Internet-Draft | Encrypted E-mail with Cleartext Copies | February 2023 |
Gillmor | Expires 25 August 2023 | [Page] |
When an e-mail program generates an encrypted message to multiple recipients, it is possible that it has no encryption capability for at least one of the recipients.¶
In this circumstance, an e-mail program may choose to send the message in cleartext to the recipient it cannot encrypt to.¶
This draft currently offers several possible approaches when such a choice is made by the sender, so that the recipient can reason about and act on the cryptographic status of the message responsibly.¶
This note is to be removed before publishing as an RFC.¶
The latest revision of this draft can be found at https://dkg.gitlab.io/cleartext-copy/. Status information for this document may be found at https://datatracker.ietf.org/doc/draft-dkg-mail-cleartext-copy/.¶
Discussion of this document takes place on the Secdispatch Working Group mailing list (mailto:secdispatch@ietf.org), which is archived at https://mailarchive.ietf.org/arch/browse/secdispatch/. Subscribe at https://www.ietf.org/mailman/listinfo/secdispatch/.¶
Source for this draft and an issue tracker can be found at https://gitlab.com/dkg/cleartext-copy.¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 25 August 2023.¶
Copyright (c) 2023 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License.¶
This document is concerned with end-to-end encrypted e-mail messages, regardless of the type of encryption used. Both S/MIME ([RFC8551] and PGP/MIME ([RFC3156]) standards support the creation and consumption of end-to-end encrypted e-mail messages.¶
The goal of this document is to enable a receiving MUA to have solid, reliable behavior and security indicators based on the status of any particular received message, in particular when the sender of the message may have emitted a cleartext copy.¶
The document currently does not pick a single mechanism, as it is more of a survey/problem statement.¶
The final document should select at most a single mechanism with a clear default behavior.¶
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.¶
In this draft:¶
The following scenarios are examples where an encrypted message might be produced but some copies of the message are sent or stored in the clear. In all scenarios, Alice is composing a new message to Bob and at least one other copy is generated. Alice has a cryptographic key for Bob, and knows that Bob is capable of decrypting e-mail messages.¶
In each of the following scenarios, Alice's MUA generates an e-mail, and knows that there is at least one cleartext copy of the message stored on a system not under Alice's personal control.¶
Alice sends a message to Bob and Carol, but Alice has no encryption-capable key for Carol. She encrypts the copy to Bob, but sends a cleartext copy to Carol.¶
Alice's MUA stores all draft copies of any message she writes in the clear in a Drafts folder, and that folder is itself stored on an IMAP server. When she composes a message, the IMAP server has a cleartext copy of the draft, up until and including when she clicks "Send". Her MUA instructs the IMAP server to delete the draft version of the message, but it also knows that it had at one point a cleartext copy, and cleartext might persist forever.¶
Unlike in Section 2.2, copies of messages sent to Alice's draft folder are encrypted or only stored locally. But when sending an e-mail message to Bob, her MUA generates a cleartext copy an places it in her Sent folder, which is also stored on IMAP.¶
Alice "Replies All" to message from Bob on a public mailing list. The public mailing list has on encryption-capable public key (it is archived publicly in the clear), so Alice cannot encrypt to it. But Alice's MUA is configured to opportunistically encrypt every copy possible, so the copy to Bob is encrypted.¶
Alice and Bob work in different organizations, and Alice's MUA has a policy of encrypting to outside peers that does not apply to members of her own organization. Alice's co-worker David is in Cc on the message, and Alice and David both share a trusted mail server, so Alice does not feel the need to encrypt to Carol. But she wants to defend against the possibility that Bob's mail server could read the contents of her message.¶
Receiving MUA often needs to behave differently when handling a message with a different cryptographic status.¶
This document has not yet reached consensus on what the right solution is. Two major classes of possible solution are:¶
It seems plausible that a MUA generating an end-to-end encrypted e-mail message with a cleartext copy could indicate to its recipients that a cleartext copy was also generated.¶
Each recipient could then reason about it differently, as compared to an end-to-end-encrypted e-mail message without a cleartext copy.¶
For example, a recipient doing "reply all" to such an encrypted message could take a different strategy and permit re-sending cleartext copies. For more discussion about how to use such an indicator, see Section 4.3.¶
The proposals here use e-mail headers, so see also Section 8.2 for security considerations.¶
This document could specify a new e-mail header field with the name Cleartext-Copy
.
The only defined values of this field are 0
and 1
.¶
A MUA that creates an encrypted message with a cleartext copy MUST add this header field with a value of 1
to each encrypted copy of the message.¶
By default, any end-to-end encrypted message that does not have this header field is presumed to have the field with a value of 0
-- meaning that no cleartext copies made by the sending MUA.¶
FIXME: what if the default was 1
instead of defaulting to 0
?¶
This document could specify a new e-mail header field with the name Cleartext-Copy-To
.¶
This header field's value is defined to be an address-list
, as specified in [RFC5322].¶
A MUA that creates an encrypted message with a cleartext copy to any recipient MUST add this header field to each encrypted copy of the message. The contents of the field are the list of e-mail addresses that were sent cleartext copies of the message.¶
By default, any end-to-end encrypted message that does not have this header field, or that has it with empty contents, is presumed to have no cleartext copies made by the sending MUA.¶
FIXME: it is unclear how a MUA that uses a cleartext remote Drafts (see Section 2.2) or Sent (see Section 2.3) folder should populate this field to indicate to the recipient that a cleartext copy was sent to the IMAP server.¶
This document could specify a new e-mail header field with the name Encrypted-To
.¶
This header field's value is defined to be an address-list
, as specified in [RFC5322].¶
A MUA that creates any encrypted message includes the full address-list
of all recipients in To
or Cc
that it was able to successfully encrypt the message to.¶
The recipient of an encrypted message can then infer based on the contents of this header whether an additional cleartext copy was generated.¶
FIXME: it is unclear how a MUA that uses a cleartext remote Drafts (see Section 2.2) or Sent (see Section 2.3) folder should populate this field to indicate to the recipient that a cleartext copy was sent to the IMAP server.¶
FIXME: if the recipient receives an encrypted copy of a message without this header in it, they know that the sender does not support this mechanism. What should be the default assumption in that case: cleartext copy or no cleartext copy?¶
Another approach would simply be to declare that a MUA that generates an end-to-end encrypted e-mail message MUST NOT store or transmit a cleartext copy.¶
When one of the copies of the message is known to be sent or stored in clear, a MUA might treat "Reply All" differently.¶
For example, it might be willing to send an additional cleartext copy to some of the recipients.¶
FIXME: what other behaviors might need changing?¶
This draft currently does not choose a specific solution, but it should not be published as a final document without choosing at most one solution. Factors to consider when choosing a solution among those presented include:¶
As noted in [I-D.ietf-lamps-e2e-mail-guidance], representing the cryptographic status of a message is challenging even under good circumstances.¶
This is because storing a cleartext copy with a third party breaks most expectations of "end-to-end encryption" (see [I-D.knodel-e2ee-definition]).¶
When a single message has multiple cryptographic statuses depending on which copy of the message is being examined, it is even more challenging to represent the cryptographic status of any particular copy of the message.¶
Aside from changing its behavior around Reply All, how should an MUA treat such a message?¶
For example, if we go with Section 4.1.1:¶
The IANA registry of Message Headers should be updated to add a row with Header Field Name Cleartext-Copy
, no template, protocol mail
, status standard
, and a reference to this document.¶
This document describes security considerations between mutually-cooperating, end-to-end encryption-capable MUAs. Either party could of course leak cleartext contents of any such message either deliberately or by accident.¶
In some cases, such as a Bcc
scenario, the sending MUA is deliberately taking action on the sender's behalf that they do not want the (listed) recipient to know about.
Indicating to the listed recipient that a Bcc
ed copy was emitted in the clear may violate the sender's expectations about what was done with the message.¶
This specification is not intended to detect fraud, misbehavior, or deliberate misrepresenation from one of the clients.¶
For the proposed solutions that require a header field, that header field itself needs cryptographic protections, or an intervening mail transport agent could inject it to tamper with the apparent cryptographic status of the message.¶
For this reason, any header field involved in this must be provided with header protection, as described in [I-D.ietf-lamps-header-protection].¶
Additionally, since this is dealing with encrypted messages only, any relevant header field should probably be stripped from the message before sending, to avoid indicating to a mail transport agent that some cleartext copy of the message is available somewhere.¶
The author would like to thank Daniel Huigens and Bart Butler for explaining the circumstances behind this situation.¶