<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.5 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-dweekly-wrong-recipient-05" category="std" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.19.2 -->
  <front>
    <title abbrev="Wrong Recipient">Adding a Wrong Recipient URL for Handling Misdirected Emails</title>
    <seriesInfo name="Internet-Draft" value="draft-dweekly-wrong-recipient-05"/>
    <author fullname="David Weekly">
      <organization/>
      <address>
        <postal>
          <city>Redwood City</city>
          <region>CA</region>
          <country>US</country>
        </postal>
        <email>david@weekly.org</email>
      </address>
    </author>
    <date year="2024" month="February" day="17"/>
    <area>ART</area>
    <keyword>email</keyword>
    <abstract>
      <?line 42?>

<t>This document describes a mechanism for an email recipient to indicate to a
sender that they are not the intended recipient.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://dweekly.github.io/ietf-wrong-recipient/draft-dweekly-wrong-recipient.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-dweekly-wrong-recipient/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/dweekly/ietf-wrong-recipient"/>.</t>
    </note>
  </front>
  <middle>
    <?line 47?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Many users with common names and/or short email addresses receive
transactional emails from service providers intended for others. These
emails can't be unsubscribed (as they are transactional) but neither are
they spam. These emails commonly are from a noreply@ email address; there
is no standards-based mechanism to report a "wrong recipient" to the
sender. Doing so is in the interest of all three involved parties: the
inadvertent recipient (who does not want the email), the sender (who wants
to be able to reach their customer and who does not want the liability of
transmitting PII to a third party), and the intended recipient.</t>
      <t>This document proposes a structured mechanism for the reporting of such
misdirected email via either HTTPS POST or email inbox, directly mirroring
the List-Unsubscribe and List-Unsubscribe-Post mechanisms of <xref target="RFC2369"/> and
<xref target="RFC8058"/> respectively.</t>
    </section>
    <section anchor="proposal">
      <name>Proposal</name>
      <t>There ought be a mechanism whereby a service can indicate
it has an endpoint to indicate a "wrong recipient" of an email. If this
header field is present in an email message, the user can select an option to
indicate that they are not the intended recipient.</t>
      <t>Similar to one-click unsubscription <xref target="RFC8058"/>, the mail service can
perform this action in the background as an HTTPS POST to the provided
URL without requiring the user's further attention to the matter. A
mailto: URI may also be included for non-HTTP MUAs, akin to List-Unsubscribe
from <xref target="RFC2369"/>.</t>
      <t>Since it's possible the user may have a separate valid account with the
sending service, it may be important that the sender be able to tie
<em>which</em> email was sent to the wrong recipient. For this reason, the
sender may also include an opaque blob in the header field to specify the
account ID referenced in the email; this is included in the POST.</t>
      <t>Note that this kind of misdelivery shouldn't be possible if a service
has previously verified the user's email address for the account.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="high-level-goals">
      <name>High-Level Goals</name>
      <t>Allow a recipient to stop receiving emails intended for someone else.</t>
      <t>Allow a service to discover when they have the wrong email for a user.</t>
    </section>
    <section anchor="out-of-scope">
      <name>Out of Scope</name>
      <t>This document does not propose a mechanism for automatically discovering
whether a given user is the correct recipient of an email, though it is
possible to use some of the signals in an email, such as the intended
recipient name, to infer a possible mismatch between actual and intended
recipients.</t>
    </section>
    <section anchor="implementation">
      <name>Implementation</name>
      <section anchor="mail-senders-when-sending">
        <name>Mail Senders When Sending</name>
        <t>Mail Senders that wish to be notified when a misdelivery has occurred
<bcp14>SHOULD</bcp14> include a Wrong-Recipient header field with an HTTPS URI to which the
recipient's mail client can POST and/or a mailto: URI to which an email
should be sent. If this header field is included, the mail sender <bcp14>MUST</bcp14>
ensure these endpoints are valid for a period of at least one year after
sending.</t>
        <t>The sender <bcp14>MUST</bcp14> encode a mapping to the underlying account identifier
in the URI in order to allow the service to know which of their accounts
has an incorrect email.</t>
        <t>The URI <bcp14>SHOULD</bcp14> include an opaque identifier or another hard-to-forge
component in addition to, or instead of, the plaintext recipient email
address and user ID in order to prevent a malicious party from exercising
the endpoint on a victim's behalf. Possible examples include using a
signature parameter to the URI or UUID with a sender-local database
lookup to retrieve the email and user ID referenced.</t>
      </section>
      <section anchor="mail-recipients">
        <name>Mail Recipients</name>
        <t>When a mail client receives an email that includes a Wrong-Recipient
header field, an option <bcp14>SHOULD</bcp14> be exposed in the user interface that allows
a recipient to indicate that the mail was intended for another user, if
and only if the email is reasonably assured to not be spam.</t>
        <t>If the user selects this option, the mail client <bcp14>MUST</bcp14> perform an
HTTPS POST to the first https URI in the Wrong-Recipient header field,
or send an empty message to the first referenced mailto: address.</t>
        <t>To minimize XSRF attacks, the POST request <bcp14>MUST NOT</bcp14> include cookies,
HTTP authorization, or any other context information. The "wrong
recipient" reporting operation is logically unrelated to any previous
web activity, and context information could inappropriately link the
report to previous activity.</t>
        <t>The POST body <bcp14>MUST</bcp14> include only "Wrong-Recipient=true".</t>
        <t>If the response is a HTTP 500 type error indicating server issue, the
client <bcp14>MAY</bcp14> retry. If the HTTP response to the POST is a 200, the client
<bcp14>MUST NOT</bcp14> retry. No feedback to the user as to the success or failure
of this operation is proposed or required.</t>
      </section>
      <section anchor="mail-senders-after-wrong-sender-notification">
        <name>Mail Senders After Wrong Sender Notification</name>
        <t>When a misdelivery has been indicated by a POST to the HTTPS URI or
email to the given mailto: URI, the sender <bcp14>MUST</bcp14> make a reasonable effort
to cease emails to the indicated email address for that user account.</t>
        <t>The POST endpoint <bcp14>MUST NOT</bcp14> issue an HTTP redirect and <bcp14>SHOULD</bcp14> return a
<tt>200 OK</tt> status; the content body will be ignored.</t>
        <t>Any GET request to the same URI <bcp14>MUST NOT</bcp14> be treated as an indication
of a wrong recipient notification, since anti-spam software may attempt
a GET request to URIs mentioned in mail headers without receiving user
consent. Senders <bcp14>MAY</bcp14> return an error <tt>405 Method Not Allowed</tt> in
response to a GET request to the URI. The sender <bcp14>MAY</bcp14> elect
to present a page at this URI responsive to a GET request that
presents the user with a form that allows them to submit the POST.</t>
        <t>The sender <bcp14>SHOULD</bcp14> make a best effort to attempt to discern a correct
email address for the user account, such as by using a different known
email address for that user, postal mail, text message, phone call,
app push, or presenting a notification in the user interface of the
service. How the sender should accomplish this task is not part of
this specification.</t>
      </section>
    </section>
    <section anchor="additional-requirements">
      <name>Additional Requirements</name>
      <t>The email needs at least one valid authentication identifier.  In
this version of the specification the only supported identifier type
is DKIM <xref target="RFC6376"/>, that provides a domain-level identifier in the
content of the "d=" tag of a validated DKIM-Signature header field.</t>
      <t>The Wrong-Recipient header field needs to be included in the "h=" tag of a
valid DKIM-Signature header field.</t>
    </section>
    <section anchor="header-syntax">
      <name>Header Syntax</name>
      <t>The following ABNF imports fields and WSP from <xref target="RFC5322"/> and URI from <xref target="RFC3986"/>.
An https URI, mailto URI, or one of each are permitted. Other URI protocols
<bcp14>MUST NOT</bcp14> be used.</t>
      <artwork><![CDATA[
fields =/ wrong-recipient

wrong-recipient = "Wrong-Recipient:" 0*1WSP "<" URI ">"
    *(0*1WSP "," 0*1WSP "<" URI ">") 0*WSP
]]></artwork>
    </section>
    <section anchor="examples">
      <name>Examples</name>
      <section anchor="signed-https-uri">
        <name>Signed HTTPS URI</name>
        <t>Header in Email:</t>
        <artwork><![CDATA[
Wrong-Recipient: <https://example.com/wrong-recipient?
    uid=12345&email=user@example.org&sig=a29c83d>
]]></artwork>
        <t>Resulting POST request</t>
        <artwork><![CDATA[
POST /wrong-recipient?uid=12345&email=user@example.org&sig=a29c83d HTTP/1.1
Host: example.com
Content-Length: 20

Wrong-Recipient=true
]]></artwork>
      </section>
      <section anchor="uuid-https-uri">
        <name>UUID HTTPS URI</name>
        <t>Header in Email:</t>
        <artwork><![CDATA[
Wrong-Recipient: <https://example.com/wrong-recipient?
    uuid=c002bd9a-e015-468f-8621-9baf6fca12aa>
]]></artwork>
        <t>Resulting POST request</t>
        <artwork><![CDATA[
POST /wrong-recipient?uuid=c002bd9a-e015-468f-8621-9baf6fca12aa HTTP/1.1
Host: example.com
Content-Length: 20

Wrong-Recipient=true
]]></artwork>
      </section>
      <section anchor="combined-mailto-and-https-uris">
        <name>Combined mailto: and HTTPS URIs</name>
        <t>Header in Email:</t>
        <artwork><![CDATA[
Wrong-Recipient:
    <https://example.com/wrong-recipient?
        uuid=c002bd9a-e015-468f-8621-9baf6fca12aa>,
    <mailto:wrong-recipient.c002bd9a-e015-468f-8621-9baf6fca12aa
        @example.org>
]]></artwork>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The Wrong-Recipient header field may contain the recipient address, but
that is already exposed in other header fields like To:.</t>
      <t>The user ID of the recipient with the sending service may be exposed
by the Wrong-Recipient URI, which may not be desired but a sender
can instead use an opaque blob to perform a mapping to a user ID on their
end without leaking any information to outside parties, such as the UUID
examples given above.</t>
      <t>A bad actor with access to the user's email could maliciously
indicate the recipient was a Wrong Recipient with any services that
used this protocol, causing mail delivery and potentially account
access difficulties for the user.</t>
      <t>The Wrong-Sender POST provides a strong hint to the mailer that
the address to which the message was sent was valid, and could in
principle be used as a way to test whether an email address is valid.
It also may expose the recipient's location and ISP via IP address.
However, unlike passive methods like embedding tracking pixels, the
mechanism proposed here takes an active user action. Nonetheless,
MUAs ought only expose this Wrong Recipient option if relatively
confident that the email is not spam.</t>
      <t>A sender with a guessable URI structure and no use of either signed
parameters or a UUID would open themselves up to a malicious party
POST'ing email credentials for victims, potentially causing difficulty.
Senders should be strongly encouraged to use a signature or opaque
blob as suggested. No algorithm for creating such a signature or
opaque blob is included in this standard since only the sender needs
to validate the correctness of the hard-to-forge URL.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA has registered a new entry to the "Provisional Message Header Field
Names" registry, to be made permanent if this proposal becomes a standard.</t>
      <artwork><![CDATA[
Header field name: Wrong-Recipient
Protocol: mail
Status: Provisional
Author/Change controller: IETF
Specification document(s): *** This document ***
Related information: none
]]></artwork>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC5322">
          <front>
            <title>Internet Message Format</title>
            <author fullname="P. Resnick" initials="P." role="editor" surname="Resnick"/>
            <date month="October" year="2008"/>
            <abstract>
              <t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of "electronic mail" messages. This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, "Standard for the Format of ARPA Internet Text Messages", updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5322"/>
          <seriesInfo name="DOI" value="10.17487/RFC5322"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8058">
          <front>
            <title>Signaling One-Click Functionality for List Email Headers</title>
            <author fullname="J. Levine" initials="J." surname="Levine"/>
            <author fullname="T. Herkula" initials="T." surname="Herkula"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes a method for signaling a one-click function for the List-Unsubscribe email header field. The need for this arises out of the actuality that mail software sometimes fetches URLs in mail header fields, and thereby accidentally triggers unsubscriptions in the case of the List-Unsubscribe header field.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8058"/>
          <seriesInfo name="DOI" value="10.17487/RFC8058"/>
        </reference>
        <reference anchor="RFC6376">
          <front>
            <title>DomainKeys Identified Mail (DKIM) Signatures</title>
            <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker"/>
            <author fullname="T. Hansen" initials="T." role="editor" surname="Hansen"/>
            <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy"/>
            <date month="September" year="2011"/>
            <abstract>
              <t>DomainKeys Identified Mail (DKIM) permits a person, role, or organization that owns the signing domain to claim some responsibility for a message by associating the domain with the message. This can be an author's organization, an operational relay, or one of their agents. DKIM separates the question of the identity of the Signer of the message from the purported author of the message. Assertion of responsibility is validated through a cryptographic signature and by querying the Signer's domain directly to retrieve the appropriate public key. Message transit from author to recipient is through relays that typically make no substantive change to the message content and thus preserve the DKIM signature.</t>
              <t>This memo obsoletes RFC 4871 and RFC 5672. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="76"/>
          <seriesInfo name="RFC" value="6376"/>
          <seriesInfo name="DOI" value="10.17487/RFC6376"/>
        </reference>
        <reference anchor="RFC2369">
          <front>
            <title>The Use of URLs as Meta-Syntax for Core Mail List Commands and their Transport through Message Header Fields</title>
            <author fullname="G. Neufeld" initials="G." surname="Neufeld"/>
            <author fullname="J. Baer" initials="J." surname="Baer"/>
            <date month="July" year="1998"/>
            <abstract>
              <t>The mailing list command specification header fields are a set of structured fields to be added to email messages sent by email distribution lists. By including these header fields, list servers can make it possible for mail clients to provide automated tools for users to perform list functions. This could take the form of a menu item, push button, or other user interface element. The intent is to simplify the user experience, providing a common interface to the often cryptic and varied mailing list manager commands. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2369"/>
          <seriesInfo name="DOI" value="10.17487/RFC2369"/>
        </reference>
      </references>
    </references>
    <?line 303?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Many thanks to John Levine for helping shepherd this document as well
as Oliver Deighton and Murray Kucherawy for their kind and actionable
feedback on the language and first draft of the proposal. Thanks to
Eliot Lear for helping guide the draft to the right hands for review.
A detailed review by Jim Fenton was much appreciated and caught a number
of key issues. Many thanks to the members of IETF ART for vigorous
discussion thereof.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
