<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
  <!ENTITY EOverbar "&#275;">]>   <!-- from original, but 275 = x0113
                                    = e-macron, not overbar -->

  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- JcK: From -04a, converted to RFCXMLv3 and processed manually
     thereafter  -->
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<!-- -04a: Converted from Ned's -03 20221103
     -04b: Started 20221107: first round of changes, posting version

-->

<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902"
	  docName="draft-freed-smtp-limits-04"
	 category="std" obsoletes="" updates="" submissionType="IETF"
	 xml:lang="en" sortRefs="true" symRefs="true" version="3"
	 consensus="true">
  <!-- xml2rfc v2v3 conversion 3.15.2 -->
  <front>
    <title abbrev="LIMITS Extension">The LIMITS SMTP Service Extension</title>
    <seriesInfo name="Internet-Draft" value="draft-freed-smtp-limits-04"/>
    <author initials="N." surname="Freed" fullname="Ned Freed">
      <organization> (deceased) </organization>
      <address/>
	</author>
	    <author initials="J." surname="Klensin" fullname="John C. Klensin">
      <organization/>
      <address>
        <postal>
          <street>1770 Massachusetts Ave, Suite 322</street>
          <city>Cambridge</city>
          <region>MA</region>
          <code>02140</code>
          <country>USA</country>
        </postal>
        <email>john-ietf@jck.com</email>
      </address>
		</author>
		<!--
		<author initials="A." surname="Melnikov"
		   fullname="Alexey Melnikov">
		<organization>ISODE</organization>
		<address>
		<email>alexey.melnikov@isode.com</email>
		</address>
		</author>   -->
		
		<date year="2022" month="November" day="8"/>
    <area>ART</area>

	<keyword>Internet-Draft</keyword>
    <keyword>SMTP</keyword>
	<keyword>ESMTP</keyword>
	<keyword>Extension</keyword>

	<abstract>
      <t>This document defines a "Limits" extension for the Simple Mail
Transfer Protocol (SMTP), including submission, as well as the
Local Mail Transfer Protocol (LMTP). It also defines an associated
limit registry. This extension provides the means for an SMTP, submission,
or LMTP server to inform the client of limits the server intends to apply
to the protocol during the current session. The client is then able to adapt
its behavior in order to conform to those limits.</t>
	</abstract>

	<note>
	   <name>Note on this version of the draft</name>
	   <t>Version 03 of this draft was posted 2021-07-12 and appeared
		  to be nearly ready for IETF Last Call at that point.
		  Unfortunately, with Ned Freed's illness and untimely
		  passing in May 2022, the draft was allowed to expire and
		  drop off the radar.  A review of
		  draft-ietf-emailcore-rfc5321bis indicated that this spec
		  was very 
		  timely as well as useful, so this draft, which contains no
		  substantive changes from Ned's last version, is being posted
		  to restart the conversation and, if possible, more it
		  quickly toward Proposed Standard as Ned's final RFC.</t>
	   </note>
  </front>

  <middle>
    <section anchor="problems" numbered="true" toc="default">
      <name>Introduction</name>
      <t>The Simple Mail Transfer Protocol  provides the ability to
transfer <xref target="SMTP" format="default"/> or submit <xref target="SUBMIT" format="default"/> multiple email messages
from one host to another, each with multiple recipients, using a
single or multiple connections.</t>
      <t>The Local Mail Transfer Protocol <xref target="LMTP" format="default"/> provides the ability to
deliver messages to a system without its own mail queues. Like
SMTP, it allows multiple messages with multiple recipients.</t>
      <t>In order to conserve resources as well as protect themselves from
malicious clients, it is necessary for servers to enforce limits
on various aspects of the protocol, e.g., a limit on the number
of recipients that can be specified in a single transaction.</t>
      <t>Additionally, servers may also wish to alter the limits they
apply depending on their assessment of the reputation of a particular
client.</t>
      <t>The variability of the limits that may be in effect creates a
situation where clients may inadvertently exceed a particular server's
limits, causing servers to respond with temporary (or in some
cases, permanent) errors. This in turn can lead to delays or even
failures in message transfer.</t>
      <t>The "Limits" extension provides the means for a server
to inform a client about specific limits in effect for
a particular SMTP or LMTP session in the EHLO or LHLO command response.
This information, combined with the
inherent flexibility of these protocols, makes it possible for clients
to avoid server errors and the problems they cause.</t>
      <t>SMTP and LMTP servers have always been able to announce a limit using
distinguished syntax in a reply, but this approach requires that the
client first needs to issue a command.  The mechanism specified here
avoids the overhead of that approach by announcing limits prior to any
substantive interaction.</t>
      <t>Limits are registered with the IANA. Each registration includes
the limit name, value syntax, and a description of its semantics.</t>
	</section>
	
    <section anchor="Terminology" numbered="true" toc="default">
      <name>Terminology</name>
      <t>In this document, the key words "MUST", "MUST NOT", "REQUIRED",
"SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY",
and "OPTIONAL" are to be interpreted as described in BCP 14
<xref target="RFC2119" format="default"/> 
           <xref target="RFC8174" format="default"/>.</t>
      <t>This specification uses the Augmented Backus-Naur Form
<xref target="ABNF" format="default"/> notation and its core rules to define the
formal syntax of the "Limits" extension.</t>
      <t>This specification makes extensive use of the terminology specified
and used in <xref target="SMTP" format="default"/>.</t>
	</section>
	
    <section anchor="Extension" numbered="true" toc="default">
      <name>The "Limits" SMTP Extension</name>
      <t>Extensions to SMTP are defined in Section 2.2 of <xref target="SMTP" format="default"/>. <xref target="LMTP" format="default"/>
inherits SMTP's extension mechanism.</t>
      <t>The name of the extension is "Limits". Servers implementing this
extension advertise an additional "LIMITS" EHLO (LHLO in LMTP) keyword. The
associated parameter is used by the server to communicate one or
more limits, each with an optional value, to the client. The syntax
of the parameter is:</t>
      <artwork type="abnf" name="" align="left" alt=""><![CDATA[
  limits-param = limit-name-value 0*[SP limit-name-value]
  limit-name-value = limit-name ["=" limit-value]
  limit-name = 1*(ALPHA / DIGIT / "-" / "_")
  limit-value = 1*(%x21-3A / %x3C-7E) ; Any VCHAR except ";"

]]></artwork>
      <t>This extension introduces no new SMTP commands, and does not
alter any existing command. However, it is possible for a
LIMITS parameter to be associated with another SMTP extension
that does these things.</t>
      <section anchor="limits" numbered="true" toc="default">
        <name>Limits</name>
        <t>In order to achieve consistent behavior, all limits MUST be
registered with the IANA, as described below.</t>
      </section>
      <section anchor="limit-naming-conventions" numbered="true" toc="default">
        <name>Limit Naming Conventions</name>
        <t>Limit names MUST be comprehensible, but also should
be kept as short as possible. The use of commonly understood
abbreviations, e.g., "MAX" for "maximum", is encouraged.</t>
        <t>When a limit is associated with a particular command, its name
SHOULD begin with the name of that command.</t>
        <t>Limit names SHOULD end with one or more terms that describe
the type of limit.</t>
      </section>
      <section anchor="interaction-with-pipelining" numbered="true" toc="default">
        <name>Interaction With Pipelining</name>
        <t>The "Pipelining" extension <xref target="PIPELINING" format="default"/> is commonly used
to improve performance, especially over high latency
connections. Pipelining allows entire transaction
to be sent without checking responses and in some cases it may be
possible to send multiple transactions.</t>
        <t>The use of pipelining affects limits in an important way: Since
a pipelining client cannot check intermediate command responses
without stalling the pipeline, it cannot count the number of
succesful versus failed responses and adjust its behavior accordingly.
Limit designers need to take this into account.</t>
        <t>For example, it may seem like it would be better to impose a limit
on the number of succesful RCPT TO commands as opposed to the
way the RCPTMAX limit is specified in <xref target="RCPTMAX" format="default"/> below. But
counting the total number of RCPT TOs is simple, whereas
counting the number of successful RCPT TO stalls the pipeline.</t>
      </section>
      <section anchor="varying-limits" numbered="true" toc="default">
        <name>Varying Limits</name>
        <t>This extension provides an announcement as part of the reply to
an EHLO command. Some servers vary their limits, as a session
progresses, based  on their obtaining more information.
This extension does not attempt to handle in-session limit changes.</t>
      </section>
      <section anchor="interaction-with-smtp-minimums" numbered="true" toc="default">
        <name>Interaction With SMTP Minimums</name>
        <t>Section 4.5.3.1 of <xref target="SMTP" format="default"/> specifies minimum values for
various server sizes, limits, and timeouts, e.g., servers must
accept a minimum of 100 RCPT TO commands (section 4.5.3.1.8).
Unfortunately, the  reality is that servers routinely impose smaller
limits than what SMTP requires, and when this is done it's especially
important for clients to be aware that this is happening.</t>
        <t>For this reason there is no requirement that the limits
advertised by this extension comply with the minimums imposed
by SMTP.</t>
      </section>
      <section anchor="multiple-ehlo-commands" numbered="true" toc="default">
        <name>Multiple EHLO Commands</name>
        <t>These protocols require that the EHLO command (LHLO in LMTP) be
reissued under certain circumstances, e.g., after successful
authentication <xref target="AUTH" format="default"/> or negotiation of a security layer <xref target="STARTTLS" format="default"/>.</t>
        <t>Servers MAY return updated limits any time the protocol requires
clients to reissue the EHLO command. Clients MUST discard any
previous limits in favor of those provided by the most recent
EHLO. This includes the case where the original EHLO provided
a set of limits but the subsequent EHLO did not; in this
case the client MUST act as if no limits were communicated.</t>
      </section>
      <section anchor="syntax-errors-in-the-limits-parameter-value" numbered="true" toc="default">
		 <name>Syntax Errors in the LIMITS Parameter Value</name>
        <t>Syntax errors in the basic parameter syntax are best handled by
ignoring the value in its entirety; in this case clients SHOULD
proceed as if the LIMITS extension wasn't used.</t>
        <t>Syntax or other errors in the value syntax of a specific
		   limit, including unrecognized value keywords, are 
			best handled by ignoring that limit; in this case the client
			SHOULD proceed as if that limit wasn't specified.</t>
        <t>It is possible that future specification may create
multiple limits that are interrelated in some way; in this case
that specification MUST specify how an error in one limit's 
value syntax affects the other limits.</t>
      </section>
      <section anchor="caching-of-limit-settings-between-sessions" numbered="true" toc="default">
        <name>Caching of Limit Settings Between Sessions</name>
        <t>Clients MAY cache limits determined during one session
and use them to optimize their behavior for subsequent
sessions. However, since servers are free to adjust their
limits at any time, clients MUST be able to accommodate
any limit changes that occur between sessions.</t>
      </section>
	</section>
	
    <section anchor="initial-limits" numbered="true" toc="default">
      <name>Initial Limits</name>
      <t>An initial set of limits are specified in the following sections.</t>
      <section anchor="mailmax-limit" numbered="true" toc="default">
        <name>MAILMAX Limit</name>
        <t>Name: MAILMAX</t>
        <t>Value syntax: %x31-39 0*5DIGIT ; 0 not allowed, 6 digit maximum</t>
        <t>Description: MAILMAX specifies the maximum number of transactions
(MAIL FROM commands) the server will accept in a single session. The
count includes all MAIL FROM commands, regardless of whether they
succeed or fail.</t>
        <t>Restrictions: None.</t>
        <t>Security Considerations: See <xref target="Seccons" format="default"/></t>
      </section>
      <section anchor="RCPTMAX" numbered="true" toc="default">
        <name>RCPTMAX Limit</name>
        <t>Name: RCPTMAX</t>
        <t>Value syntax:  %x31-39 0*5DIGIT ; 0 not allowed, 6 digit maximum</t>
        <t>Description: RCPTMAX specifies the maximum number of RCPT TO commands
the server will accept in a single transaction. It is not a limit
on the actual number of recipients the message ends up being sent to;
a single RCPT TO command may produce multiple recipients or, in the
event of an error, none.</t>
        <t>Restrictions: None.</t>
        <t>Security Considerations: See <xref target="Seccons" format="default"/></t>
      </section>
      <section anchor="rcptdomainmax-limit" numbered="true" toc="default">
        <name>RCPTDOMAINMAX Limit</name>
        <t>Name: RCPTDOMAINMAX</t>
        <t>Value syntax:  %x31-39 0*5DIGIT ; 0 not allowed, 6 digit maximum</t>
        <t>Description: RCPTDOMAINMAX specifies the maximum number of different domains
that can appear in a recipient (RCPT TO) address within a single
session. This limit is imposed by some servers that bind to
a specific internal delivery mechanism on receipt of the first
RCPT TO command.</t>
        <t>Restrictions: None.</t>
        <t>Security Considerations: See <xref target="Seccons" format="default"/></t>
      </section>
	</section>
	
    <section anchor="example" numbered="true" toc="default">
      <name>Example</name>
      <t>A server announces two limits it implements to the client, along
with various other supported extensions, as follows:</t>
      <artwork name="" type="" align="left" alt=""><![CDATA[
S: [wait for open connection]
C: [open connection to server]
S: 220 mail.example.com ESMTP service ready
C: EHLO example.org
S: 250-mail.example.com
S: 250-SMTPUTF8
S: 250-LIMTIS RCPTMAX=20 MAILMAX=5
S: 250-SIZE 100000000
S: 250-8BITMIME
S: 250-ENHANCEDSTATUSCODES
S: 250-PIPELINING
S: 250-CHUNKING
S: 250 STARTTLS

]]></artwork>
      <t>The client now knows to limit the number of recipients in a transaction
to twenty and the number of transaction in a session to five.</t>
    </section>

	<section anchor="Seccons" numbered="true" toc="default">
      <name>Security Considerations</name>
      <t>A malicious server can use limits to overly constrain client behavior,
causing excessive use of client resources.</t>
      <t>A malicious client may use the limits a server advertises to optimize
the delivery of unwanted messages.</t>
      <t>A man-in-the-middle attack on unprotected SMTP connections can
be used to cause clients to misbehave, which in turn could result
in delivery delays or failures. Loss of reputation for the client
could also occur.</t>
      <t>All that said, decades of operational experience with the
SMTP "SIZE" extension <xref target="SIZE" format="default"/>, which provides servers with the
ability to indicate message size, indicates that such abuse is
rare and unlikely to be a significant problem.</t>
      <t>Use of the Limits extension to provide client-specific information - as 
opposed to general server limits - unavoidably provides senders with
feedback about their reputation. Malicious senders can exploit this
in various ways, e.g., start by sending good email and then, once their
reputation is established, sending bad email.</t>
	</section>
	
    <section anchor="iana-considerations" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <section anchor="smtp-service-extension-registry" numbered="true" toc="default">
        <name>SMTP Service Extension Registry</name>
        <t>The IANA is requested to add "LIMITS" to the SMTP Service
Extension Registry:</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
Keywords: LIMITS
Description: Server limits
Reference: [RFCxxxx]

]]></artwork>
      </section>
      <section anchor="smtp-server-limits-registry" numbered="true" toc="default">
        <name>SMTP Server Limits Registry</name>
        <t>The IANA is requested to create a new registry for SMTP
server limits. The policy for this registry is "Specification Required".
Registry entries consist of three required values:</t>
        <ol spacing="normal" type="1"><li>The name of the limit</li>
          <li>The syntax of the limit value, if the limit has one. Use of <xref target="ABNF" format="default"/>
is preferred but not required.</li>
          <li>A description of the limit's semantics</li>
          <li>Restrictions, if any, on the use of the limit. If the limit is specific
to any of SMTP, message submission, or LMTP, it should be documented
here.</li>
          <li>Security considerations for the limit</li>
        </ol>
        <t>The IANA is also requested to register the limits specified in
this document.</t>
      </section>
	</section>
  </middle>

  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>

        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml"/>
        <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml"/>
		
        <reference anchor="PIPELINING" target="https://www.rfc-editor.org/info/rfc2920">
          <front>
            <title>SMTP Service Extension for Command Pipelining</title>
            <author fullname="N. Freed" initials="N." surname="Freed">
              <organization/>
            </author>
            <date month="September" year="2000"/>
            <abstract>
              <t>This memo defines an extension to the Simple Mail Transfer Protocol (SMTP) service whereby a server can indicate the extent of its ability to accept multiple commands in a single Transmission Control Protocol (TCP) send operation.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="60"/>
          <seriesInfo name="RFC" value="2920"/>
          <seriesInfo name="DOI" value="10.17487/RFC2920"/>
        </reference>
        <reference anchor="ABNF" target="https://www.rfc-editor.org/info/rfc5234">
          <front>
            <title>Augmented BNF for Syntax Specifications: ABNF</title>
            <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker">
              <organization/>
            </author>
            <author fullname="P. Overell" initials="P." surname="Overell">
              <organization/>
            </author>
            <date month="January" year="2008"/>
            <abstract>
              <t>Internet technical specifications often need to define a formal syntax.  Over the years, a modified version of Backus-Naur Form (BNF), called Augmented BNF (ABNF), has been popular among many Internet specifications.  The current specification documents ABNF. It balances compactness and simplicity with reasonable representational power.  The differences between standard BNF and ABNF involve naming rules, repetition, alternatives, order-independence, and value ranges.  This specification also supplies additional rule definitions and encoding for a core lexical analyzer of the type common to several Internet specifications.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="68"/>
          <seriesInfo name="RFC" value="5234"/>
          <seriesInfo name="DOI" value="10.17487/RFC5234"/>
        </reference>
        <reference anchor="SMTP" target="https://www.rfc-editor.org/info/rfc5321">
          <front>
            <title>Simple Mail Transfer Protocol</title>
            <author fullname="J. Klensin" initials="J." surname="Klensin">
              <organization/>
            </author>
            <date month="October" year="2008"/>
            <abstract>
              <t>This document is a specification of the basic protocol for Internet electronic mail transport.  It consolidates, updates, and clarifies several previous documents, making all or parts of most of them obsolete.  It covers the SMTP extension mechanisms and best practices for the contemporary Internet, but does not provide details about particular extensions.  Although SMTP was designed as a mail transport and delivery protocol, this specification also contains information that is important to its use as a "mail submission" protocol for "split-UA" (User Agent) mail reading systems and mobile environments.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5321"/>
          <seriesInfo name="DOI" value="10.17487/RFC5321"/>
        </reference>
	  </references>
	  
      <references>
        <name>Informative References</name>
        <reference anchor="SIZE" target="https://www.rfc-editor.org/info/rfc1870">
          <front>
            <title>SMTP Service Extension for Message Size Declaration</title>
            <author fullname="J. Klensin" initials="J." surname="Klensin">
              <organization/>
            </author>
            <author fullname="N. Freed" initials="N." surname="Freed">
              <organization/>
            </author>
            <author fullname="K. Moore" initials="K." surname="Moore">
              <organization/>
            </author>
            <date month="November" year="1995"/>
            <abstract>
              <t>This memo defines an extension to the SMTP service whereby an SMTP client and server may interact to give the server an opportunity to decline to accept a message (perhaps temporarily) based on the client's estimate of the message size.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="10"/>
          <seriesInfo name="RFC" value="1870"/>
          <seriesInfo name="DOI" value="10.17487/RFC1870"/>
        </reference>
        <reference anchor="LMTP" target="https://www.rfc-editor.org/info/rfc2033">
          <front>
            <title>Local Mail Transfer Protocol</title>
            <author fullname="J. Myers" initials="J." surname="Myers">
              <organization/>
            </author>
            <date month="October" year="1996"/>
            <abstract>
              <t>SMTP [SMTP] [HOST-REQ] and its service extensions [ESMTP] provide a mechanism for transferring mail reliably and efficiently.  The design of the SMTP protocol effectively requires the server to manage a mail delivery queue.  This memo provides information for the Internet community.  This memo does not specify an Internet standard of any kind.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2033"/>
          <seriesInfo name="DOI" value="10.17487/RFC2033"/>
        </reference>
        <reference anchor="STARTTLS" target="https://www.rfc-editor.org/info/rfc3207">
          <front>
            <title>SMTP Service Extension for Secure SMTP over Transport Layer Security</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <date month="February" year="2002"/>
            <abstract>
              <t>This document describes an extension to the SMTP (Simple Mail Transfer Protocol) service that allows an SMTP server and client to use TLS (Transport Layer Security) to provide private, authenticated communication over the Internet.  This gives SMTP agents the ability to protect some or all of their communications from eavesdroppers and attackers.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3207"/>
          <seriesInfo name="DOI" value="10.17487/RFC3207"/>
        </reference>
        <reference anchor="AUTH" target="https://www.rfc-editor.org/info/rfc4954">
          <front>
            <title>SMTP Service Extension for Authentication</title>
            <author fullname="R. Siemborski" initials="R." role="editor" surname="Siemborski">
              <organization/>
            </author>
            <author fullname="A. Melnikov" initials="A." role="editor" surname="Melnikov">
              <organization/>
            </author>
            <date month="July" year="2007"/>
            <abstract>
              <t>This document defines a Simple Mail Transport Protocol (SMTP) extension whereby an SMTP client may indicate an authentication mechanism to the server, perform an authentication protocol exchange, and optionally negotiate a security layer for subsequent protocol interactions during this session.  This extension includes a profile of the Simple Authentication and Security Layer (SASL) for SMTP.</t>
              <t>This document obsoletes RFC 2554.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4954"/>
          <seriesInfo name="DOI" value="10.17487/RFC4954"/>
        </reference>
        <reference anchor="SUBMIT" target="https://www.rfc-editor.org/info/rfc6409">
          <front>
            <title>Message Submission for Mail</title>
            <author fullname="R. Gellens" initials="R." surname="Gellens">
              <organization/>
            </author>
            <author fullname="J. Klensin" initials="J." surname="Klensin">
              <organization/>
            </author>
            <date month="November" year="2011"/>
            <abstract>
              <t>This memo splits message submission from message relay, allowing each service to operate according to its own rules (for security, policy, etc.), and specifies what actions are to be taken by a submission server.</t>
              <t>Message relay is unaffected, and continues to use SMTP over port 25.</t>
              <t>When conforming to this document, message submission uses the protocol specified here, normally over port 587.</t>
              <t>This separation of function offers a number of benefits, including the ability to apply specific security or policy requirements.   [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="72"/>
          <seriesInfo name="RFC" value="6409"/>
          <seriesInfo name="DOI" value="10.17487/RFC6409"/>
        </reference>
      </references>
	</references>
	
    <section anchor="acknowledgements" numbered="true" toc="default">
      <name>Acknowledgements</name>
      <t>A lot of people have helped make this specification possible. The author wishes
		to thank Claus Assmann, Laura Atkins, Alex Brotman, Richard Clayton,
		Dave Crocker, Viktor Dukhovni,  Arnt Gulbrandsen, Jeremy Harris, Todd Herr,
		Mike Hillyer, Matthias Leisi, John Klensin, 
		Valdis Kl&EOverbar;tnieks, <!-- Klētnieks -->
		John Levine, Alexey Melnikov, Keith Moore, Michael Peddemors, Hector Santos,
		George Schlossnagle, Rolf E. Sonneveld, and Alessandro Vesely for their
		contributions and reviews.</t>
	</section>

	<section  numbered="true" toc="default">
	   <name>Change Log After Version -03</name>
	   <t>RFC Editor: Please remove this section before
		  publication</t>
	   <t>Version 03 of this draft was posted 2021-07-12 and appeared to be
		   nearly ready for IETF Last Call at that point.  Unfortunately, with
		   Ned Freed's illness and untimely passing in May 2022, the draft was
		   allowed to expire and drop off the radar. This appendix
		   documents changes since draft-freed-smtp-limits-03, i.e.,
		   after the last draft Ned Freed personally edited.</t>
		<ul>
		   <li> UPgraded from RFCXMLv2 to v3 and added the initial
			  note below the abstract and this (redundant) Appendix.
			  no other intentional changes other than....</li>
		   <li> Adjusted
			  <xref target="syntax-errors-in-the-limits-parameter-value"/>
			  to slightly clarify the intent in the second case.</li>
		</ul>
	</section>
	   
  </back>

</rfc>
