<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.5 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-dweekly-wrong-recipient-04" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.19.2 -->
  <front>
    <title abbrev="Wrong Recipient">Adding a Wrong Recipient URL for Handling Misdirected Emails</title>
    <seriesInfo name="Internet-Draft" value="draft-dweekly-wrong-recipient-04"/>
    <author fullname="David Weekly">
      <organization/>
      <address>
        <email>david@weekly.org</email>
      </address>
    </author>
    <date year="2024" month="February" day="10"/>
    <keyword>email</keyword>
    <abstract>
      <?line 37?>

<t>This document describes a mechanism for an email recipient to indicate to a
sender that they are not the intended recipient.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://dweekly.github.io/ietf-wrong-recipient/draft-dweekly-wrong-recipient.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-dweekly-wrong-recipient/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/dweekly/ietf-wrong-recipient"/>.</t>
    </note>
  </front>
  <middle>
    <?line 42?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Many users with common names and/or short email addresses receive
transactional emails from service providers intended for others. These
emails can't be unsubscribed (as they are transactional) but neither are
they spam. These emails commonly are from a noreply@ email address; there
is no standards-based mechanism to report a "wrong recipient" to the
sender. Doing so is in the interest of all three involved parties: the
inadvertent recipient (who does not want the email), the sender (who wants
to be able to reach their customer and who does not want the liability of
transmitting PII to a third party), and the valid recipient.</t>
      <t>This document proposes a structured mechanism for the reporting of such
misdirected email via either HTTPS POST or email inbox, directly mirroring
the List-Unsubscribe and List-Unsubscribe-Post mechanisms of <xref target="RFC2369"/> and
<xref target="RFC8058"/> respectively.</t>
    </section>
    <section anchor="proposal">
      <name>Proposal</name>
      <t>There ought be a mechanism whereby a service can indicate
it has an endpoint to indicate a "wrong recipient" of an email. If this
header field is present in an email message, the user can select an option to
indicate that they are not the intended recipient.</t>
      <t>Similar to one-click unsubscription <xref target="RFC8058"/>, the mail service can
perform this action in the background as an HTTPS POST to the provided
URL without requiring the user's further attention to the matter. A
mailto: URI may also be included for non-HTTP MUAs, akin to List-Unsubscribe
from <xref target="RFC2369"/>.</t>
      <t>Since it's possible the user may have a separate valid account with the
sending service, it may be important that the sender be able to tie
<em>which</em> email was sent to the wrong recipient. For this reason, the
sender may also include an opaque blob in the header field to specify the
account ID referenced in the email; this is included in the POST.</t>
      <t>Note that this kind of misdelivery shouldn't be possible if a service
has previously verified the user's email address for the account.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="high-level-goals">
      <name>High-Level Goals</name>
      <t>Allow a recipient to stop receiving emails intended for someone else.</t>
      <t>Allow a service to discover when they have the wrong email for a user.</t>
    </section>
    <section anchor="out-of-scope">
      <name>Out of Scope</name>
      <t>This document does not propose a mechanism for automatically discovering
whether a given user is the correct recipient of an email, though it is
possible to use some of the signals in an email, such as the intended
recipient name, to infer a possible mismatch between actual and intended
recipients.</t>
    </section>
    <section anchor="implementation">
      <name>Implementation</name>
      <section anchor="mail-senders-when-sending">
        <name>Mail Senders When Sending</name>
        <t>Mail Senders that wish to be notified when a misdelivery has occurred
<bcp14>SHOULD</bcp14> include a Wrong-Recipient header field with an HTTPS URI to which the
recipient's mail client can POST and/or a mailto: URI to which an email
should be sent. If this header field is included, the mail sender <bcp14>MUST</bcp14>
ensure these endpoints are valid for a period of at least one year after
sending.</t>
        <t>The sender <bcp14>MUST</bcp14> encode a mapping to the underlying account identifier
in the URI in order to allow the service to know which of their accounts
has an incorrect email.</t>
        <t>The URI <bcp14>SHOULD</bcp14> include an opaque identifier or another hard-to-forge
component in addition to, or instead of, the plaintext recipient email
address and user ID in order to prevent a malicious party from exercising
the endpoint on a victim's behalf. Possible examples include using a
signature parameter to the URI or UUID with a sender-local database
lookup to retrieve the email and user ID referenced.</t>
      </section>
      <section anchor="mail-recipients">
        <name>Mail Recipients</name>
        <t>When a mail client receives an email that includes a Wrong-Recipient
header field, an option <bcp14>SHOULD</bcp14> be exposed in the user interface that allows
a recipient to indicate that the mail was intended for another user, if
and only if the email is reasonably assured to not be spam, e.g. if both
DKIM and SPF are passing with a valid DMARC record.</t>
        <t>If the user selects this option, the mail client <bcp14>MUST</bcp14> perform an
HTTPS POST to the first https URI in the Wrong-Recipient header field,
or send an empty message to the first referenced mailto: address.</t>
        <t>The POST request <bcp14>MUST NOT</bcp14> include cookies, HTTP authorization, or any
other context information. The "wrong recipient" reporting operation is
logically unrelated to any previous web activity, and context information
could inappropriately link the report to previous activity.</t>
        <t>The POST body <bcp14>MUST</bcp14> include only "Wrong-Recipient=true".</t>
        <t>If the response is a HTTP 500 type error indicating server issue, the
client <bcp14>MAY</bcp14> retry. If the HTTP response to the POST is a 200, the client
<bcp14>SHOULD NOT</bcp14> retry. No feedback to the user as to the success or failure
of this operation is proposed or required.</t>
      </section>
      <section anchor="mail-senders-after-wrong-sender-notification">
        <name>Mail Senders After Wrong Sender Notification</name>
        <t>When a misdelivery has been indicated by a POST to the HTTPS URI or
email to the given mailto: URI, the sender <bcp14>MUST</bcp14> make a reasonable effort
to cease emails to the indicated email address for that user account.</t>
        <t>The POST endpoint <bcp14>MUST NOT</bcp14> issue an HTTP redirect and <bcp14>SHOULD</bcp14> return a
<tt>200 OK</tt> status; the content body will be ignored.</t>
        <t>Any GET request to the same URI <bcp14>MUST NOT</bcp14> be treated as an indication
of a wrong recipient notification, since anti-spam software may attempt
a GET request to URIs mentioned in mail headers without receiving user
consent. Senders <bcp14>MAY</bcp14> return an error <tt>405 Method Not Allowed</tt> in
response to a GET request to the URI.</t>
        <t>The sender <bcp14>SHOULD</bcp14> make a best effort to attempt to discern a correct
email address for the user account, such as by using a different known
email address for that user, postal mail, text message, phone call,
app push, or presenting a notification in the user interface of the
service. How the sender should accomplish this task is not part of
this specification.</t>
      </section>
    </section>
    <section anchor="additional-requirements">
      <name>Additional Requirements</name>
      <t>The email needs at least one valid authentication identifier.  In
this version of the specification the only supported identifier type
is DKIM <xref target="RFC7489"/>, that provides a domain-level identifier in the
content of the "d=" tag of a validated DKIM-Signature header field.</t>
      <t>The Wrong-Recipient header field needs to be included in the "h=" tag of a
valid DKIM-Signature header field.</t>
    </section>
    <section anchor="header-syntax">
      <name>Header Syntax</name>
      <t>The following ABNF imports fields and WSP from <xref target="RFC5322"/> and URI from <xref target="RFC3986"/>.
Only https and mailto URIs are acceptable.</t>
      <artwork><![CDATA[
fields =/ wrong-recipient

wrong-recipient = "Wrong-Recipient:" 0*1WSP "<" URI ">" 0*WSP
URI = *( %x21-7E)    ; As defined in RFC 3986
]]></artwork>
    </section>
    <section anchor="examples">
      <name>Examples</name>
      <section anchor="signed-https-uri">
        <name>Signed HTTPS URI</name>
        <t>Header in Email:</t>
        <artwork><![CDATA[
Wrong-Recipient: <https://example.com/wrong-recipient?uid=12345&email=user@example.org&sig=a29c83d>
]]></artwork>
        <t>Resulting POST request</t>
        <artwork><![CDATA[
POST /wrong-recipient?uid=12345&email=user@example.org&sig=a29c83d HTTP/1.1
Host: example.com
Content-Length: 20

Wrong-Recipient=true
]]></artwork>
      </section>
      <section anchor="uuid-https-uri">
        <name>UUID HTTPS URI</name>
        <t>Header in Email:</t>
        <artwork><![CDATA[
Wrong-Recipient: <https://example.com/wrong-recipient?uuid=c002bd9a-e015-468f-8621-9baf6fca12aa>
]]></artwork>
        <t>Resulting POST request</t>
        <artwork><![CDATA[
POST /wrong-recipient?uuid=c002bd9a-e015-468f-8621-9baf6fca12aa HTTP/1.1
Host: example.com
Content-Length: 20

Wrong-Recipient=true
]]></artwork>
      </section>
      <section anchor="combined-mailto-and-https-uris">
        <name>Combined mailto: and HTTPS URIs</name>
        <t>Header in Email:</t>
        <artwork><![CDATA[
Wrong-Recipient:
    <https://example.com/wrong-recipient?uuid=c002bd9a-e015-468f-8621-9baf6fca12aa>,
    <mailto:wrong-recipient.c002bd9a-e015-468f-8621-9baf6fca12aa@example.org>
]]></artwork>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The Wrong-Recipient header field may contain the recipient address, but
that is already exposed in other header fields like To:.</t>
      <t>The user ID of the recipient with the sending service may be exposed
by the Wrong-Recipient URI, which may not be desired but a sender
can instead use an opaque blob to perform a mapping to a user ID on their
end without leaking any information to outside parties, such as the UUID
examples given above.</t>
      <t>A bad actor with access to the user's email could maliciously
indicate the recipient was a Wrong Recipient with any services that
used this protocol, causing mail delivery and potentially account
access difficulties for the user.</t>
      <t>The Wrong-Sender POST provides a strong hint to the mailer that
the address to which the message was sent was valid, and could in
principle be used as a way to test whether an email address is valid.
However, unlike passive methods like embedding tracking pixels, the
mechanism proposed here takes an active user action. Nonetheless,
MUAs ought only expose this Wrong Recipient option if relatively
confident that the email is not spam, using signals such as a valid
DMARC record and passing DKIM &amp; SPF checks.</t>
      <t>A sender with a guessable URI structure and no use of either signed
parameters or a UUID would open themselves up to a malicious party
POST'ing email credentials for victims, potentially causing difficulty.
Senders should be strongly encouraged to use a signature or opaque
blob as suggested.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA has been requested to add a new entry to the "Provisional Message Header Field
Names" registry, to be made permanent if this proposal becomes a standard.</t>
      <artwork><![CDATA[
Header field name: Wrong-Recipient
Protocol: mail
Status: Provisional
Author/Change controller: IETF
Specification document(s): *** This document ***
Related information: none
]]></artwork>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8058">
          <front>
            <title>Signaling One-Click Functionality for List Email Headers</title>
            <author fullname="J. Levine" initials="J." surname="Levine"/>
            <author fullname="T. Herkula" initials="T." surname="Herkula"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes a method for signaling a one-click function for the List-Unsubscribe email header field. The need for this arises out of the actuality that mail software sometimes fetches URLs in mail header fields, and thereby accidentally triggers unsubscriptions in the case of the List-Unsubscribe header field.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8058"/>
          <seriesInfo name="DOI" value="10.17487/RFC8058"/>
        </reference>
        <reference anchor="RFC7489">
          <front>
            <title>Domain-based Message Authentication, Reporting, and Conformance (DMARC)</title>
            <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy"/>
            <author fullname="E. Zwicky" initials="E." role="editor" surname="Zwicky"/>
            <date month="March" year="2015"/>
            <abstract>
              <t>Domain-based Message Authentication, Reporting, and Conformance (DMARC) is a scalable mechanism by which a mail-originating organization can express domain-level policies and preferences for message validation, disposition, and reporting, that a mail-receiving organization can use to improve mail handling.</t>
              <t>Originators of Internet Mail need to be able to associate reliable and authenticated domain identifiers with messages, communicate policies about messages that use those identifiers, and report about mail using those identifiers. These abilities have several benefits: Receivers can provide feedback to Domain Owners about the use of their domains; this feedback can provide valuable insight about the management of internal operations and the presence of external domain name abuse.</t>
              <t>DMARC does not produce or encourage elevated delivery privilege of authenticated email. DMARC is a mechanism for policy distribution that enables increasingly strict handling of messages that fail authentication checks, ranging from no action, through altered delivery, up to message rejection.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7489"/>
          <seriesInfo name="DOI" value="10.17487/RFC7489"/>
        </reference>
        <reference anchor="RFC2369">
          <front>
            <title>The Use of URLs as Meta-Syntax for Core Mail List Commands and their Transport through Message Header Fields</title>
            <author fullname="G. Neufeld" initials="G." surname="Neufeld"/>
            <author fullname="J. Baer" initials="J." surname="Baer"/>
            <date month="July" year="1998"/>
            <abstract>
              <t>The mailing list command specification header fields are a set of structured fields to be added to email messages sent by email distribution lists. By including these header fields, list servers can make it possible for mail clients to provide automated tools for users to perform list functions. This could take the form of a menu item, push button, or other user interface element. The intent is to simplify the user experience, providing a common interface to the often cryptic and varied mailing list manager commands. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2369"/>
          <seriesInfo name="DOI" value="10.17487/RFC2369"/>
        </reference>
        <reference anchor="RFC5322">
          <front>
            <title>Internet Message Format</title>
            <author fullname="P. Resnick" initials="P." role="editor" surname="Resnick"/>
            <date month="October" year="2008"/>
            <abstract>
              <t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of "electronic mail" messages. This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, "Standard for the Format of ARPA Internet Text Messages", updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5322"/>
          <seriesInfo name="DOI" value="10.17487/RFC5322"/>
        </reference>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
      </references>
    </references>
    <?line 289?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Many thanks to John Levine for helping shepherd this document as well
as Oliver Deighton and Murray Kucherawy for their kind and actionable
feedback on the language and first draft of the proposal. Thanks to
Eliot Lear for helping guide the draft to the right hands for review.
Many thanks to the members of IETF ART for vigorous discussion thereof.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
