This tool provides a simple message parsing service that is able to recognize and provide useful information for many types of email reports including ARF – used for abuse and FBL reporting – NDR and DSN messages produced by mail systems to signal status of mail transmission.
The request could not be processed
There was an error with your request. Make sure you provide a complete email message.
Basic Message Information
The following data elements have been extracted from the supplied message itself. Some types of messages carry payloads that are analyzed separately.
ARF-specific Payload
The provided message was successfully parsed as an ARF report.
ARF repoorts transport payloads that have been individually analyzed. Attributes for any such payload should appear below.
ARF Evidence Analysis
ARF reports associated with email must include a copy of the message that originated the report as processed by the receiver.
The following information was obtained from the analysis of the enclosed email evidence.
Message Forwarding Payload
The provided message was parsed as a multipart MIME message transporting one
or more message/rfc822
or text/rfc822-headers
part. This is a generic
mechanism to send verbatim messages for various applications. Notably,
Microsoft Feedback Loop scheme delivers complaint messages using this
scheme.
Each individual part was analyzed and any relevant data should appear below.
Forwarded Message / Headers Payload Analysis
The following are attributes gathered from an enclosedmessage/rfc822
or
text/rfc822-headers
part from the original report.
DSN Payload
The provided message was parsed as an RFC-3464 Delivery Status Notification.
Recovered information from the DSN should appear below.
DSN Per-Recipient Payload
Attributes associated to the named recipient in the message that triggered the DSN report.A note about privacy
Messages pasted into this tool are retained only while being analyzed. No data about processed messages other than size are preserved in our logs.
RFC-2919 List-ID Header
The List-ID Header
is described in
RFC-2919 § 2
and provides an indentifier for the mailing list that sent a given message.
This identifier is expected to take the form of a fully-qualified domain name.
RFC-2369 List-Unsubscribe Header
The List-Unsubscribe Header
is described in
RFC-2369 § 3.2
and provides a list of URLs that allow a list subscriber to unsubscribe from
the mailing list.
The mailto:
and https:
URL schemes are the preferred mechanisms for
unsubscription. There are good arguments for both.
Many ISPs will try and use these URLs when servicing a spam complaint by their user, by attempting to activate the given URLs to terminate the list subscription.
RFC-8058 List-Unsubscribe-Post
List-Unsubscribe-Post
is described in
RFC-8058 and is a companion to the
List-Unsubscribe
header. It allows for the implementation of
machine-actionable one-click unsubscribes on behalf of receiving users
that submit complaints, or as a direct action of a MUA.
Discouraged Errors-To
Errors-To
is identified as Non-standard, discouraged in
RFC-2076 § 3.5.
That said, many senders still use this header in an attempt to cause message bounces to be delivered to the addresses is provides. There are still receive-end tools that interpret this header.
RFC-5322 Resent-Cc Header
Resent-Cc Header
is one of the Resent Fields described in
RFC-5322 § 3.6.6
and intended to preserve its homonimous header when a message is
reintroduced to the transport system.
RFC-5322 Resent-Date Header
Resent-Date Header
is one of the Resent Fields described in
RFC-5322 § 3.6.6
and intended to preserve its homonimous header when a message is
reintroduced to the transport system.
RFC-5322 Resent-From Header
Resent-From Header
is one of the Resent Fields described in
RFC-5322 § 3.6.6
and intended to preserve its homonimous header when a message is
reintroduced to the transport system.
RFC-5322 Resent-Message-ID Header
Resent-Message-ID Header
is one of the Resent Fields described in
RFC-5322 § 3.6.6
and intended to preserve its homonimous header when a message is
reintroduced to the transport system.
RFC-5322 Resent-Sender Header
Resent-Sender Header
is one of the Resent Fields described in
RFC-5322 § 3.6.6
and intended to preserve its homonimous header when a message is
reintroduced to the transport system.
RFC-5322 Resent-To Header
Resent-To Header
is one of the Resent Fields described in
RFC-5322 § 3.6.6
and intended to preserve its homonimous header when a message is
reintroduced to the transport system.
RFC-5322 Sender Header
Sender Header
is described in
RFC-5322 and contains the single address
that actually submitted the message.
RFC-5322 Cc Header
Cc Header
is described in RFC-5322
and identifies a list of secondary recipients for the message.
RFC-5322 From Header
The RFC-5432 § 3.6.2
From
header indicates the sender of a message.
With the use of email policy frameworks such as
DMARC, RFC-7489, the From
header becomes very important.
Messages passing through mailing lists and redirectors may see their
From
headers rewritten in order to mitigate the effects of such email
policies.
RFC-5322 To Header
The RFC-5322 § 3.6.3
To
header lists the recipients of an email message.
Due to forwarding and blind-carbon-copying, the contents of the To
header might not match the actual mailbox where the message was delivered
to.
RFC-5322 Date Header
The RFC-5322 Date
header indicates the exact date in which a message was sent. Ideally, this
header is set by the sender itself, although most mail servers append a
Date
to messages that do not carry one.
Times reported by this tool are automatically converted to UTC and are presented in the RFC-3339 – equivalent to ISO-8601 – format. There is no guarantee that these times are precise not all operators ensure that their clocks remain synchronized.
RFC-5322 Subject Header
The RFC-5322 Subject
header for an email message. This is an informational field typically added
by the sender, to provide the recipient with an indication of contents.
It is common to see mail systems that alter the subject by adding tags to express additional information about a message to its intended recipient.
Tags such as [SPAM]
or (External)
are frequent examples of this.
RFC-5322 Message-ID Header
The RFC-5322
Message-ID
header is a unique identifier for an email message. Typically
this identifier will be generated very early in the messge’s lifetime,
preserved across its delivery process.
Mail servers are required to generate locally-unique identifiers for each message, which can usually upgraded to globally-unique by appending the mail server host name or similar technique.
Many email systems actually expect the Message-ID
to be a trully unique
global identifier.
Despite appearances, Message-ID
contents are not email addresses.
RFC-5322 Return-Path Header or Envelope Sender
The RFC-5322
Return-Path
header is a trace field that captures the reverse
path – in practice, a sender address – for the message.
It is very common for applications requiring per-message tracking to use special addresses providing additional information whenever a bounce message is delivered to this reverse path. BATV and VERP are the two most common techniques that employ this mechanism.
There are many variations of these techniques, where the sender adds various tags to an email address, to distinguish each individual message.
Sender IP Address
IP Address that sent the SMTP message. In abuse complaints, it is often useful to provide the IP address where the offending traffic originated. Some message formats lack a proper header or control field to pass back this informat
Our software implements a number of heuristics to extract this information as provided by the sender of the report or from the evidence that accomapnies it.
RFC-5322 Reply-To Header
The RFC-5322 Reply-To
header is an originator field used to signal the recipient where to send
replies to the message.
Automated- and bulk-senders often use this field to redirect replies to their emails to specific mailboxes. Usage by actual persons sending email is less frequent.
Original Content
An actual email message, headers or fragments that were included in the original message. Abuse complaints will typically include all or part of the offending message, to assist recipients of the report in identifying the source of problem.
In some cases, the included messages are edited to remove personally identifiable data and other tracking identifiers. This is typically done to comply with local policies or regulations regarding protection of personal information.
User-Agent
User-Agent
header described in
RFC-5965 is used to
convey information about the software program and version used to compose an
ARF report.
Version
Version
is described in RFC-5965 § 3.1
as the actual version of the specification for the ARF report. This is
useful as the specification evolve, to allow parsers to better interpret the
machine-readable portion of the report.
Although this field is mandatory, we have found many examples of reports sent by large scale operators that either omit the field altogether or include bogus values. In the interest of usefulness, we have modified our tools to cons this field as optional.
Auth-Failure
Auth-Failure
header is described in
RFC-6591 to describe the
type of authentication encountered by the remote system.
Human Readable Report
As specified in RFC-5965 and RFC-3464, ARF reports and DSNs must contain a human-readable descriptions. The content of this section is presented in its original format.
Due to variability of the activity leading to an ARF reports and DSNs, as well as the idiosincracies of each sender, there is no single, practical specification for this section. It should be expected to contain text that may be useful human analyst reviewing the case.
RFC-2045 Content-Type Header
Useful ARF reports include supporting evidence meant to assist the source to
apply relevant mitigation. The Content-Type
header as described in
RFC-2045 is used for this
purpose.
Common values are message/rfc822
and text/rfc822-headers
depending on
whether full email messages or just its headers are being transmitted.
RFC-5695 Content
Useful ARF reports include supporting evidence meant to assist the source to apply relevant mitigation. If included, the content provided as evidence in the ARF report is presented in its original form. This is introduced in RFC-5965.
Note that in many cases, the author of the ARF report might want to obfuscate or remove specific identifying information. There are many reasons for this, including restrictions on personal information handling and specific pri directives.
Abuse-Type
Abuse-Type
header lacks a normative reference. It has been observed in
reports produced either by Return Path – the fine company, not the header –
or its software libraries. Seems to overlap considerably with
Feedback-Type
field, so this might be legacy code.
Arrival-Date
The Arrival-Date
header indicates the date and time at which the message
was received by the report sender.
For ARF reports, it is defined in RFC-5965.
For DSN reports, the applicable definition is in RFC-4364 § 2.2.5.
Delivery-Result
The Delivery-Result
header is described in
RFC-6591 and is used to
convey the final message disposition at the entity that generated the ARF
report.
This field is specific to ARF reports used to convey email authentication failures.
DKIM-ADSP-DNS
DKIM-ADSP-DNS
header is introduced in
RFC-6591 of ARF AUth
Failure Reports. It includes the ADSP policy that was used to obtain the
verifier’s ADSP result.
DKIM-Canonicalized-Body
The DKIM-Canonicalized-Body
header is defined in
RFC-6591 and contains
the canonicalized body of the message as generated by the verifier, encoded
in Base64.
By transmitting a representation of the message body as seen by the verifier, various classes of encoding issues breaking message signature verification can be identified and remedied.
DKIM-Canonicalized-Header
The DKIM-Canonicalized-Header
header is defined in
RFC-6591 and contains
the canonicalized header of the message as generated by the verifier,
encoded in Base64.
By transmitting a representation of the headers as seen by the verifier, various classes of encoding issues breaking message signature verification can be identified and remedied.
DKIM-Domain
DKIM-Domain
header is defined in
RFC-6591. It contains
the domain that signed the reported message, as extracted from the d=
equate in DKIM-Signature
.
DKIM-Identity
DKIM-Identity
header s defined in
RFC-6591 and contains
the signature identity causing a failure – taken from the i=
equate of
DKIM-Signature
.
DKIM-Selector
DKIM-Selector
header is defined in
RFC-6591 and contains
the signature selector causing a failure – taken from the s=
equate of
DKIM-Signature
.
DKIM-Selector-DNS
DKIM-Selector-DNS
header is mentioned in passing on
RFC-6591 and contains the
retrieved DKIM key record used by the verifier.
Identity-Alignment
The Identity-Alignment
header is defined in
RFC-7489 and contains a
comma-separated list of authentication mechanisms that produced an aligned
identity.
The keyword none
indicates that no mechanism produced an aligned identity.
This is likely caused by mismatches betweeen the sender addresses and the
authentication mechanisms being used for message transmission.
Incidents
Incidents
header is defined in
RFC-5965. When present,
contains the number of incidents represented by this report. When absent, an
incident count of 1 mus assumed.
RFC-5965 Original-Mail-From Header
Original-Mail-From
header is defined in
RFC-5965. When present,
contains the MAIL FROM
portion of the original SMTP transaction – also
called enve sender.
RFC-5965 Original-Rcpt-TO Header
Original-Rcpt-TO
header is defined in
RFC-5965. When present,
this header shows the email addresses usen in the RCPT TO
part of the SMTP
transaction to deliver the original message.
RFC-5965 Received-Date Header
Received-Date
header is mentioned in
RFC-5965 as historic.
Meant to be interpreted in the same way as Arrival-Date
.
Redacted-Address
Redacted-Address
header was introduced by Yahoo! Mail FBL – now
Verizon Media. There are no normative references. Observed usage suggests
that this contains strings used as substitution of the original user email
addre in spam complaints sent as part of the FBL data.
RFC-5965 Reported-Domain Header
The Reported-Domain
header is defined in
RFC-5965. When present,
this header lists domain names that the report originator reasonable
believes to be related to report.
The mechanism used to assert the relationship between domains and incidents is unspecified. It should generaly be interpreted as a suggestion.
RFC-5965 Reported-URI Header
The Reported-URI
header is defined in
RFC-5965. It is used to
indicate one or more URIs that the report sender believe to be related to
the report.
The mechanism to establish relationship between URIs and reports is undefined. In general, this should be used as a suggestion by the report sender.
RFC-5965 Source-IP Header
Source-IP
header is defined in
RFC-5965. When present,
contains the IPv4 or IPv6 address of the MTA that submitted the reported
message.
RFC-6692 Source-Port Header
The Source-Port
header is defined in
RFC-6692 and is used to
provide the source port of the TCP connection from which the reported email
message originated.
This field is an extension of the Source-IP
header.
RFC-6591 SPF-DNS Header
SPF-DNS
header is defined in
[RFC-6591](https://tools.ietf.org/html/rfc6591#section-3.2.6 and depicts the
DNS RRTYPE
used and the content of the record retrieved by the
validator.
Return Path Source Field
Source
is a Return Path extension. It identifies the entity that is
submitting an ARF report, using software or servides from Return Path – the
fine company.
Return Path Subscription-Link Field
Subscription-Link
ia a Return Path extensiont that contains the URL to the
service dashboard that their customer – the report originator – can use to
manage their subscription.
RFC-3464 Action Header
The Action
header is defined in
RFC-3464 and indicates
the action performed by the report originator.
The values are quite self-explanatory, with delayed
and
failed
being the most prevalent, meaning a message being held in
queue while attempting delivery of permanently failed, respectively.
RFC-3464 Diagnostic Code Header
Diagnostic-Code
header is defined in
RFC-3464 and provides
the actual diagnostic code emited by the mail transport.
RFC-3464 Final Log ID Header
Final-Log-ID
header is defined in
RFC-3464 and provides
the log Id from the final MTA handling the reported message.
RFC-3464 Final Recipient Header
Final-Recipient
header is defined in
RFC-3464 § 2.3.2
and indicates the particular recipient for which the accompanying fields
apply.
RFC-3464 Last Attempt Date Header
The Last-Attempt-Date
header is defined in
RFC-3464 § 2.3.7
and provides the time and date of the last attempt to deliver a message,
regardless of success.
Times reported by this tool are automatically converted to UTC and are presented in the RFC-3339 – equivalent to ISO-8601 – format. There is no guarantee that these times are precise not all operators ensure that their clocks remain synchronized.
RFC-3464 Original Recipient Header
Original-Recipient
header is defined in
RFC-3464 and provides
the original recipient address as specified by the sender of the message
being reported.
RFC-3464 Remote MTA Header
Remote-MTA
header is defined in
RFC-3464 and provides a
printable representation of the name of the remote MTA from the
perspective of the reporting MTA.
RFC-3456 Status Header
The Status
header is defined in
RFC-3464 § 2.3.4
and contains the numeric SMTP status code associated with delivery of the
reported message to this specific recipient.
The specific status codes are defined in RFC-3463, following a hierarchical structure.
RFC-3464 Will Retry Until Header
Will-Retry-Until
header is defined in
RFC-3464 and provides
the time and date on which the reporting MTA plans to give up on its
attempts to deliver the reported message.
RFC-3464 DSN-Gateway Header
The DSN-Gateway
header is defined in
RFC-3464 and provides
the name of a gateway or MTA that performed translation of a non-Internet
delivery status notification to produce the current DSN.
This field is seldom observed in traditional operations, as the bulk of email transmission nowadays happen via SMTP, using fully Internet-connected MTAs.
RFC-3464 Original Message
RFC-3464 Original Content Type
DSN reports described in
RFC-3464 include the
original message to be returned to the sender – or a portion. This field
shows the Content-Type
header as described in
RFC-2045 used for purpose.
Common values are message/rfc822
and text/rfc822-headers
depending on
whether full email messages or just its headers are being transmitted.
Received From MTA
Received-From-MTA
header is defined in
RFC-3464 and indicates
the name of the MTA that handed the message to the reporting entity.
X-Actual-Recipient Sendmail extension
The optional per-recipient field X-Actual-Recipient
reveals the actual
account or mail drop to which an email address maps to.
This field provides insight on aliasing or forwarding that may be at play at the receiving site.