Re: [Endymail] Off we go...

Phillip Hallam-Baker <phill@hallambaker.com> Wed, 27 August 2014 02:23 UTC

Return-Path: <hallam@gmail.com>
X-Original-To: endymail@ietfa.amsl.com
Delivered-To: endymail@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 49C901A036A for <endymail@ietfa.amsl.com>; Tue, 26 Aug 2014 19:23:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.422
X-Spam-Level: *
X-Spam-Status: No, score=1.422 tagged_above=-999 required=5 tests=[BAYES_50=0.8, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FM_FORGED_GMAIL=0.622, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id f36C1FwBbQej for <endymail@ietfa.amsl.com>; Tue, 26 Aug 2014 19:23:05 -0700 (PDT)
Received: from mail-la0-x230.google.com (mail-la0-x230.google.com [IPv6:2a00:1450:4010:c03::230]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 585551A0059 for <endymail@ietf.org>; Tue, 26 Aug 2014 19:23:04 -0700 (PDT)
Received: by mail-la0-f48.google.com with SMTP id gl10so15752021lab.21 for <endymail@ietf.org>; Tue, 26 Aug 2014 19:23:02 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:in-reply-to:references:date:message-id:subject :from:to:cc:content-type; bh=RTpWtcIJOD4vjA1aH5EJaNJJFP1eAP4fT3smIXS9xJE=; b=Q7wGmcFdTM/t8eHbsXRehyoOsyyYSCeog6NNQYz8WoDkxft+n/C78bEzo4Ar158AH1 BYkNESFsbUZ1b9Byx0INfhImbSvfVyd9AhnuPfBiFEle9nI+fuMGJotnf9PxcemI6xpM fA9x8LpPgGwiFT1SI5t+YskHF5iBpLXOydOpgPmt15zAh8IwdvPvrN1aQJSbmvKP+Qac ACS/v117QpfZ7rDkPPsUN7/Y0DGluNsD8ZGJ2tcN7vGIZmPopcMMKA4fYbvDIDcZbVbS o7QuwXZT/Va4ZY7sDD7Gm+ZcJ2SOGUayPBKwcNThQhwyWpPOHIO6FiRfY9SbxASTtYhc 8dvA==
MIME-Version: 1.0
X-Received: by 10.112.157.132 with SMTP id wm4mr191243lbb.89.1409106182597; Tue, 26 Aug 2014 19:23:02 -0700 (PDT)
Sender: hallam@gmail.com
Received: by 10.112.122.50 with HTTP; Tue, 26 Aug 2014 19:23:02 -0700 (PDT)
In-Reply-To: <53FD0B7D.8070705@qti.qualcomm.com>
References: <53FD0B7D.8070705@qti.qualcomm.com>
Date: Tue, 26 Aug 2014 22:23:02 -0400
X-Google-Sender-Auth: v0Bg0pmSy35jgGfB0Z1mxdyCBes
Message-ID: <CAMm+LwjqNXrZCbXAgJjB0isTb5VCQVHmBR2X55JO6ZaBLuGZTA@mail.gmail.com>
From: Phillip Hallam-Baker <phill@hallambaker.com>
To: Pete Resnick <presnick@qti.qualcomm.com>, Stephen Farrell <stephen.farrell@cs.tcd.ie>
Content-Type: text/plain; charset=UTF-8
Archived-At: http://mailarchive.ietf.org/arch/msg/endymail/JSH7WYV-2uNYnE5UvEAYW8h6QWE
Cc: endymail@ietf.org
Subject: Re: [Endymail] Off we go...
X-BeenThere: endymail@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: <endymail.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/endymail>, <mailto:endymail-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/endymail/>
List-Post: <mailto:endymail@ietf.org>
List-Help: <mailto:endymail-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/endymail>, <mailto:endymail-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Aug 2014 02:23:08 -0000

On Tue, Aug 26, 2014 at 6:34 PM, Pete Resnick <presnick@qti.qualcomm.com> wrote:
> Hi all,
>
> We've got 88 people subscribed now, which is pretty quick for a list like
> this. Seems like there really is interest in the topic, which is good.
>
> What we'd suggest is to start off with some sharing about what folks
> are/have-been doing in this space. We know there are a range of projects and
> proposals and it'd be good to get some information/pointers on those we all
> know about.

My work is described on the PrismProof.org web site.

I have been looking at the reasons people don't use end to end
encrypted mail. I see the following problems:

1) Every system currently available has chronic usability problems.
They are too difficult to configure and too much hassle to use. This
is true of both S/MIME and PGP.

2) The standards battle between PGP and S/MIME has run into a
stalemate with no victor.

3) The CA trust model does not really deliver value for end entity
certificates unless the certificates are being issued by an LRA that
knows the key holder. The Web of Trust model does not scale due to the
Moore bound.


To illustrate just how unnecessarily hard it is to send S/MIME mail
today, this is what it takes to install a certificate in Thunderbird
on Windows.

1) Discover that the feature exists
2) Select a CA to issue the certificate, Comodo offers free certs but
you will only find them if you are looking for them.
3) Fill in a Web form to apply for the certificate
4) Respond to the email challenge
5) Install the certificate into the Windows keystore using the Web
browser but this will only work if you use the same Web browser as you
used to apply for the certificate
6) Export the certificate from the Windows store
7) Import the certificate into the Thunderbird cert store which is not
the same as the firefox one
8) Configure Thunderbird to use the certificate
9) Repeat this whole process every 12 months

And before you start off telling me about PGP, getting that to work
proved so tedious I gave up. The problem was that the client I tried
to use was from the 'mushroom' school of usability and does not tell
the user anything they need to know to use PGP. Not even their
fingerprint and not the key server they use either. And it insisted on
encrypting the key under a strong passphrase which is idiotic, it
should use the machine trust store.


I also have an existence proof for a solution to the usability problem.

The PPE key manager generates a personal PKI hierarchy and configures
Windows Live Mail to use it without any user intervention at all.
There are some things that I would like the user to be able to select
such as the choice of a service provider to gateway their key to other
forms of PKI.

Strong email addresses are conceptually just a PGP fingerprint bolted
onto the front of a regular email address. So we now have one
identifier that specifies the address to sent the message and the
means to validate the security policy under which it is sent. This
effectively enables the use of the de-facto PGP trust model of key
fingerprints in the S/MIME world.


The reason I am basing my work on S/MIME is that that is the standard
supported by all the mail clients. So building on that gives access to
a vast base of installed software. All we need to do is to write easy
to use tools to configure them. Or alternatively shame the providers
into fixing the absolutely dreadful usability of their current
product.

Lets get one thing straight, you don't need to have a usability lab to
spot these usability problems.


> Its probably worth stating now that this list is *not* intended to pick a
> winner amongst those, nor to anoint one as the "official" IETF thing, so
> luckily we don't need to have a bunfight about which is the shiniest
> proposal of them all. :-)

I disagree. I think the problem divides into two parts, how you decide
which key to use and how to apply that key to a message.

The first part is the area where I don't want to come to one agreement
because there isn't one single trust model that works for every
application. It is a research area where we can do some really
interesting things. This is the place where I think Certificate
Transparency like concepts really do pay off.

But innovating in the key selection space should not require people to
develop their own message format or embed it in MIME. We already have
that problem solved and deployed: S/MIME works great as a message
format and it has decades of testing in the deployed email
infrastructure and every email vendor makes sure that they don't break
it.


The biggest cost to me as a researcher in the key selection space is
having to 'enable' all those email clients. Which is why I want to
separate out the code into two parts

1) A Common core that goes in the client that has web services sockets
to talk to key services in the cloud
2) Key services in the cloud that do 'the interesting stuff'.

This is not going to be end to end security as people think of it on
day one. But this separation allows us to tweek the trust models and
update them without having to roll out new generations of email
clients. We only embed the trust model into the client endpoints after
it is proven to work.



> Success here will be when/if we identify some bit(s) of work that the IETF
> could credibly do that'd improve the real-world end-to-end security and
> privacy of email. And note that "credible" there requires stuff to be both
> technically sane and to have a sufficient set of capable folks interested
> and willing to do work.

Defining a common platform on which we can build new trust models
would be one of those bits of work: