<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-happel-structured-email-trust-03" category="std" consensus="true" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.25.0 -->
  <front>
    <title abbrev="SML Trust">Trust and security considerations for Structured Email</title>
    <seriesInfo name="Internet-Draft" value="draft-happel-structured-email-trust-03"/>
    <author initials="H.-J." surname="Happel" fullname="Hans-Joerg Happel">
      <organization>audriga</organization>
      <address>
        <email>happel@audriga.com</email>
        <uri>https://www.audriga.com</uri>
      </address>
    </author>
    <author initials="A." surname="Gulbrandsen" fullname="Arnt Gulbrandsen">
      <organization>ICANN</organization>
      <address>
        <postal>
          <street>6 Rond Point Schumann, Bd. 1</street>
          <city>Brussels</city>
          <code>1040</code>
          <country>Belgium</country>
        </postal>
        <email>arnt@gulbrandsen.priv.no</email>
        <uri>https://icann.org/ua</uri>
      </address>
    </author>
    <date year="2025" month="January" day="15"/>
    <area>Applications</area>
    <workgroup>sml</workgroup>
    <abstract>
      <?line 47?>

<t>This document discusses trust and security considerations for
structured email and provides
recommendations for message user agents on how to deal with structured
data in email messages.</t>
    </abstract>
  </front>
  <middle>
    <?line 54?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Structured email, as described in <xref target="I-D.sml-structured-email"/>,
makes the content of some email messages machine-readable, such that
user agents can provide higher-level functions than
displaying/replying, for example "add this to calendar".</t>
      <t>Naturally, new functions bring new trust and security considerations,
or bring new urgency to existing issues.  This document discusses
issues related to trust and security of structured email, and provides
advice in some cases.</t>
    </section>
    <section anchor="requirements-language">
      <name>Requirements Language</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="types-of-security-concerns">
      <name>Types of security concerns</name>
      <t>This section gives an overview of the various types of security and
privacy concerns that arise when email messages contain structured
data. The same concerns often arise for other messages, of course.</t>
      <section anchor="spamvirus-filters">
        <name>Spam/virus filters</name>
        <t>Structured email increases the syntactical and semantic complexity of
email messages. If a spam/virus filter parses structured email in
order to block malevolent messages, the filter's parser will
necessarily differ from that of the MUA that will finally act on the
structured data, creating a risk of misclassification.</t>
        <t>These risks are elevated when a structured data format has complex
syntax, syntax that offers several optional or alternative ways to
express the same substance, and of course by parsers that deviate from
the specification for better bug compatibiloty.</t>
      </section>
      <section anchor="formal-display-of-data">
        <name>Formal display of data</name>
        <t>A common example is displaying a received calendar invitation using
dates/times in the recipient's timezone, in a fixed format.</t>
        <t>Formal display introduces additional possibilities of discrepancy
between the different representations. For example, a single message
might contains a multipart/alternative containing a text/plain
description of a flight itinerary, a text/html description of the same
itinerary, and a structured representation. All three may be
different, leading to confusion (and in this example, perhaps to
missing a flight).</t>
        <t>Unintentional discrepancy is a risk for senders; some recipients may
be misinformed.</t>
        <t>If a message is sent to a group and there is a discrepancy, different
members of the group may see it differently.</t>
        <t>If a particular MUA displays the formal representation within the
message, a malevolent sender could try to mimic the visual
representation using HTML with CSS, but with misleading content.</t>
      </section>
      <section anchor="automated-processing">
        <name>Automated processing</name>
        <t>Automated processing covers actions that are taken as soon as the
message arrives rather than when a human user reads the message. For
example, a user might want flight reservations to be automatically
added to a travel itinerary application and/or a calendar.</t>
        <t>Such automation could be a custom MUA feature or a future extension of
the Sieve email filtering language (<xref target="RFC5228"/>). A related example
for abuse in automated processing is calendar spam (<xref target="CalSpam"/>).</t>
      </section>
      <section anchor="external-references">
        <name>External references</name>
        <t>Email messages with a text/html body part ("HTML email messages") may
contain image resources that link to web servers. Such links can be
used for tracking user interaction with the message.</t>
        <t>Similar concerns apply to structured data types which include image
references, such as the cover image of a music album or the teaser
image of a news article.</t>
        <t>RDF structured data can be partial by design and include references to
additional data. Using a "follow your nose" approach, tools can follow
URL references to obtain further structured data concerning a
resource. For example, a piece of structured data about an article
could reference the article's authors only by URL. For a meaningful
processing of author information, one might try to obtain further data
using that URL.</t>
      </section>
      <section anchor="social-engineering">
        <name>Social engineering</name>
        <t>While the risks of social engineering are hardly new and the
human-readable text in a message can in principle be used to persuade
the human reader to do anything, structured data widens the variety of
actions the human reader can easily perform. If there are more buttons
to click, then there's also a greater variety of attacks.</t>
        <t>Put differently: A user who might not be able to follow the
instructions in a long and involved text-based social engineering
attack may be able to follow simple instructions such as "click this
ten that".</t>
      </section>
    </section>
    <section anchor="trust-mechanisms">
      <name>Trust mechanisms</name>
      <t>Several implementations of structured email restrict processing to
messages that are particularly trusted. That is to say, an incoming
message is in one of these three categories:</t>
      <ol spacing="normal" type="1"><li>
          <t>Spam. Structured data is not processed.</t>
        </li>
        <li>
          <t>Ordinary. Structured data is not processed.</t>
        </li>
        <li>
          <t>Trusted. Structured data is processed.</t>
        </li>
      </ol>
      <t>This section gives an overview of the trust mechanisms used at the
time of writing.</t>
      <t>It does not attempt to describe whether a trust-based mechanism is
appopriate in a particular case.</t>
      <t>It is <bcp14>RECOMMENDED</bcp14> to restrict trust to a simple "or", rather than
e.g. an elaborate scoring mechanism that's difficult to understand for
users.</t>
      <section anchor="trusted-senders">
        <name>Trusted senders</name>
        <t>For the case of displaying remote images embedded in HTML email
messages, MUAs often allow users to manually choose if they trust a
certain sender. Sometimes, addresses in the MUA's address book are
considered trusted, or in a special list in the address book. While
this is mentioned in <xref target="RFC6132"/> and <xref target="RFC6134"/>, this mechanism is
currently not standardized.</t>
        <t>Several services manage trust centrally: trusted senders are trusted
by the mail service rather than by the individual users.</t>
        <t>Some services differentiate between local mail and mail that arrived
across the internet, and trust local mail. In particular, one author
has seen that attachments sent by remote senders are distrusted
("warning! do you really want to download this?") while attachments
from local senders are assumed to be benevolent.</t>
      </section>
      <section anchor="sender-signatures">
        <name>Sender signatures</name>
        <t>Sender signatures such as PGP or S/MIME could potentially be used as a
trust indicator. The authors aren't aware of any concrete examples of
this in the past, perhaps because of limited deployment.</t>
      </section>
      <section anchor="domain-signatures">
        <name>Domain signatures</name>
        <t>DKIM defines a signature on sender domain that may be used to verify
that a message was sent by the same sender as an earlier message.</t>
        <t>Some mail hosts restrict structured processing to messages with DKIM
signatures, or to a set of senders who are identified by their DKIM
signatures.</t>
      </section>
      <section anchor="transaction-identifiers">
        <name>Transaction identifiers</name>
        <t>Part of the simplicity of email is the fact that just the email
address is required to reach out to a recipient. This however requires
the the recipient to discern whether a message is desirable or
abusive.</t>
        <t>Recipient-generated transaction identifiers aim to pass a certain
secret to the sender, which helps to prove legitimacy. One such
approach are one-time email aliases, which are generated for a single
transaction or series of transactions.</t>
      </section>
      <section anchor="secrets-and-related-messages">
        <name>Secrets and related messages</name>
        <t>A message may contain a secret or hard-to-guess identifier.</t>
        <t>POSSIBLE TEXT: A message may leverage another message's trust level by
referencing an identifier from the other message. For example, a
ticket sold by a concert venue may reference the payment transaction
ID that's also mentioned in a message from the payment processor. If
these IDs are difficult to guess and the receiver trusts the payment
processor, then this gives some reason to trust that the ticket is
bona fide.</t>
      </section>
    </section>
    <section anchor="categories-of-use-cases">
      <name>Categories of use cases</name>
      <t>Certain types of structured data might need to be kept more secure
than others. For instance, the structured data representation of a
music album shared by a friend would not contain major personal
information, while e.g., medical records or financial statements
certainly would.</t>
    </section>
    <section anchor="implementation-guidelines">
      <name>Implementation guidelines</name>
      <section anchor="processing-structured-data">
        <name>Processing structured data</name>
        <t>MUAs <bcp14>SHOULD</bcp14> consider structured data in incoming email messages only
if either of these criteria hold:</t>
        <ul spacing="normal">
          <li>
            <t>The sender is trusted (e.g., part of the user's address book) and
the messsage either contains a valid personal or domain signature</t>
          </li>
          <li>
            <t>The message is part of an ongoing thread with a trusted sender</t>
          </li>
        </ul>
        <t>If none of these criteria is fulfilled, MUAs should fall back to
alternative presentations (e.g., "text/html" or "text/plain").</t>
        <t>Open issue 2: Really <bcp14>SHOULD</bcp14>? I (Arnt) don't see this guidance as
clearly right. It doesn't match existing code well, and doesn't seem
to be where we want to go.</t>
      </section>
      <section anchor="inlining-data">
        <name>Inlining data</name>
        <t>Structured data included in an email message should be self-contained
in order to avoid privacy problems.  This implies that if an MUA is
able to provide meaningful user interaction (rather than mere
display), then it should do that without loading additional referenced
resources from the web.</t>
      </section>
    </section>
    <section anchor="implementation-status">
      <name>Implementation status</name>
      <t>RFC Editor: before publication please remove this section and the
reference to <xref target="RFC7942"/>.</t>
      <t>This section records the status of known implementations of the
protocol defined by this specification at the time of posting of this
Internet-Draft, and is based on a proposal described in
<xref target="RFC7942"/>. The description of implementations in this section is
intended to assist the IETF in its decision processes in progressing
drafts to RFCs. Please note that the listing of any individual
implementation here does not imply endorsement by the
IETF. Furthermore, no effort has been spent to verify the information
presented here that was supplied by IETF contributors. This is not
intended as, and must not be construed to be, a catalog of available
implementations or their features. Readers are advised to note that
other implementations may exist.</t>
      <t>According to <xref target="RFC7942"/>, "this will allow reviewers and working groups
to assign due consideration to documents that have the benefit of
running code, which may serve as evidence of valuable experimentation
and feedback that have made the implemented protocols more mature. It
is up to the individual working groups to use this information as they
see fit".</t>
      <section anchor="structured-email-plugin-for-roundcube-webmail">
        <name>Structured Email plugin for Roundcube Webmail</name>
        <t>The plugin currently uses the "trusted sender" feature of Roundcube to
determine if structured data should be processed.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security considerations</name>
      <t>Security considerations are a core subject of this document.</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy considerations</name>
      <t>Privacy considerations are a core subject of this document.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions at this time.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.sml-structured-email">
          <front>
            <title>*** BROKEN REFERENCE ***</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RFC5228">
          <front>
            <title>Sieve: An Email Filtering Language</title>
            <author fullname="P. Guenther" initials="P." role="editor" surname="Guenther"/>
            <author fullname="T. Showalter" initials="T." role="editor" surname="Showalter"/>
            <date month="January" year="2008"/>
            <abstract>
              <t>This document describes a language for filtering email messages at time of final delivery. It is designed to be implementable on either a mail client or mail server. It is meant to be extensible, simple, and independent of access protocol, mail architecture, and operating system. It is suitable for running on a mail server where users may not be allowed to execute arbitrary programs, such as on black box Internet Message Access Protocol (IMAP) servers, as the base language has no variables, loops, or ability to shell out to external programs. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5228"/>
          <seriesInfo name="DOI" value="10.17487/RFC5228"/>
        </reference>
        <reference anchor="RFC6132">
          <front>
            <title>Sieve Notification Using Presence Information</title>
            <author fullname="R. George" initials="R." surname="George"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="July" year="2011"/>
            <abstract>
              <t>This is a further extension to the Sieve mail filtering language Notification extension, defining presence information that may be checked through the notify_method_capability feature. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6132"/>
          <seriesInfo name="DOI" value="10.17487/RFC6132"/>
        </reference>
        <reference anchor="RFC6134">
          <front>
            <title>Sieve Extension: Externally Stored Lists</title>
            <author fullname="A. Melnikov" initials="A." surname="Melnikov"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="July" year="2011"/>
            <abstract>
              <t>The Sieve email filtering language can be used to implement email whitelisting, blacklisting, personal distribution lists, and other sorts of list matching. Currently, this requires that all members of such lists be hard-coded in the script itself. Whenever a member of a list is added or deleted, the script needs to be updated and possibly uploaded to a mail server.</t>
              <t>This document defines a Sieve extension for accessing externally stored lists -- lists whose members are stored externally to the script, such as using the Lightweight Directory Access Protocol (LDAP), the Application Configuration Access Protocol (ACAP), vCard Extensions to WebDAV (CardDAV), or relational databases. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6134"/>
          <seriesInfo name="DOI" value="10.17487/RFC6134"/>
        </reference>
        <reference anchor="RFC7942">
          <front>
            <title>Improving Awareness of Running Code: The Implementation Status Section</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>This document describes a simple process that allows authors of Internet-Drafts to record the status of known implementations by including an Implementation Status section. This will allow reviewers and working groups to assign due consideration to documents that have the benefit of running code, which may serve as evidence of valuable experimentation and feedback that have made the implemented protocols more mature.</t>
              <t>This process is not mandatory. Authors of Internet-Drafts are encouraged to consider using the process for their documents, and working groups are invited to think about applying the process to all of their protocol specifications. This document obsoletes RFC 6982, advancing it to a Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="205"/>
          <seriesInfo name="RFC" value="7942"/>
          <seriesInfo name="DOI" value="10.17487/RFC7942"/>
        </reference>
        <reference anchor="CalSpam" target="https://standards.calconnect.org/csd/cc-18003.html">
          <front>
            <title>Calendar operator practices — Guidelines to protect against calendar abuse</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="MachineReadable" target="https://csrc.nist.gov/glossary/term/Machine_Readable">
          <front>
            <title>NIST IR 7511 Rev 4</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 330?>

<section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The authors wish to thank [your name here, please]</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
