Re: [dane] FYI: New Version Notification for draft-hoffman-dane-smime-04.txt
Nicholas Weaver <nweaver@icsi.berkeley.edu> Tue, 11 September 2012 15:25 UTC
Return-Path: <nweaver@icsi.berkeley.edu>
X-Original-To: dane@ietfa.amsl.com
Delivered-To: dane@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B1FC721F87BC for <dane@ietfa.amsl.com>; Tue, 11 Sep 2012 08:25:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aq-8ozGN8is6 for <dane@ietfa.amsl.com>; Tue, 11 Sep 2012 08:25:20 -0700 (PDT)
Received: from rock.ICSI.Berkeley.EDU (rock.ICSI.Berkeley.EDU [192.150.186.19]) by ietfa.amsl.com (Postfix) with ESMTP id B588D21F87EA for <dane@ietf.org>; Tue, 11 Sep 2012 08:25:20 -0700 (PDT)
Received: from localhost (localhost.localdomain [127.0.0.1]) by rock.ICSI.Berkeley.EDU (Postfix) with ESMTP id 6FFC22C4006; Tue, 11 Sep 2012 08:25:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ICSI.Berkeley.EDU
Received: from rock.ICSI.Berkeley.EDU ([127.0.0.1]) by localhost (maihub.ICSI.Berkeley.EDU [127.0.0.1]) (amavisd-new, port 10024) with LMTP id 1SfymtALEjV5; Tue, 11 Sep 2012 08:25:20 -0700 (PDT)
Received: from gala.icir.org (gala [192.150.187.49]) (Authenticated sender: nweaver) by rock.ICSI.Berkeley.EDU (Postfix) with ESMTP id 0EF1B2C4002; Tue, 11 Sep 2012 08:25:20 -0700 (PDT)
Mime-Version: 1.0 (Apple Message framework v1278)
Content-Type: text/plain; charset="us-ascii"
From: Nicholas Weaver <nweaver@icsi.berkeley.edu>
In-Reply-To: <7C162211-2928-46E5-83C3-CAEF246CD194@kirei.se>
Date: Tue, 11 Sep 2012 08:25:19 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <1FD9BB39-717A-4114-B71B-50C19E8CE7B1@icsi.berkeley.edu>
References: <20120908161345.32470.87669.idtracker@ietfa.amsl.com> <577789DE-4A22-48D3-ACBE-8297B6C1DBCE@kirei.se> <046d01cd8fda$c5670d00$50352700$@augustcellars.com> <7C162211-2928-46E5-83C3-CAEF246CD194@kirei.se>
To: Jakob Schlyter <jakob@kirei.se>
X-Mailer: Apple Mail (2.1278)
Cc: 'IETF DANE WG list' <dane@ietf.org>
Subject: Re: [dane] FYI: New Version Notification for draft-hoffman-dane-smime-04.txt
X-BeenThere: dane@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: DNS-based Authentication of Named Entities <dane.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dane>, <mailto:dane-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dane>
List-Post: <mailto:dane@ietf.org>
List-Help: <mailto:dane-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dane>, <mailto:dane-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 11 Sep 2012 15:25:22 -0000
On Sep 11, 2012, at 6:25 AM, Jakob Schlyter wrote: > On 11 sep 2012, at 07:03, Jim Schaad <ietf@augustcellars.com> wrote: > >> Problem #3 is almost impossible. It would require that only end-entity >> certificate be listed, and this would mean that either it would be directly >> trusted or one would need to have both an EE certificate and a trust anchor >> listed in the DNS entry. The capitalization issue would need to be >> addressed as in the previous paragraph, but is harder given that the sender >> may have never seen the mailbox name for the recipient and may be guessing >> at what the string should be if the DNS namespace is not over-populated. > > I believe you somewhat exaggerating this problem. IMHO, the requirements you list are true but in no way a showstopper and I believe that publishing down-cased EE cert would be a very pragmatic and deployable way of doing this. I think the biggest problem is the trust relationships... DNSSEC is designed to secure communication to the owner of the domain name. The same applies for DANE in most cases. With SMIME, the receiving mail server (and thus the DNS infrastructure behind it) is not nearly so trusted: one point of something like SMIME is to keep Google (the mail server) from datamining the email to use against me. Which implies that for problem #3, the solution may involve a DNSSEC signed record that includes both the SMIME certificate AND the identity of the mail account, with user's domains for the mail lookup being different from the domain (and company) handling the actual mail processing.
- [dane] FYI: New Version Notification for draft-ho… Jakob Schlyter
- Re: [dane] FYI: New Version Notification for draf… James Cloos
- Re: [dane] FYI: New Version Notification for draf… Paul Hoffman
- Re: [dane] FYI: New Version Notification for draf… Jim Schaad
- Re: [dane] FYI: New Version Notification for draf… Tony Finch
- Re: [dane] FYI: New Version Notification for draf… Jakob Schlyter
- Re: [dane] FYI: New Version Notification for draf… Nicholas Weaver
- Re: [dane] FYI: New Version Notification for draf… Jim Schaad
- Re: [dane] FYI: New Version Notification for draf… Martin Pels
- Re: [dane] FYI: New Version Notification for draf… Jakob Schlyter
- Re: [dane] FYI: New Version Notification for draf… Paul Hoffman
- Re: [dane] FYI: New Version Notification for draf… Jim Schaad