> -----Original Message-----
> From: [email protected] [mailto:[email protected]] On Behalf Of Scott 
> Kitterman
> Sent: Friday, February 03, 2012 2:05 PM
> To: [email protected]
> Subject: Re: [marf] I-D Action: draft-ietf-marf-dkim-reporting-08, was -07
> 
> On Friday, February 03, 2012 01:58:11 PM Murray S. Kucherawy wrote:
> >    The mechanisms described in this memo are primarily intended for use
> >    in generating reports to aid implementers of [DKIM] and [ADSP] and
> >    other related protocols in development and debugging.  They are not
> >    intended for prolonged forensic use.  However, such uses are possible
> >    by ADMDs that want to keep a close watch for fraud or infrastructure
> >    problems.
> 
> I probably missed a discussion about this sometime, but why isn't this
> intended for prolonged forensic use?  The applications of ARF I've seen
> that's exactly what they are for.

The difference to me is that conventional ARF (e.g., spam reports) are almost 
always provoked by some human action, like clicking a Report Spam button in a 
mail reader.  These, by contrast, will almost always be automatically 
generated.  Perhaps we should say that, rather than what's there now.

I think the current language is also drawn from implementation experience.  
It's akin, I suppose, to running a binary in production that has full debugging 
symbols included to enable detailed debugging versus a stripped binary that is 
leaner but harder to debug.  Indeed, running a report generator with all of 
this turned on can obviously cause drag on a mail system when large and/or 
constant volumes of these reports are being sent in addition to regular mail.

So how about this to replace the above paragraph:

ARF reports have historically been generated individually as a result of some 
kind of human request, such as someone clicking a "Report Abuse" button in a 
mail reader.  In contrast, the mechanisms described in this memo are focused 
around automated reporting.  This obviously implies the potential for much 
larger volumes or frequency of messages, and thus greater mail system load 
(both for report generators and report receivers).
        
These mechanisms are primarily intended for use in generating reports to aid 
implementers of [DKIM] and [ADSP] and other related protocols in development 
and debugging.  They are not intended for prolonged forensic use, specifically 
because of these load concerns.  However, extended use is possible by ADMDs 
that want to keep a close watch for fraud or infrastructure problems.  It is 
important to consider the impact of doing so on both report generators and the 
requesting ADMDs.

_______________________________________________
marf mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/marf

Reply via email to