Hi Murray,
-----Original Message-----
From: Benoit Claise [mailto:[email protected]]
Sent: Monday, April 23, 2012 2:45 AM
To: The IESG
Cc: [email protected]; [email protected]
Subject: Benoit Claise's Discuss on draft-ietf-marf-as-14: (with
DISCUSS and COMMENT)

Benoit Claise has entered the following ballot position for
draft-ietf-marf-as-14: Discuss

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)

Please refer to http://www.ietf.org/iesg/statement/discuss-
criteria.html
for more information about IESG DISCUSS and COMMENT positions.

----------------------------------------------------------------------
DISCUSS:
----------------------------------------------------------------------

DISCUSS-DISCUSS

Abstract

    RFC 5965 defines an extensible, machine-readable format intended for
    mail operators to report feedback about received email to other
    parties.  This Applicability Statement describes common methods for
    utilizing this format for reporting both abuse and authentication
    failure events.  Mailbox Providers of any size, mail sending
    entities, and end users can use these methods as a basis to create
    procedures that best suit them.  Some related optional mechanisms are
    also discussed.

Before reviewing this draft, I browsed through the 4 RFCs at
http://datatracker.ietf.org/wg/marf/
Question: is this intentional that the abstract and the draft only
mention the "abuse" and "auth-failure" Feedback Type Name, and not the
others ones?
        fraud           [RFC5965]
        not-spam        [RFC6430]
        virus           [RFC5965]

Not a single reference to fraud, not-spam, virus, and [RFC6430] I'm
surprised not to see the full ARF capacities mentioned in a document
titled "An Applicability Statement for the Abuse Reporting Format
(ARF)", and would like to understand.
We've simply not seen enough use of these in the wild to be able to comment on their proper or 
recommended use in this AS.  The original document that became RFC5965 actually listed a large 
number of other report types that were at one time thought to be useful, but were removed prior to 
publication because nobody had used them.  "fraud" and "virus" did see rare use 
but remain edge cases, so they remained in the list registered by RFC5965.

We can (and probably should) mention this in the Introduction.
Let me ask a very basic question to everybody, including the other IESG members: what is the goal of an Applicability Statement? 1. Explain how the technical specifications are used "in the wild", as you mentioned. So a deployment experience document 2. Or explain how the technical specifications should be used for the different use cases (generally specified in a requirement document)
When I read RFC 2026 section 3.2, I conclude for 2.

Even before re-reading RFC2026, my feeling was that an applicability statement could be the first document that someone new to a WG could read: explaining the different use cases, giving pointers to the technical specifications, and explaining how to apply/combine the specifications. Basically, a document that would help implementors to select which (part of the) spec. to implement depending on the use case, a document that would promote the technology. This is how we approached the Applicability Statement documents in the WGs I've been involved with.

Therefore, I'm in favor to mention how fraud, not-spam, virus should be used.

Let me discuss this during the IETF telechat tomorrow, see what the others are thinking, and get back to you.

----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

- I see a lot of sentences such as "... discussed in Section X of
[RFC6449]."
And the only sentence in the introduction related to that RFC is:
"Further introduction to this topic may be found in [RFC6449]."
Some sentences explaining what this informational RFC is about would be
very welcome.
I propose this as the last paragraph to the Introduction:

Further introduction to this topic may be found in<xref target="RFC6449"/>, 
which is effectively an Applicability Statement written outside of the IETF and thus never 
achieved IETF consensus.  Much of the content for that document was input to this one.
Thanks. Can you please also a few sentences on how the documents match and differ. You know, I see rfc6449, published a few months back, and I see this document draft-ietf-marf-as-14, which will be published approx. 6 months
And I'm wondering, as someone not involved in this WG...
- Why do we have two almost similar documents?
- Why RFC 6449 could not be a MARF document?
- Which one(s) should I read?
- Are they conflicting? If yes, I guess that draft-ietf-marf-as-14 take precedence. If no, is draft-ietf-marf-as-14 is superset of RFC 6449, and RFC 6449 should not be read any longer.
- etc...

I'm sure you had very good answers to all these questions, and I'm looking for some written explanation for new comers in this space.


- Section 5.2
"RFC5321.MailFrom" Doesn't read right to me in: "If a Feedback Provider
applies SPF to arriving messages, a report SHOULD NOT be generated to
the RFC5321.MailFrom domain"
It's a notation introduced in RFC5598, which is a normative reference here.
Thanks for your time and effort.

Regards, Benoit.

-MSK



_______________________________________________
marf mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/marf

Reply via email to