Re: [Endymail] Off we go...
Phillip Hallam-Baker <phill@hallambaker.com> Wed, 27 August 2014 02:23 UTC
Return-Path: <hallam@gmail.com>
X-Original-To: endymail@ietfa.amsl.com
Delivered-To: endymail@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1])
by ietfa.amsl.com (Postfix) with ESMTP id 49C901A036A
for <endymail@ietfa.amsl.com>; Tue, 26 Aug 2014 19:23:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.422
X-Spam-Level: *
X-Spam-Status: No, score=1.422 tagged_above=-999 required=5
tests=[BAYES_50=0.8, DKIM_SIGNED=0.1, DKIM_VALID=-0.1,
FM_FORGED_GMAIL=0.622, FREEMAIL_FROM=0.001, SPF_PASS=-0.001]
autolearn=no
Received: from mail.ietf.org ([4.31.198.44])
by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id f36C1FwBbQej for <endymail@ietfa.amsl.com>;
Tue, 26 Aug 2014 19:23:05 -0700 (PDT)
Received: from mail-la0-x230.google.com (mail-la0-x230.google.com
[IPv6:2a00:1450:4010:c03::230])
(using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits))
(No client certificate requested)
by ietfa.amsl.com (Postfix) with ESMTPS id 585551A0059
for <endymail@ietf.org>; Tue, 26 Aug 2014 19:23:04 -0700 (PDT)
Received: by mail-la0-f48.google.com with SMTP id gl10so15752021lab.21
for <endymail@ietf.org>; Tue, 26 Aug 2014 19:23:02 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
h=mime-version:sender:in-reply-to:references:date:message-id:subject
:from:to:cc:content-type;
bh=RTpWtcIJOD4vjA1aH5EJaNJJFP1eAP4fT3smIXS9xJE=;
b=Q7wGmcFdTM/t8eHbsXRehyoOsyyYSCeog6NNQYz8WoDkxft+n/C78bEzo4Ar158AH1
BYkNESFsbUZ1b9Byx0INfhImbSvfVyd9AhnuPfBiFEle9nI+fuMGJotnf9PxcemI6xpM
fA9x8LpPgGwiFT1SI5t+YskHF5iBpLXOydOpgPmt15zAh8IwdvPvrN1aQJSbmvKP+Qac
ACS/v117QpfZ7rDkPPsUN7/Y0DGluNsD8ZGJ2tcN7vGIZmPopcMMKA4fYbvDIDcZbVbS
o7QuwXZT/Va4ZY7sDD7Gm+ZcJ2SOGUayPBKwcNThQhwyWpPOHIO6FiRfY9SbxASTtYhc
8dvA==
MIME-Version: 1.0
X-Received: by 10.112.157.132 with SMTP id wm4mr191243lbb.89.1409106182597;
Tue, 26 Aug 2014 19:23:02 -0700 (PDT)
Sender: hallam@gmail.com
Received: by 10.112.122.50 with HTTP; Tue, 26 Aug 2014 19:23:02 -0700 (PDT)
In-Reply-To: <53FD0B7D.8070705@qti.qualcomm.com>
References: <53FD0B7D.8070705@qti.qualcomm.com>
Date: Tue, 26 Aug 2014 22:23:02 -0400
X-Google-Sender-Auth: v0Bg0pmSy35jgGfB0Z1mxdyCBes
Message-ID: <CAMm+LwjqNXrZCbXAgJjB0isTb5VCQVHmBR2X55JO6ZaBLuGZTA@mail.gmail.com>
From: Phillip Hallam-Baker <phill@hallambaker.com>
To: Pete Resnick <presnick@qti.qualcomm.com>,
Stephen Farrell <stephen.farrell@cs.tcd.ie>
Content-Type: text/plain; charset=UTF-8
Archived-At: http://mailarchive.ietf.org/arch/msg/endymail/JSH7WYV-2uNYnE5UvEAYW8h6QWE
Cc: endymail@ietf.org
Subject: Re: [Endymail] Off we go...
X-BeenThere: endymail@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: <endymail.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/endymail>,
<mailto:endymail-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/endymail/>
List-Post: <mailto:endymail@ietf.org>
List-Help: <mailto:endymail-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/endymail>,
<mailto:endymail-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Aug 2014 02:23:08 -0000
On Tue, Aug 26, 2014 at 6:34 PM, Pete Resnick <presnick@qti.qualcomm.com> wrote: > Hi all, > > We've got 88 people subscribed now, which is pretty quick for a list like > this. Seems like there really is interest in the topic, which is good. > > What we'd suggest is to start off with some sharing about what folks > are/have-been doing in this space. We know there are a range of projects and > proposals and it'd be good to get some information/pointers on those we all > know about. My work is described on the PrismProof.org web site. I have been looking at the reasons people don't use end to end encrypted mail. I see the following problems: 1) Every system currently available has chronic usability problems. They are too difficult to configure and too much hassle to use. This is true of both S/MIME and PGP. 2) The standards battle between PGP and S/MIME has run into a stalemate with no victor. 3) The CA trust model does not really deliver value for end entity certificates unless the certificates are being issued by an LRA that knows the key holder. The Web of Trust model does not scale due to the Moore bound. To illustrate just how unnecessarily hard it is to send S/MIME mail today, this is what it takes to install a certificate in Thunderbird on Windows. 1) Discover that the feature exists 2) Select a CA to issue the certificate, Comodo offers free certs but you will only find them if you are looking for them. 3) Fill in a Web form to apply for the certificate 4) Respond to the email challenge 5) Install the certificate into the Windows keystore using the Web browser but this will only work if you use the same Web browser as you used to apply for the certificate 6) Export the certificate from the Windows store 7) Import the certificate into the Thunderbird cert store which is not the same as the firefox one 8) Configure Thunderbird to use the certificate 9) Repeat this whole process every 12 months And before you start off telling me about PGP, getting that to work proved so tedious I gave up. The problem was that the client I tried to use was from the 'mushroom' school of usability and does not tell the user anything they need to know to use PGP. Not even their fingerprint and not the key server they use either. And it insisted on encrypting the key under a strong passphrase which is idiotic, it should use the machine trust store. I also have an existence proof for a solution to the usability problem. The PPE key manager generates a personal PKI hierarchy and configures Windows Live Mail to use it without any user intervention at all. There are some things that I would like the user to be able to select such as the choice of a service provider to gateway their key to other forms of PKI. Strong email addresses are conceptually just a PGP fingerprint bolted onto the front of a regular email address. So we now have one identifier that specifies the address to sent the message and the means to validate the security policy under which it is sent. This effectively enables the use of the de-facto PGP trust model of key fingerprints in the S/MIME world. The reason I am basing my work on S/MIME is that that is the standard supported by all the mail clients. So building on that gives access to a vast base of installed software. All we need to do is to write easy to use tools to configure them. Or alternatively shame the providers into fixing the absolutely dreadful usability of their current product. Lets get one thing straight, you don't need to have a usability lab to spot these usability problems. > Its probably worth stating now that this list is *not* intended to pick a > winner amongst those, nor to anoint one as the "official" IETF thing, so > luckily we don't need to have a bunfight about which is the shiniest > proposal of them all. :-) I disagree. I think the problem divides into two parts, how you decide which key to use and how to apply that key to a message. The first part is the area where I don't want to come to one agreement because there isn't one single trust model that works for every application. It is a research area where we can do some really interesting things. This is the place where I think Certificate Transparency like concepts really do pay off. But innovating in the key selection space should not require people to develop their own message format or embed it in MIME. We already have that problem solved and deployed: S/MIME works great as a message format and it has decades of testing in the deployed email infrastructure and every email vendor makes sure that they don't break it. The biggest cost to me as a researcher in the key selection space is having to 'enable' all those email clients. Which is why I want to separate out the code into two parts 1) A Common core that goes in the client that has web services sockets to talk to key services in the cloud 2) Key services in the cloud that do 'the interesting stuff'. This is not going to be end to end security as people think of it on day one. But this separation allows us to tweek the trust models and update them without having to roll out new generations of email clients. We only embed the trust model into the client endpoints after it is proven to work. > Success here will be when/if we identify some bit(s) of work that the IETF > could credibly do that'd improve the real-world end-to-end security and > privacy of email. And note that "credible" there requires stuff to be both > technically sane and to have a sufficient set of capable folks interested > and willing to do work. Defining a common platform on which we can build new trust models would be one of those bits of work:
- [Endymail] Off we go... Pete Resnick
- Re: [Endymail] Off we go... Tom Ritter
- Re: [Endymail] Off we go... Phillip Hallam-Baker
- Re: [Endymail] Off we go... Joe Hildebrand (jhildebr)
- Re: [Endymail] Off we go... Viktor Dukhovni
- Re: [Endymail] Off we go... Michael Kjörling
- Re: [Endymail] Off we go... Cyrus Daboo
- Re: [Endymail] Off we go... Frank Li
- Re: [Endymail] Off we go... Phillip Hallam-Baker
- Re: [Endymail] Off we go... Leo Vegoda
- Re: [Endymail] Off we go... Werner Koch
- Re: [Endymail] Off we go... Adam Caudill