<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version  (Ruby 3.1.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-ietf-lamps-e2e-mail-guidance-15" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title>Guidance on End-to-End E-mail Security</title>

    <author initials="D. K." surname="Gillmor" fullname="Daniel Kahn Gillmor" role="editor">
      <organization abbrev="ACLU">American Civil Liberties Union</organization>
      <address>
        <postal>
          <street>125 Broad St.</street>
          <city>New York, NY</city>
          <code>10004</code>
          <country>USA</country>
        </postal>
        <email>dkg@fifthhorseman.net</email>
      </address>
    </author>
    <author initials="B." surname="Hoeneisen" fullname="Bernie Hoeneisen" role="editor">
      <organization>pEp Project</organization>
      <address>
        <postal>
          <street>Oberer Graben 4</street>
          <city>8400 Winterthur</city>
          <country>Switzerland</country>
        </postal>
        <email>bernie.hoeneisen@pep-project.org</email>
        <uri>https://pep-project.org/</uri>
      </address>
    </author>
    <author initials="A." surname="Melnikov" fullname="Alexey Melnikov" role="editor">
      <organization>Isode Ltd</organization>
      <address>
        <postal>
          <street>14 Castle Mews</street>
          <city>Hampton, Middlesex</city>
          <code>TW12 2NP</code>
          <country>UK</country>
        </postal>
        <email>alexey.melnikov@isode.com</email>
      </address>
    </author>

    <date year="2024" month="March" day="01"/>

    <area>int</area>
    <workgroup>lamps</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>End-to-end cryptographic protections for e-mail messages can provide useful security.
However, the standards for providing cryptographic protection are extremely flexible.
That flexibility can trap users and cause surprising failures.
This document offers guidance for mail user agent implementers to help mitigate those risks, and to make end-to-end e-mail simple and secure for the end user.
It provides a useful set of vocabulary as well as recommendations to avoid common failures.
It also identifies a number of currently unsolved usability and interoperability problems.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        The latest revision of this draft can be found at <eref target="https://dkg.gitlab.io/e2e-mail-guidance/"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-lamps-e2e-mail-guidance/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        LAMPS Working Group mailing list (<eref target="mailto:spasm@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/spasm/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/spasm/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://gitlab.com/dkg/e2e-mail-guidance"/>.</t>
    </note>


  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>E-mail end-to-end security using S/MIME (<xref target="RFC8551"/>) and PGP/MIME (<xref target="RFC3156"/>) cryptographic standards can provide integrity, authentication and confidentiality to MIME (<xref target="RFC4289"/>) e-mail messages.</t>

<t>However, there are many ways that a receiving mail user agent can misinterpret or accidentally break these security guarantees.
For example, <xref target="EFAIL"></xref>'s "Direct Exfiltration" attacks leak cleartext due to attacks that splice existing ciphertext into novel messages, which then are handled optimistically (and wrongly) by many mail user agents.</t>

<t>A mail user agent that interprets a message with end-to-end cryptographic protections needs to do so defensively, staying alert to different ways that these protections can be bypassed by mangling (either malicious or accidental) or a failed user experience.</t>

<t>A mail user agent that generates a message with end-to-end cryptographic protections should be aware of these defensive interpretation strategies, and should compose any new outbound message conservatively if they want the protections to remain intact.</t>

<t>This document offers guidance to the implementer of a mail user agent that provides these cryptographic protections, whether for sending or receiving mail.
An implementation that follows this guidance will provide its users with stronger and easier-to-understand security properties, and will also offer more reliable interoperability for messages exchanged with other implementations.</t>

<t>In <xref target="future-work"/>, this document also identifies a number of interoperability and usability concerns for end-to-end cryptographic e-mail which have no current broadly accepted technical standard for resolution.
One major area not covered in this document is the acquisition and long-term maintenance of cryptographic identity information and metadata across multiple mail user agents controlled by the same user.</t>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<section anchor="terminology"><name>Terminology</name>

<t>For the purposes of this document, we define the following concepts:</t>

<t><list style="symbols">
  <t><em>MUA</em> is short for Mail User Agent; an e-mail client.</t>
  <t><em>Protection</em> of message data refers to cryptographic encryption and/or signatures, providing confidentiality, authenticity, and/or integrity.</t>
  <t><em>Cryptographic Layer</em>, <em>Cryptographic Envelope</em>, <em>Cryptographic Payload</em>, <em>Cryptographic Summary</em>, and <em>Errant Cryptographic Layer</em> are defined in <xref target="cryptographic-structure"/></t>
  <t>A <em>well-formed</em> e-mail message with cryptographic protection has both a <em>Cryptographic Envelope</em> and a <em>Cryptographic Payload</em>.</t>
  <t><em>Structural Header Fields</em> are documented in <xref target="structural-header-fields"/>.</t>
  <t><em>User-Facing Header Fields</em> are documented in <xref target="user-facing-header-fields"/>.</t>
  <t><em>Main Body Part</em> is the part (or parts) that are typically rendered to the user as the message itself (not "as an attachment").  See <xref target="main-body-part"/>.</t>
</list></t>

<t>This document contains extensive discussion about end-to-end cryptographic protections in e-mail, while acknowledging that many MUAs have no capabilities for end-to-end cryptographic protections at all.
We divide MUAs into three distinct profiles:</t>

<t><list style="symbols">
  <t>A <em>Non-cryptographic</em> MUA has no capabilities for end-to-end cryptographic protections.</t>
  <t>A <em>Conformant</em> MUA follows the guidance in this document when dealing with end-to-end cryptographic protections.</t>
  <t>A <em>Legacy</em> MUA has capabilities for end-to-end cryptographic protections, but does not adhere to the the guidance in this document.</t>
</list></t>

<t>At the time of the writing of this document, most MUAs with cryptographic protections are legacy MUAs.</t>

<section anchor="structural-header-fields"><name>Structural Header Fields</name>

<t>A message header field named <spanx style="verb">MIME-Version</spanx>, or whose name begins with <spanx style="verb">Content-</spanx> is referred to in this document as a "structural" header field.
This is a less-ambiguous name for what <xref target="RFC2045"/> calls "MIME Header Fields".</t>

<t>These header fields indicate something about the specific MIME part they are attached to, and cannot be transferred or copied to other parts without endangering the readability of the message.</t>

<t>This includes:</t>

<t><list style="symbols">
  <t><spanx style="verb">MIME-Version</spanx></t>
  <t><spanx style="verb">Content-Type</spanx></t>
  <t><spanx style="verb">Content-Transfer-Encoding</spanx></t>
  <t><spanx style="verb">Content-Disposition</spanx></t>
</list></t>

</section>
<section anchor="user-facing-header-fields"><name>User-Facing Header Fields</name>

<t>Of all the header fields that an e-mail message may contain, only a handful are typically presented directly to the user.
This document refers to them as "user-facing" header fields.
Typically, user-facing header fields are:</t>

<t><list style="symbols">
  <t><spanx style="verb">Subject</spanx></t>
  <t><spanx style="verb">From</spanx></t>
  <t><spanx style="verb">To</spanx></t>
  <t><spanx style="verb">Cc</spanx></t>
  <t><spanx style="verb">Date</spanx></t>
  <t><spanx style="verb">Reply-To</spanx></t>
  <t><spanx style="verb">Followup-To</spanx></t>
  <t><spanx style="verb">Sender</spanx></t>
  <t><spanx style="verb">Resent-From</spanx></t>
  <t><spanx style="verb">Resent-To</spanx></t>
  <t><spanx style="verb">Resent-Cc</spanx></t>
  <t><spanx style="verb">Resent-Date</spanx></t>
  <t><spanx style="verb">Resent-Sender</spanx></t>
</list></t>

<t>The above list are the header fields most often presented directly to the user who views a message, though an MUA may also decide to treat any other header field as "user-facing".
Of course, many of these header fields are entirely absent from any given message, and an absent header field is not presented to the user at all.</t>

<t>Note that the resending header fields (those beginning with <spanx style="verb">Resent-</spanx>) are typically only added by an intervening MUA (see <xref section="3.6.6" sectionFormat="of" target="RFC5322"/> and <xref target="intervening-mua"/> of this document).
As such, though they may in some cases be presented to the user, they will typically not bear any end-to-end cryptographic protection (even if the original header fields of a message are protected, see <xref target="message-header-fields"/>), because they are unknown to the original sender.</t>

<t>Other header fields may affect the visible rendering of the message (e.g., <spanx style="verb">References</spanx> and <spanx style="verb">In-Reply-To</spanx> may affect the placement of a message in a threaded discussion; or the <spanx style="verb">List-*</spanx> and <spanx style="verb">Archived-At</spanx> header fields added by mailing lists may cause additional buttons to be displayed during rendering), but they are not directly displayed to the user and so are not considered "user-facing".</t>

</section>
</section>
</section>
<section anchor="usability"><name>Usability</name>

<t>Any MUA that enables its user to transition from unprotected messages to messages with end-to-end cryptographic protection needs to consider how the user understands this transition.
That said, the primary goal of the user of an MUA is communication -- so interface elements that get in the way of communication should be avoided where possible.</t>

<t>Furthermore, it is a near certainty that the user will continue to encounter unprotected messages, and may need to send unprotected messages (for example, if a given recipient cannot handle cryptographic protections).
This means that the MUA needs to provide the user with some guidance, so that they understand what protections any given message or conversation has.
But the user should not be overwhelmed with choices or presented with unactionable information.</t>

<section anchor="simplicity"><name>Simplicity</name>

<t>The end user (the operator of the MUA) is unlikely to understand complex end-to-end cryptographic protections on any e-mail message, so keep it simple.</t>

<t>For clarity to the user, any cryptographic protections should apply to the message as a whole, not just to some subparts.</t>

<t>This is true for message composition: the standard message composition user interface of an MUA should offer minimal controls which indicate which types of protection to apply to the new message as a whole.</t>

<t>This is also true for message interpretation: the standard message rendering user interface of an MUA should offer a minimal, clear indicator about the end-to-end cryptographic status of the message as a whole.</t>

<t>See <xref target="types-of-protection"/> for more detail about mental models and cryptographic status.</t>

<t>(It is of course possible that a message forwarded as a MIME attachment could have its own cryptographic status while still being a message subpart; but that status should be distinct from the status of the enclosing message.)</t>

</section>
<section anchor="similar-ux"><name>E-mail Users Want a Familiar Experience</name>

<t>A person communicating over the Internet today often has many options for reaching their desired correspondent, including web-based bulletin boards, contact forms, and instant messaging services.</t>

<t>E-mail offers a few distinctions from these other systems, most notably features like:</t>

<t><list style="symbols">
  <t>Ubiquity: Most correspondents will have an e-mail address, while not everyone is present on every alternate messaging service, particularly those that have reliable end-to-end cryptographic protections,</t>
  <t>Federation: interaction between users on distinct domains who have not agreed on a common communications provider is still possible, and</t>
  <t>User Control: the user can interact with the e-mail system using an MUA of their choosing, including automation and other control over their preferred and/or customized workflow.</t>
</list></t>

<t>Other systems (like some popular instant messaging applications, such as WhatsApp and Signal Private Messenger) offer built-in end-to-end cryptographic protections by default, which are simpler for the user to understand.
("All the messages I see on Signal are confidential and integrity-protected" is a clean user story)</t>

<t>A user of e-mail is likely using e-mail instead of other systems because of the distinctions outlined above.
When adding end-to-end cryptographic protection to an e-mail endpoint, care should be taken not to negate any of the distinct features of e-mail as a whole.
If these features are violated to provide end-to-end crypto, the user may just as well choose one of the other systems that don't have the drawbacks that e-mail has.
Implementers should try to provide end-to-end protections that retain the familiar experience of e-mail itself.</t>

<t>Furthermore, an e-mail user is likely to regularly interact with other e-mail correspondents who <em>cannot</em> handle or produce end-to-end cryptographic protections.
Care should be taken that enabling cryptography in an MUA does not inadvertently limit the ability of the user to interact with correspondents who use legacy or non-cryptographic MUAs.</t>

</section>
<section anchor="security-indicators"><name>Warning About Failure vs. Announcing Success</name>

<t>Moving the web from http to https offers useful historical similarities to adding end-to-end encryption to e-mail.</t>

<t>In particular, the indicators of what is "secure" vs. "insecure" for web browsers have changed over time.
For example, years ago the default experience was http, and https sites were flagged with "secure" indicators like a lock icon.
Starting in 2018, some browsers reversed that process by downplaying https, and instead visibly marking http as "not secure" (see <xref target="chrome-indicators"></xref>).</t>

<t>By analogy, when the user of an MUA first enables end-to-end cryptographic protection, it's likely that they will want to see which messages <em>have</em> protection (that is, the security indicators amenable to a conformant MUA as of 2024 are most likely to be comparable to those of a pre-2018 web browser).
But a user whose private e-mail communications with a given correspondent, or within a given domain are known to be entirely end-to-end protected might instead want to know which messages do <em>not</em> have the expected protections.</t>

<t>Note also that some messages may be expected to be confidential, but other messages are expected to be public -- the types of protection (see <xref target="types-of-protection"/>) that apply to each particular message will be different.
And the types of protection that are <em>expected</em> to be present in any context might differ (for example, by sender, by thread, or by date).</t>

<t>It is out of scope for this document to define expectations about protections for any given message, but an implementer who cares about usable experience should be deliberate and judicious about the expectations their interface assumes that the user has in a given context.
See also <xref target="expect-e2e"/> for future work.</t>

</section>
</section>
<section anchor="types-of-protection"><name>Types of Protection</name>

<t>A given message might be:</t>

<t><list style="symbols">
  <t>signed,</t>
  <t>encrypted,</t>
  <t>both signed and encrypted, or</t>
  <t>none of the above.</t>
</list></t>

<t>Given that many e-mail messages offer no cryptographic protections, the user needs to be able to detect which protections are present for any given message.</t>

<section anchor="simple-mental-model"><name>Simplified Mental Model</name>

<t>To the extent that an e-mail message actually does have end-to-end cryptographic protections, those protections need to be visible and comprehensible to the end users: both the sending user and the receiving user.
If either user is unaware of the protections, then they do not effectively extend all the way to the "end".</t>

<t>However, most users do not have (or want to have) a sophisticated mental model of what kinds of protections can be associated with a given message.
Even the four states above approach the limits of complexity for an interface for normal users.</t>

<t>While <xref target="no-encrypted-only"/> recommends avoiding deliberate creation of encrypted-only messages, some messages may end up in the encrypted-only state due to signature failure or certificate revocation.</t>

<t>A simple model for the receiving user could be that a message is in one of three normal states, which align with the only reasonable choices for message composition:</t>

<t><list style="symbols">
  <t>Unprotected</t>
  <t>Verified (has a valid signature from the apparent sender of the message)</t>
  <t>Confidential (meaning, encrypted, with a valid signature from the apparent sender of the message)</t>
</list></t>

<t>However, one error state exists for received mail that does not correspond to a reasonable choice for message composition:</t>

<t><list style="symbols">
  <t>Encrypted But Unverified (meaning, encrypted without a valid signature from the apparent sender of the message)</t>
</list></t>

<t>Note that this last state is not "Confidential" (a secret shared exclusively between the participants in the communication) because the recipient does not know for sure who sent it.</t>

<t>In an ecosystem where encrypted-only messages are never deliberately sent (see <xref target="no-encrypted-only"/>), representing an Encrypted But Unverified message as a type of user-visible error is not unreasonable.
However, this is not the state of the global e-mail ecosystem when this document was written, since some legacy MUAs permit sending encrypted-but-unsigned mail (see <xref target="expect-e2e"/> for possible future guidance).</t>

<t>Alternately, an MUA may prefer to represent the state of a Encrypted but Unverified message to the user as though it was Unprotected, since no verification is possible.
However the MUA represents the message to the user, though, it <bcp14>MUST NOT</bcp14> leak cleartext of an encrypted message (even an Encrypted but Unverified message) in subsequent replies (see <xref target="composing-reply"/>) or similar replications of the message.</t>

<t>Note that a cleartext message with an invalid signature <bcp14>SHOULD NOT</bcp14> be represented to the user as anything other than Unprotected (see <xref target="signature-failures"/>), unless the MUA is providing the user with debugging information.</t>

<t>At the time this document was written, the global e-mail ecosystem contains a heterogeneous mix of legacy and non-cryptographic MUAs.
In such an ecosystem, a conformant MUA may prefer instead to represent "Verified" and "Encrypted" as orthogonal states of any given received message.
While this model does not precisely match the choice a user makes when composing a message, it may align more with the reality of the range of messages they receive.</t>

</section>
<section anchor="one-cryptographic-status-per-message"><name>One Cryptographic Status Per Message</name>

<t>Some MUAs may attempt to generate multiple copies of a given e-mail message, with different copies offering different types of protection (for example, opportunistically encrypting on a per-recipient basis).
A message resulting from this approach will have a cryptographic state that few users will understand.
Even if the sender understands the different statuses of the different copies, the recipients of the messages may not understand (each recipient might not even know about the other copies).
See for example the discussion in <xref target="mixed-recipients"/> for how this can go wrong.</t>

<t>For comprehensibility, a conformant MUA <bcp14>SHOULD NOT</bcp14> create multiple copies of a given message that differ in the types of end-to-end cryptographic protections afforded.</t>

<t>For opportunistic cryptographic protections that are not surfaced to the user (that is, that are not end-to-end), other mechanisms like transport encryption (<xref target="RFC3207"/>) or domain-based signing (<xref target="RFC6376"/>) may be preferable due to ease of implementation and deployment.
These opportunistic transport protections are orthogonal to the end-to-end protections described in this document.</t>

<t>To the extent that opportunistic message protections are made visible to the user for a given copy of a message, a conformant MUA will distinguish that status from the message's end-to-end cryptographic status.
But the potential confusion caused by rendering this complex, hybrid state may not be worth the value of additional knowledge gained by the user.
The benefits of opportunistic protections accrue (or don't) even without visibility to the user (see <xref target="RFC7435"/>).</t>

<t>The user needs a single clear, simple, and correct indication about the end-to-end cryptographic status of any given message.
See <xref target="cryptographic-summary"/> for more details.</t>

</section>
</section>
<section anchor="cryptographic-structure"><name>Cryptographic MIME Message Structure</name>

<t>Implementations use the structure of an e-mail message to establish (when sending) and understand (when receiving) the cryptographic status of the message.
This section establishes some conventions about how to think about message structure.</t>

<section anchor="cryptographic-layer"><name>Cryptographic Layers</name>

<t>"Cryptographic Layer" refers to a MIME substructure that supplies some cryptographic protections to an internal MIME subtree.
The internal subtree is known as the "protected part" though of course it may itself be a multipart object.</t>

<t>In the diagrams below, <u>↧</u> indicates "decrypts to", and <u>⇩</u> indicates "unwraps to".</t>

<section anchor="smime-cryptographic-layers"><name>S/MIME Cryptographic Layers</name>

<t>For S/MIME <xref target="RFC8551"></xref>, there are four forms of Cryptographic Layers: multipart/signed, PKCS#7 signed-data, PKCS7 enveloped-data, PKCS7 authEnveloped-data.</t>

<section anchor="smime-multipart-signed"><name>S/MIME Multipart Signed Cryptographic Layer</name>

<figure><artwork><![CDATA[
└┬╴multipart/signed; protocol="application/pkcs7-signature"
 ├─╴[protected part]
 └─╴application/pkcs7-signature
]]></artwork></figure>

<t>This MIME layer offers authentication and integrity.</t>

</section>
<section anchor="smime-pkcs7-signed-data"><name>S/MIME PKCS7 signed-data Cryptographic Layer</name>

<figure><artwork><![CDATA[
└─╴application/pkcs7-mime; smime-type="signed-data"
 ⇩ (unwraps to)
 └─╴[protected part]
]]></artwork></figure>

<t>This MIME layer offers authentication and integrity.</t>

</section>
<section anchor="smime-pkcs7-enveloped-data"><name>S/MIME PKCS7 enveloped-data Cryptographic Layer</name>

<figure><artwork><![CDATA[
└─╴application/pkcs7-mime; smime-type="enveloped-data"
 ↧ (decrypts to)
 └─╴[protected part]
]]></artwork></figure>

<t>This MIME layer offers confidentiality.</t>

</section>
<section anchor="smime-pkcs7-authenveloped-data"><name>S/MIME PKCS7 authEnveloped-data Cryptographic Layer</name>

<figure><artwork><![CDATA[
└─╴application/pkcs7-mime; smime-type="authEnveloped-data"
 ↧ (decrypts to)
 └─╴[protected part]
]]></artwork></figure>

<t>This MIME layer offers confidentiality and integrity.</t>

<t>Note that <spanx style="verb">enveloped-data</spanx> (<xref target="smime-pkcs7-enveloped-data"/>) and <spanx style="verb">authEnveloped-data</spanx> (<xref target="smime-pkcs7-authenveloped-data"/>) have identical message structure and very similar semantics.
The only difference between the two is ciphertext malleability.</t>

<t>The examples in this document only include <spanx style="verb">enveloped-data</spanx>, but the implications for that layer apply to <spanx style="verb">authEnveloped-data</spanx> as well.</t>

</section>
<section anchor="pkcs7-compression-is-not-a-cryptographic-layer"><name>PKCS7 Compression is NOT a Cryptographic Layer</name>

<t>The Cryptographic Message Syntax (CMS) provides a MIME compression layer (<spanx style="verb">smime-type="compressed-data"</spanx>), as defined in <xref target="RFC3274"/>.
While the compression layer is technically a part of CMS, it is not considered a Cryptographic Layer for the purposes of this document.</t>

</section>
</section>
<section anchor="pgpmime-cryptographic-layers"><name>PGP/MIME Cryptographic Layers</name>

<t>For PGP/MIME <xref target="RFC3156"></xref> there are two forms of Cryptographic Layers, signing and encryption.</t>

<section anchor="pgpmime-multipart-signed"><name>PGP/MIME Signing Cryptographic Layer (multipart/signed)</name>

<figure><artwork><![CDATA[
└┬╴multipart/signed; protocol="application/pgp-signature"
 ├─╴[protected part]
 └─╴application/pgp-signature
]]></artwork></figure>

<t>This MIME layer offers authenticity and integrity.</t>

</section>
<section anchor="pgpmime-multipart-encrypted"><name>PGP/MIME Encryption Cryptographic Layer (multipart/encrypted)</name>

<figure><artwork><![CDATA[
└┬╴multipart/encrypted
 ├─╴application/pgp-encrypted
 └─╴application/octet-stream
  ↧ (decrypts to)
  └─╴[protected part]
]]></artwork></figure>

<t>This MIME layer can offer any of:</t>

<t><list style="symbols">
  <t>confidentiality (via a Symmetrically Encrypted Data Packet, see <xref section="5.7" sectionFormat="of" target="I-D.ietf-openpgp-crypto-refresh-13"/>; an MUA <bcp14>MUST NOT</bcp14> generate this form due to ciphertext malleability)</t>
  <t>confidentiality and integrity (via a Symmetrically Encrypted Integrity Protected Data Packet (SEIPD), see <xref section="5.13" sectionFormat="of" target="I-D.ietf-openpgp-crypto-refresh-13"/>), or</t>
  <t>confidentiality, integrity, and authenticity all together (by including an OpenPGP Signature Packet within the SEIPD).</t>
</list></t>

</section>
</section>
</section>
<section anchor="cryptographic-envelope"><name>Cryptographic Envelope</name>

<t>The Cryptographic Envelope is the largest contiguous set of Cryptographic Layers of an e-mail message starting with the outermost MIME type (that is, with the Content-Type of the message itself).</t>

<t>If the Content-Type of the message itself is not a Cryptographic Layer, then the message has no cryptographic envelope.</t>

<t>"Contiguous" in the definition above indicates that if a Cryptographic Layer is the protected part of another Cryptographic Layer, the layers together comprise a single Cryptographic Envelope.</t>

<t>Note that if a non-Cryptographic Layer intervenes, all Cryptographic Layers within the non-Cryptographic Layer <em>are not</em> part of the Cryptographic Envelope.
They are Errant Cryptographic Layers (see <xref target="errant-cryptographic-layers"/>).</t>

<t>Note also that the ordering of the Cryptographic Layers implies different cryptographic properties.
A signed-then-encrypted message is different than an encrypted-then-signed message.
See <xref target="sign-then-encrypt"/>.</t>

</section>
<section anchor="cryptographic-payload"><name>Cryptographic Payload</name>

<t>The Cryptographic Payload of a message is the first non-Cryptographic Layer -- the "protected part" -- within the Cryptographic Envelope.</t>

</section>
<section anchor="types-of-cryptographic-envelope"><name>Types of Cryptographic Envelope</name>

<section anchor="simple-cryptographic-envelopes"><name>Simple Cryptographic Envelopes</name>

<t>As described above, if the "protected part" identified in the section above is not itself a Cryptographic Layer, that part <em>is</em> the Cryptographic Payload.</t>

<t>If the application wants to generate a message that is both encrypted and signed, it <bcp14>MAY</bcp14> use the simple MIME structure from <xref target="pgpmime-multipart-encrypted"/> by ensuring that the <xref target="I-D.ietf-openpgp-crypto-refresh-13"></xref> Encrypted Message within the <spanx style="verb">application/octet-stream</spanx> part contains an <xref target="I-D.ietf-openpgp-crypto-refresh-13"></xref> Signed Message (the final option described in <xref target="pgpmime-multipart-encrypted"/>).</t>

</section>
<section anchor="multilayer-cryptographic-envelopes"><name>Multilayer Cryptographic Envelopes</name>

<t>It is possible to construct a Cryptographic Envelope consisting of multiple layers with either S/MIME or PGP/MIME , for example using the following structure:</t>

<figure><artwork><![CDATA[
A └─╴application/pkcs7-mime; smime-type="enveloped-data"
B  ↧ (decrypts to)
C  └─╴application/pkcs7-mime; smime-type="signed-data"
D   ⇩ (unwraps to)
E   └─╴[protected part]
]]></artwork></figure>

<t>When handling such a message, the properties of the Cryptographic Envelope are derived from the series <spanx style="verb">A</spanx>, <spanx style="verb">C</spanx>.</t>

<t>As noted in <xref target="simple-cryptographic-envelopes"/>, PGP/MIME applications also have a simpler MIME construction available with the same cryptographic properties.</t>

</section>
</section>
<section anchor="errant-cryptographic-layers"><name>Errant Cryptographic Layers</name>

<t>Due to confusion, malice, or well-intentioned tampering, a message may contain a Cryptographic Layer that is not part of the Cryptographic Envelope.
Such a layer is an Errant Cryptographic Layer.</t>

<t>An Errant Cryptographic Layer <bcp14>MUST NOT</bcp14> contribute to the message's overall cryptographic state.</t>

<t>Guidance for dealing with Errant Cryptographic Layers can be found in <xref target="errant-layers"/>.</t>

<section anchor="mailing-list-wrapping"><name>Mailing List Wrapping</name>

<t>Some mailing list software will re-wrap a well-formed signed message before re-sending to add a footer, resulting in the following structure seen by recipients of the e-mail:</t>

<figure><artwork><![CDATA[
H └┬╴multipart/mixed
I  ├┬╴multipart/signed
J  │├─╴text/plain
K  │└─╴application/pgp-signature
L  └─╴text/plain
]]></artwork></figure>

<t>In this message, <spanx style="verb">L</spanx> is the footer added by the mailing list.  <spanx style="verb">I</spanx> is now an Errant Cryptographic Layer.</t>

<t>Note that this message has no Cryptographic Envelope at all.</t>

<t>It is <bcp14>NOT RECOMMENDED</bcp14> to produce e-mail messages with this structure, because a legacy MUA may present the data in part <spanx style="verb">L</spanx> as though it were part of <spanx style="verb">J</spanx>, though they have different cryptographic properties.
In particular, if the user believes that the entire message is signed, but cannot distinguish <spanx style="verb">L</spanx> from <spanx style="verb">J</spanx> then the author of <spanx style="verb">L</spanx> can effectively tamper with content of the signed message, breaking the user's expectation of integrity and authenticity.</t>

</section>
<section anchor="baroque-example"><name>A Baroque Example</name>

<t>Consider a message with the following overcomplicated structure:</t>

<figure><artwork><![CDATA[
M └┬╴multipart/encrypted
N  ├─╴application/pgp-encrypted
O  └─╴application/octet-stream
P   ↧ (decrypts to)
Q   └┬╴multipart/signed
R    ├┬╴multipart/mixed
S    │├┬╴multipart/signed
T    ││├─╴text/plain
U    ││└─╴application/pgp-signature
V    │└─╴text/plain
W    └─╴application/pgp-signature
]]></artwork></figure>

<t>The 3 Cryptographic Layers in such a message are rooted in parts <spanx style="verb">M</spanx>, <spanx style="verb">Q</spanx>, and <spanx style="verb">S</spanx>.
But the Cryptographic Envelope of the message consists only of the properties derived from the series <spanx style="verb">M</spanx>, <spanx style="verb">Q</spanx>.
The Cryptographic Payload of the message is part <spanx style="verb">R</spanx>.
Part <spanx style="verb">S</spanx> is an Errant Cryptographic Layer.</t>

<t>Note that this message has both a Cryptographic Envelope <em>and</em> an Errant Cryptographic Layer.</t>

<t>It is <bcp14>NOT RECOMMENDED</bcp14> to generate messages with such complicated structures.
Even if a receiving MUA can parse this structure properly, it is nearly impossible to render in a way that the user can reason about the cryptographic properties of part <spanx style="verb">T</spanx> compared to part <spanx style="verb">V</spanx>.</t>

</section>
</section>
<section anchor="cryptographic-summary"><name>Cryptographic Summary</name>

<t>The cryptographic status of an e-mail message with end-to-end cryptographic protections is known as the Cryptographic Summary.
A reasonable, simple Cryptographic Summary is derived from the aggregate properties of the layers in the Cryptographic Envelope.
This is a conceptual tool and a feature that an MUA can use to guide behavior and user experience, but it is not necessarily always directly exposed in any given user interface.
See <xref target="well-formed"/> for guidance and considerations about rendering the Cryptographic Summary to the user.</t>

</section>
</section>
<section anchor="message-composition"><name>Message Composition</name>

<t>This section describes the ideal composition of an e-mail message with end-to-end cryptographic protection.
A message composed with this form is most likely to achieve its end-to-end security goals.</t>

<section anchor="composition"><name>Message Composition Algorithm</name>

<t>This section roughly describes the steps that an MUA should use to compose a cryptographically-protected message that has a proper cryptographic envelope and payload.</t>

<t>The message composition algorithm takes three parameters:</t>

<t><list style="symbols">
  <t><spanx style="verb">origbody</spanx>: the traditional unprotected message body as a well-formed MIME tree (possibly just a single MIME leaf part).
As a well-formed MIME tree, <spanx style="verb">origbody</spanx> already has structural header fields present (see <xref target="structural-header-fields"/>).</t>
  <t><spanx style="verb">origheaders</spanx>: the intended non-structural header fields for the message, represented here as a list of <spanx style="verb">(h,v)</spanx> pairs, where <spanx style="verb">h</spanx> is a header field name and <spanx style="verb">v</spanx> is the associated value.</t>
  <t><spanx style="verb">crypto</spanx>: The series of cryptographic protections to apply (for example, "sign with the secret key corresponding to X.509 certificate X, then encrypt to X.509 certificates X and Y").
This is a routine that accepts a MIME tree as input (the Cryptographic Payload), wraps the input in the appropriate Cryptographic Envelope, and returns the resultant MIME tree as output.</t>
</list></t>

<t>The algorithm returns a MIME object that is ready to be injected into the mail system:</t>

<t><list style="symbols">
  <t>Apply <spanx style="verb">crypto</spanx> to <spanx style="verb">origbody</spanx>, yielding MIME tree <spanx style="verb">output</spanx></t>
  <t>For each header name and value <spanx style="verb">(h,v)</spanx> in <spanx style="verb">origheaders</spanx>:
  <list style="symbols">
      <t>Add header <spanx style="verb">h</spanx> to <spanx style="verb">output</spanx> with value <spanx style="verb">v</spanx></t>
    </list></t>
  <t>Return <spanx style="verb">output</spanx></t>
</list></t>

</section>
<section anchor="sign-then-encrypt"><name>Encryption Outside, Signature Inside</name>

<t>An e-mail message that is both signed and encrypted is signed <em>inside</em> the encryption, and not the other way around.
For example, when crafting an encrypted and signed message using a simple Cryptographic Envelope of a single layer (<xref target="simple-cryptographic-envelopes"/>) with PGP/MIME, the OpenPGP Encrypted Message object should contain an OpenPGP Signed Message.
Likewise, when using a multilayer Cryptographic Envelope (<xref target="multilayer-cryptographic-envelopes"/>), the outer layer should be an encryption layer and the inner layer should be a signing layer.</t>

<t>Putting the signature inside the encryption has two advantages:</t>

<t><list style="symbols">
  <t>The details of the signature remain confidential, visible only to the parties capable of decryption.</t>
  <t>Any mail transport agent that modifies the message is unlikely to be able to accidentally break the signature.</t>
</list></t>

<t>A conformant MUA <bcp14>MUST NOT</bcp14> generate an encrypted and signed message where the only signature is outside the encryption.</t>

</section>
<section anchor="no-encrypted-only"><name>Avoid Offering Encrypted-only Messages</name>

<t>When generating an e-mail, the user has options about what forms of end-to-end cryptographic protections to apply to it.</t>

<t>In some cases, offering any end-to-end cryptographic protection is harmful: it may confuse the recipient and offer no benefit.</t>

<t>In other cases, signing a message is useful (authenticity and integrity are desirable) but encryption is either impossible (for example, if the sender does not know how to encrypt to all recipients) or meaningless (for example, an e-mail message to a mailing list that is intended to be published to a public archive).</t>

<t>In other cases, full end-to-end confidentiality, authenticity, and integrity are desirable.</t>

<t>There is no common use case for generating an e-mail message with end-to-end confidentiality but without authenticity or integrity.</t>

<t>A conformant MUA will keep its message composition interface simple, so when presenting the user with a choice of cryptographic protection, it <bcp14>MUST</bcp14> offer no more than three choices:</t>

<t><list style="symbols">
  <t>no end-to-end cryptographic protection</t>
  <t>Verified (signed only)</t>
  <t>Confidential (signed and encrypted)</t>
</list></t>

<t>Note that these choices correspond to the simplified mental model in <xref target="simple-mental-model"/>.</t>

<t>The alternative approach, offering the user two boolean choices during message composition (one choice about signing, another choice about encryption) is a common anti-pattern among legacy MUAs, and creates additional usability hurdles for normal users:</t>

<t><list style="symbols">
  <t>A user who wants to send a signed and encrypted message will have to click two buttons instead of one.</t>
  <t>A user who clicks "Encrypt" but neglects to click "Signed" may not understand that they are creating a message which cannot be authenticated by the receiver.</t>
</list></t>

</section>
<section anchor="composing-reply"><name>Composing a Reply Message</name>

<t>When replying to a message, most MUAs compose an initial draft of the reply that contains quoted text from the original message.
A responsible MUA will take precautions to avoid leaking the cleartext of an encrypted message in such a reply.</t>

<t>If the original message was end-to-end encrypted, the replying MUA <bcp14>MUST</bcp14> either:</t>

<t><list style="symbols">
  <t>compose the reply with end-to-end encryption, or</t>
  <t>avoid including quoted text from the original message.</t>
</list></t>

<t>In general, MUAs <bcp14>SHOULD</bcp14> prefer the first option: to compose an encrypted reply.
This is what users expect.</t>

<t>However, in some circumstances, the replying MUA cannot compose an encrypted reply.
For example, the MUA might not have a valid, unexpired, encryption-capable certificate for all recipients.
This can also happen during composition when a user adds a new recipient into the reply, or manually toggles the cryptographic protections to remove encryption.</t>

<t>In this circumstance, the composing MUA <bcp14>SHOULD</bcp14> strip the quoted text from the original message.</t>

<t>Note additional nuance about replies to malformed messages that contain encryption in <xref target="reply-to-errant-encryption"/>.</t>

</section>
</section>
<section anchor="message-interpretation"><name>Message Interpretation</name>

<t>Despite the best efforts of well-intentioned senders to create e-mail messages with well-formed end-to-end cryptographic protection, receiving MUAs will inevitably encounter some messages with malformed end-to-end cryptographic protection.</t>

<t>This section offers guidance on dealing with both well-formed and malformed messages containing Cryptographic Layers.</t>

<section anchor="well-formed"><name>Rendering Well-formed Messages</name>

<t>A message is well-formed when it has a Cryptographic Envelope, a Cryptographic Payload, and no Errant Cryptographic Layers.
Rendering a well-formed message is straightforward.</t>

<t>The receiving MUA evaluates and assembles the cryptographic properties of the Cryptographic Envelope into a Cryptographic Summary and displays that status to the user in a secure, strictly-controlled part of the UI.
In particular, the part of the UI used to render the Cryptographic Summary of the message <bcp14>MUST NOT</bcp14> be spoofable, modifiable, or otherwise controllable by the received message itself.
By analogy, consider the "lock" icon in the address bar of the web browser: regardless of the content of the webpage, the lock icon will only be displayed when the transport to the web server is adequately secured.</t>

<t>Aside from this Cryptographic Summary, the message itself <bcp14>MUST</bcp14> be rendered as though the Cryptographic Payload is the body of the message.
The Cryptographic Layers themselves <bcp14>SHOULD NOT</bcp14> be rendered as distinct objects unless the MUA is providing the user with debugging information.</t>

</section>
<section anchor="errant-layers"><name>Errant Cryptographic Layers</name>

<t>If an incoming message has any Errant Cryptographic Layers, a conformant interpreting MUA <bcp14>MUST</bcp14> ignore those layers when rendering the Cryptographic Summary of the message to the user.</t>

<section anchor="errant-signing-layer"><name>Errant Signing Layer</name>

<t>When rendering a message with an Errant Cryptographic Layer that provides authenticity and integrity (via signatures), the message should be rendered by replacing the Cryptographic layer with the part it encloses.</t>

<t>For example, a message with this structure:</t>

<figure><artwork><![CDATA[
A └┬╴multipart/mixed
B  ├╴text/plain
C  ├┬╴multipart/signed
D  │├─╴image/jpeg
E  │└─╴application/pgp-signature
F  └─╴text/plain
]]></artwork></figure>

<t>Should be rendered identically to this:</t>

<figure><artwork><![CDATA[
A └┬╴multipart/mixed
B  ├─╴text/plain
D  ├─╴image/jpeg
F  └─╴text/plain
]]></artwork></figure>

<t>In such a situation, a conformant MUA <bcp14>MUST NOT</bcp14> indicate in the Cryptographic Summary that the message is signed.
It <bcp14>MUST</bcp14> indicate that the message is Unprotected.</t>

<section anchor="exception-mailing-list-footers"><name>Exception: Mailing List Footers</name>

<t>The use case described in <xref target="mailing-list-wrapping"/> is common enough in some contexts that a conformant MUA <bcp14>MAY</bcp14> decide to handle it as a special exception.</t>

<t>If the MUA determines that the message comes from a mailing list (for example, it has a <spanx style="verb">List-ID</spanx> header), and it has a structure that appends a footer to a signing-only Cryptographic Layer with a valid signature, such as:</t>

<figure><artwork><![CDATA[
H └┬╴multipart/mixed
I  ├┬╴multipart/signed
J  │├─╴[protected part, may be arbitrary MIME subtree]
K  │└─╴application/{pgp,pkcs7}-signature
L  └─╴[footer, typically text/plain]
]]></artwork></figure>

<t>or:</t>

<figure><artwork><![CDATA[
H └┬╴multipart/mixed
I  ├─╴application/pkcs7-mime; smime-type="signed-data"
   │⇩ (unwraps to)
J  │└─╴[protected part, may be an arbitrary MIME subtree]
L  └─╴[footer, typically text/plain]
]]></artwork></figure>

<t>Then, the MUA <bcp14>MAY</bcp14> indicate to the user that this is a Verified message that has been wrapped by the mailing list.</t>

<t>In this case, the MUA <bcp14>MUST</bcp14> distinguish the footer (part <spanx style="verb">L</spanx>) from the protected part (part <spanx style="verb">J</spanx>) when rendering any information about the signature.</t>

<t>One way to do this is to offer the user two different views of the message: the "mailing list" view, which hides any positive Cryptographic Summary but shows the footer:</t>

<figure><artwork><![CDATA[
Cryptographic Protections: Unprotected
H └┬╴multipart/mixed
J  ├─╴[protected part, may be arbitrary MIME subtree]
L  └─╴[footer, typically text/plain]
]]></artwork></figure>

<t>or the "sender's view", which shows the Cryptographic Summary as Verified, but hides the footer:</t>

<figure><artwork><![CDATA[
Cryptographic Protections: Verified [details from part I]
J └─╴[protected part, may be arbitrary MIME subtree]
]]></artwork></figure>

</section>
</section>
<section anchor="errant-encryption-layer"><name>Errant Encryption Layer</name>

<t>An MUA may encounter a message with an Errant Cryptographic Layer that offers confidentiality (encryption), and the MUA is capable of decrypting it.</t>

<t>The user wants to be able to see the contents of any message that they receive, so a conformant MUA in this situation <bcp14>SHOULD</bcp14> decrypt the part.</t>

<t>In this case, though, a conformant MUA <bcp14>MUST NOT</bcp14> indicate in the message's Cryptographic Summary that the message itself was encrypted.
Such an indication could be taken to mean that other (non-encrypted) parts of the message arrived with cryptographic confidentiality.</t>

<t>Furthermore, when decrypting an Errant Cryptographic Layer, the MUA <bcp14>MUST</bcp14> treat the decrypted cleartext as a distinct MIME subtree, and not attempt to merge or splice it together with any other part of the message.
This offers protection against the direct exfiltration (also known as EFAIL-DE) attacks described in <xref target="EFAIL"></xref> and so-called <spanx style="verb">multipart/oracle</spanx> attacks described in <xref target="ORACLE"></xref>.</t>

<section anchor="reply-to-errant-encryption"><name>Replying to a Message with an Errant Encryption Layer</name>

<t>Note that there is an asymmetry here between rendering and replying to a message with an Errant Encryption Layer.</t>

<t>When rendering, the MUA does not indicate that the message was encrypted, even if some subpart of it was decrypted for rendering.</t>

<t>When composing a reply to a message that has any encryption layer, even an errant one, the reply message <bcp14>SHOULD</bcp14> be marked for encryption, unless quoted and attributed text is not included in the reply, as noted in <xref target="composing-reply"/>.</t>

<t>When composing a reply to a message with an errant cryptographic layer, a conformant MUA <bcp14>MUST NOT</bcp14> decrypt any errant cryptographic layers when generating quoted or attributed text.
This will typically mean either leaving the ciphertext itself in the generated reply message, or simply not generating any quoted or attributed text at all.
This offers protection against the reply-based attacks described in <xref target="REPLY"></xref>.</t>

<t>In all circumstances, if the reply message cannot be encrypted (or if the user elects to not encrypt the reply), the composed reply <bcp14>MUST NOT</bcp14> include any material from the decrypted subpart.</t>

</section>
</section>
<section anchor="avoiding-non-mime-cryptographic-mechanisms"><name>Avoiding Non-MIME Cryptographic Mechanisms</name>

<t>In some cases, there may be a cryptographic signature or encryption that does not coincide with a MIME boundary.
For example so-called "PGP Inline" messages typically contain base64-encoded ("ASCII-armored", see <xref section="6" sectionFormat="of" target="I-D.ietf-openpgp-crypto-refresh-13"/>) ciphertext, or within the content of a MIME part.</t>

<section anchor="do-not-validate-non-mime-signatures"><name>Do Not Validate Non-MIME Signatures</name>

<t>When encountering cryptographic signatures in these positions, a conformant MUA <bcp14>MUST NOT</bcp14> attempt to validate any signature.
It is challenging to communicate to the user exactly which part of such a message is covered by the signature, so it is better to leave the message marked as Unprotected.
See <xref target="SPOOFING"></xref> for examples of spoofed message signatures that rely on permissive legacy clients that are willing to validate signatures in poorly-structured messages.</t>

</section>
<section anchor="skip-or-isolate-non-mime-decryption-when-rendering"><name>Skip or Isolate Non-MIME Decryption When Rendering</name>

<t>When encountering what appears to be encrypted data not at a MIME boundary, a conformant MUA <bcp14>MAY</bcp14> decline to decrypt the data at all.</t>

<t>During message rendering, if a conformant MUA attempts decryption of such a non-MIME encrypted section of an e-mail, it <bcp14>MUST</bcp14> synthesize a separate MIME part to contain only the decrypted data, and not attempt to merge or splice that part together with any other part of the message.
Keeping such a section distinct and isolated from any other part of the message offers protection against the direct exfiltration attacks (also known as EFAIL-DE) described in <xref target="EFAIL"></xref>.</t>

</section>
<section anchor="do-not-decrypt-non-mime-decryption-when-replying"><name>Do Not Decrypt Non-MIME Decryption when Replying</name>

<t>When composing a reply to a message with such a non-MIME encrypted section, a conformant MUA <bcp14>MUST NOT</bcp14> decrypt any non-MIME encrypted section when generating quoted or attributed text, similar to the guidance in <xref target="reply-to-errant-encryption"/>.</t>

<t>This offers protection against the reply-based attacks described in <xref target="REPLY"></xref>.</t>

</section>
</section>
</section>
<section anchor="forwarded-messages-with-cryptographic-protection"><name>Forwarded Messages with Cryptographic Protection</name>

<t>An incoming e-mail message may include an attached forwarded message, typically as a MIME subpart with <spanx style="verb">Content-Type: message/rfc822</spanx> (<xref target="RFC5322"/>) or <spanx style="verb">Content-Type: message/global</spanx> (<xref target="RFC5355"/>).</t>

<t>Regardless of the cryptographic protections and structure of the incoming message, the internal forwarded message may have its own Cryptographic Envelope.</t>

<t>The Cryptographic Layers that are part of the Cryptographic Envelope of the forwarded message are not Errant Cryptographic Layers of the surrounding message -- they are simply layers that apply to the forwarded message itself.</t>

<t>A conformant rendering MUA <bcp14>MUST NOT</bcp14> conflate the cryptographic protections of the forwarded message with the cryptographic protections of the incoming message.</t>

<t>A conformant rendering MUA <bcp14>MAY</bcp14> render a Cryptographic Summary of the protections afforded to the forwarded message by its own Cryptographic Envelope, as long as that rendering is unambiguously tied to the forwarded message itself, and cannot be spoofed either by the enclosing message or by the forwarded message.</t>

</section>
<section anchor="signature-failures"><name>Signature failures</name>

<t>A cryptographic signature may fail in multiple ways.
A conformant receiving MUA that discovers a failed signature treats the message as though the signature did not exist.
This is similar to the standard guidance for about failed DKIM signatures (see <xref section="6.1" sectionFormat="of" target="RFC6376"/>).</t>

<t>A conformant MUA <bcp14>MUST NOT</bcp14> render a message with a failed signature as more dangerous or more dubious than a comparable message without any signature at all.
In both cases, the Cryptographic Summary should be Unprotected.</t>

<t>A conformant MUA that encounters an encrypted-and-signed message where the signature is invalid <bcp14>SHOULD</bcp14> treat the message the same way that it would treat a message that is encryption-only, unless the MUA is providing the user with debugging information.</t>

<t>Some different ways that a signature may be invalid on a given message:</t>

<t><list style="symbols">
  <t>the signature is not cryptographically valid (the math fails).</t>
  <t>the signature relies on suspect cryptographic primitives (e.g., over a deprecated digest algorithm, or was made by a weak key, e.g., 1024-bit RSA); note that this requires the rendering MUA to have an explicit policy about what cryptographic primitives are acceptable.</t>
  <t>the signature is made by a certificate which the receiving MUA does not have access to.</t>
  <t>the certificate used to verify the signature was revoked.</t>
  <t>the certificate used to verify the signature was expired at the time that the signature was made.</t>
  <t>the certificate used to verify the signature does not correspond to the author of the message. (for X.509, there is no subjectAltName of type rfc822Name whose value matches an e-mail address found in <spanx style="verb">From:</spanx> or <spanx style="verb">Sender:</spanx>)</t>
  <t>the certificate used to verify the signature was not issued by an authority that the MUA user is willing to rely on for certifying the sender's e-mail address, and the user has no other reasonable indication that the certificate belongs to the sender's e-mail address.</t>
  <t>the signature indicates that it was made at a time much before or much after from the date of the message itself.</t>
  <t>The signature covers a message that depends on an external subresource that might change (see <xref target="external-subresources"/>).</t>
</list></t>

<t>A valid signature must pass all these tests, but of course invalid signatures may be invalid in more than one of the ways listed above.</t>

</section>
</section>
<section anchor="reasoning-about-message-parts"><name>Reasoning about Message Parts</name>

<t>When generating or rendering messages, it is useful to know what parts of the message are likely to be displayed, and how.
This section introduces some common terms that can be applied to parts within the Cryptographic Payload.</t>

<section anchor="main-body-part"><name>Main Body Part</name>

<t>When an e-mail message is composed or rendered to the user there is typically one main view that presents a (mostly textual) part of the message.</t>

<t>While the message itself may be constructed of several distinct MIME parts in a tree, the part that is rendered to the user is the "Main Body Part".</t>

<t>When rendering a message, one of the primary jobs of the receiving MUA is identifying which part (or parts) is the Main Body Part.
Typically, this is found by traversing the MIME tree of the message looking for a leaf node that has a primary content type of <spanx style="verb">text</spanx> (e.g., <spanx style="verb">text/plain</spanx> or <spanx style="verb">text/html</spanx>) and is not <spanx style="verb">Content-Disposition: attachment</spanx>.</t>

<t>MIME tree traversal follows the first child of every <spanx style="verb">multipart</spanx> node, with the exception of <spanx style="verb">multipart/alternative</spanx>.
When traversing a <spanx style="verb">multipart/alternative</spanx> node, all children should be scanned, with preference given to the last child node with a MIME type that the MUA is capable of rendering directly.</t>

<t>An MUA <bcp14>MAY</bcp14> offer the user a mechanism to prefer a particular MIME type within <spanx style="verb">multipart/alternative</spanx> instead of the last renderable child.
For example, a user may explicitly prefer a <spanx style="verb">text/plain</spanx> alternative part over <spanx style="verb">text/html</spanx>.
Note that due to uncertainty about the capabilities and configuration of the receiving MUA, a conformant composing MUA should consider that multiple parts might be rendered as the Main Body Part when the message is ultimately viewed.
In particular, the composing MUA should ensure that any part likely to be viewed as the Main Body Part has the same semantic content as any other such part.</t>

<t>When composing a message, an originating MUA operating on behalf of an active user can identify which part (or parts) are the "main" parts: these are the parts the MUA generates from the user's editor.
Tooling that automatically generates e-mail messages should also have a reasonable estimate of which part (or parts) are the "main" parts, as they can be programmatically identified by the message author.</t>

<t>For a filtering program that attempts to transform an outbound message without any special knowledge about which parts are Main Body Parts, it can identify the likely parts by following the same routine as a receiving MUA.</t>

</section>
<section anchor="attachments"><name>Attachments</name>

<t>A message may contain one or more separated MIME parts that are intended for download or extraction.
Such a part is commonly called an "attachment", and is commonly identified by having <spanx style="verb">Content-Disposition: attachment</spanx>.</t>

<t>An MUA <bcp14>MAY</bcp14> identify a subpart as an attachment, or permit extraction of a subpart even when the subpart does not have <spanx style="verb">Content-Disposition: attachment</spanx>.</t>

<t>When generating a message with end-to-end cryptographic protection, any attachment <bcp14>MUST</bcp14> be included within the Cryptographic Payload.
If an attachment is found outside the Cryptographic Payload, then the message is not well-formed (see <xref target="well-formed"/>), and will not be handled by other MUAs as intended.</t>

<t>Some MUAs have tried to compose messages where each attachment is placed in its own cryptographic envelope.
Such a message is problematic for several reasons:</t>

<t><list style="symbols">
  <t>The attachments can be stripped, replaced, or reordered without breaking any cryptographic integrity mechanism.</t>
  <t>The resulting message may have a mix of cryptographic statuses (e.g., if a signature on one part fails but another succeeds, or if one part is encrypted and another is not).
This mix of statuses is difficult to represent to the user in a comprehensible way.</t>
  <t>The divisions between the different attachments are visible to operators of any mail transport agent (MTA) that handles the message, potentially resulting in a metadata leak.
For example, the MTA operator may learn the number of attachments, and the size of each attachment.</t>
</list></t>

<t>These messages are unlikely to be usefully interoperable without additional standardization work (see <xref target="split-attachments"/>).</t>

</section>
<section anchor="mime-part-examples"><name>MIME Part Examples</name>

<t>Consider a common message with the following MIME structure:</t>

<figure><artwork><![CDATA[
M └─╴application/pkcs7-mime
   ↧ (decrypts to)
N  └─╴application/pkcs7-mime
    ⇩ (unwraps to)
O   └┬╴multipart/mixed
P    ├┬╴multipart/alternative
Q    │├─╴text/plain
R    │└─╴text/html
S    └─╴image/png
]]></artwork></figure>

<t>Parts <spanx style="verb">M</spanx> and <spanx style="verb">N</spanx> comprise the Cryptographic Envelope.</t>

<t>Parts <spanx style="verb">Q</spanx> and <spanx style="verb">R</spanx> are both Main Body Parts.</t>

<t>If part <spanx style="verb">S</spanx> is <spanx style="verb">Content-Disposition: attachment</spanx>, then it is an attachment.
If part <spanx style="verb">S</spanx> has no <spanx style="verb">Content-Disposition</spanx> header, it is potentially ambiguous whether it is an attachment or not.
If the sender prefers a specific behavior, it should explicitly set the <spanx style="verb">Content-Disposition</spanx> header on part <spanx style="verb">S</spanx> to either <spanx style="verb">inline</spanx> or <spanx style="verb">attachment</spanx> as guidance to the receiving MUA.</t>

<t>Consider also this alternate structure:</t>

<figure><artwork><![CDATA[
M └─╴application/pkcs7-mime
   ↧ (decrypts to)
N  └─╴application/pkcs7-mime
    ⇩ (unwraps to)
O   └┬╴multipart/alternative
P    ├─╴text/plain
Q    └┬╴multipart/related
R     ├─╴text/html
S     └─╴image/png
]]></artwork></figure>

<t>In this case, parts <spanx style="verb">M</spanx> and <spanx style="verb">N</spanx> are still the Cryptographic Envelope.</t>

<t>Parts <spanx style="verb">P</spanx> and <spanx style="verb">R</spanx> (the first two leaf nodes within each subtree of part <spanx style="verb">O</spanx>) are the Main Body Parts.</t>

<t>Part <spanx style="verb">S</spanx> is more likely not to be an attachment, as the subtree layout suggests that it is only relevant for the HTML version of the message.
For example, it might be rendered as an image within the HTML alternative.</t>

</section>
</section>
<section anchor="cert-management"><name>Certificate Management</name>

<t>A cryptographically-capable MUA typically maintains knowledge about certificates for the user's own account(s), as well as certificates for the peers that it communicates with.</t>

<section anchor="peer-certificates"><name>Peer Certificates</name>

<t>Most certificates that a cryptographically-capable MUA will use will be certificates belonging to the parties that the user communicates with through the MUA.
This section discusses how to manage the certificates that belong to such a peer.</t>

<t>The MUA will need to be able to discover X.509 certificates for each peer, cache them, and select among them when composing an encrypted message.</t>

<t>Detailed guidance about how to do this is beyond the scope of this document, but future revisions may bring it into scope (see <xref target="more-peer-certs"/>).</t>

<section anchor="peer-cert-selection"><name>Peer Certificate Selection</name>

<t>When composing an encrypted message, the MUA needs to select an encryption-capable certificate for each recipient.</t>

<t>To select such a certificate for a given destination e-mail address, the MUA should look through all of its known certificates and verify that <em>all</em> of the conditions below are met:</t>

<t><list style="symbols">
  <t>The certificate must be valid, not expired or revoked.</t>
  <t>It must have a subjectAltName of type rfc822Name whose contents match the destination address.
In particular, the local-part of the two addresses should be an exact bytewise match, and the domain parts of the two addresses should be matched by ensuring label equivalence across the full domain name, as described in <xref section="2.3.2.4" sectionFormat="of" target="RFC5890"/>.</t>
  <t>The algorithm OID in the certificate's SPKI is known to the MUA and capable of encryption.
Examples include:
  <list style="symbols">
      <t>rsaEncryption (OID 1.2.840.113549.1.1.1), with keyUsage (OID 2.5.29.15) extension present and the "key encipherment" bit (value 32) set.</t>
      <t>curveX25519 (OID 1.3.101.110) with keyUsage extension present and the "key agreement" bit (value 8) set.</t>
    </list></t>
  <t>If extendedKeyUsage (OID 2.5.29.37) is present, it contains at least one of the following OIDs: e-mail protection (OID 1.3.6.1.5.5.7.3.4), anyExtendedKeyUsage (OID 2.5.29.37.0).</t>
</list></t>

<t>A conformant MUA may include more considerations when selecting a peer certificate as well, see <xref target="more-peer-cert-selection"/> for examples.</t>

</section>
</section>
<section anchor="local-certificates"><name>Local Certificates</name>

<t>The MUA also needs to know about one or more certificates associated with the user's e-mail account.
It is typically expected to have access to the secret key material associated with the public keys in those certificates.</t>

<t>While some basic guidance is offered here, it is beyond the scope of this document to describe all possible relevant guidance for local certificate and key material handling.
See <xref target="more-local-certs"/> for suggestions of guidance that a future version might bring into scope.</t>

<section anchor="local-certificate-setup"><name>Getting Certificates for the User</name>

<t>If a conformant MUA does not have any certificate or secret key for the user, it should help the user to generate, acquire, or import them with a minimum of difficulty.</t>

<section anchor="local-cert-smime"><name>User Certificates for S/MIME</name>

<t>For S/MIME, the user <bcp14>SHOULD</bcp14> have both a signing-capable certificate and an encryption-capable certificate (and the corresponding secret keys).
Using the same cryptographic key material for multiple algorithms (i.e., for both encryption and signing) has been the source of vulnerabilities in other (non-e-mail) contexts (e.g., <xref target="DROWN"/> and <xref target="IKE"/>).
The simplest way to avoid any comparable risk is to use distinct key material for each cryptographic algorithm.
A conformant MUA that generates S/MIME certificates for the user <bcp14>MUST</bcp14> generate distinct S/MIME certificates: one for encryption and another for signing, to avoid possible cross-protocol key misuse.</t>

<t>The simplest option for an S/MIME-capable MUA is for the MUA to permit the user to import a PKCS #12 (<xref target="RFC7292"/>) object that is expected to contain secret key material, end entity certificates for the user, and intermediate certification authority certificates that permit chaining from the end entity certs to widely-accepted trust anchors.
A conformant MUA that imports such a PKCS #12 bundle <bcp14>SHOULD</bcp14> warn the user if the bundle contains an S/MIME certificate and corresponding secret key where the same secret key is used for both encryption and signing.</t>

<t>An S/MIME-capable MUA that has access to user certificates and their corresponding secret key material should also offer the ability to export those objects into a well-formed PKCS #12 object that could be imported into another MUA operated by the same user.</t>

<t>Manual handling of PKCS #12 objects is challenging for most users.
Producing the initial PKCS #12 object typically can only be done with the aid of a certification authority via non-standardized, labor-intensive, and error-prone procedures that most users do not understand.
Furthermore, manual export and import incurs ongoing labor (for example, before certificate expiration) by the user which most users are unprepared to do (see <xref target="local-cert-maintenance"/>).</t>

<t>A better approach is for the MUA to integrate some form of automated certificate issuance procedure, for example, by using the ACME protocol for end user S/MIME certificates (<xref target="RFC8823"/>).</t>

<t>Another possible approach is integration with a cryptographic hardware token or smartcard that can provide certificates and permit the use of isolated secret key material, for example <xref target="PKCS11"></xref>, though this approach delegates the complexity of acquiring and managing certificates to management of the hardware token itself (see <xref target="smartcards"/>).</t>

<t>See also <xref target="I-D.woodhouse-cert-best-practice"/> for more recommendations about managing user certificates.</t>

</section>
<section anchor="local-cert-pgp"><name>User Certificates for PGP/MIME</name>

<t>As distinct from S/MIME, OpenPGP (<xref target="I-D.ietf-openpgp-crypto-refresh-13"/>) has a different set of common practices.
For one thing, a single OpenPGP certificate can contain both a signing-capable key and a distinct encryption-capable key, so only one certificate is needed for an e-mail user of OpenPGP, as long as the certificate has distinct key material for the different purposes.</t>

<t>Furthermore, a single OpenPGP certificate <bcp14>MAY</bcp14> be only self-signed, so the MUA can generate such a certificate entirely on its own.</t>

<t>An OpenPGP-capable MUA should have the ability to import and export OpenPGP Tranferable Secret Keys (see <xref section="10.2" sectionFormat="of" target="I-D.ietf-openpgp-crypto-refresh-13"/>), to enable manual transfer of user certificates and secret key material between multiple MUAs controlled by the user.</t>

<t>Since an OpenPGP certificate <bcp14>MAY</bcp14> be certified by third parties (whether formal certification authorities or merely other well-connected peers) the MUA <bcp14>SHOULD</bcp14> offer affordances to help the user acquire and merge third party certifications on their certificate.
When doing this, the MUA should prioritize third-party certifications from entities that the user's peers are likely to know about and be willing to rely on.</t>

<t>Since an OpenPGP certificate can grow arbitrarily large with third-party certifications, the MUA should assist the user in pruning it to ensure that it remains a reasonable size when transmitting it to other parties.</t>

</section>
<section anchor="local-key-generation"><name>Generate Secret Key Material Locally</name>

<t>Regardless of protocol used (S/MIME or PGP), when producing certificates for the end user, the MUA <bcp14>SHOULD</bcp14> ensure that it has generated secret key material locally, and <bcp14>MUST NOT</bcp14> accept secret key material from an untrusted external party as the basis for the user's certificate.
For example, a user who trusts their system administrator not to compromise their MUA may accept secret key material generated by the sysdmin, but probably should not accept secret key material generated by an unaffiliated online web service.</t>

<t>An MUA that accepts secret key material from a third party cannot prevent that third party from retaining this material.
A third party with this level of access could decrypt messages intended to be confidential for the user, or could forge messages that would appear to come from the user.</t>

</section>
</section>
<section anchor="local-cert-maintenance"><name>Local Certificate Maintenance</name>

<t>In the context of a single e-mail account managed by an MUA, where that e-mail account is expected to be able to use end-to-end cryptographic protections, the MUA <bcp14>SHOULD</bcp14> warn the user (or proactively fix the problem) when/if:</t>

<t><list style="symbols">
  <t>For S/MIME, the user's own certificate set for the account does not include a valid, unexpired encryption-capable X.509 certificate, and a valid, unexpired signature-capable X.509 certificate.</t>
  <t>For PGP/MIME, the user's own certificate does not include a valid, unexpired signing-capable key/subkey and a valid, unexpired encryption-capable key/subkey.</t>
  <t>Any of the user's own certificates for the account:
  <list style="symbols">
      <t>is due to expire in the next month (or at some other reasonable cadence).</t>
      <t>not match the e-mail address associated with the account in question.</t>
    </list></t>
  <t>Any of the user's own S/MIME certificates for the account:
  <list style="symbols">
      <t>does not have a keyUsage extension.</t>
      <t>does not contain an extendedKeyUsage extension.</t>
      <t>would be considered invalid by the MUA for any other reason if it were a peer certificate.</t>
    </list></t>
</list></t>

<t>An MUA that takes active steps to fix any of these problems before they arise is even more usable than just warning, but guidance on how to do active certificate maintenance is beyond scope for this current document (see <xref target="more-local-cert-maintenance"/>).</t>

<t>If the MUA does find any of these issues and chooses to warn the user, it should use one aggregate warning with simple language that the certificates might not be acceptable for other people, and recommend a course of action that the user can take to remedy the problem.</t>

</section>
<section anchor="sending-certificates"><name>Shipping Certificates in Outbound Messages</name>

<t>When sending mail, a conformant MUA <bcp14>SHOULD</bcp14> include copies of the user's own certificates (and potentially other certificates) in each message to facilitate future communication, unless it has specific knowledge that the other parties involved already know the relevant keys (for example, if it is mail between members within a domain that has a synchronized and up-to-date certificate directory).</t>

<t>The mechanism for including these certificates, and which certificates to include in the message, are protocol specific.</t>

<section anchor="shipping-certificates-in-smime-messages"><name>Shipping Certificates in S/MIME Messages</name>

<t>In any S/MIME SignedData object, certificates can be shipped in the "certificates" member.
In S/MIME EnvelopedData object, certificates can be shipped in the "originatorInfo.certs" member.</t>

<t>When a single S/MIME-protected e-mail message is encrypted and signed, it is usually sufficient to ship all the relevant certificates in the inner SignedData object's "certificates" member.</t>

<t>The S/MIME certificates shipped in such a message <bcp14>SHOULD</bcp14> include:</t>

<t><list style="symbols">
  <t>The user's own S/MIME signing certificate, so that signature on the current message can be validated.</t>
  <t>The user's own S/MIME encryption-capable certificate, so that the recipient can reply in encrypted form.</t>
  <t>On an encrypted message to multiple recipients, the encryption-capable peer certificates of the other recipients, so that any recipient can easily "reply all" without needing to search for certificates.</t>
  <t>Any intermediate CA certificates needed to chain all of the above to a widely-trusted set of root authorities.</t>
</list></t>

</section>
<section anchor="shipping-certificates-in-pgpmime-messages"><name>Shipping Certificates in PGP/MIME Messages</name>

<t>PGP/MIME does not have a single specific standard location for shipping certificates.</t>

<t>Some MUAs ship relevant OpenPGP certificates in a single MIME leaf of Content-Type "application/pgp-keys".
When such a message has cryptographic protections, to ensure that the message is well-formed, this kind of MIME part <bcp14>SHOULD</bcp14> be a leaf of the Cryptographic Payload, and not outside of it.
One problem with this approach is that it appears to recipients with non-cryptographic MUAs as an "attachment", which can lead to confusion if the user does not know how to use it.</t>

<t>Other implementations ship relevant OpenPGP certificates in "Autocrypt" or "Autocrypt-Gossip" message header fields (see <xref target="AUTOCRYPT"/>).
To ensure that those header fields receive the same cryptographic authenticity as the rest of the message, these header fields <bcp14>SHOULD</bcp14> be protected as described in <xref target="I-D.ietf-lamps-header-protection"/>.</t>

<t>The OpenPGP certificates shipped in such a message <bcp14>SHOULD</bcp14> include:</t>

<t><list style="symbols">
  <t>The user's own OpenPGP certificate, capable of both signing and encryption, so that the user can validate the message's signature and can encrypt future messages</t>
  <t>On an encrypted message to multiple recipients, the OpenPGP certificates of the other recipients, so that any recipient can easily "reply all" without needing to search for certificates.</t>
</list></t>

</section>
</section>
</section>
</section>
<section anchor="common-pitfalls"><name>Common Pitfalls and Guidelines</name>

<t>This section highlights a few "pitfalls" and guidelines based on these discussions and lessons learned.</t>

<section anchor="reading-sent-messages"><name>Reading Sent Messages</name>

<t>When sending a message, a typical MUA will store a copy of the message sent in sender's Sent mail folder so that the sender can read it later.
If the message is an encrypted message, storing it encrypted requires some forethought to ensure that the sender can read it in the future.</t>

<t>It is a common and simple practice to encrypt the message not only to the recipients of the message, but also to the sender.
One advantage of doing this is that the message that is sent on the wire can be identical to the message stored in the sender's Sent mail folder.
This allows the sender to review and re-read the message even though it was encrypted.</t>

<t>There are at least three other approaches that are possible to ensure future readability by the sender of the message, but with different tradeoffs:</t>

<t><list style="symbols">
  <t>Encrypt two versions of the message: one to the recipients (this version is sent on the wire), and one to the sender only (this version is stored in the sender's Sent folder).
This approach means that the message stored in the Sent folder is not byte-for-byte identical to the message sent to the recipients.
In the event that message delivery has a transient failure, the MUA cannot simply re-submit the stored message into the SMTP system and expect it to be readable by the recipient.</t>
  <t>Store a cleartext version of the message in the Sent folder.
This presents a risk of information leakage: anyone with access to the Sent folder can read the contents of the message.
Furthermore, any attempt to re-send the message needs to also re-apply the cryptographic transformation before sending, or else the message contents will leak upon re-send.
A conformant MUA <bcp14>SHOULD NOT</bcp14> store a cleartext copy in the Sent folder unless it knows that the Sent folder cannot be read by an attacker.
For example, if end-to-end confidentiality is desired, then storing the cleartext in an IMAP folder where a potentially adversarial server can read it defeats the purpose.</t>
  <t>A final option is that the MUA can store a copy of the message's encryption session key.
Standard e-mail encryption mechanisms (e.g., S/MIME and PGP/MIME) are hybrid mechanisms: the asymmetric encryption steps simply encrypt a symmetric "session key", which is used to encrypt the message itself.
If the MUA stores the session key itself, it can use the session key to decrypt the Sent message without needing the Sent message to be decryptable by the user's own asymmetric key.
An MUA doing this must take care to store (and backup) its stash of session keys, because if it loses them it will not be able to read the sent messages; and if someone else gains access to them, they can decrypt the sent messages.
This has the additional consequence that any other MUA accessing the same Sent folder cannot decrypt the message unless it also has access to the stashed session key.</t>
</list></t>

</section>
<section anchor="reading-encrypted-messages-after-certificate-expiration"><name>Reading Encrypted Messages after Certificate Expiration</name>

<t>When encrypting a message, the sending MUA should decline to encrypt to an expired certificate (see <xref target="peer-cert-selection"/>).
But when decrypting a message, as long as the viewing MUA has access to the appropriate secret key material, it should permit decryption of the message, even if the associated certificate is expired.
That is, the viewing MUA should not prevent the user from reading a message that they have already received.</t>

<t>The viewing MUA may warn the user when decrypting a message that appears to have been encrypted to an encryption-capable certificate that was expired at the time of encryption (e.g., based on the <spanx style="verb">Date:</spanx> header field of the message, or the timestamp in the cryptographic signature), but otherwise should not complain.</t>

<t>The primary goal of certificate expiration is to facilitate rotation of secret key material, so that secret key material does not need to be retained indefinitely.
Certificate expiration permits the user to destroy an older secret key if access to the messages received under it is no longer necessary (see also <xref target="secure-deletion"/>).</t>

</section>
<section anchor="message-header-fields"><name>Unprotected Message Header Fields</name>

<t>Many legacy cryptographically-aware MUAs only apply cryptographic protections to the body of the message, but leave the header fields unprotected.
This gives rise to vulnerabilities like information leakage (e.g., the Subject line is visible to a passive intermediary) or message tampering (e.g., the Subject line is replaced, effectively changing the semantics of a signed message).
These are not only security vulnerabilities, but usability problems, because the distinction between what is a header and what is the body of a message is unclear to many end users, and requires a more complex mental model than is necessary.
Useful security comes from alignment between simple mental models and tooling.</t>

<t>To avoid these concerns, a conformant MUA <bcp14>MUST</bcp14> implement header protection as described in <xref target="I-D.ietf-lamps-header-protection"/>.</t>

<t>Note that some message header fields, like <spanx style="verb">List-*</spanx>, <spanx style="verb">Archived-At</spanx>, and <spanx style="verb">Resent-*</spanx> are typically added by an intervening MUA (see <xref target="intervening-mua"/>), not by one of the traditional "ends" of an end-to-end e-mail exchange.
A receiving MUA may choose to consider the contents of these header fields on an end-to-end protected message as markers added during message transit, even if they are not covered by the end-to-end cryptographic protection.</t>

</section>
<section anchor="bcc-variants"><name>Composing an Encrypted Message with Bcc</name>

<t>When composing an encrypted message containing at least one recipient address in the <spanx style="verb">Bcc</spanx> header field, there is a risk that the encrypted message itself could leak information about the actual recipients, even if the <spanx style="verb">Bcc</spanx> header field does not mention the recipient.
For example, if the message clearly indicates which certificates it is encrypted to, the set of certificates can identify the recipients even if they are not named in the message header fields.</t>

<t>Because of these complexities, there are several interacting factors that need to be taken into account when composing an encrypted message with Bcc'ed recipients.</t>

<t><list style="symbols">
  <t><xref section="3.6.3" sectionFormat="of" target="RFC5322"/> describes a set of choices about whether (and how) to populate the <spanx style="verb">Bcc</spanx> field explicitly on Bcc'ed copies of the message, and in the copy stored in the sender's <spanx style="verb">Sent</spanx> folder.</t>
  <t>When separate copies are made for <spanx style="verb">Bcc</spanx>ed recipients, should each separate copy <em>also</em> be encrypted to the named recipients, or just to the designated <spanx style="verb">Bcc</spanx> recipient?</t>
  <t>When a copy is stored in the <spanx style="verb">Sent</spanx> folder, should that copy also be encrypted to <spanx style="verb">Bcc</spanx>ed recipients? (see also <xref target="reading-sent-messages"/>)</t>
  <t>When a message is encrypted, if there is a mechanism to include the certificates of the recipients, whose certificates should be included?</t>
</list></t>

<section anchor="bcc-recommendation"><name>Simple Encryption with Bcc</name>

<t>Here is a simple approach that tries to minimize the total number of variants of the message created while leaving a coherent view of the message itself:</t>

<t><list style="symbols">
  <t>No cryptographic payload contains any <spanx style="verb">Bcc</spanx> header field.</t>
  <t>The main copy of the message is signed and encrypted to all named recipients and to the sender.
A copy of this message is also stored in the sender's <spanx style="verb">Sent</spanx> folder.</t>
  <t>Each <spanx style="verb">Bcc</spanx> recipient receives a distinct copy of the message, with an identical cryptographic payload, and the message is signed and encrypted to that specific recipient and all the named recipients.
These copies are not stored in the sender's <spanx style="verb">Sent</spanx> folder.</t>
  <t>To the extent that spare certificates are included in the message, each generated copy of the message should include certificates for the sender and for each named recipient.
Certificates for Bcc'ed recipients are not included in any message.</t>
</list></t>

<section anchor="rationale"><name>Rationale</name>

<t>The approach described in <xref target="bcc-recommendation"/>  aligns the list of cryptographic recipients as closely as possible with the set of named recipients, while still allowing a <spanx style="verb">Bcc</spanx>ed recipient to read their own copy, and to "Reply All" should they want to.</t>

<t>This should reduce user confusion on the receiving side: a recipient of such a message who naively looks at the user-facing header fields from their own mailbox will have a good sense of what cryptographic treatments have been applied to the message.
It also simplifies message composition and user experience: the message composer sees fields that match their expectations about what will happen to the message.
Additionally, it may preserve the ability for a Bcc'ed recipient to retain their anonymity, should they need to offer the signed cryptographic payload to an outside party as proof of the original sender's intent without revealing their own identity.</t>

</section>
</section>
</section>
<section anchor="draft-messages"><name>Draft Messages</name>

<t>When composing a message, most MUAs will save a copy of the as-yet-unsent message to a "Drafts" folder.
If that folder is itself stored somewhere not under the user's control (e.g., an IMAP mailbox), it would be a mistake to store the draft message in the clear, because its contents could leak.</t>

<t>This is the case even if the message is ultimately sent deliberately in the clear.
During message composition, the MUA does not know whether the message is intended to be sent encrypted or not.
For example, just before sending, the sender could decide to encrypt the message, and the MUA would have had no way of knowing.</t>

<t>The MUA <bcp14>SHOULD</bcp14> encrypt all draft messages, unless it has explicit knowledge that the message will not be encrypted when sent, or that the Drafts folder cannot be read by an attacker.
For example, if end-to-end confidentiality is desired, then storing a cleartext draft in an IMAP folder where a potentially adversarial server can read it defeats the purpose.</t>

<t>Furthermore, when encrypting a draft message, the message draft <bcp14>MUST</bcp14> only be encrypted to the user's own certificate, or to some equivalent secret key that only the user possesses.
A draft message encrypted in this way can be decrypted when the user wants to resume composing the message, but cannot be read by anyone else, including a potential intended recipient.
Note that a draft message encrypted in this way will only be resumable by another MUA attached to the same mailbox if that other MUA has access to the user's decryption-capable secret key.
This shared access to key material is also likely necessary for useful interoperability, but is beyond the scope of this document (see <xref target="cross-mua-local-keys"/>).</t>

<t>A conformant MUA <bcp14>MUST NOT</bcp14> sign a message draft with the user's normal signing key.
If draft signing is intended for cryptographic coordination between multiple MUAs of the same user, it should be negotiated with a different key (but see <xref target="cross-mua-local-keys"/>).</t>

<t>The message should only be encrypted to its recipients upon actually sending the message.
No reasonable user expects their message's intended recipients to be able to read a message that is not yet complete.</t>

</section>
<section anchor="mixed-recipients"><name>Composing a Message to Heterogeneous Recipients</name>

<t>When sending a message that the user intends to be encrypted, it's possible that some recipients will be unable to receive an encrypted copy.
For example, when Carol composes a message to Alice and Bob, Carol's MUA may be able to find a valid encryption-capable certificate for Alice, but none for Bob.</t>

<t>In this situation, there are four possible strategies, each of which has a negative impact on the experience of using encrypted mail.
Carol's MUA can:</t>

<t><list style="numbers">
  <t>send encrypted to Alice and Bob, knowing that Bob will be unable to read the message.</t>
  <t>send encrypted to Alice only, dropping Bob from the message recipient list.</t>
  <t>send the message in the clear to both Alice and Bob.</t>
  <t>send an encrypted copy of the message to Alice, and a cleartext copy to Bob.</t>
</list></t>

<t>Each of these strategies has different drawbacks.</t>

<t>The problem with approach 1 is that Bob will receive unreadable mail.</t>

<t>The problem with approach 2 is that Carol's MUA will not send the message to Bob, despite Carol asking it to.</t>

<t>The problem with approach 3 is that Carol's MUA will not encrypt the message, despite Carol asking it to.</t>

<t>Approach 4 has two problems:</t>

<t><list style="symbols">
  <t>Carol's MUA will release a cleartext copy of the message, despite Carol asking it to send the message encrypted.</t>
  <t>If Alice wants to "reply all" to the message, she may not be able to find an encryption-capable certificate for Bob either.
This puts Alice in an awkward and confusing position, one that users are unlikely to understand.
In particular, if Alice's MUA is following the guidance about replies to encrypted messages in <xref target="composing-reply"/>, having received an encrypted copy will make Alice's Reply buffer behave in an unusual fashion.</t>
</list></t>

<t>This is particularly problematic when the second recipient is not "Bob" but in fact a public mailing list or other visible archive, where messages are simply never encrypted.</t>

<t>Carol is unlikely to understand the subtleties and negative downstream interactions involved with approaches 1 and 4, so presenting the user with those choices is not advised.</t>

<t>The most understandable approach for an MUA with an active user is to ask the user (when they hit "send") to choose between approach 2 and approach 3.
If the user declines to choose between 2 and 3, the MUA can drop them back to their message composition window and let them make alternate adjustments.</t>

<t>See also further discussion of these scenarios in <xref target="I-D.dkg-mail-cleartext-copy"/>.</t>

</section>
<section anchor="proxy-dangers"><name>Message Transport Protocol Proxy: A Dangerous Implementation Choice</name>

<t>An implementer of end-to-end cryptographic protections may be tempted by a simple software design that piggybacks off of a mail protocol like SMTP Submission (<xref target="RFC6409"/>), IMAP (<xref target="RFC9051"/>), or JMAP (<xref target="RFC8621"/>) to handle message assembly and interpretation.
In such an architecture, a naive MUA speaks something like a "standard" protocol like SMTP, IMAP, or JMAP to a local proxy, and the proxy handles signing and encryption (outbound), and decryption and verification (inbound) internally on behalf of the user.
While such a "pluggable" architecture has the advantage that it is likely to be easy to apply to any mail user agent, it is problematic for the goals of end-to-end communication, especially in an existing cleartext ecosystem like e-mail, where any given message might be unsigned or signed, cleartext or encrypted.
In particular:</t>

<t><list style="symbols">
  <t>the user cannot easily and safely identify what protections any particular message has (including messages currently being composed), and</t>
  <t>the proxy itself is unaware of subtle nuances about the message that the MUA actually knows.</t>
</list></t>

<t>With a trustworthy and well-synchronized sidechannel or protocol extension between the MUA and the proxy, it is possible to deploy such an implementation safely, but the requirement for the sidechannel or extension eliminates the universal-deployability advantage of the scheme.</t>

<t>Similar concerns apply to any implementation bound by an API which operates on message objects alone, without any additional contextual parameters.</t>

<t>This section attempts to document some of the inherent risks involved with such an architecture.</t>

<section anchor="proxy-for-message-composition"><name>Dangers of a Submission Proxy for Message Composition</name>

<t>When composing and sending a message, the act of applying cryptographic protections has subtleties that cannot be directly expressed in the SMTP protocol used by Submission <xref target="RFC6409"/>, or in any other simple protocol that hands off a cleartext message for further processing.</t>

<t>For example, the sender cannot indicate via SMTP whether or not a given message <em>should</em> be encrypted (some messages, like those sent to a publicly archived mailing list, are pointless to encrypt), or select among multiple certificates for a recipient, if they exist (see <xref target="peer-cert-selection"/>).</t>

<t>Likewise, because such a proxy only interacts with the message when it is ready to be sent, it cannot indicate back to the user <em>during message composition</em> whether or not the message is able to be encrypted (that is, whether a valid certificate is available for each intended recipient).
A message author may write an entirely different message if they know that it will be protected end-to-end; but without this knowledge, the author is obliged either to write text that they presume will be intercepted, or to risk revealing sensitive content.</t>

<t>Even without encryption, deciding whether to sign or not (and which certificate to sign with, if more than one exists) is another choice that the proxy is ill-equipped to make.
The common message-signing techniques either render a message unreadable by any non-cryptographic MUA (i.e., PKCS7 signed-data), or appear as an attachment that can cause confusion to a naive recipient using a non-cryptographic MUA (i.e., multipart/signed).
If the sender knows that the recipient will not check signatures, they may prefer to leave a cleartext message without a cryptographic signature at all.</t>

<t>Furthermore, handling encryption properly depends on the context of any given message, which cannot be expressed by the MUA to the Submission proxy.
For example, decisions about how to handle encryption and quoted or attributed text may depend on the cryptographic status of the message that is being replied to (see <xref target="composing-reply"/>).</t>

<t>Additionally, such a proxy would need to be capable of managing the user's own key and certificate (see <xref target="local-certificates"/>).
How will the implementation indicate to the user when their own certificate is near expiry, for example?
How will any other error conditions be handled when communication with the user is needed?</t>

<t>While an extension to SMTP might be able to express all the necessary semantics that would allow a generic MUA to compose messages with standard cryptographic protections via a proxy, such an extension is beyond the scope of this document.
See <xref target="I-D.ietf-jmap-smime-sender-extensions"/> for an example of how an MUA using a proxy protocol might indicate signing and encryption instructions to its proxy.</t>

</section>
<section anchor="dangers-of-an-imap-proxy-for-message-rendering"><name>Dangers of an IMAP Proxy for Message Rendering</name>

<t>When receiving and rendering a message, the process of indicating to the user the cryptographic status of a message requires subtleties that are difficult to offer from a straightforwad IMAP (or POP <xref target="RFC1939"/>, or JMAP) proxy.</t>

<t>One approach such a proxy could take is to remove all the Cryptographic Layers from a well-formed message, and to package a description of those layers into a special header field that the MUA can read.
But this merely raises the question: what semantics need to be represented?
For example:</t>

<t><list style="symbols">
  <t>Was the message signed?  If so, by whom?  When?</t>
  <t>Should the details of the cryptographic algorithms used in any signatures found be indicated as well?</t>
  <t>Was the message encrypted?  if so, to whom?  What key was used to decrypt it?</t>
  <t>If both signed and encrypted, was the signing outside the encryption or inside?</t>
  <t>How should errant Cryptographic Layers (see <xref target="errant-cryptographic-layers"/>) be dealt with?</t>
  <t>What cryptographic protections do the header fields of the message have? (see <xref target="I-D.ietf-lamps-header-protection"/>)</t>
  <t>How are any errors or surprises communicated to the user?</t>
</list></t>

<t>If the proxy passes any of this cryptographic status to the client in an added header field, it must also ensure that no such header field is present on the messages it receives before processing it.
If it were to allow such a header field through unmodified to any client that is willing to trust its contents, an attacker could spoof the field to make the user believe lies about the cryptographic status of the message.
In order for an MUA to be confident in such a header field, then, it needs a guarantee from the proxy that any header it produces will be safe.
How does the MUA reliably negotiate this guarantee with the proxy?
If the proxy can no longer offer this guarantee, how will the MUA know that things have changed?</t>

<t>If such an inbound proxy handles certificate discovery in inbound messages (see <xref target="peer-discovery-incoming"/>), it will also need to communicate the results of that discovery process to its corresponding outbound proxy for message composition (see <xref target="proxy-for-message-composition"/>).</t>

<t>While an extension to IMAP (or POP, or JMAP) might be able to express all the necessary semantics that would allow a generic MUA to indicate standardized cryptographic message status, such an extension is beyond the scope of this document.
<xref target="RFC9219"/> describes S/MIME signature verification status over JMAP, which is a subset of the cryptographic status information described here.</t>

</section>
<section anchor="who-controls-the-proxy"><name>Who Controls the Proxy?</name>

<t>Finally, consider that the naive proxy deployment approach is risky precisely because of its opacity to the end user.
Such a deployment could be placed anywhere in the stack, including on a machine that is not ultimately controlled by the end user, making it effectively a form of transport protection, rather than end-to-end protection.</t>

<t>An MUA explicitly under the control of the end user with thoughtful integration can offer UI/UX and security guarantees that a simple proxy cannot provide.
See also <xref target="proxy-extensions"/> for suggestions of future work that might augment a proxy to make it safer.</t>

</section>
</section>
<section anchor="intervening-mua"><name>Intervening MUAs Do Not Handle End-to-End Cryptographic Protections</name>

<t>Some Mail User Agents (MUAs) will resend a message in identical form (or very similar form) to the way that they received it.
For example, consider the following use cases:</t>

<t><list style="symbols">
  <t>A mail expander or mailing list that receives a message and re-sends it to all subscribers.</t>
  <t>An individual user who reintroduces a message they received into the mail transport system (see <xref section="3.6.6" sectionFormat="of" target="RFC5322"/>).</t>
  <t>An automated e-mail intake system that forwards a report to the mailboxes of responsible staffers.</t>
</list></t>

<t>These MUAs intervene in message transport by receiving and then re-injecting messages into the mail transport system.
In some cases, the original sender or final recipient of a message that has passed through such an MUA may be unaware of the intervention.
(Note that an MUA that forwards a received message as a attachment (MIME subpart) of type <spanx style="verb">message/rfc822</spanx> or <spanx style="verb">message/global</spanx> or "inline" in the body of a message is <em>not</em> acting as an intervening MUA in this sense, because the forwarded message is encapsulated within a visible outer message that is clearly from the MUA itself.)</t>

<t>An intervening MUA should be aware of end-to-end cryptographic protections that might already exist on messages that they re-send.
In particular, it is unclear what the "end-to-end" properties are of a message that has been handled by an intervening MUA.
For signed-only messages, if the intervening MUA makes any substantive modifications to the message as it passes it along, it may break the signature from the original sender.
In many cases, breaking the original signature is the appropriate result, since the original message has been modified, and the original sender has no control over the modifications made by the intervening MUA.
For encrypted-and-signed messages, if the intervening MUA is capable of decrypting the message, it must be careful when re-transmitting the message.
Will the new recipient be able to decrypt it?
If not, will the message be useful to the recipient?
If not, it may not make sense to re-send the message.</t>

<t>Beyond the act of re-sending, an intervening MUA should not itself try to apply end-to-end cryptographic protections on a message that it is resending unless directed otherwise by some future specification.
Additional layers of cryptographic protection added in an ad-hoc way by an intervening MUA are more likely to confuse the recipient and will not be interpretable as end-to-end protections as they do not originate with the original sender of the message.</t>

</section>
<section anchor="external-subresources"><name>External Subresources in MIME Parts Break Cryptographic Protections</name>

<t>A MIME part with a content type that can refer to external resources (like <spanx style="verb">text/html</spanx>) may itself have some sort of end-to-end cryptographic protections.
However, retrieving or rendering these external resources may violate the properties that users expect from cryptographic protection.</t>

<t>As a baseline, retrieving the external resource at the time a message is read can be used as a "web bug", leaking the activity and network location of the receiving user to the server hosting the external resource.
This privacy risk is present, of course, even for messages with no cryptographic protections, but may be even more surprising to users who are shown some level of security indicator about a given message.</t>

<t>Other problems with external resources are more specifically bound to cryptographic protections.</t>

<t>For example, an signed e-mail message with at <spanx style="verb">text/html</spanx> part that refers to an external image (i.e., via <spanx style="verb">&lt;img src="https://example.com/img.png"&gt;</spanx>) may render differently if the hosting webserver decides to serve different content at the source URL for the image.
This effectively breaks the goals of integrity and authenticity that the user should be able to rely on for signed messages, unless the external subresource has strict integrity guarantees (e.g., via <xref target="SRI"/>).</t>

<t>Likewise, fetching an external subresource for an encrypted-and-signed message effectively breaks goals of privacy and confidentiality for the user.</t>

<t>This is loosely analogous to security indicator problems that arose for web browsers as described in <xref target="mixed-content"/>.
However, while fetching the external subresource over https is sufficient to avoid a "mixed content" warning from most browsers, it is insufficicent for an MUA that wants to offer its users true end-to-end guarantees for e-mail messages.</t>

<t>A conformant sending MUA that applies signing-only cryptographic protection to a new e-mail message with an external subresource should take one of the following options:</t>

<t><list style="symbols">
  <t>pre-fetch the external subresource and include it in the message itself,</t>
  <t>use a strong integrity mechanism like Subresource Integrity (<xref target="SRI"/>) to guarantee the content of the subresource (though this does not fix the "web bug" privacy risk described above), or</t>
  <t>prompt the composing user to remove the subresource from the message.</t>
</list></t>

<t>A conformant sending MUA that applies encryption to a new e-mail message with an external resource cannot depend on subresource integrity to protect the privacy and confidentiality of the message, so it should either pre-fetch the external resource to include it in the message, or prompt the composing user to remove it before sending.</t>

<t>A conformant receiving MUA that encounters a message with end-to-end cryptographic protections that contain a subresource <bcp14>MUST</bcp14> either refuse to retrieve and render the external subresource, or it should decline to treat the message as having cryptographic protections.
For example, it could indicate in the Cryptographic Summary that the message is Unprotected.</t>

<t>Note that when composing a message reply with quoted text from the original message, if the original message did contain an external resource, the composing MUA <bcp14>SHOULD NOT</bcp14> fetch the external resource solely to include it in the reply message, as doing so would trigger the "web bug" at reply composition time.
Instead, the safest way to deal with quoted text that contains an external resource in an end-to-end encrypted reply is to strip any reference to the external resource during initial composition of the reply.</t>

</section>
</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document does not require anything from IANA.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>This entire document addresses security considerations about end-to-end cryptographic protections for e-mail messages.</t>

</section>
<section anchor="acknowledgements"><name>Acknowledgements</name>

<t>The set of constructs and recommendations in this document are derived from discussions with many different implementers, including
Bjarni Rúnar Einarsson,
Daniel Huigens,
David Bremner,
Deb Cooley,
Eliot Lear,
Fabian Ising,
Heiko Schaefer,
Holger Krekel,
Jameson Rollins,
John Levine,
Jonathan Hammell,
juga,
Patrick Brunschwig,
Paul Kyzivat,
Pete Resnick,
Roman Danyliw,
Santosh Chokhani,
Stephen Farrell, and
Vincent Breitmoser.</t>

</section>


  </middle>

  <back>


    <references title='Normative References'>



<reference anchor='RFC8551'>
  <front>
    <title>Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 4.0 Message Specification</title>
    <author fullname='J. Schaad' initials='J.' surname='Schaad'/>
    <author fullname='B. Ramsdell' initials='B.' surname='Ramsdell'/>
    <author fullname='S. Turner' initials='S.' surname='Turner'/>
    <date month='April' year='2019'/>
    <abstract>
      <t>This document defines Secure/Multipurpose Internet Mail Extensions (S/MIME) version 4.0. S/MIME provides a consistent way to send and receive secure MIME data. Digital signatures provide authentication, message integrity, and non-repudiation with proof of origin. Encryption provides data confidentiality. Compression can be used to reduce data size. This document obsoletes RFC 5751.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8551'/>
  <seriesInfo name='DOI' value='10.17487/RFC8551'/>
</reference>

<reference anchor='RFC3156'>
  <front>
    <title>MIME Security with OpenPGP</title>
    <author fullname='M. Elkins' initials='M.' surname='Elkins'/>
    <author fullname='D. Del Torto' initials='D.' surname='Del Torto'/>
    <author fullname='R. Levien' initials='R.' surname='Levien'/>
    <author fullname='T. Roessler' initials='T.' surname='Roessler'/>
    <date month='August' year='2001'/>
    <abstract>
      <t>This document describes how the OpenPGP Message Format can be used to provide privacy and authentication using the Multipurpose Internet Mail Extensions (MIME) security content types described in RFC 1847. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='3156'/>
  <seriesInfo name='DOI' value='10.17487/RFC3156'/>
</reference>

<reference anchor='RFC4289'>
  <front>
    <title>Multipurpose Internet Mail Extensions (MIME) Part Four: Registration Procedures</title>
    <author fullname='N. Freed' initials='N.' surname='Freed'/>
    <author fullname='J. Klensin' initials='J.' surname='Klensin'/>
    <date month='December' year='2005'/>
    <abstract>
      <t>This document specifies IANA registration procedures for MIME external body access types and content-transfer-encodings. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='13'/>
  <seriesInfo name='RFC' value='4289'/>
  <seriesInfo name='DOI' value='10.17487/RFC4289'/>
</reference>

<reference anchor='RFC2119'>
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname='S. Bradner' initials='S.' surname='Bradner'/>
    <date month='March' year='1997'/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='14'/>
  <seriesInfo name='RFC' value='2119'/>
  <seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>

<reference anchor='RFC8174'>
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname='B. Leiba' initials='B.' surname='Leiba'/>
    <date month='May' year='2017'/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='14'/>
  <seriesInfo name='RFC' value='8174'/>
  <seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>

<reference anchor='RFC5890'>
  <front>
    <title>Internationalized Domain Names for Applications (IDNA): Definitions and Document Framework</title>
    <author fullname='J. Klensin' initials='J.' surname='Klensin'/>
    <date month='August' year='2010'/>
    <abstract>
      <t>This document is one of a collection that, together, describe the protocol and usage context for a revision of Internationalized Domain Names for Applications (IDNA), superseding the earlier version. It describes the document collection and provides definitions and other material that are common to the set. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='5890'/>
  <seriesInfo name='DOI' value='10.17487/RFC5890'/>
</reference>


<reference anchor='I-D.ietf-lamps-header-protection'>
   <front>
      <title>Header Protection for Cryptographically Protected E-mail</title>
      <author fullname='Daniel Kahn Gillmor' initials='D. K.' surname='Gillmor'>
         <organization>American Civil Liberties Union</organization>
      </author>
      <author fullname='Bernie Hoeneisen' initials='B.' surname='Hoeneisen'>
         <organization>pEp Project</organization>
      </author>
      <author fullname='Alexey Melnikov' initials='A.' surname='Melnikov'>
         <organization>Isode Ltd</organization>
      </author>
      <date day='13' month='February' year='2024'/>
      <abstract>
	 <t>   S/MIME version 3.1 introduced a mechanism to provide end-to-end
   cryptographic protection of e-mail message headers.  However, few
   implementations generate messages using this mechanism, and several
   legacy implementations have revealed rendering or security issues
   when handling such a message.

   This document updates the S/MIME specification to offer a different
   mechanism that provides the same cryptographic protections but with
   fewer downsides when handled by legacy clients.  The Header
   Protection schemes described here are also applicable to messages
   with PGP/MIME cryptographic protections.  Furthermore, this document
   offers more explicit guidance for clients when generating or handling
   e-mail messages with cryptographic protection of message headers.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-lamps-header-protection-19'/>
   
</reference>




    </references>

    <references title='Informative References'>

<reference anchor="AUTOCRYPT" target="https://autocrypt.org/">
  <front>
    <title>Autocrypt - Convenient End-to-End Encryption for E-Mail</title>
    <author initials="V." surname="Breitmoser" fullname="Vincent Breitmoser">
      <organization></organization>
    </author>
    <author initials="H." surname="Krekel" fullname="Holger Krekel">
      <organization></organization>
    </author>
    <author initials="D. K." surname="Gillmor" fullname="Daniel Kahn Gillmor">
      <organization></organization>
    </author>
    <date year="2018" month="July"/>
  </front>
</reference>
<reference anchor="chrome-indicators" target="https://blog.chromium.org/2018/05/evolving-chromes-security-indicators.html">
  <front>
    <title>Evolving Chrome's security indicators</title>
    <author initials="E." surname="Schechter" fullname="Emily Schechter">
      <organization></organization>
    </author>
    <date year="2018" month="May"/>
  </front>
</reference>
<reference anchor="EFAIL" target="https://efail.de">
  <front>
    <title>Efail: breaking S/MIME and OpenPGP email encryption using exfiltration channels</title>
    <author initials="D." surname="Poddebniak" fullname="Damian Poddebniak">
      <organization></organization>
    </author>
    <author initials="C." surname="Dresen" fullname="Christian Dresen">
      <organization></organization>
    </author>
    <author initials="J." surname="Müller" fullname="Jens Müller">
      <organization></organization>
    </author>
    <author initials="F." surname="Ising" fullname="Fabian Ising">
      <organization></organization>
    </author>
    <author initials="S." surname="Schinzel" fullname="Sebastian Schinzel">
      <organization></organization>
    </author>
    <author initials="S." surname="Friedberger" fullname="Simon Friedberger">
      <organization></organization>
    </author>
    <author initials="J." surname="Somorovsky" fullname="Juraj Somorovsky">
      <organization></organization>
    </author>
    <author initials="J." surname="Schwenk" fullname="Jörg Schwenk">
      <organization></organization>
    </author>
    <date year="2018" month="August"/>
  </front>
</reference>
<reference anchor="mixed-content" target="https://www.w3.org/TR/mixed-content/">
  <front>
    <title>Mixed Content</title>
    <author >
      <organization></organization>
    </author>
    <date year="2023" month="February"/>
  </front>
</reference>
<reference anchor="ORACLE" target="https://www.usenix.org/conference/usenixsecurity23/presentation/ising">
  <front>
    <title>Content-Type: multipart/oracle Tapping into Format Oracles in Email End-to-End Encryption</title>
    <author initials="F." surname="Ising" fullname="Fabian Ising">
      <organization></organization>
    </author>
    <author initials="D." surname="Poddebniak" fullname="Damian Poddebniak">
      <organization></organization>
    </author>
    <author initials="T." surname="Kappert" fullname="Tobias Kappert">
      <organization></organization>
    </author>
    <author initials="C." surname="Saatjohann" fullname="Christoph Saatjohann">
      <organization></organization>
    </author>
    <author initials="S." surname="Schinzel" fullname="Sebastian Schinzel">
      <organization></organization>
    </author>
    <date year="2023" month="August"/>
  </front>
</reference>
<reference anchor="SRI" target="https://www.w3.org/TR/SRI/">
  <front>
    <title>Subresource Integrity</title>
    <author >
      <organization></organization>
    </author>
    <date year="2016" month="June"/>
  </front>
</reference>
<reference anchor="PKCS11" target="https://docs.oasis-open.org/pkcs11/pkcs11-spec/v3.1/os/pkcs11-spec-v3.1-os.html">
  <front>
    <title>PKCS</title>
    <author initials="D." surname="Bong" fullname="Dieter Bong">
      <organization></organization>
    </author>
    <author initials="T." surname="Cox" fullname="Tony Cox">
      <organization></organization>
    </author>
    <date year="2023" month="July" day="23"/>
  </front>
</reference>
<reference anchor="DROWN" target="https://drownattack.com/">
  <front>
    <title>DROWN: Breaking TLS using SSLv2</title>
    <author initials="N." surname="Aviram" fullname="Nimrod Aviram">
      <organization></organization>
    </author>
    <author initials="S." surname="Schinzel" fullname="Sebastian Schinzel">
      <organization></organization>
    </author>
    <author initials="J." surname="Somorovsky" fullname="Juraj Somorovsky">
      <organization></organization>
    </author>
    <author initials="N." surname="Heninger" fullname="Nadia Heninger">
      <organization></organization>
    </author>
    <author initials="M." surname="Dankel" fullname="Maik Dankel">
      <organization></organization>
    </author>
    <author initials="J." surname="Steube" fullname="Jens Steube">
      <organization></organization>
    </author>
    <author initials="L." surname="Valenta" fullname="Luke Valenta">
      <organization></organization>
    </author>
    <author initials="D." surname="Adrian" fullname="David Adrian">
      <organization></organization>
    </author>
    <author initials="J. A." surname="Halderman" fullname="J. Alex Halderman">
      <organization></organization>
    </author>
    <author initials="V." surname="Dukhovni" fullname="Viktor Dukhovni">
      <organization></organization>
    </author>
    <author initials="E." surname="Käsper" fullname="Emilia Käsper">
      <organization></organization>
    </author>
    <author initials="S." surname="Cohney" fullname="Shaanan Cohney">
      <organization></organization>
    </author>
    <author initials="S." surname="Engels" fullname="Susanne Engels">
      <organization></organization>
    </author>
    <author initials="C." surname="Paar" fullname="Christof Paar">
      <organization></organization>
    </author>
    <author initials="Y." surname="Shavitt" fullname="Yuval Shavitt">
      <organization></organization>
    </author>
    <date year="2016" month="March"/>
  </front>
</reference>
<reference anchor="IKE" target="https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-felsch.pdf">
  <front>
    <title>The Dangers of Key Reuse: Practical Attacks on IPsec IKE</title>
    <author initials="D." surname="Felsch" fullname="Dennis Felsch">
      <organization></organization>
    </author>
    <author initials="M." surname="Grothe" fullname="Martin Grothe">
      <organization></organization>
    </author>
    <author initials="J." surname="Schwenk" fullname="Jörg Schwenk">
      <organization></organization>
    </author>
    <author initials="A." surname="Czubak" fullname="Adam Czubak">
      <organization></organization>
    </author>
    <author initials="M." surname="Szymane" fullname="Marcin Szymane">
      <organization></organization>
    </author>
    <date year="2018" month="August"/>
  </front>
</reference>


<reference anchor='REPLY'>
  <front>
    <title>Re: What’s Up Johnny?: Covert Content Attacks on Email End-to-End Encryption</title>
    <author fullname='Jens Müller' initials='J.' surname='Müller'>
      <organization/>
    </author>
    <author fullname='Marcus Brinkmann' initials='M.' surname='Brinkmann'>
      <organization/>
    </author>
    <author fullname='Damian Poddebniak' initials='D.' surname='Poddebniak'>
      <organization/>
    </author>
    <author fullname='Sebastian Schinzel' initials='S.' surname='Schinzel'>
      <organization/>
    </author>
    <author fullname='Jörg Schwenk' initials='J.' surname='Schwenk'>
      <organization/>
    </author>
    <date year='2019'/>
  </front>
  <seriesInfo name='Applied Cryptography and Network Security' value='pp. 24-42'/>
  <seriesInfo name='DOI' value='10.1007/978-3-030-21568-2_2'/>
</reference>


<reference anchor="SPOOFING" target="https://www.usenix.org/system/files/sec19-muller.pdf">
  <front>
    <title>“Johnny, you are fired!” – Spoofing OpenPGP and S/MIME Signatures in Emails</title>
    <author initials="J." surname="Müller" fullname="Jens Müller">
      <organization></organization>
    </author>
    <author initials="M." surname="Brinkmann" fullname="Marcus Brinkmann">
      <organization></organization>
    </author>
    <author initials="D." surname="Poddebniak" fullname="Damian Poddebniak">
      <organization></organization>
    </author>
    <author initials="H." surname="Böck" fullname="Hanno Böck">
      <organization></organization>
    </author>
    <author initials="S." surname="Schinzel" fullname="Sebastian Schinzel">
      <organization></organization>
    </author>
    <author initials="J." surname="Somorovsky" fullname="Juraj Somorovsky">
      <organization></organization>
    </author>
    <author initials="J." surname="Schwenk" fullname="Jörg Schwenk">
      <organization></organization>
    </author>
    <date year="2019" month="August"/>
  </front>
</reference>


<reference anchor='RFC2045'>
  <front>
    <title>Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Message Bodies</title>
    <author fullname='N. Freed' initials='N.' surname='Freed'/>
    <author fullname='N. Borenstein' initials='N.' surname='Borenstein'/>
    <date month='November' year='1996'/>
    <abstract>
      <t>This initial document specifies the various headers used to describe the structure of MIME messages. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='2045'/>
  <seriesInfo name='DOI' value='10.17487/RFC2045'/>
</reference>

<reference anchor='RFC3207'>
  <front>
    <title>SMTP Service Extension for Secure SMTP over Transport Layer Security</title>
    <author fullname='P. Hoffman' initials='P.' surname='Hoffman'/>
    <date month='February' year='2002'/>
    <abstract>
      <t>This document describes an extension to the SMTP (Simple Mail Transfer Protocol) service that allows an SMTP server and client to use TLS (Transport Layer Security) to provide private, authenticated communication over the Internet. This gives SMTP agents the ability to protect some or all of their communications from eavesdroppers and attackers. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='3207'/>
  <seriesInfo name='DOI' value='10.17487/RFC3207'/>
</reference>

<reference anchor='RFC6376'>
  <front>
    <title>DomainKeys Identified Mail (DKIM) Signatures</title>
    <author fullname='D. Crocker' initials='D.' role='editor' surname='Crocker'/>
    <author fullname='T. Hansen' initials='T.' role='editor' surname='Hansen'/>
    <author fullname='M. Kucherawy' initials='M.' role='editor' surname='Kucherawy'/>
    <date month='September' year='2011'/>
    <abstract>
      <t>DomainKeys Identified Mail (DKIM) permits a person, role, or organization that owns the signing domain to claim some responsibility for a message by associating the domain with the message. This can be an author's organization, an operational relay, or one of their agents. DKIM separates the question of the identity of the Signer of the message from the purported author of the message. Assertion of responsibility is validated through a cryptographic signature and by querying the Signer's domain directly to retrieve the appropriate public key. Message transit from author to recipient is through relays that typically make no substantive change to the message content and thus preserve the DKIM signature.</t>
      <t>This memo obsoletes RFC 4871 and RFC 5672. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='STD' value='76'/>
  <seriesInfo name='RFC' value='6376'/>
  <seriesInfo name='DOI' value='10.17487/RFC6376'/>
</reference>

<reference anchor='RFC7435'>
  <front>
    <title>Opportunistic Security: Some Protection Most of the Time</title>
    <author fullname='V. Dukhovni' initials='V.' surname='Dukhovni'/>
    <date month='December' year='2014'/>
    <abstract>
      <t>This document defines the concept "Opportunistic Security" in the context of communications protocols. Protocol designs based on Opportunistic Security use encryption even when authentication is not available, and use authentication when possible, thereby removing barriers to the widespread use of encryption on the Internet.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='7435'/>
  <seriesInfo name='DOI' value='10.17487/RFC7435'/>
</reference>

<reference anchor='RFC3274'>
  <front>
    <title>Compressed Data Content Type for Cryptographic Message Syntax (CMS)</title>
    <author fullname='P. Gutmann' initials='P.' surname='Gutmann'/>
    <date month='June' year='2002'/>
    <abstract>
      <t>This document defines a format for using compressed data as a Cryptographic Message Syntax (CMS) content type. Compressing data before transmission provides a number of advantages, including the elimination of data redundancy which could help an attacker, speeding up processing by reducing the amount of data to be processed by later steps (such as signing or encryption), and reducing overall message size. Although there have been proposals for adding compression at other levels (for example at the MIME or SSL level), these don't address the problem of compression of CMS content unless the compression is supplied by an external means (for example by intermixing MIME and CMS). [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='3274'/>
  <seriesInfo name='DOI' value='10.17487/RFC3274'/>
</reference>


<reference anchor='I-D.ietf-openpgp-crypto-refresh-13'>
   <front>
      <title>OpenPGP</title>
      <author fullname='Paul Wouters' initials='P.' surname='Wouters'>
         <organization>Aiven</organization>
      </author>
      <author fullname='Daniel Huigens' initials='D.' surname='Huigens'>
         <organization>Proton AG</organization>
      </author>
      <author fullname='Justus Winter' initials='J.' surname='Winter'>
         <organization>Sequoia-PGP</organization>
      </author>
      <author fullname='Niibe Yutaka' initials='N.' surname='Yutaka'>
         <organization>FSIJ</organization>
      </author>
      <date day='4' month='January' year='2024'/>
      <abstract>
	 <t>   This document specifies the message formats used in OpenPGP.  OpenPGP
   provides encryption with public-key or symmetric cryptographic
   algorithms, digital signatures, compression and key management.

   This document is maintained in order to publish all necessary
   information needed to develop interoperable applications based on the
   OpenPGP format.  It is not a step-by-step cookbook for writing an
   application.  It describes only the format and methods needed to
   read, check, generate, and write conforming packets crossing any
   network.  It does not deal with storage and implementation questions.
   It does, however, discuss implementation issues necessary to avoid
   security flaws.

   This document obsoletes: RFC 4880 (OpenPGP), RFC 5581 (Camellia in
   OpenPGP) and RFC 6637 (Elliptic Curves in OpenPGP).

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-openpgp-crypto-refresh-13'/>
   
</reference>

<reference anchor='RFC5322'>
  <front>
    <title>Internet Message Format</title>
    <author fullname='P. Resnick' initials='P.' role='editor' surname='Resnick'/>
    <date month='October' year='2008'/>
    <abstract>
      <t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of "electronic mail" messages. This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, "Standard for the Format of ARPA Internet Text Messages", updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='5322'/>
  <seriesInfo name='DOI' value='10.17487/RFC5322'/>
</reference>

<reference anchor='RFC5355'>
  <front>
    <title>Threats Introduced by Reliable Server Pooling (RSerPool) and Requirements for Security in Response to Threats</title>
    <author fullname='M. Stillman' initials='M.' role='editor' surname='Stillman'/>
    <author fullname='R. Gopal' initials='R.' surname='Gopal'/>
    <author fullname='E. Guttman' initials='E.' surname='Guttman'/>
    <author fullname='S. Sengodan' initials='S.' surname='Sengodan'/>
    <author fullname='M. Holdrege' initials='M.' surname='Holdrege'/>
    <date month='September' year='2008'/>
    <abstract>
      <t>Reliable Server Pooling (RSerPool) is an architecture and set of protocols for the management and access to server pools supporting highly reliable applications and for client access mechanisms to a server pool. This document describes security threats to the RSerPool architecture and presents requirements for security to thwart these threats. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='5355'/>
  <seriesInfo name='DOI' value='10.17487/RFC5355'/>
</reference>

<reference anchor='RFC7292'>
  <front>
    <title>PKCS #12: Personal Information Exchange Syntax v1.1</title>
    <author fullname='K. Moriarty' initials='K.' role='editor' surname='Moriarty'/>
    <author fullname='M. Nystrom' initials='M.' surname='Nystrom'/>
    <author fullname='S. Parkinson' initials='S.' surname='Parkinson'/>
    <author fullname='A. Rusch' initials='A.' surname='Rusch'/>
    <author fullname='M. Scott' initials='M.' surname='Scott'/>
    <date month='July' year='2014'/>
    <abstract>
      <t>PKCS #12 v1.1 describes a transfer syntax for personal identity information, including private keys, certificates, miscellaneous secrets, and extensions. Machines, applications, browsers, Internet kiosks, and so on, that support this standard will allow a user to import, export, and exercise a single set of personal identity information. This standard supports direct transfer of personal information under several privacy and integrity modes.</t>
      <t>This document represents a republication of PKCS #12 v1.1 from RSA Laboratories' Public Key Cryptography Standard (PKCS) series. By publishing this RFC, change control is transferred to the IETF.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='7292'/>
  <seriesInfo name='DOI' value='10.17487/RFC7292'/>
</reference>

<reference anchor='RFC8823'>
  <front>
    <title>Extensions to Automatic Certificate Management Environment for End-User S/MIME Certificates</title>
    <author fullname='A. Melnikov' initials='A.' surname='Melnikov'/>
    <date month='April' year='2021'/>
    <abstract>
      <t>This document specifies identifiers and challenges required to enable the Automated Certificate Management Environment (ACME) to issue certificates for use by email users that want to use S/MIME.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8823'/>
  <seriesInfo name='DOI' value='10.17487/RFC8823'/>
</reference>


<reference anchor='I-D.woodhouse-cert-best-practice'>
   <front>
      <title>Recommendations for applications using X.509 client certificates</title>
      <author fullname='David Woodhouse' initials='D.' surname='Woodhouse'>
         <organization>Amazon Web Services</organization>
      </author>
      <author fullname='Nikos Mavrogiannopoulos' initials='N.' surname='Mavrogiannopoulos'>
         </author>
      <date day='25' month='July' year='2023'/>
      <abstract>
	 <t>   X.509 certificates are widely used for client authentication in many
   protocols, especially in conjunction with Transport Layer Security
   ([RFC5246]) and Datagram Transport Layer Security ([RFC6347].  There
   exist a multitude of forms in which certificates and especially their
   corresponding private keys may be stored or referenced.

   Applications have historically been massively inconsistent in which
   subset of these forms have been supported, and what knowledge is
   demanded of the user.  This memo sets out best practice for
   applications in the interest of usability and consistency.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-woodhouse-cert-best-practice-01'/>
   
</reference>


<reference anchor='I-D.dkg-mail-cleartext-copy'>
   <front>
      <title>Encrypted E-mail with Cleartext Copies</title>
      <author fullname='Daniel Kahn Gillmor' initials='D. K.' surname='Gillmor'>
         </author>
      <date day='21' month='February' year='2023'/>
      <abstract>
	 <t>   When an e-mail program generates an encrypted message to multiple
   recipients, it is possible that it has no encryption capability for
   at least one of the recipients.

   In this circumstance, an e-mail program may choose to send the
   message in cleartext to the recipient it cannot encrypt to.

   This draft currently offers several possible approaches when such a
   choice is made by the sender, so that the recipient can reason about
   and act on the cryptographic status of the message responsibly.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-dkg-mail-cleartext-copy-01'/>
   
</reference>

<reference anchor='RFC6409'>
  <front>
    <title>Message Submission for Mail</title>
    <author fullname='R. Gellens' initials='R.' surname='Gellens'/>
    <author fullname='J. Klensin' initials='J.' surname='Klensin'/>
    <date month='November' year='2011'/>
    <abstract>
      <t>This memo splits message submission from message relay, allowing each service to operate according to its own rules (for security, policy, etc.), and specifies what actions are to be taken by a submission server.</t>
      <t>Message relay is unaffected, and continues to use SMTP over port 25.</t>
      <t>When conforming to this document, message submission uses the protocol specified here, normally over port 587.</t>
      <t>This separation of function offers a number of benefits, including the ability to apply specific security or policy requirements. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='STD' value='72'/>
  <seriesInfo name='RFC' value='6409'/>
  <seriesInfo name='DOI' value='10.17487/RFC6409'/>
</reference>

<reference anchor='RFC9051'>
  <front>
    <title>Internet Message Access Protocol (IMAP) - Version 4rev2</title>
    <author fullname='A. Melnikov' initials='A.' role='editor' surname='Melnikov'/>
    <author fullname='B. Leiba' initials='B.' role='editor' surname='Leiba'/>
    <date month='August' year='2021'/>
    <abstract>
      <t>The Internet Message Access Protocol Version 4rev2 (IMAP4rev2) allows a client to access and manipulate electronic mail messages on a server. IMAP4rev2 permits manipulation of mailboxes (remote message folders) in a way that is functionally equivalent to local folders. IMAP4rev2 also provides the capability for an offline client to resynchronize with the server.</t>
      <t>IMAP4rev2 includes operations for creating, deleting, and renaming mailboxes; checking for new messages; removing messages permanently; setting and clearing flags; parsing per RFCs 5322, 2045, and 2231; searching; and selective fetching of message attributes, texts, and portions thereof. Messages in IMAP4rev2 are accessed by the use of numbers. These numbers are either message sequence numbers or unique identifiers.</t>
      <t>IMAP4rev2 does not specify a means of posting mail; this function is handled by a mail submission protocol such as the one specified in RFC 6409.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='9051'/>
  <seriesInfo name='DOI' value='10.17487/RFC9051'/>
</reference>

<reference anchor='RFC8621'>
  <front>
    <title>The JSON Meta Application Protocol (JMAP) for Mail</title>
    <author fullname='N. Jenkins' initials='N.' surname='Jenkins'/>
    <author fullname='C. Newman' initials='C.' surname='Newman'/>
    <date month='August' year='2019'/>
    <abstract>
      <t>This document specifies a data model for synchronising email data with a server using the JSON Meta Application Protocol (JMAP). Clients can use this to efficiently search, access, organise, and send messages, and to get push notifications for fast resynchronisation when new messages are delivered or a change is made in another client.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8621'/>
  <seriesInfo name='DOI' value='10.17487/RFC8621'/>
</reference>


<reference anchor='I-D.ietf-jmap-smime-sender-extensions'>
   <front>
      <title>JMAP extension for S/MIME signing and encryption</title>
      <author fullname='Alexey Melnikov' initials='A.' surname='Melnikov'>
         <organization>Isode Ltd</organization>
      </author>
      <date day='3' month='August' year='2023'/>
      <abstract>
	 <t>   This document specifies an extension to JMAP for sending S/MIME
   signed and/or S/MIME encrypted messages, as well as automatic
   decryption of received S/MIME messages.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-jmap-smime-sender-extensions-04'/>
   
</reference>

<reference anchor='RFC1939'>
  <front>
    <title>Post Office Protocol - Version 3</title>
    <author fullname='J. Myers' initials='J.' surname='Myers'/>
    <author fullname='M. Rose' initials='M.' surname='Rose'/>
    <date month='May' year='1996'/>
    <abstract>
      <t>The Post Office Protocol - Version 3 (POP3) is intended to permit a workstation to dynamically access a maildrop on a server host in a useful fashion. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='STD' value='53'/>
  <seriesInfo name='RFC' value='1939'/>
  <seriesInfo name='DOI' value='10.17487/RFC1939'/>
</reference>

<reference anchor='RFC9219'>
  <front>
    <title>S/MIME Signature Verification Extension to the JSON Meta Application Protocol (JMAP)</title>
    <author fullname='A. Melnikov' initials='A.' surname='Melnikov'/>
    <date month='April' year='2022'/>
    <abstract>
      <t>This document specifies an extension to "The JSON Meta Application Protocol (JMAP) for Mail" (RFC 8621) for returning the S/MIME signature verification status.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='9219'/>
  <seriesInfo name='DOI' value='10.17487/RFC9219'/>
</reference>

<reference anchor='RFC9216'>
  <front>
    <title>S/MIME Example Keys and Certificates</title>
    <author fullname='D. K. Gillmor' initials='D. K.' role='editor' surname='Gillmor'/>
    <date month='April' year='2022'/>
    <abstract>
      <t>The S/MIME development community benefits from sharing samples of signed or encrypted data. This document facilitates such collaboration by defining a small set of X.509v3 certificates and keys for use when generating such samples.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='9216'/>
  <seriesInfo name='DOI' value='10.17487/RFC9216'/>
</reference>

<reference anchor='RFC4511'>
  <front>
    <title>Lightweight Directory Access Protocol (LDAP): The Protocol</title>
    <author fullname='J. Sermersheim' initials='J.' role='editor' surname='Sermersheim'/>
    <date month='June' year='2006'/>
    <abstract>
      <t>This document describes the protocol elements, along with their semantics and encodings, of the Lightweight Directory Access Protocol (LDAP). LDAP provides access to distributed directory services that act in accordance with X.500 data and service models. These protocol elements are based on those described in the X.500 Directory Access Protocol (DAP). [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='4511'/>
  <seriesInfo name='DOI' value='10.17487/RFC4511'/>
</reference>


<reference anchor='I-D.koch-openpgp-webkey-service'>
   <front>
      <title>OpenPGP Web Key Directory</title>
      <author fullname='Werner Koch' initials='W.' surname='Koch'>
         <organization>g10 Code GmbH</organization>
      </author>
      <date day='18' month='December' year='2023'/>
      <abstract>
	 <t>   This specification describes a service to locate OpenPGP keys by mail
   address using a Web service and the HTTPS protocol.  It also provides
   a method for secure communication between the key owner and the mail
   provider to publish and revoke the public key.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-koch-openpgp-webkey-service-17'/>
   
</reference>

<reference anchor='RFC8162'>
  <front>
    <title>Using Secure DNS to Associate Certificates with Domain Names for S/MIME</title>
    <author fullname='P. Hoffman' initials='P.' surname='Hoffman'/>
    <author fullname='J. Schlyter' initials='J.' surname='Schlyter'/>
    <date month='May' year='2017'/>
    <abstract>
      <t>This document describes how to use secure DNS to associate an S/MIME user's certificate with the intended domain name, similar to the way that DNS-Based Authentication of Named Entities (DANE), RFC 6698, does for TLS.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8162'/>
  <seriesInfo name='DOI' value='10.17487/RFC8162'/>
</reference>

<reference anchor='RFC7929'>
  <front>
    <title>DNS-Based Authentication of Named Entities (DANE) Bindings for OpenPGP</title>
    <author fullname='P. Wouters' initials='P.' surname='Wouters'/>
    <date month='August' year='2016'/>
    <abstract>
      <t>OpenPGP is a message format for email (and file) encryption that lacks a standardized lookup mechanism to securely obtain OpenPGP public keys. DNS-Based Authentication of Named Entities (DANE) is a method for publishing public keys in DNS. This document specifies a DANE method for publishing and locating OpenPGP public keys in DNS for a specific email address using a new OPENPGPKEY DNS resource record. Security is provided via Secure DNS, however the OPENPGPKEY record is not a replacement for verification of authenticity via the "web of trust" or manual verification. The OPENPGPKEY record can be used to encrypt an email that would otherwise have to be sent unencrypted.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='7929'/>
  <seriesInfo name='DOI' value='10.17487/RFC7929'/>
</reference>




    </references>


<section anchor="future-work"><name>Future Work</name>

<t>This document contains useful guidance for MUA implementers, but it cannot contain all possible guidance.
Future revisions to this document may want to further explore the following topics, which are out of scope for this version.</t>

<section anchor="webmail-threat-model"><name>Webmail Threat Model</name>

<t>The webmail threat model for end-to-end cryptographic protections is significantly more complex than the traditional MUA model.
For example, the web server hosting the webmail interface could be a potential adversary.
If the user treats the web server as a trusted party, but the web server violates that trust, the end-to-end cryptographic protections do not hold.</t>

<t>A future version of this document could include more detailed discussion of an adversarial threat model for end-to-end cryptographic protections in a webmail context.</t>

</section>
<section anchor="test-vectors"><name>Test Vectors</name>

<t>A future version of this document (or a companion document) could contain examples of well-formed and malformed messages using cryptographic key material and certificates from <xref target="I-D.ietf-openpgp-crypto-refresh-13"/> and <xref target="RFC9216"/>.</t>

<t>It may also include example renderings of these messages.</t>

</section>
<section anchor="more-peer-certs"><name>Further Guidance on Peer Certificates</name>

<section anchor="peer-discovery-incoming"><name>Certificate Discovery from Incoming Messages</name>

<t>As described in <xref target="sending-certificates"/>, an incoming e-mail message may have one or more certificates embedded in it.
This document currently acknowledges that receiving MUA should assemble a cache of certificates for future use, but providing more detailed guidance for how to assemble and manage that cache is currently out of scope.</t>

<t>Existing recommendations like <xref target="AUTOCRYPT"/> provide some guidance for handling incoming certificates about peers, but only in certain contexts.
A future version of this document may describe in more detail how these incoming certs should be handled.</t>

</section>
<section anchor="peer-discovery--directory"><name>Certificate Directories</name>

<t>Some MUAs may have the capability to look up peer certificates in a directory, for example via LDAP <xref target="RFC4511"/>, WKD <xref target="I-D.koch-openpgp-webkey-service"/>, or the DNS (e.g., SMIMEA <xref target="RFC8162"/> or OPENPGPKEY <xref target="RFC7929"/> resource records).</t>

<t>A future version of this document may describe in more detail what sources an MUA should consider when searching for a peer's certificates, and what to do with the certificates found by various methods.</t>

</section>
<section anchor="cert-revocation"><name>Checking for Certificate Revocation</name>

<t>A future version of this document could discuss how/when to check for revocation of peer certificates, or of the user's own certificate.</t>

<t>Such discussion should address privacy concerns: what information leaks to whom when checking peer cert revocations?</t>

</section>
<section anchor="more-peer-cert-selection"><name>Further Peer Certificate Selection</name>

<t>A future version of this document may describe more prescriptions for deciding whether a peer certificate is acceptable for encrypting a message.
For example, if the SPKI is an EC Public Key and the keyUsage extension is absent, what should the encrypting MUA do?</t>

<t>A future version of this document might also provide guidance on what to do if multiple certificates are all acceptable for encrypting to a given recipient.
For example, the sender could select among them in some deterministic way; it could encrypt to all of them; or it could present them to the user to let the user select any or all of them.</t>

</section>
</section>
<section anchor="more-local-certs"><name>Further Guidance on Local Certificates and Secret Keys</name>

<section anchor="cross-mua-local-keys"><name>Cross-MUA sharing of Local Certificates and Secret Keys</name>

<t>Many users today use more than one MUA to access the same mailbox (for example, one MUA on a mobile device, and another MUA on a desktop computer).</t>

<t>A future version of this document might offer guidance on how multiple MUAs attached to the same mailbox can efficiently and securely share the user's own secret key material and certificates between each other.
This guidance should include suggestions on how to maintain the user's keys (e.g., avoiding certificate expiration) and safe secret key transmission.</t>

</section>
<section anchor="smartcards"><name>Use of Smartcards or Other Portable Secret Key Mechanisms</name>

<t>Rather than having to transfer secret key material between clients, some users may prefer to rely on portable hardware-backed secret keys in the form of smartcards, USB tokens or other comparable form factors.
These secret keys sometimes require direct user interaction for each use, which can complicate the usability of any MUA that uses them to decrypt a large number of messages.</t>

<t>Guidance on the use of this kind of secret key management are beyond the scope of this document, but future revisions may bring them into scope.</t>

</section>
<section anchor="more-local-cert-maintenance"><name>Active Local Certificate Maintenance</name>

<t><xref target="local-cert-maintenance"/> describes conditions where the MUA <bcp14>SHOULD</bcp14> warn the user that something is going wrong with their certificate.</t>

<t>A future version of this document might outline how an MUA could actively avoid these warning situations, for example, by automatically updating the certificate or prompting the user to take specific action.</t>

</section>
</section>
<section anchor="cert-authorities"><name>Certification Authorities</name>

<t>A future document could offer guidance on how an MUA should select and manage root certification authorities (CAs).</t>

<t>For example:</t>

<t><list style="symbols">
  <t>Should the MUA cache intermediate CAs?</t>
  <t>Should the MUA share such a cache with other PKI clients (e.g., web browsers)?</t>
  <t>What distinctions are there between a CA for S/MIME and a CA for the web?</t>
</list></t>

</section>
<section anchor="indexing-and-search"><name>Indexing and Search of Encrypted Messages</name>

<t>A common use case for MUAs is search of existing messages by keyword or topic.
This is done most efficiently for large mailboxes by assembling an index of message content, rather than by a linear scan of all message content.</t>

<t>When message contents and header fields are encrypted, search by index is complicated.
If the cleartext is not indexed, then messages cannot be found by search.
On the other hand, if the cleartext is indexed, then the index effectively contains the sensitive contents of the message, and needs to be protected.</t>

<t>Detailed guidance on the tradeoff here, including choices about remote search vs local search, are beyond the scope of this document, but a future version of the document may bring them into scope.</t>

</section>
<section anchor="cached-sigs"><name>Cached Signature Validation</name>

<t>Asymmetric signature validation can be computationally expensive, and the results can also potentially vary over time (e.g., if a signing certificate is discovered to be revoked).
In some cases, the user may care about the signature validation that they saw when they first read or received the message, not only about the status of the signature verification at the current time.</t>

<t>So, for both performance reasons and historical perspective, it may be useful for an MUA to cache signature validation results in a way that they can be easily retrieved and compared.
Documenting how and when to cache signature validation, as well as how to indicate it to the user, is beyond the scope of this document, but a future version of the document may bring these topics into scope.</t>

</section>
<section anchor="aggregate-cryptographic-status"><name>Aggregate Cryptographic Status</name>

<t>This document limits itself to consideration of the cryptographic status of single messages as a baseline concept that can be clearly and simply communicated to the user.
However, some users and some MUAs may find it useful to contemplate even higher-level views of cryptographic status which are not considered directly here.</t>

<t>For example, a future version of the document may also consider how to indicate a simple cryptographic status of message threads (groups of explicitly related messages), conversations (groups of messages with shared sets of participants), peers, or other perspectives that an MUA can provide.</t>

</section>
<section anchor="expect-e2e"><name>Expectations of Cryptographic Protection</name>

<t>As mentioned in <xref target="security-indicators"/>, the types of security indicators displayed to the user may well vary based on the expectations of the user for a given communication.
At present, there is no widely shared method for the MUA to establish and maintain reasonable expectations about whether a specific received message should have cryptographic protections.</t>

<t>If such a standard is developed, a future version of this document should reference it and encourage the deployment of clearer and simpler security indicators.</t>

</section>
<section anchor="secure-deletion"><name>Secure Deletion</name>

<t>One feature many users desire from a secure communications medium is the ability to reliably destroy a message such that it cannot be recovered even by a determined adversary.
In other contexts, a similar desired property is called "forward secrecy".
Doing this with standard e-mail mechanisms like S/MIME and PGP/MIME is challenging because of two interrelated factors:</t>

<t><list style="symbols">
  <t>A copy of of an e-mail message may be retained by any of the mail transport agents that handle it during delivery, and</t>
  <t>The secret key used to decrypt an encrypted e-mail message is typically retained indefinitely.</t>
</list></t>

<t>This means that an adversary aiming to recover the cleartext contents of a deleted message can do so by getting access to a copy of the encrypted message and the long-term secret key material.</t>

<t>Some mitigation measures may be available to make it possible to delete some encrypted messages securely, but this document considers this use case out of scope.
A future version of the document may elaborate on secure message deleton in more detail.</t>

</section>
<section anchor="interaction-with-opportunistic-encryption"><name>Interaction with Opportunistic Encryption</name>

<t>This document focuses on guidance for strong, user-comprehensible end-to-end cryptographic protections for e-mail.
Other approaches are possible, including various forms of opportunistic and transport encryption, which are out of scope for this document.</t>

<t>A future version of this document could describe the interaction between this guidance and more opportunistic forms of encryption, for example some of the scenarios contemplated in <xref target="I-D.dkg-mail-cleartext-copy"/>.</t>

</section>
<section anchor="split-attachments"><name>Split Attachments</name>

<t>As noted in <xref target="attachments"/>, the standard form for encrypted e-mail messages is a single cryptographic envelope.
In a scenario where multiple user agents are drafting a single encrypted message over low-bandwidth links, this can create a poor user experience, as each MUA has to retrieve the full message, including attachments, to modify the draft.
Similarly, when retrieving a message with a large attachment, the receiving MUA might want to only render the main body part, and will have a significant delay in doing so if required to process the full message before handling.</t>

<t>Future work might include an attempt to standardize a mechanism that eases this use case, potentially at the risk of additional metadata leakage about the message (e.g., the size and number of message parts).
Any such work should explicitly try to minimize the risks and concerns described in <xref target="attachments"/>.</t>

</section>
<section anchor="proxy-extensions"><name>Proxy Extensions</name>

<t>As noted in <xref target="proxy-dangers"/>, a proxy-based implementation can be a tempting approach.
But its naive form is likely to be insufficient to provide safe end-to-end encrypted e-mail.</t>

<t>A future version of this document, or a separate but related document, could try to outline the specific additional information, state, and network API surface that would be needed to allow an MUA to be safely integrated with an encryption provider.
Any such work should try to address the potential problems described in <xref target="proxy-dangers"/>.</t>

</section>
</section>
<section anchor="document-history"><name>Document History</name>

<section anchor="substantive-changes-from-draft-ietf-14-to-draft-ietf-15"><name>Substantive changes from draft-ietf-...-14 to draft-ietf-...-15</name>

<t><list style="symbols">
  <t>update IMAP reference to RFC 9051</t>
  <t>add webmail concerns as part of Future Work</t>
</list></t>

</section>
<section anchor="substantive-changes-from-draft-ietf-13-to-draft-ietf-14"><name>Substantive changes from draft-ietf-...-13 to draft-ietf-...-14</name>

<t><list style="symbols">
  <t>Responded to SEC AD Review, including:</t>
  <t>clarify "conformant" vs "legacy" vs "non-cryptographic" MUA categories</t>
  <t>tighten up MUSTs for conformant MUAs</t>
  <t>explicitly recommend encrypting drafts</t>
  <t>clarify debugging as a use case for showing invalid signatures</t>
  <t>clarify "Headers" to "Header Fields"</t>
  <t>3 states for sending, 4 for receiving</t>
</list></t>

</section>
<section anchor="substantive-changes-from-draft-ietf-12-to-draft-ietf-13"><name>Substantive changes from draft-ietf-...-12 to draft-ietf-...-13</name>

<t><list style="symbols">
  <t>clarify RFC 2119 guidance about not rendering cryptographic layers other than message cryptographic status</t>
</list></t>

</section>
<section anchor="substantive-changes-from-draft-ietf-11-to-draft-ietf-12"><name>Substantive changes from draft-ietf-...-11 to draft-ietf-...-12</name>

<t><list style="symbols">
  <t>More nuance (and future work) around split attachments</t>
  <t>More nuance (and future work) around proxy-style design</t>
  <t>Clearer caveats about external resources in text/html parts</t>
</list></t>

</section>
<section anchor="substantive-changes-from-draft-ietf-10-to-draft-ietf-11"><name>Substantive changes from draft-ietf-...-10 to draft-ietf-...-11</name>

<t><list style="symbols">
  <t>Mention List-* and Archived-At message header fields</t>
  <t>Add additional references to papers that describe flaws in e2e e-mail</t>
</list></t>

</section>
<section anchor="substantive-changes-from-draft-ietf-09-to-draft-ietf-10"><name>Substantive changes from draft-ietf-...-09 to draft-ietf-...-10</name>

<t><list style="symbols">
  <t>Introduction: describe one major theme of Future Work</t>
</list></t>

</section>
<section anchor="substantive-changes-from-draft-ietf-08-to-draft-ietf-09"><name>Substantive changes from draft-ietf-...-08 to draft-ietf-...-09</name>

<t><list style="symbols">
  <t>Clarify goals of document</t>
  <t>Identify cross-protocol attacks in more detail to justify prescription against key reuse</t>
  <t>Add informative references to Opportunistic Encryption RFC and Certificate Best Practice draft</t>
  <t>Add "Reading Encrypted Messages after Certificate Expiration" section to Common Pitfalls and Guidelines</t>
  <t>Clean up nits identified by Stephen Farrell and Eliot Lear</t>
</list></t>

</section>
<section anchor="substantive-changes-from-draft-ietf-07-to-draft-ietf-08"><name>Substantive changes from draft-ietf-...-07 to draft-ietf-...-08</name>

<t><list style="symbols">
  <t>Add guidance about importing and exporting secret key material</t>
  <t>More explanation about "encryption outside, signature inside"</t>
  <t>Guidance about Intervening (resending) MUAs</t>
  <t>Include Sender and Resent-* as user-facing header fields</t>
  <t>Guidance about external subresources for cryptographically protected messages</t>
  <t>Relax "user-facing" definition to be more advisory</t>
</list></t>

</section>
<section anchor="substantive-changes-from-draft-ietf-06-to-draft-ietf-07"><name>Substantive changes from draft-ietf-...-06 to draft-ietf-...-07</name>

<t><list style="symbols">
  <t>Add Bernie Hoeneisen and Alexey Melnikov as editors</t>
  <t>Explicitly avoid requiring anything from IANA</t>
  <t>Simplify description of "attachments"</t>
  <t>Add concrete detail on how to compare e-mail addresses</t>
  <t>Explicitly define "Cryptographic Summary"</t>
</list></t>

</section>
<section anchor="substantive-changes-from-draft-ietf-05-to-draft-ietf-06"><name>Substantive changes from draft-ietf-...-05 to draft-ietf-...-06</name>

<t><list style="symbols">
  <t>Expand proxy implementation warning to comparable APIs</t>
  <t>Move many marked TODO and FIXME items to "Future Work"</t>
  <t>More detailed guidance on local certificates</t>
  <t>Provide guidance on encrypting draft messages</t>
  <t>More detailed guidanc eon shipping certificates in outbound messages</t>
  <t>Recommend implementing header protection</t>
  <t>Added "Future Work" subsection about interactions with opportunistic approaches</t>
</list></t>

</section>
<section anchor="substantive-changes-from-draft-ietf-04-to-draft-ietf-05"><name>Substantive changes from draft-ietf-...-04 to draft-ietf-...-05</name>

<t><list style="symbols">
  <t>Adopt and update text about Bcc from draft-ietf-lamps-header-protection</t>
  <t>Add section about the dangers of an implementation based on a network protocol proxy</t>
</list></t>

</section>
<section anchor="substantive-changes-from-draft-ietf-03-to-draft-ietf-04"><name>Substantive changes from draft-ietf-...-03 to draft-ietf-...-04</name>

<t><list style="symbols">
  <t>Added reference to <spanx style="verb">multipart/oracle</spanx> attacks</t>
  <t>Clarified that "Structural Header fields" are the same as RFC2045's "MIME Headers"</t>
</list></t>

</section>
<section anchor="substantive-changes-from-draft-ietf-02-to-draft-ietf-03"><name>Substantive changes from draft-ietf-...-02 to draft-ietf-...-03</name>

<t><list style="symbols">
  <t>Added section about mixed recipients</t>
  <t>Noted SMIMEA and OPENPGPKEY DNS RR cert discovery mechanisms</t>
  <t>Added more notes about simplified mental models</t>
  <t>More clarification on one-status-per-message</t>
  <t>Added guidance to defend against EFAIL</t>
</list></t>

</section>
<section anchor="substantive-changes-from-draft-ietf-01-to-draft-ietf-02"><name>Substantive changes from draft-ietf-...-01 to draft-ietf-...-02</name>

<t><list style="symbols">
  <t>Added definition of "user-facing" header fields</t>
</list></t>

</section>
<section anchor="substantive-changes-from-draft-ietf-00-to-draft-ietf-01"><name>Substantive changes from draft-ietf-...-00 to draft-ietf-...-01</name>

<t><list style="symbols">
  <t>Added section about distinguishing Main Body Parts and Attachments</t>
  <t>Updated document considerations section, including reference to auto-built editor's copy</t>
</list></t>

</section>
<section anchor="substantive-changes-from-draft-dkg-01-to-draft-ietf-00"><name>Substantive changes from draft-dkg-...-01 to draft-ietf-...-00</name>

<t><list style="symbols">
  <t>WG adopted draft</t>
  <t>moved Document History and Document Considerations sections to end of appendix, to avoid section renumbering when removed</t>
</list></t>

</section>
<section anchor="substantive-changes-from-draft-dkg-00-to-draft-dkg-01"><name>Substantive changes from draft-dkg-...-00 to draft-dkg-...-01</name>

<t><list style="symbols">
  <t>consideration of success/failure indicators for usability</t>
  <t>clarify extendedKeyUsage and keyUsage algorithm-specific details</t>
  <t>initial section on certificate management</t>
  <t>added more TODO items</t>
</list></t>

</section>
</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

