<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.4 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-dweekly-wrong-recipient-02" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.19.0 -->
  <front>
    <title abbrev="Wrong Recipient">Adding a Wrong Recipient URL for Handling Misdirected Emails</title>
    <seriesInfo name="Internet-Draft" value="draft-dweekly-wrong-recipient-02"/>
    <author fullname="David Weekly">
      <organization>Capital One</organization>
      <address>
        <email>david@weekly.org</email>
      </address>
    </author>
    <date year="2024" month="January" day="11"/>
    <keyword>next generation</keyword>
    <keyword>unicorn</keyword>
    <keyword>sparkling distributed ledger</keyword>
    <abstract>
      <?line 38?>

<t>This document describes a mechanism for an email recipient to indicate to a
sender that they are not the intended recipient.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://dweekly.github.io/ietf-wrong-recipient/draft-dweekly-wrong-recipient.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-dweekly-wrong-recipient/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/dweekly/ietf-wrong-recipient"/>.</t>
    </note>
  </front>
  <middle>
    <?line 43?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Many users with common names and/or short email addresses receive
transactional emails from service providers intended for others. These
emails can't be unsubscribed (as they are transactional) but neither are
they spam. These emails commonly are from a noreply@ email address; there
is no standards-based mechanism to report a "wrong recipient" to the
sender. Doing so is in the interest of all three involved parties: the
inadvertent recipient (who does not want the email), the sender (who wants
to be able to reach their customer and who does not want the liability of
transmitting PII to a third party), and the valid recipient.</t>
      <t>This document proposes a structured mechanism for the reporting of such
misdirected email via either HTTPS POST or email inbox, directly mirroring
the List-Unsubscribe and List-Unsubscribe-Post mechanisms of <xref target="RFC2369"/> and
<xref target="RFC8058"/> respectively.</t>
    </section>
    <section anchor="proposal">
      <name>Proposal</name>
      <t>There ought be a mechanism whereby a service can indicate
it has an endpoint to indicate a "wrong recipient" of an email. If this
header field is present in an email message, the user can select an option to
indicate that they are not the intended recipient.</t>
      <t>Similar to one-click unsubscription <xref target="RFC8058"/>, the mail service can
perform this action in the background as an HTTPS POST to the provided
URL without requiring the user's further attention to the matter. A
mailto: URI may also be included for non-HTTP MUAs, akin to List-Unsubscribe
from <xref target="RFC2369"/>.</t>
      <t>Since it's possible the user may have a separate valid account with the
sending service, it may be important that the sender be able to tie
<em>which</em> email was sent to the wrong recipient. For this reason, the
sender may also include an opaque blob in the header field to specify the
account ID referenced in the email; this is included in the POST.</t>
      <t>Note that this kind of misdelivery shouldn't be possible if a service
has previously verified the user's email address for the account.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="high-level-goals">
      <name>High-Level Goals</name>
      <t>Allow a recipient to stop receiving emails intended for someone else.</t>
      <t>Allow a service to discover when they have the wrong email for a user.</t>
    </section>
    <section anchor="out-of-scope">
      <name>Out of Scope</name>
      <t>This document does not propose a mechanism for automatically discovering
whether a given user is the correct recipient of an email, though it is
possible to use some of the signals in an email, such as the intended
recipient name, to infer a possible mismatch between actual and intended
recipients.</t>
    </section>
    <section anchor="implementation">
      <name>Implementation</name>
      <section anchor="mail-senders-when-sending">
        <name>Mail Senders When Sending</name>
        <t>Mail Senders that wish to be notified when a misdelivery has occurred
<bcp14>SHOULD</bcp14> include a Wrong-Recipient header field with an HTTPS URI to which the
recipient's mail client can POST and/or a mailto: URI to which an email
should be sent. If this header field is included, the mail sender <bcp14>MUST</bcp14>
ensure these endpoints are valid for a period of at least one year after
sending.</t>
        <t>The sender <bcp14>MUST</bcp14> encode a mapping to the underlying account identifier
in the URI in order to allow the service to know which of their accounts
has an incorrect email.</t>
        <t>The URI <bcp14>SHOULD</bcp14> include an opaque identifier or another hard-to-forge
component in addition to, or instead of, the plaintext recipient email
address and user ID in order to prevent a malicious party from exercising
the endpoint on a victim's behalf. Possible examples include using a
signature parameter to the URI or UUID with a sender-local database
lookup to retrieve the email and user ID referenced.</t>
      </section>
      <section anchor="mail-recipients">
        <name>Mail Recipients</name>
        <t>When a mail client receives an email that includes a Wrong-Recipient
header field, an option <bcp14>SHOULD</bcp14> be exposed in the user interface that allows
a recipient to indicate that the mail was intended for another user, if
and only if the email is reasonably assured to not be spam, e.g. if both
DKIM and SPF are passing with a valid DMARC record.</t>
        <t>If the user selects this option, the mail client <bcp14>MUST</bcp14> perform an
HTTPS POST to the first https URI in the Wrong-Recipient header field,
or send an empty message to the first referenced mailto: address.</t>
        <t>The POST request <bcp14>MUST NOT</bcp14> include cookies, HTTP authorization, or any
other context information. The "wrong recipient" reporting operation is
logically unrelated to any previous web activity, and context information
could inappropriately link the report to previous activity.</t>
        <t>The POST body <bcp14>MUST</bcp14> include only "Wrong-Recipient=true".</t>
        <t>If the response is a HTTP 500 type error indicating server issue, the
client <bcp14>MAY</bcp14> retry. If the HTTP response to the POST is a 200, the client
<bcp14>SHOULD NOT</bcp14> retry. No feedback to the user as to the success or failure
of this operation is proposed or required.</t>
      </section>
      <section anchor="mail-senders-after-wrong-sender-notification">
        <name>Mail Senders After Wrong Sender Notification</name>
        <t>When a misdelivery has been indicated by a POST to the HTTPS URI or
email to the given mailto: URI, the sender <bcp14>MUST</bcp14> make a reasonable effort
to cease emails to the indicated email address for that user account.</t>
        <t>The POST endpoint <bcp14>MUST NOT</bcp14> issue an HTTP redirect and <bcp14>SHOULD</bcp14> return a
<tt>200 OK</tt> status; the content body will be ignored.</t>
        <t>Any GET request to the same URI <bcp14>MUST NOT</bcp14> be treated as an indication
of a wrong recipient notification, since anti-spam software may attempt
a GET request to URIs mentioned in mail headers without receiving user
consent. Senders <bcp14>MAY</bcp14> return an error <tt>405 Method Not Allowed</tt> in
response to a GET request to the URI.</t>
        <t>The sender <bcp14>SHOULD</bcp14> make a best effort to attempt to discern a correct
email address for the user account, such as by using a different known
email address for that user, postal mail, text message, phone call,
app push, or presenting a notification in the user interface of the
service. How the sender should accomplish this task is not part of
this specification.</t>
      </section>
    </section>
    <section anchor="additional-requirements">
      <name>Additional Requirements</name>
      <t>The email needs at least one valid authentication identifier.  In
this version of the specification the only supported identifier type
is DKIM <xref target="RFC7489"/>, that provides a domain-level identifier in the
content of the "d=" tag of a validated DKIM-Signature header field.</t>
      <t>The Wrong-Recipient header field needs to be included in the "h=" tag of a
valid DKIM-Signature header field.</t>
    </section>
    <section anchor="examples">
      <name>Examples</name>
      <section anchor="signed-https-uri">
        <name>Signed HTTPS URI</name>
        <t>Header in Email:</t>
        <artwork><![CDATA[
Wrong-Recipient: <https://example.com/wrong-recipient?uid=12345&email=user@example.org&sig=a29c83d>
]]></artwork>
        <t>Resulting POST request</t>
        <artwork><![CDATA[
POST /wrong-recipient?uid=12345&email=user@example.org&sig=a29c83d HTTP/1.1
Host: example.com
Content-Length: 20

Wrong-Recipient=true
]]></artwork>
      </section>
      <section anchor="uuid-https-uri">
        <name>UUID HTTPS URI</name>
        <t>Header in Email:</t>
        <artwork><![CDATA[
Wrong-Recipient: <https://example.com/wrong-recipient?uuid=c002bd9a-e015-468f-8621-9baf6fca12aa>
]]></artwork>
        <t>Resulting POST request</t>
        <artwork><![CDATA[
POST /wrong-recipient?uuid=c002bd9a-e015-468f-8621-9baf6fca12aa HTTP/1.1
Host: example.com
Content-Length: 20

Wrong-Recipient=true
]]></artwork>
      </section>
      <section anchor="combined-mailto-and-https-uris">
        <name>Combined mailto: and HTTPS URIs</name>
        <t>Header in Email:</t>
        <artwork><![CDATA[
Wrong-Recipient:
    <https://example.com/wrong-recipient?uuid=c002bd9a-e015-468f-8621-9baf6fca12aa>,
    <mailto:wrong-recipient.c002bd9a-e015-468f-8621-9baf6fca12aa@example.org>
]]></artwork>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The Wrong-Recipient header field may contain the recipient address, but
that is already exposed in other header fields like To:.</t>
      <t>The user ID of the recipient with the sending service may be exposed
by the Wrong-Recipient URI, which may not be desired but a sender
can instead use an opaque blob to perform a mapping to a user ID on their
end without leaking any information to outside parties, such as the UUID
examples given above.</t>
      <t>A bad actor with access to the user's email could maliciously
indicate the recipient was a Wrong Recipient with any services that
used this protocol, causing mail delivery and potentially account
access difficulties for the user.</t>
      <t>The Wrong-Sender POST provides a strong hint to the mailer that
the address to which the message was sent was valid, and could in
principle be used as a way to test whether an email address is valid.
However, unlike passive methods like embedding tracking pixels, the
mechanism proposed here takes an active user action. Nonetheless,
MUAs ought only expose this Wrong Recipient option if relatively
confident that the email is not spam, using signals such as a valid
DMARC record and passing DKIM &amp; SPF checks.</t>
      <t>A sender with a guessable URI structure and no use of either signed
parameters or a UUID would open themselves up to a malicious party
POST'ing email credentials for victims, potentially causing difficulty.
Senders should be strongly encouraged to use a signature or opaque
blob as suggested.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA has been requested to add a new entry to the "Provisional Message Header Field
Names" registry, to be made permanent if this proposal becomes a standard.</t>
      <artwork><![CDATA[
Header field name: Wrong-Recipient
Protocol: mail
Status: Provisional
Author/Change controller: IETF
Specification document(s): *** This document ***
Related information: none
]]></artwork>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8058">
          <front>
            <title>Signaling One-Click Functionality for List Email Headers</title>
            <author fullname="J. Levine" initials="J." surname="Levine"/>
            <author fullname="T. Herkula" initials="T." surname="Herkula"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes a method for signaling a one-click function for the List-Unsubscribe email header field. The need for this arises out of the actuality that mail software sometimes fetches URLs in mail header fields, and thereby accidentally triggers unsubscriptions in the case of the List-Unsubscribe header field.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8058"/>
          <seriesInfo name="DOI" value="10.17487/RFC8058"/>
        </reference>
        <reference anchor="RFC7489">
          <front>
            <title>Domain-based Message Authentication, Reporting, and Conformance (DMARC)</title>
            <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy"/>
            <author fullname="E. Zwicky" initials="E." role="editor" surname="Zwicky"/>
            <date month="March" year="2015"/>
            <abstract>
              <t>Domain-based Message Authentication, Reporting, and Conformance (DMARC) is a scalable mechanism by which a mail-originating organization can express domain-level policies and preferences for message validation, disposition, and reporting, that a mail-receiving organization can use to improve mail handling.</t>
              <t>Originators of Internet Mail need to be able to associate reliable and authenticated domain identifiers with messages, communicate policies about messages that use those identifiers, and report about mail using those identifiers. These abilities have several benefits: Receivers can provide feedback to Domain Owners about the use of their domains; this feedback can provide valuable insight about the management of internal operations and the presence of external domain name abuse.</t>
              <t>DMARC does not produce or encourage elevated delivery privilege of authenticated email. DMARC is a mechanism for policy distribution that enables increasingly strict handling of messages that fail authentication checks, ranging from no action, through altered delivery, up to message rejection.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7489"/>
          <seriesInfo name="DOI" value="10.17487/RFC7489"/>
        </reference>
        <reference anchor="RFC2369">
          <front>
            <title>The Use of URLs as Meta-Syntax for Core Mail List Commands and their Transport through Message Header Fields</title>
            <author fullname="G. Neufeld" initials="G." surname="Neufeld"/>
            <author fullname="J. Baer" initials="J." surname="Baer"/>
            <date month="July" year="1998"/>
            <abstract>
              <t>The mailing list command specification header fields are a set of structured fields to be added to email messages sent by email distribution lists. By including these header fields, list servers can make it possible for mail clients to provide automated tools for users to perform list functions. This could take the form of a menu item, push button, or other user interface element. The intent is to simplify the user experience, providing a common interface to the often cryptic and varied mailing list manager commands. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2369"/>
          <seriesInfo name="DOI" value="10.17487/RFC2369"/>
        </reference>
      </references>
    </references>
    <?line 280?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Many thanks to John Levine for helping shepherd this document as well
as Oliver Deighton and Murray Kucherawy for their kind and actionable
feedback on the language and first draft of the proposal. Thanks to
Eliot Lear for helping guide the draft to the right hands for review.
Many thanks to the members of IETF ART for vigorous discussion thereof.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
