<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-happel-structured-email-trust-02" category="std" consensus="true" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.25.0 -->
  <front>
    <title abbrev="SML Trust">Trust and security considerations for Structured Email</title>
    <seriesInfo name="Internet-Draft" value="draft-happel-structured-email-trust-02"/>
    <author initials="H.-J." surname="Happel" fullname="Hans-Joerg Happel">
      <organization>audriga</organization>
      <address>
        <email>happel@audriga.com</email>
        <uri>https://www.audriga.com</uri>
      </address>
    </author>
    <author initials="A." surname="Gulbrandsen" fullname="Arnt Gulbrandsen">
      <organization>ICANN</organization>
      <address>
        <postal>
          <street>6 Rond Point Schumann, Bd. 1</street>
          <city>Brussels</city>
          <code>1040</code>
          <country>Belgium</country>
        </postal>
        <email>arnt@gulbrandsen.priv.no</email>
        <uri>https://icann.org/ua</uri>
      </address>
    </author>
    <date year="2025" month="January" day="07"/>
    <area>Applications</area>
    <workgroup>sml</workgroup>
    <abstract>
      <?line 47?>

<t>This document discusses trust and security considerations for
structured email and provides
recommendations for message user agents on how to deal with structured
data in email messages.</t>
    </abstract>
  </front>
  <middle>
    <?line 54?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Structured email, as described in <xref target="I-D.sml-structured-email"/>,
makes the content of some email messages machine-readable, such that
user agents can provide higher-level functions than
displaying/replying, for example "add this to calendar".</t>
      <t>Naturally, new functions bring new trust and security considerations,
or bring new urgency to existing issues.  This document discusses
issues related to trust and security of structured email, and provides
advice in some cases.</t>
    </section>
    <section anchor="requirements-language">
      <name>Requirements Language</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="types-of-security-concerns">
      <name>Types of security concerns</name>
      <t>This section gives an overview of the various types of security and
privacy concerns that arise when email messages contain structured
data. The same concerns often arise for other messages, of course.</t>
      <section anchor="spamvirus-filters">
        <name>Spam/virus filters</name>
        <t>Structured email increases the syntactical and semantic complexity of
email messages. If a spam/virus filter parses structured email in
order to block malevolent messages, the filter's parser will
necessarily differ from that of the MUA that will finally act on the
structured data, creating a risk of misclassification.</t>
        <t>These risks are elevated when a structured data format has complex
syntax, syntax that offers several optional or alternative ways to
express the same substance, and of course by parsers that deviate from
the specification for better bug compatibiloty.</t>
      </section>
      <section anchor="formal-display-of-data">
        <name>Formal display of data</name>
        <t>A common example is displaying a received calendar invitation using
dates/times in the recipient's timezone, in a fixed format.</t>
        <t>Formal display introduces additional possibilities of discrepancy
between the different representations. For example, a single message
might contains a multipart/alternative containing a text/plain
description of a flight itinerary, a text/html description of the same
itinerary, and a structured representation. All three may be
different, leading to confusion (and in this example, perhaps to
missing a flight).</t>
        <t>Unintentional discrepancy is a risk for senders; some recipients may
be misinformed.</t>
        <t>If a message is sent to a group and there is a discrepancy, different
members of the group may see it differently.</t>
        <t>If a particular MUA displays the formal representation within the
message, a malevolent sender could try to mimic the visual
representation using HTML with CSS, but with misleading content.</t>
      </section>
      <section anchor="automated-processing">
        <name>Automated processing</name>
        <t>Automated processing covers actions that are taken as soon as the
message arrives rather than when a human user reads the message. For
example, a user might want flight reservations to be automatically
added to a travel itinerary application and/or a calendar.</t>
        <t>Such automation could be a custom MUA feature or a future extension of
the Sieve email filtering language (<xref target="RFC5228"/>). A related example
for abuse in automated processing is calendar spam (<xref target="CalSpam"/>).</t>
      </section>
      <section anchor="external-references">
        <name>External references</name>
        <t>Email messages with a text/html body part ("HTML email messages") may
contain image resources that link to web servers. Such links can be
used for tracking user interaction with the message.</t>
        <t>Similar concerns apply to structured data types which include image
references, such as the cover image of a music album or the teaser
image of a news article.</t>
        <t>RDF structured data can be partial by design and include references to
additional data. Using a "follow your nose" approach, tools can follow
URL references to obtain further structured data concerning a
resource. For example, a piece of structured data about an article
could reference the article's authors only by URL. For a meaningful
processing of author information, one might try to obtain further data
using that URL.</t>
      </section>
    </section>
    <section anchor="trust-mechanisms">
      <name>Trust mechanisms</name>
      <t>Several implementations of structured email restrict processing to
messages that are particularly trusted. That is to say, an incoming
message is in one of these three categories:</t>
      <ol spacing="normal" type="1"><li>
          <t>Spam. Structured data is not processed.</t>
        </li>
        <li>
          <t>Ordinary. Structured data is not processed.</t>
        </li>
        <li>
          <t>Trusted. Structured data is processed.</t>
        </li>
      </ol>
      <t>This section gives an overview of the trust mechanisms used at the
time of writing.</t>
      <t>It does not attempt to describe whether a trust-based mechanism is
appopriate in a particular case.</t>
      <section anchor="trusted-senders">
        <name>Trusted senders</name>
        <t>For the case of displaying remote images embedded in HTML email
messages, MUAs often allow users to manually choose if they trust a
certain sender. Sometimes, addresses in the MUA's address book are
considered trusted, or in a special list in the address book. While
this is mentioned in <xref target="RFC6132"/> and <xref target="RFC6134"/>, this mechanism is
currently not standardized.</t>
        <t>Several services manage trust centrally: trusted senders are trusted
by the mail service rather than by the individual users.</t>
        <t>Some services differentiate between local mail and mail that arrived
across the internet, and trust local mail. In particular, one author
has seen that attachments sent by remote senders are distrusted
("warning! do you really want to download this?") while attachments
from local senders are assumed to be benevolent.</t>
      </section>
      <section anchor="sender-signatures">
        <name>Sender signatures</name>
        <t>Sender signatures such as PGP or S/MIME could potentially be used as a
trust indicator. The authors aren't aware of any concrete examples of
this in the past, perhaps because of limited deployment.</t>
      </section>
      <section anchor="domain-signatures">
        <name>Domain signatures</name>
        <t>DKIM defines a signature on sender domain that may be used to verify
that a message was sent by the same sender as an earlier message.</t>
        <t>Some mail hosts restrict structured processing to messages with DKIM
signatures, or to a set of senders who are identified by their DKIM
signatures.</t>
      </section>
      <section anchor="transaction-identifiers">
        <name>Transaction identifiers</name>
        <t>Part of the simplicity of email is the fact that just the email
address is required to reach out to a recipient. This however requires
the the recipient to discern whether a message is desirable or
abusive.</t>
        <t>Recipient-generated transaction identifiers aim to pass a certain
secret to the sender, which helps to prove legitimacy. One such
approach are one-time email aliases, which are generated for a single
transaction or series of transactions.</t>
        <t>Structured email by itself might also help define special types of
structured data that could help to manage and communicate transaction
identifiers more easily.</t>
        <t>Open issue 1: Propose a header field with an opaque cookie like
thread-id, to tie a message to older messages?</t>
      </section>
    </section>
    <section anchor="categories-of-use-cases">
      <name>Categories of use cases</name>
      <t>Certain types of structured data might need to be kept more secure
than others. For instance, the structured data representation of a
music album shared by a friend would not contain major personal
information, while e.g., medical records or financial statements
certainly would.</t>
    </section>
    <section anchor="implementation-guidelines">
      <name>Implementation guidelines</name>
      <section anchor="processing-structured-data">
        <name>Processing structured data</name>
        <t>MUAs <bcp14>SHOULD</bcp14> consider structured data in incoming email messages only
if either of these criteria hold:</t>
        <ul spacing="normal">
          <li>
            <t>The sender is trusted (e.g., part of the user's address book) and
the messsage either contains a valid personal or domain signature</t>
          </li>
          <li>
            <t>The message is part of an ongoing thread with a trusted sender</t>
          </li>
        </ul>
        <t>If none of these criteria is fulfilled, MUAs should fall back to
alternative presentations (e.g., "text/html" or "text/plain").</t>
        <t>Open issue 2: Really <bcp14>SHOULD</bcp14>? I (Arnt) don't see this guidance as
clearly right. Existing</t>
      </section>
      <section anchor="inlining-data">
        <name>Inlining data</name>
        <t>Structured data included in an email message should be self-contained
in order to avoid privacy problems.  This implies that if an MUA is
able to provide meaningful user interaction (rather than mere
display), then it should do that without loading additional referenced
resources from the web.</t>
      </section>
    </section>
    <section anchor="implementation-status">
      <name>Implementation status</name>
      <t>RFC Editor: before publication please remove this section and the
reference to <xref target="RFC7942"/>.</t>
      <t>This section records the status of known implementations of the
protocol defined by this specification at the time of posting of this
Internet-Draft, and is based on a proposal described in
<xref target="RFC7942"/>. The description of implementations in this section is
intended to assist the IETF in its decision processes in progressing
drafts to RFCs. Please note that the listing of any individual
implementation here does not imply endorsement by the
IETF. Furthermore, no effort has been spent to verify the information
presented here that was supplied by IETF contributors. This is not
intended as, and must not be construed to be, a catalog of available
implementations or their features. Readers are advised to note that
other implementations may exist.</t>
      <t>According to <xref target="RFC7942"/>, "this will allow reviewers and working groups
to assign due consideration to documents that have the benefit of
running code, which may serve as evidence of valuable experimentation
and feedback that have made the implemented protocols more mature. It
is up to the individual working groups to use this information as they
see fit".</t>
      <section anchor="structured-email-plugin-for-roundcube-webmail">
        <name>Structured Email plugin for Roundcube Webmail</name>
        <t>The plugin currently uses the "trusted sender" feature of Roundcube to
determine if structured data should be processed.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security considerations</name>
      <t>Security considerations are a core subject of this document.</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy considerations</name>
      <t>Privacy considerations are a core subject of this document.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions at this time.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.sml-structured-email">
          <front>
            <title>*** BROKEN REFERENCE ***</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RFC5228">
          <front>
            <title>Sieve: An Email Filtering Language</title>
            <author fullname="P. Guenther" initials="P." role="editor" surname="Guenther"/>
            <author fullname="T. Showalter" initials="T." role="editor" surname="Showalter"/>
            <date month="January" year="2008"/>
            <abstract>
              <t>This document describes a language for filtering email messages at time of final delivery. It is designed to be implementable on either a mail client or mail server. It is meant to be extensible, simple, and independent of access protocol, mail architecture, and operating system. It is suitable for running on a mail server where users may not be allowed to execute arbitrary programs, such as on black box Internet Message Access Protocol (IMAP) servers, as the base language has no variables, loops, or ability to shell out to external programs. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5228"/>
          <seriesInfo name="DOI" value="10.17487/RFC5228"/>
        </reference>
        <reference anchor="RFC6132">
          <front>
            <title>Sieve Notification Using Presence Information</title>
            <author fullname="R. George" initials="R." surname="George"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="July" year="2011"/>
            <abstract>
              <t>This is a further extension to the Sieve mail filtering language Notification extension, defining presence information that may be checked through the notify_method_capability feature. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6132"/>
          <seriesInfo name="DOI" value="10.17487/RFC6132"/>
        </reference>
        <reference anchor="RFC6134">
          <front>
            <title>Sieve Extension: Externally Stored Lists</title>
            <author fullname="A. Melnikov" initials="A." surname="Melnikov"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="July" year="2011"/>
            <abstract>
              <t>The Sieve email filtering language can be used to implement email whitelisting, blacklisting, personal distribution lists, and other sorts of list matching. Currently, this requires that all members of such lists be hard-coded in the script itself. Whenever a member of a list is added or deleted, the script needs to be updated and possibly uploaded to a mail server.</t>
              <t>This document defines a Sieve extension for accessing externally stored lists -- lists whose members are stored externally to the script, such as using the Lightweight Directory Access Protocol (LDAP), the Application Configuration Access Protocol (ACAP), vCard Extensions to WebDAV (CardDAV), or relational databases. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6134"/>
          <seriesInfo name="DOI" value="10.17487/RFC6134"/>
        </reference>
        <reference anchor="RFC7942">
          <front>
            <title>Improving Awareness of Running Code: The Implementation Status Section</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>This document describes a simple process that allows authors of Internet-Drafts to record the status of known implementations by including an Implementation Status section. This will allow reviewers and working groups to assign due consideration to documents that have the benefit of running code, which may serve as evidence of valuable experimentation and feedback that have made the implemented protocols more mature.</t>
              <t>This process is not mandatory. Authors of Internet-Drafts are encouraged to consider using the process for their documents, and working groups are invited to think about applying the process to all of their protocol specifications. This document obsoletes RFC 6982, advancing it to a Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="205"/>
          <seriesInfo name="RFC" value="7942"/>
          <seriesInfo name="DOI" value="10.17487/RFC7942"/>
        </reference>
        <reference anchor="CalSpam" target="https://standards.calconnect.org/csd/cc-18003.html">
          <front>
            <title>Calendar operator practices — Guidelines to protect against calendar abuse</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="MachineReadable" target="https://csrc.nist.gov/glossary/term/Machine_Readable">
          <front>
            <title>NIST IR 7511 Rev 4</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 307?>

<section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The authors wish to thank [your name here, please]</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
