<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.18 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-mailmaint-wrong-recipient-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.22.0 -->
  <front>
    <title abbrev="Wrong Recipient">Adding a Wrong Recipient URL for Handling Misdirected Emails</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-mailmaint-wrong-recipient-00"/>
    <author fullname="David Weekly">
      <organization/>
      <address>
        <postal>
          <city>Redwood City</city>
          <region>CA</region>
          <country>US</country>
        </postal>
        <email>david@weekly.org</email>
      </address>
    </author>
    <date year="2024" month="August" day="12"/>
    <area>ART</area>
    <workgroup>MAILMAINT</workgroup>
    <keyword>email</keyword>
    <abstract>
      <?line 42?>

<t>This document describes a mechanism for an email recipient to indicate to a
sender that they are not the intended recipient.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://dweekly.github.io/ietf-wrong-recipient/draft-ietf-mailmaint-wrong-recipient.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-mailmaint-wrong-recipient/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        MAILMAINT Working Group mailing list (<eref target="mailto:mailmaint@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/mailmaint/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/mailmaint/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/dweekly/ietf-wrong-recipient"/>.</t>
    </note>
  </front>
  <middle>
    <?line 47?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Many users with common names and/or short email addresses receive
transactional emails from service providers intended for others. These
emails can't be unsubscribed (as they are transactional) but neither are
they spam. These emails commonly are from a noreply@ email address; there
is no standards-based mechanism to report a "wrong recipient" to the
sender. Doing so is in the interest of all three involved parties: the
inadvertent recipient (who does not want the email), the sender (who wants
to be able to reach their customer and who does not want the liability of
transmitting PII to a third party), and the intended recipient.</t>
      <t>This document specifies a structured mechanism for the reporting of such
misdirected email via either HTTPS POST or email inbox, directly mirroring
the List-Unsubscribe and List-Unsubscribe-Post mechanisms of <xref target="RFC2369"/> and
<xref target="RFC8058"/> respectively.</t>
    </section>
    <section anchor="description">
      <name>Description</name>
      <t>If the Wrong-Recipient header field is present in an email message,
and the message is determined to likely not be spam, the user can select
an option to indicate that they are not the intended recipient, and the
sender is notified.</t>
      <t>Similar to one-click unsubscription <xref target="RFC8058"/>, the mail service can
perform this action in the background as an HTTPS POST to a provided
URL without requiring the user's further attention to the matter. A
mailto: URI may also be included for non-HTTP MUAs, akin to List-Unsubscribe
from <xref target="RFC2369"/>.</t>
      <t>For example of when this might be used, suppose a cable TV provider enrolls
a new subscriber over the phone. The agent enrolling the customer may
accidentally enter the wrong email address for their customer. A month
later, the provider sends a bill to this email address, which may be valid
but belongs to the wrong person. The mechanism described here gives the
inadvertent recipient a mechanism to notify the provider that they need to
update their records.</t>
      <t>Since it's possible the user may have a separate valid account with the
sending service, it may be important that the sender be able to tie
<em>which</em> email was sent to the wrong recipient. For this reason, the
sender may also include an opaque blob in the header field to specify the
account ID referenced in the email; this is included in the POST.</t>
      <t>Note that this kind of misdelivery shouldn't be possible if a service
has previously verified the user's email address for the account.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="high-level-goals">
      <name>High-Level Goals</name>
      <t>Allow a recipient to stop receiving emails intended for someone else.</t>
      <t>Allow a service to discover when they have the wrong email for a user.</t>
    </section>
    <section anchor="out-of-scope">
      <name>Out of Scope</name>
      <t>This document does not propose a mechanism for automatically discovering
whether a given user is the correct recipient of an email, though it is
possible to use some of the signals in an email, such as the intended
recipient name, to infer a possible mismatch between actual and intended
recipients.</t>
    </section>
    <section anchor="implementation">
      <name>Implementation</name>
      <section anchor="mail-senders-when-sending">
        <name>Mail Senders When Sending</name>
        <t>Mail Senders that wish to be notified when a misdelivery has occurred
<bcp14>SHOULD</bcp14> include a Wrong-Recipient header field with an HTTPS URI to which the
recipient's mail client can POST and/or a mailto: URI to which an email
should be sent. If this header field is included, the mail sender <bcp14>MUST</bcp14>
ensure these endpoints are valid for a period of at least one year after
sending.</t>
        <t>The sender <bcp14>MUST</bcp14> encode a mapping to the underlying account identifier
in the URI in order to allow the service to know which of their accounts
has an incorrect email.</t>
        <t>The URI <bcp14>SHOULD</bcp14> include an opaque identifier or another hard-to-forge
component in addition to, or instead of, the plaintext recipient email
address and user ID in order to prevent a malicious party from exercising
the endpoint on a victim's behalf. Possible examples include using a
signature parameter to the URI or UUID with a sender-local database
lookup to retrieve the email and user ID referenced.</t>
      </section>
      <section anchor="mail-recipients">
        <name>Mail Recipients</name>
        <t>When a mail client receives an email that includes a Wrong-Recipient
header field, an option <bcp14>SHOULD</bcp14> be exposed in the user interface that allows
a recipient to indicate that the mail was intended for another user, if
and only if the email is reasonably assured to not be spam.</t>
        <t>If the user selects this option, the mail client <bcp14>MUST</bcp14> perform an
HTTPS POST to the first https URI in the Wrong-Recipient header field,
or send an empty message to the first referenced mailto: address.</t>
        <t>To minimize XSRF attacks, the POST request <bcp14>MUST NOT</bcp14> include cookies,
HTTP authorization, or any other context information. The "wrong
recipient" reporting operation is logically unrelated to any previous
web activity, and context information could inappropriately link the
report to previous activity.</t>
        <t>The POST body <bcp14>MUST</bcp14> include only "Wrong-Recipient=true".</t>
        <t>If the response is a HTTP 500 type error indicating server issue, the
client <bcp14>MAY</bcp14> retry. If the HTTP response to the POST is a 200, the client
<bcp14>MUST NOT</bcp14> retry. No feedback to the user as to the success or failure
of this operation is proposed or required.</t>
      </section>
      <section anchor="mail-senders-after-wrong-sender-notification">
        <name>Mail Senders After Wrong Sender Notification</name>
        <t>When a misdelivery has been indicated by a POST to the HTTPS URI or
email to the given mailto: URI, the sender <bcp14>MUST</bcp14> make a reasonable effort
to cease emails to the indicated email address for that user account.</t>
        <t>The POST endpoint <bcp14>MUST NOT</bcp14> issue an HTTP redirect and <bcp14>SHOULD</bcp14> return a
<tt>200 OK</tt> status; the content body will be ignored.</t>
        <t>Any GET request to the same URI <bcp14>MUST NOT</bcp14> be treated as an indication
of a wrong recipient notification, since anti-spam software may attempt
a GET request to URIs mentioned in mail headers without receiving user
consent. Senders <bcp14>MAY</bcp14> return an error <tt>405 Method Not Allowed</tt> in
response to a GET request to the URI. The sender <bcp14>MAY</bcp14> elect
to present a page at this URI responsive to a GET request that
presents the user with a form that allows them to submit the POST.</t>
        <t>The sender <bcp14>SHOULD</bcp14> make a best effort to attempt to discern a correct
email address for the user account, such as by using a different known
email address for that user, postal mail, text message, phone call,
app push, or presenting a notification in the user interface of the
service. How the sender should accomplish this task is not part of
this specification.</t>
      </section>
    </section>
    <section anchor="additional-requirements">
      <name>Additional Requirements</name>
      <t>The email needs at least one valid authentication identifier.  In
this version of the specification the only supported identifier type
is DKIM <xref target="RFC6376"/>, that provides a domain-level identifier in the
content of the "d=" tag of a validated DKIM-Signature header field.</t>
      <t>The Wrong-Recipient header field needs to be included in the "h=" tag of a
valid DKIM-Signature header field.</t>
    </section>
    <section anchor="header-syntax">
      <name>Header Syntax</name>
      <t>The following ABNF imports fields and WSP from <xref target="RFC5322"/> and URI from <xref target="RFC3986"/>.
An https URI, mailto URI, or one of each are permitted. Other URI protocols
<bcp14>MUST NOT</bcp14> be used.</t>
      <artwork><![CDATA[
fields =/ wrong-recipient

wrong-recipient = "Wrong-Recipient:" 0*1WSP "<" URI ">"
    *(0*1WSP "," 0*1WSP "<" URI ">") 0*WSP
]]></artwork>
    </section>
    <section anchor="examples">
      <name>Examples</name>
      <section anchor="signed-https-uri">
        <name>Signed HTTPS URI</name>
        <t>Header in Email:</t>
        <artwork><![CDATA[
Wrong-Recipient: <https://example.com/wrong-recipient?
    uid=12345&email=user@example.org&sig=a29c83d>
]]></artwork>
        <t>Resulting POST request:</t>
        <artwork><![CDATA[
POST /wrong-recipient?uid=12345&email=user@example.org&sig=a29c83d HTTP/1.1
Host: example.com
Content-Length: 20

Wrong-Recipient=true
]]></artwork>
      </section>
      <section anchor="uuid-https-uri">
        <name>UUID HTTPS URI</name>
        <t>Header in Email:</t>
        <artwork><![CDATA[
Wrong-Recipient: <https://example.com/wrong-recipient?
    uuid=c002bd9a-e015-468f-8621-9baf6fca12aa>
]]></artwork>
        <t>Resulting POST request:</t>
        <artwork><![CDATA[
POST /wrong-recipient?uuid=c002bd9a-e015-468f-8621-9baf6fca12aa HTTP/1.1
Host: example.com
Content-Length: 20

Wrong-Recipient=true
]]></artwork>
      </section>
      <section anchor="combined-mailto-and-https-uris">
        <name>Combined mailto: and HTTPS URIs</name>
        <t>Header in Email:</t>
        <artwork><![CDATA[
Wrong-Recipient:
    <https://example.com/wrong-recipient?
        uuid=c002bd9a-e015-468f-8621-9baf6fca12aa>,
    <mailto:wrong-recipient.c002bd9a-e015-468f-8621-9baf6fca12aa
        @example.org>
]]></artwork>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The Wrong-Recipient header field may contain the recipient address, but
that is already exposed in other header fields like To.</t>
      <t>The user ID of the recipient with the sending service may be exposed
by the Wrong-Recipient URI, which may not be desired but a sender
can instead use an opaque blob to perform a mapping to a user ID on their
end without leaking any information to outside parties, such as the UUID
examples given above.</t>
      <t>A bad actor with access to the user's email could maliciously
indicate the recipient was a Wrong Recipient with any services that
used this protocol, causing mail delivery and potentially account
access difficulties for the user.</t>
      <t>The Wrong-Recipient POST provides a strong hint to the mailer that
the address to which the message was sent was valid, and could in
principle be used as a way to test whether an email address is valid.
It also may expose the recipient's location and ISP via IP address.
However, unlike passive methods like embedding tracking pixels, the
mechanism proposed here takes an active user action. Nonetheless,
MUAs ought only expose this Wrong Recipient option if relatively
confident that the email is not spam.</t>
      <t>A sender with a guessable URI structure and no use of either signed
parameters or a UUID would open themselves up to a malicious party
POST'ing email credentials for victims, potentially causing difficulty.
Senders should be strongly encouraged to use a signature or opaque
blob as suggested. No algorithm for creating such a signature or
opaque blob is included in this standard since only the sender needs
to validate the correctness of the hard-to-forge URL.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA has registered a new entry to the "Provisional Message Header Field
Names" registry, to be made permanent if this proposal becomes a standard.</t>
      <artwork><![CDATA[
Header field name: Wrong-Recipient
Protocol: mail
Status: Provisional
Author/Change controller: IETF
Specification document(s): *** This document ***
Related information: none
]]></artwork>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC5322">
          <front>
            <title>Internet Message Format</title>
            <author fullname="P. Resnick" initials="P." role="editor" surname="Resnick"/>
            <date month="October" year="2008"/>
            <abstract>
              <t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of "electronic mail" messages. This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, "Standard for the Format of ARPA Internet Text Messages", updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5322"/>
          <seriesInfo name="DOI" value="10.17487/RFC5322"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8058">
          <front>
            <title>Signaling One-Click Functionality for List Email Headers</title>
            <author fullname="J. Levine" initials="J." surname="Levine"/>
            <author fullname="T. Herkula" initials="T." surname="Herkula"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes a method for signaling a one-click function for the List-Unsubscribe email header field. The need for this arises out of the actuality that mail software sometimes fetches URLs in mail header fields, and thereby accidentally triggers unsubscriptions in the case of the List-Unsubscribe header field.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8058"/>
          <seriesInfo name="DOI" value="10.17487/RFC8058"/>
        </reference>
        <reference anchor="RFC6376">
          <front>
            <title>DomainKeys Identified Mail (DKIM) Signatures</title>
            <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker"/>
            <author fullname="T. Hansen" initials="T." role="editor" surname="Hansen"/>
            <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy"/>
            <date month="September" year="2011"/>
            <abstract>
              <t>DomainKeys Identified Mail (DKIM) permits a person, role, or organization that owns the signing domain to claim some responsibility for a message by associating the domain with the message. This can be an author's organization, an operational relay, or one of their agents. DKIM separates the question of the identity of the Signer of the message from the purported author of the message. Assertion of responsibility is validated through a cryptographic signature and by querying the Signer's domain directly to retrieve the appropriate public key. Message transit from author to recipient is through relays that typically make no substantive change to the message content and thus preserve the DKIM signature.</t>
              <t>This memo obsoletes RFC 4871 and RFC 5672. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="76"/>
          <seriesInfo name="RFC" value="6376"/>
          <seriesInfo name="DOI" value="10.17487/RFC6376"/>
        </reference>
        <reference anchor="RFC2369">
          <front>
            <title>The Use of URLs as Meta-Syntax for Core Mail List Commands and their Transport through Message Header Fields</title>
            <author fullname="G. Neufeld" initials="G." surname="Neufeld"/>
            <author fullname="J. Baer" initials="J." surname="Baer"/>
            <date month="July" year="1998"/>
            <abstract>
              <t>The mailing list command specification header fields are a set of structured fields to be added to email messages sent by email distribution lists. By including these header fields, list servers can make it possible for mail clients to provide automated tools for users to perform list functions. This could take the form of a menu item, push button, or other user interface element. The intent is to simplify the user experience, providing a common interface to the often cryptic and varied mailing list manager commands. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2369"/>
          <seriesInfo name="DOI" value="10.17487/RFC2369"/>
        </reference>
      </references>
    </references>
    <?line 311?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Many thanks to John Levine for helping shepherd this document as well
as Oliver Deighton and Murray Kucherawy for their kind and actionable
feedback on the language and first draft of the proposal. Thanks to
Eliot Lear for helping guide the draft to the right hands for review.
A detailed review by Jim Fenton was much appreciated and caught a number
of key issues. Many thanks to the members of IETF ART for vigorous
discussion thereof and for feedback from the new MAILMAINT working group
chaired by Ken Murchison.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
