<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.5 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-dweekly-wrong-recipient-03" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.19.2 -->
  <front>
    <title abbrev="Wrong Recipient">Adding a Wrong Recipient URL for Handling Misdirected Emails</title>
    <seriesInfo name="Internet-Draft" value="draft-dweekly-wrong-recipient-03"/>
    <author fullname="David Weekly">
      <organization/>
      <address>
        <email>david@weekly.org</email>
      </address>
    </author>
    <date year="2024" month="February" day="10"/>
    <keyword>email</keyword>
    <abstract>
      <?line 35?>

<t>This document describes a mechanism for an email recipient to indicate to a
sender that they are not the intended recipient.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://dweekly.github.io/ietf-wrong-recipient/draft-dweekly-wrong-recipient.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-dweekly-wrong-recipient/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/dweekly/ietf-wrong-recipient"/>.</t>
    </note>
  </front>
  <middle>
    <?line 40?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Many users with common names and/or short email addresses receive
transactional emails from service providers intended for others. These
emails can't be unsubscribed (as they are transactional) but neither are
they spam. These emails commonly are from a noreply@ email address; there
is no standards-based mechanism to report a "wrong recipient" to the
sender. Doing so is in the interest of all three involved parties: the
inadvertent recipient (who does not want the email), the sender (who wants
to be able to reach their customer and who does not want the liability of
transmitting PII to a third party), and the valid recipient.</t>
      <t>This document proposes a structured mechanism for the reporting of such
misdirected email via either HTTPS POST or email inbox, directly mirroring
the List-Unsubscribe and List-Unsubscribe-Post mechanisms of <xref target="RFC2369"/> and
<xref target="RFC8058"/> respectively.</t>
    </section>
    <section anchor="proposal">
      <name>Proposal</name>
      <t>There ought be a mechanism whereby a service can indicate
it has an endpoint to indicate a "wrong recipient" of an email. If this
header field is present in an email message, the user can select an option to
indicate that they are not the intended recipient.</t>
      <t>Similar to one-click unsubscription <xref target="RFC8058"/>, the mail service can
perform this action in the background as an HTTPS POST to the provided
URL without requiring the user's further attention to the matter. A
mailto: URI may also be included for non-HTTP MUAs, akin to List-Unsubscribe
from <xref target="RFC2369"/>.</t>
      <t>Since it's possible the user may have a separate valid account with the
sending service, it may be important that the sender be able to tie
<em>which</em> email was sent to the wrong recipient. For this reason, the
sender may also include an opaque blob in the header field to specify the
account ID referenced in the email; this is included in the POST.</t>
      <t>Note that this kind of misdelivery shouldn't be possible if a service
has previously verified the user's email address for the account.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="high-level-goals">
      <name>High-Level Goals</name>
      <t>Allow a recipient to stop receiving emails intended for someone else.</t>
      <t>Allow a service to discover when they have the wrong email for a user.</t>
    </section>
    <section anchor="out-of-scope">
      <name>Out of Scope</name>
      <t>This document does not propose a mechanism for automatically discovering
whether a given user is the correct recipient of an email, though it is
possible to use some of the signals in an email, such as the intended
recipient name, to infer a possible mismatch between actual and intended
recipients.</t>
    </section>
    <section anchor="implementation">
      <name>Implementation</name>
      <section anchor="mail-senders-when-sending">
        <name>Mail Senders When Sending</name>
        <t>Mail Senders that wish to be notified when a misdelivery has occurred
<bcp14>SHOULD</bcp14> include a Wrong-Recipient header field with an HTTPS URI to which the
recipient's mail client can POST and/or a mailto: URI to which an email
should be sent. If this header field is included, the mail sender <bcp14>MUST</bcp14>
ensure these endpoints are valid for a period of at least one year after
sending.</t>
        <t>The sender <bcp14>MUST</bcp14> encode a mapping to the underlying account identifier
in the URI in order to allow the service to know which of their accounts
has an incorrect email.</t>
        <t>The URI <bcp14>SHOULD</bcp14> include an opaque identifier or another hard-to-forge
component in addition to, or instead of, the plaintext recipient email
address and user ID in order to prevent a malicious party from exercising
the endpoint on a victim's behalf. Possible examples include using a
signature parameter to the URI or UUID with a sender-local database
lookup to retrieve the email and user ID referenced.</t>
      </section>
      <section anchor="mail-recipients">
        <name>Mail Recipients</name>
        <t>When a mail client receives an email that includes a Wrong-Recipient
header field, an option <bcp14>SHOULD</bcp14> be exposed in the user interface that allows
a recipient to indicate that the mail was intended for another user, if
and only if the email is reasonably assured to not be spam, e.g. if both
DKIM and SPF are passing with a valid DMARC record.</t>
        <t>If the user selects this option, the mail client <bcp14>MUST</bcp14> perform an
HTTPS POST to the first https URI in the Wrong-Recipient header field,
or send an empty message to the first referenced mailto: address.</t>
        <t>The POST request <bcp14>MUST NOT</bcp14> include cookies, HTTP authorization, or any
other context information. The "wrong recipient" reporting operation is
logically unrelated to any previous web activity, and context information
could inappropriately link the report to previous activity.</t>
        <t>The POST body <bcp14>MUST</bcp14> include only "Wrong-Recipient=true".</t>
        <t>If the response is a HTTP 500 type error indicating server issue, the
client <bcp14>MAY</bcp14> retry. If the HTTP response to the POST is a 200, the client
<bcp14>SHOULD NOT</bcp14> retry. No feedback to the user as to the success or failure
of this operation is proposed or required.</t>
      </section>
      <section anchor="mail-senders-after-wrong-sender-notification">
        <name>Mail Senders After Wrong Sender Notification</name>
        <t>When a misdelivery has been indicated by a POST to the HTTPS URI or
email to the given mailto: URI, the sender <bcp14>MUST</bcp14> make a reasonable effort
to cease emails to the indicated email address for that user account.</t>
        <t>The POST endpoint <bcp14>MUST NOT</bcp14> issue an HTTP redirect and <bcp14>SHOULD</bcp14> return a
<tt>200 OK</tt> status; the content body will be ignored.</t>
        <t>Any GET request to the same URI <bcp14>MUST NOT</bcp14> be treated as an indication
of a wrong recipient notification, since anti-spam software may attempt
a GET request to URIs mentioned in mail headers without receiving user
consent. Senders <bcp14>MAY</bcp14> return an error <tt>405 Method Not Allowed</tt> in
response to a GET request to the URI.</t>
        <t>The sender <bcp14>SHOULD</bcp14> make a best effort to attempt to discern a correct
email address for the user account, such as by using a different known
email address for that user, postal mail, text message, phone call,
app push, or presenting a notification in the user interface of the
service. How the sender should accomplish this task is not part of
this specification.</t>
      </section>
    </section>
    <section anchor="additional-requirements">
      <name>Additional Requirements</name>
      <t>The email needs at least one valid authentication identifier.  In
this version of the specification the only supported identifier type
is DKIM <xref target="RFC7489"/>, that provides a domain-level identifier in the
content of the "d=" tag of a validated DKIM-Signature header field.</t>
      <t>The Wrong-Recipient header field needs to be included in the "h=" tag of a
valid DKIM-Signature header field.</t>
    </section>
    <section anchor="examples">
      <name>Examples</name>
      <section anchor="signed-https-uri">
        <name>Signed HTTPS URI</name>
        <t>Header in Email:</t>
        <artwork><![CDATA[
Wrong-Recipient: <https://example.com/wrong-recipient?uid=12345&email=user@example.org&sig=a29c83d>
]]></artwork>
        <t>Resulting POST request</t>
        <artwork><![CDATA[
POST /wrong-recipient?uid=12345&email=user@example.org&sig=a29c83d HTTP/1.1
Host: example.com
Content-Length: 20

Wrong-Recipient=true
]]></artwork>
      </section>
      <section anchor="uuid-https-uri">
        <name>UUID HTTPS URI</name>
        <t>Header in Email:</t>
        <artwork><![CDATA[
Wrong-Recipient: <https://example.com/wrong-recipient?uuid=c002bd9a-e015-468f-8621-9baf6fca12aa>
]]></artwork>
        <t>Resulting POST request</t>
        <artwork><![CDATA[
POST /wrong-recipient?uuid=c002bd9a-e015-468f-8621-9baf6fca12aa HTTP/1.1
Host: example.com
Content-Length: 20

Wrong-Recipient=true
]]></artwork>
      </section>
      <section anchor="combined-mailto-and-https-uris">
        <name>Combined mailto: and HTTPS URIs</name>
        <t>Header in Email:</t>
        <artwork><![CDATA[
Wrong-Recipient:
    <https://example.com/wrong-recipient?uuid=c002bd9a-e015-468f-8621-9baf6fca12aa>,
    <mailto:wrong-recipient.c002bd9a-e015-468f-8621-9baf6fca12aa@example.org>
]]></artwork>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The Wrong-Recipient header field may contain the recipient address, but
that is already exposed in other header fields like To:.</t>
      <t>The user ID of the recipient with the sending service may be exposed
by the Wrong-Recipient URI, which may not be desired but a sender
can instead use an opaque blob to perform a mapping to a user ID on their
end without leaking any information to outside parties, such as the UUID
examples given above.</t>
      <t>A bad actor with access to the user's email could maliciously
indicate the recipient was a Wrong Recipient with any services that
used this protocol, causing mail delivery and potentially account
access difficulties for the user.</t>
      <t>The Wrong-Sender POST provides a strong hint to the mailer that
the address to which the message was sent was valid, and could in
principle be used as a way to test whether an email address is valid.
However, unlike passive methods like embedding tracking pixels, the
mechanism proposed here takes an active user action. Nonetheless,
MUAs ought only expose this Wrong Recipient option if relatively
confident that the email is not spam, using signals such as a valid
DMARC record and passing DKIM &amp; SPF checks.</t>
      <t>A sender with a guessable URI structure and no use of either signed
parameters or a UUID would open themselves up to a malicious party
POST'ing email credentials for victims, potentially causing difficulty.
Senders should be strongly encouraged to use a signature or opaque
blob as suggested.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA has been requested to add a new entry to the "Provisional Message Header Field
Names" registry, to be made permanent if this proposal becomes a standard.</t>
      <artwork><![CDATA[
Header field name: Wrong-Recipient
Protocol: mail
Status: Provisional
Author/Change controller: IETF
Specification document(s): *** This document ***
Related information: none
]]></artwork>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8058">
          <front>
            <title>Signaling One-Click Functionality for List Email Headers</title>
            <author fullname="J. Levine" initials="J." surname="Levine"/>
            <author fullname="T. Herkula" initials="T." surname="Herkula"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes a method for signaling a one-click function for the List-Unsubscribe email header field. The need for this arises out of the actuality that mail software sometimes fetches URLs in mail header fields, and thereby accidentally triggers unsubscriptions in the case of the List-Unsubscribe header field.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8058"/>
          <seriesInfo name="DOI" value="10.17487/RFC8058"/>
        </reference>
        <reference anchor="RFC7489">
          <front>
            <title>Domain-based Message Authentication, Reporting, and Conformance (DMARC)</title>
            <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy"/>
            <author fullname="E. Zwicky" initials="E." role="editor" surname="Zwicky"/>
            <date month="March" year="2015"/>
            <abstract>
              <t>Domain-based Message Authentication, Reporting, and Conformance (DMARC) is a scalable mechanism by which a mail-originating organization can express domain-level policies and preferences for message validation, disposition, and reporting, that a mail-receiving organization can use to improve mail handling.</t>
              <t>Originators of Internet Mail need to be able to associate reliable and authenticated domain identifiers with messages, communicate policies about messages that use those identifiers, and report about mail using those identifiers. These abilities have several benefits: Receivers can provide feedback to Domain Owners about the use of their domains; this feedback can provide valuable insight about the management of internal operations and the presence of external domain name abuse.</t>
              <t>DMARC does not produce or encourage elevated delivery privilege of authenticated email. DMARC is a mechanism for policy distribution that enables increasingly strict handling of messages that fail authentication checks, ranging from no action, through altered delivery, up to message rejection.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7489"/>
          <seriesInfo name="DOI" value="10.17487/RFC7489"/>
        </reference>
        <reference anchor="RFC2369">
          <front>
            <title>The Use of URLs as Meta-Syntax for Core Mail List Commands and their Transport through Message Header Fields</title>
            <author fullname="G. Neufeld" initials="G." surname="Neufeld"/>
            <author fullname="J. Baer" initials="J." surname="Baer"/>
            <date month="July" year="1998"/>
            <abstract>
              <t>The mailing list command specification header fields are a set of structured fields to be added to email messages sent by email distribution lists. By including these header fields, list servers can make it possible for mail clients to provide automated tools for users to perform list functions. This could take the form of a menu item, push button, or other user interface element. The intent is to simplify the user experience, providing a common interface to the often cryptic and varied mailing list manager commands. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2369"/>
          <seriesInfo name="DOI" value="10.17487/RFC2369"/>
        </reference>
      </references>
    </references>
    <?line 277?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Many thanks to John Levine for helping shepherd this document as well
as Oliver Deighton and Murray Kucherawy for their kind and actionable
feedback on the language and first draft of the proposal. Thanks to
Eliot Lear for helping guide the draft to the right hands for review.
Many thanks to the members of IETF ART for vigorous discussion thereof.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
