<?xml version='1.0' encoding='utf-8'?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" version="3" ipr="trust200902" docName="draft-ietf-dmarc-failure-reporting-25" number="9991" submissionType="IETF" category="std" xml:lang="en" updates="6591" obsoletes="7489" tocInclude="true" consensus="true" symRefs="true" sortRefs="true" prepTime="2026-05-19T20:41:17" indexInclude="true" scripts="Common,Latin" tocDepth="3">
  <link href="https://datatracker.ietf.org/doc/draft-ietf-dmarc-failure-reporting-25" rel="prev"/>
  <link href="https://dx.doi.org/10.17487/rfc9991" rel="alternate"/>
  <link href="urn:issn:2070-1721" rel="alternate"/>
  <front>
    <title abbrev="DMARC Failure Reporting">Domain-Based Message Authentication, Reporting, and Conformance (DMARC) Failure Reporting</title>
    <seriesInfo name="RFC" value="9991" stream="IETF"/>
    <author initials="S." surname="Jones" fullname="Steven M. Jones" role="editor">
      <organization showOnFrontPage="true">DMARC.org</organization>
      <address>
        <email>smj@dmarc.org</email>
      </address>
    </author>
    <author initials="A." surname="Vesely" fullname="Alessandro Vesely" role="editor">
      <organization showOnFrontPage="true">Tana</organization>
      <address>
        <email>vesely@tana.it</email>
      </address>
    </author>
    <date month="05" year="2026"/>
    <area>ART</area>
    <workgroup>dmarc</workgroup>
    <keyword>DMARC</keyword>
    <keyword>DKIM</keyword>
    <keyword>SPF</keyword>
    <keyword>feedback</keyword>
    <keyword>Email Authentication</keyword>
    <keyword>Failure report</keyword>
    <abstract pn="section-abstract">
      <t indent="0" pn="section-abstract-1">Domain-based Message Authentication, Reporting, and Conformance
(DMARC) is a mechanism by which a Domain Owner can request
feedback about email messages using their domain in the From: address
field.  This document describes "failure reports", or "failed message
reports", which provide details about individual messages that failed
to authenticate according to the DMARC mechanism.</t>
      <t indent="0" pn="section-abstract-2">This document updates RFC 6591 and obsoletes RFC 7489.</t>
    </abstract>
    <boilerplate>
      <section anchor="status-of-memo" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.1">
        <name slugifiedName="name-status-of-this-memo">Status of This Memo</name>
        <t indent="0" pn="section-boilerplate.1-1">
            This is an Internet Standards Track document.
        </t>
        <t indent="0" pn="section-boilerplate.1-2">
            This document is a product of the Internet Engineering Task Force
            (IETF).  It represents the consensus of the IETF community.  It has
            received public review and has been approved for publication by
            the Internet Engineering Steering Group (IESG).  Further
            information on Internet Standards is available in Section 2 of 
            RFC 7841.
        </t>
        <t indent="0" pn="section-boilerplate.1-3">
            Information about the current status of this document, any
            errata, and how to provide feedback on it may be obtained at
            <eref target="https://www.rfc-editor.org/info/rfc9991" brackets="none"/>.
        </t>
      </section>
      <section anchor="copyright" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.2">
        <name slugifiedName="name-copyright-notice">Copyright Notice</name>
        <t indent="0" pn="section-boilerplate.2-1">
            Copyright (c) 2026 IETF Trust and the persons identified as the
            document authors. All rights reserved.
        </t>
        <t indent="0" pn="section-boilerplate.2-2">
            This document is subject to BCP 78 and the IETF Trust's Legal
            Provisions Relating to IETF Documents
            (<eref target="https://trustee.ietf.org/license-info" brackets="none"/>) in effect on the date of
            publication of this document. Please review these documents
            carefully, as they describe your rights and restrictions with
            respect to this document. Code Components extracted from this
            document must include Revised BSD License text as described in
            Section 4.e of the Trust Legal Provisions and are provided without
            warranty as described in the Revised BSD License.
        </t>
      </section>
    </boilerplate>
    <toc>
      <section anchor="toc" numbered="false" removeInRFC="false" toc="exclude" pn="section-toc.1">
        <name slugifiedName="name-table-of-contents">Table of Contents</name>
        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1">
          <li pn="section-toc.1-1.1">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.1"><xref derivedContent="1" format="counter" sectionFormat="of" target="section-1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-introduction">Introduction</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.1.2">
              <li pn="section-toc.1-1.1.2.1">
                <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.2.1.1"><xref derivedContent="1.1" format="counter" sectionFormat="of" target="section-1.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-terminology">Terminology</xref></t>
              </li>
              <li pn="section-toc.1-1.1.2.2">
                <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.2.2.1"><xref derivedContent="1.2" format="counter" sectionFormat="of" target="section-1.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-document-status">Document Status</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.2">
            <t indent="0" pn="section-toc.1-1.2.1"><xref derivedContent="2" format="counter" sectionFormat="of" target="section-2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-dmarc-failure-reports">DMARC Failure Reports</xref></t>
          </li>
          <li pn="section-toc.1-1.3">
            <t indent="0" pn="section-toc.1-1.3.1"><xref derivedContent="3" format="counter" sectionFormat="of" target="section-3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-other-failure-reports">Other Failure Reports</xref></t>
          </li>
          <li pn="section-toc.1-1.4">
            <t indent="0" pn="section-toc.1-1.4.1"><xref derivedContent="4" format="counter" sectionFormat="of" target="section-4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-reporting-format-update">Reporting Format Update</xref></t>
          </li>
          <li pn="section-toc.1-1.5">
            <t indent="0" pn="section-toc.1-1.5.1"><xref derivedContent="5" format="counter" sectionFormat="of" target="section-5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-verifying-external-destinat">Verifying External Destinations</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.5.2">
              <li pn="section-toc.1-1.5.2.1">
                <t indent="0" pn="section-toc.1-1.5.2.1.1"><xref derivedContent="5.1" format="counter" sectionFormat="of" target="section-5.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-transport">Transport</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.6">
            <t indent="0" pn="section-toc.1-1.6.1"><xref derivedContent="6" format="counter" sectionFormat="of" target="section-6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-iana-considerations">IANA Considerations</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.6.2">
              <li pn="section-toc.1-1.6.2.1">
                <t indent="0" pn="section-toc.1-1.6.2.1.1"><xref derivedContent="6.1" format="counter" sectionFormat="of" target="section-6.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-feedback-report-header-fiel">Feedback Report Header Fields Registry Update</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.7">
            <t indent="0" pn="section-toc.1-1.7.1"><xref derivedContent="7" format="counter" sectionFormat="of" target="section-7"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-privacy-considerations">Privacy Considerations</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.7.2">
              <li pn="section-toc.1-1.7.2.1">
                <t indent="0" pn="section-toc.1-1.7.2.1.1"><xref derivedContent="7.1" format="counter" sectionFormat="of" target="section-7.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-data-exposure-consideration">Data Exposure Considerations</xref></t>
              </li>
              <li pn="section-toc.1-1.7.2.2">
                <t indent="0" pn="section-toc.1-1.7.2.2.1"><xref derivedContent="7.2" format="counter" sectionFormat="of" target="section-7.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-report-recipients">Report Recipients</xref></t>
              </li>
              <li pn="section-toc.1-1.7.2.3">
                <t indent="0" pn="section-toc.1-1.7.2.3.1"><xref derivedContent="7.3" format="counter" sectionFormat="of" target="section-7.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-additional-damage">Additional Damage</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.8">
            <t indent="0" pn="section-toc.1-1.8.1"><xref derivedContent="8" format="counter" sectionFormat="of" target="section-8"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-security-considerations">Security Considerations</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.8.2">
              <li pn="section-toc.1-1.8.2.1">
                <t indent="0" pn="section-toc.1-1.8.2.1.1"><xref derivedContent="8.1" format="counter" sectionFormat="of" target="section-8.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-denial-of-service">Denial of Service</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.9">
            <t indent="0" pn="section-toc.1-1.9.1"><xref derivedContent="9" format="counter" sectionFormat="of" target="section-9"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-references">References</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.9.2">
              <li pn="section-toc.1-1.9.2.1">
                <t indent="0" pn="section-toc.1-1.9.2.1.1"><xref derivedContent="9.1" format="counter" sectionFormat="of" target="section-9.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-normative-references">Normative References</xref></t>
              </li>
              <li pn="section-toc.1-1.9.2.2">
                <t indent="0" pn="section-toc.1-1.9.2.2.1"><xref derivedContent="9.2" format="counter" sectionFormat="of" target="section-9.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-informative-references">Informative References</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.10">
            <t indent="0" pn="section-toc.1-1.10.1"><xref derivedContent="Appendix A" format="default" sectionFormat="of" target="section-appendix.a"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-example-failure-report">Example Failure Report</xref></t>
          </li>
          <li pn="section-toc.1-1.11">
            <t indent="0" pn="section-toc.1-1.11.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.b"/><xref derivedContent="" format="title" sectionFormat="of" target="name-authors-addresses">Authors' Addresses</xref></t>
          </li>
        </ul>
      </section>
    </toc>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" removeInRFC="false" toc="include" pn="section-1">
      <name slugifiedName="name-introduction">Introduction</name>
      <t indent="0" pn="section-1-1">Domain-based Message Authentication, Reporting, and Conformance (DMARC)
<xref target="RFC9989" format="default" sectionFormat="of" derivedContent="RFC9989"/> is a mechanism by which a mail-originating
organization can express domain-level policies and preferences for
message validation, disposition, and reporting that can be used by a
mail-receiving organization to improve mail handling. This document
focuses on one type of reporting that can be requested under DMARC.</t>
      <t indent="0" pn="section-1-2">Failure reports provide detailed information about the failure of a
single message or a group of similar messages failing for the same
reason. Their purpose is twofold.  On the one hand, they are meant to
aid in cases where a Domain Owner wishes to determine the cause of
failures that were part of aggregate reports (see
<xref target="RFC9990" format="default" sectionFormat="of" derivedContent="RFC9990"/>).  On the other hand, they can
allow the Domain Owner to quickly identify and address harmful
messages involving direct domain abuse.  It is important to note that
these reports can contain the header fields or sometimes the entire
content of a failed message, which may contain Personally Identifiable
Information (PII). The potential disclosure of PII should be considered
when deciding whether to request failure reports as a Domain Owner, or
what information to include or redact in failure reports when creating
them as a Mail Receiver, or whether to create failure reports at all.
Refer to <xref target="privacy-considerations" format="default" sectionFormat="of" derivedContent="Section 7"/> for more discussion on privacy considerations.</t>
      <section anchor="terminology" numbered="true" removeInRFC="false" toc="include" pn="section-1.1">
        <name slugifiedName="name-terminology">Terminology</name>
        <t indent="0" pn="section-1.1-1">There are a number of terms defined in
<xref target="RFC9989" sectionFormat="of" section="3.2" format="default" derivedLink="https://rfc-editor.org/rfc/rfc9989#section-3.2" derivedContent="RFC9989"/>
that are used within this document.  Understanding those
definitions will aid in reading this document.</t>
        <t indent="0" pn="section-1.1-2">The format of DMARC failure reports is derived from "Authentication
Failure Reporting Using the Abuse Reporting Format" <xref target="RFC6591" format="default" sectionFormat="of" derivedContent="RFC6591"/>, and
the terms defined there are used here.</t>
        <t indent="0" pn="section-1.1-3">
    The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
    "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
    described in BCP 14 <xref target="RFC2119" format="default" sectionFormat="of" derivedContent="RFC2119"/> <xref target="RFC8174" format="default" sectionFormat="of" derivedContent="RFC8174"/> 
    when, and only when, they appear in all capitals, as shown here.
        </t>
      </section>
      <section anchor="document-status" numbered="true" removeInRFC="false" toc="include" pn="section-1.2">
        <name slugifiedName="name-document-status">Document Status</name>
        <t indent="0" pn="section-1.2-1">This document, in part, along with <xref target="RFC9989" format="default" sectionFormat="of" derivedContent="RFC9989"/> and <xref target="RFC9990" format="default" sectionFormat="of" derivedContent="RFC9990"/>,
obsoletes and replaces <xref target="RFC7489" format="default" sectionFormat="of" derivedContent="RFC7489"/>.</t>
      </section>
    </section>
    <section anchor="failure-reports" numbered="true" removeInRFC="false" toc="include" pn="section-2">
      <name slugifiedName="name-dmarc-failure-reports">DMARC Failure Reports</name>
      <t indent="0" pn="section-2-1">Besides the header fields or the entire contents of a failed message, failure
reports supply details about transmission and DMARC authentication,
which may aid a Domain Owner in determining the cause of an authentication failure.</t>
      <t indent="0" pn="section-2-2">Failure reports are normally generated and sent almost immediately
after the Mail Receiver detects a DMARC failure.  Rather than waiting
for an aggregate report, these reports are useful for quickly notifying
the Domain Owners when there is an authentication failure. Failure
reports also provide more information about the failed message than is
available in an aggregate report.  This allows the failure report
consumer to better determine whether the failure is of a message that
the Domain Owner intended to authenticate or one for which use of its
domain was not authorized.</t>
      <t indent="0" pn="section-2-3">These reports should include as much of the message header fields and body as
possible, consistent with the reporting party's privacy policies, to
enable the Domain Owner to diagnose the authentication failure.</t>
      <t indent="0" pn="section-2-4">When a Domain Owner requests failure reports for the purpose of
forensic analysis, and the Mail Receiver is willing to provide such
reports, the Mail Receiver generates and sends a message using the
format described in <xref target="RFC6591" format="default" sectionFormat="of" derivedContent="RFC6591"/>; this document updates that reporting
format, as described in <xref target="reporting-format-update" format="default" sectionFormat="of" derivedContent="Section 4"/>.</t>
      <t indent="0" pn="section-2-5">The destination(s) to which failure reports are sent, and options for when
they will be sent, are defined by the "ruf" and "fo" tags as provided
in <xref target="RFC9989" sectionFormat="of" section="4.7" format="default" derivedLink="https://rfc-editor.org/rfc/rfc9989#section-4.7" derivedContent="RFC9989"/>.</t>
      <t indent="0" pn="section-2-6">When multiple Uniform Resource Identifiers (URIs) are provided to receive failure reports, the
report generator <bcp14>MUST</bcp14> make an attempt to deliver to each of them.
External destinations <bcp14>MUST</bcp14> be verified (see <xref target="verifying-external-destinations" format="default" sectionFormat="of" derivedContent="Section 5"/>).
Report generators <bcp14>MUST NOT</bcp14> consider "ruf" tags in DMARC Policy Records that have a "psd=y"
tag, unless there are specific agreements between the interested parties.</t>
      <t indent="0" pn="section-2-7">Report generators <bcp14>MUST</bcp14> implement a rate-limit on outgoing reports
so as not to flood Report Consumers with excessive reports, which would
allow denial of service (see <xref target="dos-attacks" format="default" sectionFormat="of" derivedContent="Section 8.1"/>).</t>
    </section>
    <section anchor="other-reports" numbered="true" removeInRFC="false" toc="include" pn="section-3">
      <name slugifiedName="name-other-failure-reports">Other Failure Reports</name>
      <t indent="0" pn="section-3-1">This document only describes DMARC failure reports. DomainKeys Identified Mail (DKIM) failure
reports and Sender Policy Framework (SPF) failure reports are described in <xref target="RFC6591" format="default" sectionFormat="of" derivedContent="RFC6591"/>.  A Mail
Receiver that generates DMARC failure reports <bcp14>MAY</bcp14> choose to issue failure reports
of the type specific to the authentication mechanism that failed instead of, or in
addition to, the DMARC failure report type described here. The Receiver <bcp14>SHALL</bcp14> determine which
failure report types, if any, to transmit based on its own policy, the failure in question, and the content of the "fo" tag in the retrieved
DMARC Policy Record.</t>
      <t indent="0" pn="section-3-2">Note that DKIM failure reports and SPF failure reports can also be
requested using the methods described in <xref target="RFC6651" format="default" sectionFormat="of" derivedContent="RFC6651"/> and <xref target="RFC6652" format="default" sectionFormat="of" derivedContent="RFC6652"/>,
respectively.  Report generators are free to follow any of the
specifications.</t>
    </section>
    <section anchor="reporting-format-update" numbered="true" removeInRFC="false" toc="include" pn="section-4">
      <name slugifiedName="name-reporting-format-update">Reporting Format Update</name>
      <t indent="0" pn="section-4-1">Operators implementing this specification also implement an augmented
version of failure reporting described in <xref target="RFC6591" format="default" sectionFormat="of" derivedContent="RFC6591"/> as follows:</t>
      <ol spacing="normal" type="1" indent="adaptive" start="1" pn="section-4-2">
<li pn="section-4-2.1" derivedCounter="1.">
          <t indent="0" pn="section-4-2.1.1">A DMARC failure report includes the following Abuse Reporting Format (ARF) header fields,
with the indicated normative requirement levels:</t>
          <ul bare="false" empty="false" indent="3" spacing="normal" pn="section-4-2.1.2">
            <li pn="section-4-2.1.2.1">
              <t indent="0" pn="section-4-2.1.2.1.1">Identity-Alignment (<bcp14>REQUIRED</bcp14>; defined below)</t>
            </li>
            <li pn="section-4-2.1.2.2">
              <t indent="0" pn="section-4-2.1.2.2.1">Delivery-Result (<bcp14>OPTIONAL</bcp14>)</t>
            </li>
            <li pn="section-4-2.1.2.3">
              <t indent="0" pn="section-4-2.1.2.3.1">DKIM-Domain, DKIM-Identity, DKIM-Selector (<bcp14>REQUIRED</bcp14> for DKIM failures of an aligned identifier)</t>
            </li>
            <li pn="section-4-2.1.2.4">
              <t indent="0" pn="section-4-2.1.2.4.1">DKIM-Canonicalized-Header, DKIM-Canonicalized-Body (<bcp14>OPTIONAL</bcp14> if reporting a DKIM failure)</t>
            </li>
            <li pn="section-4-2.1.2.5">
              <t indent="0" pn="section-4-2.1.2.5.1">SPF-DNS (<bcp14>REQUIRED</bcp14> for SPF failure of an aligned identifier)</t>
            </li>
          </ul>
        </li>
        <li pn="section-4-2.2" derivedCounter="2.">
          <t indent="0" pn="section-4-2.2.1">The Identity-Alignment field is defined to contain a comma-
separated list of authentication mechanism names that failed to authenticate an
aligned identity or the keyword "none" if all of the attempted methods were successful at authenticating an aligned identity.  Here is the ABNF <xref target="RFC5234" format="default" sectionFormat="of" derivedContent="RFC5234"/> (importing comments and/or folding white space (CFWS) from <xref target="RFC5322" format="default" sectionFormat="of" derivedContent="RFC5322"/>):</t>
          <sourcecode type="abnf" markers="false" pn="section-4-2.2.2">
id-align     = "Identity-Alignment:" [CFWS]
                 ( "none" /
                   dmarc-method
                     *( [CFWS] "," [CFWS] dmarc-method ) )
                 [CFWS]

dmarc-method = ( "dkim" / "spf" )
                 ; each may appear at most once in an id-align</sourcecode>
        </li>
        <li pn="section-4-2.3" derivedCounter="3.">Authentication Failure Type "dmarc" is defined for the Auth-Failure
field, which is to be used when a failure report is generated because
some or all of the authentication mechanisms failed to produce aligned
identifiers.  Note that a failure report generator <bcp14>MAY</bcp14> also
independently produce an ARF message for any or all of the underlying
authentication methods.</li>
      </ol>
    </section>
    <section anchor="verifying-external-destinations" numbered="true" removeInRFC="false" toc="include" pn="section-5">
      <name slugifiedName="name-verifying-external-destinat">Verifying External Destinations</name>
      <t indent="0" pn="section-5-1">It is possible to specify destinations for failure reports that are
outside of the Organizational Domain of the DMARC Policy Record that
was requesting the reports.  These destinations are
commonly referred to as "external destinations" and may represent a
different domain controlled by the same organization, a contracted
report processing service, or some other arrangement.</t>
      <t indent="0" pn="section-5-2">In case of external destinations, a Mail Receiver who
generates failure reports <bcp14>MUST</bcp14> use the Verifying External Destinations
procedure described in <xref target="RFC9990" sectionFormat="of" section="4" format="default" derivedLink="https://rfc-editor.org/rfc/rfc9990#section-4" derivedContent="RFC9990"/>,
substituting the "ruf" tag where the "rua" tag appears in that procedure.</t>
      <t indent="0" pn="section-5-3">This prevents a bad actor from publishing a DMARC Policy Record
requesting failure reports to an external destination and
then deliberately sending messages that will generate failure reports
as a form of abuse. It also prevents a Domain Owner from unilaterally
publishing a DMARC Policy Record with an external destination for
failure reports, forcing the external destination to deal with unwanted
messages and potential privacy issues.</t>
      <section anchor="transport" numbered="true" removeInRFC="false" toc="include" pn="section-5.1">
        <name slugifiedName="name-transport">Transport</name>
        <t indent="0" pn="section-5.1-1">Email streams carrying DMARC failure reports <bcp14>SHOULD</bcp14> be DMARC-aligned.</t>
        <t indent="0" pn="section-5.1-2">We recommend that reporters set a reasonable rate-limit for the number
of failure reports sent
to any recipient to avoid overloading recipient systems.
Unaligned reports may in turn produce subsequent failure reports that could
cause mail loops.</t>
      </section>
    </section>
    <section anchor="iana-considerations" numbered="true" removeInRFC="false" toc="include" pn="section-6">
      <name slugifiedName="name-iana-considerations">IANA Considerations</name>
      <section anchor="feedback-report-header-fields-registry-update" numbered="true" removeInRFC="false" toc="include" pn="section-6.1">
        <name slugifiedName="name-feedback-report-header-fiel">Feedback Report Header Fields Registry Update</name>
        <t indent="0" pn="section-6.1-1">IANA has updated the reference and description for the "Identity-Alignment" entry in the
"Feedback Report Header Fields" registry within the
"Messaging Abuse Reporting Format (MARF) Parameters" registry group, as follows:</t>
        <dl spacing="compact" indent="3" newline="false" pn="section-6.1-2">
          <dt pn="section-6.1-2.1">Field Name:</dt>
          <dd pn="section-6.1-2.2">Identity-Alignment</dd>
          <dt pn="section-6.1-2.3">Description:</dt>
          <dd pn="section-6.1-2.4">a list of authentication mechanism names that failed to authenticate an aligned identity, or "none" if all were successful</dd>
          <dt pn="section-6.1-2.5">Multiple Appearances:</dt>
          <dd pn="section-6.1-2.6">No</dd>
          <dt pn="section-6.1-2.7">Related "Feedback-Type":</dt>
          <dd pn="section-6.1-2.8">auth-failure</dd>
          <dt pn="section-6.1-2.9">Reference:</dt>
          <dd pn="section-6.1-2.10">RFC 9991</dd>
          <dt pn="section-6.1-2.11">Status:</dt>
          <dd pn="section-6.1-2.12">current</dd>
        </dl>
      </section>
    </section>
    <section anchor="privacy-considerations" numbered="true" removeInRFC="false" toc="include" pn="section-7">
      <name slugifiedName="name-privacy-considerations">Privacy Considerations</name>
      <t indent="0" pn="section-7-1">The generation and transmission of DMARC failure reports raise
significant privacy concerns that must be carefully considered before
deployment.</t>
      <t indent="0" pn="section-7-2">Given these factors, many large-scale providers limit or entirely
disable the generation of failure reports, preferring to rely on
aggregate reports, which provide statistical visibility without
exposing sensitive content. Operators that choose to enable failure
reporting are strongly encouraged to:</t>
      <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-7-3">
        <li pn="section-7-3.1">Limit the scope and duration of use to targeted diagnostic activities;</li>
        <li pn="section-7-3.2">Ensure that reporting URIs are carefully controlled and validated;</li>
        <li pn="section-7-3.3">Apply minimization techniques, such as redaction of message bodies
and header fields, to reduce sensitive data exposure; </li>
        <li pn="section-7-3.4">Always transmit reports over secure channels.</li>
      </ul>
      <t indent="0" pn="section-7-4">In summary, while DMARC failure reports can offer diagnostic value, the
associated privacy concerns have led many operators to restrict their
use.  Aggregate reports remain the recommended mechanism for gaining
visibility into authentication results while preserving the
confidentiality of end-user communications.</t>
      <t indent="0" pn="section-7-5">Particular privacy-specific issues are explored below.</t>
      <section anchor="data-exposure-considerations" numbered="true" removeInRFC="false" toc="include" pn="section-7.1">
        <name slugifiedName="name-data-exposure-consideration">Data Exposure Considerations</name>
        <t indent="0" pn="section-7.1-1">Failure reports may include PII and non-public information (NPI) from
messages that fail to authenticate, since these reports may contain
message content as well as trace header fields. These reports may
expose sender and recipient identifiers (e.g., RFC5322.From addresses),
and although the <xref target="RFC5965" format="default" sectionFormat="of" derivedContent="RFC5965"/> format used for failed-message reporting
supports redaction <xref target="RFC6590" format="default" sectionFormat="of" derivedContent="RFC6590"/>, failed-message reporting is capable of
exposing the entire message to the Report Consumer.  They may also
expose PII, sensitive business data, or other confidential
communications to unintended recipients. Such exposure can create
regulatory, legal, and operational risks for both senders and
receivers.  Examples include product launches, termination notices for
employees, or calendar data. Even innocuous-seeming failures (such as
malformed or "broken" calendar invitations) can result in the leakage
of private communications.</t>
        <t indent="0" pn="section-7.1-2">Domain Owners requesting reports will receive information about mail
using their domain, but which they did not actually cause to be sent.
This might provide valuable insight into content used in abusive
messages, but it might also expose PII or NPI from legitimate messages
mistakenly or accidentally failing authentication.</t>
        <t indent="0" pn="section-7.1-3">Information about the final destination of mail, where it might
otherwise be obscured by intermediate systems, may be exposed through a
failure report. A commonly cited example is exposure of members of
mailing lists when one list member sends messages to the list, and
failure reports are generated when that message is delivered to other
list members. Those failure reports would be sent to the Domain Owner
of the list member posting the message or their delegated Report
Consumer(s).</t>
        <t indent="0" pn="section-7.1-4">Similarly, when message forwarding arrangements exist, Domain Owners
requesting reports may receive information about mail forwarded to
domains that were not originally part of their messages' recipient
list. This means that destinations previously unknown to the Domain
Owner may now become visible.</t>
      </section>
      <section anchor="report-recipients" numbered="true" removeInRFC="false" toc="include" pn="section-7.2">
        <name slugifiedName="name-report-recipients">Report Recipients</name>
        <t indent="0" pn="section-7.2-1">A DMARC Policy Record can specify that reports should be sent to a
Report Consumer operating on behalf of the Domain Owner. This might be
done when the Domain Owner sends reports to an entity to monitor mail
streams for deliverability, performance issues, or abuse. Receipt of
such data by third parties may or may not be permitted by the Mail
Receiver's privacy policy, terms of use, etc. Domain Owners and
Mail Receivers should both review and understand whether their own
internal policies constrain the use and transmission of DMARC
reporting.</t>
        <t indent="0" pn="section-7.2-2">Some potential exists for Report Consumers to perform traffic analysis,
making it possible to obtain metadata about the Mail Receiver's
traffic. In addition to verifying compliance with policies, Mail
Receivers need to consider that before sending reports to a third
party.  On the other hand, a Domain Owner may publish a destination
address that appears to be an Internal Report Consumer but is actually
a forwarding address; in this case, the final destination of a report
is not guaranteed.</t>
      </section>
      <section anchor="additional-damage" numbered="true" removeInRFC="false" toc="include" pn="section-7.3">
        <name slugifiedName="name-additional-damage">Additional Damage</name>
        <t indent="0" pn="section-7.3-1">The risks associated with failure reports are compounded by volume and
content distribution concerns. Partially or unredacted reports may
propagate large amounts of spam, phishing, or malware content, all of
which may require special handling by Report Consumers or other
recipients to avoid incidents. This underscores the need to avoid
misconfiguration of the destinations in the "ruf" reporting URIs and
the suggestions for redaction in this document, for example, using the
method described in <xref target="RFC6590" format="default" sectionFormat="of" derivedContent="RFC6590"/>. All of these concerns are
heightened for high-volume domains. To mitigate such concerns, the
following steps should be considered:</t>
        <t indent="0" pn="section-7.3-2">By report generators:</t>
        <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-7.3-3">
          <li pn="section-7.3-3.1">Help prevent accidental access to potentially malicious URIs by substituting hxxp for http;</li>
          <li pn="section-7.3-3.2">Remove attachments that could embed malicious payload.</li>
        </ul>
        <t indent="0" pn="section-7.3-4">By report consumers:</t>
        <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-7.3-5">
          <li pn="section-7.3-5.1">Isolate report streams from other mail streams;</li>
          <li pn="section-7.3-5.2">Use sandboxes in evaluating failure reports;</li>
          <li pn="section-7.3-5.3">Use network segmentation;</li>
          <li pn="section-7.3-5.4">Limit access to failure reports to authorized individuals with
appropriate security training.</li>
        </ul>
      </section>
    </section>
    <section anchor="security-considerations" numbered="true" removeInRFC="false" toc="include" pn="section-8">
      <name slugifiedName="name-security-considerations">Security Considerations</name>
      <t indent="0" pn="section-8-1">While reviewing this document and its security considerations, the
reader should also review the privacy considerations above, as well as
the privacy considerations and security considerations in Sections
<xref target="RFC9989" sectionFormat="bare" section="10" format="default" derivedLink="https://rfc-editor.org/rfc/rfc9989#section-10" derivedContent="RFC9989"/> and <xref target="RFC9989" sectionFormat="bare" section="11" format="default" derivedLink="https://rfc-editor.org/rfc/rfc9989#section-11" derivedContent="RFC9989"/> of
<xref target="RFC9989" format="default" sectionFormat="of" derivedContent="RFC9989"/> and in Sections
<xref target="RFC9990" sectionFormat="bare" section="7" format="default" derivedLink="https://rfc-editor.org/rfc/rfc9990#section-7" derivedContent="RFC9990"/> and
<xref target="RFC9990" sectionFormat="bare" section="8" format="default" derivedLink="https://rfc-editor.org/rfc/rfc9990#section-8" derivedContent="RFC9990"/> of
<xref target="RFC9990" format="default" sectionFormat="of" derivedContent="RFC9990"/>.</t>
      <section anchor="dos-attacks" numbered="true" removeInRFC="false" toc="include" pn="section-8.1">
        <name slugifiedName="name-denial-of-service">Denial of Service</name>
        <t indent="0" pn="section-8.1-1">Failure reports represent a possible denial-of-service attack that could be
perpetrated by an attacker who sends numerous messages purporting to
be from the intended victim Domain Owner but which fail both SPF and
DKIM; this would cause participating Mail Receivers to send failure
reports to the Domain Owner or its delegate(s), potentially in large
numbers.
Accordingly, participating Mail Receivers are encouraged to
aggregate these reports as much as is practical, using the Incidents
field of the ARF <xref target="RFC5965" format="default" sectionFormat="of" derivedContent="RFC5965"/>.
Indeed, the aim is not to count each and every failure but rather to
report different failure conditions.
Various pruning techniques are possible, including the following:</t>
        <ul bare="false" empty="false" indent="3" spacing="normal" pn="section-8.1-2">
          <li pn="section-8.1-2.1">
            <t indent="0" pn="section-8.1-2.1.1">Store reports for a period of time before sending them, allowing
detection, collection, and consolidation of like incidents;</t>
          </li>
          <li pn="section-8.1-2.2">
            <t indent="0" pn="section-8.1-2.2.1">Apply rate-limiting, such as a maximum number of reports per
minute that will be generated (and the remainder discarded).</t>
          </li>
        </ul>
      </section>
    </section>
  </middle>
  <back>
    <references pn="section-9">
      <name slugifiedName="name-references">References</name>
      <references pn="section-9.1">
        <name slugifiedName="name-normative-references">Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" quoteTitle="true" derivedAnchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t indent="0">In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC5234" target="https://www.rfc-editor.org/info/rfc5234" quoteTitle="true" derivedAnchor="RFC5234">
          <front>
            <title>Augmented BNF for Syntax Specifications: ABNF</title>
            <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker"/>
            <author fullname="P. Overell" initials="P." surname="Overell"/>
            <date month="January" year="2008"/>
            <abstract>
              <t indent="0">Internet technical specifications often need to define a formal syntax. Over the years, a modified version of Backus-Naur Form (BNF), called Augmented BNF (ABNF), has been popular among many Internet specifications. The current specification documents ABNF. It balances compactness and simplicity with reasonable representational power. The differences between standard BNF and ABNF involve naming rules, repetition, alternatives, order-independence, and value ranges. This specification also supplies additional rule definitions and encoding for a core lexical analyzer of the type common to several Internet specifications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="68"/>
          <seriesInfo name="RFC" value="5234"/>
          <seriesInfo name="DOI" value="10.17487/RFC5234"/>
        </reference>
        <reference anchor="RFC5322" target="https://www.rfc-editor.org/info/rfc5322" quoteTitle="true" derivedAnchor="RFC5322">
          <front>
            <title>Internet Message Format</title>
            <author fullname="P. Resnick" initials="P." role="editor" surname="Resnick"/>
            <date month="October" year="2008"/>
            <abstract>
              <t indent="0">This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of "electronic mail" messages. This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, "Standard for the Format of ARPA Internet Text Messages", updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5322"/>
          <seriesInfo name="DOI" value="10.17487/RFC5322"/>
        </reference>
        <reference anchor="RFC5965" target="https://www.rfc-editor.org/info/rfc5965" quoteTitle="true" derivedAnchor="RFC5965">
          <front>
            <title>An Extensible Format for Email Feedback Reports</title>
            <author fullname="Y. Shafranovich" initials="Y." surname="Shafranovich"/>
            <author fullname="J. Levine" initials="J." surname="Levine"/>
            <author fullname="M. Kucherawy" initials="M." surname="Kucherawy"/>
            <date month="August" year="2010"/>
            <abstract>
              <t indent="0">This document defines an extensible format and MIME type that may be used by mail operators to report feedback about received email to other parties. This format is intended as a machine-readable replacement for various existing report formats currently used in Internet email. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5965"/>
          <seriesInfo name="DOI" value="10.17487/RFC5965"/>
        </reference>
        <reference anchor="RFC6590" target="https://www.rfc-editor.org/info/rfc6590" quoteTitle="true" derivedAnchor="RFC6590">
          <front>
            <title>Redaction of Potentially Sensitive Data from Mail Abuse Reports</title>
            <author fullname="J. Falk" initials="J." role="editor" surname="Falk"/>
            <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy"/>
            <date month="April" year="2012"/>
            <abstract>
              <t indent="0">Email messages often contain information that might be considered private or sensitive, per either regulation or social norms. When such a message becomes the subject of a report intended to be shared with other entities, the report generator may wish to redact or elide the sensitive portions of the message. This memo suggests one method for doing so effectively. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6590"/>
          <seriesInfo name="DOI" value="10.17487/RFC6590"/>
        </reference>
        <reference anchor="RFC6591" target="https://www.rfc-editor.org/info/rfc6591" quoteTitle="true" derivedAnchor="RFC6591">
          <front>
            <title>Authentication Failure Reporting Using the Abuse Reporting Format</title>
            <author fullname="H. Fontana" initials="H." surname="Fontana"/>
            <date month="April" year="2012"/>
            <abstract>
              <t indent="0">This memo registers an extension report type for the Abuse Reporting Format (ARF), affecting multiple registries, for use in generating receipt-time reports about messages that fail one or more email message authentication checks. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6591"/>
          <seriesInfo name="DOI" value="10.17487/RFC6591"/>
        </reference>
        <reference anchor="RFC6692" target="https://www.rfc-editor.org/info/rfc6692" quoteTitle="true" derivedAnchor="RFC6692">
          <front>
            <title>Source Ports in Abuse Reporting Format (ARF) Reports</title>
            <author fullname="R. Clayton" initials="R." surname="Clayton"/>
            <author fullname="M. Kucherawy" initials="M." surname="Kucherawy"/>
            <date month="July" year="2012"/>
            <abstract>
              <t indent="0">This document defines an additional header field for use in Abuse Reporting Format (ARF) reports to permit the identification of the source port of the connection involved in an abuse incident.</t>
              <t indent="0">This document updates RFC 6591. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6692"/>
          <seriesInfo name="DOI" value="10.17487/RFC6692"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" quoteTitle="true" derivedAnchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t indent="0">RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9989" target="https://www.rfc-editor.org/info/rfc9989" quoteTitle="true" derivedAnchor="RFC9989">
          <front>
            <title>Domain-Based Message Authentication, Reporting, and Conformance (DMARC)</title>
            <author initials="T." surname="Herr" fullname="Todd Herr" role="editor">
              <organization showOnFrontPage="true">Valimail</organization>
            </author>
            <author initials="J." surname="Levine" fullname="John R. Levine" role="editor">
              <organization showOnFrontPage="true">Standcore LLC</organization>
            </author>
            <date month="May" year="2026"/>
          </front>
          <seriesInfo name="RFC" value="9989"/>
          <seriesInfo name="DOI" value="10.17487/RFC9989"/>
        </reference>
        <reference anchor="RFC9990" target="https://www.rfc-editor.org/info/rfc9990" quoteTitle="true" derivedAnchor="RFC9990">
          <front>
            <title>Domain-Based Message Authentication, Reporting, and Conformance (DMARC) Aggregate Reporting</title>
            <author initials="A." surname="Brotman" fullname="Alex Brotman" role="editor">
              <organization showOnFrontPage="true">Comcast, Inc.</organization>
            </author>
            <date month="May" year="2026"/>
          </front>
          <seriesInfo name="RFC" value="9990"/>
          <seriesInfo name="DOI" value="10.17487/RFC9990"/>
        </reference>
      </references>
      <references pn="section-9.2">
        <name slugifiedName="name-informative-references">Informative References</name>
        <reference anchor="RFC6651" target="https://www.rfc-editor.org/info/rfc6651" quoteTitle="true" derivedAnchor="RFC6651">
          <front>
            <title>Extensions to DomainKeys Identified Mail (DKIM) for Failure Reporting</title>
            <author fullname="M. Kucherawy" initials="M." surname="Kucherawy"/>
            <date month="June" year="2012"/>
            <abstract>
              <t indent="0">This document presents extensions to the DomainKeys Identified Mail (DKIM) specification to allow for detailed reporting of message authentication failures in an on-demand fashion. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6651"/>
          <seriesInfo name="DOI" value="10.17487/RFC6651"/>
        </reference>
        <reference anchor="RFC6652" target="https://www.rfc-editor.org/info/rfc6652" quoteTitle="true" derivedAnchor="RFC6652">
          <front>
            <title>Sender Policy Framework (SPF) Authentication Failure Reporting Using the Abuse Reporting Format</title>
            <author fullname="S. Kitterman" initials="S." surname="Kitterman"/>
            <date month="June" year="2012"/>
            <abstract>
              <t indent="0">This memo presents extensions to the Abuse Reporting Format (ARF) and Sender Policy Framework (SPF) specifications to allow for detailed reporting of message authentication failures in an on-demand fashion.</t>
              <t indent="0">This memo updates RFC 4408 by providing an IANA registry for SPF modifiers. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6652"/>
          <seriesInfo name="DOI" value="10.17487/RFC6652"/>
        </reference>
        <reference anchor="RFC7489" target="https://www.rfc-editor.org/info/rfc7489" quoteTitle="true" derivedAnchor="RFC7489">
          <front>
            <title>Domain-based Message Authentication, Reporting, and Conformance (DMARC)</title>
            <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy"/>
            <author fullname="E. Zwicky" initials="E." role="editor" surname="Zwicky"/>
            <date month="March" year="2015"/>
            <abstract>
              <t indent="0">Domain-based Message Authentication, Reporting, and Conformance (DMARC) is a scalable mechanism by which a mail-originating organization can express domain-level policies and preferences for message validation, disposition, and reporting, that a mail-receiving organization can use to improve mail handling.</t>
              <t indent="0">Originators of Internet Mail need to be able to associate reliable and authenticated domain identifiers with messages, communicate policies about messages that use those identifiers, and report about mail using those identifiers. These abilities have several benefits: Receivers can provide feedback to Domain Owners about the use of their domains; this feedback can provide valuable insight about the management of internal operations and the presence of external domain name abuse.</t>
              <t indent="0">DMARC does not produce or encourage elevated delivery privilege of authenticated email. DMARC is a mechanism for policy distribution that enables increasingly strict handling of messages that fail authentication checks, ranging from no action, through altered delivery, up to message rejection.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7489"/>
          <seriesInfo name="DOI" value="10.17487/RFC7489"/>
        </reference>
      </references>
    </references>
    <section anchor="report-format-example" numbered="true" removeInRFC="false" toc="include" pn="section-appendix.a">
      <name slugifiedName="name-example-failure-report">Example Failure Report</name>
      <t indent="0" pn="section-appendix.a-1">This is the full content of a sample failure message, including the message header.</t>
      <sourcecode type="message/rfc822" markers="false" pn="section-appendix.a-2">
Received: from gen.example (gen.example [192.0.2.1])
  (TLS: TLS1.3,256bits,ECDHE_RSA_AES_256_GCM_SHA384)
  by mail.consumer.example with ESMTPS
  id 00000000005DC0DD.0000442E; Tue, 19 Jul 2022 07:57:50 +0200
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple;
  d=gen.example; s=mail; t=1658210268;
  bh=rCrh1aFDE8d/Fltt8wbcu48bLOu4OM23QXqphUZPAIM=;
  h=From:To:Date:Subject:From;
  b=IND9JkuwF9/5841kzxMbPeej0VYimVzNKozR2R89M8eYO2zOlCBblx507Gz0YK7mE
   /h6pslWm0ODBVFzLlwY9CXv4Vu62QsN0RBIXHPjEXOkoM2VCD5zCd+5i5dtCFX7Mxh
   LThb2ZJ3efklbSB9RQRwxcmRvCPV7z6lt/Ds9sucVE1RDODYHjx+iWnAUQrlos6ZQb
   u/YOUGjf60LPpyljfPu3EpFwo80mSHyQlP/4S5KEykgPQMgCqLPPKvJwu1aAIDj+jG
   q2ylO3fmc/ERDeDWACtR67YNabEKBWtjqCRLNxKttazViJTZ5drcLfpX0853KoougX
   Rltp7zdoLdy4A==
From: DMARC Filter &lt;DMARC@gen.example&gt;;
To: dmarcfail@consumer.example
Date: Tue, 19 Jul 2022 00:57:48 -0500 (CDT)
Subject: FW: This is the original subject
Mime-Version: 1.0
Content-Type: multipart/report; report-type=feedback-report;
  boundary="=_mime_boundary_"
Message-Id: &lt;20220719055748.4AE9D403CC@gen.example&gt;;

This is a MIME-formatted message.  If you see this text it means that
your E-mail software does not support MIME-formatted messages.

--=_mime_boundary_
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

This is an authentication failure report for an email message
received from IP 192.0.2.2 on Tue, 19 Jul 2022 00:57:48 -0500.

--=_mime_boundary_
Content-Type: message/feedback-report
Content-Transfer-Encoding: 7bit

Feedback-Type: auth-failure
Version: 1
User-Agent: DMARC-Filter/1.2.3
Auth-Failure: dmarc
Authentication-Results: gen.example;
  dmarc=fail header.from=consumer.example
Identity-Alignment: dkim
DKIM-Domain: consumer.example
DKIM-Identity: @consumer.example
DKIM-Selector: epsilon
Original-Envelope-Id: 65E1A3F0A0
Original-Mail-From: author=gen.example@forwarder.example
Source-IP: 192.0.2.2
Source-Port: 12345
Reported-Domain: consumer.example

--=_mime_boundary_
Content-Type: message/rfc822; charset=utf-8
Content-Transfer-Encoding: 7bit

Authentication-Results: gen.example;
  dkim=permerror header.d=forwarder.example header.b="EjCbN/c3";
  dkim=temperror header.d=forwarder.example header.b="mQ8GEWPc";
  dkim=permerror header.d=consumer.example header.b="hETrymCb";
  dkim=neutral header.d=consumer.example header.b="C2nsAp3A";
Received: from mail.forwarder.example
  (mail.forwarder.example [IPv6:2001:db8::23ac])
  by mail.gen.example (Postfix) with ESMTP id 5E8B0C159826
  for &lt;x@gen.example&gt;; Sun, 14 Aug 2022 07:58:29 -0700 (PDT)
Received: from mail.forwarder.example (localhost [127.0.0.1])
  by mail.forwarder.example (Postfix) with ESMTP id 4Ln7Qw4fnvz6Bq
  for &lt;x@gen.example&gt;; Tue, 19 Jul 2022 07:57:44 +0200
DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed;
  d=forwarder.example; s=ed25519-59hs; t=1658210264;
  x=1663210264; bh=KYH/g7ForvDbnyyDLYSjauMYMW6sEIqu75/9w3OIONg=;
  h=Message-ID:Date:List-Id:List-Archive:List-Post:List-Help:
   List-Subscribe:List-Unsubscribe:List-Owner:MIME-Version:Subject:
   To:References:From:In-Reply-To:Content-Type:
   Content-Transfer-Encoding:autocrypt:cc:content-transfer-encoding:
   content-type:date:from:in-reply-to:message-id:mime-version:
   openpgp:references:subject:to;
  b=EjCbN/c3bTU4QkZH/zwTbYxBDp0k8kpmWSXh5h1M7T8J4vtRo+hvafJazT3ZRgq+7
   +4dzEQwUhl+NOJYXXNUAA==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
  d=forwarder.example; s=rsa-wgJg; t=1658210264; x=1663210264;
  bh=KYH/g7ForvDbnyyDLYSjauMYMW6sEIqu75/9w3OIONg=;
  h=Message-ID:Date:List-Id:List-Archive:List-Post:List-Help:
   List-Subscribe:List-Unsubscribe:List-Owner:MIME-Version:Subject:
   To:References:From:In-Reply-To:Content-Type:
   Content-Transfer-Encoding:autocrypt:cc:content-transfer-encoding:
   content-type:date:from:in-reply-to:message-id:mime-version:
   openpgp:references:subject:to;
  b=mQ8GEWPcVpBpeqQ88pcbXpGHBT0J/Rwi8Zd2WZTXWWneQGRCOJLRcbBJpjqnrwtqd
   76IqawH86tihz4Z/12J1GBCdNx1gfazsoI3yaqfooRDYg0mSyZHrYhQBmodnPcqZj4
   /25L5278sc/UNrYO9az2n7R/skbVZ0bvSo2eEiGU8fcpO8+a5SKNYskhaviAI4eGIB
   iRMdEP7gP8dESdnZguNbY5HI32UMDpPPNqajzd/BgcqbveYpRrWCDOhcY47POV7GHM
   i/KLHiZXtJsL3/Pr/4TL+HTjdX8EDSsy1K5/JCvJCFsJHnSvkEaJQGLn/2m03eW9r8
   9w1bQ90aY+VCQ==
X-Original-To: users@forwarder.example
Received: from mail.consumer.example
  (mail.consumer.example [192.0.2.4])
  (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
   key-exchange ECDHE (P-256) server-signature ECDSA (P-384)
   server-digest SHA384)
  (Client did not present a certificate)
  by mail.forwarder.example (Postfix) with ESMTPS id 4Ln7Qs55xmz4nP
  for &lt;users@forwarder.example&gt;;
  Tue, 19 Jul 2022 07:57:41 +0200 (CEST)
Authentication-Results: mail.forwarder.example;
  arc=none smtp.remote-ip=192.0.2.4
Authentication-Results: mail.forwarder.example;
  dkim=pass (512-bit key; secure) header.d=consumer.example
   header.i=@consumer.example header.a=ed25519-sha256
   header.s=epsilon header.b=hETrymCb;
  dkim=pass (1152-bit key; secure) header.d=consumer.example
   header.i=@consumer.example header.a=rsa-sha256
   header.s=delta header.b=C2nsAp3A
DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed;
  d=consumer.example; s=epsilon; t=1658210255;
  bh=KYH/g7ForvDbnyyDLYSjauMYMW6sEIqu75/9w3OIONg=;
  h=Date:Subject:To:References:From:In-Reply-To;
  b=hETrymCbz6T1Dyo5dCG9dk8rPykKLdhJCPFeJ9TiiP/kaoN2afpUYtj+SrI+I83lp
   p1F/FfYSGy7zz3Q3OdxBA==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
  d=consumer.example; s=delta; t=1658210255;
  bh=KYH/g7ForvDbnyyDLYSjauMYMW6sEIqu75/9w3OIONg=;
  h=Date:To:References:From:In-Reply-To;
  b=C2nsAp3AMNX33Nq7nN/StPo921xE3XGF8Ju3iAKdYB3EKhsril0N5IjWGlglJECst
   jLNKSo7KWZZ2lkH/dVZ9Rs1GHT2uaKy1sc/xmNIC5rHdhrxammiwpTSo4PsT8disfc
   3DVF6Q62n0EsdLFqcw1KY8A9inFqYKY2tqoo+y4zMtItqCYx3xjsj3I0IFLuX
Author: Message Author &lt;author@consumer.example&gt;
Received: from [192.0.2.8] (host-8-2-0-192.isp.example [192.0.2.8])
  (AUTH: CRAM-MD5 uXDGrn@SYT0/k, TLS: TLS1.3,128bits,
  ECDHE_RSA_AES_128_GCM_SHA256)
  by mail.consumer.example with ESMTPSA
  id 00000000005DC076.00004417; Tue, 19 Jul 2022 07:57:35 +0200
Message-ID: &lt;2431dc66-b010-c9cc-4f2b-a1f889f8bdb4@consumer.example&gt;
Date: Tue, 19 Jul 2022 07:57:33 +0200
List-Id: &lt;users.forwarder.example&gt;
List-Post: &lt;mailto:users@forwarder.example&gt;
List-Help: &lt;mailto:users+help@forwarder.example&gt;
List-Subscribe: &lt;mailto:users+subscribe@forwarder.example&gt;
List-Unsubscribe: &lt;mailto:users+unsubscribe@forwarder.example&gt;
List-Owner: &lt;mailto:users+owner@forwarder.example&gt;
Precedence: list
MIME-Version: 1.0
Subject: This is the original subject
Content-Language: en-US
To: users@forwarder.example
Authentication-Results: consumer.example; auth=pass (details omitted)
From: Message Author &lt;author@consumer.example&gt;
In-Reply-To: &lt;20220718102753.0f6d9dde.cel@example.com&gt;
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

[ Message body was here ]
--=_mime_boundary_--</sourcecode>
      <t indent="0" pn="section-appendix.a-3">The Source-Port field definition is given by <xref target="RFC6692" format="default" sectionFormat="of" derivedContent="RFC6692"/>.</t>
      <t indent="0" pn="section-appendix.a-4">In the final MIME entity, the local-parts of To and From addresses are
reported unredacted.  Since we know that the local parts are PII, we
can reduce the privacy risk by redacting them.  In the example, the
report generator could have replaced "users" with "lRLxexey" and
"author" with "RT47aVey" throughout the entity.</t>
      <t indent="0" pn="section-appendix.a-5">If the body of the message is not included, the last MIME entity
would have "Content-Type: text/rfc822-headers" instead of "message/rfc822".</t>
    </section>
    <section anchor="authors-addresses" numbered="false" removeInRFC="false" toc="include" pn="section-appendix.b">
      <name slugifiedName="name-authors-addresses">Authors' Addresses</name>
      <author initials="S." surname="Jones" fullname="Steven M. Jones" role="editor">
        <organization showOnFrontPage="true">DMARC.org</organization>
        <address>
          <email>smj@dmarc.org</email>
        </address>
      </author>
      <author initials="A." surname="Vesely" fullname="Alessandro Vesely" role="editor">
        <organization showOnFrontPage="true">Tana</organization>
        <address>
          <email>vesely@tana.it</email>
        </address>
      </author>
    </section>
  </back>
</rfc>
