Internet DRAFT - draft-hryckelynck-writing-rfcs
draft-hryckelynck-writing-rfcs
Network Working Group H. Ryckelynck
Internet-Draft Hubert Ryckelynck
Intended status: Experimental May 14, 2012
Expires: November 15, 2012
Mail Accepted by Previous Sending
draft-hryckelynck-writing-rfcs-04
Abstract
Mail Accepted by Previous Sending defines a mechanism by which
incoming unsollicited mails may be rejected or penalized by a MTA if
their sender address domains has never been a destination for the
outgoing mails treated by this MTA.
Status of this Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on November 15, 2012.
Copyright Notice
Copyright (c) 2012 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Ryckelynck Expires November 15, 2012 [Page 1]
Internet-Draft Mail Accepted by Previous Sending May 2012
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 4
2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 5
3. SMTP responsability notion . . . . . . . . . . . . . . . . . . 6
3.1. Original SMTP responsability notion . . . . . . . . . . . 6
3.1.1. responsibility of the client . . . . . . . . . . . . . 6
3.1.2. responsibility of the server . . . . . . . . . . . . . 6
3.2. gap is growing with the original notion . . . . . . . . . 6
3.2.1. silent dropping . . . . . . . . . . . . . . . . . . . 6
3.3. How to get back to the original notion . . . . . . . . . . 6
3.3.1. Does the return-path exists ? . . . . . . . . . . . . 6
3.3.2. Does the return-path has been sollicited ? . . . . . . 8
4. Identify Previously accepted domain . . . . . . . . . . . . . 10
4.1. Automatically . . . . . . . . . . . . . . . . . . . . . . 10
4.2. On demand . . . . . . . . . . . . . . . . . . . . . . . . 10
4.3. Directly in the base . . . . . . . . . . . . . . . . . . . 10
5. Store information about previously accepted domain . . . . . . 11
5.1. Use of a dictionnary . . . . . . . . . . . . . . . . . . . 11
5.2. use of an XML tree . . . . . . . . . . . . . . . . . . . . 11
5.3. Use a Dedicated DNS . . . . . . . . . . . . . . . . . . . 13
6. Apply policy to previously or non previously accepted mail . . 14
6.1. Offensive policy . . . . . . . . . . . . . . . . . . . . . 14
6.1.1. Return a 5.5.0 code . . . . . . . . . . . . . . . . . 14
6.1.2. Return a 4.5.0 code . . . . . . . . . . . . . . . . . 15
6.2. Defensive policy . . . . . . . . . . . . . . . . . . . . . 15
6.2.1. Add a header . . . . . . . . . . . . . . . . . . . . . 15
6.2.2. Promote known Domain . . . . . . . . . . . . . . . . . 15
7. Which Strategy for which user . . . . . . . . . . . . . . . . 16
7.1. Private company . . . . . . . . . . . . . . . . . . . . . 16
7.1.1. As a sender . . . . . . . . . . . . . . . . . . . . . 16
7.1.2. As a receiver . . . . . . . . . . . . . . . . . . . . 16
7.2. Public Messagery . . . . . . . . . . . . . . . . . . . . . 16
7.2.1. As a sender . . . . . . . . . . . . . . . . . . . . . 16
7.2.2. As a receiver . . . . . . . . . . . . . . . . . . . . 17
7.3. Commercial site . . . . . . . . . . . . . . . . . . . . . 17
7.3.1. As a sender . . . . . . . . . . . . . . . . . . . . . 17
7.3.2. As a receiver . . . . . . . . . . . . . . . . . . . . 18
8. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 19
9. Security Considerations . . . . . . . . . . . . . . . . . . . 20
9.1. IP reputation . . . . . . . . . . . . . . . . . . . . . . 20
9.2. SPF and DKIM . . . . . . . . . . . . . . . . . . . . . . . 20
9.3. Mail analysis . . . . . . . . . . . . . . . . . . . . . . 20
9.4. Authentification LDAP . . . . . . . . . . . . . . . . . . 20
9.5. Add a specific object or header . . . . . . . . . . . . . 20
9.6. Blacklist a known domain . . . . . . . . . . . . . . . . . 20
10. References . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Appendix A. Acknowledgements . . . . . . . . . . . . . . . . . . 22
Ryckelynck Expires November 15, 2012 [Page 2]
Internet-Draft Mail Accepted by Previous Sending May 2012
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 23
Ryckelynck Expires November 15, 2012 [Page 3]
Internet-Draft Mail Accepted by Previous Sending May 2012
1. Introduction
It is easy to say that mails with, for example, an attempted fraud
content are mails we must intercept.
But for many other type of mail as, for example, marketing mail, it
is very difficult to make the difference between a mail user wants to
receive and a mail he does not want to receive.
In fact, in a lot of cases, the only difference between sollicited
and unsollicited mail is the recipient advice.
With this in mind, it MAY be useful to find a mechanism for users to
choose themselves who will be able to send them some mails.
This mechanism SHOULD of course be implemented in a way the users do
not feel too constrained.
The mechanism described below is an attempt to give an answer to this
problematic.
Mail Accepted by Previous Sending defines a mechanism by which
incoming unsollicited mails may be rejected or penalized by a MTA if
their sender address domains has never been a destination for the
outgoing mails treated by this MTA.
Ryckelynck Expires November 15, 2012 [Page 4]
Internet-Draft Mail Accepted by Previous Sending May 2012
2. Terminology
The term "domain" use in this document has to be understand as the
domain part of a SMTP address (user@domain) and must be a FQDN as
describe in the section 2.3.5 of RFC 5321 [RFC5321].
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in
[RFC2119]. These words take their normative meanings only when they
are presented in ALL UPPERCASE.
Ryckelynck Expires November 15, 2012 [Page 5]
Internet-Draft Mail Accepted by Previous Sending May 2012
3. SMTP responsability notion
3.1. Original SMTP responsability notion
In the SMTP RFC [RFC5321], you will find a responsability notion.
3.1.1. responsibility of the client
As Describe in the section 2.1 of RFC 5321 [RFC5321] :
"The responsability of an SMTP client is to transfer mail messages to
one or more SMTP servers, or report its failure to do so".
3.1.2. responsibility of the server
As Describe in the section 2.1 of RFC 5321 [RFC5321] :
"The protocol requires that a server MUST accept responsability for
either delivering the message or properly reporting the failure to do
so"
As Describe in the section 6.1 of RFC 5321 [RFC5321] :
When the receiver-SMTP accepts a piece of mail (by sending a "250 OK"
message in response to DATA), it is accepting responsibility for
delivering or relaying the message. It must take this responsibility
seriously.
3.2. gap is growing with the original notion
3.2.1. silent dropping
Because of the huge quantity of unsollicited mail and to avoid giving
more information to those who are sending them, section 6.2 of RFC
5321 [RFC5321] permits in practice silent dropping and more and more
MTAs are configured to drop silently those mails.
3.3. How to get back to the original notion
3.3.1. Does the return-path exists ?
If section 6.2 of RFC 5321 [RFC5321] permits in practice silent
dropping, it also pleads to keep the "delivered or returned" way to
deal with mails.
In this sense, those past years, efforts has been made to find some
ways to check the return path as to stay close from the original SMTP
responsability notion (deliver or notify). You of course need a
Ryckelynck Expires November 15, 2012 [Page 6]
Internet-Draft Mail Accepted by Previous Sending May 2012
return path in case of notify.
But at this time the RFC 5321 [RFC5321]in section 3.6.2 doesn't
recommend any method.
A return-path is made of two independant elements, the user and the
domain. What can be done if we want to check those two elements.
3.3.1.1. verification of the user part
User part makes sense only for the MTA which finally delivers the
mail.
In the SMTP RFC [RFC5321] the VRFY command permits to ask a MTA about
the user part. But to avoid giving more information to those who are
sending unsollicited mail, the VRFY command has been disabled on most
MTAs. The user part of the sender address is therefore uncheckable.
3.3.1.2. verification of the domain part
There are four verification levels when checking domain :
1. Does the domain exist : First level is to verify if the domain is
declared in the Internet DNS. This can be done by a DNS SOA
Request
2. Does the domain has an MX record : Second level is to verify if
the domain has declared that it can handle mail receiving. This
can be done by a DNS MX request.
3. Does the domain has a declared MTA : Third level is to verify if
the answer of the MX request, formerly the name of the server
which will handle the mails, is properly declared on the Internet
DNS. This can be done by a DNS A request.
4. Does the MTA is answering : Fourth level is to verify if the
answer of the A request, formerly the IP address of the MTA, is
accepting an SMTP connection. This can be done by a connection
on the TCP port 25.
Doing all of these verifications :
o Will consume a lot of ressources. In fact as much work as to send
a notification (except of the data).
o will only prove that your correspondants have a fully compliant
configuration.
Ryckelynck Expires November 15, 2012 [Page 7]
Internet-Draft Mail Accepted by Previous Sending May 2012
o Will not be disuasive for people who wants to send you some
unsollicited mails as the cost to rent an MTA on Internet and to
get a fully compliant Internet DNS configuration is very cheap and
can be change regularly.
Still the only thing that can definitively makes the difference
between a sollicited and an unsollicited mail is the recipient
advice.
3.3.2. Does the return-path has been sollicited ?
3.3.2.1. situation resume
Briefly :
o We MUST NOT drop messages without sending notifications.
o So there SHOULD be a return path for notifications.
o And it MAY be rational to verify this return path validity.
o But today we can only check the domain part of the sender address.
o And it is a very heavy process.
3.3.2.2. Mail accepted by previous sending
To verify the domain and in the same time to be sure the user wants
to comunicate with this domain we could apply the following
mechanism.
When mails are going out :
o Take the domain part of the recipient address.
o Store it, if not already store, in a base as accepted domains.
Then when a mail is coming in :
o Take the domain part of the sender address.
o Check in the base if we have already send some mail to this domain
* If the answer is yes, it means some of our users wants to
communicate with this domain and we accept the mail.
* If the answer is no, none of our users has explicitly, by
sending some mail to it, declared that he wants to communicate
Ryckelynck Expires November 15, 2012 [Page 8]
Internet-Draft Mail Accepted by Previous Sending May 2012
with this domain and then we MAY apply some policy to, reject
and notify, or penalize the mail (see section 6).
Even in the most offensive policy (reject and notify), this mechanism
is fully compliant with the SMTP responsability notion (deliver or
report).
As Describe in the section 2.1 of RFC 5321 [RFC5321] : "The protocol
requires that a server MUST accept responsability for either
delivering the message or properly reporting the failure to do so"
And in section 7.9 of RFC 5321 [RFC5321] : "It is a well-established
principle that an SMTP server may refuse to accept mail for any
operational or technical reason that makes sense to the site
providing the server."
And it has the advantage to give the user the possibility to
explicitly declare what is for him a sollicited mail.
Ryckelynck Expires November 15, 2012 [Page 9]
Internet-Draft Mail Accepted by Previous Sending May 2012
4. Identify Previously accepted domain
As we say previously, acceptation of domain by a user SHOULD :
o Be possible in a autonomous way.
o Not be time consuming.
The easiest way is to send an outgoing mail to the domain the user
wants to accept.
4.1. Automatically
When a company wants to implement this mechanism. It SHOULD be
possible at the beginning to activate it in a transparent way.
During a period of time, the "accepted domain" base will be
automatically filled.
At the beginning the size of the base will grow up very fast.
After a while, when the growing of the base will slow down, the MTA
administrator could then :
o Communicate to the users the way to accept domain.
o Start to reject or penalize non previoulsy accepted domain.
4.2. On demand
After the mechanism is in service, when user wants to communicate
with a new domain, they simply send an outgoing mail to this domain.
As disussed later in section "security considerations" this
acceptation mail could have specific subject or other specifif header
value.
Remark : As users in a same company will share the "accepted domain"
base, the number of domains to be declared by user would be in most
cases very small.
4.3. Directly in the base
The MTA administrator will of course have the possibility to add a
domain directly in the base.
Ryckelynck Expires November 15, 2012 [Page 10]
Internet-Draft Mail Accepted by Previous Sending May 2012
5. Store information about previously accepted domain
First, it is important to take in consideration that whatever the way
to store the Information about the "accepted domain" :
o This information SOULD be sharable by all MTA in a same company.
o The size and format of the fields that will contain "accepted
domain" MUST be compatible to the size and format as described in
the section 3.1 of RFC 1035 [RFC1035].
o The MTA administrator MUST have the possibility to set directly a
domain in the base.
5.1. Use of a dictionnary
For small companies a Dictionnary MAY be suficient to store the list
of accepted domains.
5.2. use of an XML tree
For an average company, the use of an xml tree to store the list of
accepted domain SHOULD be more efficient.
The xml tree SHOULD then be compatible with the structure of the
Internet domain as described in the RFC 1034 [RFC1034].
Ryckelynck Expires November 15, 2012 [Page 11]
Internet-Draft Mail Accepted by Previous Sending May 2012
You will find below an example of how the tree MAY look.
<root>
<com>
<companyname>
<office>
<department>
</department>
...
</office>
...
</companyname>
...
</com>
<edu>
<schoolname>
</schoolname>
...
</edu>
...
</root>
To limit the size of the tree, administrator SHOULD have the
possibility to limit the number of subdomain level the system SHOULD
take in consideration in the tree.
In the example below the maximum number of level is 2
<root>
<com>
<companyname>
</companyname>
...
</com>
<edu>
<schoolname>
</schoolname>
...
</edu>
...
</root>
Fonctionality to configure a wildcard for an entire branch in the
tree could be useful for the MTA administrator.
Ryckelynck Expires November 15, 2012 [Page 12]
Internet-Draft Mail Accepted by Previous Sending May 2012
The example below show a wildcard for the entire "edu" branch.
<root>
<com>
<companyname>
</companyname>
...
</com>
<edu>
<*>
</*>
</edu>
...
</root>
5.3. Use a Dedicated DNS
For bigger company, it could be interesting to store the information
about accepted domain in a dedicated DNS.
The use of a dedicated DNS could offer some interesting possibilities
to the MTAs administratror like the use of Wildcard to delibarately
accept large range of domain [RFC4592].
Ryckelynck Expires November 15, 2012 [Page 13]
Internet-Draft Mail Accepted by Previous Sending May 2012
6. Apply policy to previously or non previously accepted mail
Of course, "Mail accepted by previous sending" is not the definitive
solution to get rid of unsollicited mail. It has to be seen as a
mechanism that can give useful information. This information can
then be used in policy to filter mails.
6.1. Offensive policy
"Offensive Policy" here means, mail that match the policy will be
directly rejected.
WARNING : You SHOULD carefully check what are your users need before
to apply an offensive policy as described below, because you MAY
reject some sollicited mails. If you are not sure it is preferable
to choose defensive policy (see section 6.2)
6.1.1. Return a 5.5.0 code
If the domain has not been previously accepted, and you make the
choice, based on this information, to reject the mail, you MUST
return a 5.5.0 code as Describe in the section 3.6.2 of RFC 5321
[RFC5321].
Text to be send with the 5.5.0 could be for example :
"550 Your Domain has not been previously accepted"
Whith this method, it is important to keep a trace in the log of who
was the recipient of the mail before to reject a mail which comes
from a non previously accepted domain. So you SHOULD return a 2.5.0
code to the "MAIL FROM:" command and then while you have the
recipient return a 5.5.0 code to the "RCPT TO" command. As Describe
in the section 3.3 of RFC 5321 [RFC5321].
Example :
S: 220 example-server.com Simple Mail Transfer Service Ready
C: EHLO example-client.com
S: 250 example-server.com greets test.com
C: MAIL FROM:<sender@example-client.com>
S: 250 OK
C: RCPT TO:<recipient@example-server.com>
S: 550 Your Domain has not been previously accepted
C: QUIT
S: 221 example-server.com Service closing transmission channel
Ryckelynck Expires November 15, 2012 [Page 14]
Internet-Draft Mail Accepted by Previous Sending May 2012
6.1.2. Return a 4.5.0 code
A 4.5.0 code MAY also be used, if you want to keep the message in the
sender departure queue to let some time to the recipient to accept
the domain.
6.2. Defensive policy
"Defensive Policy" here means, mail that match the policy will not be
directly rejected.
6.2.1. Add a header
A policy can be implemented as follow :
o The MTA accepts the mail.
o And adds a "non previously authorized" header in the mail.
o Then a rule in the users mail box match the header and put it in
the junk mail directory.
Then if the user is declaring that this mail is sollicited, the
domain can then be added in the "previously accepted domain" base.
6.2.2. Promote known Domain
On MTA which uses IP reputation filter, It could be interesting to
implement a fonctionnality that give the possibility to the
administrator to promote a mail that comes from a domain that has
been previously accepted. For example, if the MTA receive a mail that
SHOULD be dropped because it comes from an IP which has a bad
reputation. The administrator could decide to accept mail with a
lower reputation if this mail has a sender address with a domain
which has been previously accepted.
Ryckelynck Expires November 15, 2012 [Page 15]
Internet-Draft Mail Accepted by Previous Sending May 2012
7. Which Strategy for which user
In this part we will talk about what measures SHOULD be taken by, or
what problems could meet those who wants to implement the "accepted
by previous sending" mechanism.
7.1. Private company
7.1.1. As a sender
7.1.1.1. to another private company
If the sender receive a "550 Your Domain has not been previously
accepted" code, he will clearly know his mail has been rejected and
he has to contact the recipient to ask him to authorize his domain.
7.1.1.2. to a commercial site
As user has to subscribe to receive mail from a commercial site, The
commercial site will have no difficulty to authorize their subscriber
domain. And so the subscriber will be automatically authorized to
send mail to the commercial site.
7.1.2. As a receiver
7.1.2.1. from another private company
When a user wants to be reached by a new company, he will only have
to declare the domain.
7.1.2.2. from a commercial site
When a user wants to be reached by a commercial site, he will only
have to declare the domain. This will force commercial site to
specify clearly which domain they use for their sending. This will
promote commercial site that have a fair marketing policy and will
penalize other marketing sender which change regularly their sender
address domain to cross email filtering.
7.2. Public Messagery
7.2.1. As a sender
7.2.1.1. to a private company
As, the domain will be accepted from the moment only one user has
sent a mail to this domain, big public messagery will be quickly and
automatically integrated in the "previously accepted" base.
Ryckelynck Expires November 15, 2012 [Page 16]
Internet-Draft Mail Accepted by Previous Sending May 2012
7.2.1.2. to a commercial site
As user has to subscribe to receive mail from a commercial site, The
commercial site will have no difficulty to authorize their subscriber
domain. And so the subscriber will be automatically authorized to
send mail to the commercial site.
7.2.2. As a receiver
7.2.2.1. from a private company or from a commercial site.
In this case, the problem is that every user of a public messagery is
an independant entity and has no relation with other users.
This means for public messagery that they will have to store separate
information about accepted domain for each user. If not, anybody
could create a mail box and then autorize his domain for all public
messagery users
Also, It is very important for public messagery that the user doesn't
feel constrained in anyway when using one of their mail box. And
they cannot impose rules to their users as a private company could
do.
Public messagery, if they finally decide to implement such mechanism,
WOULD probably choose a defensive strategy like :
o put the "non accepted" mail in the junk mail directory
o accept the domain for the user if he declares a mail from this
domain is not an unsollicited mail.
7.3. Commercial site
7.3.1. As a sender
7.3.1.1. to a private company
Today marketing sender who has a fair policy :
o Only send mail to users who subscribe.
o Send a mail to confirm subscription.
o Activate the user account when he click on a web link
This method could not be apply anymore with the "previously accepted
mail" mechanism.
Ryckelynck Expires November 15, 2012 [Page 17]
Internet-Draft Mail Accepted by Previous Sending May 2012
Marketing sender will have to ask user to send them a mail to
activate their account.
Advantages of such a way to deal with subcription would be :
o To have an explicit subscribtion trace of the user.
o To autorize only the site on which the user has subscribed and not
all the other senders to whom the site MAY give your address.
o To invite marketing sender to not change anytime their sender
email address and so to apply the appropriate policy to keep a
good reputation on their domain.
7.3.1.2. to another commercial site
N.A
7.3.2. As a receiver
7.3.2.1. from a private company
As user has to subscribe to receive mail from a commercial site, The
commercial site will have no difficulty to authorize their subscriber
domain. And so the subscriber will be automatically authorized to
send mail to the commercial site.
7.3.2.2. from another commercial site
N.A
Ryckelynck Expires November 15, 2012 [Page 18]
Internet-Draft Mail Accepted by Previous Sending May 2012
8. IANA Considerations
This document has no action for IANA.
Ryckelynck Expires November 15, 2012 [Page 19]
Internet-Draft Mail Accepted by Previous Sending May 2012
9. Security Considerations
9.1. IP reputation
Ip reputation mechanism will still protect you against massive
sending. Without this mechanism the domain verification process
could be a target for Deny of service attack.
9.2. SPF and DKIM
It is not garanteed, when a mail which has a sender address from a
domain you previously accepted, that this mail really come from this
domain. For this purpose you may need other mechanism that could be
viewed as complementary like Sender ID [RFC4406], SPF [RFC4408] or
DKIM [RFC6376].
9.3. Mail analysis
Mail analysis is still needed, as an identified and authorized domain
MAY have been temporarly corrupted and MAY send you temporarly
unsollicited mail.
9.4. Authentification LDAP
The possibility you give to user to authorize a domain just by
sending a mail SHOULD be limited to authentified user. This
authentification MAY be for example realized by a request to your
LDAP server.
9.5. Add a specific object or header
The possibility you give to user to authorize a domain just by
sending a mail could be limited by using a specific subject or a
specific header in the mail.
In this case, an automated fonctionnality SHOULD be implemented in
the user mail client :
o So the authorization of a domain remains easy for the user.
o To guarantee the format of the requested subject or header.
9.6. Blacklist a known domain
In the case a domain previously accepted by a user is declared as an
unsollicited mail sender by some other users. The MTA administrator
SHOULD have the preemptive possibility to blacklist this domain.
Ryckelynck Expires November 15, 2012 [Page 20]
Internet-Draft Mail Accepted by Previous Sending May 2012
10. References
[RFC1034] Mockapetris, P., "Domain names - concept and facilities",
STD 13, RFC 1034, November 1987.
[RFC1035] Mockapetris, P., "Domain names - implementation and
specification", STD 13, RFC 1035, November 1987.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC4406] Lyon, J. and M. Wong, "Sender ID: Authenticating E-Mail",
RFC 4406, April 2006.
[RFC4408] Schlitt, W. and M. Wong, "Sender Policy Framework (SPF)
for Authorizing Use of Domains in E-Mail", RFC 4408,
May 2006.
[RFC4592] Lewis, E., "The Role of Wildcards in the Domain Name
System", RFC 4592, July 2006.
[RFC5321] Klensin, J., "Simple Mail Transfer Protocol", RFC 5321,
November 2008.
[RFC6376] Crocker, D., Hansen, T., and M. Kucherawy, "DomainKeys
Identified Mail (DKIM) Signatures", RFC 6376,
September 2011.
Ryckelynck Expires November 15, 2012 [Page 21]
Internet-Draft Mail Accepted by Previous Sending May 2012
Appendix A. Acknowledgements
The author gratefully acknowledges the contributions of:
S. Moonesamy
Ryckelynck Expires November 15, 2012 [Page 22]
Internet-Draft Mail Accepted by Previous Sending May 2012
Author's Address
Hubert Ryckelynck
Hubert Ryckelynck
40 Avenue de la Grande Armee
Paris, 75017
FRANCE
Phone:
Email: hub.ryck@gmail.com
URI:
Ryckelynck Expires November 15, 2012 [Page 23]