<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version  (Ruby 3.1.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-dkg-mail-cleartext-copy-01" category="std" consensus="true" submissionType="IETF">
  <front>
    <title>Encrypted E-mail with Cleartext Copies</title>

    <author initials="D. K." surname="Gillmor" fullname="Daniel Kahn Gillmor">
      <organization></organization>
      <address>
        <email>dkg@fifthhorseman.net</email>
      </address>
    </author>

    <date year="2023" month="February" day="21"/>

    <area>sec</area>
    <workgroup>Network Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>When an e-mail program generates an encrypted message to multiple recipients, it is possible that it has no encryption capability for at least one of the recipients.</t>

<t>In this circumstance, an e-mail program may choose to send the message in cleartext to the recipient it cannot encrypt to.</t>

<t>This draft currently offers several possible approaches when such a choice is made by the sender, so that the recipient can reason about and act on the cryptographic status of the message responsibly.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        The latest revision of this draft can be found at <eref target="https://dkg.gitlab.io/cleartext-copy/"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-dkg-mail-cleartext-copy/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Secdispatch Working Group mailing list (<eref target="mailto:secdispatch@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/secdispatch/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/secdispatch/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://gitlab.com/dkg/cleartext-copy"/>.</t>
    </note>


  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>This document is concerned with end-to-end encrypted e-mail messages, regardless of the type of encryption used.
Both S/MIME (<xref target="RFC8551"/> and PGP/MIME (<xref target="RFC3156"/>) standards support the creation and consumption of end-to-end encrypted e-mail messages.</t>

<t>The goal of this document is to enable a receiving MUA to have solid, reliable behavior and security indicators based on the status of any particular received message, in particular when the sender of the message may have emitted a cleartext copy.</t>

<t>The document currently does not pick a single mechanism, as it is more of a survey/problem statement.</t>

<t>The final document should select at most a single mechanism with a clear default behavior.</t>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<section anchor="terminology"><name>Terminology</name>

<t>In this draft:</t>

<t><list style="symbols">
  <t>MUA is short for Mail User Agent; an e-mail client.</t>
</list></t>

</section>
</section>
<section anchor="scenarios"><name>Scenarios</name>

<t>The following scenarios are examples where an encrypted message might be produced but some copies of the message are sent or stored in the clear.
In all scenarios, Alice is composing a new message to Bob and at least one other copy is generated.
Alice has a cryptographic key for Bob, and knows that Bob is capable of decrypting e-mail messages.</t>

<t>In each of the following scenarios, Alice's MUA generates an e-mail, and knows that there is at least one cleartext copy of the message stored on a system not under Alice's personal control.</t>

<section anchor="simple-three-party"><name>Simple Three-Party E-mail</name>

<t>Alice sends a message to Bob and Carol, but Alice has no encryption-capable key for Carol.
She encrypts the copy to Bob, but sends a cleartext copy to Carol.</t>

</section>
<section anchor="drafts"><name>Cleartext Remote Drafts Folder</name>

<t>Alice's MUA stores all draft copies of any message she writes in the clear in a Drafts folder, and that folder is itself stored on an IMAP server.
When she composes a message, the IMAP server has a cleartext copy of the draft, up until and including when she clicks "Send".
Her MUA instructs the IMAP server to delete the draft version of the message, but it also knows that it had at one point a cleartext copy, and cleartext might persist forever.</t>

</section>
<section anchor="sent"><name>Cleartext Remote Sent Folder</name>

<t>Unlike in <xref target="drafts"/>, copies of messages sent to Alice's draft folder are encrypted or only stored locally.
But when sending an e-mail message to Bob, her MUA generates a cleartext copy an places it in her Sent folder, which is also stored on IMAP.</t>

</section>
<section anchor="mailing-list"><name>Public Mailing List</name>

<t>Alice "Replies All" to message from Bob on a public mailing list.
The public mailing list has on encryption-capable public key (it is archived publicly in the clear), so Alice cannot encrypt to it.
But Alice's MUA is configured to opportunistically encrypt every copy possible, so the copy to Bob is encrypted.</t>

</section>
<section anchor="trusted-mailserver"><name>Trusted Mailserver</name>

<t>Alice and Bob work in different organizations, and Alice's MUA has a policy of encrypting to outside peers that does not apply to members of her own organization.
Alice's co-worker David is in Cc on the message, and Alice and David both share a trusted mail server, so Alice does not feel the need to encrypt to Carol.
But she wants to defend against the possibility that Bob's mail server could read the contents of her message.</t>

</section>
</section>
<section anchor="problems"><name>Problems</name>

<t>Receiving MUA often needs to behave differently when handling a message with a different cryptographic status.</t>

<section anchor="reply-all"><name>Reply All</name>

<t>The most visible responsibility of an MUA that receives an encrypted message is to avoid leaking the contents of the message in the clear during a reply (see <xref target="I-D.ietf-lamps-e2e-mail-guidance"/>).</t>

<t>In scenarios where a recipient of the message cannot receive encrypted mail (e.g. the public mailing list example in <xref target="mailing-list"/>), a "Reply all" message is unlikely to be an act of effective communication.
In the example from that section, if Bob receives an encrypted copy of Alice's message, and he also chooses to "Reply All" to it, his MUA will either:</t>

<t><list style="symbols">
  <t>generate a cleartext copy to the mailing list, thereby leaking the contents of what appears to be an encrypted message, or</t>
  <t>send the mailing list a message encrypted only to Alice, which the rest of the mailing list cannot read.</t>
</list></t>

<t>Neither outcome is satisfactory.</t>

</section>
<section anchor="user-models"><name>User Models</name>

<t>User experience of end-to-end encrypted e-mail is notoriously poor.
A system that just silently encrypts as aggressively as possible might well produce more messages that are unreadable to any intervening transport agents.
And, done right, it might even avoid creating messages that are unreadable by the intended recipient.</t>

<t>However, such an opportunistic model is not the end goal of a system of end-to-end encryption.
An end-to-end encrypted system typically involves a some sort of user expectation (see <xref section="4" sectionFormat="of" target="I-D.knodel-e2ee-definition"/>).
In a legacy system like e-mail, where many messages will not be end-to-end encrypted, satisfying the user expectation requires that the user have a clear understanding of what specifically is end-to-end encrypted.</t>

<t>When a user receives an encrypted message that is also posted in the clear to a publicly-visible archive (as in <xref target="mailing-list"/>), that violates most user expectations of end-to-end encryption.</t>

</section>
</section>
<section anchor="solutions"><name>Solutions</name>

<t>This document has not yet reached consensus on what the right solution is.
Two major classes of possible solution are:</t>

<t><list style="symbols">
  <t>A message that was generated with a cleartext copy can explicitly indicate that such a cleartext copy exists, which allows the recipient to reason about it differently than a normal end-to-end encrypted message.</t>
  <t>Forbid MUAs from generating a cleartext copy.</t>
</list></t>

<section anchor="explicit-indicator"><name>Explicit Indicator of Cleartext Copy</name>

<t>It seems plausible that a MUA generating an end-to-end encrypted e-mail message with a cleartext copy could indicate to its recipients that a cleartext copy was also generated.</t>

<t>Each recipient could then reason about it differently, as compared to an end-to-end-encrypted e-mail message without a cleartext copy.</t>

<t>For example, a recipient doing "reply all" to such an encrypted message could take a different strategy and permit re-sending cleartext copies.
For more discussion about how to use such an indicator, see <xref target="handling-explicit-indicator"/>.</t>

<t>The proposals here use e-mail headers, so see also <xref target="protected-headers"/> for security considerations.</t>

<section anchor="cleartext-copy"><name>Cleartext-Copy Header Field</name>

<t>This document could specify a new e-mail header field with the name <spanx style="verb">Cleartext-Copy</spanx>.
The only defined values of this field are <spanx style="verb">0</spanx> and <spanx style="verb">1</spanx>.</t>

<t>A MUA that creates an encrypted message with a cleartext copy <bcp14>MUST</bcp14> add this header field with a value of <spanx style="verb">1</spanx> to each encrypted copy of the message.</t>

<t>By default, any end-to-end encrypted message that does not have this header field is presumed to have the field with a value of <spanx style="verb">0</spanx> -- meaning that no cleartext copies made by the sending MUA.</t>

<t>FIXME: what if the default was <spanx style="verb">1</spanx> instead of defaulting to <spanx style="verb">0</spanx>?</t>

</section>
<section anchor="cleartext-copy-to"><name>Cleartext-Copy-To Header Field</name>

<t>This document could specify a new e-mail header field with the name <spanx style="verb">Cleartext-Copy-To</spanx>.</t>

<t>This header field's value is defined to be an <spanx style="verb">address-list</spanx>, as specified in <xref target="RFC5322"/>.</t>

<t>A MUA that creates an encrypted message with a cleartext copy to any recipient <bcp14>MUST</bcp14> add this header field to each encrypted copy of the message.
The contents of the field are the list of e-mail addresses that were sent cleartext copies of the message.</t>

<t>By default, any end-to-end encrypted message that does not have this header field, or that has it with empty contents, is presumed to have no cleartext copies made by the sending MUA.</t>

<t>FIXME: it is unclear how a MUA that uses a cleartext remote Drafts (see <xref target="drafts"/>) or Sent (see <xref target="sent"/>) folder should populate this field to indicate to the recipient that a cleartext copy was sent to the IMAP server.</t>

</section>
<section anchor="encrypted-to-header-field"><name>Encrypted-To Header Field</name>

<t>This document could specify a new e-mail header field with the name <spanx style="verb">Encrypted-To</spanx>.</t>

<t>This header field's value is defined to be an <spanx style="verb">address-list</spanx>, as specified in <xref target="RFC5322"/>.</t>

<t>A MUA that creates any encrypted message includes the full <spanx style="verb">address-list</spanx> of all recipients in <spanx style="verb">To</spanx> or <spanx style="verb">Cc</spanx> that it was able to successfully encrypt the message to.</t>

<t>The recipient of an encrypted message can then infer based on the contents of this header whether an additional cleartext copy was generated.</t>

<t>FIXME: it is unclear how a MUA that uses a cleartext remote Drafts (see <xref target="drafts"/>) or Sent (see <xref target="sent"/>) folder should populate this field to indicate to the recipient that a cleartext copy was sent to the IMAP server.</t>

<t>FIXME: if the recipient receives an encrypted copy of a message without this header in it, they know that the sender does not support this mechanism.
What should be the default assumption in that case: cleartext copy or no cleartext copy?</t>

</section>
</section>
<section anchor="forbid-cleartext-copy"><name>Forbid Cleartext Copy</name>

<t>Another approach would simply be to declare that a MUA that generates an end-to-end encrypted e-mail message <bcp14>MUST NOT</bcp14> store or transmit a cleartext copy.</t>

</section>
<section anchor="handling-explicit-indicator"><name>Handling an Encrypted Message with a Cleartext Copy</name>

<t>When one of the copies of the message is known to be sent or stored in clear, a MUA might treat "Reply All" differently.</t>

<t>For example, it might be willing to send an additional cleartext copy to some of the recipients.</t>

<t>FIXME: what other behaviors might need changing?</t>

</section>
</section>
<section anchor="picking-a-solution"><name>Picking a Solution</name>

<t>This draft currently does not choose a specific solution, but it should not be published as a final document without choosing at most one solution.
Factors to consider when choosing a solution among those presented include:</t>

<t><list style="symbols">
  <t>complexity of implementation for senders</t>
  <t>complexity of implementation for receivers</t>
  <t>additional information leakage</t>
  <t>risk of user confusion (complexity of user mental models)</t>
</list></t>

</section>
<section anchor="user-experience-considerations"><name>User Experience Considerations</name>

<t>As noted in <xref target="I-D.ietf-lamps-e2e-mail-guidance"/>, representing the cryptographic status of a message is challenging even under good circumstances.</t>

<t>This is because storing a cleartext copy with a third party breaks most expectations of "end-to-end encryption" (see <xref target="I-D.knodel-e2ee-definition"/>).</t>

<t>When a single message has multiple cryptographic statuses depending on which copy of the message is being examined, it is even more challenging to represent the cryptographic status of any particular copy of the message.</t>

<t>Aside from changing its behavior around Reply All, how should an MUA treat such a message?</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>For example, if we go with <xref target="cleartext-copy"/>:</t>

<t>The IANA registry of <eref target="https://www.iana.org/assignments/message-headers/message-headers.xhtml">Message Headers</eref> should be updated to add a row with Header Field Name <spanx style="verb">Cleartext-Copy</spanx> , no template, protocol <spanx style="verb">mail</spanx>, status <spanx style="verb">standard</spanx>, and a reference to this document.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<section anchor="misrepresentations"><name>Misrepresentations By Sender are Out of Scope</name>

<t>This document describes security considerations between mutually-cooperating, end-to-end encryption-capable MUAs.
Either party could of course leak cleartext contents of any such message either deliberately or by accident.</t>

<t>In some cases, such as a <spanx style="verb">Bcc</spanx> scenario, the sending MUA is deliberately taking action on the sender's behalf that they do not want the (listed) recipient to know about.
Indicating to the listed recipient that a <spanx style="verb">Bcc</spanx>ed copy was emitted in the clear may violate the sender's expectations about what was done with the message.</t>

<t>This specification is not intended to detect fraud, misbehavior, or deliberate misrepresenation from one of the clients.</t>

</section>
<section anchor="protected-headers"><name>Cryptographic Guarantees</name>

<t>For the proposed solutions that require a header field, that header field itself needs cryptographic protections, or an intervening mail transport agent could inject it to tamper with the apparent cryptographic status of the message.</t>

<t>For this reason, any header field involved in this must be provided with header protection, as described in <xref target="I-D.ietf-lamps-header-protection"/>.</t>

<t>Additionally, since this is dealing with encrypted messages only, any relevant header field should probably be stripped from the message before sending, to avoid indicating to a mail transport agent that some cleartext copy of the message is available somewhere.</t>

</section>
</section>


  </middle>

  <back>


    <references title='Normative References'>





<reference anchor='RFC2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='RFC8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<date month='May' year='2017'/>
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>



<reference anchor='RFC5322'>
<front>
<title>Internet Message Format</title>
<author fullname='P. Resnick' initials='P.' role='editor' surname='Resnick'><organization/></author>
<date month='October' year='2008'/>
<abstract><t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of &quot;electronic mail&quot; messages.  This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, &quot;Standard for the Format of ARPA Internet Text Messages&quot;, updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5322'/>
<seriesInfo name='DOI' value='10.17487/RFC5322'/>
</reference>




    </references>

    <references title='Informative References'>





<reference anchor='RFC8551'>
<front>
<title>Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 4.0 Message Specification</title>
<author fullname='J. Schaad' initials='J.' surname='Schaad'><organization/></author>
<author fullname='B. Ramsdell' initials='B.' surname='Ramsdell'><organization/></author>
<author fullname='S. Turner' initials='S.' surname='Turner'><organization/></author>
<date month='April' year='2019'/>
<abstract><t>This document defines Secure/Multipurpose Internet Mail Extensions (S/MIME) version 4.0.  S/MIME provides a consistent way to send and receive secure MIME data.  Digital signatures provide authentication, message integrity, and non-repudiation with proof of origin. Encryption provides data confidentiality.  Compression can be used to reduce data size.  This document obsoletes RFC 5751.</t></abstract>
</front>
<seriesInfo name='RFC' value='8551'/>
<seriesInfo name='DOI' value='10.17487/RFC8551'/>
</reference>



<reference anchor='RFC3156'>
<front>
<title>MIME Security with OpenPGP</title>
<author fullname='M. Elkins' initials='M.' surname='Elkins'><organization/></author>
<author fullname='D. Del Torto' initials='D.' surname='Del Torto'><organization/></author>
<author fullname='R. Levien' initials='R.' surname='Levien'><organization/></author>
<author fullname='T. Roessler' initials='T.' surname='Roessler'><organization/></author>
<date month='August' year='2001'/>
<abstract><t>This document describes how the OpenPGP Message Format can be used to provide privacy and authentication using the Multipurpose Internet Mail Extensions (MIME) security content types described in RFC 1847. [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3156'/>
<seriesInfo name='DOI' value='10.17487/RFC3156'/>
</reference>


<reference anchor='I-D.ietf-lamps-e2e-mail-guidance'>
   <front>
      <title>Guidance on End-to-End E-mail Security</title>
      <author fullname='Daniel Kahn Gillmor' initials='D. K.' surname='Gillmor'>
         <organization>American Civil Liberties Union</organization>
      </author>
      <date day='6' month='February' year='2023'/>
      <abstract>
	 <t>   End-to-end cryptographic protections for e-mail messages can provide
   useful security.  However, the standards for providing cryptographic
   protection are extremely flexible.  That flexibility can trap users
   and cause surprising failures.  This document offers guidance for
   mail user agent implementers that need to compose or interpret e-mail
   messages with end-to-end cryptographic protection.  It provides a
   useful set of vocabulary as well as suggestions to avoid common
   failures.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-lamps-e2e-mail-guidance-05'/>
   
</reference>


<reference anchor='I-D.knodel-e2ee-definition'>
   <front>
      <title>Definition of End-to-end Encryption</title>
      <author fullname='Mallory Knodel' initials='M.' surname='Knodel'>
         <organization>CDT</organization>
      </author>
      <author fullname='Sofia Celi' initials='S.' surname='Celi'>
         <organization>Brave</organization>
      </author>
      <author fullname='Olaf Kolkman' initials='O.' surname='Kolkman'>
         <organization>Internet Society</organization>
      </author>
      <author fullname='Gurshabad Grover' initials='G.' surname='Grover'>
         </author>
      <date day='6' month='February' year='2023'/>
      <abstract>
	 <t>   End-to-end encryption is an application of cryptography mechanisms
   and properties in communication systems between endpoints.  End-to-
   end encrypted systems are exceptional in providing both security and
   privacy properties through confidentiality, integrity and
   authenticity features for users.  Improvements to end-to-end
   encryption strive to maximize the user&#39;s security and privacy while
   balancing usability and availability.  Users of end-to-end encrypted
   communications expect trustworthy providers of secure implementations
   to respect and protect them.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-knodel-e2ee-definition-08'/>
   
</reference>


<reference anchor='I-D.ietf-lamps-header-protection'>
   <front>
      <title>Header Protection for S/MIME</title>
      <author fullname='Daniel Kahn Gillmor' initials='D. K.' surname='Gillmor'>
         <organization>American Civil Liberties Union</organization>
      </author>
      <author fullname='Bernie Hoeneisen' initials='B.' surname='Hoeneisen'>
         <organization>pEp Foundation</organization>
      </author>
      <author fullname='Alexey Melnikov' initials='A.' surname='Melnikov'>
         <organization>Isode Ltd</organization>
      </author>
      <date day='24' month='January' year='2023'/>
      <abstract>
	 <t>   S/MIME version 3.1 introduced a mechanism to provide end-to-end
   cryptographic protection of e-mail message headers.  However, few
   implementations generate messages using this mechanism, and several
   legacy implementations have revealed rendering or security issues
   when handling such a message.

   This document updates the S/MIME specification to offer a different
   mechanism that provides the same cryptographic protections but with
   fewer downsides when handled by legacy clients.  Furthermore, it
   offers more explicit guidance for clients when generating or handling
   e-mail messages with cryptographic protection of message headers.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-lamps-header-protection-11'/>
   
</reference>




    </references>


<section anchor="acknowledgements"><name>Acknowledgements</name>

<t>The author would like to thank Daniel Huigens and Bart Butler for explaining the circumstances behind this situation.</t>

</section>
<section anchor="document-history"><name>Document History</name>

<section anchor="changes-from-draft-dkg-mail-cleartext-copy-00-to-draft-dkg-mail-cleartext-copy-01"><name>Changes from draft-dkg-mail-cleartext-copy-00 to draft-dkg-mail-cleartext-copy-01</name>

<t>Added some discussion about user expectations.</t>

</section>
</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

