Re: [Id-event] SAML subject identifier type

Brian Campbell <bcampbell@pingidentity.com> Wed, 15 July 2020 23:03 UTC

Return-Path: <bcampbell@pingidentity.com>
X-Original-To: id-event@ietfa.amsl.com
Delivered-To: id-event@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8DD063A0B2B for <id-event@ietfa.amsl.com>; Wed, 15 Jul 2020 16:03:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.088
X-Spam-Level:
X-Spam-Status: No, score=-2.088 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_FILL_THIS_FORM_SHORT=0.01, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=pingidentity.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xkWcfAVsRnSC for <id-event@ietfa.amsl.com>; Wed, 15 Jul 2020 16:03:27 -0700 (PDT)
Received: from mail-lj1-x22c.google.com (mail-lj1-x22c.google.com [IPv6:2a00:1450:4864:20::22c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D89723A0B2D for <id-event@ietf.org>; Wed, 15 Jul 2020 16:03:26 -0700 (PDT)
Received: by mail-lj1-x22c.google.com with SMTP id h22so4666322lji.9 for <id-event@ietf.org>; Wed, 15 Jul 2020 16:03:26 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=pingidentity.com; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=nn0ypC1KWp8McbLzzJQ/7L4QsIt/WrDCF/T3oq6aDys=; b=E0Zp5CeeXrt1v3IbQrryzKQNHr7XHE18kMDSUF+izXQKScaTSh02Pnf2lzzFp+K9Bt DkcCAVsZd+Xp1AZV0p2BY9fIymYJz4K3Lbh4gBnAp5yQV8WTH4FlpdmoiE+oK1gJd184 RJA0/PRdstqbZ1iCKIOu5yHx3JqUYUF+IRD0wpHU4jFf/kTzKi/fcVhb4cPW2LUFAn0q 7KeXjRK0JuMSX5vTqGC7Px1szXl++OymDoaFelz5iwZKNKeoZJWYyKXd9Am1NBSTrxEP Vleyg0TF5j7q7JAWlL0jHnm7tBGugwLd+x5TyZ0V3kTVt5EtSgQCCk0PxryVzQxhCL/z ntbA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=nn0ypC1KWp8McbLzzJQ/7L4QsIt/WrDCF/T3oq6aDys=; b=hJPhGLfJyYk7X8xWJhXpclnn/mpp2XZ+X3i2pa37dk01LTT43VCs7FiR3xfGmAQ0Hr XLfnG66nHIu1KewZMsJOx4i6uuP7ogjBiZa8j9jmAQ7PQ0rnf1qmuHY7FHHGmr1fW+4k iamZCV86JqNU+NI2bYUFakTuj+XZrAR5vfCJp5EgyibStGzOPePPuZuNyC18NQ86r7Ql 09y8RYlmYavpmNI4wT41UPiVsRfkpDi/7SQIEe0dI185O88j2vUwWyFdOU8zQJ1p8XIK LwwoopUbl6kDS+ug9sN9o+dy9qkurO9HwK5sZHVVIVi4IWyX+Egi/STSskIK07wJ9p69 kvmw==
X-Gm-Message-State: AOAM533gnU0A3WND6jsWEac/oVKNg3kpGJ+ZddAbhWFtjqrqvif+NdoX veidMxII1/MrbRf3Ta1bSNq7VW9vMS4eQN98EpldZgmSuaRB3tqF+4zE38NuW6TzaCALEAIEh+5 leD/U3vZ85Vjn6lBKuA==
X-Google-Smtp-Source: ABdhPJzSALcK0CKbq8R0M+vYN60cboIgoGcvIc0T/mW18cv/wYU61YMjyXHNrbNM2OV1BY6fkYjDSosadhDaVn1hR14=
X-Received: by 2002:a2e:9943:: with SMTP id r3mr555949ljj.280.1594854204373; Wed, 15 Jul 2020 16:03:24 -0700 (PDT)
MIME-Version: 1.0
References: <CAMCkG5thP1JnyBn5qAK0TLqBoa-y53Qnoq=mf-NPLfzSF2U7VQ@mail.gmail.com> <5B3455F1-9F82-40C5-BE22-2E3B715A0CF1@canarie.ca> <CAMCkG5uSQzTGCmFn6DLeXVbA0B0wrcPou8CEjtCQ5BCp3M+eOw@mail.gmail.com> <CAMCkG5uff+WwMRLDr+Lph-TagtwL5jWORg5ruvWLOxkNBM2s0A@mail.gmail.com> <E7D14134-0210-4515-ACA3-2AB5CDDCBF34@gmail.com> <CAMCkG5t+7z7OOLdsD77zj_eM7eYf2wOTGTV9tg5S01FXgcHC0w@mail.gmail.com> <8B77A27C-D5B3-477A-BD0D-8B3D3B818BB0@gmail.com> <CA+k3eCQ+f78Ct59D45SyQ8MnCLbpf6665h48MKpyvBaAA-ezZg@mail.gmail.com> <CAMCkG5ssFt2Dy-pbuuEch7KkBu+goNhSbfepx6dVxrUKChBRBw@mail.gmail.com> <C62035F9-E7D8-4CA4-89A3-2BE6DE941CE3@amazon.com> <CAMCkG5snqNuDAYMXZiri=ZJ7=y9d=-1jCnwV0FcGXVzZnX6+gA@mail.gmail.com> <9CC41112-7947-41E1-9584-6DEB625BBEEA@amazon.com>
In-Reply-To: <9CC41112-7947-41E1-9584-6DEB625BBEEA@amazon.com>
From: Brian Campbell <bcampbell@pingidentity.com>
Date: Wed, 15 Jul 2020 17:02:57 -0600
Message-ID: <CA+k3eCRLU8ZM8Zh8j=jR4ath=o5w3e6dMYfZZV5_P=AnA=V+JA@mail.gmail.com>
To: "Richard Backman, Annabelle" <richanna@amazon.com>
Cc: Atul Tulshibagwale <atultulshi=40google.com@dmarc.ietf.org>, "Richard Backman, Annabelle" <richanna=40amazon.com@dmarc.ietf.org>, Yaron Sheffer <yaronf.ietf@gmail.com>, Chris Phillips <Chris.Phillips@canarie.ca>, "id-event@ietf.org" <id-event@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000005247e805aa82ee30"
Archived-At: <https://mailarchive.ietf.org/arch/msg/id-event/Vq9GxciYbC-fDt20AznljlVmPWU>
Subject: Re: [Id-event] SAML subject identifier type
X-BeenThere: id-event@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "A mailing list to discuss the potential solution for a common identity event messaging format and distribution system." <id-event.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/id-event>, <mailto:id-event-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/id-event/>
List-Post: <mailto:id-event@ietf.org>
List-Help: <mailto:id-event-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/id-event>, <mailto:id-event-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 15 Jul 2020 23:03:31 -0000

Stepping back a little, I'd venture that the notion of a “durable subject”
came from the fact that all the subject identifier types in the
draft-ietf-secevent-subject-identifiers draft do identify relatively more
permanent subjects. This new type for a session established by a SAML
assertion ID was proposed (nearly 11 months after what was supposed to be
WG last call) and Yaron noted that it was fundamentally pretty different
than what's in the draft now. And he also asked the very reasonable
question of why this specifically for SAML and not other session types. To
which Atul mentioned and proposed adding the RISC ID Token subject
identifier type seemingly suggesting that it was similar to the SAML type.
That, I think, confused the discussion because the RISC ID Token subject
identifier type is not at all like the SAML type. And attempts to point
that out by Yaron and myself while not realizing that it was a precursor to
the alias type further confused the discussion. I apologize for my part in
propagating the confusion.

I gave a +1 to Yaron's because it seemed like the simplest way to try and
deter the WG from adding this type. Simpler anyway than trying to type out
why describing "a subject by the assertion identifier in the SAML assertion
that was used to convey the subject's information" is problematic on
numerous levels. The incorrect assumption that there's a 1:1 relationship
between a SAML assertion and a session, as you point out, being just one of
the problems.

There are big tradeoffs and considerations around what kind of thing is
identified as the subject.  I hope and assume the RISC/CAPE/SSE WG is
managing all that. But this draft-ietf-secevent-subject-identifiers is or
will be extensible with a registry so as to allow additional types to be
defined there, if they are needed and are sensible. I'd suggest we avoid
adding new types to this draft (or really any major changes) at this stage
short of a really compelling reason to do so.

On Wed, Jul 15, 2020 at 3:24 PM Richard Backman, Annabelle <
richanna@amazon.com> wrote:

> I think the two subject types – the “oauth_token” type described in my
> prior email, and a “oauth_client” type that identifies a subject by its
> OAuth 2.0 client ID – are reasonable types to define. I don’t see a
> particular need to move them into the base spec – we define an IANA
> registry precisely so we don’t have to try to define everything up front –
> but I’m not opposed to the idea.
>
>
>
> I’m not sure where this notion of a “durable subject” came from. Right in
> the introduction, RFC 8417
> <https://www.rfc-editor.org/rfc/rfc8417.html#section-1> says the subject
> of a security event “may be permanent (e.g., a user account) or temporary
> (e.g., an HTTP session) in nature.” There are plenty of use cases for
> events where the subjects are temporary/ephemeral:
>
>    1. Session termination
>    2. Changes in the security posture for a session
>    3. Token revocation
>    4. Asynchronous approval of a request
>    5. Changes in the state of a transaction
>
> …etc.
>
>
>
> Whether or not it makes sense to identify a session subject using a SAML
> assertion ID (or an ID Token “jti” claim, in the OIDC world) is a separate
> question. Adding semantics to existing identifiers tends to lead to lots of
> unforeseen complications, and depend on assumptions that don’t always hold
> true. In this case, there seems to be an assumption that there is a 1:1
> relationship between a SAML assertion and a session. This is not always the
> case.
>
>
>
> Regardless, a SAML assertion ID is clearly an appropriate identifier when
> the subject is a SAML assertion. I don’t know offhand if there are any use
> cases for events relating to a SAML assertion itself. I can certainly see
> use cases for events related to JWTs (e.g., revocation of a JWT access
> token), where a “jti” subject identifier type would be appropriate. I’m
> inclined to add it to the draft, if for no other reason than to provide a
> normative demonstration of a subject identifier that would be used to
> identify a more ephemeral subject.
>
>
>
> –
>
> Annabelle Backman (she/her)
>
> AWS Identity
>
> *https://aws.amazon.com/identity/ <https://aws.amazon.com/identity/>*
>
>
>
>
>
> *From: *Id-event <id-event-bounces@ietf.org> on behalf of Atul
> Tulshibagwale <atultulshi=40google.com@dmarc.ietf.org>
> *Date: *Wednesday, July 15, 2020 at 12:47 PM
> *To: *"Richard Backman, Annabelle" <richanna=40amazon.com@dmarc.ietf.org>
> *Cc: *Yaron Sheffer <yaronf.ietf@gmail.com>, Brian Campbell <
> bcampbell@pingidentity.com>, Chris Phillips <Chris.Phillips@canarie.ca>, "
> id-event@ietf.org" <id-event@ietf.org>
> *Subject: *RE: [EXTERNAL] [Id-event] SAML subject identifier type
>
>
>
> *CAUTION*: This email originated from outside of the organization. Do not
> click links or open attachments unless you can confirm the sender and know
> the content is safe.
>
>
>
> How do we propose to support the two subject types defined in the OAuth
> Event Types <https://openid.net/specs/oauth-event-types-1_0-ID1.html>
> spec here?
>
>
>
> On Tue, Jul 14, 2020 at 4:54 PM Richard Backman, Annabelle <richanna=
> 40amazon.com@dmarc.ietf.org> wrote:
>
> The RISC Profile’s “ID Token Claims” type does not identify a subject that
> is an ID Token, it identifies a subject that was the subject of an ID
> Token. It was intended for cases where the OP sent multiple identifiers of
> different types in the ID Token (e.g., iss+sub and email), and does not
> know which of them the client will recognize (yes, the *should* use
> iss+sub; no, they doesn’t always do so). This type was replaced in
> draft-ietf-secevent-subject-identifiers-03 with the “aliases” type, which
> is a general solution to this problem that is not defined in terms of one
> particular use case (i.e., ID Tokens).
>
>
>
> The OIDF SSE working group’s OAuth Event Types draft
> <https://openid.net/specs/oauth-event-types-1_0-ID1.html#rfc.section.2.1>
> defines a “oauth_token” type that identifies a subject that is an OAuth 2.0
> token, and does so using either the full or partial plain text value of the
> token, or a hash of the token..
>
>
>
> It is perfectly fine for a token to be the subject of a security event.
> 8417 <https://www.rfc-editor.org/rfc/rfc8417.html#section-2.2> actually
> includes the following as an example of a possible value for the “sub”
> claim:
>
> *  a token identifier (e.g. "jti") for a revoked token.
>
>
>
> –
>
> Annabelle Backman (she/her)
>
> AWS Identity
>
> https://aws.amazon.com/identity/
>
>
>
>
>
> *From: *Id-event <id-event-bounces@ietf.org> on behalf of Atul
> Tulshibagwale <atultulshi=40google.com@dmarc.ietf.org>
> *Date: *Tuesday, July 14, 2020 at 4:32 PM
> *To: *Brian Campbell <bcampbell@pingidentity.com>
> *Cc: *Yaron Sheffer <yaronf.ietf@gmail.com>, Chris Phillips <
> Chris.Phillips@canarie.ca>, "id-event@ietf.org" <id-event@ietf.org>
> *Subject: *RE: [EXTERNAL] [Id-event] SAML subject identifier type
>
>
>
> *CAUTION*: This email originated from outside of the organization. Do not
> click links or open attachments unless you can confirm the sender and know
> the content is safe.
>
>
>
> IMO if we have a common enough use-case that requires a specific type to
> be defined, then we should define that type in the spec rather than rely on
> an interpretation of the "iss-sub" type, since that interpretation can
> cause incompatibilities.
>
>
>
> In this specific case however I feel that the use cases outlined in my
> previous email can be achieved (with limitations) using the durable subject
> types such as email. I'd like the members of the SSE working group to chime
> in (since that is where this got added), or we can drop the SAML subject
> identifier type.
>
>
>
> On Tue, Jul 14, 2020 at 4:09 PM Brian Campbell <bcampbell@pingidentity.com>
> wrote:
>
> + 1 to what Yaron is saying here. I'd include also the "iss-sub" subject
> identifier type
> https://tools.ietf.org/html/draft-ietf-secevent-subject-identifiers-05#section-3.4
> as already having semantics covering what's described in the ID Token
> Claims Subject Identifier Type in the RISC document referenced. And all
> those things represent a durable subject rather than a session, which
> strikes me as appropriate for a document that describes identifying
> subjects. A SAML assertion ID, however, which is an identifier of an XML
> document that is only indirectly related to a session by an association
> that likely isn't maintained, does not seem appropriate as a "subject
> identifier".
>
>
>
> On Tue, Jul 14, 2020 at 4:01 PM Yaron Sheffer <yaronf.ietf@gmail.com>
> wrote:
>
> Hi Atul,
>
>
>
> The ID Token subject type, as described in the document you are
> referencing, does not add any semantics, compared to a “phone number” or
> “email” subject type. So I don’t see the value in adding it.
>
>
>
> In addition, it does not, actually, describe an ID Token. In fact the text
> is very clear that it describes a “subject” (a durable entity) rather than
> a session, and does it by citing various claims included in the ID token.
> So as a subject identifier type, it is not at all equivalent to a SAML
> assertion.
>
>
>
> As to the SAML Assertion subject type, I think these use cases could be
> addressed by adding information to the event.
>
>
>
> Thanks,
>
>                 Yaron
>
>
>
> *From: *Atul Tulshibagwale <atultulshi@google.com>
> *Date: *Tuesday, July 14, 2020 at 23:26
> *To: *Yaron Sheffer <yaronf.ietf@gmail.com>
> *Cc: *Chris Phillips <Chris.Phillips@canarie.ca>, "id-event@ietf.org" <
> id-event@ietf.org>
> *Subject: *Re: [Id-event] SAML subject identifier type
>
>
>
> Hi Yaron,
>
> There are a few SSE use cases where the events are about a specific single
> sign-on session. You're right that this should not be limited to SAML. The
> RISC profile of SETs (based on which we are doing the SSE work) had the ID
> Token subject identifier type, which for some reason is missing in this
> spec (I did not realize until now). The specific events that need to refer
> to sessions are:
>
> ·         Identity provider context change: The conditions under which a
> SAML assertion or OIDC token was generated are no longer valid. This can be
> due to various things, including a password change.
>
> ·         Session property change: A session has been determined to have
> been compromised
>
> ·         Revocation: The issuer of the single sign-on SAML assertion or
> ID Token needs to be revoke
>
> I can also add the ID Token claim from the RISC profile
> <https://bitbucket.org/openid/risc/src/master/openid-risc-profile-1_0.txt#lines-250>
> to my pull request.
>
>
>
> Thanks,
>
> Atul
>
>
>
>
>
> On Tue, Jul 14, 2020 at 12:32 PM Yaron Sheffer <yaronf.ietf@gmail.com
> <yaronf..ietf@gmail.com>> wrote:
>
> I need a lot more context here. So far, subject IDs have denoted durable
> entities, such as email addresses, phone numbers, account. This is adding a
> subject ID that denotes an ephemeral entity, basically similar to a session
> ID. This looks weird from an architectural point of view, and also begs the
> question, why specifically SAML and not other session types.
>
>
>
> Thanks,
>
>                 Yaron
>
>
>
> *From: *Id-event <id-event-bounces@ietf.org> on behalf of Atul
> Tulshibagwale <atultulshi=40google.com@dmarc.ietf.org
> <40google.com@dmarc.ietf..org>>
> *Date: *Tuesday, July 14, 2020 at 00:14
> *To: *Chris Phillips <Chris.Phillips@canarie.ca>
> *Cc: *"id-event@ietf.org" <id-event@ietf.org>
> *Subject: *Re: [Id-event] SAML subject identifier type
>
>
>
> Just clarifying the proposal as it stands today (before incorporating
> Chris's input):
>
> The following section should be added in the "Subject Identifier Types"
> section:
>
> 4.9.  SAML Subject Identifier Type
>
>    The SAML [SAML.REF] Subject Identifier Type describes a subject by
>    the assertion identifier in the SAML assertion that was used to
>    convey the subject's information to the Receiver.  Subject
>    Identifiers of this type MUST contain an ` assertion_id"claim.  The
>    value of this claim is a string that is equal to the Assertion
>    Identifier in the SAML assertion.  The SAML Subject Identifier Type
>    is identified by the name "saml`.
>
>    Below is a non-normative example Subject Identifier for the SAML
>    Subject Identifier Type:
>
>    {
>      "subject_type": "saml",
>      "assertion_id": "_f551d88963ab4e3decb7cfe8f4dcc3f5",
>    }
>
>      Figure 8: Example: Subject Identifier for SAML Subject Identifier
>                                    Type.
>
>
>
>
>
> On Mon, Jul 13, 2020 at 1:22 PM Atul Tulshibagwale <atultulshi@google.com>
> wrote:
>
> Hi Chris,
>
> I was proposing using the "assertion id" (SAML Core
> <http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf>
> spec, line 553) in the proposal, not the "subject-id" as defined in SAML
> (spec section 3.3). The main reason was to be able to refer to a session
> that was established using a specific assertion. If it's useful, we could
> perhaps extend the SAML subject identifier type in this spec to include
> either the assertion_id or the subject_id claim.
>
>
>
> Thanks,
>
> Atul
>
>
>
>
>
> On Mon, Jul 13, 2020 at 10:30 AM Chris Phillips <Chris.Phillips@canarie.ca
> <Chris..Phillips@canarie.ca>> wrote:
>
> Hi.
>
> Quiet lurker observing..
>
> Thanks for consider the SAML elements..
>
>
>
> Atul, are you referring to the actual session identifier that someone may
> have where the Subject-Id was exchanged OR the actual Subject-id itself in
> your reference in the proposal with the github link?
>
>
>
> I’m trying to square what I see on the git delta on line 294-296 in
> https://github...com/richanna/secevent/pull/1/commits/b20b6692eb50628927476ca78f9be077ace88994
> <https://github.com/richanna/secevent/pull/1/commits/b20b6692eb50628927476ca78f9be077ace88994>
>
>
>
>
>
> And a Subject-id as shown in the example in 3.3.3 here:
> https://docs.oasis-open.org/security/saml-subject-id-attr/v1.0/cs01/saml-subject-id-attr-v1.0-cs01.html#_Toc536097229
> <https://docs.oasis-open.org/security/saml-subject-id-attr/v1.0/cs01/saml-subject-id-attr-v1..0-cs01..html#_Toc536097229>
>
>
>
> What you offered in the example is not a Subject-id  per the OASIS SAML
> spec as written in section 3.3.1
>
>
>
> Am I mis-interpreting something?
>
>
>
> C
>
>
>
>
>
> *From: *Id-event <id-event-bounces@ietf.org> on behalf of Atul
> Tulshibagwale <atultulshi=40google.com@dmarc.ietf.org>
> *Date: *Monday, July 13, 2020 at 12:17 PM
> *To: *"id-event@ietf.org" <id-event@ietf.org>
> *Subject: *[Id-event] SAML subject identifier type
>
>
>
> Hi all,
>
> Based on the discussions in the SSE working group within the OpenID
> Foundation, we would like to propose that the subject identifier
> specification include a SAML subject identifier type. This is so that
> sessions established across peers using SAML may be identified in events
> that include the subject identifier.
>
>
>
>  A SAML subject identifier has only one claim within it, the assertion id
> of the SAML assertion used to establish the single sign-on session.
>
>
>
> This change is also included in my proposal here
> <https://github.com/richanna/secevent/pull/1>.
>
>
>
> Thanks,
>
> Atul
>
>
>
> _______________________________________________
> Id-event mailing list
> Id-event@ietf.org
> https://www.ietf.org/mailman/listinfo/id-event
>
> _______________________________________________ Id-event mailing list
> Id-event@ietf.org https://www.ietf.org/mailman/listinfo/id-event
>
> _______________________________________________
> Id-event mailing list
> Id-event@ietf.org
> https://www.ietf.org/mailman/listinfo/id-event
>
>
> *CONFIDENTIALITY NOTICE: This email may contain confidential and
> privileged material for the sole use of the intended recipient(s). Any
> review, use, distribution or disclosure by others is strictly prohibited..
> If you have received this communication in error, please notify the sender
> immediately by e-mail and delete the message and any file attachments from
> your computer. Thank you.*
>
>

-- 
_CONFIDENTIALITY NOTICE: This email may contain confidential and privileged 
material for the sole use of the intended recipient(s). Any review, use, 
distribution or disclosure by others is strictly prohibited.  If you have 
received this communication in error, please notify the sender immediately 
by e-mail and delete the message and any file attachments from your 
computer. Thank you._