<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version  -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc comments="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-lamps-header-protection-01" category="std">

  <front>
    <title abbrev="Header Protection S/MIME">Header Protection for S/MIME</title>

    <author initials="B." surname="Hoeneisen" fullname="Bernie Hoeneisen">
      <organization>pEp Foundation</organization>
      <address>
        <postal>
          <street>Oberer Graben 4</street>
          <city>CH-8400 Winterthur</city>
          <country>Switzerland</country>
        </postal>
        <email>bernie.hoeneisen@pep.foundation</email>
        <uri>https://pep.foundation/</uri>
      </address>
    </author>
    <author initials="D.K." surname="Gillmor" fullname="Daniel Kahn Gillmor">
      <organization>American Civil Liberties Union</organization>
      <address>
        <postal>
          <street>125 Broad St.</street>
          <city>New York, NY</city>
          <code>10004</code>
          <country>USA</country>
        </postal>
        <email>dkg@fifthhorseman.net</email>
      </address>
    </author>
    <author initials="A." surname="Melnikov" fullname="Alexey Melnikov">
      <organization>Isode Ltd</organization>
      <address>
        <postal>
          <street>14 Castle Mews</street>
          <city>Hampton, Middlesex</city>
          <code>TW12 2NP</code>
          <country>UK</country>
        </postal>
        <email>alexey.melnikov@isode.com</email>
      </address>
    </author>

    <date year="2020" month="November" day="02"/>

    <area>Security</area>
    <workgroup>LAMPS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>S/MIME version 3.1 has introduced a feasible standardized option to
accomplish Header Protection. However, implementations of Header
Protection can cause rendering issues on the receiving side.
Clearer specifications regarding message processing, particularly with
respect to header sections, are needed in order to resolve these
rendering issues.</t>

<t>In order to help implementers to correctly compose and
render email messages with Header Protection, this document
updates S/MIME Header Protection specifications with additional guidance
on MIME format, sender and receiver processing.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>Privacy and security issues regarding email Header Protection in
S/MIME have been identified for some time.  Most current
implementations of cryptographically-protected electronic mail protect
only the body of the message, which leaves significant room for
attacks against otherwise-protected messages. For example, lack
of header protection allows an attacker to substitute the message subject
and/or author.</t>

<t>A way to provide end-to-end protection for the Header Section of an email
message has been standardized for S/MIME version 3.1 and later (cf.
<xref target="RFC8551"/>):</t>

<t><list style='empty'>
  <t>In order to protect outer, non-content-related message header fields
  (for instance, the “Subject”, “To”, “From”, and “Cc” fields), the
  sending client MAY wrap a full MIME message in a message/RFC822
  wrapper in order to apply S/MIME security services to these header
  fields.</t>
</list></t>

<t>Unfortunately, implementations of Header Protection can cause rendering
issues on the receiving side. In some cases, the user sees an attachment
suggesting a forwarded email message, which – in fact – contains the
protected email message that should be rendered directly. For these cases,
the user can click on the attachment to view the protected message. However,
there have also been reports of email clients displaying garbled text,
or sometimes nothing at all. In those cases the email clients on the
receiving side are (most likely) not fully MIME-capable.</t>

<t>The following shortcomings have been identified to cause these issues:</t>

<t><list style="symbols">
  <t>Broken or incomplete implementations</t>
  <t>Lack of a simple means to distinguish “forwarded message” and
“wrapped message” (for the sake of Header Protection)</t>
  <t>Not enough guidance with respect to handling of Header Fields on both
the sending and the receiving side</t>
</list></t>

<t>Furthermore, the need (technical) Data Minimization, which includes
data sparseness and hiding all technically concealable information,
has grown in importance over the past several years. In addition, backwards
compatibility must be considered when it is possible to do so without
compromising privacy and security.</t>

<!-- Russ Housley
Something about backward compatibility, even if it is a forward pointer
-->

<t>No mechanism for Header Protection has been standardized for
PGP/MIME (Pretty Good Privacy) <xref target="RFC3156"/> yet.  PGP/MIME
developers have implemented ad-hoc header-protection,
and would like to see a specification that is
applicable to both S/MIME and PGP/MIME.</t>

<t>This document describes the problem statement (<xref target="problem-statement"/>),
generic use cases (<xref target="use-cases"/>) and the specification for Header
Protection (<xref target="specification"/>) with guidance on MIME format,
sender and receiver processing
<!--to help implementers to correctly
compose and render email messages with Header Protection-->.</t>

<t><xref target="I-D.ietf-lamps-header-protection-requirements"/> defines the
requirements that this specification is based on.</t>

<!-- TODO: Decide whether to add the requirements to this document or
leave them in a separate document -->

<t>This document is in an early draft state and contains a proposal on which
to base future discussions of this topic. In any case, the final
mechanism is to be determined by the IETF LAMPS WG.</t>

<section anchor="other-protocols-to-protect-email-headers" title="Other Protocols to Protect Email Headers">

<t>A range of protocols for the protection of electronic mail (email)
exists, which allows one to assess the authenticity and integrity of the
email headers section or selected Header Fields from the domain-level
perspective, specifically DomainKeys Identified Mail (DKIM)
<xref target="RFC6376"/>, as used by Domain-based Message Authentication,
Reporting, and Conformance (DMARC) <xref target="RFC7489"/>. These protocols
provide a domain-based reputation mechanism that can be used to
mitigate some forms of unsolicited email (spam).  At the same time,
these protocols can provide a level of cryptographic integrity and
authenticity for some headers, depending on how they are used.<vspace />
However, integrity protection and proof of authenticity are both tied
to the domain name of the sending e-mail address, not the sending
address itself, so these protocols do not provide end-to-end protection,
and are incapable of providing any form of confidentiality.</t>

</section>
<section anchor="requirements-language" title="Requirements Language">

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”,
“SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “MAY”, and “OPTIONAL” in this
document are to be interpreted as described in <xref target="RFC2119"/>.</t>

</section>
<section anchor="terms" title="Terms">

<t>The following terms are defined for the scope of this document:</t>

<!-- {::include ../shared/text-blocks/handshake.mkd} -->
<!-- {::include ../shared/text-blocks/trustwords.mkd} -->
<!-- {::include ../shared/text-blocks/tofu.mkd} -->
<t><list style="symbols">
  <t>Man-in-the-middle (MITM) attack: cf. <xref target="RFC4949"/>, which states: “A
form of active wiretapping attack in which the attacker intercepts
and selectively modifies communicated data to masquerade as one or
more of the entities involved in a communication association.”  <vspace blankLines='1'/>
Note: Historically, MITM has stood for ‘<spanx style="emph">Man</spanx>-in-the-middle’.
However, to indicate that the entity in the middle is not always a
human attacker, MITM can also stand for ‘Machine-in-the-middle’ or
‘Meddler-in-the-middle’.</t>
  <t>S/MIME: Secure/Multipurpose Internet Mail Extensions (cf. <xref target="RFC8551"/>)</t>
  <t>PGP/MIME: MIME Security with OpenPGP (cf. <xref target="RFC3156"/>)</t>
  <t>Message: An Email Message consisting of Header Fields
(collectively called “the Header Section of the message”) followed,
optionally, by a Body; cf. <xref target="RFC5322"/>.  <vspace blankLines='1'/>
Note: To avoid ambiguity, this document does not use the terms
      “Header” or “Headers” in isolation, but instead always uses
      “Header Field” to refer to the individual field and “Header
      Section” to refer to the entire collection; cf. <xref target="RFC5322"/>.</t>
  <t>Header Field (HF): cf. <xref target="RFC5322"/> Header Fields are lines beginning
with a field name, followed by a colon (“:”), followed by a field
body (value), and terminated by CRLF.</t>
  <t>Header Section (HS): The Header Section is a sequence of lines of
characters with special syntax as defined in <xref target="RFC5322"/>.  It is the
(top) section of a Message containing the Header Fields.</t>
  <t>Body: The Body is simply a sequence of bytes that follows the
Header Section and is separated from the Header Section by an empty
line (i.e., a line with nothing preceding the CRLF); cf <xref target="RFC5322"/>.
It is the (bottom) section of Message containing the payload of a
Message. Typically, the Body consists of a (possibly multipart) MIME
<xref target="RFC2045"/> construct.</t>
  <t>MIME Header Fields: Header Fields describing content of a MIME entity
<xref target="RFC2045"/>, in particular the MIME structure. Each MIME Header Field
name starts with “Content-“ prefix.</t>
  <t>MIME Header Section (part): The collection of MIME Header Fields.
“MIME Header Section” refers to a Header Sections that contains only
MIME Header Fields, whereas “MIME Header Section part” refers to the
MIME Header Fields of a Header Section that - in addition to MIME
Header Fields - also contains non-MIME Header Fields.</t>
  <t>Essential Header Fields (EHF): The minimum set of Header Fields an
Outer Message Header Section SHOULD contain; cf. <xref target="outer-msg-hf"/>.</t>
  <t>Header Protection (HP): cryptographic protection of email Header
Sections (or parts of it) for signatures and/or encryption</t>
  <t>Protection Levels (PL): The level of protection applied to a
Message, e.g.  ‘signature and encryption’ or ‘signature only’
(cf. <xref target="protection-levels"/>).</t>
  <t>Protected: Portions of a message that have had any Protection Levels applied.</t>
  <t>Protected Message: A Message that has had any Protection Levels applied.</t>
  <t>Unprotected: Portions of a Message that has had no Protection Levels applied.</t>
  <t>Unprotected Message: A Message that has had no Protection Levels applied.</t>
  <t>Submission Entity: The entity which executes further processing of
the Message (incl. transport towards the receiver), after protection
measures have been applied to the Message.  <vspace blankLines='1'/>
Note: The Submission Entity varies among implementations, mainly
      depending on the stage where protection measures are applied:
      E.g. a Message Submission Agent (MSA) <xref target="RFC6409"/> or another
      (proprietary) solution. The latter is particularly relevant,
      if protection is implemented as a plugin solution. Some
      implementations may determine the destination recipients by
      reading the To, Cc and Bcc Header Fields of the Outer Message.</t>
  <t>Original Message (OrigM): The Message to be protected before any
protection-related processing has been applied on the sending side.
If the source is not a “message/rfc822” Message, OrigM is defined as
the “virtual” Message that would be constructed for sending it as
unprotected email.</t>
  <t>Inner Message (InnerM): The Message to be protected which has had
wrapping and protection measures aapplied on the sending side
OR the resulting Message once decryption and unwrapping on the receiving side
has been performed. Typically, the Inner Message is in clear text. The
Inner Message is a subset of (or the same as) the Original Message
(cf. <xref target="inner-msg-hf"/>). The Inner Message must be the same on the
sending and the receiving side.</t>
  <t>Outer Message (OuterM): The Message as provided to the Submission
Entity or received from the last hop respectively. The Outer Message
normally differs on the sending and the receiving side (e.g. new
Header Fields are added by intermediary nodes).</t>
  <t>Receiving User Facing Message (RUFM): The Message used for rendering
at the receiving side. Typically this is the same as the Inner
Message.</t>
  <t>Data Minimization: Data sparseness and hiding of all technically
concealable information whenever possible.</t>
  <t>Cryptographic Layer, Cryptographic Payload, and Cryptographic
Envelope are all used as defined in
<xref target="I-D.dkg-lamps-e2e-mail-guidance"/></t>
</list></t>

</section>
</section>
<section anchor="problem-statement" title="Problem Statement">

<t>The LAMPS charter contains the following Work Item:</t>

<t><list style='empty'>
  <t>Update the specification for the cryptographic protection of email
headers – both for signatures and encryption – to improve the
implementation situation with respect to privacy, security, usability
and interoperability in cryptographically-protected electronic mail.
Most current implementations of cryptographically-protected electronic
mail protect only the body of the message, which leaves significant
room for attacks against otherwise-protected messages.</t>
</list></t>

<t>In the following a set of challenges to be addressed:</t>

<t>[[ TODO: Enhance this section, add more items to the following. ]]</t>

<section anchor="privacy" title="Privacy">

<t><list style="symbols">
  <t>(Technical) Data Minimization, which includes data sparseness and
hiding all technically concealable information whenever possible</t>
</list></t>

</section>
<section anchor="security" title="Security">

<t><list style="symbols">
  <t>Prevent MITM attacks (cf. <xref target="RFC4949"/>)</t>
</list></t>

</section>
<section anchor="usability" title="Usability">

<t><list style="symbols">
  <t>Improved User interaction / User experience, in particular at the
receiving side</t>
</list></t>

</section>
<section anchor="interoperability" title="Interoperability">

<t><list style="symbols">
  <t>Interoperability with <xref target="RFC8551"/> implementations</t>
</list></t>

</section>
</section>
<section anchor="use-cases" title="Use Cases">

<t>In the following, the reader can find a list of the generic use cases
that need to be addressed for Messages with Header Protection
(HP). These use cases apply regardless of technology (S/MIME,
PGP/MIME, etc.) used to achieve HP.</t>

<section anchor="interactions" title="Interactions">

<t>The following use cases assume that at least the sending side supports
Header Protection as specified in this document. Receiving sides that
support this specification are expected to be able to distinguish
between Messages that use Header Protection as specified in this
document, and (legacy) Mail User Agents (MUAs) which do not implement
this specification.</t>

<t>[[ TODO: Verify once solution is stable and update last sentence. ]]</t>

<section anchor="uc-ia-main-use-case" title="Main Use Case">

<t>Both the sending and receiving side (fully) support Header Protection
as specified in this document.</t>

<t>The main use case is specified in <xref target="main-use-case"/>.</t>

</section>
<section anchor="uc-ia-backward-compatibility-use-cases" title="Backward Compatibility Use Cases">

<t>Regarding backward compatibility, the main distinction is based on
whether or not the receiving side conforms to MIME according to
<xref target="RFC2046"/>, ff., which in particular also includes Section 2 of
<xref target="RFC2049"/> on “MIME Conformance”. The following excerpt is
contextually relevant:</t>

<figure><artwork><![CDATA[
  A mail user agent that is MIME-conformant MUST:

  [...]

           -- Recognize and display at least the RFC822 message
           encapsulation (message/rfc822) in such a way as to
           preserve any recursive structure, that is, displaying
           or offering to display the encapsulated data in
           accordance with its media type.

           -- Treat any unrecognized subtypes as if they were
           "application/octet-stream".

  [...]

  An MUA that meets the above conditions is said to be MIME-
  conformant.  A MIME-conformant MUA is assumed to be "safe" to send
  virtually any kind of properly-marked data to users of such mail
  systems, because these systems are, at a minimum, capable of treating
  the data as undifferentiated binary, and will not simply
  splash it onto the screen of unsuspecting users.

]]></artwork></figure>

<t>[[ TODO: The compatibility of legacy HP systems with this new
           solution, and how to handle issues surrounding future
           maintenance for these legacy systems, will be decided by
           the LAMPS WG. ]]</t>

<section anchor="uc-ia-bc-receiving-side-mime-conformant" title="Receiving Side MIME-Conformant">

<t>The sending side (fully) supports Header Protection as specified in
this document, while the receiving side does not support this
specification. However, the receiving side is MIME-conformant
according to <xref target="RFC2045"/>,
ff. (cf. <xref target="uc-ia-backward-compatibility-use-cases"/>).</t>

<t>This use case is specified in <xref target="receiving-side-mime-conformant"/>.</t>

<t>Note: This case should perform as expected if the sending side applies
      this specification as outlined in <xref target="main-use-case"/>.</t>

<!-- KRB: How do we expect it to perform? Should the receiving side
display the message properly (as text), or will it default
to handling it like an attachment to be clicked? -->

<t>[[ TODO: Verify once solution is stable and update last sentence. ]]</t>

</section>
<section anchor="uc-ia-bc-receiving-side-not-mime-conformant" title="Receiving Side Not MIME-Conformant">

<t>The sending side (fully) supports Header Protection as specified in
this document, while the receiving side does not support this
specification. Furthermore, the receiving side is <spanx style="strong">not</spanx>
MIME-conformant according to <xref target="RFC2045"/>, ff.
(cf. <xref target="uc-ia-backward-compatibility-use-cases"/>).</t>

<t>This use case is specified in <xref target="receiving-side-not-mime-conformant"/>.</t>

</section>
</section>
</section>
<section anchor="protection-levels" title="Protection Levels">

<section anchor="pl-in-scope" title="In-Scope">

<t>The following Protection Levels are in scope for this document:</t>

<t>a)  Signature and encryption</t>

<figure><artwork><![CDATA[
Messages containing a cryptographic signature, which are also
encrypted.
]]></artwork></figure>

<t>b)  Signature only</t>

<figure><artwork><![CDATA[
Messages containing a cryptographic signature, but which are not
encrypted.
]]></artwork></figure>

<!--
    a cryptographic signature usually within a multipart/signed or
    application/pkcs7-mime Content-Type, which doesn't contain any
    encrypted layer.
-->

</section>
<section anchor="pl-out-of-scope" title="Out-of-Scope">

<t>Legacy implementations, implementations not (fully) compliant with this document
or corner-cases may lead to further Protection Levels to appear on the receiving
side, such as (list not exhaustive):</t>

<t><list style="symbols">
  <t>Triple wrap</t>
  <t>Encryption only</t>
  <t>Encryption before signature</t>
  <t>Signature and encryption, but:  <list style="symbols">
      <t>Signature fails to validate</t>
      <t>Signature validates but the signing certificate revoked</t>
    </list></t>
  <t>Signature only, but:  <list style="symbols">
      <t>with multiple valid signatures, layered atop each other</t>
    </list></t>
</list></t>

<t>These Protection Levels, as well as any further Protection Levels not
listed in <xref target="pl-in-scope"/> are beyond the scope of this document.</t>

</section>
</section>
</section>
<section anchor="specification" title="Specification">

<t>This section contains the specification for Header Protection in
S/MIME to update and clarify Section 3.1 of <xref target="RFC8551"/> (S/MIME 4.0).</t>

<t>Note: It is likely that PGP/MIME <xref target="RFC3156"/> will also incorporate
      this specification or parts of it.</t>

<t>This specification applies to the Protection Levels “signature &amp;
encryption” and “signature only” (cf. <xref target="protection-levels"/>):</t>

<t>Sending and receiving sides MUST implement the “signature and
encryption” Protection Level, which SHOULD be used as default on the
sending side.</t>

<t>Certain implementations may decide to send “signature only” Messages,
depending on the circumstances and customer requirements.  Sending
sides MAY and receiving sides MUST implement “signature only”
Protection Level.</t>

<t>It generally is NOT RECOMMENDED to send a Message with any other
Protection Level. On the other hand, the receiving side must be
prepared to receive Messages with other Protection Levels.</t>

<t>[[ TODO: Further study is necessary to determine whether - and if
           yes to what extent - additional guidance for handling
           messages with other Protection Levels, e.g. “encryption
           only” at the receiving side should be included in this
           document. ]]</t>

<section anchor="main-use-case" title="Main Use Case">

<t>This section applies to the main use case, where the sending and
receiving side (fully) support Header Protection as specified
herein (cf. <xref target="uc-ia-main-use-case"/>).</t>

<t>Note: The sending side specification of the main use case is also
      applicable to the cases where the sending side (fully) supports
      Header Protection as specified herein, while the receiving side
      does not, but is MIME-conformant according to <xref target="RFC2045"/>,
      ff. (cf. <xref target="uc-ia-backward-compatibility-use-cases"/> and
      <xref target="uc-ia-bc-receiving-side-mime-conformant"/>).</t>

<t>Further backward compatibility cases are defined in
<xref target="backward-compatibility-use-cases"/>.</t>

<section anchor="mime-format" title="MIME Format">

<section anchor="mime-format-introduction" title="Introduction">

<t>As per S/MIME version 3.1 and later (cf. <xref target="RFC8551"/>), the sending
client MAY wrap a full MIME message in a message/RFC822 wrapper in
order to apply S/MIME security services to these header fields.</t>

<t>To help the receiving side to distinguish between a forwarded and a
wrapped message, the Content-Type header field parameter “forwarded”
is added as defined in <xref target="I-D.melnikov-iana-reg-forwarded"/>.</t>

<t>The simplified (cryptographic overhead not shown) MIME structure of
such an Email Message looks as follows:</t>

<figure><artwork><![CDATA[
  <Outer Message Header Section (unprotected)>

  <Outer Message Body (protected)>

    <MIME Header Section (wrapper)>

      <Inner Message Header Section>

      <Inner Message Body>

]]></artwork></figure>

<t>The following example demonstrates how an Original Message might be
protected, i.e., the Original Message is contained as Inner Message in
the Protected Body of an Outer Message. It illustrates the first Body
part (of the Outer Message) as a “multipart/signed”
(application/pkcs7-signature) media type:</t>

<t>Lines are prepended as follows:</t>

<t><list style="symbols">
  <t>“O: “ Outer Message Header Section</t>
  <t>“I: “ Message Header Section</t>
  <t>“W: “ Wrapper (MIME Header Section)</t>
</list></t>

<figure><artwork><![CDATA[

  O: Date: Mon, 25 Sep 2017 17:31:42 +0100 (GMT Daylight Time)
  O: Message-ID: <e4a483cb-1dfb-481d-903b-298c92c21f5e@m.example.net>
  O: Subject: Meeting at my place
  O: From: "Alexey Melnikov" <alexey.melnikov@example.net>
  O: To: somebody@example.net
  O: MIME-Version: 1.0
  O: Content-Type: multipart/signed; charset=us-ascii; micalg=sha1;
  O:  protocol="application/pkcs7-signature";
  O:  boundary=boundary-AM

     This is a multipart message in MIME format.
     --boundary-AM
  W: Content-Type: message/RFC822; forwarded=no
  W:
  I: Date: Mon, 25 Sep 2017 17:31:42 +0100 (GMT Daylight Time)
  I: From: "Alexey Melnikov" <alexey.melnikov@example.net>
  I: Message-ID: <e4a483cb-1dfb-481d-903b-298c92c21f5e@m.example.net>
  I: MIME-Version: 1.0
  I: MMHS-Primary-Precedence: 3
  I: Subject: Meeting at my place
  I: To: somebody@example.net
  I: X-Mailer: Isode Harrier Web Server
  I: Content-Type: text/plain; charset=us-ascii

     This is an important message that I don't want to be modified.

     --boundary-AM
     Content-Transfer-Encoding: base64
     Content-Type: application/pkcs7-signature

     [[base-64 encoded signature]]

     --boundary-AM--

]]></artwork></figure>

<t>The Outer Message Header Section is unprotected, while the remainder
(Outer Message Body) is protected. The Outer Message Body consists of
the wrapper (MIME Header Section) and the Inner Message (Header
Section and Body).</t>

<t>The wrapper is a simple MIME Header Section with media type
“message/rfc822” containing a Content-Type header field parameter
“forwarded=no” followed by an empty line.</t>

<t>If the source is an Original (message/rfc822) Message, the Inner
Message Header Section is typically the same as (or a subset of) the
Original Message Header Section (cf. <xref target="inner-msg-hf"/>), and the Inner
Message Body is typically the same as the Original Message Body.</t>

<t>The Inner Message itself may contain any MIME structure.</t>

<!--
Alexey: I think this is just saying "The Original Message itself may contain any MIME structure"
but in a bad way, because "multipart/mixed" is not the only choice here:
There may also be an additional MIME layer with media type
"multipart/mixed" in the Outer Message Body to contain the Inner
Message (wrapped in a "message/rfc822") along with other MIME part(s).
-->

<t>Note: It is still to be decided by the LAMPS WG whether or not to
recommend an alternative MIME format as described in
<xref target="option-ex-memory-hole"/> (instead of the currently standardized and
above defined format).</t>

</section>
</section>
<section anchor="sending-side" title="Sending Side">

<t>To ease explanation, the following describes the case where an Original
(message/rfc822) Message to be protected is present. If this is not
the case, Original Message means the (virtual) Message that would be
constructed for sending it as unprotected email.</t>

<section anchor="inner-msg-hf" title="Inner Message Header Fields">

<t>It is RECOMMENDED that the Inner Message contains all Header Fields of
the Original Message with the exception of the following Header Field,
which MUST NOT be included within the Inner Message nor within any
other protected part of the Message:</t>

<t><list style="symbols">
  <t>Bcc</t>
</list></t>

<t>[[ TODO: Bcc handling needs to be further specified (see also
           <xref target="bcc-handling"/>). Certain MUAs cannot properly decrypt
           Messages with Bcc recipients. ]]</t>

</section>
<section anchor="wrapper" title="Wrapper">

<t>The wrapper is a simple MIME Header Section followed by an empty line
preceding the Inner Message (inside the Outer Message Body). The media
type of the wrapper MUST be “message/RFC822” and MUST contain the
Content-Type header field parameter “forwarded=no” as defined in
<xref target="I-D.melnikov-iana-reg-forwarded"/>. The wrapper unambiguously
delimits the Inner Message from the rest of the Message.</t>

</section>
<section anchor="cryptographic-layers-envelope" title="Cryptographic Layers / Envelope">

<t>[[ TODO: Basically refer to S/MIME standards ]]</t>

</section>
<section anchor="outer-msg-hf" title="Outer Message Header Fields">

<section anchor="encrypted-messages" title="Encrypted Messages">

<t>To maximize Privacy, it is strongly RECOMMENDED to follow the
principle of Data Minimization (cf. <xref target="privacy"/>).</t>

<t>However, the Outer Message Header Section SHOULD contain the Essential
Header Fields and, in addition, MUST contain the Header Fields of the
MIME Header Section part to describe Cryptographic Layer of the
protected MIME subtree as per <xref target="RFC8551"/>.</t>

<!-- KRB: Aren't these just the required header fields per rfc822/2822?
It may be less confusing to refer to them as such. -->

<t>The following Header Fields are defined as the Essential Header Fields:</t>

<t><list style="symbols">
  <t>From</t>
  <t>To (if present in the Original Message)</t>
  <t>Cc (if present in the Original Message)</t>
  <t>Bcc (if present in the Original Message, see also <xref target="inner-msg-hf"/>
and <xref target="bcc-handling"/>)</t>
  <t>Date</t>
  <t>Message-ID</t>
  <t>Subject</t>
</list></t>

<t>Further processing by the Submission Entity normally depends on part
of these Header Fields, e.g. From and Date HFs are required by
<xref target="RFC5322"/>. Furthermore, not including certain Header
Fields may trigger spam detection to flag the Message, and/or
lead to user experience (UX) issues.</t>

<t>For further Data Minimization, the value of the Subject Header Field
SHOULD be obfuscated as follows:</t>

<figure><artwork><![CDATA[
* Subject: [...]
]]></artwork></figure>

<t>and it is RECOMMENDED to replace the Message-ID by a new randomly
generated Message-ID.</t>

<t>In addition, the value of other Essential Header Fields MAY be
obfuscated.</t>

<t>Non-Essential Header Fields SHOULD be omitted from the Outer Message
Header Section where possible. If Non-essential Header Fields are included
in the Outer Message Header Section, those MAY be obfuscated too.</t>

<t>Header Fields that are not obfuscated should contain the same values
as in the Original Message.</t>

<t>If an implementation obfuscates the From, To, and/or Cc
Header Fields, it may need to provide access to the clear text content
of these Header Fields to the Submission Entity for processing purposes.
This is particularly relevant, if proprietary Submission Entities are
used. Obfuscation of Header Fields may adversely impact spam filtering.</t>

<t>(A use case for obfuscation of all Outer Message Header Fields is
routing email through the use of onion routing or mix networks,
e.g. <xref target="pEp.mixnet"/>.)</t>

<t>The MIME Header Section part is the collection of MIME Header Fields
describing the following MIME structure as defined in <xref target="RFC2045"/>.
A MIME Header Section part typically includes the following Header
Fields:</t>

<t><list style="symbols">
  <t>Content-Type</t>
  <t>Content-Transfer-Encoding</t>
  <t>Content-Disposition</t>
</list></t>

<!--
Alexey: I don't find separation between MIME Header Section and
full Header Section to be useful. They have exactly the same parsing
rules.
-->
<t>The following example shows the MIME Header Section part of an S/MIME signed
Message (using application/pkcs7-mime with SignedData):</t>

<figure><artwork><![CDATA[
   MIME-Version: 1.0
   Content-Type: application/pkcs7-mime; smime-type=signed-data;
      name=smime.p7m
   Content-Transfer-Encoding: base64
   Content-Disposition: attachment; filename=smime.p7m

]]></artwork></figure>

<t>Depending on the scenario, further Header Fields MAY be exposed in the
Outer Message Header Section, which is NOT RECOMMENDED unless
justified. Such Header Fields may include e.g.:</t>

<t><list style="symbols">
  <t>References</t>
  <t>Reply-To</t>
  <t>In-Reply-To</t>
</list></t>

<!--
Alexey: the above header fields would be need if IMAP server side threading is to be used.
-->
<!-- KRB: You may wish to give an example of why this exposure would be justified. -->

</section>
<section anchor="unencrypted-messages" title="Unencrypted Messages">

<t>The Outer Message Header Section of unencrypted Messages SHOULD
contain at least the Essential Header Fields and, in addition, MUST
contain the Header Fields of the MIME Header Section part to describe
Cryptographic Layer of the protected MIME subtree as per
<xref target="RFC8551"/>. It may contain further Header Fields, in particular those
also present in the Inner Message Header Section.</t>

<!--

### Header Field Flow

The Following figure depicts the different Message representations
(OrigM, InnerM, OuterM, RUFM) and which parts those are constructed
from:

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
OrigM        InnerM       Outer(S)            OuterM(R)    RUFM

                                              <Trace-HF>
                          From (OrigM)      = From
                          To (OrigM)        = To
                          Cc (OrigM)        = Cc
                          Bcc (OrigM)       = Bcc*
                          Date (OrigM)      = Date
                          Message-ID (OrigM)= Message-ID
                          Subject (new)     = Subject
                          <MIME-HSp> (new)  = <MIME-HSp>

                          PROTECTED:          PROTECTED:
                          <Wrapper> (new)   = <Wrapper>
From       > From       > From              = From       > From
To         > To         > To                = To         > To
Cc*        > Cc         > Cc                = Cc         > Cc
Bcc*
Date       > Date       > Date              = Date       > Date
Message-ID > Message-ID > Message-ID        = Message-ID > Message-ID
Subject    > Subject    > Subject           = Subject    > Subject
<More HF>  > <More HF>  > <More HF>         = <More HF>  > <More-HF>
<MIME-HSp> > <MIME-HSp> > <MIME-HSp>        = <MIME-HSp> > <MIME-HSp>
<Body>     > <Body>     > <Body>            = <Body>     > <Body>
                          <Signature>* (new)= <Signature>

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Legend:

* OuterM(S): Outer Message (OuterM) at sending side (before handing it
  over to the Submission Entity)

* OuterM(R): Outer Message at receiving side (as received by the last
  hop, before decryption and/or signature verification is applied to)

* InnerM: Inner Message (that protection is applied to)

* RUFM: Receiving User Facing Message

* More-HF: Additional Header Fields (HF) in the Original Message (OrigM)

* Wrapper: MIME Header Section; with media type (message/RFC822) to
  unambiguously delimit the inner Message from the rest of the
  Message.

* MIME-HSp: MIME Header Section part to describe the encryption or
  signature as per {{RFC8551}}

* Trace-HF: Header Fields added in Transit (between sending and
  receiving side) as per {{RFC5322}}

* \>: taken over / copied from last column

* \=: propagates unchanged, unless something unusual (e.g. attack)
  happens

* \*: HF that is often not present (also further HFs, e.g. To, may not
  be present). If a HF is not present, naturally it can neither be
  taken over nor propagated.

* (new) / (OrigM): HF or MIME-HSp is generated depending on the
  decision in {{sending-side-step-1}}, while '(new)' / '(OrigM)'
  designate the default.


-->

</section>
</section>
<section anchor="sending-side-message-processing" title="Sending Side Message Processing">

<t>For a protected Message the following steps are applied before a
Message is handed over to the Submission Entity:</t>

<section anchor="sending-side-step-1" title="Step 1: Decide on Protection Level and Information Disclosure">

<t>The implementation which applies protection to a Message must decide:</t>

<!--KRB: I'm confused. The message has not yet been handed to the Submission Entity, correct? Would it be better to use implementation/software/plugin here, then? Otherwise it's very easy for the reader to think the Submission Entity is performing all of these steps, and not the protection product. I've already adjusted the wording above, and where I see the confusion for the rest of the section. Feel free to revert/not accept the change if it's inaccurate. -->

<t><list style="symbols">
  <t>Which Protection Level (signature and/or encryption) shall be applied
to the Message? This depends on user request and/or local policy as
well as availability of cryptographic keys.</t>
  <t>Which Header Fields of the Original Message shall be part of the
Outer Message Header Section? This typically depends on local
policy. By default, the Essential Header Fields are part of the Outer
Message Header Section; cf. <xref target="outer-msg-hf"/>.</t>
  <t>Which of these Header Fields are to be obfuscated?  This depends on
local policy and/or specific Privacy requirements of the user. By
default only the Subject Header Field is
obfuscated; cf. <xref target="outer-msg-hf"/>.</t>
</list></t>

</section>
<section anchor="sending-side-step-2" title="Step 2: Compose the Outer Message Header Section">

<t>Depending on the decision in <xref target="sending-side-step-1"/>, the implementation
shall compose the Outer Message Header Section. (Note that this also
includes the necessary MIME Header Section part for the following
protection layer.)</t>

<t>Outer Header Fields that are not obfuscated should contain the same
values as in the Original Message (except for MIME Header Section
part, which depends on the Protection Level selected in
<xref target="sending-side-step-1"/>).</t>

</section>
<section anchor="sending-side-step-3" title="Step 3: Apply Protection to the Original Message">

<t>Depending on the Protection Level selected in <xref target="sending-side-step-1"/>,
the implementation applies signature and/or encryption to the Original
Message, including the wrapper (as per <xref target="RFC8551"/>), and sets the
resulting package as the Outer Message Body.</t>

<t>The resulting (Outer) Message is then typically handed over to the
Submission Entity.</t>

<t>[[ TODO: Example ]]</t>

</section>
</section>
</section>
<section anchor="receiving-side" title="Receiving Side">

<section anchor="rufm-hf" title="Receiving User Facing Message Header Fields">

<t>The Receiving User Facing Message SHOULD be a verbatim copy of the
Inner Message.</t>

<!-- Alternative
The Receiving User Facing Message is constructed as follows:

* The Header Section of the Receiving User Facing Message MUST consist
  of the Outer Message Header Fields that are not contained in the
  Inner Message Header Section, and the Inner Message Header Fields
  (i.e. the Inner Message Header Field MUST always take precedence).

* The Body of the Receiving User Facing Message Body MUST be the same
  as the Inner Message Body.

\[\[ TODO: Do we need to take special care for HFs, which may appear
           multiple times, e.g. Received HF?

Alexey: None of the header fields that we want protecting are allowed to
appear multiple times.
The header fields that can appear multiple times are usually trace header fields:
Received, Authentication-Results, etc. They are prepended to the outer
Header Section and can never be protected.

So I think this is just a long way of saying that no extra text is needed here,
unless you want the document to explain the above.

         \]\]
-->

</section>
<section anchor="receiving-side-message-processing" title="Receiving Side Message Processing">

<t>When a protected Message is received, the following steps are applied:</t>

<section anchor="receiving-side-step-1" title="Step 1: Decrypt Message and/or check signature">

<t>Depending on the Protection Level, the received Message is decrypted
and/or its signature is checked as per <xref target="RFC8551"/>.</t>

</section>
<section anchor="receiving-side-step-2" title="Step 2: Construct the Receiving User Facing Message">

<t>The Receiving User Facing Message is constructed according to
<xref target="rufm-hf"/>.</t>

<t>The resulting Message is handed over for further processing, which
typically involves rendering it for the user.</t>

</section>
</section>
<section anchor="step-3-prepare-information-cyptographic-verification" title="Step 3: Prepare Information Cyptographic Verification">

<t>[[ TODO: Signature valid, etc. ]]</t>

</section>
</section>
</section>
<section anchor="backward-compatibility-use-cases" title="Backward Compatibility Use Cases">

<section anchor="receiving-side-mime-conformant" title="Receiving Side MIME-Conformant">

<t>This section applies to the case where the sending side (fully)
supports Header Protection as specified in this document, while the
receiving side does not support this specification, but is
MIME-conformant according to <xref target="RFC2045"/>,
ff. (cf. <xref target="uc-ia-backward-compatibility-use-cases"/> and
<xref target="uc-ia-bc-receiving-side-mime-conformant"/>)</t>

<t>The sending side specification of the main use case
(cf. <xref target="main-use-case"/>) MUST ensure that receiving sides can still
recognize and display or offer to display the encapsulated data in
accordance with its media type (cf. <xref target="RFC2049"/>, Section 2). In
particular, receiving sides that do not support this specification,
but are MIME-conformant according to <xref target="RFC2045"/>, ff. can still
recognize and display the Message intended for the user.</t>

<t>[[ TODO: Verify once solution is stable and update last sentence. ]]</t>

</section>
<section anchor="receiving-side-not-mime-conformant" title="Receiving Side Not MIME-Conformant">

<t>This section applies to cases where the sending side (fully)
supports Header Protection as specified in this document, while the
receiving side neither supports this specification
<spanx style="strong">nor</spanx> is MIME-conformant according to <xref target="RFC2045"/>, ff.
(cf. <xref target="uc-ia-backward-compatibility-use-cases"/>  and
<xref target="uc-ia-bc-receiving-side-not-mime-conformant"/>).</t>

<t><xref target="I-D.autocrypt-lamps-protected-headers"/> describes a possible way to
achieve backward compatibility with existing S/MIME (and PGP/MIME)
implementations that predate this specification and are not
MIME-conformant (Legacy Display) either. It mainly focuses on email clients
that do not render emails which utilize header protection in a user friendly
manner, which may confuse the user. While this has been observed
occasionally in PGP/MIME (cf. <xref target="RFC3156"/>), the extent of this problem
with S/MIME implementations is still unclear. (Note: At this time,
none of the samples in <xref target="I-D.autocrypt-lamps-protected-headers"/> apply
header protection as specified in Section 3.1 of <xref target="RFC8551"/>, which is
wrapping as Media Type “message/RFC822”.)</t>

<t>Should serious backward compatibility issues with rendering at the
receiving side be discovered, the Legacy Display format described in
<xref target="I-D.autocrypt-lamps-protected-headers"/> may serve as a basis to
mitigate those issues (cf. <xref target="backward-compatibility-use-cases"/>).</t>

<t>Another variant of backward compatibility has been implemented by pEp
<xref target="I-D.pep-email"/>, i.e. pEp Email Format 1.0. At this time pEp
has implemented this for PGP/MIME, but not yet S/MIME.</t>

</section>
</section>
</section>
<section anchor="security-considerations" title="Security Considerations">

<t>[[ TODO ]]</t>

</section>
<section anchor="privacy-considerations" title="Privacy Considerations">

<t>[[ TODO ]]</t>

</section>
<section anchor="iana-considerations" title="IANA Considerations">

<t>This document requests no action from IANA.</t>

<t>[[ RFC Editor: This section may be removed before publication. ]]</t>

</section>
<section anchor="acknowledgments" title="Acknowledgments">

<t>The authors would like to thank the following people who have provided
helpful comments and suggestions for this document: Berna Alp, Claudio
Luck, David Wilson, Hernani Marques, juga, Krista
Bennett, Kelly Bristol, Lars Rohwedder, Robert Williams, Russ Housley,
Sofia Balicka, Steve Kille, Volker Birk, and Wei Chuang.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference  anchor="RFC2045" target='https://www.rfc-editor.org/info/rfc2045'>
<front>
<title>Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Message Bodies</title>
<author initials='N.' surname='Freed' fullname='N. Freed'><organization /></author>
<author initials='N.' surname='Borenstein' fullname='N. Borenstein'><organization /></author>
<date year='1996' month='November' />
<abstract><t>This initial document specifies the various headers used to describe the structure of MIME messages.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='2045'/>
<seriesInfo name='DOI' value='10.17487/RFC2045'/>
</reference>



<reference  anchor="RFC2046" target='https://www.rfc-editor.org/info/rfc2046'>
<front>
<title>Multipurpose Internet Mail Extensions (MIME) Part Two: Media Types</title>
<author initials='N.' surname='Freed' fullname='N. Freed'><organization /></author>
<author initials='N.' surname='Borenstein' fullname='N. Borenstein'><organization /></author>
<date year='1996' month='November' />
<abstract><t>This second document defines the general structure of the MIME media typing system and defines an initial set of media types.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='2046'/>
<seriesInfo name='DOI' value='10.17487/RFC2046'/>
</reference>



<reference  anchor="RFC2049" target='https://www.rfc-editor.org/info/rfc2049'>
<front>
<title>Multipurpose Internet Mail Extensions (MIME) Part Five: Conformance Criteria and Examples</title>
<author initials='N.' surname='Freed' fullname='N. Freed'><organization /></author>
<author initials='N.' surname='Borenstein' fullname='N. Borenstein'><organization /></author>
<date year='1996' month='November' />
<abstract><t>This set of documents, collectively called the Multipurpose Internet Mail Extensions, or MIME, redefines the format of messages.  This fifth and final document describes MIME conformance criteria as well as providing some illustrative examples of MIME message formats, acknowledgements, and the bibliography.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='2049'/>
<seriesInfo name='DOI' value='10.17487/RFC2049'/>
</reference>



<reference  anchor="RFC5322" target='https://www.rfc-editor.org/info/rfc5322'>
<front>
<title>Internet Message Format</title>
<author initials='P.' surname='Resnick' fullname='P. Resnick' role='editor'><organization /></author>
<date year='2008' month='October' />
<abstract><t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of &quot;electronic mail&quot; messages.  This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, &quot;Standard for the Format of ARPA Internet Text Messages&quot;, updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5322'/>
<seriesInfo name='DOI' value='10.17487/RFC5322'/>
</reference>



<reference  anchor="RFC8551" target='https://www.rfc-editor.org/info/rfc8551'>
<front>
<title>Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 4.0 Message Specification</title>
<author initials='J.' surname='Schaad' fullname='J. Schaad'><organization /></author>
<author initials='B.' surname='Ramsdell' fullname='B. Ramsdell'><organization /></author>
<author initials='S.' surname='Turner' fullname='S. Turner'><organization /></author>
<date year='2019' month='April' />
<abstract><t>This document defines Secure/Multipurpose Internet Mail Extensions (S/MIME) version 4.0.  S/MIME provides a consistent way to send and receive secure MIME data.  Digital signatures provide authentication, message integrity, and non-repudiation with proof of origin. Encryption provides data confidentiality.  Compression can be used to reduce data size.  This document obsoletes RFC 5751.</t></abstract>
</front>
<seriesInfo name='RFC' value='8551'/>
<seriesInfo name='DOI' value='10.17487/RFC8551'/>
</reference>



<reference anchor="I-D.ietf-lamps-header-protection-requirements">
<front>
<title>Problem Statement and Requirements for Header Protection</title>

<author initials='A' surname='Melnikov' fullname='Alexey Melnikov'>
    <organization />
</author>

<author initials='B' surname='Hoeneisen' fullname='Bernie Hoeneisen'>
    <organization />
</author>

<date month='October' day='29' year='2019' />

<abstract><t>Privacy and security issues with email header protection in S/MIME have been identified for some time.  However, the desire to fix these issues has only recently been expressed in the IETF LAMPS Working Group.  The existing S/MIME specification is likely to be updated regarding header protection.  This document describes the problem statement, generic use cases, and requirements of header protection.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-lamps-header-protection-requirements-01' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-lamps-header-protection-requirements-01.txt' />
</reference>



<reference anchor="I-D.dkg-lamps-e2e-mail-guidance">
<front>
<title>Guidance on End-to-End E-mail Security</title>

<author initials='D' surname='Gillmor' fullname='Daniel Gillmor'>
    <organization />
</author>

<date month='October' day='31' year='2020' />

<abstract><t>End-to-end cryptographic protections for e-mail messages can provide useful security.  However, the standards for providing cryptographic protection are extremely flexible.  That flexibility can trap users and cause surprising failures.  This document offers guidance for mail user agent implementers that need to compose or interpret e-mail messages with end-to-end cryptographic protection.  It provides a useful set of vocabulary as well as suggestions to avoid common failures.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-dkg-lamps-e2e-mail-guidance-00' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-dkg-lamps-e2e-mail-guidance-00.txt' />
</reference>



<reference  anchor="RFC2119" target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></author>
<date year='1997' month='March' />
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>




    </references>

    <references title='Informative References'>





<reference  anchor="RFC3156" target='https://www.rfc-editor.org/info/rfc3156'>
<front>
<title>MIME Security with OpenPGP</title>
<author initials='M.' surname='Elkins' fullname='M. Elkins'><organization /></author>
<author initials='D.' surname='Del Torto' fullname='D. Del Torto'><organization /></author>
<author initials='R.' surname='Levien' fullname='R. Levien'><organization /></author>
<author initials='T.' surname='Roessler' fullname='T. Roessler'><organization /></author>
<date year='2001' month='August' />
<abstract><t>This document describes how the OpenPGP Message Format can be used to provide privacy and authentication using the Multipurpose Internet Mail Extensions (MIME) security content types described in RFC 1847. [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3156'/>
<seriesInfo name='DOI' value='10.17487/RFC3156'/>
</reference>



<reference  anchor="RFC4949" target='https://www.rfc-editor.org/info/rfc4949'>
<front>
<title>Internet Security Glossary, Version 2</title>
<author initials='R.' surname='Shirey' fullname='R. Shirey'><organization /></author>
<date year='2007' month='August' />
<abstract><t>This Glossary provides definitions, abbreviations, and explanations of terminology for information system security. The 334 pages of entries offer recommendations to improve the comprehensibility of written material that is generated in the Internet Standards Process (RFC 2026). The recommendations follow the principles that such writing should (a) use the same term or definition whenever the same concept is mentioned; (b) use terms in their plainest, dictionary sense; (c) use terms that are already well-established in open publications; and (d) avoid terms that either favor a particular vendor or favor a particular technology or mechanism over other, competing techniques that already exist or could be developed.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='FYI' value='36'/>
<seriesInfo name='RFC' value='4949'/>
<seriesInfo name='DOI' value='10.17487/RFC4949'/>
</reference>



<reference  anchor="RFC6376" target='https://www.rfc-editor.org/info/rfc6376'>
<front>
<title>DomainKeys Identified Mail (DKIM) Signatures</title>
<author initials='D.' surname='Crocker' fullname='D. Crocker' role='editor'><organization /></author>
<author initials='T.' surname='Hansen' fullname='T. Hansen' role='editor'><organization /></author>
<author initials='M.' surname='Kucherawy' fullname='M. Kucherawy' role='editor'><organization /></author>
<date year='2011' month='September' />
<abstract><t>DomainKeys Identified Mail (DKIM) permits a person, role, or organization that owns the signing domain to claim some responsibility for a message by associating the domain with the message.  This can be an author's organization, an operational relay, or one of their agents.  DKIM separates the question of the identity of the Signer of the message from the purported author of the message.  Assertion of responsibility is validated through a cryptographic signature and by querying the Signer's domain directly to retrieve the appropriate public key.  Message transit from author to recipient is through relays that typically make no substantive change to the message content and thus preserve the DKIM signature.</t><t>This memo obsoletes RFC 4871 and RFC 5672.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='76'/>
<seriesInfo name='RFC' value='6376'/>
<seriesInfo name='DOI' value='10.17487/RFC6376'/>
</reference>



<reference  anchor="RFC6409" target='https://www.rfc-editor.org/info/rfc6409'>
<front>
<title>Message Submission for Mail</title>
<author initials='R.' surname='Gellens' fullname='R. Gellens'><organization /></author>
<author initials='J.' surname='Klensin' fullname='J. Klensin'><organization /></author>
<date year='2011' month='November' />
<abstract><t>This memo splits message submission from message relay, allowing each service to operate according to its own rules (for security, policy, etc.), and specifies what actions are to be taken by a submission server.</t><t>Message relay is unaffected, and continues to use SMTP over port 25.</t><t>When conforming to this document, message submission uses the protocol specified here, normally over port 587.</t><t>This separation of function offers a number of benefits, including the ability to apply specific security or policy requirements.   [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='72'/>
<seriesInfo name='RFC' value='6409'/>
<seriesInfo name='DOI' value='10.17487/RFC6409'/>
</reference>



<reference  anchor="RFC7489" target='https://www.rfc-editor.org/info/rfc7489'>
<front>
<title>Domain-based Message Authentication, Reporting, and Conformance (DMARC)</title>
<author initials='M.' surname='Kucherawy' fullname='M. Kucherawy' role='editor'><organization /></author>
<author initials='E.' surname='Zwicky' fullname='E. Zwicky' role='editor'><organization /></author>
<date year='2015' month='March' />
<abstract><t>Domain-based Message Authentication, Reporting, and Conformance (DMARC) is a scalable mechanism by which a mail-originating organization can express domain-level policies and preferences for message validation, disposition, and reporting, that a mail-receiving organization can use to improve mail handling.</t><t>Originators of Internet Mail need to be able to associate reliable and authenticated domain identifiers with messages, communicate policies about messages that use those identifiers, and report about mail using those identifiers.  These abilities have several benefits: Receivers can provide feedback to Domain Owners about the use of their domains; this feedback can provide valuable insight about the management of internal operations and the presence of external domain name abuse.</t><t>DMARC does not produce or encourage elevated delivery privilege of authenticated email.  DMARC is a mechanism for policy distribution that enables increasingly strict handling of messages that fail authentication checks, ranging from no action, through altered delivery, up to message rejection.</t></abstract>
</front>
<seriesInfo name='RFC' value='7489'/>
<seriesInfo name='DOI' value='10.17487/RFC7489'/>
</reference>



<reference anchor="I-D.melnikov-iana-reg-forwarded">
<front>
<title>IANA Registration of Content-Type Header Field Parameter 'forwarded'</title>

<author initials='A' surname='Melnikov' fullname='Alexey Melnikov'>
    <organization />
</author>

<author initials='B' surname='Hoeneisen' fullname='Bernie Hoeneisen'>
    <organization />
</author>

<date month='November' day='4' year='2019' />

<abstract><t>This document defines a new Content-Type header field parameter named "forwarded" for "message/rfc822" and "message/global" media types, and its registration with IANA.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-melnikov-iana-reg-forwarded-00' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-melnikov-iana-reg-forwarded-00.txt' />
</reference>



<reference anchor="I-D.autocrypt-lamps-protected-headers">
<front>
<title>Protected Headers for Cryptographic E-mail</title>

<author initials='B' surname='Einarsson' fullname='Bjarni Einarsson'>
    <organization />
</author>

<author initials='j' surname='juga' fullname='juga'>
    <organization />
</author>

<author initials='D' surname='Gillmor' fullname='Daniel Gillmor'>
    <organization />
</author>

<date month='December' day='20' year='2019' />

<abstract><t>This document describes a common strategy to extend the end-to-end cryptographic protections provided by PGP/MIME, etc. to protect message headers in addition to message bodies.  In addition to protecting the authenticity and integrity of headers via signatures, it also describes how to preserve the confidentiality of the Subject header.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-autocrypt-lamps-protected-headers-02' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-autocrypt-lamps-protected-headers-02.txt' />
<format type='PDF'
        target='http://www.ietf.org/internet-drafts/draft-autocrypt-lamps-protected-headers-02.pdf' />
</reference>



<reference anchor="I-D.pep-email">
<front>
<title>pretty Easy privacy (pEp): Email Formats and Protocols</title>

<author initials='H' surname='Marques' fullname='Hernani Marques'>
    <organization />
</author>

<date month='July' day='10' year='2020' />

<abstract><t>The proposed pretty Easy privacy (pEp) protocols for email are based upon already existing email and encryption formats (as PGP/MIME) and designed to allow for easily implementable and interoperable opportunistic encryption.  The protocols range from key distribution, secret key synchronization between own devices, to mechanisms of metadata and content protection.  The metadata and content protection is achieved by moving the whole message (not only the body part) into the PGP/MIME encrypted part.  The proposed pEp Email Formats not only achieve simple forms of metadata protection (like subject encryption), but also allow for sending email messages through a mixnet.  Such enhanced forms of metadata protection are explicitly discussed within the scope of this document.  The purpose of pEp for email is to simplify and automate operations in order to make usage of email encryption a viability for a wider range of Internet users, with the goal of achieving widespread implementation of data confidentiality and privacy practices in the real world.  The proposed operations and formats are targeted towards to Opportunistic Security scenarios and are already implemented in several applications of pretty Easy privacy (pEp).</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-pep-email-00' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-pep-email-00.txt' />
</reference>


<reference anchor="pEp.mixnet" target="https://dev.pep.foundation/Mixnet">
  <front>
    <title>Mixnet</title>
    <author >
      <organization>pEp Foundation</organization>
    </author>
    <date year="2020" month="June"/>
  </front>
</reference>


    </references>


<!-- =========================================================================== -->

<section anchor="additional-information" title="Additional information">

<section anchor="bcc-handling" title="Stored Variants of Messages with Bcc">

<t>Messages containing at least one recipient address in the Bcc
header field may appear in up to three different variants:</t>

<t><list style="numbers">
  <t>The Message for the recipient addresses listed in To or Cc
header fields, which must not include the Bcc header field neither
for signature calculation nor for encryption.</t>
  <t>The Message(s) sent to the recipient addresses in the Bcc header
field, which depends on the implementation:  <vspace blankLines='1'/>
a) One Message for each recipient in the Bcc header field
   separately, with a Bcc header field containing only the address
   of the recipient it is sent to.  <vspace blankLines='1'/>
b) The same Message for each recipient in the Bcc header field with
   a Bcc header field containing an indication such as “Undisclosed
   recipients”, but no addresses.  <vspace blankLines='1'/>
c) The same Message for each recipient in the Bcc header field
   which does not include a Bcc header field (this Message is
   identical to 1. / cf. above).</t>
  <t>The Message stored in the ‘Sent’-Folder of the sender, which
usually contains the Bcc unchanged from the original Message,
i.e., with all recipient addresses.</t>
</list></t>

<t>The most privacy preserving method of the alternatives (2a, 2b, and
2c) is to standardize 2a, as in the other cases (2b and 2c),
information about hidden recipients is revealed via keys. In any case,
the Message has to be cloned and adjusted depending on the recipient.</t>

</section>
</section>
<section anchor="text-moved-from-above" title="Text Moved from Above">

<t>Note: Per an explicit request by the chair of the LAMPS WG to
only present one option for the specification, the following text has
been stripped from the main body of the draft. It is preserved in an
Appendix for the time being and may be moved back to the main body
or deleted, depending on the decision of the LAMPS WG.</t>

<section anchor="void1" title="MIME Format">

<t>Currently there are two options in discussion:</t>

<t><list style="numbers">
  <t>The option according to the current S/MIME specification
(cf. <xref target="RFC8551"/>)</t>
  <t>An alternative option that is based on the former “memory hole”
approach (cf. <xref target="I-D.autocrypt-lamps-protected-headers"/>)</t>
</list></t>

<section anchor="option-smime-spec" title="S/MIME Specification">

<t>Note: This is currently described in the main part of this document.</t>

<section anchor="option-ex-memory-hole" title="Alternative Option Autocrypt “Protected Headers” (Ex-“Memory Hole”)">

<t>An alternative option (based on the former autocrypt “Memory Hole” approach)
to be considered, is described in
<xref target="I-D.autocrypt-lamps-protected-headers"/>.</t>

<t>Unlike the option described in <xref target="option-smime-spec"/>, this option does
not use a “message/RFC822” wrapper to unambiguously delimit the Inner
Message.</t>

<t>Before choosing this option, the following two issues must be assessed
to ensure no interoperability issues result from it:</t>

<t><list style="numbers">
  <t>How current MIME parser implementations treat non-MIME Header
Fields, which are not part of the outermost MIME entity and not
part of a Message wrapped into a MIME entity of media type
“message/rfc822”, and how such Messages are rendered to the user.  <vspace blankLines='1'/>
<xref target="I-D.autocrypt-lamps-protected-headers"/> provides some examples
for testing this.</t>
  <t>MIME-conformance, i.e. whether or not this option is (fully)
MIME-conformant <xref target="RFC2045"/> ff., in particular also Section 5.1. of
<xref target="RFC2046"/> on “Multipart Media Type). In the following an excerpt
of paragraphs that may be relevant in this context:</t>
</list></t>

<figure><artwork><![CDATA[
      The only header fields that have defined meaning for body parts
      are those the names of which begin with "Content-".  All other
      header fields may be ignored in body parts.  Although they
      should generally be retained if at all possible, they may be
      discarded by gateways if necessary.  Such other fields are
      permitted to appear in body parts but must not be depended on.
      "X-" fields may be created for experimental or private
      purposes, with the recognition that the information they
      contain may be lost at some gateways.
]]></artwork></figure>
<figure><artwork><![CDATA[
      NOTE:  The distinction between an RFC 822 Message and a body
      part is subtle, but important.  A gateway between Internet and
      X.400 mail, for example, must be able to tell the difference
      between a body part that contains an image and a body part
      that contains an encapsulated Message, the body of which is a
      JPEG image.  In order to represent the latter, the body part
      must have "Content-Type: message/rfc822", and its body (after
      the blank line) must be the encapsulated Message, with its own
      "Content-Type: image/jpeg" header field.  The use of similar
      syntax facilitates the conversion of Messages to body parts,
      and vice versa, but the distinction between the two must be
      understood by implementors.  (For the special case in which
      parts actually are Messages, a "digest" subtype is also
      defined.)
]]></artwork></figure>

<t>The MIME structure of an Email Message looks as follows:</t>

<figure><artwork><![CDATA[
  <Outer Message Header Section (unprotected)>

  <Outer Message Body (protected)>

    <Inner Message Header Section>

    <Inner Message Body>

]]></artwork></figure>

<t>The following example demonstrates how an Original Message might be
protected, i.e., the Original Message is contained as Inner Message in
the Protected Body of an Outer Message. It illustrates the first Body
part (of the Outer Message) as a “multipart/signed”
(application/pkcs7-signature) media type:</t>

<t>Lines are prepended as follows:</t>

<t><list style="symbols">
  <t>“O: “ Outer Message Header Section</t>
  <t>“I: “ Message Header Section</t>
</list></t>

<figure><artwork><![CDATA[
  O: Date: Mon, 25 Sep 2017 17:31:42 +0100 (GMT Daylight Time)
  O: Message-ID: <e4a483cb-1dfb-481d-903b-298c92c21f5e@m.example.net>
  O: Subject: Meeting at my place
  O: From: "Alexey Melnikov" <alexey.melnikov@example.net>
  O: MIME-Version: 1.0
  O: Content-Type: multipart/signed; charset=us-ascii; micalg=sha1;
  O:  protocol="application/pkcs7-signature";
  O:  boundary=boundary-AM

     This is a multipart message in MIME format.
     --boundary-AM
  I: Date: Mon, 25 Sep 2017 17:31:42 +0100 (GMT Daylight Time)
  I: From: "Alexey Melnikov" <alexey.melnikov@example.net>
  I: Message-ID: <e4a483cb-1dfb-481d-903b-298c92c21f5e@m.example.net>
  I: MIME-Version: 1.0
  I: MMHS-Primary-Precedence: 3
  I: Subject: Meeting at my place
  I: To: somebody@example.net
  I: X-Mailer: Isode Harrier Web Server
  I: Content-Type: text/plain; charset=us-ascii

     This is an important message that I don't want to be modified.

     --boundary-AM
     Content-Transfer-Encoding: base64
     Content-Type: application/pkcs7-signature

     [[base-64 encoded signature]]

     --boundary-AM--

]]></artwork></figure>

<t>The Outer Message Header Section is unprotected, while the remainder
(Outer Message Body) is protected. The Outer Message Body consists of
the Inner Message (Header Section and Body).</t>

<t>The Inner Message Header Section is the same as (or a subset of) the
Original Message Header Section (cf. <xref target="inner-msg-hf"/>).</t>

<t>The Inner Message Body is the same as the Original Message Body.</t>

<t>The Original Message itself may contain any MIME structure.</t>

<!--
Alexey: as above: I don't think this helps.
Either add an example with a more complicated MIME structure,
or delete this text.
There may also be an additional MIME layer with media type
"multipart/mixed" in the Outer Message Body to contain the Inner
Message along with other MIME part(s).
-->

<!-- =========================================================================== -->

</section>
</section>
</section>
</section>
<section anchor="document-changelog" title="Document Changelog">

<t>[[ RFC Editor: This section is to be removed before publication ]]</t>

<t><list style="symbols">
  <t>draft-ietf-lamps-header-protection-01  <list style="symbols">
      <t>Add DKG as co-author</t>
      <t>Partial Rewrite of Abstract and Introduction [HB/AM/DKG]</t>
      <t>Adding definiations for Cryptographic Layer, Cryptographic
Payload, and Cryptographic Envelope (reference to
<xref target="I-D.dkg-lamps-e2e-mail-guidance"/>) [DKG]</t>
      <t>Enhanced MITM Definition to include Machine- /
Meddler-in-the-middle [HB]</t>
      <t>Relaxed definition of Original message, which may not be of type
“message/rfc822” [HB]</t>
      <t>Move “memory hole” option to the Appendix (on request by Chair to
only maintain one option in the specification) [HB]</t>
      <t>Updated Scope of Protection Levels according to WG discussion
during IETF-108 [HB]</t>
      <t>Obfuscation recommendation only for Subject and Message-Id and
distinguish between Encrypted and Unencrypted Messages [HB]</t>
      <t>Removed (commented out) Header Field Flow Figure (it appeared to
be confusing as is was) [HB]</t>
    </list></t>
  <t>draft-ietf-lamps-header-protection-00  <list style="symbols">
      <t>Initial version (text partially taken over from
<xref target="I-D.ietf-lamps-header-protection-requirements"/></t>
    </list></t>
</list></t>

</section>
<section anchor="open-issues" title="Open Issues">

<t>[[ RFC Editor: This section should be empty and is to be removed
     before publication. ]]</t>

<t><list style="symbols">
  <t>Ensure “protected header” (Ex-Memory-Hole) option is (fully)
compliant with the MIME standard, in particular also <xref target="RFC2046"/>,
Section 5.1. (Multipart Media Type) <xref target="option-ex-memory-hole"/>.</t>
  <t>More examples (e.g. in <xref target="sending-side-message-processing"/>)</t>
  <t>Should Outer Message Header Section (as received) be preserved for
the user? (<xref target="receiving-side-step-2"/>)</t>
  <t>Decide on whether or not merge requirements from
<xref target="I-D.ietf-lamps-header-protection-requirements"/> into this
document.</t>
  <t>Decide what parts of <xref target="I-D.autocrypt-lamps-protected-headers"/> to
merge into this document.</t>
  <t>Enhance Introduction <xref target="introduction"/> and Problem Statement
(<xref target="problem-statement"/>).</t>
  <t>Decide on whether or not specification for more legacy HP
requirements should be added to this document
(<xref target="uc-ia-backward-compatibility-use-cases"/>).</t>
  <t>Verify simple backward compatibility case (Receiving Side
MIME-Conformant) is working; once solution is stable and update
paragraphs in <xref target="main-use-case"/>,
<xref target="uc-ia-bc-receiving-side-mime-conformant"/> and
<xref target="receiving-side-mime-conformant"/> accordingly.</t>
  <t>Verify ability to distinguish between Messages with Header
Protection as specified in this document and legacy clients and
update <xref target="interactions"/> accordingly.</t>
  <t>Improve definitions of Protection Levels and enhance list of
Protection Levels (<xref target="protection-levels"/>, <xref target="specification"/>).</t>
  <t>Privacy Considerations <xref target="privacy-considerations"/></t>
  <t>Security Considerations <xref target="security-considerations"/></t>
</list></t>

<!--
LocalWords:  utf docname toc sortrefs symrefs Oberer Graben uri Ucom
LocalWords:  Winterthur Hoeneisen GmbH Zuerich bernhard hoeneisen rfc
LocalWords:  ucom ietf melnikov birk trustwords keysync Volker ann cb
LocalWords:  ISOC bnet OpenPGP pgp msg asc pEpkey MUAs UI req SMTP WG
LocalWords:  UX Programme Changelog IMAP DKIM DMARC DomainKeys HB HFs
LocalWords:  implementer's pkcs SignedData cryptographically LF iana
LocalWords:  prio charset Bcc LSS LSR wrt DKG prepending TBD fc KRB
LocalWords:  recurse TLS EFAIL cleartext plaintext mixnet MMHS CRLF
LocalWords:  anonymization Alexey Isode ascii prepended micalg EHF uc
LocalWords:  sha cbe Chuang Kille cryptographic interoperability RUFM
LocalWords:  roadmap autocrypt OrigM InnerM OuterM MSA MTA ia bc bcc
LocalWords:  subtypes smime rufm HSp Berna Balicka
 -->

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

