
Cite this RFC:TXT | XML | BibTeX
DOI: https://doi.org/10.17487/RFC8460
Discuss this RFC: Send questions or comments to the mailing listuta@ietf.org
Other actions:View Errata | Submit Errata | Find IPR Disclosures from the IETF | View History of RFC 8460
A number of protocols exist for establishing encrypted channelsbetween SMTP Mail Transfer Agents (MTAs), including STARTTLS, DNS-Based Authentication of Named Entities (DANE) TLSA, and MTA StrictTransport Security (MTA-STS). These protocols can fail due tomisconfiguration or active attack, leading to undelivered messages ordelivery over unencrypted or unauthenticated channels. This documentdescribes a reporting mechanism and format by which sending systemscan share statistics and specific information about potentialfailures with recipient domains. Recipient domains can then use thisinformation to both detect potential attacks and diagnoseunintentional misconfigurations.
For the definition ofStatus,seeRFC 2026.
For the definition ofStream, seeRFC 8729.