<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.18 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-dweekly-wrong-recipient-06" category="std" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.22.0 -->
  <front>
    <title abbrev="Wrong Recipient">Adding a Wrong Recipient URL for Handling Misdirected Emails</title>
    <seriesInfo name="Internet-Draft" value="draft-dweekly-wrong-recipient-06"/>
    <author fullname="David Weekly">
      <organization/>
      <address>
        <postal>
          <city>Redwood City</city>
          <region>CA</region>
          <country>US</country>
        </postal>
        <email>david@weekly.org</email>
      </address>
    </author>
    <date year="2024" month="August" day="09"/>
    <area>ART</area>
    <keyword>email</keyword>
    <abstract>
      <?line 42?>

<t>This document describes a mechanism for an email recipient to indicate to a
sender that they are not the intended recipient.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://dweekly.github.io/ietf-wrong-recipient/draft-dweekly-wrong-recipient.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-dweekly-wrong-recipient/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/dweekly/ietf-wrong-recipient"/>.</t>
    </note>
  </front>
  <middle>
    <?line 47?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Many users with common names and/or short email addresses receive
transactional emails from service providers intended for others. These
emails can't be unsubscribed (as they are transactional) but neither are
they spam. These emails commonly are from a noreply@ email address; there
is no standards-based mechanism to report a "wrong recipient" to the
sender. Doing so is in the interest of all three involved parties: the
inadvertent recipient (who does not want the email), the sender (who wants
to be able to reach their customer and who does not want the liability of
transmitting PII to a third party), and the intended recipient.</t>
      <t>This document proposes a structured mechanism for the reporting of such
misdirected email via either HTTPS POST or email inbox, directly mirroring
the List-Unsubscribe and List-Unsubscribe-Post mechanisms of <xref target="RFC2369"/> and
<xref target="RFC8058"/> respectively.</t>
    </section>
    <section anchor="proposal">
      <name>Proposal</name>
      <t>There ought be a mechanism whereby a service can indicate
it has an endpoint to indicate a "wrong recipient" of an email. If this
header field is present in an email message, the user can select an option to
indicate that they are not the intended recipient.</t>
      <t>Similar to one-click unsubscription <xref target="RFC8058"/>, the mail service can
perform this action in the background as an HTTPS POST to the provided
URL without requiring the user's further attention to the matter. A
mailto: URI may also be included for non-HTTP MUAs, akin to List-Unsubscribe
from <xref target="RFC2369"/>.</t>
      <t>Since it's possible the user may have a separate valid account with the
sending service, it may be important that the sender be able to tie
<em>which</em> email was sent to the wrong recipient. For this reason, the
sender may also include an opaque blob in the header field to specify the
account ID referenced in the email; this is included in the POST.</t>
      <t>Note that this kind of misdelivery shouldn't be possible if a service
has previously verified the user's email address for the account.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="high-level-goals">
      <name>High-Level Goals</name>
      <t>Allow a recipient to stop receiving emails intended for someone else.</t>
      <t>Allow a service to discover when they have the wrong email for a user.</t>
    </section>
    <section anchor="out-of-scope">
      <name>Out of Scope</name>
      <t>This document does not propose a mechanism for automatically discovering
whether a given user is the correct recipient of an email, though it is
possible to use some of the signals in an email, such as the intended
recipient name, to infer a possible mismatch between actual and intended
recipients.</t>
    </section>
    <section anchor="implementation">
      <name>Implementation</name>
      <section anchor="mail-senders-when-sending">
        <name>Mail Senders When Sending</name>
        <t>Mail Senders that wish to be notified when a misdelivery has occurred
<bcp14>SHOULD</bcp14> include a Wrong-Recipient header field with an HTTPS URI to which the
recipient's mail client can POST and/or a mailto: URI to which an email
should be sent. If this header field is included, the mail sender <bcp14>MUST</bcp14>
ensure these endpoints are valid for a period of at least one year after
sending.</t>
        <t>The sender <bcp14>MUST</bcp14> encode a mapping to the underlying account identifier
in the URI in order to allow the service to know which of their accounts
has an incorrect email.</t>
        <t>The URI <bcp14>SHOULD</bcp14> include an opaque identifier or another hard-to-forge
component in addition to, or instead of, the plaintext recipient email
address and user ID in order to prevent a malicious party from exercising
the endpoint on a victim's behalf. Possible examples include using a
signature parameter to the URI or UUID with a sender-local database
lookup to retrieve the email and user ID referenced.</t>
      </section>
      <section anchor="mail-recipients">
        <name>Mail Recipients</name>
        <t>When a mail client receives an email that includes a Wrong-Recipient
header field, an option <bcp14>SHOULD</bcp14> be exposed in the user interface that allows
a recipient to indicate that the mail was intended for another user, if
and only if the email is reasonably assured to not be spam.</t>
        <t>If the user selects this option, the mail client <bcp14>MUST</bcp14> perform an
HTTPS POST to the first https URI in the Wrong-Recipient header field,
or send an empty message to the first referenced mailto: address.</t>
        <t>To minimize XSRF attacks, the POST request <bcp14>MUST NOT</bcp14> include cookies,
HTTP authorization, or any other context information. The "wrong
recipient" reporting operation is logically unrelated to any previous
web activity, and context information could inappropriately link the
report to previous activity.</t>
        <t>The POST body <bcp14>MUST</bcp14> include only "Wrong-Recipient=true".</t>
        <t>If the response is a HTTP 500 type error indicating server issue, the
client <bcp14>MAY</bcp14> retry. If the HTTP response to the POST is a 200, the client
<bcp14>MUST NOT</bcp14> retry. No feedback to the user as to the success or failure
of this operation is proposed or required.</t>
      </section>
      <section anchor="mail-senders-after-wrong-sender-notification">
        <name>Mail Senders After Wrong Sender Notification</name>
        <t>When a misdelivery has been indicated by a POST to the HTTPS URI or
email to the given mailto: URI, the sender <bcp14>MUST</bcp14> make a reasonable effort
to cease emails to the indicated email address for that user account.</t>
        <t>The POST endpoint <bcp14>MUST NOT</bcp14> issue an HTTP redirect and <bcp14>SHOULD</bcp14> return a
<tt>200 OK</tt> status; the content body will be ignored.</t>
        <t>Any GET request to the same URI <bcp14>MUST NOT</bcp14> be treated as an indication
of a wrong recipient notification, since anti-spam software may attempt
a GET request to URIs mentioned in mail headers without receiving user
consent. Senders <bcp14>MAY</bcp14> return an error <tt>405 Method Not Allowed</tt> in
response to a GET request to the URI. The sender <bcp14>MAY</bcp14> elect
to present a page at this URI responsive to a GET request that
presents the user with a form that allows them to submit the POST.</t>
        <t>The sender <bcp14>SHOULD</bcp14> make a best effort to attempt to discern a correct
email address for the user account, such as by using a different known
email address for that user, postal mail, text message, phone call,
app push, or presenting a notification in the user interface of the
service. How the sender should accomplish this task is not part of
this specification.</t>
      </section>
    </section>
    <section anchor="additional-requirements">
      <name>Additional Requirements</name>
      <t>The email needs at least one valid authentication identifier.  In
this version of the specification the only supported identifier type
is DKIM <xref target="RFC6376"/>, that provides a domain-level identifier in the
content of the "d=" tag of a validated DKIM-Signature header field.</t>
      <t>The Wrong-Recipient header field needs to be included in the "h=" tag of a
valid DKIM-Signature header field.</t>
    </section>
    <section anchor="header-syntax">
      <name>Header Syntax</name>
      <t>The following ABNF imports fields and WSP from <xref target="RFC5322"/> and URI from <xref target="RFC3986"/>.
An https URI, mailto URI, or one of each are permitted. Other URI protocols
<bcp14>MUST NOT</bcp14> be used.</t>
      <artwork><![CDATA[
fields =/ wrong-recipient

wrong-recipient = "Wrong-Recipient:" 0*1WSP "<" URI ">"
    *(0*1WSP "," 0*1WSP "<" URI ">") 0*WSP
]]></artwork>
    </section>
    <section anchor="examples">
      <name>Examples</name>
      <section anchor="signed-https-uri">
        <name>Signed HTTPS URI</name>
        <t>Header in Email:</t>
        <artwork><![CDATA[
Wrong-Recipient: <https://example.com/wrong-recipient?
    uid=12345&email=user@example.org&sig=a29c83d>
]]></artwork>
        <t>Resulting POST request:</t>
        <artwork><![CDATA[
POST /wrong-recipient?uid=12345&email=user@example.org&sig=a29c83d HTTP/1.1
Host: example.com
Content-Length: 20

Wrong-Recipient=true
]]></artwork>
      </section>
      <section anchor="uuid-https-uri">
        <name>UUID HTTPS URI</name>
        <t>Header in Email:</t>
        <artwork><![CDATA[
Wrong-Recipient: <https://example.com/wrong-recipient?
    uuid=c002bd9a-e015-468f-8621-9baf6fca12aa>
]]></artwork>
        <t>Resulting POST request:</t>
        <artwork><![CDATA[
POST /wrong-recipient?uuid=c002bd9a-e015-468f-8621-9baf6fca12aa HTTP/1.1
Host: example.com
Content-Length: 20

Wrong-Recipient=true
]]></artwork>
      </section>
      <section anchor="combined-mailto-and-https-uris">
        <name>Combined mailto: and HTTPS URIs</name>
        <t>Header in Email:</t>
        <artwork><![CDATA[
Wrong-Recipient:
    <https://example.com/wrong-recipient?
        uuid=c002bd9a-e015-468f-8621-9baf6fca12aa>,
    <mailto:wrong-recipient.c002bd9a-e015-468f-8621-9baf6fca12aa
        @example.org>
]]></artwork>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The Wrong-Recipient header field may contain the recipient address, but
that is already exposed in other header fields like To.</t>
      <t>The user ID of the recipient with the sending service may be exposed
by the Wrong-Recipient URI, which may not be desired but a sender
can instead use an opaque blob to perform a mapping to a user ID on their
end without leaking any information to outside parties, such as the UUID
examples given above.</t>
      <t>A bad actor with access to the user's email could maliciously
indicate the recipient was a Wrong Recipient with any services that
used this protocol, causing mail delivery and potentially account
access difficulties for the user.</t>
      <t>The Wrong-Recipient POST provides a strong hint to the mailer that
the address to which the message was sent was valid, and could in
principle be used as a way to test whether an email address is valid.
It also may expose the recipient's location and ISP via IP address.
However, unlike passive methods like embedding tracking pixels, the
mechanism proposed here takes an active user action. Nonetheless,
MUAs ought only expose this Wrong Recipient option if relatively
confident that the email is not spam.</t>
      <t>A sender with a guessable URI structure and no use of either signed
parameters or a UUID would open themselves up to a malicious party
POST'ing email credentials for victims, potentially causing difficulty.
Senders should be strongly encouraged to use a signature or opaque
blob as suggested. No algorithm for creating such a signature or
opaque blob is included in this standard since only the sender needs
to validate the correctness of the hard-to-forge URL.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA has registered a new entry to the "Provisional Message Header Field
Names" registry, to be made permanent if this proposal becomes a standard.</t>
      <artwork><![CDATA[
Header field name: Wrong-Recipient
Protocol: mail
Status: Provisional
Author/Change controller: IETF
Specification document(s): *** This document ***
Related information: none
]]></artwork>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC5322">
          <front>
            <title>Internet Message Format</title>
            <author fullname="P. Resnick" initials="P." role="editor" surname="Resnick"/>
            <date month="October" year="2008"/>
            <abstract>
              <t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of "electronic mail" messages. This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, "Standard for the Format of ARPA Internet Text Messages", updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5322"/>
          <seriesInfo name="DOI" value="10.17487/RFC5322"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8058">
          <front>
            <title>Signaling One-Click Functionality for List Email Headers</title>
            <author fullname="J. Levine" initials="J." surname="Levine"/>
            <author fullname="T. Herkula" initials="T." surname="Herkula"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes a method for signaling a one-click function for the List-Unsubscribe email header field. The need for this arises out of the actuality that mail software sometimes fetches URLs in mail header fields, and thereby accidentally triggers unsubscriptions in the case of the List-Unsubscribe header field.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8058"/>
          <seriesInfo name="DOI" value="10.17487/RFC8058"/>
        </reference>
        <reference anchor="RFC6376">
          <front>
            <title>DomainKeys Identified Mail (DKIM) Signatures</title>
            <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker"/>
            <author fullname="T. Hansen" initials="T." role="editor" surname="Hansen"/>
            <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy"/>
            <date month="September" year="2011"/>
            <abstract>
              <t>DomainKeys Identified Mail (DKIM) permits a person, role, or organization that owns the signing domain to claim some responsibility for a message by associating the domain with the message. This can be an author's organization, an operational relay, or one of their agents. DKIM separates the question of the identity of the Signer of the message from the purported author of the message. Assertion of responsibility is validated through a cryptographic signature and by querying the Signer's domain directly to retrieve the appropriate public key. Message transit from author to recipient is through relays that typically make no substantive change to the message content and thus preserve the DKIM signature.</t>
              <t>This memo obsoletes RFC 4871 and RFC 5672. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="76"/>
          <seriesInfo name="RFC" value="6376"/>
          <seriesInfo name="DOI" value="10.17487/RFC6376"/>
        </reference>
        <reference anchor="RFC2369">
          <front>
            <title>The Use of URLs as Meta-Syntax for Core Mail List Commands and their Transport through Message Header Fields</title>
            <author fullname="G. Neufeld" initials="G." surname="Neufeld"/>
            <author fullname="J. Baer" initials="J." surname="Baer"/>
            <date month="July" year="1998"/>
            <abstract>
              <t>The mailing list command specification header fields are a set of structured fields to be added to email messages sent by email distribution lists. By including these header fields, list servers can make it possible for mail clients to provide automated tools for users to perform list functions. This could take the form of a menu item, push button, or other user interface element. The intent is to simplify the user experience, providing a common interface to the often cryptic and varied mailing list manager commands. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2369"/>
          <seriesInfo name="DOI" value="10.17487/RFC2369"/>
        </reference>
      </references>
    </references>
    <?line 303?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Many thanks to John Levine for helping shepherd this document as well
as Oliver Deighton and Murray Kucherawy for their kind and actionable
feedback on the language and first draft of the proposal. Thanks to
Eliot Lear for helping guide the draft to the right hands for review.
A detailed review by Jim Fenton was much appreciated and caught a number
of key issues. Many thanks to the members of IETF ART for vigorous
discussion thereof.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
