Re: [dispatch] Work for IETF114

Tim Bray <tbray@textuality.com> Thu, 16 June 2022 02:09 UTC

Return-Path: <tbray@textuality.com>
X-Original-To: dispatch@ietfa.amsl.com
Delivered-To: dispatch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4A42DC14CF0B for <dispatch@ietfa.amsl.com>; Wed, 15 Jun 2022 19:09:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.905
X-Spam-Level:
X-Spam-Status: No, score=-1.905 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=textuality-com.20210112.gappssmtp.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id treXzDv1OdqT for <dispatch@ietfa.amsl.com>; Wed, 15 Jun 2022 19:09:15 -0700 (PDT)
Received: from mail-ej1-x633.google.com (mail-ej1-x633.google.com [IPv6:2a00:1450:4864:20::633]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3CC6DC14F742 for <dispatch@ietf.org>; Wed, 15 Jun 2022 19:09:15 -0700 (PDT)
Received: by mail-ej1-x633.google.com with SMTP id y19so119754ejq.6 for <dispatch@ietf.org>; Wed, 15 Jun 2022 19:09:15 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=textuality-com.20210112.gappssmtp.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=wLgF+pDXm8wgSqRqLYE+lnXcuj9yphA/Gx9t14ZPGfc=; b=dIroRkO1uz5aDXTiTfYtaXar1hQ/0dlBvUD/2miJpt7xeiK3aQEUbYA/U/5HhRCD/8 wsi3MvQIctH/qnVT6tDs2JQAyVpiunGWaE3t/SKuDEeUWHsgGi/KpNDhQMd2U11TlA2a 88oVYz8TFl8GuVB+LBw6ycLLwh2L/n/0zsydBdE/OTq37iZWN07TTQltcJC44lR8xPh5 pVm/oFNY0iz4LjdYX75D5snHg8RCGduZMrLlvtUUgHSL9ADAnlcvZ9lkRz9s7ZIae+Rs 3us6lUNV9nXTW2MyRbye7QTmW7E1clQQSqhTzqNKuKblQe2wW88dfpv7N3m4dlECbkkm tH5g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=wLgF+pDXm8wgSqRqLYE+lnXcuj9yphA/Gx9t14ZPGfc=; b=aDCj00poxVB68RtNPg1kMiKJgqL9gqPgGuElT9SkaH+yk+29Rgk/PJ245jj3bRGvyl abTQsUlTQ8QM/6x5WCcD2Dg6l8NIfXu9mF92P83p/qBVRC8Uwo9DyRJitmzAb7vXXPJd dNgK2hducLUl8INVCd/vCXjCKIhPUmHrO6/cUDLJ67bQZ//b8Q8n5uYnON7g/0H7x5Tg AMhc2TH1szwwd8I7pYB4PSlod1NMeICFBg54OUW+R5tXA5v61kpYzKg85qWfKJUu2FTl 02nfOs4Ws+7ovkP+TLsUeyvU9AOFAaHlAxGFb16GHcKgLXlurTqgOsm7xX/ir2fof0dY Hs/A==
X-Gm-Message-State: AJIora/wsPsmw80vTlA14fw7oEA01BPlHuNmi5EXDiAqrpBLsS3TFegK Ks3WISQufQb1HxsxqiT2CtF1AXKrFxO/e2c4p18L+ikA1KUy2A==
X-Google-Smtp-Source: AGRyM1vaS/v4zlo24KUXqRDkJcTpMu3O0SGaQU6PaIFh17dZLt8uxaEwx54ndJ/1n7JGkTEFcBv9dRmUrb1Ye65NcYI=
X-Received: by 2002:a17:906:5354:b0:712:1f3c:2970 with SMTP id j20-20020a170906535400b007121f3c2970mr2443610ejo.29.1655345353594; Wed, 15 Jun 2022 19:09:13 -0700 (PDT)
MIME-Version: 1.0
References: <ec38343d-6c89-4c8a-82c0-484375bd89b1@www.fastmail.com> <CAHBU6iuKpV-GTyOTHaytg9_MxDtrNNuSF88WWsTp3wfLmpfsQQ@mail.gmail.com> <5639B870-AC11-4111-B58A-BC02E7172D7C@mnot.net>
In-Reply-To: <5639B870-AC11-4111-B58A-BC02E7172D7C@mnot.net>
From: Tim Bray <tbray@textuality.com>
Date: Wed, 15 Jun 2022 19:09:02 -0700
Message-ID: <CAHBU6ivOnYghs8OVnuSM2_qt5ypTyXjG3E2ZEG3Zb4Qd1CCx4Q@mail.gmail.com>
To: Mark Nottingham <mnot@mnot.net>
Cc: Gondwana Bron <brong@fastmailteam.com>, DISPATCH list <dispatch@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000c8350c05e1871f37"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dispatch/o7o_s_d6KY0uQXkNoCpTcbJ7VNM>
Subject: Re: [dispatch] Work for IETF114
X-BeenThere: dispatch@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: DISPATCH Working Group Mail List <dispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dispatch>, <mailto:dispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dispatch/>
List-Post: <mailto:dispatch@ietf.org>
List-Help: <mailto:dispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dispatch>, <mailto:dispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 16 Jun 2022 02:09:19 -0000

If someone convinced me that there was any actual appetite for such a thing
and it'd have a chance of being implemented, I'd help with an I-D.

On Wed, Jun 15, 2022 at 6:57 PM Mark Nottingham <mnot@mnot.net> wrote:

> Tim's approach is the direction I'd encourage you to go in -- being able
> to reusing an existing scheme has a lot of merit.
>
> Cheers,
>
>
> > On 11 Jun 2022, at 2:06 am, Tim Bray <tbray@textuality.com> wrote:
> >
> > You know, you wouldn't have to invent *that* much new. When you retrieve
> https://example.com/foo#bar, the "#bar" part isn't sent to the server,
> and the rules say it is interpreted with respect to the content-type of
> whatever you get.  It's called the Fragment Identifier (
> https://datatracker.ietf.org/doc/html/rfc3986#section-3.5) and normally
> used to identify a fragment within the resource representation, but let's
> ignore that.  So suppose you invent a new media type, say
> app/encrypted-file.  Then you invent a tiny little language to go in the
> fragment identifier. E.g.
> >
> > https://example.com/#KeyID=48954289574239
> >
> > or possibly even
> >
> > https://example.com/#KeyHost=tbray.org&KeyID=48954289574239
> >
> > When this thing is retrieved (without the #fragment) you get something
> with Content-type: app/encrypted-file
> >
> > Now, there'd need to be serious thinking about chain of trust.
> Obviously you'd require trust and encryption for the channel over which the
> URI-with-fragment is transmitted.  Then there's the matter of where the key
> comes from. In the second form, one assumes the key is in
> example.org//.well-known/something  and the receiver only really needs to
> decide to trust example.org.  The first form, where there's a
> pre-existing out-of-band arrangement about where to get keys from, is
> attractive.  I think you still need the KeyID thing.
> >
> > Wouldn't be that hard to implement.
> >
> >
> > On Fri, Jun 10, 2022 at 6:22 AM Bron Gondwana <brong@fastmailteam.com>
> wrote:
> > Yep, me again with something new that's bubbling up out of the "large
> files over email" problem.
> >
> > I'm not quite sure the shape of this, but I'd like some time to talk
> about something which might be a media type, might be a URI scheme, might
> be... I dunno.  I'm sure the group will have zillions of opinions about
> both what the work should be, and what it should look like.  I can give you
> the user experience and use-case that I want anyway.
> >
> > ...
> >
> > Use case: user wants to store a file encrypted on a server, and provide
> a link such that their recipient can get the decrypted file, without the
> server ever seeing the plaintext content.
> >
> > Which basically means - the URL/URI that the sender provides to the
> recipient contains the key data to decrypt the content, encoded into the
> URI in such a way that it's not provided to the server.  There are pros and
> cons of different approaches, but ideally the operating system / browser /
> library transparently does the decryption as part of the fetching such that
> a piece of client software doesn't care if the data is stored in plaintext
> and transferred over HTTPS (or whatever), or stored encrypted on the server
> with zero knowledge - either way the client program / library gets the raw
> data plaintext and doesn't have to care what the sender intended.
> >
> > Obviously, this only works if the recipient supports it, so
> bootstrapping is going to be a pain.  But I haven't seen something like
> this existing, and it would be SOOOOOO much nicer to have this
> transparently able to be embedded in the URI and handled by lower levels
> rather than having to design and specify an optional encryption layer in
> the email large file handling stuff.
> >
> > ...
> >
> > I'll put together a better proposal in the next couple of weeks, but
> just requesting the agenda time now :)
> >
> > And I would LOVE it if someone already knows that such a thing exists
> and can point me to it instead of having to reinvent the wheel.
> >
> > Cheers,
> >
> > Bron.
> >
> > --
> >   Bron Gondwana, CEO, Fastmail Pty Ltd
> >   brong@fastmailteam.com
> >
> >
> > _______________________________________________
> > dispatch mailing list
> > dispatch@ietf.org
> > https://www.ietf.org/mailman/listinfo/dispatch
> > _______________________________________________
> > dispatch mailing list
> > dispatch@ietf.org
> > https://www.ietf.org/mailman/listinfo/dispatch
>
> --
> Mark Nottingham   https://www.mnot.net/
>
>