<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-happel-structured-email-trust-04" category="std" consensus="true" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.1 -->
  <front>
    <title abbrev="SML Trust">Trust and security considerations for Structured Email</title>
    <seriesInfo name="Internet-Draft" value="draft-happel-structured-email-trust-04"/>
    <author initials="H.-J." surname="Happel" fullname="Hans-Joerg Happel">
      <organization>audriga</organization>
      <address>
        <email>happel@audriga.com</email>
        <uri>https://www.audriga.com</uri>
      </address>
    </author>
    <author initials="A." surname="Gulbrandsen" fullname="Arnt Gulbrandsen">
      <organization>ICANN</organization>
      <address>
        <postal>
          <street>6 Rond Point Schumann, Bd. 1</street>
          <city>Brussels</city>
          <code>1040</code>
          <country>Belgium</country>
        </postal>
        <email>arnt@gulbrandsen.priv.no</email>
        <uri>https://icann.org/ua</uri>
      </address>
    </author>
    <date year="2025" month="May" day="13"/>
    <area>Applications</area>
    <workgroup>sml</workgroup>
    <abstract>
      <?line 47?>

<t>This document discusses trust and security considerations for
structured email and provides
recommendations for message user agents on how to deal with structured
data in email messages.</t>
    </abstract>
  </front>
  <middle>
    <?line 54?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Structured email, as described in <xref target="I-D.sml-structured-email"/>,
makes the content of some email messages machine-readable, such that
user agents can provide higher-level functions than
displaying/replying, for example "add this to calendar".</t>
      <t>Naturally, new functions bring new trust and security considerations,
or bring new urgency to existing issues.  This document discusses
issues related to trust and security of structured email, and provides
advice in some cases.</t>
    </section>
    <section anchor="requirements-language">
      <name>Requirements Language</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="types-of-security-concerns">
      <name>Types of security concerns</name>
      <t>This section gives an overview of the various types of security and
privacy concerns that arise when email messages contain structured
data. The same concerns often arise for other messages, of course.</t>
      <section anchor="spamvirus-filters">
        <name>Spam/virus filters</name>
        <t>Structured email increases the syntactical and semantic complexity of
email messages. If a spam/virus filter parses structured email in
order to block malevolent messages, the filter's parser will
necessarily differ from that of the MUA that will finally act on the
structured data, creating a risk of misclassification.</t>
        <t>These risks are elevated when a structured data format has complex
syntax, syntax that offers several optional or alternative ways to
express the same substance, and of course by parsers that deviate from
the specification for better bug compatibiloty.</t>
      </section>
      <section anchor="formal-display-of-data">
        <name>Formal display of data</name>
        <t>A common example is displaying a received calendar invitation using
dates/times in the recipient's timezone, in a fixed format.</t>
        <t>Formal display introduces additional possibilities of discrepancy
between the different representations. For example, a single message
might contains a multipart/alternative containing a text/plain
description of a flight itinerary, a text/html description of the same
itinerary, and a structured representation. All three may be
different, leading to confusion (and in this example, perhaps to
missing a flight).</t>
        <t>Unintentional discrepancy is a risk for senders; some recipients may
be misinformed.</t>
        <t>If a message is sent to a group and there is a discrepancy, different
members of the group may see it differently.</t>
        <t>If a particular MUA displays the formal representation within the
message, a malevolent sender could try to mimic the visual
representation using HTML with CSS, but with misleading content.</t>
      </section>
      <section anchor="automated-processing">
        <name>Automated processing</name>
        <t>Automated processing covers actions that are taken as soon as the
message arrives rather than when a human user reads the message. For
example, a user might want flight reservations to be automatically
added to a travel itinerary application and/or a calendar.</t>
        <t>Such automation could be a custom MUA feature or a future extension of
the Sieve email filtering language (<xref target="RFC5228"/>). A related example
for abuse in automated processing is calendar spam (<xref target="CalSpam"/>).</t>
      </section>
      <section anchor="external-references">
        <name>External references</name>
        <t>Email messages with a text/html body part ("HTML email messages") may
contain image resources that link to web servers. Such links can be
used for tracking user interaction with the message.</t>
        <t>Similar concerns apply to structured data types which include image
references, such as the cover image of a music album or the teaser
image of a news article.</t>
        <t>RDF structured data can be partial by design and include references to
additional data. Using a "follow your nose" approach, tools can follow
URL references to obtain further structured data concerning a
resource. For example, a piece of structured data about an article
could reference the article's authors only by URL. For a meaningful
processing of author information, one might try to obtain further data
using that URL.</t>
      </section>
      <section anchor="social-engineering">
        <name>Social engineering</name>
        <t>While the risks of social engineering are hardly new and the
human-readable text in a message can in principle be used to persuade
the human reader to do anything, structured data widens the variety of
actions the human reader can easily perform. If there are more buttons
to click, then there's also a greater variety of attacks.</t>
        <t>Put differently: A user who might not be able to follow the
instructions in a long and involved text-based social engineering
attack may be able to follow simple instructions such as "click this
ten that".</t>
      </section>
    </section>
    <section anchor="trust-mechanisms">
      <name>Trust mechanisms</name>
      <t>Several implementations of structured email restrict processing to
messages that are particularly trusted. That is to say, an incoming
message is in one of these three categories:</t>
      <ol spacing="normal" type="1"><li>
          <t>Spam. Structured data is not processed.</t>
        </li>
        <li>
          <t>Ordinary. Structured data is not processed.</t>
        </li>
        <li>
          <t>Trusted. Structured data is processed.</t>
        </li>
      </ol>
      <t>This section gives an overview of the trust mechanisms used at the
time of writing.</t>
      <t>It does not attempt to describe whether a trust-based mechanism is
appopriate in a particular case.</t>
      <t>It is <bcp14>RECOMMENDED</bcp14> to restrict trust to a simple "or", rather than
e.g. an elaborate scoring mechanism that's difficult to understand for
users.</t>
      <section anchor="trusted-senders">
        <name>Trusted senders</name>
        <t>For the case of displaying remote images embedded in HTML email
messages, MUAs often allow users to manually choose if they trust a
certain sender. Sometimes, addresses in the MUA's address book are
considered trusted, or in a special list in the address book. While
this is mentioned in <xref target="RFC6132"/> and <xref target="RFC6134"/>, this mechanism is
currently not standardized.</t>
        <t>Several services manage trust centrally: trusted senders are trusted
by the mail service rather than by the individual users.</t>
        <t>Some services differentiate between local mail and mail that arrived
across the internet, and trust local mail. In particular, one author
has seen that attachments sent by remote senders are distrusted
("warning! do you really want to download this?") while attachments
from senders within the recipient's organization are assumed to be
benevolent.</t>
        <t>OPEN ISSUE: Whether this should discuss combining sender trust with
sender/domain signatures. Pro: A sender that has used DKIM may be
assumed trustworthy if subsequent message also do it, less so if
not. Contra: Isn't this what DMARC does, and best regulated only
there?</t>
      </section>
      <section anchor="sender-signatures">
        <name>Sender signatures</name>
        <t>Sender signatures such as PGP or S/MIME could potentially be used as a
trust indicator. The authors aren't aware of any concrete examples of
this in the past, perhaps because of limited deployment.</t>
      </section>
      <section anchor="domain-signatures">
        <name>Domain signatures</name>
        <t>DKIM defines a signature on sender domain that may be used to verify
that a message was sent by the same sender as an earlier message.</t>
        <t>Some mail hosts restrict structured processing to messages with DKIM
signatures, or to a set of senders who are identified by their DKIM
signatures.</t>
      </section>
      <section anchor="recipient-generated-identifiers">
        <name>Recipient-generated identifiers</name>
        <t>Part of the simplicity of email is the fact that just the email
address is required to reach out to a recipient. This however requires
the the recipient to discern whether a message is desirable or
abusive.</t>
        <t>Recipient-generated transaction identifiers aim to pass a certain
secret to the sender, which helps to prove legitimacy. One such
approach are one-time email aliases, which are generated for a single
transaction or series of transactions.</t>
      </section>
      <section anchor="secrets-and-related-messages">
        <name>Secrets and related messages</name>
        <t>A message may contain a secret or hard-to-guess identifier.</t>
        <t>A message may leverage another message's trust level by referencing an
identifier from the other message.</t>
        <t>For example, a ticket sold by a concert venue may reference the
payment transaction ID that's also mentioned in a message from the
payment processor. If these IDs are difficult to guess and the
receiver trusts the payment processor, then this gives some reason to
trust that the ticket is bona fide and could safely be added to the
user's ticket/wallet app.</t>
        <t>In another example, a message with a calendar update may reference an
identifier from the original calendar entry. If this ID is hard to
guess and the recipient acted on the message containing the original
entry, then this gives some reason to trust that the change is bona
fide.</t>
        <t>OPEN ISSUE: How to specify the secret.</t>
        <t>One possible solution: The leveraging message contains a specification
of sender domain and optinal xpath query, and the MUA decides whether
the sender is on its list. But I don't like having xpath, its interop
is said to be poor and a malevolent sender could specify something
easily guessed. For example, the messages I receive from a popular
payment processor contain my name; an attacker could use an xpath
query that results in my name.</t>
        <t>Another possible solution: The leveraging message specifies the sender
of the leveraged message and the secret, and each MUA contains a
hardcoded xpath query to find the ONLY kind of secret it trusts for
that particular sender.</t>
      </section>
    </section>
    <section anchor="categories-of-use-cases">
      <name>Categories of use cases</name>
      <t>Certain types of structured data might need to be kept more secure
than others. For instance, the structured data representation of a
music album shared by a friend would not contain major personal
information, while e.g., medical records or financial statements
certainly would.</t>
    </section>
    <section anchor="implementation-guidelines">
      <name>Implementation guidelines</name>
      <section anchor="processing-structured-data">
        <name>Processing structured data</name>
        <t>MUAs <bcp14>SHOULD</bcp14> consider structured data in incoming email messages only
if either of these criteria hold:</t>
        <ul spacing="normal">
          <li>
            <t>The sender is trusted (e.g., part of the user's address book) and
the messsage either contains a valid personal or domain signature</t>
          </li>
          <li>
            <t>The message is part of an ongoing thread with a trusted sender</t>
          </li>
        </ul>
        <t>If none of these criteria is fulfilled, MUAs should fall back to
alternative presentations (e.g., "text/html" or "text/plain").</t>
        <t>Open issue 2: Really <bcp14>SHOULD</bcp14>? I (Arnt) don't see this guidance as
clearly right. It doesn't match existing code well, and doesn't seem
to be where we want to go.</t>
      </section>
      <section anchor="inlining-data">
        <name>Inlining data</name>
        <t>Structured data included in an email message should be self-contained
in order to avoid privacy problems.  This implies that if an MUA is
able to provide meaningful user interaction (rather than mere
display), then it should do that without loading additional referenced
resources from the web.</t>
      </section>
    </section>
    <section anchor="implementation-status">
      <name>Implementation status</name>
      <t>RFC Editor: before publication please remove this section and the
reference to <xref target="RFC7942"/>.</t>
      <t>This section records the status of known implementations of the
protocol defined by this specification at the time of posting of this
Internet-Draft, and is based on a proposal described in
<xref target="RFC7942"/>. The description of implementations in this section is
intended to assist the IETF in its decision processes in progressing
drafts to RFCs. Please note that the listing of any individual
implementation here does not imply endorsement by the
IETF. Furthermore, no effort has been spent to verify the information
presented here that was supplied by IETF contributors. This is not
intended as, and must not be construed to be, a catalog of available
implementations or their features. Readers are advised to note that
other implementations may exist.</t>
      <t>According to <xref target="RFC7942"/>, "this will allow reviewers and working groups
to assign due consideration to documents that have the benefit of
running code, which may serve as evidence of valuable experimentation
and feedback that have made the implemented protocols more mature. It
is up to the individual working groups to use this information as they
see fit".</t>
      <section anchor="structured-email-plugin-for-roundcube-webmail">
        <name>Structured Email plugin for Roundcube Webmail</name>
        <t>The plugin currently uses the "trusted sender" feature of Roundcube to
determine if structured data should be processed.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security considerations</name>
      <t>Security considerations are a core subject of this document.</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy considerations</name>
      <t>Privacy considerations are a core subject of this document.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions at this time.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.sml-structured-email">
          <front>
            <title>*** BROKEN REFERENCE ***</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RFC5228">
          <front>
            <title>Sieve: An Email Filtering Language</title>
            <author fullname="P. Guenther" initials="P." role="editor" surname="Guenther"/>
            <author fullname="T. Showalter" initials="T." role="editor" surname="Showalter"/>
            <date month="January" year="2008"/>
            <abstract>
              <t>This document describes a language for filtering email messages at time of final delivery. It is designed to be implementable on either a mail client or mail server. It is meant to be extensible, simple, and independent of access protocol, mail architecture, and operating system. It is suitable for running on a mail server where users may not be allowed to execute arbitrary programs, such as on black box Internet Message Access Protocol (IMAP) servers, as the base language has no variables, loops, or ability to shell out to external programs. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5228"/>
          <seriesInfo name="DOI" value="10.17487/RFC5228"/>
        </reference>
        <reference anchor="RFC6132">
          <front>
            <title>Sieve Notification Using Presence Information</title>
            <author fullname="R. George" initials="R." surname="George"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="July" year="2011"/>
            <abstract>
              <t>This is a further extension to the Sieve mail filtering language Notification extension, defining presence information that may be checked through the notify_method_capability feature. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6132"/>
          <seriesInfo name="DOI" value="10.17487/RFC6132"/>
        </reference>
        <reference anchor="RFC6134">
          <front>
            <title>Sieve Extension: Externally Stored Lists</title>
            <author fullname="A. Melnikov" initials="A." surname="Melnikov"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="July" year="2011"/>
            <abstract>
              <t>The Sieve email filtering language can be used to implement email whitelisting, blacklisting, personal distribution lists, and other sorts of list matching. Currently, this requires that all members of such lists be hard-coded in the script itself. Whenever a member of a list is added or deleted, the script needs to be updated and possibly uploaded to a mail server.</t>
              <t>This document defines a Sieve extension for accessing externally stored lists -- lists whose members are stored externally to the script, such as using the Lightweight Directory Access Protocol (LDAP), the Application Configuration Access Protocol (ACAP), vCard Extensions to WebDAV (CardDAV), or relational databases. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6134"/>
          <seriesInfo name="DOI" value="10.17487/RFC6134"/>
        </reference>
        <reference anchor="RFC7942">
          <front>
            <title>Improving Awareness of Running Code: The Implementation Status Section</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>This document describes a simple process that allows authors of Internet-Drafts to record the status of known implementations by including an Implementation Status section. This will allow reviewers and working groups to assign due consideration to documents that have the benefit of running code, which may serve as evidence of valuable experimentation and feedback that have made the implemented protocols more mature.</t>
              <t>This process is not mandatory. Authors of Internet-Drafts are encouraged to consider using the process for their documents, and working groups are invited to think about applying the process to all of their protocol specifications. This document obsoletes RFC 6982, advancing it to a Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="205"/>
          <seriesInfo name="RFC" value="7942"/>
          <seriesInfo name="DOI" value="10.17487/RFC7942"/>
        </reference>
        <reference anchor="CalSpam" target="https://standards.calconnect.org/csd/cc-18003.html">
          <front>
            <title>Calendar operator practices — Guidelines to protect against calendar abuse</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="MachineReadable" target="https://csrc.nist.gov/glossary/term/Machine_Readable">
          <front>
            <title>NIST IR 7511 Rev 4</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 360?>

<section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The authors wish to thank Ben Bucksch, Alexey Melnikov, Phillip Tao
and others whose suggestions were made before this paragraph was
started.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
