Re: [dane] PGP security models, was Summary of IETF LC for draft-ietf-dane-openpgpkey

Paul Wouters <paul@nohats.ca> Mon, 21 September 2015 19:14 UTC

Return-Path: <paul@nohats.ca>
X-Original-To: dane@ietfa.amsl.com
Delivered-To: dane@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7A6381B3437; Mon, 21 Sep 2015 12:14:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.01
X-Spam-Level:
X-Spam-Status: No, score=-2.01 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id n7bLeNxtQwwb; Mon, 21 Sep 2015 12:14:40 -0700 (PDT)
Received: from mx.nohats.ca (mx.nohats.ca [IPv6:2a03:6000:1004:1::68]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A2F651A9171; Mon, 21 Sep 2015 12:14:39 -0700 (PDT)
Received: from localhost (localhost [IPv6:::1]) by mx.nohats.ca (Postfix) with ESMTP id 3nKb722q8Qz37k; Mon, 21 Sep 2015 21:14:38 +0200 (CEST)
Authentication-Results: mx.nohats.ca; dkim=pass (1024-bit key) header.d=nohats.ca header.i=@nohats.ca header.b=sSTbyX8W
X-OPENPGPKEY: Message passed unmodified
X-Virus-Scanned: amavisd-new at mx.nohats.ca
Received: from mx.nohats.ca ([IPv6:::1]) by localhost (mx.nohats.ca [IPv6:::1]) (amavisd-new, port 10024) with ESMTP id SupElxhs4gRV; Mon, 21 Sep 2015 21:14:37 +0200 (CEST)
Received: from bofh.nohats.ca (206-248-139-105.dsl.teksavvy.com [206.248.139.105]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx.nohats.ca (Postfix) with ESMTPS; Mon, 21 Sep 2015 21:14:37 +0200 (CEST)
Received: from bofh.nohats.ca (bofh.nohats.ca [127.0.0.1]) by bofh.nohats.ca (Postfix) with ESMTP id 5DD17800B0; Mon, 21 Sep 2015 15:14:36 -0400 (EDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nohats.ca; s=default; t=1442862876; bh=rcolSVfCyiDaxjpXdbZXwAMmFpqW3/UvaF5hW7k7by0=; h=Date:From:To:cc:Subject:In-Reply-To:References; b=sSTbyX8WlUW2N+FZDAFBxw8rQHrXKLTJt0iD5UiJlfLeqntESzMO7Na6lq44P4eTx PgKkSjNX1Pkx1wSR0pSYNRysU5xAQA3ZsflNukko9xc/STKjwswtLleNXLyG27QNfN 0jNqM7QyPuCmQ1eaSnEIm+01nHmU3ONVAfzdSt5g=
Received: from localhost (paul@localhost) by bofh.nohats.ca (8.15.2/8.15.2/Submit) with ESMTP id t8LJEaK0001150; Mon, 21 Sep 2015 15:14:36 -0400
X-Authentication-Warning: bofh.nohats.ca: paul owned process doing -bs
Date: Mon, 21 Sep 2015 15:14:36 -0400
From: Paul Wouters <paul@nohats.ca>
To: ietf@ietf.org
In-Reply-To: <20150921172109.19893.qmail@ary.lan>
Message-ID: <alpine.LFD.2.20.1509211455150.420@bofh.nohats.ca>
References: <20150921172109.19893.qmail@ary.lan>
User-Agent: Alpine 2.20 (LFD 67 2015-01-07)
MIME-Version: 1.0
Content-Type: text/plain; format="flowed"; charset="US-ASCII"
Archived-At: <http://mailarchive.ietf.org/arch/msg/dane/HEDtKseGGx_goU8Q9oDnaMkRJmg>
Cc: dane WG list <dane@ietf.org>
Subject: Re: [dane] PGP security models, was Summary of IETF LC for draft-ietf-dane-openpgpkey
X-BeenThere: dane@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: DNS-based Authentication of Named Entities <dane.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dane>, <mailto:dane-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dane/>
List-Post: <mailto:dane@ietf.org>
List-Help: <mailto:dane-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dane>, <mailto:dane-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 21 Sep 2015 19:14:41 -0000

On Mon, 21 Sep 2015, John Levine wrote:

>> OPENPGP is a data format, WoT is one way to employ that format to
>> exchange messages.   It is not a *required* way to use OPENPGP.
>
> Sure, but it's the way that everyone has used PGP for 20 years,
> and it's the security model that everyone I know expects when they
> use PGP keys.

Actually, nmost people I know never use the WoT. They only use keys
obtained directly from the person they want to exchange encrypted email
with.

> This draft uses a model in which the key is bound to a mailbox

openpgp keys are bound to ID's, which can ultimately end up in a
mailbox but is not required to do so.

For instance, the gpg key used to sign fedora21 packages with an openpgp
key ID containing "fedora21@fedoraproject.org" might not have any mailbox
associated with it. It is merely shared in the DNS under an email address,
without a mailbox or valid local-part.

> any stronger identity, and you have to trust that the domain's
> management fairly represents its users

Correct, the domain's management that controls either DNS or SMTP servers,
can steal a users email.

> That's not a ridiculous model, but if
> that's the model, the draft and draft-ietf-dane-openpgpkey-usage need
> to say so.  At this point, neither does.

>From the Introduction:

    This document specifies a method for publishing and
    locating OpenPGP public keys in DNS for a specific email address
    using a new OPENPGPKEY DNS Resource Record.  Security is provided via
    DNSSEC.

So your point is made already pretty clear in the introduction
already. Security comes from DNSSEC, so whoever controls the domain,
controls the publishing of openpgp keys.

Section 5.2 also contains some advise. Section 7.4 also mentions this,
but not under a section title that makes that very clear.

Some clarifications will be made, especially in the security
considerations section, to clarify this, based on the IETF LC comments.

Thank you,

Paul