<?xml version="1.0" encoding="us-ascii"?>
<!DOCTYPE rfc SYSTEM "rfc2629.dtd">
<?rfc toc="yes"?>
<?rfc rfcedstyle="yes"?>
<?rfc subcompact="no"?>
<?rfc symrefs="yes"?>
<?rfc comments="yes" ?>
<?rfc inline="yes" ?>

<rfc ipr="trust200902" category="info" docName='draft-melnikov-jmap-smime-sender-extensions-alt-06'>
  <front>
    <title abbrev="JMAP extension for S/MIME">
      JMAP extension for S/MIME signing and encryption
    </title>
    <author initials="A." surname="Melnikov" fullname="Alexey Melnikov">
      <organization>Isode Ltd</organization>
      <address>
        <postal>
          <street>14 Castle Mews</street>
          <city>Hampton</city>
          <region>Middlesex</region>
          <code>TW12 2NP</code>
          <country>UK</country>
        </postal>
        <email>Alexey.Melnikov@isode.com</email>
      </address>
    </author>
      
    <date year="2024" />
    
    <keyword>JMAP</keyword>
    <keyword>S/MIME</keyword>

    <abstract>

    <t>
    This document specifies an extension to JMAP for sending S/MIME signed and/or S/MIME encrypted messages,
    as well as automatic decryption of received S/MIME messages.
    </t>
    
    <t>
    [[This version presents an alternative syntax to revision 04 of https://datatracker.ietf.org/doc/draft-ietf-jmap-smime-sender-extensions/]]
    </t>
	
    </abstract>
    
  </front>
  <middle>

    <section title="Introduction">

        <t>
        <xref target="RFC8621"/> is a JSON based application protocol for synchronising email data
        between a client and a server.

<!--
   JMAP [RFC8620] is a generic protocol for synchronising
   data, such as mail, calendars or contacts, between a client and a
   server.  It is optimised for mobile and web environments, and aims to
   provide a consistent interface to different data types.
   [RFC8621] builds on top of JMAP and defines how to perform
   email synchronization.
-->
        </t>
      
        <t>
        This document describes an extension to JMAP for sending S/MIME signed and/or encrypted messages,
        as well as automatic decryption of received S/MIME messages.
        It allows JMAP server to <!--access (preconfigured) user's signing and encryption keys, and-->
        sign/encrypt messages on user's behalf.
        </t>

    </section>
    
    <section title="Conventions Used in This Document">
      
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
	    "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in
	    this document are to be interpreted as described in
	    <xref target="RFC2119"/>.</t>

      <t>This document uses the terms "Cryptographic Layer" and "Cryptographic Envelope"
      as defined in <xref target="draft-ietf-lamps-e2e-mail-guidance"/></t>

    </section>

    <section title="Addition to the capabilities object">

      <t>
        The capabilities object is returned as part of the standard JMAP
        Session object; see the JMAP spec.  Servers supporting _this_
        specification MUST add a property called
        "urn:ietf:params:jmap:smime-advanced" to the capabilities object.
      </t>

      <t>
        <!--/////This might change in the future if S/MIME signing/encrypting/decrypting is added:-->
        The value of this property is an empty object in both the JMAP
        session _capabilities_ property and an account's
        _accountCapabilities_ property.
      </t>

    </section>

    <section title="Extension to Email/set for S/MIME signing and/or encryption" anchor="smime">

      <!--The following assumes that messages created signed/encrypted, when they are created and uploaded.
      I.e. this operation is not deferred till later Send. Is this the right model?-->

      <t>
        <xref target="RFC8621"/> defines Email/set method for creating new email messages.
        This document defines the following additional Email/set argument that can be used to
        create S/MIME signed and/or encrypted messages:
      </t>

      <t>
        smimeOperations: SmimeOperation[]|null (default: null). The list of S/MIME operations to perform,
        in the order specified. If none are specified, or if this property is omitted,
        no S/MIME operation is performed.
        If multiple messages are specified in the "create" argument, these operations apply to each of them.
      </t>
      
      <t>
        headersToObscure: "String[String]"|"none"|null (default: null). If smimeOperations contains an "encrypt" operation, this specifies the list of header fields
        to obscure, as well as their obscured representation (see <xref target="draft-ietf-lamps-header-protection"/>).
        If the value is the string "none", no header field should be obscured. If the value is null,
        or if this property is omitted, the set of header fields to be protected is left up to the JMAP server.
        <!--null is the same as missing (the default), so the requirement is pointless:
        If any header fields are explicitly specified in this attribute, the headersToProtect argument MUST also contain that header field,
        or be set to "none" or null.
        -->
      </t>
    
      <t>
        headersToProtect: "String[]"|"all"|"none"|null (default: null). The list of header fields which should be protected by the smimeOperations specified.
        If the value is "all", all header fields of the original message should be protected. If the value is "none", no header fields should be protected.
        If the value is null, or if this property is omitted, the set of header fields to be protected is left up to the JMAP server.
      </t>
      
      <t>
       The SmimeOperation object contains the following attributes:

        <list style="bullets">

          <t>
          operation: "String". S/MIME operation to perform. This document only defines 2 possible values: "sign" and "encrypt".
          Future documents might add further values.
          </t>

          <t>
          options: "SignOptions"|"EncryptOptions"|null (default: null). Options controlling aspects of S/MIME signing or
          S/MIME encryption. If this attributes includes SignOptions when the operation attribute has the value "encrypt" or
          if this attributes includes EncryptOptions when the operation attribute has the value "sign",
          then JMAP server MUST return the invalidArguments error code.
          </t>

        </list>
      </t>

      <t>
      The SignOptions object contains the following attributes:

        <list style="bullets">

          <t>
          algorithm: "String"|null (default: null). The value represents the signature algorithm that the JMAP server should use to sign this message.
          If the algorithm is unspecified (the value "null") or this property is omitted, the JMAP server chooses the most appropriate algorithm to use.
          
          If the algorithm name specified is unrecognized by the server, it MUST return the unknownSignatureAlgo error code.
          [[Register unknownSignatureAlgo error code with IANA.]]
          
          Currently specified algorithms are "ecdsa_secp256r1_sha256", "ed25519", "rsa_pkcs1_sha256", "rsa_pss_pss_sha256".
          [[Alexey: probably need to define a new IANA registry or reference an existing one.]]
          </t>

          <t>
          opaque: "Boolean" (default: true). If the value is "true", this requests the JMAP server to use application/pkcs7-mime <xref target="RFC8551"/>
          media type for S/MIME signing, otherwise multipart/signed <xref target="RFC1847"/> media type.
          </t>

        </list>
      </t>

      <t>
        The EncryptOptions object contains the following attributes:

        <list style="bullets">

          <t>
          keyEncryptionAlgorithm: "String"|null (default: null). The value represents the key encryption algorithm that the JMAP server should use when encrypting this message.
          If the algorithm is unspecified, this property is omitted, or an unrecognized algorithm string is specified, the JMAP server chooses the most appropriate algorithm to use.
          [[Need a new IANA registry or a link to an existing one here.]]
          </t>

          <t>
          contentEncryptionAlgorithm: "String"|null (default: null). The value represents the data encryption algorithm that the JMAP server should use when encrypting this message.
          If the algorithm is unspecified, this property is omitted, or an unrecognized algorithm string is specified, the JMAP server chooses the most appropriate algorithm to use.
          [[Need a new IANA registry or a link to an existing one here.]]
          </t>

        </list>
      </t>



      <t>
      When the operation attribute value is "sign", JMAP server constructs the S/MIME signed message 
      from the original message (if this is the first operation) or the result of the previous operation,
      taking into considerations the SignOptions object (if present) or its defaults.
      The signature's private key/certificate is associated with the email address in
      the Sender header field, if present; otherwise, it is associated with the email address
      in the From header field, if present.<vspace/>

      If multiple addresses are present in one of these header
      fields, or there is more than one Sender/From header field, the
      server SHOULD reject the Email/set as invalid with the "invalidEmail" error code; otherwise,
      it MUST take the first address in the last Sender/From header field.<vspace/>
            
      If JMAP account is not authorized to sign message as the selected sender (as above),
      it SHOULD return "signedSenderNotAllowed" error code.
      </t>

      <t>
      When the operation is "encrypt", JMAP server constructs the S/MIME encrypted message 
      from the original message (if this is the first operation) or the result of the previous operation,
      taking into considerations the EncryptOptions object (if present) or its defaults.
      
      This is done by encapsulating the message inside application/pkcs7-mime <xref target="RFC8551"/> media type.
      The message MUST be encrypted to the sender and all To/Cc/Bcc recipients.
      This extension assumes that there is some kind of per user or organizational addressbook,
      that can be used to lookup public keys of recipients. If lookup of a particular public key fails,
      or results in an expired or revoked certificate, the Email/set operation MUST fail with
      the "validEncryptionKeyNotFound" error code.
      </t>


      <t>
        <!--///Use <aside>?-->
        (Note that this extension doesn't allow management of private keys/certificates.
        How private keys are managed or configured for a particular user is out of scope for this document.)
      </t>

      <figure title="Example 1:">
        <preamble>
        </preamble>
<artwork>
  <![CDATA[
      [[ "Email/set", {
        "accountId": "ue150411c",
        "create": {
          "k192": {
            "mailboxIds": {
              "2ea1ca41b38e": true
            },
            "keywords": {
              "$seen": true,
              "$draft": true
            },
            "from": [{
              "name": "Joe Bloggs",
              "email": "joe@example.com"
            }],
            "subject": "World domination",
            "receivedAt": "2021-07-07T01:03:11Z",
            "sentAt": "2021-07-10T11:03:11+10:00",
            "bodyStructure": {
              "type": "text/plain",
              "partId": "bd48",
              "header:Content-Language": "en"
            },
            "bodyValues": {
              "bd48": {
                "value": "I have the most brilliant plan.  Let me tell
                  you all about it.",
                "isTruncated": false
              }
            }
          }
        },
        "smimeOperations": [{
            "operation": "sign",
            "options": {
              "opaque": false,
              "headersToProtect": "all"
            }
          },
          {
            "operation": "encrypt"
          }
        ]
      }, "0" ]]

This will result in the following response:

      [[ "Email/set", {
        "accountId": "ue150411c",
        "oldState": "780823",
        "newState": "780839",
        "created": {
          "k192": {
            "id": "Mf40b5f831efa7233b9eb1c7f",
            "blobId": "Gf40b5f831efa7233b9eb1c7f8f97d84eeeee64f7",
            "threadId": "Td957e72e89f516dc",
            "size": 5096
          }
        },
        ...
      }, "0" ]]
]]></artwork>
        <postamble>
        </postamble>
      </figure>
    </section>

    <section title="Email/smimeDecrypt method for S/MIME decryption" anchor="smime-decrypt">

      <t>
        The new method defined in this section is loosely based on Blob/upload method defined in <xref target="RFC9404"/>.
        The Email/smimeDecrypt method creates new blob(s) with decrypted content of existing blob(s).
      <!--
        The id representing the raw octets of the decrypted contents of the part.
        When processing this request argument, the server first removes
        the Content-Transfer-Encoding (see then "blobId" request argument in RFC 8621).
        If the Content-Transfer-Encoding is supported by the server,
        the content is then S/MIME decrypted.
        -->
        The resulting Id can be used in Email/parse method to import the decrypted message.

        <!--/////Or should this return an error instead?-->
        If the specified blob doesn't specify encrypted content, the returned Id attribute has
        the same value as the "blobId" attribute.
      </t>

      <t>
        *Parameters*

        <list style="bullets">

          <t>
            accountId: "Id". The id of the account in which the blobs will be created.
          </t>

          <t>
            create: "Id[DecryptObjects]". A map of creation id to DecryptObjects<!--or just reference UploadObjects of <xref target="RFC9404"/>-->
          </t>
          
        </list>
      </t>


      <t>
        *Result*
      </t>

      <t>
        The result is the same as for Foo/set in <xref target="RFC8620"/>, with created and
        notCreated objects mapping from the creation id.
      </t>

      <t>
        The created objects contain:

        <list style="bullets">

          <t>
            id: "Id". The blobId that was created.
          </t>

          <t>
            type: "String|null".
            
            The media type as given in the creation (if any).  If not
            provided, the server MAY perform content analysis and return one
            of the following: the calculated value, "application/octet-
            string", or null.
          </t>

          <t>
            size: "UnsignedInt". As per <xref target="RFC8620"/>, the size of the created blob in octets.
          </t>
          
        </list>
      </t>

      <t>
        The DecryptObjects objects contains:<!--Almost the same as UploadObject, with some attributes removed-->

        <list style="bullets">

          <t>
            data: "DecryptDataSourceObject[]".
            An array of zero or more octet sources in order (zero to create an
            empty blob).  The result of each of these sources is concatenated
            in order to create the blob.
          </t>

          <t>
            type: "String|null" (default: null).

            A hint for media type of the data.
          </t>

        </list>
      </t>


      <t>
        The DecryptDataSourceObject objects contains exactly one of:
        <!--Almost the same as DataSourceObject, with some attributes removed-->

        <list style="bullets">

          <t>
            data:asBase64: "String|null" (base64 representation of octets)
          </t>

          <t>
          or a blobId source:
          </t>

          <t>
            blobId: "Id"
          </t>

          <t>
            offset: "UnsignedInt|null" (MAY be zero). If null, then offset is assumed to be zero.
          </t>
          
          <t>
            length: "UnsignedInt|null" (MAY be zero). If null, then length is the remaining octets in the blob.
          </t>
        </list>
      </t>

      <t>
      The created objects will also contain any other properties identical
      to those that would be returned in the JSON response of the upload
      endpoint described in <xref target="RFC8620"/>.  This may be extended in the future;
      in this document, it is anticipated that implementations will extend
      both the upload endpoint and the Email/smimeDecrypt responses in the same
      way.
      </t>

      <t>
      If there is a problem with a creation, then the server will return a
      notCreated response with a map from the failed creation id to a
      SetError object.
      </t>

      <t>
      For each successful decryption, servers MUST add an entry to the
      createdIds map (<xref target="RFC8620"/>, Section 3.3) for the request; even if the
      caller did not explicitly pass a createdIds, the value must be
      available to later methods defined in the same Request Object.  This
      allows the blobId to be used via back-reference in subsequent method
      calls.
      </t>

      <t>
      The created blob will have the same lifetime and same expiry
      semantics as any other binary object created via the mechanism
      specified in <xref target="RFC8620"/>, Section 6.
      </t>


<!--/////Neil wrote:
      The trouble with this is it means the server has to persist the unencrypted blob rather than just have it in memory,
      which it might not want to do due to the security considerations.
  -->

      
<!--      
      <t>
      Uploads using this mechanism will be restricted by the maxUploadSize
      limit for JMAP requests specified by the server.
      </t>
  -->


<!--/////Ask Neil! The following example will only work for the top level media type "application/pkcs7-mime",
         which doesn't seem flexible enough. Is it possible to search header fields of an arbitrary body part?
      
          [[ "Email/query", {
            "accountId": "x",
            "filter": { "header": ["Content-Type", "application/pkcs7-mime"] },
            "position": 0,
            "limit": 10
          }, "0" ],
          [ "Email/get", {
            "accountId": "x",
            "#ids": {
              "resultOf": "0",
              "name": "Email/query",
              "path": "/ids"
            }
          }, "1" ]]

      -->
      
      
      <figure title="Example 2:">
        <preamble>
        </preamble>
<artwork>
        <![CDATA[
First, find bodyparts that need decrypting:
        
    [[ "Email/get", {
        "ids": [ "f123u986" ],
        "properties": [ "threadId", "mailboxIds", "from", "subject",
          "receivedAt", "bodyStructure" ],
        "bodyProperties": [ "partId", "blobId", "size", "type" ]
      }, "#1" ]]
      
This will result in the following response:

    [[ "Email/get", {
     "accountId": "abc",
     "state": "41234123231",
     "list": [
       {
         "id": "f123u986",
         "threadId": "cb1314a",
         "mailboxIds": { "da123c": true },
         "from": [{ "name": "Mice Ace", "email": "mike@example.com" }],
         "subject": "Dinner on Saturday?",
         "receivedAt": "2023-03-09T14:12:00Z",         
         "bodyStructure": [{
           "partId": "1",
           "blobId": "B841623871",
           "size": 120537,
           "type": "application/pkcs7-mime"
         }]
       }
     ]
   }, "#1" ]]
   
Then decrypt the specific body part using the retrieved blobId.
   
   [
    "Email/smimeDecrypt",
    {
     "accountId": "account1",
     "create": {
      "1": {
       "data" : [
       {
        "blobId": "B841623871"
       }
      ]
      }
     }
    },
    "R1"
   ]

Response:

   [
     "Email/smimeDecrypt",
     {
       "accountId" : "account1",
       "created" : {
         "1": {
           "id" : "G4c6751edf9dd6903ff54b792e432fba781271beb",
           "type" : "multipart/mixed",
           "size" : 1295
         }
       }
     },
     "R1"
   ]
]]></artwork>
        <postamble>
        </postamble>
      </figure>
      
      
      <!--/////Add how to use Email/import on the decrypted blobId to the above example!-->
      
      
    </section>

    <section title="Extension to Email/query for S/MIME decryption">

      <t>
        <xref target="RFC8621"/> defines Email/query method for searching for email messages.
        This document defines the following additional request arguments to the *FilterCondition*
        object that can be used to search for S/MIME signed and/or encrypted messages:<vspace/>

        <list style="bullets">

<!--From RFC 8551, Section 3.2.1:

Media Type                                                File Extension
   application/pkcs7-mime (SignedData, EnvelopedData,           .p7m
      AuthEnvelopedData)
   application/pkcs7-mime (degenerate SignedData certificate    .p7c
      management message)
   application/pkcs7-mime (CompressedData)                      .p7z
   application/pkcs7-signature (SignedData)                     .p7s
-->

          <t>
            isEncrypted: "Boolean" (default: false)<vspace/>

            If isEncrypted is true, then an Email matches this condition
            if it has a "Cryptographic Envelope" that contains an encryption
            (PKCS7 enveloped-data or PKCS7 authEnveloped-data) "Cryptographic Layer".

            [[Alexey: Do we want to limit this to S/MIME encryption and not OpenPGP?]]
          </t>

          <t>
            isNotEncrypted: "Boolean" (default: false)<vspace/>

            If isNotEncrypted is true, then an Email matches this condition
            if it doesn't have a "Cryptographic Envelope" or it has a "Cryptographic Envelope",
            but it doesn't include any encryption (PKCS7 enveloped-data or PKCS7 authEnveloped-data)
            "Cryptographic Layer".
          </t>

          <t>
            isSigned: "Boolean" (default: false)<vspace/>

            If isSigned is true, then an Email matches this condition
            if it has a "Cryptographic Envelope" that contain a Multipart Signed
            or PKCS7 signed-data "Cryptographic Layer".

            [[Alexey: Do we want to limit this to S/MIME signing and not OpenPGP?]]
          </t>

          <t>
            isNotSigned: "Boolean" (default: false)<vspace/>

            If isNotSigned is true, then an Email matches this condition
            if it doesn't have a "Cryptographic Envelope" or it has a "Cryptographic Envelope",
            but it doesn't include any Multipart Signed or PKCS7 signed-data
            "Cryptographic Layer".
          </t>

        </list>
      </t>

      <!--///The following example will only work for the top level media type "application/pkcs7-mime"
      
                   [[ "Email/query", {
                     "accountId": "x",
                     "filter": { "header": ["Content-Type", "application/pkcs7-mime"] },
                     "position": 0,
                     "limit": 10
                   }, "0" ],
                   [ "Email/get", {
                     "accountId": "x",
                     "#ids": {
                       "resultOf": "0",
                       "name": "Email/query",
                       "path": "/ids"
                     }
                   }, "1" ]]

      -->


    </section>

    <section title="IANA Considerations">

      <section title='JMAP capability registration for "smime-advanced"'>

        <t>
          IANA is requested to register the "smime" JMAP Capability as follows:
        </t>

        <t>
          Capability Name: "urn:ietf:params:jmap:smime-advanced"
        </t>

        <t>
          Specification document: this document
        </t>

        <t>
          Intended use: common
        </t>

        <t>
          Change Controller: IETF
        </t>

        <t>
          Security and privacy considerations: this document, <xref target="seccons"/>
        </t>

      </section>
      
      <section title='JMAP Error Codes Registry Updates'>

        <section title='signedSenderNotAllowed error code'>
          
          <t>
          JMAP Error Code: signedSenderNotAllowed
          </t>

          <t>
          Intended use: common
          </t>

          <t>
          Change controller: IETF
          </t>

          <t>
          Reference: This document, <xref target="smime"/>
          </t>

          <t>
          Description: JMAP account is not authorized to S/MIME sign message as
          the specified sender.
          </t>
        
        </section>

        <section title='validEncryptionKeyNotFound error code'>
          <t>
          JMAP Error Code: validEncryptionKeyNotFound
          </t>

          <t>
          Intended use: common
          </t>

          <t>
          Change controller: IETF
          </t>

          <t>
          Reference: This document, <xref target="smime"/>
          </t>

          <t>
          Description: S/MIME encrypted message can't be generated because
          no valid certificate (non expired and non revoked) can be found
          for one of recipients.
          </t>
        </section>

      </section>
  
    </section>

    <section title="Security Considerations" anchor="seccons">

      <t>This JMAP extension assumes trust between the user and the JMAP server for purposes of signing and encrypting messages on user's behalf.
      <!--This might break "end-to-end encrypted" guarantee that might be expected from use of S/MIME.-->
      </t>
      
      <t>This JMAP extension also relies on access to user's (or organization's) addressbook which contain up-to-date certificates for recipients.
      </t>

      <t>This JMAP extension doesn't support management of user's private keys and corresponding certificates.</t>

      <!--
      <t>TBD. Server that lies?</t>
      -->

    </section>
    
  </middle>
  <back>
    <references title="Normative References">
      <?rfc include="reference.RFC.1847"?> <!-- Multipart/signed and multipart/encrypted -->
      <?rfc include="reference.RFC.2119"?> <!-- Keywords -->
      <?rfc include="reference.RFC.8550"?> <!-- S/MIME Certificate Handling -->
      <?rfc include="reference.RFC.8551"?> <!-- S/MIME Message Format -->
      <?rfc include="reference.RFC.8620"?> <!-- JMAP Core -->
      <?rfc include="reference.RFC.8621"?> <!-- JMAP Mail -->

      <reference anchor="draft-ietf-lamps-header-protection" target="https://datatracker.ietf.org/doc/html/draft-ietf-lamps-header-protection-20">
        <front>
          <title>Header Protection for Cryptographically Protected E-mail</title>
          <author fullname="Daniel Kahn Gillmor" initials="D. K." surname="Gillmor">
            <organization>American Civil Liberties Union</organization>
          </author>
          <author fullname="Bernie Hoeneisen" initials="B." surname="Hoeneisen">
            <organization>pEp Foundation</organization>
          </author>
          <author fullname="Alexey Melnikov" initials="A." surname="Melnikov">
            <organization>Isode Ltd</organization>
          </author>
          <date day="01" month="March" year="2024"/>
          <abstract>
            <t>S/MIME version 3.1 introduced a mechanism to provide end-to-end cryptographic protection of e-mail message headers. However, few implementations generate messages using this mechanism, and several legacy implementations have revealed rendering or security issues when handling such a message. This document updates the S/MIME specification to offer a different mechanism that provides the same cryptographic protections but with fewer downsides when handled by legacy clients. The header protection schemes described here are also applicable to messages with PGP/MIME cryptographic protections. Furthermore, this document offers more explicit guidance for clients when generating or handling e-mail messages with cryptographic protection of message headers.</t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-header-protection-20"/>
      </reference>
      
      <reference anchor="draft-ietf-lamps-e2e-mail-guidance" target="https://datatracker.ietf.org/doc/html/draft-ietf-lamps-e2e-mail-guidance-15">
        <front>
          <title>Guidance on End-to-End E-mail Security</title>
          <author fullname="Daniel Kahn Gillmor" initials="D. K." surname="Gillmor">
            <organization>American Civil Liberties Union</organization>
          </author>
          <author fullname="Bernie Hoeneisen" initials="B." surname="Hoeneisen">
            <organization>pEp Foundation</organization>
          </author>
          <author fullname="Alexey Melnikov" initials="A." surname="Melnikov">
            <organization>Isode Ltd</organization>
          </author>
          <date day="01" month="March" year="2024"/>
          <abstract>
            <t>End-to-end cryptographic protections for e-mail messages can provide useful security. However, the standards for providing cryptographic protection are extremely flexible. That flexibility can trap users and cause surprising failures. This document offers guidance for mail user agent implementers to help mitigate those risks, and to make end-to-end e-mail simple and secure for the end user. It provides a useful set of vocabulary as well as suggestions to avoid common failures. It also identifies a number of currently unsolved usability and interoperability problems.</t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-e2e-mail-guidance-15"/>
      </reference>
    

    </references>

    <references title="Informative References">

      <?rfc include="reference.RFC.9404"?> <!-- JMAP Blob Management Extension -->

    </references>

    <section title="Acknowledgements">
	
      <t>Thank you to Phillip Tao and Neil Jenkins for suggestions, comments and corrections on this document.</t>

    </section>
    
  </back>
</rfc>
