summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc7444.txt
diff options
context:
space:
mode:
authorThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
committerThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
commit4bfd864f10b68b71482b35c818559068ef8d5797 (patch)
treee3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc7444.txt
parentea76e11061bda059ae9f9ad130a9895cc85607db (diff)
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc7444.txt')
-rw-r--r--doc/rfc/rfc7444.txt899
1 files changed, 899 insertions, 0 deletions
diff --git a/doc/rfc/rfc7444.txt b/doc/rfc/rfc7444.txt
new file mode 100644
index 0000000..00b9d5a
--- /dev/null
+++ b/doc/rfc/rfc7444.txt
@@ -0,0 +1,899 @@
+
+
+
+
+
+
+Independent Submission K. Zeilenga
+Request for Comments: 7444 A. Melnikov
+Category: Informational Isode Limited
+ISSN: 2070-1721 February 2015
+
+
+ Security Labels in Internet Email
+
+Abstract
+
+ This document describes a header field, SIO-Label, for use in
+ Internet email to convey the sensitivity of the message. This header
+ field may carry a textual representation (a display marking) and/or a
+ structural representation (a security label) of the sensitivity of
+ the message. This document also describes a header field, SIO-Label-
+ History, for recording changes in the message's label.
+
+Status of This Memo
+
+ This document is not an Internet Standards Track specification; it is
+ published for informational purposes.
+
+ This is a contribution to the RFC Series, independently of any other
+ RFC stream. The RFC Editor has chosen to publish this document at
+ its discretion and makes no statement about its value for
+ implementation or deployment. Documents approved for publication by
+ the RFC Editor are not a candidate for any level of Internet
+ Standard; see Section 2 of RFC 5741.
+
+ Information about the current status of this document, any errata,
+ and how to provide feedback on it may be obtained at
+ http://www.rfc-editor.org/info/rfc7444.
+
+Copyright Notice
+
+ Copyright (c) 2015 IETF Trust and the persons identified as the
+ document authors. All rights reserved.
+
+ This document is subject to BCP 78 and the IETF Trust's Legal
+ Provisions Relating to IETF Documents
+ (http://trustee.ietf.org/license-info) in effect on the date of
+ publication of this document. Please review these documents
+ carefully, as they describe your rights and restrictions with respect
+ to this document.
+
+
+
+
+
+
+
+Zeilenga & Melnikov Informational [Page 1]
+
+RFC 7444 Security Labels in Internet Email February 2015
+
+
+Table of Contents
+
+ 1. Introduction ....................................................2
+ 1.1. Relationship to Inline Sensitivity Markings ................3
+ 1.2. Relationship to Preexisting Security Label Header Fields ...4
+ 1.3. Relationship to Enhanced Security Services for S/MIME ......4
+ 2. Conventions Used in This Document ...............................5
+ 3. Overview ........................................................5
+ 4. The SIO-Label Header Field ......................................6
+ 5. The SIO-Label-History Header Field ..............................9
+ 6. IANA Considerations ............................................12
+ 7. Security Considerations ........................................12
+ 8. References .....................................................14
+ 8.1. Normative References ......................................14
+ 8.2. Informative References ....................................15
+ Acknowledgements ..................................................16
+ Authors' Addresses ................................................16
+
+1. Introduction
+
+ A security label, sometimes referred to as a confidentiality label,
+ is a structured representation of the sensitivity of a piece of
+ information. A security label can be used in conjunction with a
+ clearance, a structured representation of what sensitive information
+ a person (or other entity) is authorized to access, and a security
+ policy to control access to each piece of information. For instance,
+ an email message could have an "EXAMPLE CONFIDENTIAL" label that
+ requires the sender and the receiver to have a clearance granting
+ access to information labeled "EXAMPLE CONFIDENTIAL". X.841 [X.841]
+ provides a discussion of security labels, clearances, and security
+ policy.
+
+ A display marking is a textual representation of the sensitivity of a
+ piece of information. For instance, "EXAMPLE CONFIDENTIAL" is a
+ textual representation of the sensitivity. A security policy can be
+ used to generate display markings from security labels. Display
+ markings are generally expected to be prominently displayed whenever
+ the content is displayed.
+
+ Sensitivity-based authorization is used in networks that operate
+ under a set of information classification rules, such as in
+ government and military agency networks. The standardized formats
+ for security labels, clearances, security policy, and associated
+ authorization models are generalized and can be used in non-
+ government deployments where appropriate.
+
+
+
+
+
+
+Zeilenga & Melnikov Informational [Page 2]
+
+RFC 7444 Security Labels in Internet Email February 2015
+
+
+ Security labels may also be used for purposes other than
+ authorization. In particular, they may be used simply to convey the
+ sensitivity of a piece information. The security label could be
+ used, for instance, to organize content in a content store.
+
+ This document describes a protocol for conveying the sensitivity of a
+ electronic mail message [RFC5322] as a whole. In particular, this
+ document describes a header field, SIO-Label, that carries a security
+ label, a display marking, and display colors. This document also
+ describes a header field, SIO-Label-History, that records changes in
+ the message's security label.
+
+ This protocol is based in part upon "XEP-0258: Security Labels in
+ XMPP" [XEP258].
+
+1.1. Relationship to Inline Sensitivity Markings
+
+ In environments requiring messages to be marked with an indication of
+ their sensitivity, it is common to place a textual representation of
+ the sensitivity, a display marking, within the body to the message
+ and/or in the Subject header field. For instance, the authors often
+ receives messages of the form:
+
+ To: author <author@example.com>;
+ From: Some One <someone@example.net>;
+ Subject: the subject (UNCLASSIFIED)
+
+ UNCLASSIFIED
+
+ Text of the message.
+
+ UNCLASSIFIED
+
+ Typically, when placed in the body of the message, the marking is
+ inserted into the content such that it appears as the first line(s)
+ of text in the body of the message. This is known as a FLOT (First
+ Line(s) of Text) marking. The marking may or may not be surrounded
+ by other text indicating that the marking denotes the sensitivity of
+ the message. A FLOT may also be accompanied by a LLOT (Last Line(s)
+ of Text) marking. The message above contains a two-line FLOT and a
+ two-line LLOT (in both cases, a line providing the marking and an
+ empty line between the marking and the original content appear).
+
+ Typically, when placed in the Subject of the message, the marking is
+ inserted before or after the contents of the original Subject field;
+ it is surrounded by parentheses or the like and/or separated from the
+ content by white space.
+
+
+
+
+Zeilenga & Melnikov Informational [Page 3]
+
+RFC 7444 Security Labels in Internet Email February 2015
+
+
+ The particular syntax and semantics of inline sensitivity markings
+ are generally a local matter. This hinders interoperability within
+ an organization wanting to take actions based upon these markings and
+ hinders interoperability between cooperating organizations wanting to
+ usefully share sensitivity information
+
+ The authors expect that such markings will continue to be widely
+ used, especially in the absence of ubiquitous support for a
+ standardized header field indicating the sensitivity of the message.
+
+ The authors hope that through the use of a formally specified header
+ field, interoperability within organizations and between
+ organizations can be improved.
+
+1.2. Relationship to Preexisting Security Label Header Fields
+
+ A number of non-standard header fields, such as the X-X411 field, are
+ used to carry a representation of the sensitivity of the message,
+ whether a structured representation or textual representation.
+
+ The authors hope that the use of preexisting (non-standard) header
+ fields will be replaced, over time, with the use of the header field
+ described in this document.
+
+1.3. Relationship to Enhanced Security Services for S/MIME
+
+ Enhanced Security Services for S/MIME (ESS) [RFC2634] provides,
+ amongst other services, signature services "for content integrity,
+ non-repudiation with the proof of origin, and [securely] binding
+ attributes (such as a security label) to the original content".
+
+ While it may be possible to utilize the protocol described in this
+ document concurrently with ESS, this protocol should generally be
+ viewed as an alternative to ESS.
+
+ It is noted that in ESS, the security label applies to MIME [RFC2045]
+ content, where in this protocol, the label applies to the message as
+ a whole.
+
+ It is also noted that in ESS, security labels are securely bound to
+ the MIME content through the use of digital signatures. This
+ protocol does not provide message-signing services and hence does not
+ provide secure binding the label to the message, content integrity,
+ or non-repudiation of the proof of origin.
+
+ This protocol is designed for situations/environments where message
+ signing is not necessary to provide sufficient security.
+
+
+
+
+Zeilenga & Melnikov Informational [Page 4]
+
+RFC 7444 Security Labels in Internet Email February 2015
+
+
+2. Conventions Used in This Document
+
+ The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
+ "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
+ document are to be interpreted as described in [RFC2119].
+
+ The formal syntax specifications in this document use the Augmented
+ Backus-Naur Form (ABNF) as described in [RFC5234].
+
+ The term "base64 encoding" is used to refer to the "Base 64 encoding"
+ defined in Section 4 of [RFC4648]. The term "BER encoding" is used
+ to refer to encoding per the Basic Encoding Rules (BER) as defined in
+ [X.690].
+
+3. Overview
+
+ A Mail User Agent (MUA) originating a message can, if so configured,
+ offer the user a menu of sensitivities to choose from and, upon
+ selection, insert the display marking, foreground and background
+ colors, and security label parameters associated with that selection
+ into the SIO-Label header field of the message.
+
+ Mail Submission Agents (MSAs), Mail Transfer Agents (MTAs), and Mail
+ Delivery Agents (MDAs) can then, if so configured, use the provided
+ sensitivity information (or lack thereof) in determining whether to
+ accept, forward, or otherwise act on the message as submitted. These
+ agents, hereafter referred to as Service Agents (SAs), can, if so
+ configured, modify the sensitivity information of the message, such
+ as replacing the security label and/or display marking with
+ equivalent representations of the sensitivity of the message. SAs
+ that add, modify, or delete the SIO-Label header field SHOULD add an
+ SIO-Label-History header.
+
+ Receiving MUAs that implement this extension SHALL, when displaying
+ the message, also prominently display the marking, if any, conveyed
+ in the SIO-Label header field or, if policy-aware and configured to
+ display locally generated markings, a marking generated by the
+ conveyed label and the governing policy. It is also desirable to
+ display this marking in listings of messages. In the case the
+ conveyed marking is displayed, the marking SHOULD be displayed using
+ the foreground and background colors conveyed in the header field.
+ In the case the marking was generated from a conveyed label and the
+ governing policy, the marking SHOULD be displayed using the
+ foreground and background colors conveyed by the governing policy.
+
+
+
+
+
+
+
+Zeilenga & Melnikov Informational [Page 5]
+
+RFC 7444 Security Labels in Internet Email February 2015
+
+
+ While MUAs are not expected to make authorization decisions based
+ upon values of the SIO-Label header field, MUAs can otherwise use the
+ provided sensitivity information (or lack thereof) in determining how
+ to act on the message. For instance, the MUA may organize messages
+ in its store of messages based upon the content of this header field.
+
+4. The SIO-Label Header Field
+
+ The header field name is "SIO-Label", and its content is a set of
+ key/value pairs, each referred to as a parameter.
+
+ Formal header field syntax:
+
+ sio-label = "SIO-Label:" [FWS] sio-label-parm-seq [FWS] CRLF
+
+ sio-label-parm-seq = sio-label-parm
+ [ [FWS] ";" [FWS] sio-label-parm-seq ]
+
+ sio-label-parm = parameter
+
+ where the parameter production is defined in [RFC2231], the FWS
+ production is defined in [RFC5322], and the CRLF production is
+ defined in [RFC5234]. It is noted that the productions defined in
+ [RFC2231] rely on the ABNF in [RFC0822], which implicitly allows for
+ white space in certain cases. In particular, white space is
+ implicitly allowed in the parameter production immediately before and
+ after the "=". It is also noted that [RFC2231] allows for quoted-
+ string values (for parameter production) of substantial length, for
+ string characters outside of US-ASCII, or for other such cases.
+ Implementors should consult the referenced specifications for
+ details.
+
+ The "marking" parameter is a display string for use by
+ implementations that are unable or unwilling to utilize the governing
+ security policy to generate display markings. The "marking"
+ parameter SHOULD generally be provided in SIO-Label header fields.
+ It ought only be absent where an SA relies on other SAs to generate
+ the marking.
+
+ The "fgcolor" and "bgcolor" parameters are tokens restricted to color
+ production representing the foreground and background colors,
+ respectively, for use in colorizing the display marking string.
+ Their values are RGB colors in hexadecimal format (e.g., "#ff0000"),
+ or one of the Cascading Style Sheets (CSS) color names (e.g., "red")
+ given in named-color type below (the 16 HTML4 colors + "orange")
+ [CSS3-Color]. The default foreground color is black. The default
+
+
+
+
+
+Zeilenga & Melnikov Informational [Page 6]
+
+RFC 7444 Security Labels in Internet Email February 2015
+
+
+ background is white. The "fgcolor" and "bgcolor" parameters SHALL be
+ absent if the "marking" parameter is absent. The HEXDIG production
+ below is defined in [RFC5234].
+
+ Formal color syntax:
+
+ color = hex-color / named-color
+
+ hex-color = "#" 6HEXDIG ; Hex-encoded RGB
+
+ named-color =
+ "aqua" /
+ "black" /
+ "blue" /
+ "fuschia" /
+ "gray" /
+ "green" /
+ "lime" /
+ "maroon" /
+ "navy" /
+ "olive" /
+ "purple" /
+ "red" /
+ "silver" /
+ "teal" /
+ "white" /
+ "yellow" /
+ "orange" ; named colors
+
+ The "type" parameter is a quoted string containing the string ":ess",
+ the string ":x411", the string ":xml", or a URI [RFC3986] denoting
+ the type and encoding of the "label" parameter. The "label"
+ parameter value is a quoted string. The "type" parameter SHALL be
+ present if the "label" parameter is present. The "label" parameter
+ SHALL be present if the "type" parameter is present. When
+ sensitivity-based authorization is performed, the absence of the
+ "type" and "label" parameters indicates that the message is handled
+ under default handling rules (e.g., as if no SIO-Label was present).
+
+ The string ":ess" indicates that the "label" parameter value is the
+ base64 encoding of the BER encoding of an ESS security label
+ [RFC2634].
+
+
+
+
+
+
+
+
+
+Zeilenga & Melnikov Informational [Page 7]
+
+RFC 7444 Security Labels in Internet Email February 2015
+
+
+ ESS Label Example:
+
+ SIO-Label: marking="EXAMPLE CONFIDENTIAL";
+ fgcolor=black; bgcolor=red;
+ type=":ess"; label="MQYGASkCAQM="
+
+ The string ":x411" indicates that the "label" parameter value is the
+ base64 encoding of the BER encoding of an X.411 security label
+ [X.411].
+
+ X.411 Label Example:
+
+ SIO-Label: marking="EXAMPLE CONFIDENTIAL";
+ fgcolor=black; bgcolor=red;
+ type=":x411"; label="MQYGASkCAQM="
+
+ The string ":xml" indicates that the "label" parameter value is the
+ base64 encoding of a security label represented using [XML]. The XML
+ prolog SHOULD be absent unless specifically required (such as when
+ the character encoding is not UTF-8). The particular flavor of
+ security label representation is indicated by the root element name
+ and its name space.
+
+ XML Label Example:
+
+ SIO-Label: marking="EXAMPLE CONFIDENTIAL";
+ fgcolor=black; bgcolor=red;
+ type=":xml";
+ label*0="PFNlY0xhYmVsIHhtbG5zPSJodHRwOi8vZXhhbX";
+ label*1="BsZS5jb20vc2VjLWxhYmVsLzAiPjxQb2xpY3lJ";
+ label*2="ZGVudGlmaWVyIFVSST0idXJuOm9pZDoxLjEiLz";
+ label*3="48Q2xhc3NpZmljYXRpb24+MzwvQ2xhc3NpZmlj";
+ label*4="YXRpb24+PC9TZWNMYWJlbD4=";
+
+ where the XML label, with new lines and white space added for
+ readability, is:
+
+ <SecLabel xmlns="http://example.com/sec-label/0">
+ <PolicyIdentifier URI="urn:oid:1.1"/>
+ <Classification>3</Classification>
+ </SecLabel>
+
+ The ":ess" and ":x411" formats SHOULD be used to represent ESS or
+ X.411 security labels, respectively, instead of any direct XML
+ representation of these formats.
+
+ The header field SHALL minimally contain a "marking" parameter or
+ contain both the "type" and "label" parameters.
+
+
+
+Zeilenga & Melnikov Informational [Page 8]
+
+RFC 7444 Security Labels in Internet Email February 2015
+
+
+ This header field may be extended to include additional parameters by
+ future document formally updating (or replacing) this document.
+ Implementations SHOULD ignore additional parameters they do not
+ recognize. This recommendation is not a mandate so as to allow
+ agents to process a message with an SIO-Label header field with
+ unrecognized parameters differently than a message with an SIO-Label
+ header field without the unrecognized parameters.
+
+ Each message SHALL contain zero or one SIO-Label header field.
+
+ Extended Example:
+
+ SIO-Label: marking*=us-ascii'en'EXAMPLE%20CONFIDENTIAL;
+ fgcolor = black ; bgcolor = red ;
+ type=":ess"; label*0="MQYG";
+ label*1="ASkCAQM="
+
+ The Extended Example is equivalent to the ESS Label Example above.
+
+5. The SIO-Label-History Header Field
+
+ Any service agent MAY record label changes in an SIO-Label-History
+ header. This header field is intended to provide trace information
+ (and only trace information). For instance, it can be used to record
+ the label change when an SIO-Label header is added, modified, or
+ deleted by a service agent. This field can be used in other
+ situations as well. For instance, a gateway that translates X.400
+ messages to RFC 5322 mail can use this header field to record
+ labeling changes made while translating a message.
+
+ The SIO-Label-History header field is considered to be a trace field
+ as defined in Section 3.6.7 of [RFC5322].
+
+ The formal syntax of the SIO-Label-History header is the same as the
+ SIO-Label, but with the following parameters:
+
+ o change - one of "add", "replace", "delete".
+
+ o changed-by - contains a string identifying the agent, commonly the
+ agent's fully qualified domain name.
+
+ o changed-at - contains a date-time production, as specified in
+ [RFC5322], representing the date and time the header was
+ rewritten.
+
+ o changed-comment - contains a string containing a comment.
+
+
+
+
+
+Zeilenga & Melnikov Informational [Page 9]
+
+RFC 7444 Security Labels in Internet Email February 2015
+
+
+ o marking, fgcolor, bgcolor, type, label - records the message's
+ label information prior to adding, modifying, or deleting SIO-
+ Label, using the same parameter syntax used for SIO-Label. These
+ parameters are absent when the change action is "add".
+
+ o new-marking, new-fgcolor, new-bgcolor, new-type, new-label -
+ records the message's label information after adding, modifying,
+ or deleting SIO-Label, using the same parameter syntax used for
+ corresponding SIO-Label parameters. These parameters are absent
+ when the change type is "delete".
+
+ The header field SHALL minimally contain the "change", "changed-by",
+ and "changed-at" parameters.
+
+ This header field can be extended to include additional parameters by
+ future documents formally updating (or replacing) this document.
+
+ Each message can contain zero or more SIO-Label-History header
+ fields. All SIO-Label-History header fields should immediately
+ follow the SIO-Label header field, if any, and be grouped together.
+ Additional SIO-Label-History header fields should be added
+ immediately preceding any existing SIO-Label-History header fields.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Zeilenga & Melnikov Informational [Page 10]
+
+RFC 7444 Security Labels in Internet Email February 2015
+
+
+ SIO Label History Add, Modify, Delete Example:
+
+ SIO-Label-History: marking="EXAMPLE CONFIDENTIAL";
+ fgcolor=black; bgcolor=red;
+ type=":xml";
+ label*0="PFNlY0xhYmVsIHhtbG5zPSJodHRwOi8vZXhhbX";
+ label*1="BsZS5jb20vc2VjLWxhYmVsLzAiPjxQb2xpY3lJ";
+ label*2="ZGVudGlmaWVyIFVSST0idXJuOm9pZDoxLjEiLz";
+ label*3="48Q2xhc3NpZmljYXRpb24+MzwvQ2xhc3NpZmlj";
+ label*4="YXRpb24+PC9TZWNMYWJlbD4=";
+ change=delete;
+ changed-by="delete.example.com";
+ changed-at="18 Feb 2013 9:24 PDT";
+ changed-comment="delete"
+ SIO-Label-History: marking="EXAMPLE CONFIDENTIAL";
+ fgcolor=black; bgcolor=red;
+ type=":ess"; label="MQYGASkCAQM=";
+ new-marking="EXAMPLE CONFIDENTIAL";
+ new-fgcolor=black; new-bgcolor=red;
+ new-type=":xml";
+ new-label*0="PFNlY0xhYmVsIHhtbG5zPSJodHRwOi8vZXhhbX";
+ new-label*1="BsZS5jb20vc2VjLWxhYmVsLzAiPjxQb2xpY3lJ";
+ new-label*2="ZGVudGlmaWVyIFVSST0idXJuOm9pZDoxLjEiLz";
+ new-label*3="48Q2xhc3NpZmljYXRpb24+MzwvQ2xhc3NpZmlj";
+ new-label*4="YXRpb24+PC9TZWNMYWJlbD4=";
+ change=replace;
+ changed-by="modify.example.net";
+ changed-at="18 Feb 2013 8:24 PDT";
+ changed-comment="replaced with XML variant"
+ SIO-Label-History: new-marking="EXAMPLE CONFIDENTIAL";
+ new-fgcolor=black; new-bgcolor=red;
+ new-type=":ess"; new-label="MQYGASkCAQM=";
+ change=add;
+ changed-by="add.example.net";
+ changed-at="18 Feb 2013 7:24 PDT";
+ changed-comment="added label"
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Zeilenga & Melnikov Informational [Page 11]
+
+RFC 7444 Security Labels in Internet Email February 2015
+
+
+6. IANA Considerations
+
+ The SIO-Label and SIO-Label-History header fields have been
+ registered in the "Provisional Message Header Field Registry" in
+ accordance with [RFC3864].
+
+ Header field name: SIO-Label
+ Applicable protocol: mail [RFC5322]
+ Status: provisional
+ Author/change controller: Kurt Zeilenga (kurt.zeilenga@isode.com)
+ Specification document(s): RFC 7444
+
+ Header field name: SIO-Label-History
+ Applicable protocol: mail [RFC5322]
+ Status: provisional
+ Author/change controller: Kurt Zeilenga (kurt.zeilenga@isode.com)
+ Specification document(s): RFC 7444
+
+7. Security Considerations
+
+ Sensitive information should be appropriately protected (whether
+ labeled or not). For email messages, it is generally appropriate for
+ the sending entity to authenticate the receiving entity and to
+ establish transport-level security, including protective services for
+ both data integrity and data confidentiality. When a receiving
+ entity makes authorization decisions based upon assertions of the
+ sending entity, including assertions of identity, it is generally
+ appropriate for the receiving entity to authenticate the sending
+ entity.
+
+ This document provides a facility for expressing the sensitivity of
+ an email message. The mere expression of actual sensitivity
+ generally does not elevate the sensitivity of the message; however,
+ expressions of sensitivities can themselves be regarded as sensitive
+ information. For instance, a marking of "BLACK PROJECT RESTRICTED"
+ could disclose the existence of a sensitivity project.
+
+ The SIO-Label header field expresses the sensitivity of the whole
+ message, including the header and body. This document does not
+ provide a means to express the sensitivity of portions of an email
+ message, such as the possibly different sensitivities of various MIME
+ parts that the message may be composed of. The approach used in this
+ document favors simplicity and ease of use (i.e., a single expression
+ of sensitivity) over the complexity and difficulty of marking and
+ labeling portions of a message.
+
+
+
+
+
+
+Zeilenga & Melnikov Informational [Page 12]
+
+RFC 7444 Security Labels in Internet Email February 2015
+
+
+ The expressed sensitivity can be used in determining how to handle a
+ message. For instance, the value of the SIO-Label header field (or
+ lack thereof) can be used to determine if it is appropriate to be
+ forwarded to a particular entity and, if so, what minimum security
+ services ought to be used in the forwarding exchange. The mechanism
+ for determining how to handle a message-based expressed sensitivity
+ is beyond the scope of this document.
+
+ The actual content may have more or less sensitivity than indicated
+ by the security label. Agents should avoid lowering security
+ requirements for message exchange with a particular entity based upon
+ conveyed sensitivity.
+
+ This protocol does not itself provide message-signing services, such
+ as used in providing message integrity protection, non-repudiation,
+ and binding of attributes (such as the security label to the
+ message). While it possible that this protocol could be used with a
+ general message-signing service, this document does not detail such
+ use.
+
+ While security label and display marking parameters are expected to
+ express the same sensitivity, nothing in this specification ensures
+ that the security label and display marking values express the same
+ sensitivity. For instance, an MUA could submit a message that
+ contains a security label that expresses one sensitivity and a
+ display marking with a different sensitivity, and by doing so,
+ possibly cause an SA to inappropriately handle the message. It is
+ generally appropriate for each SA using the SIO-Label values to
+ determine if the security label and display marking values express
+ the same sensitivity and, if not, take appropriate action (such as
+ rejecting the message).
+
+ This document also provides a facility for expressing changes to the
+ label of a message. This is intended to be used for trace purposes
+ only. It is noted that the SIO-Label-History header field can
+ include sensitive information and, as such, can be removed from the
+ message when its inclusion would result in disclosure of
+ inappropriate information.
+
+
+
+
+
+
+
+
+
+
+
+
+
+Zeilenga & Melnikov Informational [Page 13]
+
+RFC 7444 Security Labels in Internet Email February 2015
+
+
+8. References
+
+8.1. Normative References
+
+ [CSS3-Color] Celik, T. and C. Lilley, "CSS3 Color Module",
+ W3C Candidate Recommendation
+ CR-css3-color-20030514, May 2003,
+ <http://www.w3.org/TR/2003/CR-css3-color-20030514>.
+
+ [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
+ Requirement Levels", BCP 14, RFC 2119, March 1997,
+ <http://www.rfc-editor.org/info/rfc2119>.
+
+ [RFC2231] Freed, N. and K. Moore, "MIME Parameter Value and
+ Encoded Word Extensions: Character Sets, Languages, and
+ Continuations", RFC 2231, November 1997,
+ <http://www.rfc-editor.org/info/rfc2231>.
+
+ [RFC2634] Hoffman, P., Ed., "Enhanced Security Services for
+ S/MIME", RFC 2634, June 1999,
+ <http://www.rfc-editor.org/info/rfc2634>.
+
+ [RFC3864] Klyne, G., Nottingham, M., and J. Mogul, "Registration
+ Procedures for Message Header Fields", BCP 90, RFC 3864,
+ September 2004,
+ <http://www.rfc-editor.org/info/rfc3864>.
+
+ [RFC3986] Berners-Lee, T., Fielding, R., and L. Masinter, "Uniform
+ Resource Identifier (URI): Generic Syntax", STD 66, RFC
+ 3986, January 2005,
+ <http://www.rfc-editor.org/info/rfc3986>.
+
+ [RFC4648] Josefsson, S., "The Base16, Base32, and Base64 Data
+ Encodings", RFC 4648, October 2006,
+ <http://www.rfc-editor.org/info/rfc4648>.
+
+ [RFC5234] Crocker, D., Ed. and P. Overell, "Augmented BNF for
+ Syntax Specifications: ABNF", STD 68, RFC 5234, January
+ 2008, <http://www.rfc-editor.org/info/rfc5234>.
+
+ [RFC5322] Resnick, P., Ed., "Internet Message Format", RFC 5322,
+ October 2008, <http://www.rfc-editor.org/info/rfc5322>.
+
+ [X.411] ITU-T, "Message Handling Systems (MHS) - Message
+ Transfer System: Abstract Service Definition and
+ Procedures", ITU-T Recommendation X.411, June 1999.
+
+
+
+
+
+Zeilenga & Melnikov Informational [Page 14]
+
+RFC 7444 Security Labels in Internet Email February 2015
+
+
+ [X.690] ITU-T, "ASN.1 encoding rules: Specification of Basic
+ Encoding Rules (BER), Canonical Encoding Rules (CER) and
+ Distinguished Encoding Rules (DER)", ITU-T
+ Recommendation X.690, November 2008.
+
+ [XML] Bray, T., Paoli, J., Sperberg-McQueen, C., Maler, E.,
+ and F. Yergeau, "Extensible Markup Language (XML) 1.0
+ (Fifth Edition)", W3C Recommendation REC-xml-20081126,
+ November 2008,
+ <http://www.w3.org/TR/2008/REC-xml-20081126>.
+
+8.2. Informative References
+
+ [RFC0822] Crocker, D., "STANDARD FOR THE FORMAT OF ARPA INTERNET
+ TEXT MESSAGES", STD 11, RFC 822, August 1982,
+ <http://www.rfc-editor.org/info/rfc822>.
+
+ [RFC2045] Freed, N. and N. Borenstein, "Multipurpose Internet Mail
+ Extensions (MIME) Part One: Format of Internet Message
+ Bodies", RFC 2045, November 1996,
+ <http://www.rfc-editor.org/info/rfc2045>.
+
+ [X.841] ITU-T, "Security information objects for access
+ control", ITU-T Recommendation X.841, October 2000.
+
+ [XEP258] Zeilenga, K., "XEP-0258: Security Labels in XMPP", XEP
+ XMPP Extension Protocols, April 2013.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Zeilenga & Melnikov Informational [Page 15]
+
+RFC 7444 Security Labels in Internet Email February 2015
+
+
+Acknowledgements
+
+ The authors appreciate the review, comment, and text provided by
+ community members, including Dave Cridland, Brad Hards, Russ Housley,
+ Steve Kille, Graeme Lunt, Alan Ross, Jim Schaad, and David Wilson.
+
+Authors' Addresses
+
+ Kurt Zeilenga
+ Isode Limited
+
+ EMail: Kurt.Zeilenga@isode.com
+
+
+ Alexey Melnikov
+ Isode Limited
+ 14 Castle Mews
+ Hampton, Middlesex TW12 2NP
+ United Kingdom
+
+ EMail: Alexey.Melnikov@isode.com
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Zeilenga & Melnikov Informational [Page 16]
+