I-D Action:draft-cain-post-inch-phishingextns-06.txt

Internet-Drafts@ietf.org Thu, 02 July 2009 04:45 UTC

Return-Path: <root@core3.amsl.com>
X-Original-To: i-d-announce@ietf.org
Delivered-To: i-d-announce@core3.amsl.com
Received: by core3.amsl.com (Postfix, from userid 0) id 7AE873A6CAB; Wed, 1 Jul 2009 21:45:01 -0700 (PDT)
From: Internet-Drafts@ietf.org
To: i-d-announce@ietf.org
Subject: I-D Action:draft-cain-post-inch-phishingextns-06.txt
Content-Type: Multipart/Mixed; Boundary="NextPart"
Mime-Version: 1.0
Message-Id: <20090702044501.7AE873A6CAB@core3.amsl.com>
Date: Wed, 01 Jul 2009 21:45:01 -0700
X-BeenThere: i-d-announce@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: internet-drafts@ietf.org
List-Id: Internet Draft Announcements only <i-d-announce.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/i-d-announce>, <mailto:i-d-announce-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/i-d-announce>
List-Post: <mailto:i-d-announce@ietf.org>
List-Help: <mailto:i-d-announce-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i-d-announce>, <mailto:i-d-announce-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 02 Jul 2009 04:45:01 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.

	Title           : Extensions to the IODEF-Document Class for Reporting Phishing, Fraud, and Other Crimeware
	Author(s)       : P. Cain, D. Jevans
	Filename        : draft-cain-post-inch-phishingextns-06.txt
	Pages           : 58
	Date            : 2009-07-01

This document extends the Incident Object Description Exchange Format
(IODEF) defined in RFC5070 to support the reporting of phishing,
fraud, other types of electronic crime.  The extensions also support
the exchange on information about widespread spam incidents.  These
extensions are flexible enough to support information gleaned from
activities throughout the entire electronic fraud or spam cycle.
Both simple reporting and complete forensic reporting are possible,
as is consolidating multiple incidents .

The extensions defined in this document are used to generate two
different types of reports: a fraud report and a wide-spread spam
report.  Although similar in structure, each report has different
required objects and intentions.RFC 2129 Keywords

The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 [RFC2119].

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-cain-post-inch-phishingextns-06.txt

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.
ftp://ftp.ietf.org/internet-drafts/draft-cain-post-inch-phishingextns-06.txt"><ftp://ftp.ietf.org/internet-drafts/draft-cain-post-inch-phishingextns-06.txt>