<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<!-- Extra statement used by XSLT processors to control the output style. -->
<?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?>
<!-- Processing Instructions- PIs (for a complete list and description,
     see file http://xml.resource.org/authoring/README.html.
     You may find that some sphisticated editors are not able to edit PIs when palced here.
     An alternative position is just inside the rfc elelment as noted below. -->
<!-- Some of the more generally applicable PIs that most I-Ds might want to use -->
<!-- Try to enforce the ID-nits conventions and DTD validity -->
<?rfc strict="yes" ?>
<!-- Items used when reviewing the document -->
<!-- Controls display of <cref> elements -->
<?rfc comments="yes" ?>
<!-- When no, put comments at end in comments section,
     otherwise, put inline -->
<?rfc inline="yes" ?>
<!-- When yes, insert editing marks: editing marks consist of a
     string such as <29> printed in the blank line at the
     beginning of each paragraph of text. -->
<?rfc editing="no" ?>
<!-- Create Table of Contents (ToC) and set some options for it.
     Note the ToC may be omitted for very short documents,but idnits insists on a ToC
     if the document has more than 15 pages. -->
<?rfc toc="yes"?>
<?rfc tocompact="yes"?>
<!-- If "yes" eliminates blank lines before main section entries. -->
<?rfc tocdepth="3"?>
<!-- Sets the number of levels of sections/subsections... in ToC.
   Can be overridden by 'toc="include"/"exclude"' on the section
   element-->
<!-- Choose the options for the references.
     Some like symbolic tags in the references (and citations) and others prefer
     numbers. The RFC Editor always uses symbolic tags.
     The tags used are the anchor attributes of the references. -->
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes" ?>
<!-- If "yes", causes the references to be sorted in order of tags.
     This doesn't have any effect unless symrefs is "yes" also. -->
<!-- These two save paper: Just setting compact to "yes" makes savings by not starting each
     main section on a new page but does not omit the blank lines between list items.
     If subcompact is also "yes" the blank lines between list items are also omitted. -->
<?rfc compact="yes" ?>
<?rfc subcompact="no" ?>
<!-- end of list of popular I-D processing instructions -->
<!-- Information about the document.
     category values: std, bcp, info, exp, and historic
     For Internet-Drafts, specify attribute "ipr".
         original ipr values are: full3978, noModification3978, noDerivatives3978),
         2008 IETF Trust versions: trust200811, noModificationTrust200811, noDerivativeTrust200811
         2009/Current: trust200902, noModificationTrust200902, noDerivativesTrust200902, pre5378Trust200902
     Also for Internet-Drafts, you must specify a value for attributes "docName" which is
        typically the file name under which it is filed but need not be.
     If relevant, "iprExtract" may be specified to denote the anchor attribute value of a
        section that can be extracted for separate publication, it is only useful when the value
        of "ipr" does not give the Trust full rights.
     "updates" and "obsoletes" attributes can also be specified here, their arguments are
        comma-separated lists of RFC numbers (just the numbers) -->

<rfc xmlns:xi="http://www.w3.org/2001/XInclude"
     docName="draft-sayre-emailcore-as-00"
     ipr="trust200902"
     category="std"
     obsoletes=""
     updates=""
     submissionType="IETF"
     xml:lang="en"
     tocInclude="true"
     tocDepth="3"
     symRefs="true"
     sortRefs="true"
     consensus="true"
     version="3">
  <!-- xml2rfc v2v3 conversion 3.15.0 -->
  <!-- obsoletes='2821, 821' updates='1123'
        category='std' (bcp, info, exp, historic)  -->

  <!-- ***** FRONT MATTER ***** -->

  <front>
    <title abbrev="Core Email A/S">Applicability Statement for IETF
    Core Email Protocols</title>
    <seriesInfo name="Internet-Draft" value="draft-sayre-emailcore-as-00"/>
<!-- The WG editors, just commented out for this one. -->
<!--
    <author fullname="John C Klensin" initials="J.C."
            surname="Klensin" role="editor">
      <organization/>
      <address>
        <postal>
          <street>1770 Massachusetts Ave, Ste 322</street>
          <city>Cambridge</city>
          <region>MA</region>
          <code>02140</code>
          <country>USA</country>
        </postal>
        <phone>+1 617 245 1457</phone>
        <email>john-ietf@jck.com</email>
      </address>
    </author>
    <author initials="K." surname="Murchison"
            fullname="Kenneth Murchison" role="editor">
      <organization abbrev="Fastmail">Fastmail US LLC</organization>
      <address>
        <postal>
          <street>1429 Walnut Street - Suite 1201</street>
          <city>Philadelphia</city>
          <region>PA</region>
          <code>19102</code>
          <country>USA</country>
        </postal>
        <email>murch@fastmailteam.com</email>
      </address>
    </author>

    <author initials="E." surname="Sam" fullname="E Sam" role="editor">
      <organization/>
      <address>
        <email>winshell64@gmail.com </email>
      </address>
    </author>
-->

    <author initials="R." surname="Sayre" fullname="Robert Sayre" role="editor">
      <address>
        <email>sayrer@gmail.com</email>
      </address>
    </author>

    <date/>
    <!-- Meta-data Declarations -->
    <area>ART</area>
    <workgroup>EMAILCORE</workgroup>
    <keyword>SMTP</keyword>
    <keyword>MIME</keyword>
    <keyword>TLS</keyword>
    <keyword>DMARC</keyword>
    <!-- WG name at the upper left corner of the doc,
         IETF fine for individual submissions.  You can also
         omit this element in which case it defaults to "Network Working Group" -
         a hangover from the ancient history of the IETF!
         <workgroup>Network Working Group</workgroup>   -->

    <!-- You can add <keyword/> elements here.  They will be incorporated into HTML output
         files in a meta tag but they have no effect on text or nroff output. -->
    <!-- <keyword>Text</keyword> (as many of those elements as needed -->

    <abstract>
      <t>Electronic mail is one of the oldest internet applications
      in active use. The protocols and formats for mail transport and
      message formats have evolved slowly over the years. This Applicability
      Statement describes interaction with newer protocols.</t>
      <t>[Provided as a diff to the WG document]</t>
  </abstract>
  </front>

  <middle>
    <section numbered="true" toc="default">
      <name>Introduction</name>
    <t>This document is an
     <!-- RFC Editor: As of 20250810, next reference did not format
     properly-->
      <xref target="RFC2026" section="3.2" sectionFormat="comma">
        Applicability Statement</xref> that provides guidance in the
        use of the Internet's core email specifications, the
      <xref target="I-D.ietf-emailcore-rfc5321bis">Simple Mail
      Transfer Protocol (SMTP)</xref> and the
      <xref target="I-D.ietf-emailcore-rfc5322bis">Internet Message
     Format (IMF)</xref>,
      </t>
      <section numbered="true" toc="default">
        <name>Conventions Used in This Document</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
        NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
        "MAY", and "OPTIONAL" in this document are to be interpreted as
        described in BCP 14
        <xref target="RFC2119"/>
          <xref target="RFC8174"/>
        when, and only when, they appear in all capitals, as shown
        here.</t>
      </section>
    </section>

    <section numbered="true" toc="default">
      <name>SMTP Provisions</name>
      <t>Since<xref target="RFC5321"/> was
        published in October 2008, usage of SMTP has evolved. Networks
        are faster, surveillance has increased, spam is more frequent,
        and internationalization expectations are higher.
      </t>

    <t>This section describes new options and protocols to help with
     these new issues.</t>

      <section numbered="true" toc="default">
        <name>Handling of the <tt>Domain</tt> Argument to the EHLO Command</name>
        <t>If the Domain argument to the EHLO command does not have an address
        record in the DNS that matches the IP address of the client, the SMTP
        server may refuse any mail from the client as part of established anti-abuse practice.
        The lack of a matching address record for the the domain name argument is at
        best an indication of a poorly-configured MTA, and at worst that of an abusive host.</t>
      </section>
      <section numbered="true" toc="default">
        <name>Address Literals</name>
        <t>The <tt>address-literal</tt> ABNF
          non-terminal appears in the
          <xref target="I-D.ietf-emailcore-rfc5321bis"/> grammar.
          For SMTP connections over the public internet, an address-literal as the argument
          to the EHLO command or the <tt>Domain</tt> part of the <tt>Mailbox</tt> argument to the MAIL FROM command
          is quite likely to result in the message being rejected. This behavior is often a
          sign of a misconfigured or compromised server.</t>
      </section>
      <section numbered="true" toc="default">
        <name>Addresses in Top-Level Domains</name>
        <t>Addresses in top-level domains (TLDs) are syntactically valid, but mail
        to these addresses has never worked reliably. A handful of country code TLDs
        have top level MX records. In 2013, "Top-Level Domains That Are Already Dotless" <xref target="RFC7085"/>
        found 18 TLDs with MX records.</t>
        <t>Mail sent to addresses with single label domains has
          typically expected the address to be an abbreviation to be
          completed by a search list, so mail to bob@sales would be
          completed to bob@sales.example.com.
          This shortcut has led to unfortunate consequences; in one
          famous case, in 1991 when the .CS domain was added to the
          root, mail in computer science departments started to fail
          as mail to bob@cs was now treated as mail to
          Czechoslovakia.
      <!-- 20250226 JcK  (typo corrected) -->
      Hence, for reliable service, mail SHOULD NOT use addresses
          that contain single label domains.</t>
      </section>
      <section numbered="true" anchor="smtp-ext" toc="default">
        <name>SMTP Extensions</name>
        <t>Some SMTP extensions have become ubiquitous. Two extensions MUST be
        supported by SMTP senders and receivers:</t>

        <ul spacing="normal">
            <li>
                <xref target="RFC3207">Secure SMTP over Transport Layer
           Security</xref>
      <!-- 20250226 JcK -->
          (Cf. discussion in <xref target="transport-sec"/>.)</li>
            <li>
                <xref target="RFC6152">8-bit MIME</xref>
            </li>
        </ul>

        <t>These two extensions SHOULD be supported by SMTP senders and receivers:</t>

        <ul spacing="normal">
          <li>
            <xref target="RFC2920">Command Pipelining</xref>
          </li>
          <li>  <!-- 20250824 converted references to a group to add a few more
       RFCs and eliminate the awkward parenthetical -->
            Internationalized Email <xref target="SMTPUTF8"/>
          </li>
        </ul>

       <t><xref target="RFC3461">Delivery Status Notifications</xref>
        requests have not been widely implemented and deployed.
        Mail systems that send such requests should be prepared for
        systems that receive them to not recognize or support them.
        This extension for notification requests is distinct
        from the format of notifications defined in
        <xref target="RFC3464"/> and <xref target="RFC6533"/>
        and, the special media type defined in <xref target="RFC6522"/>.
        All of those SHOULD be supported.
       </t>

       <t>Although Enhanced Mail System Status Codes
          (<xref target="RFC3463"/>, <xref target="RFC5248"/>)
          are widely supported, they are not ubiquitous. Nevertheless,
          they are useful to SMTP senders in determining the exact
          reason for a transmission failure in a machine-readable and
          language-independent manner. These status codes make it
          possible to present more detailed and language-specific
          error messages to users.

          Given the usefulness of these enhanced codes, SMTP receivers
          are RECOMMENDED to implement the <xref target="RFC2034">SMTP
          Service Extension for Returning Enhanced Error Codes</xref>
          utilizing the codes registered in <xref target="RFC5248"/>.
          </t>
      </section>
    </section>
  <section numbered="true" toc="default">
     <name>Internet Message Format Provisions</name>

      <section numbered="true" anchor="empty-quoted" toc="default">
        <name>Empty Quoted Strings</name>
        <t>
            The <tt>quoted-string</tt> ABNF
            non-terminal appears in the
            <xref target="I-D.ietf-emailcore-rfc5322bis"/>
            grammar.
            While it allows for an empty quoted string, such a construct will cause
            interoperability issues when used in certain header fields
            In particular, use of empty quoted  strings is discouraged
            in "received-token" (a component of a Received
            header field) and "local-part" (left hand side of email addresses).
            For example, all of the following email header fields are
            non-interoperable:
        </t>

        <ul empty="true">
          <li>Received: from node.example by x.y.test "" foo; 21 Nov 1997 10:01:22 -0600</li>
        <li>From: "".bar@example.com</li>
        <li>To: foo.""@example.net</li>
        <li>Cc: ""@example.com</li>
        </ul>
        <t>Use of empty quoted strings is fine in "display-name".
        For example, the following email header field is interoperable:</t>

        <ul empty="true">
          <li>To: "" &lt;test@example.com&gt;</li>
        </ul>
      </section>

      <section numbered="true" toc="default">
        <name>Received Header Fields</name>

        <section numbered="true" toc="default">
          <name>Generation</name>
          <t>Email addresses are commonly classified as Personally Identifiable Information (PII).
          Improper application of the FOR clause in Received header fields can result in
          disclosure of PII. Thus, the FOR clause SHOULD NOT be generated if the message
          copy is associated with multiple recipients from multiple SMTP RCPT commands.
          Otherwise, the value of the FOR clause MUST contain the RCPT address that caused
          the message to be routed to the recipient of the given copy of the message.</t>

          <t>If a mail system generates a FOR clause when there is only a single recipient,
          and doesn't generate one when there are multiple recipients, the absence of the
          field is an indication that there is another recipient.
          That may allow someone to infer that a "blind" copy is involved.</t>
        </section>

        <section anchor="received-consumption" numbered="true" toc="default">
          <name>Consumption</name>
          <t>Received header fields support analysis of handling and
          delivery problems, as well as aiding evaluation of a message
          with suspicious content or attributes. The fields are easily
          created and have no direct security or privacy protections,
          and the fields can contain personally sensitive
          information.
          </t>

          <t>Therefore, the fields do not warrant automatic trust and
          do warrant careful consideration before disclosing to
          others. They should be used with care, for whatever
          information is deemed valuable, and especially when syntax
          or values occur that are not defined by the specifications
          <xref target="I-D.ietf-emailcore-rfc5321bis"/>
          <xref target="I-D.ietf-emailcore-rfc5322bis"/>.</t>
        </section>
      </section>
    <section numbered="true" toc="default" anchor="GroupSyntax">
     <name> Group Syntax </name>
     <t> "Group" syntax
      <xref target="I-D.ietf-emailcore-rfc5322bis"/>
      <xref target="RFC6854"/>
      has been a long-standing construct in the specification,
      going back to <xref target="RFC822">RFC 822</xref>, but
      it has had little use in all that time.  It is therefore
      possible that use of it in a message will conform with
      the specifications but not be supported by some
      implementations.</t>
    </section>
    </section>

    <section numbered="true" toc="default">
      <name>Email Addresses</name>

      <section numbered="true" toc="default">
        <name>Case-Sensitivity, Delimiters, and Mailbox Equivalency</name>

        <t>SMTP specifies that the local-part of an email address is case-sensitive (see
          <xref target="I-D.ietf-emailcore-rfc5321bis"
         section="2.4" />).</t>

        <t>While case-sensitivity is specified as an absolute requirement,
        most implementations do not make case distinctions in the local-part of an address.
        Most treat "smith", "Smith", and "SMITH" as equivalent.
        Most implementations preserve the case that is received
        (from SMTP or HTTP, from address books, or from user input).
        Maximum interoperability can be achieved by keeping the local-part unchanged,
        and by assuming that email addresses with a local-part only differing in
        case probably refer to the same mailbox.</t>

        <t>Email addresses with a non-ASCII local-part will become more common over time.
        Case changes are both character-set dependent and language dependent,
        and attempts to change case without having the full context necessary are
        likely to be wrong often enough to matter.</t>

        <t>Final delivery systems vary in their interpretation of delimiters such as '+' and '.'
        in the local-part of an address. Some systems make distinctions between "smith" and
        "smith+foo", or "jane.doe" and "janedoe", while others treat them as referring to
        the same mailboxes respectively. Since only the final delivery system can properly
        interpret the local-part of an address, originating and transit/relay mail systems
        are discouraged from making any assumptions as to address equivalency or from making
        any changes to a local-part containing such a delimiter.</t>
      </section>

      <section anchor="non-ascii" numbered="true" toc="default">
        <name>Non-ASCII Characters</name>
        <t>Proper generation and transmission of email addresses
        containing non-ASCII characters is discussed in the SMTPUTF8
    documents
        <xref target="SMTPUTF8" />.
        <xref target="RFC6530" section="9"/> says: "a downgrade
        mechanism that transforms the local part of an email address
        cannot be utilized in transit."</t>

        <t>Systems that are not the final delivery system MUST NOT:</t>

        <ul spacing="normal">
          <li>use web URI percent-encoding
          (see <xref target="RFC3986" section="2.1"/>)
          in either the local-part or the domain-part of an
          address</li>
          <li>perform <xref target="IDNA2008">Internationalized
       Domain Names</xref>
          (IDNA) Punycode Conversion
          (see <xref target="RFC5891" section="4.4"/>)
          on the local-part of an address</li>
        </ul>

        <t>These encodings might not produce an address that is guaranteed to be treated as
        equivalent to the original one. See <xref target="RFC6530" section="8"/> for
        further discussion.</t>
    </section>


    <section numbered="true" toc="default" anchor="HTML-validation">
        <name>Use and Validation of Email Address Syntax</name>

        <t>Email addresses are frequently used as input to and validated by forms
           implemented by various libraries. Some systems have a more restricted
           grammar than the IETF email standards. The allowed grammar for email
           addresses as incorporated in those tools, and hence in various applications,
           may be inconsistent with that allowed by the grammar for a "Mailbox" in Section 4.1.2 of
         <xref target="I-D.ietf-emailcore-rfc5321bis" section="4.1.2"/>,
       and the grammars for use of non-ASCII email addresses
       specified in
       <xref target="SMTPUTF8"> the SMTPUTF8 specifications</xref>.</t>

        <section numbered="true" toc="default" anchor="HTML">
                <name>HTML</name>
                <t>The standard HTML email input deliberately limits the address syntax
                even in ASCII, and also has uneven support for non-ASCII email addresses.
                As HTML is a "living standard", this support gradually changes over time.
                Additionally, many HTML applications don't use the standard email input
                at all, and validation is implemented in ECMAScript.</t>
            </section>
            <section>
                <name>Other Concerns</name>
                <t>Mail systems that are not responsible for final delivery of a message,
                but that intend to check the syntax of its email addresses, should be
                aware that there are many reasons that might cause a valid address to
                "look strange" or be rejected by tools that are inconsistent with these
                email standards.</t>

                <t>In general, there is uneven support for more unusual syntax, whether it
                is valid or invalid.</t>

                <t>The best option is to treat an address as valid unless the address
                in question actually violates restrictions of the <xref target="I-D.ietf-emailcore-rfc5321bis">SMTP </xref>
            syntax.  Section 6.4 of that document contains
            additional information that might be helpful.</t>
            </section>
    </section>
  </section>

      <section numbered="true" toc="default">
      <name>Use of Multipurpose Internet Mail Extensions (MIME)</name>
      <t>Although the <xref target="RFC2045">Multipurpose Internet
        Mail Extensions (MIME)</xref> specification and its
        predecessors and updates have remained separate from the
        <xref target="I-D.ietf-emailcore-rfc5322bis">Internet Message
        Format (IMF)</xref>
        specification and its predecessors, MIME features such as
        non-textual message bodies, multi-part message bodies, and the
    use of character sets other than US-ASCII in message bodies
        have become nearly ubiquitous in contemporary
        email.
        As a result, IMF generators and parsers are expected to support MIME.
      </t>
    </section>

    <section anchor="conf-auth" numbered="true" toc="default">
      <name>Confidentiality and Authentication with SMTP</name>
      <t>SMTP is specified without embedded mechanisms for
        authentication or confidentiality; its traffic is therefore
        "in the clear". Years of operational experience have shown
        that such transmission exposes the message to easy compromise,
        including wiretapping and spoofing. To mitigate these risks,
        several protocols, mechanisms, and extensions have been
        developed that provide security services to email, most of
        which are outside the SMTP protocol itself.
        The most important of these include, but are not limited to:</t>

        <ul spacing="normal">
          <li>
            <xref target="RFC8446">TLS</xref>,
            <xref target="RFC3207">STARTTLS</xref>,
            <xref target="RFC8461">MTA-STS</xref>, and
            <xref target="RFC7672">DANE for SMTP</xref>
            offer confidentiality services between SMTP Clients and
      the Servers to which they are transmitting messages.
          </li>
          <li>
            <xref target="RFC6376">DKIM</xref>,
            <xref target="RFC7489">DMARC</xref>,
            <xref target="RFC8617">ARC</xref>,
            <xref target="RFC7208">SPF</xref>,
            <xref target="RFC8551">S/MIME</xref>,
            <xref target="RFC9580">OpenPGP</xref>, and
      <xref target="RFC9788">
        Header Protection for Cryptographically Protected E-mail</xref>,
            offer message level authentication services.
          </li>
          <li>
            <xref target="RFC4954">SMTP Authentication</xref>
            offers authentication services for an SMTP client
      connecting to an SMTP server.
          </li>
          <li>
            <xref target="RFC8551">S/MIME</xref> and
            <xref target="RFC9580">OpenPGP</xref> allow for message
            confidentiality outside of the operation of SMTP and were
      originally focused only on the message content.  Newer
      specifications (see below) extend them to cover header
      confidentiality as well.
      <!-- Resnick note 20250830: drop "and were...content"??
         20250901: added last sentence .. my preference is to not
         drag in 9788 and its complicated title here.
      -->
          </li>
        </ul>

        <t>The following sections discuss these facilities and their
        most common uses.</t>

        <section anchor="transport-sec" numbered="true" toc="default">
       <name>Security at the Transport Layer</name>
          <t>The Internet email environment has evolved over the years so that
       the SMTP protocol itself can be used in conjunction with
          <xref target="RFC8446">Transport Layer Security (TLS)</xref>
      protocol
          to provide both confidentiality and server authentication in the
          transmission of messages.</t>

          <t>It is important that the reader understand what is meant by
          the terms "Authentication" and "Confidentiality" in this
      context, and for that
      we will borrow directly from the TLS specification
      <xref target="RFC8446"/> (although the pointers to other
      sections given are to this document).
          </t>

          <ul spacing="normal">
            <li>Authentication is the process of establishing the
            identity of one or more of the endpoints of a communication
            channel.
            TLS can be used without authentication (as described in
            <xref target="opp-tls"/>), but even when it does use
      authentication, it typically only authenticates
      the server side of the communication
            channel (see <xref target="enforced-tls"/>).
            </li>
            <li>The term "confidentiality" describes a state where the
            data (i.e., the message) is transmitted in a way that it is
            only visible to the endpoints of a communication
            channel.</li>
          </ul>
          <t>It is not uncommon for implementers to use the term
          "encryption" to mean "confidentiality", but this is not quite
          correct. Rather, encryption using TLS is the most common current method by
      which confidentiality is achieved with SMTP, but that does not
          mean that other methods might not be used or future ones developed.</t>

     <section anchor="tls" numbered="true" toc="default">
      <name> The TLS Protocol </name>
      <t>The TLS Protocol <xref target="RFC8446"/>
       provides confidentiality while the message is in
       transit from an SMTP client to the next SMTP server.
       Both client and server will have access to the plain
          text of the message and there is no guarantee that the
          message will be stored in an encrypted fashion at its
      destination.
      Furthermore, in situations where a message traverses
      multiple hops through multiple SMTP servers, each
      intermediate server will typically store the message in
      plain text and hence have access to that plain text of the
      message. </t>
        </section> <!-- TLS -->
      <section numbered="true" anchor="opp-tls" toc="default">
        <name>Opportunistic Confidentiality</name>
        <t>The most common implementation of message confidentiality
          is known as "opportunistic TLS", which is frequently
          referred to as "opportunistic encryption".  With this method,
          a receiving server announces in its greeting that it is
          capable of supporting TLS encryption through the presence of
          the "STARTTLS" keyword. The sending client then attempts to
          negotiate an encrypted connection, and if successful,
          transmits the message in encrypted form; if negotiation
          fails, the client falls back to sending the message in clear
          text.</t>

     <!-- Resnick note 20250830: Applied what I think was Pete's
        correction.  Is it right now?? -->
          <t>Opportunistic TLS is optional confidentiality due
          to provision for falling back to
      transmission in the clear if
          a secure connection cannot be established.
          Opportunistic TLS is often configured to provide
          confidentiality without authentication, where no effort is
          made to authenticate the receiving server
          <xref target="RFC3207" section="4.1" sectionFormat="comma"/>.
          Most modern implementations of SMTP support this method
          and so the vast
          majority of email traffic is encrypted during its time
      transiting from the client to the next server.</t>

          <t>Note that opportunistic TLS via the
          <xref target="RFC3207">STARTTLS</xref> extension is
          vulnerable to man-in-the-middle attacks.
          <xref target="enforced-tls">Enforced confidentiality</xref>
          can be used to mitigate these attacks.</t>
      </section>

    <section numbered="true" anchor="enforced-tls" toc="default">
        <name>Enforced Confidentiality,
        with Receiving Server Authentication</name>
        <t>Two protocols exist that move message confidentiality
          from opportunistic to enforced (with conditions as noted below) -
          <xref target="RFC8461">MTA-STS</xref> and
          <xref target="RFC7672">DANE for SMTP</xref>.
          While they differ in their implementation details, receiving
          servers relying on either protocol can state that they
          only accept mail if the transmission can be encrypted with
      TLS.
      Support for both protocols is increasing, but is
          not yet mandatory.</t>
        <t>These two protocols differ from Opportunistic TLS in that
          they require receiving server authentication and there is no
          fallback to sending in the clear.</t>

        <t>Note that the protocols mentioned in this section rely not
          only on the receiving server but also the sending client
          supporting the protocol intended to be used. If the sending
          client does not support the protocol
          requested by the receiving server, the sending client will
          use Opportunistic TLS or clear-text to transmit the
          message.</t>
    </section>
    </section>

      <section numbered="true" toc="default">
        <name>Message-Level Authentication</name>
        <t>Protocols exist to allow for authentication of different
        identities associated with an email message:</t>
  <ul>
    <li>
            <xref target="RFC7208">SPF</xref> provides a method to
      ensure that the sending mail server is authorized to
      originate mail from the sender's domain.
    </li>
    <li>
            <xref target="RFC6376">DKIM</xref> permits a person, role,
            or organization to claim some responsibility for an email
            message by associating a <xref target="RFC1034">domain name</xref>
            with the message, which they are authorized to use.
    </li>
    <li>
          <xref target="RFC7489">DMARC</xref>
          relies on SPF and DKIM to allow for validation of the domain
          in the visible From header.
    </li>
    <li>
      <xref target="RFC8617">ARC</xref> provides a method for each
          hop to record results of authentication checks performed at
          that hop.
    </li>
    <li>
      <xref target="RFC8551">S/MIME</xref>
            and <xref target="RFC9580">OpenPGP</xref>,
      along with
      <xref target="RFC9788">
        Header Protection for
        Cryptographically Protected E-mail</xref>,
      allow for email messages to be digitally signed, thereby providing
      a method to verify that an email message was actually sent
      by the entity claiming to be the sender.
    </li>
  </ul>
        <t>All of these are outside the scope of this document, as
          they are outside the scope of SMTP.  All of them are, to
      greater or lesser degrees,  subject
      to risks of compromise on systems processing messages
      between transport links as discussed above.</t>
      </section>

      <section numbered="true" toc="default">
        <name>SMTP Authentication</name>
        <t><xref target="RFC4954">SMTP Authentication</xref>,
          which is often abbreviated as SMTP AUTH,
          is an extension to SMTP. While its name might suggest
          that it would be within scope for this section of the
      Applicability Statement, that is not the case.</t>

        <t>SMTP AUTH defines a method for a client to identify
          itself to a Message Submission Agent (MSA) when presenting a
          message for transmission, usually using ports 465 or 587 rather than
          the traditional port 25. The most common implementation of
          SMTP AUTH is for a person to present a username and password
          to their mailbox provider's outbound SMTP server when
        configuring their MUA for sending mail.</t>
        <t>SMTP AUTH MAY be used to limit unauthorized use of VRFY and
        EXPN commands as described in
        <xref target="I-D.ietf-emailcore-rfc5321bis" section="7.3"/>.</t>
    </section>

      <section numbered="true" anchor="message-conf" toc="default">
        <name>Message-Level Confidentiality</name>
        <t>Protocols such as <xref target="RFC8551">S/MIME</xref>
          and <xref target="RFC9580">OpenPGP</xref> exist to allow for
          message confidentiality outside of the operation of
          SMTP.  In other words, using these protocols results in
          encryption of the message body prior to its being submitted to
          the SMTP communications channel.  Decryption of the
          message is then the responsibility of the message
      recipient.  There are numerous implementations of S/MIME and
      OpenPGP, too many to list here. As both operate fully
          independent of SMTP, a more detailed discussion is out of
      scope for this document.</t>
        <t><xref target="RFC9788">
          Header Protection for Cryptographically Protected E-mail</xref>
        extends S/MIME such that some message headers can be
      encrypted.</t>
      </section>
      <section numbered="true" toc="default">
        <name>Confidentiality Requirements</name>
        <t>The vast majority of email sent on the Internet at present
        does not use message-level confidentiality. It has been
        recognized that Internet traffic is exposed to both active
        attacks and passive monitoring
        (see <xref target="RFC3365">BCP61</xref> and
        <xref target="RFC1984">BCP200</xref>), and therefore that
        message transmission over SMTP is subject to both.
        To mitigate these risks, opportunistic confidentiality is now
        widely implemented and used in Internet email, and some
        deployment and use of enforced confidentiality is also now
        seen. Therefore, confidentiality (for example, the STARTTLS
        extension) MUST be implemented by SMTP servers in order to at
        least provide over-the-wire confidentiality during an
        individual SMTP exchange. That said, there are many legacy
        implementations of SMTP that are still in widespread use in
        both private and Internet-connected networks and
        receiving server implementations will often be expected to be
        capable of receiving such messages. Therefore, SMTP servers
        MUST be configurable to allow for receiving messages without
        confidentiality between servers in order to maximize
        interoperation.</t>
      </section>
    </section>

  <section anchor="Acknowledgments" numbered="true" toc="default">
     <name>Acknowledgments</name>
     <!-- ??? Needs work -->
      <t>The Emailcore group arose out of discussions on the
        ietf-smtp group over changes and additions that should be made
        to the core email protocols.
        It was agreed upon that it was time to create a working group
        that would fix many potential errors and opportunities for
        misunderstandings within the RFCs.</t>

        <t>Special thanks to the following for providing significant
        portions of text for this document: Dave Crocker, Todd Herr,
        Tero Kivinen,
        Barry Leiba, John Levine, Alexey Melnikov, Pete Resnick, and
        E. Sam.</t>
      </section>

    <section anchor="IANA" numbered="true" toc="default">
      <name>IANA Considerations</name>
    <t>This memo includes no requests to or actions for IANA.  The
     IANA registries associated with the protocol specifications
     they reference are specified in their respective documents.
       A companion document
     <xref target="SMTP-IANA-cleanup"/> that will
       complete the work on reorganizing and updating the email
       registries begun in
     <xref target="I-D.ietf-emailcore-rfc5321bis"/> is under
     development.
    </t>
    </section>

    <section anchor="Security" numbered="true" toc="default">
      <name>Security Considerations</name>
      <t>Security and privacy considerations are discussed throughout
     this document as they pertain to the referenced specifications.

    Special note should be taken of the interaction between
    confidentiality and authentication mechanisms that are applicable
    to Internet links and therefore potentially sensitive to the
    multi-hop design of SMTP.  Unless the relevant messages and
    mechanisms are protected from tampering or content exposure on
    systems that are the endpoints of those links, the security of
    the mechanisms depends on trust in those intermediate
    endpoints. </t>
    </section>
  </middle>

  <!--  *****BACK MATTER ***** -->

  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2026.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2045.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml"/>
    </references>

      <references>
     <name>Informative References</name>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.822.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.1034.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.1984.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2034.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3365.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3461.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3463.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5248.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6152.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2920.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5321.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7085.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6376.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7489.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8617.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8461.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8446.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8551.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7208.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7672.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9580.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4954.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3986.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6533.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6522.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3464.xml"/>
    <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3207.xml"/>
    <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6854.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-emailcore-rfc5321bis.xml"/>
    <xi:include href="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-emailcore-rfc5322bis.xml"/>

          <!-- Next was I-D.ietf-lamps-header-protection -->
    <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9788.xml"/>

    <referencegroup anchor="IDNA2008">
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5890.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5891.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5892.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5893.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5894.xml"/>
    </referencegroup>

    <referencegroup anchor="SMTPUTF8">
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6530.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6531.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6532.xml"/>
    </referencegroup>

    <reference anchor="SMTP-IANA-cleanup"
              target="https://datatracker.ietf.org/doc/draft-ietf-emailcore-iana-cleanup/">
          <front>
       <title>Updates to SMTP related IANA registries</title>
       <author initials="A." surname="Melnikov"
           fullname="Alexey Melnikov">
        <organization/>
       </author>
          </front>
      <annotation>Work in progress.</annotation>
    </reference>

    </references>  <!-- end Informative References -->

  </references>

    <!--   Sections below here become  Appendices.  -->

    <section anchor="ChangeLog" numbered="true" toc="default">
      <name>Change Log</name>
      <t>RFC Editor: Please remove this appendix before publication.</t>
      <section numbered="true" toc="default">
        <name>Changes from draft-klensin-email-core-as-00 (2020-03-30)
        to draft-ietf-emailcore-as-00</name>
        <ul spacing="normal">
          <li> Change of filename, metadata, and date to reflect
          transition to WG document for new emailcore WG.
          No other substantive changes </li>
        </ul>
      </section>
      <section numbered="true" toc="default">
        <name>Changes from draft-ietf-emailcore-as-00 (2020-10-06) to -01</name>
        <ul spacing="normal">
          <li>Added co-authors (list is in alphabetical order for
          the present). </li>
          <li> Updated references to 5321bis and 5322bis. </li>
          <li> Added note at top, "This version is provided as a
          document management convenience to update the author
          list and make an un-expired version available to the
          WG.  There are no substantive changes from the prior
          version", which should be removed for version -02.</li>
        </ul>
      </section>
      <section numbered="true" toc="default">
        <name>Changes from draft-ietf-emailcore-as-01 (2021-04-09) to -02</name>
        <ul spacing="normal">
          <li> Added new editors and also added some issues the
          emailcore group will be dealing with. </li>
          <li> Added reference to RFC 6648.</li>
        </ul>
      </section>
      <section numbered="true" toc="default">
        <name>Changes from draft-ietf-emailcore-as-02 (2021-08-06) to -03</name>
        <ul spacing="normal">
          <li> Moved discussion of address-literals (issue #1) and
          domain names in EHLO (issue #19) under SMTP Provisions
          section</li>
          <li> Moved discussion of empty quoted-strings under
          Message Format Provisions section</li>
          <li> Added text on use of addresses in TLDs (issue #50) </li>
          <li> Marked all authors as editors. </li>
          <li> Miscellaneous editorial changes. </li>
        </ul>
      </section>
      <section numbered="true" toc="default">
        <name>Changes from draft-ietf-emailcore-as-03 (2022-01-31) to -04</name>
        <ul spacing="normal">
          <li>Added requirements for SMTP extensions (issue #40).</li>
        </ul>
      </section>
      <section numbered="true" toc="default">
        <name>Changes from draft-ietf-emailcore-as-04 (2022-05-21) to -05</name>
        <ul spacing="normal">
          <li>Added text addressing use ofx enhanced status codes.</li>
          <li>Added text addressing confidentiality and authentication
          (issue #54).</li>
        </ul>
      </section>
      <section numbered="true" toc="default">
        <name>Changes from draft-ietf-emailcore-as-05 (2022-10-24) to -06</name>
        <ul spacing="normal">
          <li>Converted source to xml2rfc v3.</li>
          <li>Replaced placeholder Introduction with new text.</li>
          <li>Updated keywords boilerplate.</li>
          <li>Added text on interoperability of email addresses in
          general and use in HTML forms (issue #51).</li>
          <li>Added text stating that implementations are expected to
          support MIME (issue #65).</li>
          <li>Added placeholders for issues #38 and #55.</li>
          <li>Add list of contributors in Acknowledgments.</li>
          <li>Added minimal Security Considerations section.</li>
        </ul>
      </section>
      <section numbered="true" toc="default">
        <name>Changes from draft-ietf-emailcore-as-06 (2022-11-07) to -07</name>
        <ul spacing="normal">
          <li>Added text addressing use of FOR clause in Received
          header fields (issue #55).</li>
          <li>Miscellaneous editorial changes.</li>
        </ul>
      </section>
      <section numbered="true" toc="default">
        <name>Changes from draft-ietf-emailcore-as-07 (2023-03-13) to -08</name>
        <ul spacing="normal">
          <li>Added text addressing use of Received
          header fields by MUAs (issue #85).</li>
          <li>Added advice against use of Percent-Encoding non-ASCII
          characters in email addresses (issue #78).</li>
          <li>Miscellaneous editorial changes.</li>
        </ul>
      </section>
      <section numbered="true" toc="default">
        <name>Changes from draft-ietf-emailcore-as-08 (2023-12-18) to -09</name>
        <ul spacing="normal">
          <li>Acknowledge the existence of port 465 for submission
          (issue #80).</li>
          <li>Remove "Use of Time Zones in Date and Received Header
          Fields" placeholder (issue #66).</li>
          <li>Miscellaneous editorial changes.</li>
        </ul>
      </section>
      <section numbered="true" toc="default">
        <name>Changes from draft-ietf-emailcore-as-09 (2024-07-02) to -10</name>
        <ul spacing="normal">
          <li>Added Open Issues Section</li>
          <li>Removed placeholder for issue
          <eref
              target="https://github.com/ietf-wg-emailcore/emailcore/issues/38">
            #38 - Clarify 78 octet limit versus 998 line length
          limit</eref>
          </li>
          <li>Applied "final" proposed text for issue
          <eref
              target="https://github.com/ietf-wg-emailcore/emailcore/issues/78">
          #78 - Advice against using URL %-encoding on non-ASCII email
          addresses</eref>
          </li>
          <li>Applied proposed text for issue
          <eref
              target="https://github.com/ietf-wg-emailcore/emailcore/issues/84">
          #84 - Handling of Trace Header Fields by MUAs</eref>
          </li>
        </ul>
      </section>
      <section numbered="true" toc="default">
        <name>Changes from draft-ietf-emailcore-as-10 (2024-07-03) to -11</name>
        <ul spacing="normal">
          <li>Added Open Issue
          <eref
              target="https://github.com/ietf-wg-emailcore/emailcore/issues/94">
            #94 - Use of Quoted Strings</eref>
          </li>
        </ul>
      </section>
      <section numbered="true" toc="default">
        <name>Changes from draft-ietf-emailcore-as-11 (2024-10-21) to -12</name>
        <ul spacing="normal">
          <li>Applied new proposed text to <xref target="empty-quoted"/></li>
          <li>Applied new proposed text for issue
          <eref
              target="https://github.com/ietf-wg-emailcore/emailcore/issues/40">
          #40 - Recommended SMTP Extensions</eref>
          </li>
          <li>Applied new proposed text for issue
          <eref
              target="https://github.com/ietf-wg-emailcore/emailcore/issues/78">
          #78 - Advice against using URL %-encoding on non-ASCII email
          addresses</eref>
          </li>
          <li>Applied new proposed text for issue
          <eref
              target="https://github.com/ietf-wg-emailcore/emailcore/issues/84">
          #84 - Handling of Trace Header Fields by MUAs</eref>
          </li>
          <li>Applied new proposed text for issue
          <eref
              target="https://github.com/ietf-wg-emailcore/emailcore/issues/85">
            #85 - What mail agents should do/not do with Received
          header fields</eref>
          </li>
        </ul>
      </section>
      <section numbered="true" toc="default">
        <name>Changes from draft-ietf-emailcore-as-12 (2024-11-09) to -13</name>
        <ul spacing="normal">
          <li>Fixed discussion of Punycode (domain-part -> local-part)
          in <xref target="non-ascii"/></li>
          <li>Removed Keywords from discussion in
          <xref target="empty-quoted"/></li>
          <li>Added example of empty display-name in
          <xref target="empty-quoted"/></li>
        </ul>
      </section>
      <section numbered="true" toc="default">
        <name>Changes from draft-ietf-emailcore-as-13 (2025-01-30) to -14</name>
        <ul spacing="normal">
          <li>Added STARTTLS to the MUST implement list in
          <xref target="smtp-ext"/></li>
          <li>Added Alexey Melnikov's proposed text for issue
          <eref
              target="https://github.com/ietf-wg-emailcore/emailcore/issues/94">
            #93 - "VRFY, EXPN, and Security" should point to SMTP AUTH RFC</eref>
          </li>
          <li>Applied (with some editorial changes), Tero Kivinen's proposed
          text to <xref target="conf-auth"/>. </li>
        </ul>
      </section>
      <section numbered="true" toc="default">
        <name>Changes from draft-ietf-emailcore-as-14 (2025-02-27) to -15</name>
        <ul spacing="normal">
          <li>Miscellaneous editorial changes</li>
        </ul>
      </section>
      <section numbered="true" toc="default">
        <name>Changes from draft-ietf-emailcore-as-15 (2025-03-18) to -16</name>
        <ul spacing="normal">
          <li>Changed "FOR clause MUST NOT be generated if the message
    copy is associated with multiple recipients from multiple
    SMTP RCPT commands" to "SHOULD NOT".</li>
          <li>Reintroduced examples of non-interoperable local-parts
    containing empty quoted strings (issue
          <eref
              target="https://github.com/ietf-wg-emailcore/emailcore/issues/94">
            #93</eref>).
          </li>
          <li>Added short descriptions of SPF and DKIM, and added
    S/MIME, OpenPGP, and Header Protection for Cryptographically
    Protected E-mail as methods of Message-Level Authentication
    (issues
          <eref
              target="https://github.com/ietf-wg-emailcore/emailcore/issues/94">
            #110</eref>,
          <eref
              target="https://github.com/ietf-wg-emailcore/emailcore/issues/94">
            #132</eref>,
          <eref
              target="https://github.com/ietf-wg-emailcore/emailcore/issues/94">
            #133</eref>).
    </li>
        </ul>
      </section>
      <section numbered="true" toc="default">
        <name>Changes from draft-ietf-emailcore-as-16 to -17</name>
        <ul spacing="normal">
          <li>Changed all instances of "optional confidentiality" to
          "opportunistic confidentiality" and all instances of
          "required confidentiality" to "enforced confidentiality".
          (issue
          <eref
              target="https://github.com/ietf-wg-emailcore/emailcore/issues/113">
            #113</eref>)
          </li>

          <li>Added Section "6.7 Confidentiality Requirements"
          (issue
          <eref
              target="https://github.com/ietf-wg-emailcore/emailcore/issues/113">
            #113</eref>)
          </li>

          <li>Updated DKIM description to use a slight modification to
          the first sentence of RFC 6376 Introduction (issue
          <eref
              target="https://github.com/ietf-wg-emailcore/emailcore/issues/138">
            #138</eref>).
          </li>
        </ul>
      </section>
      <section numbered="true" toc="default">
        <name>Changes from draft-ietf-emailcore-as-17 to -18</name>
        <ul spacing="normal">
          <li>Added text clarifying that hop-by-hop confidentiality
          does not guarantee end-to-end confidentiality.</li>
        </ul>
      </section>
      <section numbered="true" toc="default">
        <name>Changes from draft-ietf-emailcore-as-18 to -19</name>
        <ul spacing="normal">
          <li>
            Added text stating that STARTTLS is vulnerable to
            man-in-middle-attacks (issue
          <eref
              target="https://github.com/ietf-wg-emailcore/emailcore/issues/134">
            #134</eref>)
          </li>
          <li>
            Rewrote opening paragraph of Opportunistic Confidentiality
            based on Rob Sayre's suggestions (issue
          <eref
              target="https://github.com/ietf-wg-emailcore/emailcore/issues/135">
            #135</eref>)
          </li>
          <li>
            Rewrote text discussing use of email addresses in HTML
            forms and provided a more restricted Mailbox ABNF (issue
          <eref
              target="https://github.com/ietf-wg-emailcore/emailcore/issues/137">
            #137</eref>)
          </li>
        </ul>
      </section>
      <section numbered="true" toc="default">
        <name>Changes from draft-ietf-emailcore-as-19 to -20</name>
        <ul spacing="normal">
          <li>
            Updated stats regarding MX records on top-level domains.
          </li>
          <li>
            Tweaked hop-by-hop confidentiality text again (Resnick).
          </li>
          <li>
            Made clear that TLS authentication is optional (Resnick/Sayre).
          </li>
          <li>
            Removed hop-by-hop paragraph in Opportunistic
            Confidentiality as its now discussed in TLS section (Sayre).
          </li>
          <li>
            Removed hop-by-hop paragraph in Enforced
            Confidentiality as its now discussed in TLS section (Sayre).
          </li>
          <li>
            Added reference to LAMPS documents in Message-Level Confidentiality
            (Sayre).
          </li>
          <li>
            Miscellaneous editorial changes.
          </li>
        </ul>
    </section>

    <section numbered="true" toc="default">
     <name>Changes from draft-ietf-emailcore-as-20 to -21</name>
     <ul spacing="normal">
      <li> Restructured <xref target="HTML-validation"/> and
         eliminated the dependency of the discussion on
         deviations from the core email specs on, e.g., various
         versons of HTML.
         <br/>
         Added new Section 4.4, and
         eliminated references that are now unnecessary.
      </li>
      <li> Minor editorial corrections. </li>
     </ul>
    </section>
    <section numbered="true" toc="default">
     <name>Changes from draft-ietf-emailcore-as-21 to -22</name>
     <ul spacing="normal">
      <li> Rewrote <xref target="HTML-validation"/> to further
         reflect the "there are problems out there" approach,
         further reducing the dependencies associated with HTML.
         Re-integrated the Section 4.4 material that was
         separated in -21.
      </li>
      <li> Rewrote and reorganized <xref target="conf-auth"/>,
         grouping TLS-related material into another layer of
         subsections (<xref target="transport-sec"/>) and
         applying a set of changes agreed by the WG.</li>
      <li> Numerous, but individually minor, editorial
         adjustments and corrections.</li>
     </ul>
    </section>

    <section numbered="true" toc="default">
     <name>Changes from draft-ietf-emailcore-as-22 to -23</name>
     <ul spacing="normal">
      <li> Corrected an error in which IDNA2008 documents were
         cited rather than SMTPUTF8 ones and tuned text
         slightly. </li>
      <li> Tuned discussions of S/MIME, PGP, and RFC 9788
         slightly, including new text in
         <xref target="message-conf"/> </li>
      <li> Corrected an error in the description of
         Opportunistic TLS.</li>
      <li> A few small editorial changes/ corrections. </li>
     </ul>
    </section>

    <section numbered="true" toc="default">
     <name>Changes from draft-ietf-emailcore-as-23 to -24</name>
     <ul spacing="normal">
      <li> Added an informative reference to the iana-cleanup
         document to warn people that would be coming.</li>
      <li> Added a brief description/ comments about group
         syntax (Section <xref target="GroupSyntax"/>. </li>
      <li> Small editorial correction.</li>
     </ul>
    </section>

    <section numbered="true" toc="default">
     <name>Changes from draft-ietf-emailcore-as-24 to -25</name>
     <ul spacing="normal">
      <li> Corrected the SMTP-iana-cleanup reference to point to
         the WG-adopted document,
         draft-ietf-emailcore-iana-cleanup, replacing the
         reference to draft-melnikov-smtp-iana-cleanup.</li>
     </ul>
    </section>

   </section>
  </back>
</rfc>
