diff options
Diffstat (limited to 'doc/rfc/rfc7444.txt')
| -rw-r--r-- | doc/rfc/rfc7444.txt | 899 | 
1 files changed, 899 insertions, 0 deletions
diff --git a/doc/rfc/rfc7444.txt b/doc/rfc/rfc7444.txt new file mode 100644 index 0000000..00b9d5a --- /dev/null +++ b/doc/rfc/rfc7444.txt @@ -0,0 +1,899 @@ + + + + + + +Independent Submission                                       K. Zeilenga +Request for Comments: 7444                                   A. Melnikov +Category: Informational                                    Isode Limited +ISSN: 2070-1721                                            February 2015 + + +                   Security Labels in Internet Email + +Abstract + +   This document describes a header field, SIO-Label, for use in +   Internet email to convey the sensitivity of the message.  This header +   field may carry a textual representation (a display marking) and/or a +   structural representation (a security label) of the sensitivity of +   the message.  This document also describes a header field, SIO-Label- +   History, for recording changes in the message's label. + +Status of This Memo + +   This document is not an Internet Standards Track specification; it is +   published for informational purposes. + +   This is a contribution to the RFC Series, independently of any other +   RFC stream.  The RFC Editor has chosen to publish this document at +   its discretion and makes no statement about its value for +   implementation or deployment.  Documents approved for publication by +   the RFC Editor are not a candidate for any level of Internet +   Standard; see Section 2 of RFC 5741. + +   Information about the current status of this document, any errata, +   and how to provide feedback on it may be obtained at +   http://www.rfc-editor.org/info/rfc7444. + +Copyright Notice + +   Copyright (c) 2015 IETF Trust and the persons identified as the +   document authors.  All rights reserved. + +   This document is subject to BCP 78 and the IETF Trust's Legal +   Provisions Relating to IETF Documents +   (http://trustee.ietf.org/license-info) in effect on the date of +   publication of this document.  Please review these documents +   carefully, as they describe your rights and restrictions with respect +   to this document. + + + + + + + +Zeilenga & Melnikov           Informational                     [Page 1] + +RFC 7444            Security Labels in Internet Email      February 2015 + + +Table of Contents + +   1. Introduction ....................................................2 +      1.1. Relationship to Inline Sensitivity Markings ................3 +      1.2. Relationship to Preexisting Security Label Header Fields ...4 +      1.3. Relationship to Enhanced Security Services for S/MIME ......4 +   2. Conventions Used in This Document ...............................5 +   3. Overview ........................................................5 +   4. The SIO-Label Header Field ......................................6 +   5. The SIO-Label-History Header Field ..............................9 +   6. IANA Considerations ............................................12 +   7. Security Considerations ........................................12 +   8. References .....................................................14 +      8.1. Normative References ......................................14 +      8.2. Informative References ....................................15 +   Acknowledgements ..................................................16 +   Authors' Addresses ................................................16 + +1.  Introduction + +   A security label, sometimes referred to as a confidentiality label, +   is a structured representation of the sensitivity of a piece of +   information.  A security label can be used in conjunction with a +   clearance, a structured representation of what sensitive information +   a person (or other entity) is authorized to access, and a security +   policy to control access to each piece of information.  For instance, +   an email message could have an "EXAMPLE CONFIDENTIAL" label that +   requires the sender and the receiver to have a clearance granting +   access to information labeled "EXAMPLE CONFIDENTIAL".  X.841 [X.841] +   provides a discussion of security labels, clearances, and security +   policy. + +   A display marking is a textual representation of the sensitivity of a +   piece of information.  For instance, "EXAMPLE CONFIDENTIAL" is a +   textual representation of the sensitivity.  A security policy can be +   used to generate display markings from security labels.  Display +   markings are generally expected to be prominently displayed whenever +   the content is displayed. + +   Sensitivity-based authorization is used in networks that operate +   under a set of information classification rules, such as in +   government and military agency networks.  The standardized formats +   for security labels, clearances, security policy, and associated +   authorization models are generalized and can be used in non- +   government deployments where appropriate. + + + + + + +Zeilenga & Melnikov           Informational                     [Page 2] + +RFC 7444            Security Labels in Internet Email      February 2015 + + +   Security labels may also be used for purposes other than +   authorization.  In particular, they may be used simply to convey the +   sensitivity of a piece information.  The security label could be +   used, for instance, to organize content in a content store. + +   This document describes a protocol for conveying the sensitivity of a +   electronic mail message [RFC5322] as a whole.  In particular, this +   document describes a header field, SIO-Label, that carries a security +   label, a display marking, and display colors.  This document also +   describes a header field, SIO-Label-History, that records changes in +   the message's security label. + +   This protocol is based in part upon "XEP-0258: Security Labels in +   XMPP" [XEP258]. + +1.1.  Relationship to Inline Sensitivity Markings + +   In environments requiring messages to be marked with an indication of +   their sensitivity, it is common to place a textual representation of +   the sensitivity, a display marking, within the body to the message +   and/or in the Subject header field.  For instance, the authors often +   receives messages of the form: + +   To: author <author@example.com>; +   From: Some One <someone@example.net>; +   Subject: the subject (UNCLASSIFIED) + +   UNCLASSIFIED + +   Text of the message. + +   UNCLASSIFIED + +   Typically, when placed in the body of the message, the marking is +   inserted into the content such that it appears as the first line(s) +   of text in the body of the message.  This is known as a FLOT (First +   Line(s) of Text) marking.  The marking may or may not be surrounded +   by other text indicating that the marking denotes the sensitivity of +   the message.  A FLOT may also be accompanied by a LLOT (Last Line(s) +   of Text) marking.  The message above contains a two-line FLOT and a +   two-line LLOT (in both cases, a line providing the marking and an +   empty line between the marking and the original content appear). + +   Typically, when placed in the Subject of the message, the marking is +   inserted before or after the contents of the original Subject field; +   it is surrounded by parentheses or the like and/or separated from the +   content by white space. + + + + +Zeilenga & Melnikov           Informational                     [Page 3] + +RFC 7444            Security Labels in Internet Email      February 2015 + + +   The particular syntax and semantics of inline sensitivity markings +   are generally a local matter.  This hinders interoperability within +   an organization wanting to take actions based upon these markings and +   hinders interoperability between cooperating organizations wanting to +   usefully share sensitivity information + +   The authors expect that such markings will continue to be widely +   used, especially in the absence of ubiquitous support for a +   standardized header field indicating the sensitivity of the message. + +   The authors hope that through the use of a formally specified header +   field, interoperability within organizations and between +   organizations can be improved. + +1.2.  Relationship to Preexisting Security Label Header Fields + +   A number of non-standard header fields, such as the X-X411 field, are +   used to carry a representation of the sensitivity of the message, +   whether a structured representation or textual representation. + +   The authors hope that the use of preexisting (non-standard) header +   fields will be replaced, over time, with the use of the header field +   described in this document. + +1.3.  Relationship to Enhanced Security Services for S/MIME + +   Enhanced Security Services for S/MIME (ESS) [RFC2634] provides, +   amongst other services, signature services "for content integrity, +   non-repudiation with the proof of origin, and [securely] binding +   attributes (such as a security label) to the original content". + +   While it may be possible to utilize the protocol described in this +   document concurrently with ESS, this protocol should generally be +   viewed as an alternative to ESS. + +   It is noted that in ESS, the security label applies to MIME [RFC2045] +   content, where in this protocol, the label applies to the message as +   a whole. + +   It is also noted that in ESS, security labels are securely bound to +   the MIME content through the use of digital signatures.  This +   protocol does not provide message-signing services and hence does not +   provide secure binding the label to the message, content integrity, +   or non-repudiation of the proof of origin. + +   This protocol is designed for situations/environments where message +   signing is not necessary to provide sufficient security. + + + + +Zeilenga & Melnikov           Informational                     [Page 4] + +RFC 7444            Security Labels in Internet Email      February 2015 + + +2.  Conventions Used in This Document + +   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", +   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this +   document are to be interpreted as described in [RFC2119]. + +   The formal syntax specifications in this document use the Augmented +   Backus-Naur Form (ABNF) as described in [RFC5234]. + +   The term "base64 encoding" is used to refer to the "Base 64 encoding" +   defined in Section 4 of [RFC4648].  The term "BER encoding" is used +   to refer to encoding per the Basic Encoding Rules (BER) as defined in +   [X.690]. + +3.  Overview + +   A Mail User Agent (MUA) originating a message can, if so configured, +   offer the user a menu of sensitivities to choose from and, upon +   selection, insert the display marking, foreground and background +   colors, and security label parameters associated with that selection +   into the SIO-Label header field of the message. + +   Mail Submission Agents (MSAs), Mail Transfer Agents (MTAs), and Mail +   Delivery Agents (MDAs) can then, if so configured, use the provided +   sensitivity information (or lack thereof) in determining whether to +   accept, forward, or otherwise act on the message as submitted.  These +   agents, hereafter referred to as Service Agents (SAs), can, if so +   configured, modify the sensitivity information of the message, such +   as replacing the security label and/or display marking with +   equivalent representations of the sensitivity of the message.  SAs +   that add, modify, or delete the SIO-Label header field SHOULD add an +   SIO-Label-History header. + +   Receiving MUAs that implement this extension SHALL, when displaying +   the message, also prominently display the marking, if any, conveyed +   in the SIO-Label header field or, if policy-aware and configured to +   display locally generated markings, a marking generated by the +   conveyed label and the governing policy.  It is also desirable to +   display this marking in listings of messages.  In the case the +   conveyed marking is displayed, the marking SHOULD be displayed using +   the foreground and background colors conveyed in the header field. +   In the case the marking was generated from a conveyed label and the +   governing policy, the marking SHOULD be displayed using the +   foreground and background colors conveyed by the governing policy. + + + + + + + +Zeilenga & Melnikov           Informational                     [Page 5] + +RFC 7444            Security Labels in Internet Email      February 2015 + + +   While MUAs are not expected to make authorization decisions based +   upon values of the SIO-Label header field, MUAs can otherwise use the +   provided sensitivity information (or lack thereof) in determining how +   to act on the message.  For instance, the MUA may organize messages +   in its store of messages based upon the content of this header field. + +4.  The SIO-Label Header Field + +   The header field name is "SIO-Label", and its content is a set of +   key/value pairs, each referred to as a parameter. + +   Formal header field syntax: + +   sio-label = "SIO-Label:" [FWS] sio-label-parm-seq [FWS] CRLF + +   sio-label-parm-seq = sio-label-parm +       [ [FWS] ";" [FWS] sio-label-parm-seq ] + +   sio-label-parm = parameter + +   where the parameter production is defined in [RFC2231], the FWS +   production is defined in [RFC5322], and the CRLF production is +   defined in [RFC5234].  It is noted that the productions defined in +   [RFC2231] rely on the ABNF in [RFC0822], which implicitly allows for +   white space in certain cases.  In particular, white space is +   implicitly allowed in the parameter production immediately before and +   after the "=".  It is also noted that [RFC2231] allows for quoted- +   string values (for parameter production) of substantial length, for +   string characters outside of US-ASCII, or for other such cases. +   Implementors should consult the referenced specifications for +   details. + +   The "marking" parameter is a display string for use by +   implementations that are unable or unwilling to utilize the governing +   security policy to generate display markings.  The "marking" +   parameter SHOULD generally be provided in SIO-Label header fields. +   It ought only be absent where an SA relies on other SAs to generate +   the marking. + +   The "fgcolor" and "bgcolor" parameters are tokens restricted to color +   production representing the foreground and background colors, +   respectively, for use in colorizing the display marking string. +   Their values are RGB colors in hexadecimal format (e.g., "#ff0000"), +   or one of the Cascading Style Sheets (CSS) color names (e.g., "red") +   given in named-color type below (the 16 HTML4 colors + "orange") +   [CSS3-Color].  The default foreground color is black.  The default + + + + + +Zeilenga & Melnikov           Informational                     [Page 6] + +RFC 7444            Security Labels in Internet Email      February 2015 + + +   background is white.  The "fgcolor" and "bgcolor" parameters SHALL be +   absent if the "marking" parameter is absent.  The HEXDIG production +   below is defined in [RFC5234]. + +   Formal color syntax: + +   color = hex-color / named-color + +   hex-color = "#" 6HEXDIG    ; Hex-encoded RGB + +   named-color = +              "aqua" / +              "black" / +              "blue" / +              "fuschia" / +              "gray" / +              "green" / +              "lime" / +              "maroon" / +              "navy" / +              "olive" / +              "purple" / +              "red" / +              "silver" / +              "teal" / +              "white" / +              "yellow" / +              "orange" ; named colors + +   The "type" parameter is a quoted string containing the string ":ess", +   the string ":x411", the string ":xml", or a URI [RFC3986] denoting +   the type and encoding of the "label" parameter.  The "label" +   parameter value is a quoted string.  The "type" parameter SHALL be +   present if the "label" parameter is present.  The "label" parameter +   SHALL be present if the "type" parameter is present.  When +   sensitivity-based authorization is performed, the absence of the +   "type" and "label" parameters indicates that the message is handled +   under default handling rules (e.g., as if no SIO-Label was present). + +   The string ":ess" indicates that the "label" parameter value is the +   base64 encoding of the BER encoding of an ESS security label +   [RFC2634]. + + + + + + + + + +Zeilenga & Melnikov           Informational                     [Page 7] + +RFC 7444            Security Labels in Internet Email      February 2015 + + +   ESS Label Example: + +   SIO-Label: marking="EXAMPLE CONFIDENTIAL"; +       fgcolor=black; bgcolor=red; +       type=":ess"; label="MQYGASkCAQM=" + +   The string ":x411" indicates that the "label" parameter value is the +   base64 encoding of the BER encoding of an X.411 security label +   [X.411]. + +   X.411 Label Example: + +   SIO-Label: marking="EXAMPLE CONFIDENTIAL"; +       fgcolor=black; bgcolor=red; +       type=":x411"; label="MQYGASkCAQM=" + +   The string ":xml" indicates that the "label" parameter value is the +   base64 encoding of a security label represented using [XML].  The XML +   prolog SHOULD be absent unless specifically required (such as when +   the character encoding is not UTF-8).  The particular flavor of +   security label representation is indicated by the root element name +   and its name space. + +   XML Label Example: + +   SIO-Label: marking="EXAMPLE CONFIDENTIAL"; +       fgcolor=black; bgcolor=red; +       type=":xml"; +       label*0="PFNlY0xhYmVsIHhtbG5zPSJodHRwOi8vZXhhbX"; +       label*1="BsZS5jb20vc2VjLWxhYmVsLzAiPjxQb2xpY3lJ"; +       label*2="ZGVudGlmaWVyIFVSST0idXJuOm9pZDoxLjEiLz"; +       label*3="48Q2xhc3NpZmljYXRpb24+MzwvQ2xhc3NpZmlj"; +       label*4="YXRpb24+PC9TZWNMYWJlbD4="; + +   where the XML label, with new lines and white space added for +   readability, is: + +   <SecLabel xmlns="http://example.com/sec-label/0"> +       <PolicyIdentifier URI="urn:oid:1.1"/> +       <Classification>3</Classification> +   </SecLabel> + +   The ":ess" and ":x411" formats SHOULD be used to represent ESS or +   X.411 security labels, respectively, instead of any direct XML +   representation of these formats. + +   The header field SHALL minimally contain a "marking" parameter or +   contain both the "type" and "label" parameters. + + + +Zeilenga & Melnikov           Informational                     [Page 8] + +RFC 7444            Security Labels in Internet Email      February 2015 + + +   This header field may be extended to include additional parameters by +   future document formally updating (or replacing) this document. +   Implementations SHOULD ignore additional parameters they do not +   recognize.  This recommendation is not a mandate so as to allow +   agents to process a message with an SIO-Label header field with +   unrecognized parameters differently than a message with an SIO-Label +   header field without the unrecognized parameters. + +   Each message SHALL contain zero or one SIO-Label header field. + +   Extended Example: + +   SIO-Label: marking*=us-ascii'en'EXAMPLE%20CONFIDENTIAL; +       fgcolor = black ; bgcolor = red ; +       type=":ess"; label*0="MQYG"; +       label*1="ASkCAQM=" + +   The Extended Example is equivalent to the ESS Label Example above. + +5.  The SIO-Label-History Header Field + +   Any service agent MAY record label changes in an SIO-Label-History +   header.  This header field is intended to provide trace information +   (and only trace information).  For instance, it can be used to record +   the label change when an SIO-Label header is added, modified, or +   deleted by a service agent.  This field can be used in other +   situations as well.  For instance, a gateway that translates X.400 +   messages to RFC 5322 mail can use this header field to record +   labeling changes made while translating a message. + +   The SIO-Label-History header field is considered to be a trace field +   as defined in Section 3.6.7 of [RFC5322]. + +   The formal syntax of the SIO-Label-History header is the same as the +   SIO-Label, but with the following parameters: + +   o  change - one of "add", "replace", "delete". + +   o  changed-by - contains a string identifying the agent, commonly the +      agent's fully qualified domain name. + +   o  changed-at - contains a date-time production, as specified in +      [RFC5322], representing the date and time the header was +      rewritten. + +   o  changed-comment - contains a string containing a comment. + + + + + +Zeilenga & Melnikov           Informational                     [Page 9] + +RFC 7444            Security Labels in Internet Email      February 2015 + + +   o  marking, fgcolor, bgcolor, type, label - records the message's +      label information prior to adding, modifying, or deleting SIO- +      Label, using the same parameter syntax used for SIO-Label.  These +      parameters are absent when the change action is "add". + +   o  new-marking, new-fgcolor, new-bgcolor, new-type, new-label - +      records the message's label information after adding, modifying, +      or deleting SIO-Label, using the same parameter syntax used for +      corresponding SIO-Label parameters.  These parameters are absent +      when the change type is "delete". + +   The header field SHALL minimally contain the "change", "changed-by", +   and "changed-at" parameters. + +   This header field can be extended to include additional parameters by +   future documents formally updating (or replacing) this document. + +   Each message can contain zero or more SIO-Label-History header +   fields.  All SIO-Label-History header fields should immediately +   follow the SIO-Label header field, if any, and be grouped together. +   Additional SIO-Label-History header fields should be added +   immediately preceding any existing SIO-Label-History header fields. + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Zeilenga & Melnikov           Informational                    [Page 10] + +RFC 7444            Security Labels in Internet Email      February 2015 + + +   SIO Label History Add, Modify, Delete Example: + +   SIO-Label-History: marking="EXAMPLE CONFIDENTIAL"; +       fgcolor=black; bgcolor=red; +       type=":xml"; +       label*0="PFNlY0xhYmVsIHhtbG5zPSJodHRwOi8vZXhhbX"; +       label*1="BsZS5jb20vc2VjLWxhYmVsLzAiPjxQb2xpY3lJ"; +       label*2="ZGVudGlmaWVyIFVSST0idXJuOm9pZDoxLjEiLz"; +       label*3="48Q2xhc3NpZmljYXRpb24+MzwvQ2xhc3NpZmlj"; +       label*4="YXRpb24+PC9TZWNMYWJlbD4="; +       change=delete; +       changed-by="delete.example.com"; +       changed-at="18 Feb 2013 9:24 PDT"; +       changed-comment="delete" +   SIO-Label-History: marking="EXAMPLE CONFIDENTIAL"; +       fgcolor=black; bgcolor=red; +       type=":ess"; label="MQYGASkCAQM="; +       new-marking="EXAMPLE CONFIDENTIAL"; +       new-fgcolor=black; new-bgcolor=red; +       new-type=":xml"; +       new-label*0="PFNlY0xhYmVsIHhtbG5zPSJodHRwOi8vZXhhbX"; +       new-label*1="BsZS5jb20vc2VjLWxhYmVsLzAiPjxQb2xpY3lJ"; +       new-label*2="ZGVudGlmaWVyIFVSST0idXJuOm9pZDoxLjEiLz"; +       new-label*3="48Q2xhc3NpZmljYXRpb24+MzwvQ2xhc3NpZmlj"; +       new-label*4="YXRpb24+PC9TZWNMYWJlbD4="; +       change=replace; +       changed-by="modify.example.net"; +       changed-at="18 Feb 2013 8:24 PDT"; +       changed-comment="replaced with XML variant" +   SIO-Label-History: new-marking="EXAMPLE CONFIDENTIAL"; +       new-fgcolor=black; new-bgcolor=red; +       new-type=":ess"; new-label="MQYGASkCAQM="; +       change=add; +       changed-by="add.example.net"; +       changed-at="18 Feb 2013 7:24 PDT"; +       changed-comment="added label" + + + + + + + + + + + + + + + +Zeilenga & Melnikov           Informational                    [Page 11] + +RFC 7444            Security Labels in Internet Email      February 2015 + + +6.  IANA Considerations + +   The SIO-Label and SIO-Label-History header fields have been +   registered in the "Provisional Message Header Field Registry" in +   accordance with [RFC3864]. + +   Header field name: SIO-Label +   Applicable protocol: mail [RFC5322] +   Status: provisional +   Author/change controller: Kurt Zeilenga (kurt.zeilenga@isode.com) +   Specification document(s): RFC 7444 + +   Header field name: SIO-Label-History +   Applicable protocol: mail [RFC5322] +   Status: provisional +   Author/change controller: Kurt Zeilenga (kurt.zeilenga@isode.com) +   Specification document(s): RFC 7444 + +7.  Security Considerations + +   Sensitive information should be appropriately protected (whether +   labeled or not).  For email messages, it is generally appropriate for +   the sending entity to authenticate the receiving entity and to +   establish transport-level security, including protective services for +   both data integrity and data confidentiality.  When a receiving +   entity makes authorization decisions based upon assertions of the +   sending entity, including assertions of identity, it is generally +   appropriate for the receiving entity to authenticate the sending +   entity. + +   This document provides a facility for expressing the sensitivity of +   an email message.  The mere expression of actual sensitivity +   generally does not elevate the sensitivity of the message; however, +   expressions of sensitivities can themselves be regarded as sensitive +   information.  For instance, a marking of "BLACK PROJECT RESTRICTED" +   could disclose the existence of a sensitivity project. + +   The SIO-Label header field expresses the sensitivity of the whole +   message, including the header and body.  This document does not +   provide a means to express the sensitivity of portions of an email +   message, such as the possibly different sensitivities of various MIME +   parts that the message may be composed of.  The approach used in this +   document favors simplicity and ease of use (i.e., a single expression +   of sensitivity) over the complexity and difficulty of marking and +   labeling portions of a message. + + + + + + +Zeilenga & Melnikov           Informational                    [Page 12] + +RFC 7444            Security Labels in Internet Email      February 2015 + + +   The expressed sensitivity can be used in determining how to handle a +   message.  For instance, the value of the SIO-Label header field (or +   lack thereof) can be used to determine if it is appropriate to be +   forwarded to a particular entity and, if so, what minimum security +   services ought to be used in the forwarding exchange.  The mechanism +   for determining how to handle a message-based expressed sensitivity +   is beyond the scope of this document. + +   The actual content may have more or less sensitivity than indicated +   by the security label.  Agents should avoid lowering security +   requirements for message exchange with a particular entity based upon +   conveyed sensitivity. + +   This protocol does not itself provide message-signing services, such +   as used in providing message integrity protection, non-repudiation, +   and binding of attributes (such as the security label to the +   message).  While it possible that this protocol could be used with a +   general message-signing service, this document does not detail such +   use. + +   While security label and display marking parameters are expected to +   express the same sensitivity, nothing in this specification ensures +   that the security label and display marking values express the same +   sensitivity.  For instance, an MUA could submit a message that +   contains a security label that expresses one sensitivity and a +   display marking with a different sensitivity, and by doing so, +   possibly cause an SA to inappropriately handle the message.  It is +   generally appropriate for each SA using the SIO-Label values to +   determine if the security label and display marking values express +   the same sensitivity and, if not, take appropriate action (such as +   rejecting the message). + +   This document also provides a facility for expressing changes to the +   label of a message.  This is intended to be used for trace purposes +   only.  It is noted that the SIO-Label-History header field can +   include sensitive information and, as such, can be removed from the +   message when its inclusion would result in disclosure of +   inappropriate information. + + + + + + + + + + + + + +Zeilenga & Melnikov           Informational                    [Page 13] + +RFC 7444            Security Labels in Internet Email      February 2015 + + +8.  References + +8.1.  Normative References + +   [CSS3-Color] Celik, T. and C. Lilley, "CSS3 Color Module", +                W3C Candidate Recommendation +                CR-css3-color-20030514, May 2003, +                <http://www.w3.org/TR/2003/CR-css3-color-20030514>. + +   [RFC2119]    Bradner, S., "Key words for use in RFCs to Indicate +                Requirement Levels", BCP 14, RFC 2119, March 1997, +                <http://www.rfc-editor.org/info/rfc2119>. + +   [RFC2231]    Freed, N. and K. Moore, "MIME Parameter Value and +                Encoded Word Extensions: Character Sets, Languages, and +                Continuations", RFC 2231, November 1997, +                <http://www.rfc-editor.org/info/rfc2231>. + +   [RFC2634]    Hoffman, P., Ed., "Enhanced Security Services for +                S/MIME", RFC 2634, June 1999, +                <http://www.rfc-editor.org/info/rfc2634>. + +   [RFC3864]    Klyne, G., Nottingham, M., and J. Mogul, "Registration +                Procedures for Message Header Fields", BCP 90, RFC 3864, +                September 2004, +                <http://www.rfc-editor.org/info/rfc3864>. + +   [RFC3986]    Berners-Lee, T., Fielding, R., and L. Masinter, "Uniform +                Resource Identifier (URI): Generic Syntax", STD 66, RFC +                3986, January 2005, +                <http://www.rfc-editor.org/info/rfc3986>. + +   [RFC4648]    Josefsson, S., "The Base16, Base32, and Base64 Data +                Encodings", RFC 4648, October 2006, +                <http://www.rfc-editor.org/info/rfc4648>. + +   [RFC5234]    Crocker, D., Ed. and P. Overell, "Augmented BNF for +                Syntax Specifications: ABNF", STD 68, RFC 5234, January +                2008, <http://www.rfc-editor.org/info/rfc5234>. + +   [RFC5322]    Resnick, P., Ed., "Internet Message Format", RFC 5322, +                October 2008, <http://www.rfc-editor.org/info/rfc5322>. + +   [X.411]      ITU-T, "Message Handling Systems (MHS) - Message +                Transfer System: Abstract Service Definition and +                Procedures", ITU-T Recommendation X.411, June 1999. + + + + + +Zeilenga & Melnikov           Informational                    [Page 14] + +RFC 7444            Security Labels in Internet Email      February 2015 + + +   [X.690]      ITU-T, "ASN.1 encoding rules: Specification of Basic +                Encoding Rules (BER), Canonical Encoding Rules (CER) and +                Distinguished Encoding Rules (DER)", ITU-T +                Recommendation X.690, November 2008. + +   [XML]        Bray, T., Paoli, J., Sperberg-McQueen, C., Maler, E., +                and F. Yergeau, "Extensible Markup Language (XML) 1.0 +                (Fifth Edition)", W3C Recommendation REC-xml-20081126, +                November 2008, +                <http://www.w3.org/TR/2008/REC-xml-20081126>. + +8.2.  Informative References + +   [RFC0822]    Crocker, D., "STANDARD FOR THE FORMAT OF ARPA INTERNET +                TEXT MESSAGES", STD 11, RFC 822, August 1982, +                <http://www.rfc-editor.org/info/rfc822>. + +   [RFC2045]    Freed, N. and N. Borenstein, "Multipurpose Internet Mail +                Extensions (MIME) Part One: Format of Internet Message +                Bodies", RFC 2045, November 1996, +                <http://www.rfc-editor.org/info/rfc2045>. + +   [X.841]      ITU-T, "Security information objects for access +                control", ITU-T Recommendation X.841, October 2000. + +   [XEP258]     Zeilenga, K., "XEP-0258: Security Labels in XMPP", XEP +                XMPP Extension Protocols, April 2013. + + + + + + + + + + + + + + + + + + + + + + + + +Zeilenga & Melnikov           Informational                    [Page 15] + +RFC 7444            Security Labels in Internet Email      February 2015 + + +Acknowledgements + +   The authors appreciate the review, comment, and text provided by +   community members, including Dave Cridland, Brad Hards, Russ Housley, +   Steve Kille, Graeme Lunt, Alan Ross, Jim Schaad, and David Wilson. + +Authors' Addresses + +   Kurt Zeilenga +   Isode Limited + +   EMail: Kurt.Zeilenga@isode.com + + +   Alexey Melnikov +   Isode Limited +   14 Castle Mews +   Hampton, Middlesex  TW12 2NP +   United Kingdom + +   EMail: Alexey.Melnikov@isode.com + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Zeilenga & Melnikov           Informational                    [Page 16] +  |