Feedback loop (email)

A feedback loop (FBL), sometimes called a complaint feedback loop, is an inter-organizational form of feedback by which a mailbox provider (MP) forwards the complaints originating from their users to the sender's organizations. MPs can receive users' complaints by placing report spam buttons on their webmail pages, or in their email client, or via help desks. The message sender's organization, often an email service provider, has to come to an agreement with each MP from which they want to collect users' complaints.[1]

A sender and a recipient connected by a mailbox provider (MP). The feedback provider and the feedback consumer are the two formal endpoints of the feedback loop (blue arrow). Senders need to subscribe, possibly using a web form similar to the one depicted on the upper left corner, in order to become feedback consumers. Recipients typically click a spam button on a web mail page to start the process.

Feedback loops are one of the ways for reporting spam. Whether and how to provide an FBL is a choice of the MP. End users should report abuse at their mailbox provider's reporting hub, so as to also help filtering.[2] As an alternative, competent users may send abuse complaints directly, acting as mailbox providers themselves.

Rationale

Marketers striving for their mail to be delivered have a twofold advantage: they can remove subscribers that don't want to receive that kind of advertising (listwashing), and they can analyze the complaint rate and hence how their advertising meets market expectations. By unsubscribing users who complain, marketers reduce their overall complaint rate per IP or domain, ensuring that targeted mail is much more likely to reach subscribers who actually want to receive it.[3]

ESPs, when playing the sender's role, are very sensitive to how sending mail on behalf of their customers may affect their reputation. Monitoring the complaint rate is one of the ways they can control what their users are sending.[4]

Reporting process

  1. Spencer sends a message to Alice.
  2. Alice complains to Isaac (her ISP or MP) about the message, e.g. by hitting the report spam button.
  3. Isaac encapsulates the message as either an Abuse Reporting Format MIME part, or (less commonly) a standalone message/rfc822 MIME part, and sends it to Spencer if Spencer has signed up to receive that feedback.[5]

As sketched above, the process implies that Spencer, besides being the author (or sender) of the message, is connected to the postmaster responsible for his mail domain. Subscribing to an FBL usually involves the postmaster's authorization. An FBL subscriber may or may not forward abuse reports to the relevant authors. If no subscribers exist for a given mail domain, Isaac can omit sending an abuse report at all. In fact, subscriptions have to be done one by one, a laborious task that mail domains not engaged in mass mailing may want to skip. RFC 6650 addresses the latter shortcoming by proposing auto-subscribe just-in-time FBLs, which can be started by sending an unsolicited abuse report with further directives (at a minimum, a way to unsubscribe).[6]

Ipsos noted that a majority of respondents to a survey on spam reporting marked messages as spam based solely on the subject and sender data.

For years, end users have been told not to trust email unsubscribe links, so many users hit the spam button as an alternative to unsubscribing.[7] Consequently, report spam may act as unsubscribe in some cases.[8] One of the reasons not to hit unsubscribe links is to avoid confirming that the message had been received and opened.[9]

Reporting formats

The Abuse Reporting Format (ARF) is the standard format for FBL reports. Much like bounce messages, whose design is inherited by ARF, an abuse report consists of a human readable part, followed by a machine readable part, and the original message. The report is characterized by a Feedback-Type field whose values may indicate one of abuse, fraud, virus, or other (more types are registered at IANA).

Microsoft, who use the name Junk Mail Reporting (JMR), also use their own format.[10]

Google's Gmail is beta testing a non-traditional FBL with select ESPs.[11] Gmail uses their own format—an aggregate report that reveals spam rate per notable sender. SendGrid reports that the Gmail FBL, developed and launched by Julian Tempelsman and Sri Somanchi, is effective at identifying spam that other anti-spam systems miss.[12]

Criticism

  • The report spam button is said by some to often be used improperly.[13]
  • The feedback loops fail to meet the generic anti-spam criterion of not generating more email messages. Even if the amount of feedback is just a fraction of the number of messages that an ESP sends out, most ESPs are not yet organized for handling it.[14]
  • Using the same button for both abuse reports and list unsubscribe implies guesswork by the (automated) help desk.[15] For example, it does not ease reporting to a list owner that a specific post in the (non moderated) list is actually spam.[16]
  • Some FBLs provide no option for communicating feedback automatically to multiple parties: the sender, the ESP (if one is involved), or the upstream datacenter/network address provider—as currently construed by the Federal Trade Commission's (FTC) "Follow the Money" strategy.[17]
  • The majority of ESP offering Feedback Loop do not include in the report the email address of the recipient, who marked the message. This makes it impossible to remove the recipient from the mailing list, where it has subscribed. Such ESPs' practice encourages mailing-lists providers to send individualized message to each recipient (contrary to sending everybody literally the same message), so that mailing list providers can extract from the individualized message coming over the feedback loop the original recipient.

See also

References

  1. J.D. Falk, ed. (November 2011). Complaint Feedback Loop Operational Recommendations. IETF. doi:10.17487/RFC6449. RFC 6449. Retrieved 30 November 2011.
  2. John R. Levine (9 December 2009). "Adding a spam button to MUAs". mail. ASRG. Retrieved 22 April 2011.
  3. "What are feedback loops (fbl's) and how can they help my deliverability?". Email Manual. 2009-07-15. Archived from the original on 6 March 2012. Retrieved 15 July 2009.{{cite web}}: CS1 maint: unfit URL (link)
  4. "Your Reputation Holds the Key to Deliverability" (PDF). ReturnPath. 2008-08-18. Archived from the original (PDF) on 11 May 2013. Retrieved 16 November 2008.
  5. J.D. Falk (2008-11-11). "FeedBack loops". ASRG mailing list (Mailing list). IRTF. Retrieved 18 November 2008.
  6. Murray Kucherawy, ed. (June 2012). Creation and Use of Email Feedback Reports: An Applicability Statement for the Abuse Reporting Format (ARF). IETF. doi:10.17487/RFC6650. RFC 6650. Retrieved 28 June 2012. Feedback Providers MUST provide a way for report recipients to request that no further reports be sent.
  7. Derek Harding (2006-09-07). "Getting in the Feedback Loop". ClikZ. Retrieved 16 November 2008.
  8. John Levine (2008-11-13). "FeedBack loops". ASRG mailing list (Mailing list). IRTF. Retrieved 18 November 2008.
  9. "Spam Unsubscribe Services". The Spamhaus Project. 2007-01-19. Archived from the original on 2009-03-09. Retrieved 16 November 2008.
  10. "Services for Senders and ISPs". Microsoft. Retrieved 11 November 2011.
  11. "Best Practices for Senders: A Gmail Perspective (slides 47, 48)". MAAWG. 2014-02-20.
  12. "Gmail's Spam Feedback Loop: SendGrid's First-hand Experience". SendGrid. 2014-03-28.
  13. Rich Kulawiec (2008-11-13). "FeedBack loops". ASRG mailing list (Mailing list). IRTF. Retrieved 16 November 2008.
  14. Chris Lewis (2008-11-12). "FeedBack loops". ASRG mailing list (Mailing list). IRTF. Retrieved 18 November 2008.
  15. Barry Shein (2008-11-13). "FeedBack loops". ASRG mailing list (Mailing list). IRTF. Retrieved 18 November 2008.
  16. Barry Shein (2008-11-13). "FeedBack loops". ASRG mailing list (Mailing list). IRTF. Retrieved 18 November 2008.
  17. Deborah Platt Majoras; et al. (September 2004). "A CAN-SPAM Informant Reward System" (PDF). US Federal Trade Commission. Retrieved 8 November 2011.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.