Internet Drafts as reference material or to cite them other than as a "working draft" or "work in progress." To learn the current status of any Internet Draft, please check the "1id-abstracts.txt" listing contained in the Internet Drafts shadow directories on ftp.is.co.za (Africa), nic.nordu.net (Europe), munnari.oz.au (Pacific Rim), ds.internic.net (US East Coast), or ftp.isi.edu (US West Coast). A version of this draft document will be submitted to the RFC editor as a Proposed Standard for the Internet Community. Discussion and suggestions for improvement are requested. Public comments should be sent to the IETF Submit mailing list, <ietf-submit@imc.org>. To subscribe, send a message containing SUBSCRIBE to <ietf-submit-request@imc.org>. Private comments can be sent to the authors. This version reflects comments received during Last Call. Copyright Notice Copyright (C) The Internet Society All Rights Reserved. Table of Contents 1. SUBMIT Servers SMTP Extension for Message Relay Assertion Actions when RELAY Is Used Gellens, Klensin Expires September 1998 [Page 1]

2 4. Actions when the Message Is a Submission General Rules Specific Problems Rejection vs. Damage Things which MAY Be Done Enforce Submission Rights Require Authentication Enforce Permissions Check Message Data Add Sender Add Date Add Message-ID Transfer Encode Resolve Aliases Header Rewriting Sign the Message Encrypt the Message Things which SHOULD Be Done Be the Only MSA Log Errors Things which MUST NOT Be Done Corrupt the Message Things which MUST Be Done Ensure All Domains are Fully-Qualified Enforce Address Syntax Use RELAY Add Change-ID and Change-History Change-ID and Change-History Parameters of Change-ID Date MSA Port Contact Parameters of Change-History Element Action Cause Original Result ABNF for Change-ID ABNF for Change-History Common ABNF Examples of Change-ID and Change-History Submission Extension Mechanism SUBM Example Interaction with Other SMTP Extensions Message Rejection and Bouncing Reply Codes IANA Considerations Registration Procedures Change Control Registration Template Gellens, Klensin Expires September 1998 [Page 2]

3 11. Security Considerations Acknowledgments References Full Copyright Statement Authors Addresses Introduction SMTP was defined as a message *transfer* protocol, that is, a means to route (if needed) and deliver finished (complete) messages. Message Transfer Agents (MTAs) are not supposed to alter the message text, except to add Received, Return-Path, and other header fields as required by [SMTP-MTA]. However, SMTP is now also widely used as a message *submission* protocol, that is, a means for message user agents (MUAs) to introduce new messages into the MTA routing network. Regardless of whether this is good or bad, it is far too late to change. Originally, users connected to servers from terminals, and all processing occurred on the server. Now, a split-mua model is common, with MUA functionality occurring on both the user s own system and the server. Protocols such as POP or IMAP provide one side of the split-mua architecture. SMTP has been used for the other. This memo proposes that the submission protocol defined here be used instead. Messages being submitted are in some cases finished (complete) messages, and in other cases are unfinished (incomplete) in some aspect or other. Unfinished messages need to be completed to ensure they conform to [MESSAGE-FORMAT], and later requirements. For example, the message may lack proper Date or Message-ID header fields, and domains might not be fully qualified. In some cases, the MUA may be unable to generate finished messages (for example, it might not know its time zone). Even when submitted messages are complete, local site policy may dictate that the message text be modified in some ways. Such completions or modifications have been shown to cause harm when performed by downstream MTAs, and are in general considered to be outside the province of MTAs. This memo proposes a low cost, deterministic means for messages to be identified as submissions, and specifies what actions are to be taken by a submission server. Gellens, Klensin Expires September 1998 [Page 3]

4 Separation of messages into submissions and transfers can have many benefits for Internet mail in the short and long term. These benefits include allowing sites to more easily implement security policies and guard against unauthorized mail relaying (and injection of unsolicited bulk ), making it easier to detect configuration problems with a site s mail clients, providing a migration path to get MTAs out of the dangerous business of modifying mail, and providing a basis for adding additional functionality in the future. Definitions of Terms Used in this Memo Fully-Qualified Containing or consisting of a domain which can be resolved using DNS; not a local alias. Message Transfer Agent (MTA) A process which conforms to [SMTP-MTA], which accepts messages as an SMTP server, and either delivers them, or acts as an SMTP client to relay them to another MTA. Message User Agent (MUA) A process which acts (usually on behalf of a user) to compose and submit new messages, and process delivered messages. In the split-mua model, POP or IMAP is used to access delivered messages. Conventions Used in this Document In examples, "C:" is used to indicate lines sent by the client, and "S:" indicates those sent by the server. Line breaks within a command example are for editorial purposes only. The key words "MUST", "MUST NOT", "SHOULD", "SHOULD NOT", and "MAY" in this document are to be interpreted as defined in [KEYWORDS]. 1. SUBMIT Servers To distinguish transfer SMTP from submission, port 587 is reserved as the MAIL SUBMIT port. Messages received on this port are defined to be submissions. The protocol used is ESMTP [SMTP-MTA, ESMTP], with modifications as specified in this memo. The process which acts as a submission server will be referred to as a Message Submission Agent (MSA) to distinguish it from an MTA, which acts as a transfer agent. Gellens, Klensin Expires September 1998 [Page 4]

5 2. SMTP Extension for Message Relay Assertion In addition to providing for SMTP submission on a separate port from transfer, to aid in migration this memo extends SMTP [ESMTP] to enable assertion that a message on port 25 is not a submission. The name of this extension is "Relay". The EHLO keyword is RELAY. One new optional parameter is defined for the MAIL FROM verb: RELAY. If RELAY is used with the MAIL FROM command, the message is to be treated as a relay; that is, the MTA is being informed that it is not the originating or submitting MTA. RELAY is only for use on the SMTP port. If RELAY appears in MAIL FROM on the SUBMIT port, the MSA MUST reject the command with Actions when RELAY Is Used If the MAIL FROM command has the RELAY parameter, the MTA is being informed that this message is being relayed, and therefore the MTA MUST NOT alter the text, except as specified in [SMTP-MTA]. 4. Actions when the Message Is a Submission 4.1. General Rules Specific Problems Even though various modifications to header fields are authorized in this memo, a paramount rule is that elements of structured header fields may only be modified when specific problems are recognized which have clear solutions. This is especially true with address elements. For example, indiscriminately to an address or element which lacks results in more broken addresses. An unqualified address must be verified to be a valid local part in the domain before the domain can be added Rejection vs. Damage It is better to reject than to risk damage. When a problem with a message is detected, and there is no specifically configured rule for the problem, it is better to reject the message than to attempt to fix it. This is especially true of problems which are correctable by the MUA (for example, an invalid From field). Response code 554 should be used to reject a MAIL FROM, RCPT TO, or Gellens, Klensin Expires September 1998 [Page 5]

6 DATA command which contains something improper Things which MAY Be Done The MSA MAY do any of the following: Enforce Submission Rights The MSA MAY refuse the MAIL FROM command if the address in MAIL FROM is not believed to have submission rights, or is invalid, or is not authorized with the authentication used (if the session has been authenticated). Failure code 560 should be used for this purpose Require Authentication The MSA MAY refuse the MAIL FROM command with code 503 if the client has not authenticated Enforce Permissions The MSA MAY refuse the MAIL FROM, or a RCPT TO command if inconsistent with the permissions given to the user (if known). Failure code 560 should be used Check Message Data The MSA MAY refuse the DATA command or send a failure result after end-of-data if the submitted message is syntactically invalid, or seems inconsistent with permissions given to the user (if known). Result code 554 should be used for syntactic problems in the data (500 or 501 is used if the command itself is not syntactically valid). 560 should be used to reject based on the submitting user Add Sender The MSA MAY add or replace the Sender field, if the identity of the sender is known and this is not given in the From field. The MSA MUST ensure that any address it places in a Sender field is in fact a valid mail address Add Date The MSA MAY add a Date field to the submitted message, if it lacks it, or correct the Date field if it does not conform to [MESSAGE-FORMAT] syntax. Gellens, Klensin Expires September 1998 [Page 6]

7 Add Message-ID The MSA MAY add or replace the Message-ID field, if it lacks it, or it is not valid syntax (as defined by [MESSAGE-FORMAT]) Transfer Encode The MSA MAY apply transfer encoding to the message according to MIME conventions, if needed and not harmful to the MIME type Resolve Aliases The MSA MAY resolve aliases (CNAME records) for domain names, in the envelope and optionally in address fields of the header, subject to local policy. For example, if and ftp.ab.com are both aliases for mail.ab.com, rewriting them could lose useful information Header Rewriting The MSA MAY rewrite local parts and/or domains, in the envelope and optionally in address fields of the header, according to local policy. For example, a site may prefer to rewrite JRU as J.Random.User in order to hide logon names, and/or to rewrite squeeky.sales.xyz.com as zyx.com to hide machine names and make it easier to move users. However, only addresses, local-parts, or domains which match specific local MSA configuration settings may be altered. The MSA MUST NOT apply data-independent rewriting rules, such as always deleting the first element of a domain name. So, for example, a rule which strips the left-most element of the domain if the complete domain matches *.foo.bar.com would be permitted Sign the Message The MSA MAY (digitally) sign or otherwise add authentication information to the message Encrypt the Message The MSA MAY encrypt the message for transport to reflect organizational policies Things which SHOULD Be Done The MSA SHOULD do all of the following: Gellens, Klensin Expires September 1998 [Page 7]

8 Be the Only MSA The MSA MAY reject messages which already contain a Change-ID or Change-History header field, or otherwise appear to have already been through an MSA. Generally, the MSA SHOULD do this unless it knows it is a gateway receiving messages from downstream MSAs. Response code 556 should be used for this Log Errors The MSA SHOULD log message errors, especially apparent misconfigurations of client software. It can be very helpful to notify the administrator when problems are detected with local mail clients. This is another advantage of distinguishing submission from relay: system administrators may be interested in local configuration problems, but not in client problems at other sites Things which MUST NOT Be Done The MSA MUST NOT do any of the following: Corrupt the Message The MSA MUST NOT alter already valid headers or text in ways not authorized by this memo. However, the MSA MAY reject or bounce messages which violate site policy in some way. (For example, messages which appear to contain proprietary information) 4.5. Things which MUST Be Done The MSA MUST do all of the following: Ensure All Domains are Fully-Qualified The MSA MUST ensure that all domains in the envelope are fully-qualified. Single-level domains (for example, sales ) MAY be expanded based on local configuration (for example, to sales.foo.com ). Multi-level domains which are not fully-qualified (for example, sales.foo ) MUST be rejected, not expanded. Response code 555 should be used to reject a MAIL FROM or RCPT TO command which contains improper domains. If the MSA examines or alters the message text in way, except to add Received, Change-ID, and Change-History header fields, it MUST ensure that all domains in the text are fully-qualified. The rules for single and multi-level domains in the preceding paragraph apply. Response code 555 should be used to reject a DATA command which contains improper domains. Gellens, Klensin Expires September 1998 [Page 8]

9 Enforce Address Syntax The MSA MUST reject messages with detectably illegal syntax in a sender or recipient address. This applies after any address transformations have been done. Response code 501 should be used to reject a MAIL FROM or RCPT TO command which contains an improper address. 555 may be used after end-of-data if the message contains invalid addresses in the header Use RELAY The MSA MUST use the RELAY parameter to the MAIL FROM command when relaying the message, if the server MTA understands ESMTP and supports the RELAY extension. This requirement applies to "pure" MSAs, which accept message submissions and relay them via SMTP. In certain cases, a site may need special configurations, in which MSAs and/or MTAs submit messages to an MSA for additional policy validation. These MSAs or MTAs are considered gateways, because they do not follow the normal model Add Change-ID and Change-History The MSA MUST Document all modifications to the envelope or text by adding a Change-ID and one or more Change-History header fields. A transparent encoding change to the envelope or text header, for example, removing extraneous quotes from an envelope recipient, does not need to be noted in a Change-History header field. The MSA MUST add Change-ID and Change-History in addition to a Received header; Change-ID and Change-History are not substitutes for Received. Change-ID is a structured header field which allows an MSA to provide trace and contact information should problems with its changes be detected. All parameter names and parameter values are case-insensitive, unless otherwise noted. Exactly one Change-ID header field MUST be added. Change-History is a structured header field which allows an MSA to list the changes it made. All parameter names and parameter values are case-insensitive, unless otherwise noted. Each Change-History header field contains parameters describing a specific change made by the MSA. Gellens, Klensin Expires September 1998 [Page 9]

10 5. Change-ID and Change-History 5.1. Parameters of Change-ID The following parameters are defined for the Change-ID header field. Additional parameters may be specified in the future, and must be registered with IANA. Optional parameters are registered on a first-come, first-served basis. Required parameters must be specified in a standards-track or IESG-approved Experimental RFC. A registration template is included in this memo Date Date is required and contains the time and date at which the change was made MSA MSA is a required parameter, which can be in one of two forms. The token form is a quoted string which is sufficient for the postmaster at the contact domain to identify the software which modified the message. This form of the parameter value must be treated as case sensitive; that is, its case must be preserved. The domain form identifies the domain name or IP address of the MSA Port Port is a required parameter which indicates the TCP port on which the message was received Contact Contact is a required parameter. It specifies a fully-qualified address, which is the contact point for problems detected by the recipient of the message. It is generally not a good idea to use the address of an individual. Instead, role addresses should be used. For example, MSA-Admin or mail-nanny for the local-part, which could then be aliased to one or more specific people, or even to another role address (such as postmaster ) Parameters of Change-History The following parameters are defined for the Change-History header field. Additional parameters may be defined in the future, and will be registered with IANA. Optional parameters are registered on a first-come, first-served basis. Required Gellens, Klensin Expires September 1998 [Page 10]

11 parameters must be specified in a standards-track or IESG-approved Experimental RFC. A registration template is included in this memo Element The Element parameter is required and identifies which header field or envelope item was changed. If the body was changed (for example, upgraded to MIME and content-transfer-encoded), body should be specified Action The Action parameter is required and specifies the type of change: Added, Expanded, Quoted, Unquoted, Changed, or Removed Cause The Cause parameter optionally identifies the justification for the change: Bad-Syntax, Incorrect, Missing, Nickname, or Policy. Bad-Syntax indicates the original value was not syntactically valid. Incorrect means the original value was not correct. Missing is used when a field or item has been added. Nickname indicates the original value was a local DNS alias. Policy refers to changes required by site policy, as opposed to corrections or additions required for conformance with Internet standards Original Original is an optional parameter which contains the value of the field or subfield (individual value of a multi-valued field) before it was changed. Original SHOULD NOT be used if Element is body Result Result is an optional parameter which contains the value of the field or subfield after it was changed ABNF for Change-ID Gellens, Klensin Expires September 1998 [Page 11]

12 This defines the syntax for the Change-ID header field using ABNF as specified in RFC 2234 [ABNF]. Comments and folding white space [RFC-822] may be inserted wherever a space is specified, and nowhere else. change-id ::= "Change-ID" ":" SP id-parameters contact ::= "Contact" "=" "<" local-part "@" (domain / IP) ">" date day domain dot-string hour id-parameters ::= "Date" "=" [weekday "," SP] day SP month SP year SP hour ":" minute [":" second] SP time-zone ::= 2DIGIT ::= sub-domain 1*("." sub-domain) ::= 1*(atext ["." atext]) ::= 1*2DIGIT ::= date ";" SP msa ";" SP port ";" SP contact *(";" SP ext-parameter) IP ::= "[" (IPv4-literal / IPv6-literal) "]" IPv4-literal IPv6-literal ldh-str local-part minute month msa msa-domain msa-literal port second sub-domain time-zone ::= snum 3("." snum) ::= simple-char *(simple-char / SP) ::= *(alphanumeric / "-") alphanumeric ::= dot-string quoted-string ::= 2DIGIT ::= 2DIGIT ::= "MSA" "=" (msa-domain / msa-literal) ::= domain / IP ::= quoted-string ::= "Port" "=" 1*DIGIT ::= 2DIGIT ::= alphanumeric *(ldh-str) ::= ("+" / "-") 4DIGIT Gellens, Klensin Expires September 1998 [Page 12]

13 weekday ::= "Mon" / "Tue" / "Wed" / "Thu" / "Fri" / "Sat" / "Sun" year ::= 4DIGIT 5.4. ABNF for Change-History This defines the syntax for the Change-History header field using [ABNF]. Comments and folding white space [RFC-822] may be inserted wherever a space is specified, and nowhere else. action cause change-history element ::= "Action" "=" ("Added" / "Changed" / "Expanded" / "Quoted" / "Removed" / "Unquoted") ::= "Cause" "=" ("Bad-Syntax" / "Incorrect" / "Missing" / "Nickname" / "Policy") ::= "Change-History" ":" SP hist-parameters ::= field / envelope envelope ::= "Envelope" "=" ("MAIL" / "RCPT" / "DATA" / ext-parameter) field header-field hist-parameters original result ::= "Field" "=" ("body" / header-field) ::= <header field as specified in [HEADERS]> ::= element ";" SP action [";" SP cause] [";" SP original] [";" SP result] *(";" SP ext-parameter) ::= "Original" "=" value ::= "Result" "=" value value ::= simple-value / quoted-string 5.5. Common ABNF The following [ABNF] rules and terminals are referenced above: alphanumeric ::= ALPHA / DIGIT atext ::= alphanumeric / "!" / "#" / "$" / "%" / "&" / " " / "*" / "+" / Gellens, Klensin Expires September 1998 [Page 13]

14 "-" / "/" / "=" / "?" / "^" / "_" / " " / "{" / " " / "}" / " " ext-parameter ::= [alphanumeric *(alphanumeric / "." / "-")] alphanumeric ldh-str printable-char quoted-char ::= *(alphanumeric / "-") alphanumeric ::= VCHAR / SP ::= printable-char / "\" quoted-specials quoted-specials ::= DQUOTE / "\" quoted-string simple-char simple-value ::= DQUOTE *quoted-char DQUOTE ::= %x21 / %x23-3a / %x3c-7e ;ASCII character in the range exclamation ;mark through tilde, except quote and ;semicolon ::= 1*simple-char snum ::= 1*3DIGIT ;range 0 through Examples of Change-ID and Change-History Change-ID: Date="Fri, 20 March : "; MSA=helpful.qualcomm.com; Contact=<Postmaster@Qualcomm.Com> Change-History: Envelope=MAIL; Action=Changed; Cause=Policy Change-History: Envelope=RCPT; Action=Expanded; Cause=Nickname; Original=Foo; Result=Foobar Change-History: Field=To; Action=Expanded; Cause=Nickname; Original=Foo; Result="Foobar L. Gork" Change-History: Field=To; Action=Quoted; Cause=Bad-Syntax; Original="John Icons Doe" Change-ID: Date="Fri, 20 March : "; MSA="xyz99abc"; Contact=<admin+msa@Shy.Qualcomm.Com>; Change-History: Field=From; Action=Changed; Cause=Policy Gellens, Klensin Expires September 1998 [Page 14]

15 6. Submission Extension Mechanism It may be desirable to extend the submission process in the future, using a mechanism which is clearly differentiated from normal SMTP. This specification defines a new verb, SUBM, which is only valid on the submit port. Clients may send SUBM at any time after the server has sent the initial greeting. Until such time as submission extensions are defined, servers SHOULD send a 250 response. Clients MUST be prepared for a 502 (command not implemented) response SUBM Example C: SUBM S: 250 No extensions supported 7. Interaction with Other SMTP Extensions The following table lists the current standards-track and Experimental SMTP extensions. Listed are the RFC, name, status, an indication if the extension is valid on the submit port, and a reference: RFC Name Status Submission Reference Pipelining DS Yes [PIPELINING] 2034 Error Codes PS Yes [CODES-EXTENSION] 1985 ETRN PS No [ETRN] 1893 Extended Codes PS Yes [SMTP-CODES] 1891 DSN PS Yes [DSN] 1870 Size S Yes [SIZE] E No [521REPLY] 1845 Checkpoint E Yes [Checkpoint] 1830 Binary E Yes [CHUNKING] bit MIME DS Yes [8BITMIME] The MSA advertises support for specific extensions in the EHLO response, as usual. Future extensions may be defined which are intended for use only with SMTP transfer, or only with the submission service. Future extensions should explicitly specify if they are valid with SMTP, Submission, or both. Some SMTP extensions are especially useful for message submission: Gellens, Klensin Expires September 1998 [Page 15]

16 Extended Status Codes [SMTP-CODES], SHOULD be supported and used according to [CODES-EXTENSION]. This permits the MSA to notify the client of specific configuration or other problems in more detail than the response codes listed in this memo. Because some rejections are related to a site s security policy, care should be used not to expose more detail than is needed to correct the problem. [PIPELINING] SHOULD be supported by the MSA. Methods have been proposed which would allow for SMTP authentication. These extensions, if supported and used, would allow the MSA to validate the authority and determine the identity of the submitting user. Any references to the DATA command in this memo also refer to any substitutes for DATA, such as the BDAT command used with [CHUNKING]. 8. Message Rejection and Bouncing MTAs and MSAs MAY choose to implement message rejection rules which rely in part on whether the message is a submission or a relay. For example, some sites might configure their MTA to reject all RCPT TOs for messages which do not reference local users, and configure their MSA to reject all message submissions which do not come from local users (based on IP address and/or authenticated identity). If the MSA is not able to determine a return path to the submitting user (from a valid MAIL FROM, or based on authenticated identify), it MUST immediately reject the message. A message can be immediately rejected by returning a 5xx code to the MAIL FROM command or after receiving the data. Except in the case where the MSA is unable to determine a valid return path for the message being submitted, text in this memo which instructs an MSA to issue a rejection code MAY be complied with by accepting the message and subsequently generating a bounce message. Note that in the normal case of message submission, immediately rejecting the message is preferred, as it gives the user and MUA direct feedback. To properly handle delayed bounces, the client must maintain a queue of messages it has submitted, and match bounces to them. In the case of batch submission, the client is requesting the delayed bounce behavior. 9. Reply Codes Gellens, Klensin Expires September 1998 [Page 16]

17 This memo adds several reply codes to those defined in [SMTP-MTA]. The reply codes used in this document are: 250 Requested action okay, completed. 502 Command not implemented. 503 Bad sequence of commands. 505 Authentication required. Site policy requires authentication before issuing this command. 554 Transaction Failed. (Various errors in contents of MAIL FROM, RCPT TO, or DATA). 555 Bad domain. Invalid or improper domain in MAIL FROM, RCPT TO, or DATA. 556 Not a submission. The message appears to have been submitted earlier. 560 Not allowed. The address in MAIL FROM is not believed to have submission rights, or is invalid, or is not authorized with the authentication used; the address in a RCPT TO command is inconsistent with the permissions given to the user; the message data is rejected based on the submitting user. An implementation MAY include a configuration option to generate 554 instead of 560, to avoid revealing information about security-related rejections. 10. IANA Considerations Registration Procedures Change-ID and Change-History parameters MUST be registered with IANA. Optional parameters are registered on a first-come, first-served basis. Required parameters must be specified in a standards-track or IESG-approved Experimental RFC. Registration of a Change-ID or Change-History parameter is done by filling in the template below and sending it in to iana@isi.edu. IANA has the right to reject obviously bogus registrations, but will perform no review of clams made in the registration form. There is no naming convention for Change-ID and Change-History parameters Change Control Once a Change-ID and Change-History parameter registration has been published by IANA, the author may request a change to its definition. The change request follows the same procedure as the registration request. Gellens, Klensin Expires September 1998 [Page 17]

18 The owner of a parameter may pass responsibility for it to another person or agency by informing IANA; this can be done without discussion or review. The IESG may reassign responsibility for a parameter, or make changes to a parameter, including marking it as OBSOLETE. Parameter registrations may not be deleted; those which are no longer believed appropriate for use can be declared OBSOLETE by a change to their "intended use" field; such parameters will be clearly marked in the lists published by IANA. The IESG is considered to be the owner of all parameters which are specified in standards track or IESG-approved Experimental RFCs Registration Template To: iana@isi.edu Subject: Registration of Change-History/Change-ID parameter X Parameter for header (check one): [ ] Change-History [ ] Change-ID Parameter name: Nature (check one): [ ] Optional [ ] Required Note: Required parameters must be specified in a standards-track or IESG-approved Experimental RFC. Security considerations: Published specification: Person & address to contact for further information: Intended usage (check one): [ ] COMMON [ ]LIMITED [ ] OBSOLETE Author/Change controller: (Any other information that the author deems interesting may be added below this line.) 11. Security Considerations Separation of submission and relay of messages can allow a site to implement more secure policies. This can aid in tracking or preventing unsolicited bulk . For example, a site could configure its MSA to require authentication before accepting a message, and could configure its MTA to reject all RCPT TOs for non-local users. This can be an important element in a site s Gellens, Klensin Expires September 1998 [Page 18]

19 total security policy. The Change-History header field allows for problem tracking and reporting, through use of the Contact and MSA parameters. Sites wanting to prevent disclosure of details of their local network (such as the identities of local servers) should use the token form, while sites without these concerns can use the simpler domain form. 12. Acknowledgments This updated draft has been revised in part based on comments and discussions which took place on and off the IETF-Submit mailing list. Special thanks to Harald Alvestrand, who started this effort and wrote the original version of the draft. 13. References [ESMTP] J. Klensin, N. Freed, M. Rose, E. Stefferud, and D. Crocker, "SMTP Service Extensions", STD 10, RFC 1869, November 1995, <ftp://ftp.isi.edu/in-notes/rfc1869.txt> [SMTP-MTA] J. Postel, "Simple Mail Transfer Protocol", STD 10, RFC 821, August 1982, <ftp://ds.internic.net/rfc/rfc821.txt>; C. Partridge, "Mail Routing and the Domain System", STD 14, RFC 974, January 1986, <ftp://ds.internic.net/rfc/rfc974.txt>; R. Braden, Editor, "Requirements for Internet Hosts -- Application and Support", STD 3, RFC 1123, October 1989, <ftp://ftp.isi.edu/in-notes/rfc1123.txt> [MESSAGE-FORMAT] D. Crocker, "Standard for the format of ARPA Internet text messages", STD 11, RFC 822, August 1982, <ftp://ds.internic.net/rfc/rfc822.txt>; R. Braden, Editor, "Requirements for Internet Hosts -- Application and Support", STD 3, RFC 1123, October 1989, <ftp://ftp.isi.edu/in-notes/rfc1123.txt> [KEYWORDS] S. Bradner, "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997, <ftp://ftp.isi.edu/in-notes/rfc2119.txt> [ABNF] D. Crocker, Ed., P. Overell, "Augmented BNF for Syntax Specifications: ABNF", November 1997, <ftp://ftp.isi.edu/in-notes/rfc2234.txt> [CODES-EXTENSION] N. Freed, "SMTP Service Extension for Returning Enhanced Error Codes", RFC 2034, October 1996, <ftp://ftp.isi.edu/in-notes/rfc2034.txt> Gellens, Klensin Expires September 1998 [Page 19]

20 [SMTP-CODES] G. Vaudreuil, "Enhanced Mail System Status Codes", RFC 1893, January 1996, <ftp://ftp.isi.edu/in-notes/rfc1893.txt> [HEADERS] J. Palme, "Common Internet Message Headers", RFC 2076, February 1997, <ftp://ftp.isi.edu/in-notes/rfc2076.txt> [CHUNKING] G. Vaudreuil, "SMTP Service Extensions for Transmission of Large and Binary MIME Messages", August 1995, <ftp://ftp.isi.edu/in-notes/rfc1830.txt> [PIPELINING] N. Freed, "SMTP Service Extension for Command Pipelining", September 1997, <ftp://ftp.isi.edu/in-notes/rfc2197.txt> [ETRN] J. De Winter, "SMTP Service Extension for Remote Message Queue Starting", August 1996, <ftp://ftp.isi.edu/in-notes/rfc1985.txt> [DSN] K. Moore, "SMTP Service Extension for Delivery Status Notifications, January 1996, <ftp://ftp.isi.edu/in-notes/rfc1891.txt> [SIZE] J. Klensin, N. Freed, and K. Moore, "SMTP Service Extension for Message Size Declaration, November 1995, <ftp://ftp.isi.edu/in-notes/rfc1870.txt> [521REPLY] A. Durand, and F. Dupont, "SMTP 521 Reply Code", September 1995, <ftp://ftp.isi.edu/in-notes/rfc1846.txt> [Checkpoint] D. Crocker, N. Freed, and A. Cargille, "SMTP Service Extension for Checkpoint/Restart, September 1995, <ftp://ftp.isi.edu/in-notes/rfc1845.txt> [8BITMIME] J. Klensin, N. Freed, M. Rose, E. Stefferud, and D. Crocker, "SMTP Service Extension for 8bit-MIMEtransport", July 1994, <ftp://ftp.isi.edu/in-notes/rfc1652.txt> 14. Full Copyright Statement Copyright (C) The Internet Society All Rights Reserved. This document and translations of it may be copied and furnished to others, and derivative works that comment on or otherwise explain it or assist in its implementation may be prepared, copied, published and distributed, in whole or in part, without restriction of any kind, provided that the above copyright notice and this paragraph are included on all such copies and derivative works. However, this document itself may not be modified in any way, such as by removing the copyright notice or references to the Internet Society or other Internet organizations, except as needed for the purpose of developing Internet standards in which case the Gellens, Klensin Expires September 1998 [Page 20]

21 procedures for copyrights defined in the Internet Standards process must be followed, or as required to translate it into languages other than English. The limited permissions granted above are perpetual and will not be revoked by the Internet Society or its successors or assigns. This document and the information contained herein is provided on an "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. 15. Authors Addresses Randall Gellens QUALCOMM, Incorporated (fax) 6455 Lusk Blvd. Randy@Qualcomm.Com San Diego, CA U.S.A. John C. Klensin MCI Telecommunications klensin@mci.net 800 Boylston St, 7th floor Boston, MA USA Gellens, Klensin Expires September 1998 [Page 21]

Request for Comments: 2476 Category: Standards Track MCI December 1998

Request for Comments: 2476 Category: Standards Track MCI December 1998 Network Working Group Request for Comments: 2476 Category: Standards Track R. Gellens QUALCOMM J. Klensin MCI December 1998 Message Submission Status of this Memo This document specifies an Internet standards

More information

Request for Comments: Category: Standards Track April 2006

Request for Comments: Category: Standards Track April 2006 Network Working Group R. Gellens Request for Comments: 4409 QUALCOMM Obsoletes: 2476 J. Klensin Category: Standards Track April 2006 Status of This Memo Message Submission for Mail This document specifies

More information

Network Working Group. Updates: 1894 June 2000 Category: Standards Track

Network Working Group. Updates: 1894 June 2000 Category: Standards Track Network Working Group D. Newman Request for Comments: 2852 Sun Microsystems Updates: 1894 June 2000 Category: Standards Track Status of this Memo Deliver By SMTP Service Extension This document specifies

More information

October 4, 2000 Expires in six months. SMTP Service Extension for Secure SMTP over TLS. Status of this Memo

October 4, 2000 Expires in six months. SMTP Service Extension for Secure SMTP over TLS. Status of this Memo Internet Draft draft-hoffman-rfc2487bis-04.txt October 4, 2000 Expires in six months Paul Hoffman Internet Mail Consortium Status of this Memo SMTP Service Extension for Secure SMTP over TLS This document

More information

April 24, 1998 Expires in six months. SMTP Service Extension for Secure SMTP over TLS. Status of this memo

April 24, 1998 Expires in six months. SMTP Service Extension for Secure SMTP over TLS. Status of this memo HTTP/1.1 200 OK Date: Tue, 09 Apr 2002 00:24:41 GMT Server: Apache/1.3.20 (Unix) Last-Modified: Mon, 27 Apr 1998 14:31:00 GMT ETag: "2e9b64-31dd-354496a4" Accept-Ranges: bytes Content-Length: 12765 Connection:

More information

Category: Standards Track January 1999

Category: Standards Track January 1999 Network Working Group P. Hoffman Request for Comments: 2487 Internet Mail Consortium Category: Standards Track January 1999 Status of this Memo SMTP Service Extension for Secure SMTP over TLS This document

More information

Category: Standards Track August POP URL Scheme. Status of this Memo

Category: Standards Track August POP URL Scheme. Status of this Memo Network Working Group R. Gellens Request for Comments: 2384 QUALCOMM, Incorporated Category: Standards Track August 1998 Status of this Memo POP URL Scheme This document specifies an Internet standards

More information

Request for Comments: 2303 Category: Standards Track March 1998

Request for Comments: 2303 Category: Standards Track March 1998 Network Working Group C. Allocchio Request for Comments: 2303 GARR-Italy Category: Standards Track March 1998 Minimal PSTN address format in Internet Mail Status of this Memo This document specifies an

More information

Request for Comments: 3191 Obsoletes: 2303 October 2001 Updates: 2846 Category: Standards Track. Minimal GSTN address format in Internet Mail

Request for Comments: 3191 Obsoletes: 2303 October 2001 Updates: 2846 Category: Standards Track. Minimal GSTN address format in Internet Mail Network Working Group C. Allocchio Request for Comments: 3191 GARR-Italy Obsoletes: 2303 October 2001 Updates: 2846 Category: Standards Track Status of this Memo Minimal GSTN address format in Internet

More information

Request for Comments: 3192 Obsoletes: 2304 October 2001 Updates: 2846 Category: Standards Track

Request for Comments: 3192 Obsoletes: 2304 October 2001 Updates: 2846 Category: Standards Track Network Working Group C. Allocchio Request for Comments: 3192 GARR-Italy Obsoletes: 2304 October 2001 Updates: 2846 Category: Standards Track Status of this Memo Minimal FAX address format in Internet

More information

<draft-freed-charset-reg-02.txt> IANA Charset Registration Procedures. July Status of this Memo

<draft-freed-charset-reg-02.txt> IANA Charset Registration Procedures. July Status of this Memo HTTP/1.1 200 OK Date: Mon, 08 Apr 2002 23:58:19 GMT Server: Apache/1.3.20 (Unix) Last-Modified: Thu, 24 Jul 1997 17:22:00 GMT ETag: "2e9992-4021-33d78f38" Accept-Ranges: bytes Content-Length: 16417 Connection:

More information

Network Working Group Internet Draft: SMTP Authentication Document: draft-myers-smtp-auth-00.txt April SMTP Service Extension for Authentication

Network Working Group Internet Draft: SMTP Authentication Document: draft-myers-smtp-auth-00.txt April SMTP Service Extension for Authentication HTTP/1.1 200 OK Date: Tue, 09 Apr 2002 10:24:33 GMT Server: Apache/1.3.20 (Unix) Last-Modified: Mon, 01 May 1995 22:00:00 GMT ETag: "361c6c-32a5-2fa559e0" Accept-Ranges: bytes Content-Length: 12965 Connection:

More information

Expires: January 27, 2007 July 26, SMTP extension for internationalized address draft-ietf-eai-smtpext-01.txt. Status of this Memo

Expires: January 27, 2007 July 26, SMTP extension for internationalized  address draft-ietf-eai-smtpext-01.txt. Status of this Memo Network Working Group Internet-Draft Expires: January 27, 2007 J. Yao, Ed. W. Mao, Ed. CNNIC July 26, 2006 Status of this Memo SMTP extension for internationalized email address draft-ietf-eai-smtpext-01.txt

More information

Request for Comments: 2304 Category: Standards Track March 1998

Request for Comments: 2304 Category: Standards Track March 1998 Network Working Group C. Allocchio Request for Comments: 2304 GARR-Italy Category: Standards Track March 1998 Minimal FAX address format in Internet Mail Status of this Memo This document specifies an

More information

Request for Comments: 3206 Category: Standards Track February 2002

Request for Comments: 3206 Category: Standards Track February 2002 Network Working Group R. Gellens Request for Comments: 3206 QUALCOMM Category: Standards Track February 2002 Status of this Memo The SYS and AUTH POP Response Codes This document specifies an Internet

More information

March 1996 MIME Security with Pretty Good Privacy (PGP) Status of this Memo

March 1996 MIME Security with Pretty Good Privacy (PGP) Status of this Memo HTTP/1.1 200 OK Date: Mon, 08 Apr 2002 23:44:46 GMT Server: Apache/1.3.20 (Unix) Last-Modified: Wed, 20 Mar 1996 23:00:00 GMT ETag: "2e98da-36ef-31508df0" Accept-Ranges: bytes Content-Length: 14063 Connection:

More information

Expires: November 13, 2006 May 12, SMTP extension for internationalized address draft-ietf-eai-smtpext-00.txt. Status of this Memo

Expires: November 13, 2006 May 12, SMTP extension for internationalized  address draft-ietf-eai-smtpext-00.txt. Status of this Memo Network Working Group Internet-Draft Expires: November 13, 2006 J. Yao, Ed. W. Mao, Ed. CNNIC May 12, 2006 Status of this Memo SMTP extension for internationalized email address draft-ietf-eai-smtpext-00.txt

More information

Internet Engineering Task Force (IETF) Request for Comments: 6522 STD: 73 January 2012 Obsoletes: 3462 Category: Standards Track ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 6522 STD: 73 January 2012 Obsoletes: 3462 Category: Standards Track ISSN: Internet Engineering Task Force (IETF) M. Kucherawy, Ed. Request for Comments: 6522 Cloudmark STD: 73 January 2012 Obsoletes: 3462 Category: Standards Track ISSN: 2070-1721 Abstract The Multipart/Report

More information

Request for Comments: 1652

Request for Comments: 1652 Network Working Group Request for Comments: 1652 Obsoletes: 1426 Category: Standards Track J. Klensin, WG Chair MCI N. Freed, Editor Innosoft M. Rose Dover Beach Consulting, Inc. E. Stefferud Network Management

More information

Network Working Group. January An Extensible Message Format for Delivery Status Notifications

Network Working Group. January An Extensible Message Format for Delivery Status Notifications Network Working Group Request for Comments: 3464 Obsoletes: 1894 Category: Standards Track K. Moore University of Tennessee G. Vaudreuil Lucent Technologies January 2003 An Extensible Message Format for

More information

Network Working Group. <draft-ietf-mailext-pipeline-00.txt> SMTP Service Extension for Command Pipelining. August 17, Status of this Memo

Network Working Group. <draft-ietf-mailext-pipeline-00.txt> SMTP Service Extension for Command Pipelining. August 17, Status of this Memo HTTP/1.1 200 OK Date: Tue, 09 Apr 2002 04:52:23 GMT Server: Apache/1.3.20 (Unix) Last-Modified: Thu, 18 Aug 1994 22:00:00 GMT ETag: "2e6820-3355-2e53d9e0" Accept-Ranges: bytes Content-Length: 13141 Connection:

More information

Internet Engineering Task Force (IETF) Request for Comments: Obsoletes: 1652 Category: Standards Track

Internet Engineering Task Force (IETF) Request for Comments: Obsoletes: 1652 Category: Standards Track Internet Engineering Task Force (IETF) Request for Comments: 6152 STD: 71 Obsoletes: 1652 Category: Standards Track ISSN: 2070-1721 J. Klensin N. Freed Oracle M. Rose Dover Beach Consulting, Inc. D. Crocker,

More information

<draft-ietf-smtpext-extensions-03.txt> Einar Stefferud David Crocker. SMTP Service Extensions. April 15, Status of this Memo

<draft-ietf-smtpext-extensions-03.txt> Einar Stefferud David Crocker. SMTP Service Extensions. April 15, Status of this Memo HTTP/1.1 200 OK Date: Tue, 09 Apr 2002 08:13:15 GMT Server: Apache/1.3.20 (Unix) Last-Modified: Mon, 17 Apr 1995 22:00:00 GMT ETag: "323a46-574b-2f92e4e0" Accept-Ranges: bytes Content-Length: 22347 Connection:

More information

draft-ietf-sip-info-method-02.txt February 2000 The SIP INFO Method Status of this Memo

draft-ietf-sip-info-method-02.txt February 2000 The SIP INFO Method Status of this Memo HTTP/1.1 200 OK Date: Tue, 09 Apr 2002 07:53:57 GMT Server: Apache/1.3.20 (Unix) Last-Modified: Tue, 15 Feb 2000 17:03:00 GMT ETag: "3239a5-465b-38a986c4" Accept-Ranges: bytes Content-Length: 18011 Connection:

More information

Network Working Group. Obsoletes: draft-ietf-dhc-new-opt-msg-00.txt June 2000 Expires December 2000

Network Working Group. Obsoletes: draft-ietf-dhc-new-opt-msg-00.txt June 2000 Expires December 2000 Network Working Group R. Droms INTERNET-DRAFT Bucknell University Obsoletes: draft-ietf-dhc-new-opt-msg-00.txt June 2000 Expires December 2000 Procedure for Defining New DHCP Options and Message Types

More information

Network Working Group Request for Comments: Category: Best Current Practice January IANA Charset Registration Procedures

Network Working Group Request for Comments: Category: Best Current Practice January IANA Charset Registration Procedures Network Working Group Request for Comments: 2278 BCP: 19 Category: Best Current Practice N. Freed Innosoft J. Postel ISI January 1998 IANA Charset Registration Procedures Status of this Memo This document

More information

draft fanf smtp quickstart 01 : 1/7

draft fanf smtp quickstart 01 : 1/7 Lemonade T. Finch Internet Draft University of Cambridge Intended status: Standards Track February 2007 Expires: August 5, 2007 Status of this Memo The QUICKSTART SMTP service extension draft fanf smtp

More information

J. Zawinski Netscape Communications July 1998

J. Zawinski Netscape Communications July 1998 Network Working Group Request for Comments: 2368 Updates: 1738, 1808 Category: Standards Track P. Hoffman Internet Mail Consortium L. Masinter Xerox Corporation J. Zawinski Netscape Communications July

More information

Request for Comments: 7912 Category: Informational June 2016 ISSN:

Request for Comments: 7912 Category: Informational June 2016 ISSN: Independent Submission A. Melnikov Request for Comments: 7912 Isode Ltd Category: Informational June 2016 ISSN: 2070-1721 Abstract Message Authorizing Email Header Field and Its Use for the Draft and Release

More information

expires in six months October 1997 Internet Public Key Infrastructure Operational Protocols: FTP and HTTP <draft-ietf-pkix-opp-ftp-http-01.

expires in six months October 1997 Internet Public Key Infrastructure Operational Protocols: FTP and HTTP <draft-ietf-pkix-opp-ftp-http-01. HTTP/1.1 200 OK Date: Tue, 09 Apr 2002 06:26:48 GMT Server: Apache/1.3.20 (Unix) Last-Modified: Tue, 21 Oct 1997 17:15:00 GMT ETag: "361b18-2953-344ce314" Accept-Ranges: bytes Content-Length: 10579 Connection:

More information

Network Working Group. Document: draft-myers-auth-sasl-05.txt September Simple Authentication and Security Layer. Status of this Memo

Network Working Group. Document: draft-myers-auth-sasl-05.txt September Simple Authentication and Security Layer. Status of this Memo HTTP/1.1 200 OK Date: Tue, 09 Apr 2002 10:23:28 GMT Server: Apache/1.3.20 (Unix) Last-Modified: Tue, 01 Oct 1996 22:19:00 GMT ETag: "361f1a-67f0-325198d4" Accept-Ranges: bytes Content-Length: 26608 Connection:

More information

INTERNET-DRAFT IP Version 6 over PPP February Table of Contents. 1. Introduction Specification of Requirements...

INTERNET-DRAFT IP Version 6 over PPP February Table of Contents. 1. Introduction Specification of Requirements... HTTP/1.1 200 OK Date: Tue, 09 Apr 2002 03:48:38 GMT Server: Apache/1.3.20 (Unix) Last-Modified: Thu, 15 Feb 1996 23:00:00 GMT ETag: "2f52fa-4e8d-3123baf0" Accept-Ranges: bytes Content-Length: 20109 Connection:

More information

Internet Engineering Task Force (IETF) Request for Comments: 6857 Category: Standards Track March 2013 ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 6857 Category: Standards Track March 2013 ISSN: Internet Engineering Task Force (IETF) K. Fujiwara Request for Comments: 6857 JPRS Category: Standards Track March 2013 ISSN: 2070-1721 Post-Delivery Message Downgrading for Internationalized Email Messages

More information

Network Working Group. Document: draft-myers-auth-sasl-02.txt July Simple Authentication and Session Layer. Status of this Memo

Network Working Group. Document: draft-myers-auth-sasl-02.txt July Simple Authentication and Session Layer. Status of this Memo HTTP/1.1 200 OK Date: Tue, 09 Apr 2002 10:23:23 GMT Server: Apache/1.3.20 (Unix) Last-Modified: Tue, 02 Jul 1996 22:21:00 GMT ETag: "361c4c-5e2c-31d9a0cc" Accept-Ranges: bytes Content-Length: 24108 Connection:

More information

Network Working Group Request for Comments: 2342 Category: Standards Track Innosoft May 1998

Network Working Group Request for Comments: 2342 Category: Standards Track Innosoft May 1998 Network Working Group Request for Comments: 2342 Category: Standards Track M. Gahrns Microsoft C. Newman Innosoft May 1998 IMAP4 Namespace Status of this Memo This document specifies an Internet standards

More information

Application Inspection and Control for SMTP

Application Inspection and Control for SMTP Application Inspection and Control for SMTP First Published: July 11, 2008 Last Updated: July 11, 2008 The Application Inspection for SMTP feature provides an intense provisioning mechanism that can be

More information

Expires six months from November draft-ietf-urn-resolution-services-04.txt. URI Resolution Services Necessary for URN Resolution

Expires six months from November draft-ietf-urn-resolution-services-04.txt. URI Resolution Services Necessary for URN Resolution HTTP/1.1 200 OK Date: Tue, 09 Apr 2002 08:59:39 GMT Server: Apache/1.3.20 (Unix) Last-Modified: Thu, 04 Dec 1997 22:03:00 GMT ETag: "323dba-6002-34872894" Accept-Ranges: bytes Content-Length: 24578 Connection:

More information

Network Working Group. Category: Standards Track March 2001

Network Working Group. Category: Standards Track March 2001 Network Working Group M. Rose Request for Comments: 3081 Invisible Worlds, Inc. Category: Standards Track March 2001 Status of this Memo Mapping the BEEP Core onto TCP This document specifies an Internet

More information

Internet Engineering Task Force (IETF) Request for Comments: 5983 Category: Experimental October 2010 ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 5983 Category: Experimental October 2010 ISSN: Internet Engineering Task Force (IETF) R. Gellens Request for Comments: 5983 Qualcomm Category: Experimental October 2010 ISSN: 2070-1721 Abstract Mailing Lists and Internationalized Email Addresses This

More information

Network Working Group. November 1999

Network Working Group. November 1999 Network Working Group Request for Comments: 2717 BCP: 35 Category: Best Current Practice R. Petke UUNET Technologies I. King Microsoft Corporation November 1999 Status of this Memo Registration Procedures

More information

Expires: September 4, 2007 March 3, SMTP extension for internationalized address draft-ietf-eai-smtpext-04.txt. Status of this Memo

Expires: September 4, 2007 March 3, SMTP extension for internationalized  address draft-ietf-eai-smtpext-04.txt. Status of this Memo Network Working Group Internet-Draft Expires: September 4, 2007 J. Yao, Ed. W. Mao, Ed. CNNIC March 3, 2007 Status of this Memo SMTP extension for internationalized email address draft-ietf-eai-smtpext-04.txt

More information

Network Working Group. Category: Standards Track January 1996

Network Working Group. Category: Standards Track January 1996 Network Working Group K. Moore Request for Comments: 1891 University of Tennessee Category: Standards Track January 1996 Status of this Memo SMTP Service Extension for Delivery Status Notifications This

More information

Request for Comments: 5336 Updates: 2821, 2822, 4952 Category: Experimental September SMTP Extension for Internationalized Addresses

Request for Comments: 5336 Updates: 2821, 2822, 4952 Category: Experimental September SMTP Extension for Internationalized  Addresses Network Working Group J. Yao, Ed. Request for Comments: 5336 W. Mao, Ed. Updates: 2821, 2822, 4952 CNNIC Category: Experimental September 2008 Status of This Memo SMTP Extension for Internationalized Email

More information

Internet Engineering Task Force (IETF) Request for Comments: ISSN: October 2012

Internet Engineering Task Force (IETF) Request for Comments: ISSN: October 2012 Internet Engineering Task Force (IETF) Request for Comments: 6758 Category: Informational ISSN: 2070-1721 A. Melnikov Isode Ltd K. Carlberg G11 October 2012 Tunneling of SMTP Message Transfer Priorities

More information

Network Working Group. Category: Standards Track September MIME Content Types in Media Feature Expressions

Network Working Group. Category: Standards Track September MIME Content Types in Media Feature Expressions Network Working Group G. Klyne Request for Comments: 2913 Content Technologies Category: Standards Track September 2000 Status of this Memo MIME Content Types in Media Feature Expressions This document

More information

Category: Informational March Portable Font Resource (PFR) - application/font-tdpfr MIME Sub-type Registration

Category: Informational March Portable Font Resource (PFR) - application/font-tdpfr MIME Sub-type Registration Network Working Group J. Collins Request for Comments: 3073 Category: Informational March 2001 Portable Font Resource (PFR) - application/font-tdpfr MIME Sub-type Registration Status of this Memo This

More information

Expires six months from July 1997

Expires six months from July 1997 HTTP/1.1 200 OK Date: Tue, 09 Apr 2002 08:59:35 GMT Server: Apache/1.3.20 (Unix) Last-Modified: Mon, 04 Aug 1997 17:25:00 GMT ETag: "323db8-5a2d-33e6106c" Accept-Ranges: bytes Content-Length: 23085 Connection:

More information

Network Working Group. Category: Standards Track <draft-aboba-radius-iana-03.txt> 30 March 2003 Updates: RFC IANA Considerations for RADIUS

Network Working Group. Category: Standards Track <draft-aboba-radius-iana-03.txt> 30 March 2003 Updates: RFC IANA Considerations for RADIUS Network Working Group INTERNET-DRAFT Category: Standards Track 30 March 2003 Updates: RFC 2865 B. Aboba Microsoft IANA Considerations for RADIUS This document is an Internet-Draft

More information

Request for Comments: 5321 October 2008 Obsoletes: 2821 Updates: 1123 Category: Standards Track

Request for Comments: 5321 October 2008 Obsoletes: 2821 Updates: 1123 Category: Standards Track Network Working Group J. Klensin Request for Comments: 5321 October 2008 Obsoletes: 2821 Updates: 1123 Category: Standards Track Status of This Memo Simple Mail Transfer Protocol This document specifies

More information

Expires in six months January 10, 2002

Expires in six months January 10, 2002 Network Working Group INTERNET-DRAFT Brian Bidulock OpenSS7 Corporation Expires in six months January 10, 2002 Signalling Gateway (SG) Information (SGINFO) Support for Signalling User Adaptation Layers

More information

Network Working Group. Category: Standards Track October Simple Authentication and Security Layer (SASL)

Network Working Group. Category: Standards Track October Simple Authentication and Security Layer (SASL) Network Working Group J. Myers Request for Comments: 2222 Netscape Communications Category: Standards Track October 1997 Status of this Memo Simple Authentication and Security Layer (SASL) This document

More information

Obsoletes: 2070, 1980, 1942, 1867, 1866 Category: Informational June 2000

Obsoletes: 2070, 1980, 1942, 1867, 1866 Category: Informational June 2000 Network Working Group Request for Comments: 2854 Obsoletes: 2070, 1980, 1942, 1867, 1866 Category: Informational D. Connolly World Wide Web Consortium (W3C) L. Masinter AT&T June 2000 The text/html Media

More information

Internet Engineering Task Force (IETF) September Indicating Handling States in Trace Fields

Internet Engineering Task Force (IETF) September Indicating  Handling States in Trace Fields Internet Engineering Task Force (IETF) Request for Comments: 6729 Category: Standards Track ISSN: 2070-1721 D. Crocker Brandenburg InternetWorking M. Kucherawy Cloudmark, Inc. September 2012 Indicating

More information

October Network News Transfer Protocol (NNTP) Extension for Streaming Feeds

October Network News Transfer Protocol (NNTP) Extension for Streaming Feeds Network Working Group Request for Comments: 4644 Updates: 2980 Category: Standards Track J. Vinocur Cornell University K. Murchison Carnegie Mellon University October 2006 Network News Transfer Protocol

More information

Category: Informational October Common Format and MIME Type for Comma-Separated Values (CSV) Files

Category: Informational October Common Format and MIME Type for Comma-Separated Values (CSV) Files Network Working Group Y. Shafranovich Request for Comments: 4180 SolidMatrix Technologies, Inc. Category: Informational October 2005 Common Format and MIME Type for Comma-Separated Values (CSV) Files Status

More information

Expires: February 25, 2004 August 27, Using the NETCONF Configuration Protocol over Secure Shell (SSH) draft-wasserman-netconf-over-ssh-00.

Expires: February 25, 2004 August 27, Using the NETCONF Configuration Protocol over Secure Shell (SSH) draft-wasserman-netconf-over-ssh-00. Network Working Group M. Wasserman Internet-Draft Wind River Expires: February 25, 2004 August 27, 2003 Using the NETCONF Configuration Protocol over Secure Shell (SSH) draft-wasserman-netconf-over-ssh-00.txt

More information

Request for Comments: 3548 July 2003 Category: Informational

Request for Comments: 3548 July 2003 Category: Informational Network Working Group S. Josefsson, Ed. Request for Comments: 3548 July 2003 Category: Informational Status of this Memo The Base16, Base32, and Base64 Data Encodings This memo provides information for

More information

Isode Limited March 2008

Isode Limited March 2008 Network Working Group Request for Comments: 5161 Category: Standards Track A. Gulbrandsen, Ed. Oryx Mail Systems GmbH A. Melnikov, Ed. Isode Limited March 2008 The IMAP ENABLE Extension Status of This

More information

Expires in 6 months September Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP <draft-ietf-pkix-ocsp-00.

Expires in 6 months September Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP <draft-ietf-pkix-ocsp-00. HTTP/1.1 200 OK Date: Tue, 09 Apr 2002 06:26:11 GMT Server: Apache/1.3.20 (Unix) Last-Modified: Thu, 23 Oct 1997 15:29:00 GMT ETag: "304c31-471a-344f6d3c" Accept-Ranges: bytes Content-Length: 18202 Connection:

More information

Network Working Group Request for Comments: 3508 Category: Informational April H.323 Uniform Resource Locator (URL) Scheme Registration

Network Working Group Request for Comments: 3508 Category: Informational April H.323 Uniform Resource Locator (URL) Scheme Registration Network Working Group O. Levin Request for Comments: 3508 RADVISION Category: Informational April 2003 H.323 Uniform Resource Locator (URL) Scheme Registration Status of this Memo This memo provides information

More information

Category:Best Current Practice December Administratively Scoped IP Multicast. Status of this Memo

Category:Best Current Practice December Administratively Scoped IP Multicast. Status of this Memo HTTP/1.1 200 OK Date: Tue, 09 Apr 2002 04:57:56 GMT Server: Apache/1.3.20 (Unix) Last-Modified: Tue, 24 Dec 1996 00:15:00 GMT ETag: "2f51c8-22cf-32bf2084" Accept-Ranges: bytes Content-Length: 8911 Connection:

More information

Internet Engineering Task Force (IETF) Request for Comments: 8437 Updates: 3501 August 2018 Category: Standards Track ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 8437 Updates: 3501 August 2018 Category: Standards Track ISSN: Internet Engineering Task Force (IETF) C. Newman Request for Comments: 8437 Oracle Updates: 3501 August 2018 Category: Standards Track ISSN: 2070-1721 Abstract IMAP UNAUTHENTICATE Extension for Connection

More information

Obsoletes: RFC May The String Representation of LDAP Search Filters <draft-ietf-ldapbis-filter-01.txt> 1. Status of this Memo

Obsoletes: RFC May The String Representation of LDAP Search Filters <draft-ietf-ldapbis-filter-01.txt> 1. Status of this Memo Network Working Group Request for Comments: DRAFT Obsoletes: RFC 2254 Expires: 7 November 2001 M. Smith, Editor Netscape Communications Corp. T. Howes Loudcloud, Inc. 7 May 2001 The String Representation

More information

Request for Comments: 4315 December 2005 Obsoletes: 2359 Category: Standards Track. Internet Message Access Protocol (IMAP) - UIDPLUS extension

Request for Comments: 4315 December 2005 Obsoletes: 2359 Category: Standards Track. Internet Message Access Protocol (IMAP) - UIDPLUS extension Network Working Group M. Crispin Request for Comments: 4315 December 2005 Obsoletes: 2359 Category: Standards Track Internet Message Access Protocol (IMAP) - UIDPLUS extension Status of This Memo This

More information

Category: Standards Track August 2002

Category: Standards Track August 2002 Network Working Group G. Parsons Request for Comments: 3362 Nortel Networks Category: Standards Track August 2002 Status of this Memo Real-time Facsimile (T.38) - image/t38 MIME Sub-type Registration This

More information

Obsoletes: RFC February LDAP: String Representation of Search Filters <draft-ietf-ldapbis-filter-02.txt> 1. Status of this Memo

Obsoletes: RFC February LDAP: String Representation of Search Filters <draft-ietf-ldapbis-filter-02.txt> 1. Status of this Memo Network Working Group Request for Comments: DRAFT Obsoletes: RFC 2254 Expires: August 2002 M. Smith, Editor Netscape Communications Corp. T. Howes Loudcloud, Inc. 22 February 2002 LDAP: String Representation

More information

Category: Standards Track September 2003

Category: Standards Track September 2003 Network Working Group K. Murchison Request for Comments: 3598 Oceana Matrix Ltd. Category: Standards Track September 2003 Status of this Memo Sieve Email Filtering -- Subaddress Extension This document

More information

Expires July 1999 February 26, Simple Mail Transfer Protocol. draft-ietf-drums-smtpupd-10.txt. Status of this Memo

Expires July 1999 February 26, Simple Mail Transfer Protocol. draft-ietf-drums-smtpupd-10.txt. Status of this Memo INTERNET-DRAFT Expires July 1999 February 26, 1999 John C. Klensin, Editor Status of this Memo Simple Mail Transfer Protocol draft-ietf-drums-smtpupd-10.txt This document is an Internet-Draft and is in

More information

Request for Comments: 3861 Category: Standards Track August 2004

Request for Comments: 3861 Category: Standards Track August 2004 Network Working Group J. Peterson Request for Comments: 3861 NeuStar Category: Standards Track August 2004 Address Resolution for Instant Messaging and Presence Status of this Memo This document specifies

More information

Using SRP for TLS Authentication

Using SRP for TLS Authentication Using SRP for TLS Authentication Internet Draft Transport Layer Security Working Group D. Taylor Forge Research Pty Ltd Expires: March 5, 2003 September 4, 2002 Using SRP for TLS Authentication draft-ietf-tls-srp-03

More information

T.J. Watson Research Center IBM Corp Sue Thomson Bellcore. Dynamic Host Configuration Protocol for IPv6. draft-ietf-dhc-dhcpv6-01.

T.J. Watson Research Center IBM Corp Sue Thomson Bellcore. Dynamic Host Configuration Protocol for IPv6. draft-ietf-dhc-dhcpv6-01. HTTP/1.1 200 OK Date: Tue, 09 Apr 2002 01:46:15 GMT Server: Apache/1.3.20 (Unix) Last-Modified: Wed, 22 Mar 1995 23:00:00 GMT ETag: "2ed703-7c52-2f70abf0" Accept-Ranges: bytes Content-Length: 31826 Connection:

More information

Expires: 20 May December 2000 Obsoletes: 1779, 2253

Expires: 20 May December 2000 Obsoletes: 1779, 2253 INTERNET-DRAFT Editor: Kurt D. Zeilenga Intended Category: Standard Track OpenLDAP Foundation Expires: 20 May 2001 20 December 2000 Obsoletes: 1779, 2253 Lightweight Directory Access Protocol (v3): UTF-8

More information

Category: Standards Track November Registration of Charset and Languages Media Features Tags. Status of this Memo

Category: Standards Track November Registration of Charset and Languages Media Features Tags. Status of this Memo Network Working Group P. Hoffman Request for Comments: 2987 Internet Mail Consortium Category: Standards Track November 2000 Registration of Charset and Languages Media Features Tags Status of this Memo

More information

Request for Comments: 3601 Category: Standards Track September 2003

Request for Comments: 3601 Category: Standards Track September 2003 Network Working Group C. Allocchio Request for Comments: 3601 GARR-Italy Category: Standards Track September 2003 Text String Notation for Dial Sequences and Global Switched Telephone Network (GSTN) /

More information

Network Working Group Request for Comments: DayDreamer March 1999

Network Working Group Request for Comments: DayDreamer March 1999 Network Working Group Request for Comments: 2521 Category: Experimental P. Karn Qualcomm W. Simpson DayDreamer March 1999 ICMP Security Failures Messages Status of this Memo This document defines an Experimental

More information

Expiration Date: May 1997 Randy Bush RGnet, Inc. November Clarifications to the DNS Specification. draft-ietf-dnsind-clarify-02.

Expiration Date: May 1997 Randy Bush RGnet, Inc. November Clarifications to the DNS Specification. draft-ietf-dnsind-clarify-02. Network Working Group Internet Draft Expiration Date: May 1997 Robert Elz University of Melbourne Randy Bush RGnet, Inc. November 1996 Clarifications to the DNS Specification Status of this Memo draft-ietf-dnsind-clarify-02.txt

More information

draft fanf smtp rfc1845bis 00 : 1/8

draft fanf smtp rfc1845bis 00 : 1/8 SMTP extensions T. Finch Internet Draft University of Cambridge Obsoletes: 1845 (if approved) April 17, 2007 Intended status: Experimental Expires: October 19, 2007 SMTP service extensions for transaction

More information

Request For Comments: 1869

Request For Comments: 1869 Network Working Group Request For Comments: 1869 STD: 10 Obsoletes: 1651 Category: Standards Track J. Klensin, WG Chair MCI N. Freed, Editor Innosoft International, Inc. M. Rose Dover Beach Consulting,

More information

D. Crocker, Ed. Updates: RFC4871 June 10, 2009 (if approved) Intended status: Standards Track Expires: December 12, 2009

D. Crocker, Ed. Updates: RFC4871 June 10, 2009 (if approved) Intended status: Standards Track Expires: December 12, 2009 DKIM D. Crocker, Ed. Internet-Draft Brandenburg InternetWorking Updates: RFC4871 June 10, 2009 (if approved) Intended status: Standards Track Expires: December 12, 2009 RFC 4871 DomainKeys Identified Mail

More information

ESMTP Support for Cisco IOS Firewall

ESMTP Support for Cisco IOS Firewall ESMTP Support for Cisco IOS Firewall Finding Feature Information ESMTP Support for Cisco IOS Firewall Last Updated: June 14, 2011 The ESMTP Support for Cisco IOS Firewall feature enhances the Cisco IOS

More information

Category: Best Current Practice March 2000

Category: Best Current Practice March 2000 Network Working Group Request for Comments: 2780 BCP: 37 Category: Best Current Practice S. Bradner Harvard University V. Paxson ACIRI March 2000 Status of this Memo IANA Allocation Guidelines For Values

More information

Request for Comments: 3934 Updates: 2418 October 2004 BCP: 94 Category: Best Current Practice

Request for Comments: 3934 Updates: 2418 October 2004 BCP: 94 Category: Best Current Practice Network Working Group M. Wasserman Request for Comments: 3934 ThingMagic Updates: 2418 October 2004 BCP: 94 Category: Best Current Practice Updates to RFC 2418 Regarding the Management of IETF Mailing

More information

Network Working Group. Cisco Systems Inc. October 2000

Network Working Group. Cisco Systems Inc. October 2000 Network Working Group Request for Comments: 2957 Category: Informational L. Daigle Thinking Cat Enterprises P. Faltstrom Cisco Systems Inc. October 2000 Status of this Memo The application/whoispp-query

More information

Request for Comments: 2277 BCP: 18 January 1998 Category: Best Current Practice. IETF Policy on Character Sets and Languages. Status of this Memo

Request for Comments: 2277 BCP: 18 January 1998 Category: Best Current Practice. IETF Policy on Character Sets and Languages. Status of this Memo Network Working Group H. Alvestrand Request for Comments: 2277 UNINETT BCP: 18 January 1998 Category: Best Current Practice Status of this Memo IETF Policy on Character Sets and Languages This document

More information

November VeriSign Registry Registrar Protocol (RRP) Version 2.0.0

November VeriSign Registry Registrar Protocol (RRP) Version 2.0.0 Network Working Group Request for Comments: 3632 Updates: 2832 Category: Informational S. Hollenbeck S. Veeramachaneni S. Yalamanchilli VeriSign, Inc. November 2003 VeriSign Registry Registrar Protocol

More information

Request for Comments: 3007 Updates: 2535, 2136 November 2000 Obsoletes: 2137 Category: Standards Track. Secure Domain Name System (DNS) Dynamic Update

Request for Comments: 3007 Updates: 2535, 2136 November 2000 Obsoletes: 2137 Category: Standards Track. Secure Domain Name System (DNS) Dynamic Update Network Working Group B. Wellington Request for Comments: 3007 Nominum Updates: 2535, 2136 November 2000 Obsoletes: 2137 Category: Standards Track Status of this Memo Secure Domain Name System (DNS) Dynamic

More information

Prefer Header for HTTP

Prefer Header for HTTP Internet Engineering Task Force (IETF) J. Snell Request for Comments: 7240 June 2014 Category: Standards Track ISSN: 2070-1721 Prefer Header for HTTP Abstract This specification defines an HTTP header

More information

Network Working Group. Category: Standards Track January 1999 Updates: 2284, 1994, PPP LCP Internationalization Configuration Option

Network Working Group. Category: Standards Track January 1999 Updates: 2284, 1994, PPP LCP Internationalization Configuration Option Network Working Group G. Zorn Request for Comments: 2484 Microsoft Corporation Category: Standards Track January 1999 Updates: 2284, 1994, 1570 Status of this Memo PPP LCP Internationalization Configuration

More information

Category: Standards Track July The Post Office Protocol (POP3) Simple Authentication and Security Layer (SASL) Authentication Mechanism

Category: Standards Track July The Post Office Protocol (POP3) Simple Authentication and Security Layer (SASL) Authentication Mechanism Network Working Group R. Siemborski Request for Comments: 5034 Google, Inc. Obsoletes: 1734 A. Menon-Sen Updates: 2449 Oryx Mail Systems GmbH Category: Standards Track July 2007 The Post Office Protocol

More information

Request for Comments: 3405 BCP: 65 October 2002 Category: Best Current Practice

Request for Comments: 3405 BCP: 65 October 2002 Category: Best Current Practice Network Working Group M. Mealling Request for Comments: 3405 VeriSign BCP: 65 October 2002 Category: Best Current Practice Dynamic Delegation Discovery System (DDDS) Part Five: URI.ARPA Assignment Procedures

More information

Network Working Group Request for Comments: 2486 Category: Standards Track WorldCom Advanced Networks January 1999

Network Working Group Request for Comments: 2486 Category: Standards Track WorldCom Advanced Networks January 1999 Network Working Group Request for Comments: 2486 Category: Standards Track B. Aboba Microsoft M. Beadles WorldCom Advanced Networks January 1999 The Network Access Identifier Status of this Memo This document

More information

Hypertext Transfer Protocol: Access Control List draft-zhao-http-acl-00

Hypertext Transfer Protocol: Access Control List draft-zhao-http-acl-00 HTTPbis Internet-Draft Intended status: Standards Track Expires: April 23, 2015 Yongming Zhao Alibaba, Inc Qinghuan Min Alibaba, Inc Xixi Xiang Alibaba, Inc Rui Chen Alibaba, Inc October 22, 2014 Hypertext

More information

Internet Engineering Task Force (IETF) Request for Comments: 6858 March 2013 Updates: 3501 Category: Standards Track ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 6858 March 2013 Updates: 3501 Category: Standards Track ISSN: Internet Engineering Task Force (IETF) A. Gulbrandsen Request for Comments: 6858 March 2013 Updates: 3501 Category: Standards Track ISSN: 2070-1721 Simplified POP and IMAP Downgrading for Internationalized

More information

Network Working Group Internet-Draft October 27, 2007 Intended status: Experimental Expires: April 29, 2008

Network Working Group Internet-Draft October 27, 2007 Intended status: Experimental Expires: April 29, 2008 Network Working Group J. Snell Internet-Draft October 27, 2007 Intended status: Experimental Expires: April 29, 2008 Status of this Memo Atom Publishing Protocol Feature Discovery draft-snell-atompub-feature-12.txt

More information

Obsoletes: RFC5738 (if approved) Intended status: Standards Track. CNNIC October 22, 2012

Obsoletes: RFC5738 (if approved) Intended status: Standards Track. CNNIC October 22, 2012 Internet Engineering Task Force Internet-Draft Obsoletes: RFC5738 (if approved) Intended status: Standards Track Expires: April 25, 2013 P. Resnick, Ed. Qualcomm Incorporated C. Newman, Ed. Oracle S. Shen,

More information

Internet Engineering Task Force (IETF) Request for Comments: 5987 Category: Standards Track August 2010 ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 5987 Category: Standards Track August 2010 ISSN: Internet Engineering Task Force (IETF) J. Reschke Request for Comments: 5987 greenbytes Category: Standards Track August 2010 ISSN: 2070-1721 Abstract Character Set and Language Encoding for Hypertext

More information

Request for Comments: 3932 October 2004 BCP: 92 Updates: 3710, 2026 Category: Best Current Practice

Request for Comments: 3932 October 2004 BCP: 92 Updates: 3710, 2026 Category: Best Current Practice Network Working Group H. Alvestrand Request for Comments: 3932 October 2004 BCP: 92 Updates: 3710, 2026 Category: Best Current Practice Status of this Memo The IESG and RFC Editor Documents: Procedures

More information

Internet Engineering Task Force (IETF) Updates: 5322 March 2013 Category: Standards Track ISSN:

Internet Engineering Task Force (IETF) Updates: 5322 March 2013 Category: Standards Track ISSN: Internet Engineering Task Force (IETF) B. Leiba Request for Comments: 6854 Huawei Technologies Updates: 5322 March 2013 Category: Standards Track ISSN: 2070-1721 Abstract Update to Internet Message Format

More information

Network Working Group. Obsoletes: 1342 September 1993 Category: Standards Track

Network Working Group. Obsoletes: 1342 September 1993 Category: Standards Track Network Working Group K. Moore Request for Comments: 1522 University of Tennessee Obsoletes: 1342 September 1993 Category: Standards Track MIME (Multipurpose Internet Mail Extensions) Part Two: Message

More information

Internet Engineering Task Force. Intended status: Standards Track January 22, 2019 Expires: July 26, 2019

Internet Engineering Task Force. Intended status: Standards Track January 22, 2019 Expires: July 26, 2019 Internet Engineering Task Force J. Fenton Internet-Draft Altmode Networks Intended status: Standards Track January 22, 2019 Expires: July 26, 2019 Abstract SMTP Require TLS Option draft-ietf-uta-smtp-require-tls-07

More information