<?xml version="1.0" encoding="utf-8"?>
<!-- name="GENERATOR" content="github.com/mmarkdown/mmark Mmark Markdown Processor - mmark.miek.nl" -->
<rfc version="3" ipr="trust200902" docName="draft-happel-structured-email-trust-00" submissionType="IETF" category="info" xml:lang="en" xmlns:xi="http://www.w3.org/2001/XInclude" indexInclude="true" consensus="true">

<front>
<title>Structured Email: Trust and security considerations</title><seriesInfo value="draft-happel-structured-email-trust-00" stream="IETF" status="informational" name="Internet-Draft"></seriesInfo>
<author initials="H.-J." surname="Happel" fullname="Hans-Joerg Happel"><organization>audriga GmbH</organization><address><postal><street></street>
</postal><email>happel@audriga.com</email>
<uri>https://www.audriga.com</uri>
</address></author><date/>
<area>ART</area>
<workgroup>Network Working Group</workgroup>

<abstract>
<t>This document discusses trust and security considerations for &quot;structured email&quot; ([I-D.happel-structured-email-00]) and provides recommendations for message user agents on how to deal with structured data in email messages.</t>
</abstract>

</front>

<middle>

<section anchor="introduction"><name>Introduction</name>
<t>Structured email aims to make the content of email messages machine-readable, such that algorithms can help users deal more efficiently with their email.</t>
<t>Accordingly, special considerations with respect to security and trust of structured data in emails should apply for such algorithms.</t>
</section>

<section anchor="conventions-used-in-this-document"><name>Conventions Used in This Document</name>
<t>The terms &quot;message&quot; and &quot;email message&quot; refer to &quot;electronic mail messages&quot; or &quot;emails&quot; as specified in <xref target="RFC5322"></xref>. The term &quot;Message User Agent&quot; (MUA) denotes an email client application as per <xref target="RFC5598"></xref>.</t>
<t>The terms &quot;machine-readable data&quot; and &quot;structured data&quot; are used in contrast to &quot;human-readable&quot; messages and denote information expressed &quot;in a structured format (..) which can be consumed by another program using consistent processing logic&quot; <xref target="MachineReadable"></xref>.</t>
<t>The key words &quot;MUST&quot;, &quot;MUST NOT&quot;, &quot;REQUIRED&quot;, &quot;SHALL&quot;, &quot;SHALL NOT&quot;, &quot;SHOULD&quot;, &quot;SHOULD NOT&quot;, &quot;RECOMMENDED&quot;, &quot;NOT RECOMMENDED&quot;, &quot;MAY&quot;, and &quot;OPTIONAL&quot; in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"></xref> <xref target="RFC8174"></xref> when, and only when, they appear in all capitals, as shown here.</t>
</section>

<section anchor="types-of-security-concerns"><name>Types of security concerns</name>
<t>This section discusses security and privacy concerns that may be raised when introducing structured data into email messages.</t>

<section anchor="formal-representation-of-data"><name>Formal representation of data</name>
<t>Structured email aims to provide a machine-readable version of email content. Hence, the machine-readable information typically won't go beyond what is communicated in the human-readable part of email messages.</t>
<t>Accordingly, the major difference is the formal nature of the data, which makes it easier to extract and process. Certain forms of formal data are however already common today, such as (flight) reservation data encoded using barcode or the PKPASS format.</t>
</section>

<section anchor="automated-processing"><name>Automated processing</name>
<t>Structured data in email messages might users want to create certain automated processing chains. For example, a user might want flight reservations to be automatically added to a travel itinerary application.</t>
<t>Such automation could be a custom feature of their MUA or a future extension of the Sieve email filtering language <xref target="RFC5228"></xref>. A related example for abuse in automated processing is calendar spam (<xref target="CalSpam"></xref>).</t>
</section>

<section anchor="external-references"><name>External references</name>
<t>Emails with a text/html body part (&quot;HTML emails&quot;), may contain image resources that link to web servers. Such links can be used for tracking user interaction with their MUA.</t>
<t>Similar concerns would apply to structured data types which include image references, such as the cover image of a music album or the teaser image of a news article.</t>
<t>In addition, RDF structured data might be impartial by design and include mere references for additional data. Using a &quot;follow your nose&quot; approach, tools can try following URL references to obtain further structured data concerning a resource.</t>
<t>For example, a piece of structured data about a news article could opt to reference the article's authors only by URL. For a meaningful processing of author information, one might try to obtain further data using that URL.</t>
</section>
</section>

<section anchor="content-encryption-mechanisms"><name>Content encryption mechanisms</name>
</section>

<section anchor="trust-mechanisms"><name>Trust mechanisms</name>

<section anchor="trusted-senders"><name>Trusted senders</name>
<t>For the case of displaying remote images embedded in HTML emails, MUAs often allow users to manually choose if they trust a certain sender.</t>
<t>In addition, such trusted senders may be added to the MUAs address book or a special list therein.</t>
<t>Besides mentions in related use cases (<xref target="RFC6132"></xref>/<xref target="RFC6134"></xref>) this mechanism is currently not standardized.</t>
</section>

<section anchor="sender-signatures"><name>Sender signatures</name>
</section>

<section anchor="domain-signatures"><name>Domain signatures</name>
</section>

<section anchor="transaction-identifiers"><name>Transaction identifiers</name>
<t>Part of the simplicity of email is the fact that just the email address is required to reach out to a recipient. This however puts burden on the recipient to discern if a message is legitimate or abusive.</t>
<t>Recipient-generated transaction identifiers aim to pass a certain secret to the sender, which helps to prove legitimacy.</t>
<t>One such approach are one-time email aliases, which are generated for a single transaction or series of transactions.</t>
<t>Structured email by itself might also help define special types of structured data that could help to manage and communicate transaction identifiers more easily.</t>

<artwork>Open issues
* Message id?
</artwork>
</section>
</section>

<section anchor="categories-of-use-cases"><name>Categories of use cases</name>
<t>Certain types of structured data might need to be kept more secure than others. For instance, the structured data representation of a music album shared by a friend would not contain major personal information, while e.g., medical records or financial statements certainly would.</t>
</section>

<section anchor="implementation-guidelines"><name>Implementation guidelines</name>

<section anchor="processing-structured-data"><name>Processing structured data</name>
<t>MUAs SHOULD consider structured data in incoming email messages only if:
* The sender is trusted (e.g., part of the user's address book) and the messsage either contains a valid personal or domain signature
* The message is part of an ongoing thread with a trusted sender</t>
<t>If none of those criteria is fulfilled, MUAs should fallback to alternative presentations (e.g., &quot;text/html&quot; or &quot;text/plain&quot; of such message).</t>

<artwork>Open isues
* Github
</artwork>
</section>

<section anchor="inlining-data"><name>Inlining data</name>
<t>Strucutured data included in an email message should be self-contained. This means that a MUA should be able to provide meaningful user interaction also without loading additional referenced resources from the web.</t>

<artwork>Open issues
* Github
</artwork>
</section>
</section>

<section anchor="implementation-status"><name>Implementation status</name>
<t>&lt; RFC Editor: before publication please remove this section and the reference to <xref target="RFC7942"></xref> &gt;</t>
<t>This section records the status of known implementations of the protocol defined by this specification at the time of posting of this Internet-Draft, and is based on a proposal described in <xref target="RFC7942"></xref>. The description of implementations in this section is intended to assist the IETF in its decision processes in progressing drafts to RFCs. Please note that the listing of any individual implementation here does not imply endorsement by the IETF. Furthermore, no effort has been spent to verify the information presented here that was supplied by IETF contributors. This is not intended as, and must not be construed to be, a catalog of available implementations or their features. Readers are advised to note that other implementations may exist.</t>
<t>According to <xref target="RFC7942"></xref>, &quot;this will allow reviewers and working groups to assign due consideration to documents that have the benefit of running code, which may serve as evidence of valuable experimentation and feedback that have made the implemented protocols more mature. It is up to the individual working groups to use this information as they see fit&quot;.</t>

<section anchor="structured-email-plugin-for-roundcube-webmail"><name>Structured Email plugin for Roundcube Webmail</name>
<t>The plugin will currently use the &quot;trusted sender&quot; feature of Roundcube to determine if structured data should be processed.</t>
</section>
</section>

<section anchor="security-considerations"><name>Security considerations</name>
<t>Security considerations are core subject of this document itself.</t>
</section>

<section anchor="privacy-considerations"><name>Privacy considerations</name>
<t>Privacy considerations are core subject of this document itself.</t>
</section>

<section anchor="iana-considerations"><name>IANA Considerations</name>
<t>This document has no IANA actions at this time.</t>
</section>

</middle>

<back>
<references><name>Informative References</name>
<reference anchor="CalSpam" target="https://standards.calconnect.org/csd/cc-18003.html">
  <front>
    <title>Calendar operator practices — Guidelines to protect against calendar abuse (CC/R 18003:2019) </title>
    <author>
      <organization>The Calendaring and Scheduling Consortium (“CalConnect”)</organization>
    </author>
    <date></date>
  </front>
</reference>
<reference anchor="MachineReadable" target="https://csrc.nist.gov/glossary/term/Machine_Readable">
  <front>
    <title>NIST IR 7511 Rev. 4</title>
    <author>
      <organization>NIST</organization>
    </author>
    <date></date>
  </front>
</reference>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml"/>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5228.xml"/>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5322.xml"/>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5598.xml"/>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.6132.xml"/>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.6134.xml"/>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7942.xml"/>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml"/>
</references>

</back>

</rfc>
