<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.4 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-dweekly-wrong-recipient-00" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.19.0 -->
  <front>
    <title abbrev="Wrong Recipient">Adding a Wrong Recipient URL for Handling Misdirected Emails</title>
    <seriesInfo name="Internet-Draft" value="draft-dweekly-wrong-recipient-00"/>
    <author fullname="David Weekly">
      <organization>Capital One</organization>
      <address>
        <email>david@weekly.org</email>
      </address>
    </author>
    <date year="2023" month="December" day="31"/>
    <keyword>next generation</keyword>
    <keyword>unicorn</keyword>
    <keyword>sparkling distributed ledger</keyword>
    <abstract>
      <?line 37?>

<t>This document describes a mechanism for an email recipient to indicate that
they are not the intended recipient of an email, providing that signal back
to the originating mail server.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://dweekly.github.io/ietf-wrong-recipient/draft-dweekly-wrong-recipient.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-dweekly-wrong-recipient/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/dweekly/ietf-wrong-recipient"/>.</t>
    </note>
  </front>
  <middle>
    <?line 43?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Email recipients today have no clear option as to how to best signal to a
provider that they are not the correct recipient of an email. This is a
different issue than either an unsubscription request from a mailing list
or reporting an email as spam, since the service itself may be a valid
sender attempting to reach some user for a valid purpose, but the sender
may have inadvertently recorded the wrong email address either due to
user error or data entry error.</t>
      <t>There is collective benefit to all parties if a service is able to detect
when an email address is incorrect for a user; the intended recipient,
the service, and the inadvertent recipient all prefer correct delivery.</t>
      <t>Consequently, there ought be a mechanism whereby a service can indicate
it has an endpoint to indicate a "wrong recipient" of an email. If this
header is present in an email message, the user can select an option to
indicate that they are not the intended recipient.</t>
      <t>Similar to one-click unsubscription <xref target="RFC8058"/>, the mail service can
perform this action in the background as an HTTPS POST to the provided
URL without requiring the user's further attention to the matter.</t>
      <t>Since it's possible the user may have a separate valid account with the
sending service, it may be important that the sender be able to tie
<em>which</em> email was sent to the wrong recipient. For this reason, the
sender may also include an opaque blob in the header to specify the
account ID referenced in the email; this is included in the POST.</t>
      <t>Note that this kind of misdelivery shouldn't be possible if a service
uses email confirmation, such as sending an email address a confirmation
link to click on at time of enrollment.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="high-level-goals">
      <name>High-Level Goals</name>
      <t>Allow a recipient to stop receiving emails intended for someone else.</t>
      <t>Allow a service to discover when they have the wrong email for a user.</t>
    </section>
    <section anchor="out-of-scope">
      <name>Out of Scope</name>
      <t>This document does not propose a mechanism for automatically discovering
whether a given user is the correct recipient of an email, though it is
possible to use some of the signals in an email, such as the intended
recipient name, to infer a possible mismatch between actual and intended
recipients.</t>
    </section>
    <section anchor="implementation">
      <name>Implementation</name>
      <section anchor="mail-senders-when-sending">
        <name>Mail Senders When Sending</name>
        <t>Mail Senders that wish to be notified when a misdelivery has occurred
<bcp14>SHOULD</bcp14> include a Wrong-Recipient header with an HTTPS URI to which the
recipient's mail client can POST. If this header is included, the mail
sender <bcp14>MUST</bcp14> ensure this endpoint is valid.</t>
        <t>The sender <bcp14>MUST</bcp14> encode a mapping to the underlying account identifier
in the URI in order to allow the service to know which of their users
has an incorrect email.</t>
      </section>
      <section anchor="mail-recipients">
        <name>Mail Recipients</name>
        <t>When a mail client receives an email that includes a Wrong-Recipient
header, an option <bcp14>SHOULD</bcp14> be exposed in the user interface that allows
a recipient to indicate that the mail was intended for another user.</t>
        <t>If the user selects this option, the mail client <bcp14>MUST</bcp14> perform an
HTTPS POST to the URI in the Wrong-Recipient header</t>
      </section>
      <section anchor="mail-senders-after-wrong-sender-notification">
        <name>Mail Senders After Wrong Sender Notification</name>
        <t>When a misdelivery has been indicated by a POST to the HTTPS URI, the
sender <bcp14>MUST</bcp14> make a reasonable effort to cease emails to the indicated
email address for that user account.</t>
        <t>Any GET request to this URI <bcp14>MUST</bcp14> be ignored, since anti-spam software
may attempt a GET request to URIs mentioned in mail headers.</t>
        <t>The sender <bcp14>SHOULD</bcp14> make a best effort to attempt to discern a correct
email address for the user account. How the sender should accomplish
this task is not part of this specification.</t>
      </section>
    </section>
    <section anchor="additional-requirements">
      <name>Additional Requirements</name>
      <t>The email needs at least one valid authentication identifier.  In
this version of the specification the only supported identifier type
is DKIM <xref target="RFC7489"/>, that provides a domain-level identifier in the
content of the "d=" tag of a validated DKIM-Signature header field.</t>
      <t>The Wrong-Recipient header needs to be included in the "h=" tag of a
valid DKIM-Signature header field.</t>
      <t>The domain used in the HTTPS URI <bcp14>MUST</bcp14> align with the domain used in
the "d=" tag of the valid DKIM-Signature header field in which the
headers are included in the "h=" tag.</t>
    </section>
    <section anchor="examples">
      <name>Examples</name>
      <t>Header in Email</t>
      <t><tt>
Wrong-Recipient: &lt;https://example.com/wrong-recipient?uid=12345&amp;email=user@example.org&gt;
</tt></t>
      <t>Resulting POST request</t>
      <t><tt>
POST /wrong-recipient?uid=12345&amp;email=user@example.org HTTP/1.1
Host: example.com
</tt></t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The Wrong-Recipient header will contain the recipient address, but
that is already exposed in other header fields like To:.</t>
      <t>The user ID of the recipient with the sending service may be exposed
by the Wrong-Recipient URI, which may not be desired but a sender
may use an opaque blob to perform a mapping to a user ID on their
end without leaking any information to outside parties.</t>
      <t>A bad actor with access to the user's email could maliciously
indicate the recipient was a Wrong Recipient with any services that
used this protocol, causing mail delivery and potentially account
access difficulties for the user.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8058">
          <front>
            <title>Signaling One-Click Functionality for List Email Headers</title>
            <author fullname="J. Levine" initials="J." surname="Levine"/>
            <author fullname="T. Herkula" initials="T." surname="Herkula"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes a method for signaling a one-click function for the List-Unsubscribe email header field. The need for this arises out of the actuality that mail software sometimes fetches URLs in mail header fields, and thereby accidentally triggers unsubscriptions in the case of the List-Unsubscribe header field.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8058"/>
          <seriesInfo name="DOI" value="10.17487/RFC8058"/>
        </reference>
        <reference anchor="RFC7489">
          <front>
            <title>Domain-based Message Authentication, Reporting, and Conformance (DMARC)</title>
            <author fullname="M. Kucherawy" initials="M." role="editor" surname="Kucherawy"/>
            <author fullname="E. Zwicky" initials="E." role="editor" surname="Zwicky"/>
            <date month="March" year="2015"/>
            <abstract>
              <t>Domain-based Message Authentication, Reporting, and Conformance (DMARC) is a scalable mechanism by which a mail-originating organization can express domain-level policies and preferences for message validation, disposition, and reporting, that a mail-receiving organization can use to improve mail handling.</t>
              <t>Originators of Internet Mail need to be able to associate reliable and authenticated domain identifiers with messages, communicate policies about messages that use those identifiers, and report about mail using those identifiers. These abilities have several benefits: Receivers can provide feedback to Domain Owners about the use of their domains; this feedback can provide valuable insight about the management of internal operations and the presence of external domain name abuse.</t>
              <t>DMARC does not produce or encourage elevated delivery privilege of authenticated email. DMARC is a mechanism for policy distribution that enables increasingly strict handling of messages that fail authentication checks, ranging from no action, through altered delivery, up to message rejection.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7489"/>
          <seriesInfo name="DOI" value="10.17487/RFC7489"/>
        </reference>
      </references>
    </references>
    <?line 199?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA5VZf2/cNhL9n5+CtwauwMHrxG2Kptsm7TZ24sX5R852YBRF
0XAlapewJKokZWcvyHe5z3Kf7N4MqR+7dhocUNQrSiRn3sy8eWSm06kIJpR6
JifzPDf1Sip54yz+XurMNEbXQb67PJWFdfJE1XlJn5wZnxuns6BzeVwpU/qJ
UMul03dYZmf2RGQq6JV1m5k0dWGFyG1Wqwo75k4VYZrfa31bbqb3NG/qunnT
p0+Fb5eV8d7YOmwaTfNz3Wj8D0bJPalKb7HhaHSyLyc6N8E6o0p6WMx/wR/Y
PllcXr+eiLqtltrNRA6bZgLmfiOwjtNqJueXx3M83Ft3u3K2bWby5o28wRN5
/IZGxK3e4HU+E3Iqa/0hyJWutVMBBtJQW5vMOv7pG+VuGavc+ODMsiWsSp2v
tBN3um6x+56U/Ub0EH3c3hHDhC998rP+oKqm1AeZrWhcuWw9k+sQGj978mT0
8gmWw9ImrNsl4En4PjE6FLsgT/BhCSh8wIfdUmnCQVzhwNhHpz75y+gdrENV
ToRQbVhbR4BhJymLtixj7I/UncnlDU/mV9atVG3+zWDO5CvVmKBKeVFrfqsj
CjnN+jnZhxlC1NZVmHMHPAWlV/8k5eXrV8+ffvs8/fzu2fPv8c10OpVqiZCo
LAhxvTZeIh/bilIq1z5DqLRHDVQ6W8MeX3HmqzpaIHsHZbCUjoaSW4a1CiKs
9YZSSdYWb9carwNlZT6aZIt+qX3ZOAtvKNY0X3qzquHxUmW3AovTCkjjlanh
EL7h7b12d9odRDcqk+elFsiFRR2czduME1Ecb1vqYWquNnKt7sg2mZVaOWkb
+lgqeivX9p7+wPPeDDwqES3ULhr4wEEkO5HA4/4dSAYX/ymRm6LQjj5ANbeM
F75CemmGtq1R6AR9tMnpP1uypHC2okhgMQKgRCEJxMLpxjqGpI8KvEDBVfsw
vs4020ZIGfw2weuywCIbuIfV7lRpcuEpMNg7BF01vBb8BQtka+ltpWWL6THw
cYJsWtdYr/clCjmtTyuIqgMWYcoRGkQ8lBtCBDyB0NOnXBqdpXnutPed8zmB
YQVvp53DhvgP3KQk1nGbOHZAeQr4CMvMliUgR4bDnVoXhhNRlaUE4QSD1DUI
weA90F+WtAeSO2CiuF/regRcMocCVXfhjH6TTT98Jo/3xQjifSyXpw97DEY5
wcY5jQToEybXJTxwG3j2ytae4k2w7dMq8NO2q3WI4RrK8J5eLTcj5zK40ZWg
ABBrpAF5VueNNTsVquQkhmGgvu1kXRTY3Hix1ooyA4DAZs8pO8KrAlhqpdnQ
mCRkBDKMvMKvVFUI6RY3PCydh5gCiytTmRK1CcNtradZabLb3eL4LbHa79GG
nhUSIKLRjkiQnZGKGYE8oG+JWajhIFoRqZPr67dX8u3F1bVMhJMKPhfU8u+R
o7YNXI/GRZ6KXn/lweQulm+gcEenk0UYcexNzfWHj1E63nAedrD1dUPhROoS
UrHSVJbBxMC70/dcq7R5n24IdSpnUxEVKIp1QjnVJSdPSnxUhfjjfm2y9R8p
ivfEF4nDhwIdIiFfWxcBBCV4W+/3diTLSXhQwZRtrmPYFVJYLku77MBOeYQd
fIOFiw2v0Tm3OJJcERoQ5d0UNu6HuHEsSFq/f01xAqzndkgqfAWtkFMmQyd1
VSU9wlbm9VdcQz32Y2IgxvEJjczWheG2SZ76FhwY8cm3OTZRhdqaIEDNt+Rl
TFbqKDDMgEJhk64d6KqKyb0nUep3MVc8U8YR6Ks2/MwMJyGvSH7lXk7O3l1d
k36jv/L8gn9fHv/r3eLy+Ih+X53MT0/7HyJ9cXVy8e70aPg1zHx1cXZ2fH4U
J2NUbg2Jydn810kkssnF2+vFxfn8dBKBHwsEqmDuk1y/DgxBqk550SkHDtYv
r97+9z+Hz+THj39DsX59ePj9p0/p4fnhd8/wQCQcd7M1ukV8JI4QqmmoOxPn
gDazqIL8PkcEXbqWxIJA8x+/ETK/z+SPy6w5fPYyDZDDW4MdZluDjNnDkQeT
I4iPDD2yTY/m1vgO0tv2zn/deu5wHw3++BPSS8vp4fOfXgpKoROzWk9P9Z0u
5RsLYISYlyXEi9oWZj7Yhka0uTNd6/UD51KDozYPkpW69IRnt0xHpdQwjc8s
6onDExmcGWu3pQ/tkrP8omUZdJXZRj8QmBZVRy0APEty4qHObIOlwsoQ/U1v
AXygvh35FsIeVRRZFGt/UYdRYlFDJdpEfxuo2NIaUe7YInInSz8/7ngDIYy7
lhh2IjW/H1ttweb1G4CR4AomL3WAYq+pG7VQlpT2DxfyDN6CzjAEVSQXsbcn
zwjjK+ZeL28oFFeRmoTYesWUeG/8OlUoYDaFQbSj4tkiSFIKNstawJaLlNI9
ncfj73Q4/iYq54bUd813lwvaiPsKU3vvCfpd5NWSZ5NAYOruJIYcJEZH8UMv
77oMF7NG6yfGoUm9qsFvbpRRFcrt7zPLHlSgkSRquePSJ+WG6Tw1IEOnZcLH
idReyCH8JNnqkqakU8FISmPwtsZY9DnmjHGcidBNUVIMKjLqqiGEPZ4o2psU
khFMsVq1HxoOBzQh5B+GJSm1/ZHsSpFE8PUHKq++dcZiIcouVJa6J/vnhfqL
I92gsEgxbNGHQnpROaayXxTDPlEN+hi2aNlIqyV3OV6dVoNseyjFUjzo5+MJ
+bA65gU8TLc3cUyecxVkqZxuHi+FJVVn53kuWWSPTekzfksIsQuVutXMvqST
WHHpAj4xlhkGdUe+aal+F7GtKgqbDpkMYcpS4uV6I98cX/dnQl4GuBI6bAD1
4lVtHRVRPP1BDpopHQfBbUW4R8/mU1o668HYnfWwFCo2CpOYMmxZBNlvl1nK
sOQ1n5cHf7sdUu/QrmaxxOXwqLt621t50hccbxZlHL8GLYLZBLselL8lFuA+
gkNfrETjk9BMwWY6pRs9elBUfiTimVuT2ooW1VpDbwH4EtEKdO7odHgLU+qQ
lhsRxoGUizqaggyiy7m+f4wNiBcYJG9825BMJ2z7RfiyS2CJo38uzvhQQ/cz
fKhRoTuGUNXn6Iemnpbc80fzY2kIaNGQGh7tN8lfTADQihtgdIRTmnaZXlF7
C8SoiYGxUNnx6GdIP8LTab5tQT5ZjzYTEbUvbxQdosj3Cw0dhVMaC63q/vyz
M0HsuknPX9ybdhpaVUptlrOfc4rz5zheKiJhTlLPquN9rxDv378XO5hBtz12
G7lzM/hTa/IXh19/8+zbv3MGvqAa6O82rVu95LXFpfZtyVczTEWpYOPGPPJ/
L8w4Pzk8OBQnli48x/epvOUeWBOiwIQNnVU83Xyp0fHks7qg5ENUUAnC0dVH
LHe+NRKxnwH1EmyZb8Y9KvaSccC8LA045trOUtowU+DYmCI+7NHnyc45uTsj
p23EcvNoL2FWj6lBE4hUMAm1B7LI+bZLje+6SDLuHHhRHH0jGysPNdhcR6kg
sE5/qwC+uY0HzI3sL27jNQJeE/jdlRa1AblUxITBdjosy4hHO4ET7yS68yyx
ZoWSyIxtfbkZ38VsIad6WTH6x44k8zYdjlFZCi4/Jj2QU7CZhTTOVOv7q9m+
o5K+bSzfirCKT/Quksl0F2oySm293QcO+ISzmJ/PH8m+8SmCWnZt45fxhocg
4ithvjwm4s9IqdE/N0TC/ziL//ChQRwFJL6efMKqF0cX4n/f4t2kARoAAA==

-->

</rfc>
