Re: [dispatch] Work for IETF114

Richard Barnes <rlb@ipv.sx> Mon, 25 July 2022 13:15 UTC

Return-Path: <rlb@ipv.sx>
X-Original-To: dispatch@ietfa.amsl.com
Delivered-To: dispatch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 44D60C14F737 for <dispatch@ietfa.amsl.com>; Mon, 25 Jul 2022 06:15:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.906
X-Spam-Level:
X-Spam-Status: No, score=-1.906 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=ipv-sx.20210112.gappssmtp.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jEKVVV03tVP3 for <dispatch@ietfa.amsl.com>; Mon, 25 Jul 2022 06:15:05 -0700 (PDT)
Received: from mail-qv1-xf33.google.com (mail-qv1-xf33.google.com [IPv6:2607:f8b0:4864:20::f33]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2C311C14F747 for <dispatch@ietf.org>; Mon, 25 Jul 2022 06:15:05 -0700 (PDT)
Received: by mail-qv1-xf33.google.com with SMTP id i13so8339489qvo.3 for <dispatch@ietf.org>; Mon, 25 Jul 2022 06:15:05 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ipv-sx.20210112.gappssmtp.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=9cm2kC1ci4oMx1EC4lEyLmmHMlFQ5vx/YV3i4k+7M60=; b=aDH8vXINIuQFUTii7PQNtSa/OdGLQRNMWnfoIamdr/m6753NqKoQYrrsPyzqfD6wkN 6BDlQ8pHe2WN6G75DR/K7p0l21Re3HC4ZDx90GG5mb2th7k6LDVPzYR9e6TdNyEdm2xz 2U177e37LyaTeXCaN5VK1G3UdLThohEXs+RMrjzdF5glSTxpSDu/ESFUyJcM3J2NQ5fl PIxgEmJL/4RJFtckGltt4IbK3h65mYYWw8x3KRCDQvyH7sbTXdUhBGVyhIrrxzbLh+at lSQ7aJQnKpwC9UKKj5A5GyZehzhODfuMMjaye/c+Brup/cfITAVDgjFh3tvlqun8tUWb Hntw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=9cm2kC1ci4oMx1EC4lEyLmmHMlFQ5vx/YV3i4k+7M60=; b=DJwWN5spOg5ee1ivj6iXg6LQx4icaw+quRx29dkZYe9Eyntyt/AzsWmI8ivFp1HLD2 bbIRsDTm0JQA9lI6HnbFCeB82snUbN0Fkk1uIB2haIMwt+08ST23k5qPnsINx3EcwXvB H762S5dhKgGNlvdNSrmtD3Czkox1XdDwZawXBZsltQ/LrClQNDVBfTH6TZxZK2qYo976 Eay35ctNpAl1SEWnMtjmO4TQ5BBAB4Ln11/pEHVQsPpfghu4QyA+XW7hR6PwxpsMpw5J T8DWPKENnNZ3XK5jAW/5AhkQx/TrjFqT7t8JBp9rayrQw+WUKMXyIt6Bs4A/FBD/x/g7 7iMA==
X-Gm-Message-State: AJIora+sJcMMiCi6iWUF4nTWYHO+LjV4KviCl0x96CFMundJTwmsJ9VY OnWEk4LLo7nDpstDsmcoK91lhvkdal4CzwZMrc3WMEeaztkZ8w==
X-Google-Smtp-Source: AGRyM1vcDepXHNzbMPh0riG5DEpQu7+yDIZcDOEJ1I25CCTVNB1uT1oXsX8HY6R4oCF+EdeviZ8kofqjS05vRiDVhko=
X-Received: by 2002:a05:6214:4015:b0:474:15d9:ce76 with SMTP id kd21-20020a056214401500b0047415d9ce76mr10066119qvb.86.1658754903315; Mon, 25 Jul 2022 06:15:03 -0700 (PDT)
MIME-Version: 1.0
References: <ec38343d-6c89-4c8a-82c0-484375bd89b1@www.fastmail.com>
In-Reply-To: <ec38343d-6c89-4c8a-82c0-484375bd89b1@www.fastmail.com>
From: Richard Barnes <rlb@ipv.sx>
Date: Mon, 25 Jul 2022 09:14:52 -0400
Message-ID: <CAL02cgQgoYzi5wW-ay-sL9bH-PNJCSXTz=rp4e3oLdjPbNvyoQ@mail.gmail.com>
To: Bron Gondwana <brong@fastmailteam.com>
Cc: dispatch@ietf.org
Content-Type: multipart/alternative; boundary="000000000000c830e305e4a0f8ec"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dispatch/XHlHpdPVVUsRsrKh7DBuCHdIrRc>
Subject: Re: [dispatch] Work for IETF114
X-BeenThere: dispatch@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: DISPATCH Working Group Mail List <dispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dispatch>, <mailto:dispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dispatch/>
List-Post: <mailto:dispatch@ietf.org>
List-Help: <mailto:dispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dispatch>, <mailto:dispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 25 Jul 2022 13:15:09 -0000

This "upload an encrypted thing and send the URI+key" design pattern is
ubiquitous in messaging, so it's not implausible to me that a common scheme
would get some use.  But it would be good to benefit from prior art here.
For example, this is the scheme that Webex messaging uses:

https://www.npmjs.com/package/node-scr

```
scr {
  "enc" : string,   ; Content Encryption Algorithm from [RFC7518]
  "key" : string,   ; base64url-encoded raw key value
  "iv"  : string,   ; base64url-encoded initialization vector
  "aad" : string,   ; Additional authenticated data (AAD)
  "loc" : ? uri,    ; Location of encrypted content
  "tag" : ? string  ; base64url-encoded authentication tag
}
```

Note that there are more fields there than the algorithm and key your URI
thing envisions.  AAD could be left blank, and the tag might be part of the
ciphertext (as called for in RFC 5116 but not universally implemented).  So
the main problematic thing is the IV.

There's probably some requirements work to be done here, for questions like
whether anything can be assumed about the structure of the content aside
from being a ciphertext for a given algorithm.  (If not, you could attach
the IV.)  If there's interest, a focused working group would probably be my
preferred path.

--Richard


On Fri, Jun 10, 2022 at 9:22 AM Bron Gondwana <brong@fastmailteam.com>
wrote:

> Yep, me again with something new that's bubbling up out of the "large
> files over email" problem.
>
> I'm not quite sure the shape of this, but I'd like some time to talk about
> something which might be a media type, might be a URI scheme, might be... I
> dunno.  I'm sure the group will have zillions of opinions about both what
> the work should be, and what it should look like.  I can give you the user
> experience and use-case that I want anyway.
>
> ...
>
> Use case: user wants to store a file encrypted on a server, and provide a
> link such that their recipient can get the decrypted file, without the
> server ever seeing the plaintext content.
>
> Which basically means - the URL/URI that the sender provides to the
> recipient contains the key data to decrypt the content, encoded into the
> URI in such a way that it's not provided to the server.  There are pros and
> cons of different approaches, but ideally the operating system / browser /
> library transparently does the decryption as part of the fetching such that
> a piece of client software doesn't care if the data is stored in plaintext
> and transferred over HTTPS (or whatever), or stored encrypted on the server
> with zero knowledge - either way the client program / library gets the raw
> data plaintext and doesn't have to care what the sender intended.
>
> Obviously, this only works if the recipient supports it, so bootstrapping
> is going to be a pain.  But I haven't seen something like this existing,
> and it would be SOOOOOO much nicer to have this transparently able to be
> embedded in the URI and handled by lower levels rather than having to
> design and specify an optional encryption layer in the email large file
> handling stuff.
>
> ...
>
> I'll put together a better proposal in the next couple of weeks, but just
> requesting the agenda time now :)
>
> And I would LOVE it if someone already knows that such a thing exists and
> can point me to it instead of having to reinvent the wheel.
>
> Cheers,
>
> Bron.
>
> --
>   Bron Gondwana, CEO, Fastmail Pty Ltd
>   brong@fastmailteam.com
>
>
> _______________________________________________
> dispatch mailing list
> dispatch@ietf.org
> https://www.ietf.org/mailman/listinfo/dispatch
>