Re: [Endymail] Off we go...
Michael Kjörling <michael@kjorling.se> Wed, 27 August 2014 17:02 UTC
Return-Path: <michael@kjorling.se>
X-Original-To: endymail@ietfa.amsl.com
Delivered-To: endymail@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1])
by ietfa.amsl.com (Postfix) with ESMTP id 7A2F71A003A
for <endymail@ietfa.amsl.com>; Wed, 27 Aug 2014 10:02:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.781
X-Spam-Level:
X-Spam-Status: No, score=0.781 tagged_above=-999 required=5
tests=[BAYES_50=0.8, HELO_EQ_SE=0.35, MIME_8BIT_HEADER=0.3,
RP_MATCHES_RCVD=-0.668, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44])
by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id SpDjPKCixab2 for <endymail@ietfa.amsl.com>;
Wed, 27 Aug 2014 10:02:53 -0700 (PDT)
Received: from nekare.kjorling.se (nekare.kjorling.se [89.221.249.175])
(using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits))
(No client certificate requested)
by ietfa.amsl.com (Postfix) with ESMTPS id E5F921A0019
for <endymail@ietf.org>; Wed, 27 Aug 2014 10:02:52 -0700 (PDT)
Received: by nekare.kjorling.se (Postfix, from userid 1001)
id 785A8114075; Wed, 27 Aug 2014 17:02:50 +0000 (UTC)
X-Spam-Details: BAYES_00=-1.9, SPF_FAIL=0.001 (nekare.kjorling.se)
Received: from yeono.kjorling.se (h-9-65.a328.priv.bahnhof.se [46.59.9.65])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(Client CN "yeono", Issuer "yeono" (not verified))
by nekare.kjorling.se (Postfix) with ESMTPS id BA81C114067
for <endymail@ietf.org>; Wed, 27 Aug 2014 17:02:41 +0000 (UTC)
Received: from yeono.kjorling.se (localhost [127.0.0.1])
(using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits))
(Client did not present a certificate)
by yeono (Postfix) with ESMTPS id 5AF10140031
for <endymail@ietf.org>; Wed, 27 Aug 2014 19:02:41 +0200 (CEST)
Date: Wed, 27 Aug 2014 17:02:40 +0000
From: Michael =?utf-8?B?S2rDtnJsaW5n?= <michael@kjorling.se>
To: endymail@ietf.org
Message-ID: <20140827170240.GN7149@yeono.kjorling.se>
References: <53FD0B7D.8070705@qti.qualcomm.com>
<20140827155841.GO14392@mournblade.imrryr.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <20140827155841.GO14392@mournblade.imrryr.org>
Archived-At: http://mailarchive.ietf.org/arch/msg/endymail/QRxBaifEgFIT33Gh1goiiTl8hdI
Subject: Re: [Endymail] Off we go...
X-BeenThere: endymail@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: <endymail.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/endymail>,
<mailto:endymail-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/endymail/>
List-Post: <mailto:endymail@ietf.org>
List-Help: <mailto:endymail-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/endymail>,
<mailto:endymail-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Aug 2014 17:02:55 -0000
On 27 Aug 2014 15:58 +0000, from ietf-dane@dukhovni.org (Viktor Dukhovni): > So I'd like to see support for delivery-time encryption in LMTP > servers (dovecot, ...). This gets the recipient's mail protected > in storage regardless of the payload encryption capabilities of > the sender. Yes, this is not an end-to-end mechanism, and it may > be too late if at some point en-route the message was transmitted > in the clear. > What's the sweet-spot for protection of messages at rest that does > not unacceptably impact usability? Unlike IM conversations, that > users expect to be largely ephemeral, people tend to "hoard" email > as a long-term record of communication. On the reverse side of the generally small, stamped, disk-shaped metallic object to which we ascribe monetary value, otherwise known as a coin, these to me both sound like implementation concerns. There would be little stopping me from, today, taking an appropriate library and adding it to the LMTP delivery chain code of my favorite software. I could even almost certainly do something like the first basically by chaining together procmail and gnupg/openssl/whatever on the LMTP server and end user client side. Presto, email security at rest server-side. No IETF work needed. With a few relatively simple modifications, it should be possible to make the software guarantee that (as far as the OS can guarantee it) a message never leaves server RAM unencrypted. (We already have POP3 and IMAP4 over both SSL and STARTTLS; it should be a relatively trivial change allowing encrypted at rest messages to not be downloaded over an insecure connection.) UAs can cache decryption keys for whatever period of time is deemed reasonable, and the length of that period of time (and the allowed use of cached keys without reauthentication) can be made configurable by the user likely without overwhelming even relatively new users. ("Allow searching secure email without requiring a password" and "Allow displaying secure email without requiring a password" could be a start.) It wouldn't be perfect; for example, someone with a debugger running on the system in question would be able to gain access to the decryption keys; but then again at that point it's quite possible that the user's system is rooted anyway, in which case transport security doesn't help. (That needs quite different steps to mitigate, which would seem to me to be outside of the scope of this discussion list.) An issue that any end-to-end message encryption scheme would more or less have to address, though, as I see it, is _how do I know that I am encrypting to the right individual?_ Yes, computers could take care of that part, especially once communications is established, but somehow Alice still needs to know that she is sending that first message (and encrypting it to) Bob Bravo, who uses bobb@example.net because Mallory snatched bob@example.net. Considering that e-mail address mistypes are quite common in the wild, and may very well result in the message actually being delivered to the wrong person, initial establishment of secure communications seems like something that would need addressing (figuratively _and_ literally). -- Michael Kjörling • https://michael.kjorling.se • michael@kjorling.se OpenPGP B501AC6429EF4514 https://michael.kjorling.se/public-keys/pgp “People who think they know everything really annoy those of us who know we don’t.” (Bjarne Stroustrup)
- [Endymail] Off we go... Pete Resnick
- Re: [Endymail] Off we go... Tom Ritter
- Re: [Endymail] Off we go... Phillip Hallam-Baker
- Re: [Endymail] Off we go... Joe Hildebrand (jhildebr)
- Re: [Endymail] Off we go... Viktor Dukhovni
- Re: [Endymail] Off we go... Michael Kjörling
- Re: [Endymail] Off we go... Cyrus Daboo
- Re: [Endymail] Off we go... Frank Li
- Re: [Endymail] Off we go... Phillip Hallam-Baker
- Re: [Endymail] Off we go... Leo Vegoda
- Re: [Endymail] Off we go... Werner Koch
- Re: [Endymail] Off we go... Adam Caudill