<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.36 (Ruby 3.4.9) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-sml-trust-01" category="std" consensus="true" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="SML Trust">Trust and security considerations for Structured Email</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-sml-trust-01"/>
    <author initials="H.-J." surname="Happel" fullname="Hans-Joerg Happel">
      <organization>audriga</organization>
      <address>
        <email>happel@audriga.com</email>
        <uri>https://www.audriga.com</uri>
      </address>
    </author>
    <author initials="A." surname="Gulbrandsen" fullname="Arnt Gulbrandsen">
      <organization>ICANN</organization>
      <address>
        <postal>
          <street>6 Rond Point Schumann, Bd. 1</street>
          <city>Brussels</city>
          <code>1040</code>
          <country>Belgium</country>
        </postal>
        <email>arnt@gulbrandsen.priv.no</email>
        <uri>https://icann.org/ua</uri>
      </address>
    </author>
    <date year="2026" month="May" day="13"/>
    <area>Applications and Real-Time</area>
    <workgroup>sml</workgroup>
    <abstract>
      <?line 43?>

<t>This document discusses trust and security considerations for
structured email and provides
recommendations for message user agents on how to deal with structured
data in email messages.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Structured Email Working Group mailing list (sml@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/sml/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/arnt/sml-trust"/>.</t>
    </note>
  </front>
  <middle>
    <?line 50?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Structured email, as described in <xref target="I-D.sml-structured-email"/>,
makes the content of some email messages machine-readable, such that
user agents can provide higher-level functions than
displaying/replying, for example "add this to calendar".</t>
      <t>Naturally, new functions bring new trust and security considerations,
or bring new urgency to existing issues.  This document recommends
security and trust mechanisms that should be applied when processing
machine-readable content in email messages, both by senders and
receivers.</t>
    </section>
    <section anchor="requirements-language">
      <name>Requirements Language</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="types-of-security-concerns">
      <name>Types of security concerns</name>
      <t>This section gives an overview of the various types of security and
privacy concerns that arise when email messages contain structured
data. The same concerns often arise for other messages, of course.</t>
      <t>This section is informative.</t>
      <section anchor="spamvirus-filters">
        <name>Spam/virus filters</name>
        <t>Structured email increases the syntactical and semantic complexity of
email messages. If a spam/virus filter parses structured email in
order to block malevolent messages, the filter's parser will
necessarily differ from that of the MUA that will finally act on the
structured data, creating a risk of misclassification.</t>
        <t>These risks are elevated when a structured data format has complex
syntax, syntax that offers several optional or alternative ways to
express the same substance, and of course by parsers that deviate from
the specification for better bug compatibiloty.</t>
      </section>
      <section anchor="formal-display-of-data">
        <name>Formal display of data</name>
        <t>A common example is displaying a received calendar invitation using
dates/times in the recipient's timezone, in a fixed format.</t>
        <t>Formal display introduces additional possibilities of discrepancy
between the different representations. For example, a single message
might contains a multipart/alternative containing a text/plain
description of a flight itinerary, a text/html description of the same
itinerary, and a structured representation. All three may be
different, leading to confusion (and in this example, perhaps to
missing a flight).</t>
        <t>Unintentional discrepancy is a risk for senders; some recipients may
be misinformed.</t>
        <t>If a message is sent to a group and there is a discrepancy, different
members of the group may see it differently.</t>
        <t>If a particular MUA displays the formal representation within the
message, a malevolent sender could try to mimic the visual
representation using HTML with CSS, but with misleading content.</t>
      </section>
      <section anchor="additional-user-interface-options">
        <name>Additional user interface options</name>
        <t>Structured mail processing may provide the receiving user with
additional commands. Returning to the calendar example, many MUAs
provide the user with additional commands to add something to a
calendar.</t>
      </section>
      <section anchor="automated-processing">
        <name>Automated processing</name>
        <t>Automated processing covers actions that are taken as soon as the
message arrives rather than when a human user reads the message. For
example, a user might want flight reservations to be automatically
added to a travel itinerary application and/or a calendar.</t>
        <t>Such automation could be a custom MUA feature or a future extension of
the Sieve email filtering language (<xref target="RFC5228"/>). A related example
for abuse in automated processing is calendar spam (<xref target="CalSpam"/>).</t>
      </section>
      <section anchor="external-references">
        <name>External references</name>
        <t>Email messages with a text/html body part ("HTML email messages") may
contain image resources that link to web servers. Such links can be
used for tracking user interaction with the message.</t>
        <t>Similar concerns apply to structured data types which include image
references, such as the cover image of a music album or the teaser
image of a news article.</t>
        <t>RDF structured data can be partial by design and include references to
additional data. Using a "follow your nose" approach, tools can follow
URL references to obtain further structured data concerning a
resource. For example, a piece of structured data about an article
could reference the article's authors only by URL. For a meaningful
processing of author information, one might try to obtain further data
using that URL.</t>
      </section>
      <section anchor="social-engineering">
        <name>Social engineering</name>
        <t>While the risks of social engineering are hardly new and the
human-readable text in a message can in principle be used to persuade
the human reader to do anything, structured data widens the variety of
actions the human reader can easily perform. If there are more buttons
to click, then there's also a greater variety of attacks.</t>
        <t>Put differently: A user who might not be able to follow the
instructions in a long and involved text-based social engineering
attack may be able to follow simple instructions such as "click this
then that".</t>
      </section>
    </section>
    <section anchor="trust-mechanisms">
      <name>Trust mechanisms</name>
      <t>Several implementations of structured email restrict processing to
messages that are particularly trusted. That is to say, an incoming
message is in one of these three categories:</t>
      <ol spacing="normal" type="1"><li>
          <t>Spam. Structured data is not processed.</t>
        </li>
        <li>
          <t>Ordinary. Structured data is not processed.</t>
        </li>
        <li>
          <t>Trusted. Structured data is processed.</t>
        </li>
      </ol>
      <t>This section gives an overview of the trust mechanisms used to
differentiate between 2 and 3.</t>
      <t>It does not attempt to describe whether a trust-based mechanism is
appopriate in a particular case.</t>
      <section anchor="processing-structured-data">
        <name>Processing structured data</name>
        <t>MUAs <bcp14>SHOULD</bcp14> display structured data in incoming email messages only if
any of these criteria hold:</t>
        <ul spacing="normal">
          <li>
            <t>Processing the data offers no additional attack surface compared to
displaying the HTML in which the structured data is embedded. This
may often be the case for formal display.</t>
          </li>
          <li>
            <t>Only for MUAs that process calendar invitations/updates: The MUA
would process a calendar invitation in the same message.</t>
          </li>
          <li>
            <t>The sender is trusted (e.g., part of the user's address book) and
the messsage contains a valid personal or domain signature.</t>
          </li>
          <li>
            <t>The message is part of an ongoing thread with a trusted sender.</t>
          </li>
          <li>
            <t>The message's content indicate a connection with an older, trusted
message. For example, if a calendar invitation was accepted, then
updates or responses for the same event are connected with the
original.</t>
          </li>
        </ul>
        <t>Structured data that requires or suggests automatic processing may
benefit from additional precautions before acting on the message.
Documents that specify such data types should discuss how recipients
should decide whether to act.</t>
        <t>Open issue: At some point this document needs to mention JSON Web
Signatures and RFC 7519, ether to use or to ignore.</t>
      </section>
      <section anchor="inlining-data">
        <name>Inlining data</name>
        <t>Structured data included in an email message <bcp14>SHOULD</bcp14> be self-contained in
order to avoid privacy problems.  This implies that if an MUA is able to
provide meaningful user interaction (rather than mere display), then the
data <bcp14>SHOULD</bcp14> be self-contained, such that the interaction will not need
referenced resources from the web.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security considerations</name>
      <t>Security considerations are a core subject of this document.</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy considerations</name>
      <t>Privacy considerations are a core subject of this document.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions at this time.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.sml-structured-email">
          <front>
            <title>*** BROKEN REFERENCE ***</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RFC5228">
          <front>
            <title>Sieve: An Email Filtering Language</title>
            <author fullname="P. Guenther" initials="P." role="editor" surname="Guenther"/>
            <author fullname="T. Showalter" initials="T." role="editor" surname="Showalter"/>
            <date month="January" year="2008"/>
            <abstract>
              <t>This document describes a language for filtering email messages at time of final delivery. It is designed to be implementable on either a mail client or mail server. It is meant to be extensible, simple, and independent of access protocol, mail architecture, and operating system. It is suitable for running on a mail server where users may not be allowed to execute arbitrary programs, such as on black box Internet Message Access Protocol (IMAP) servers, as the base language has no variables, loops, or ability to shell out to external programs. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5228"/>
          <seriesInfo name="DOI" value="10.17487/RFC5228"/>
        </reference>
        <reference anchor="RFC6132">
          <front>
            <title>Sieve Notification Using Presence Information</title>
            <author fullname="R. George" initials="R." surname="George"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="July" year="2011"/>
            <abstract>
              <t>This is a further extension to the Sieve mail filtering language Notification extension, defining presence information that may be checked through the notify_method_capability feature. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6132"/>
          <seriesInfo name="DOI" value="10.17487/RFC6132"/>
        </reference>
        <reference anchor="RFC6134">
          <front>
            <title>Sieve Extension: Externally Stored Lists</title>
            <author fullname="A. Melnikov" initials="A." surname="Melnikov"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="July" year="2011"/>
            <abstract>
              <t>The Sieve email filtering language can be used to implement email whitelisting, blacklisting, personal distribution lists, and other sorts of list matching. Currently, this requires that all members of such lists be hard-coded in the script itself. Whenever a member of a list is added or deleted, the script needs to be updated and possibly uploaded to a mail server.</t>
              <t>This document defines a Sieve extension for accessing externally stored lists -- lists whose members are stored externally to the script, such as using the Lightweight Directory Access Protocol (LDAP), the Application Configuration Access Protocol (ACAP), vCard Extensions to WebDAV (CardDAV), or relational databases. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6134"/>
          <seriesInfo name="DOI" value="10.17487/RFC6134"/>
        </reference>
        <reference anchor="RFC7942">
          <front>
            <title>Improving Awareness of Running Code: The Implementation Status Section</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>This document describes a simple process that allows authors of Internet-Drafts to record the status of known implementations by including an Implementation Status section. This will allow reviewers and working groups to assign due consideration to documents that have the benefit of running code, which may serve as evidence of valuable experimentation and feedback that have made the implemented protocols more mature.</t>
              <t>This process is not mandatory. Authors of Internet-Drafts are encouraged to consider using the process for their documents, and working groups are invited to think about applying the process to all of their protocol specifications. This document obsoletes RFC 6982, advancing it to a Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="205"/>
          <seriesInfo name="RFC" value="7942"/>
          <seriesInfo name="DOI" value="10.17487/RFC7942"/>
        </reference>
        <reference anchor="CalSpam" target="https://standards.calconnect.org/csd/cc-18003.html">
          <front>
            <title>Calendar operator practices — Guidelines to protect against calendar abuse</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="MachineReadable" target="https://csrc.nist.gov/glossary/term/Machine_Readable">
          <front>
            <title>NIST IR 7511 Rev 4</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 248?>

<section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The authors wish to thank Ben Bucksch, Alexey Melnikov, Phillip Tao,
Lisa Dusseault, Orie Steele, Daniel Kahn Gillmor, and others whose
suggestions were made before this paragraph was started.</t>
    </section>
    <section anchor="note-to-self">
      <name>Note to self</name>
      <t>RFC Editor: Please remove this section.</t>
      <t>The charter has this to say about what this document should contain:
"Recommendations for security and trust mechanisms that should be
applied when processing machine-readable content in email messages"
and "security and trust recommendations to prevent abuse of structured
email". No more, no less.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
