Network Working Group H. Alvestrand, Ed. Internet-Draft Google Intended status: Informational January 24, 2008 Expires: July 27, 2008 UTF-8 Mail: Scenarios draft-ietf-eai-scenarios-03 Status of this Memo By submitting this Internet-Draft, each author represents that any applicable patent or other IPR claims of which he or she is aware have been or will be disclosed, and any of which he or she becomes aware will be disclosed, in accordance with Section 6 of BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet- Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt. The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html. This Internet-Draft will expire on July 27, 2008. Copyright Notice Copyright (C) The IETF Trust (2008). Abstract This document describes some scenarios in which one can imagine internationalized email addresses deployed, and tries to draw some conclusions about what's acceptable and what's not for users in those scenarios. One possible set of extensions that can work in these scenarios is those described in the UTF8SMTP extension documents. Alvestrand Expires July 27, 2008 [Page 1] Internet-Draft UTF8MAIL Scenarios January 2008 Requirements Language The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119 [RFC2119]. Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.1. Terminology . . . . . . . . . . . . . . . . . . . . . . . . 3 1.2. User interface issues . . . . . . . . . . . . . . . . . . . 3 1.3. Ignored issues . . . . . . . . . . . . . . . . . . . . . . 4 2. Important Scenarios . . . . . . . . . . . . . . . . . . . . . . 4 2.1. Two i18mail users . . . . . . . . . . . . . . . . . . . . . 4 2.2. Three i18mail users . . . . . . . . . . . . . . . . . . . . 5 2.3. i18mail mailing list . . . . . . . . . . . . . . . . . . . 5 2.4. One i18mail user sends to one ascii user . . . . . . . . . 5 2.5. An i18mail user sends to one ascii user and one i18mail user . . . . . . . . . . . . . . . . . . . . . . . 6 2.6. An i18mail user sends to a mailing list with a mix of users . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 2.7. An i18mail user forwards to an ASCII user . . . . . . . . . 7 3. Other scenarios . . . . . . . . . . . . . . . . . . . . . . . . 7 3.1. Two i18mail users, intermediate non-extended MTA . . . . . 7 4. IANA Considerations . . . . . . . . . . . . . . . . . . . . . . 7 5. Security Considerations . . . . . . . . . . . . . . . . . . . . 8 6. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 8 7. Normative References . . . . . . . . . . . . . . . . . . . . . 8 Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 8 Intellectual Property and Copyright Statements . . . . . . . . . . 9 Alvestrand Expires July 27, 2008 [Page 2] Internet-Draft UTF8MAIL Scenarios January 2008 1. Introduction With the advent of internationalized email addresses [ref], there is a very real risk that people using Internet email will have problems communicating that they did not have before. This document tries to sketch some of the scenarios, define what "proper" behaviour would be in the situations, and describe how this will constrain solutions to the "internationalized email" problem. Because of the well known phenomenon that short documents get more review, the document tries to be as brief as possible, as long as that does not sacrifice clarity. 1.1. Terminology Terminology is inherited from the UTF8SMTP framework [RFC4952] - in particular, the terms "ascii address", "non-ASCII address" or "i18n- address", "ascii user", "i18mail user", "message" and "mailing list" are used with the definitions from section 1.3 of that document. The term "UTF8SMTP" is used to refer to the particular solution proposed in that framework, while "i18n mail" refers to any solution that could concievably satisfy these scenarios' requirements. The pronouns "he" and "she" are used to indicate a human of indeterminate sex. 1.2. User interface issues In internationalization, one of the thornier issues has always been user interfaces. In particular in this context, the ability to manipulate text strings (email addresses, in this case) in a script that the user does not have familiarity with is an issue. A main purpose of i18mail is to allow users to avoid doing so when corresponding with users in their own language locale when that locale normally does not use ASCII - but unless we accept an Internet email community of many small fragments, the introduction of "local" characters into email addresses will cause users to be exposed to addresses that they have trouble recognizing, are unable to enter, and in fact may be unable to display; in some cases, even storing the addresses is an issue. For instance, handling of right-to-left scripts like Arabic in environments used to left-to-right scripts like Thai can be a serious challenge. In order to keep this document short, the following capabilities are Alvestrand Expires July 27, 2008 [Page 3] Internet-Draft UTF8MAIL Scenarios January 2008 assumed: o An i18mail user is able to enter and display directly all characters of interest to him in his language locale. o An i18mail user is able to display all valid characters for EAI addresses, store them in an address book, and use "reply" without damaging the address. o If the i18mail solution requires keeping extra information around for an address in some cases, the i18mail user is capable of manipulating that information, including storing that information in his address book One can imagine special circumstances where some of these do not represent an optimal solution (for instance, a Thai user may prefer to handle the ASCII address of an Arabic correspondent rather than his Arabic one), but this is an added complication, and is ignored for the moment. 1.3. Ignored issues All the scenarios assume that all parties desire to communicate, that spam filters do not eat messages randomly, and that the mail service behaves according to specification. These are not tenable assumptions in the real world, but considering them would make this document much longer. 2. Important Scenarios In the scenario descriptions below, A, B and C are i18mail users. X (and Y and Z if they need to occur) are ascii users. L is an i18n- aware mailing list; LA is a non-i18n-aware mailing list. (LA does not occur in the scenarios, however.) Apart from the messages being exchanged, and A knowing the addresses of the ones he sends mail to, which are presumed to be made known to A through some other method (business cards, web pages, mail from other users and directories are some examples), there is no communication required between the users. 2.1. Two i18mail users One i18mail user (A) sends a message to another i18mail user (B), and desires to use his i18n-address. The recipient replies to the message. Alvestrand Expires July 27, 2008 [Page 4] Internet-Draft UTF8MAIL Scenarios January 2008 Requirement: The message must arrive at the recipient. The reply must arrive at the sender. The email addresses visible to the sender and recipient must be the i18n-addresses. 2.2. Three i18mail users As above, but A sends his message to both B and C. Both reply to all the recipients listed in the message. Requirement: As above - B and C must get the message, A and C must get the reply from B, A and B must get the reply from C. The email addresses visible to A, B and C must all be the i18n-addresses. 2.3. i18mail mailing list A sends his message to L, a mailing list, which has subscribers B and C. Both reply to the mailing list. The mailing list is i18n aware. Requirement: As above - all messages arrive, with EAI addresses preserved for all 3 users. 2.4. One i18mail user sends to one ascii user A, an i18mail user, sends to X, an ascii user. X replies. In this scenario, it is a given that A, the sender, has to have some facility for handling ASCII; he has to at least be able to display and enter an ASCII address. Precondition: A has to have an ascii address. Requirement: There must be an algorithmic series of steps that A can follow in order to get a message to X, and where X's reply gets back to A. There is no requirement that X sees the i18n-address of A, or that the address of A that X sees be one that A knows about beforehand; the requirement is that the messages get there. This non-requirement applies to all the following cases too. Examples of ways this could happen: o Magic happens in the network: A's message gets converted in the network to a format acceptable to X. This may require A to include extra information with the message to help the conversion process - and may be impossible to do for the general case. Alvestrand Expires July 27, 2008 [Page 5] Internet-Draft UTF8MAIL Scenarios January 2008 o Sender selection: A's i18mail message gets bounced in the network, and the reception of the error report causes A to resend the message using a format acceptable to X. o Conversion at destination: A's message gets accepted, and X has facilities available to convert it into a form that allows X to reply to the message, including deriving a valid ASCII address for A. This would require knowledge of i18n at X's site, but not necessarily in X's user agent. This is NOT an exhaustive list, and is NOT part of the requirements of the scenarios. A given protocol for i18mail will in turn impose new requirements on the scenarios - for instance, if extra information is included with the message, a user interface may need to exist to allow the sender to manipulate this information. 2.5. An i18mail user sends to one ascii user and one i18mail user In this scenario, A sends to B and X; both reply. Precondition: A and B have to have valid ASCII addresses. Requirement: Through some series of steps, A must be able to get a message to both B and X; through some series of steps, B and X must be able to reply to each other and to A. X must not require information outside of what is included in the message to get a message to B. Possible non-requirements (for discussion): o Maybe the messages to B and X don't need to be exactly the same. o Maybe B doesn't need to see or use A's i18n-address when he's replying to A and X. o Maybe X doesn't need to see A's address exactly the same on the message from A and the reply from B. 2.6. An i18mail user sends to a mailing list with a mix of users In this scenario, A sends to L, and L has B and X as subscribers. B and X reply. Requirement: Messages get there. A will not have to know anything about X in order to make the messages go through. Notes and non-requirements: Alvestrand Expires July 27, 2008 [Page 6] Internet-Draft UTF8MAIL Scenarios January 2008 o It may be acceptable for A to have to treat L as if L was an ASCII mailing list (LA) o It may be acceptable for B to see A's ASCII address, not his i18n- address o How one can transition between this and the scenario ofSection 2.3 is unclear. 2.7. An i18mail user forwards to an ASCII user In this scenario, A sends to B, and B forwards the message as a MIME attachment to X. Precondition: B has valid ASCII addresses. Requirement: The message from B to X should arrive whether or not A's address is usable by X. Desirable property: If A's address is downgradable, it should be usable by X for generating a message. 3. Other scenarios This section collects scenarios that have been discussed, but where there is no WG consensus on whether or not they are important enough to influence the design of UTF8SMTP. 3.1. Two i18mail users, intermediate non-extended MTA In this scenario, A sends mail to B through an MTA that does not support i18mail extensions. Requirement: Mail arrives. Desirable property: B can see A's I18mail address in his user interface, and use that to reply. The reason this may not be an important scenario is that due to the largely end-to-end nature of SMTP, if the end users have upgraded their systems, there should be very little reason to go via a non- upgraded MTA. 4. IANA Considerations This document makes no request of IANA. Alvestrand Expires July 27, 2008 [Page 7] Internet-Draft UTF8MAIL Scenarios January 2008 Note to RFC Editor: this section may be removed on publication as an RFC. 5. Security Considerations Security issues are deliberately left unaddressed in order to reduce the size of the document. 6. Acknowledgements 7. Normative References [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997. [RFC4952] Klensin, J. and Y. Ko, "Overview and Framework for Internationalized Email", RFC 4952, July 2007. Author's Address Harald Tveit Alvestrand (editor) Google Beddingen 10 Trondheim, 7014 Norway Email: harald@alvestrand.no Alvestrand Expires July 27, 2008 [Page 8] Internet-Draft UTF8MAIL Scenarios January 2008 Full Copyright Statement Copyright (C) The IETF Trust (2008). This document is subject to the rights, licenses and restrictions contained in BCP 78, and except as set forth therein, the authors retain all their rights. This document and the information contained herein are provided on an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Intellectual Property The IETF takes no position regarding the validity or scope of any Intellectual Property Rights or other rights that might be claimed to pertain to the implementation or use of the technology described in this document or the extent to which any license under such rights might or might not be available; nor does it represent that it has made any independent effort to identify any such rights. Information on the procedures with respect to rights in RFC documents can be found in BCP 78 and BCP 79. Copies of IPR disclosures made to the IETF Secretariat and any assurances of licenses to be made available, or the result of an attempt made to obtain a general license or permission for the use of such proprietary rights by implementers or users of this specification can be obtained from the IETF on-line IPR repository at http://www.ietf.org/ipr. The IETF invites any interested party to bring to its attention any copyrights, patents or patent applications, or other proprietary rights that may cover technology that may be required to implement this standard. Please address the information to the IETF at ietf-ipr@ietf.org. Acknowledgment Funding for the RFC Editor function is provided by the IETF Administrative Support Activity (IASA). Alvestrand Expires July 27, 2008 [Page 9]