Re: [Endymail] Off we go...

Michael Kjörling <michael@kjorling.se> Wed, 27 August 2014 17:02 UTC

Return-Path: <michael@kjorling.se>
X-Original-To: endymail@ietfa.amsl.com
Delivered-To: endymail@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7A2F71A003A for <endymail@ietfa.amsl.com>; Wed, 27 Aug 2014 10:02:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.781
X-Spam-Level:
X-Spam-Status: No, score=0.781 tagged_above=-999 required=5 tests=[BAYES_50=0.8, HELO_EQ_SE=0.35, MIME_8BIT_HEADER=0.3, RP_MATCHES_RCVD=-0.668, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SpDjPKCixab2 for <endymail@ietfa.amsl.com>; Wed, 27 Aug 2014 10:02:53 -0700 (PDT)
Received: from nekare.kjorling.se (nekare.kjorling.se [89.221.249.175]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E5F921A0019 for <endymail@ietf.org>; Wed, 27 Aug 2014 10:02:52 -0700 (PDT)
Received: by nekare.kjorling.se (Postfix, from userid 1001) id 785A8114075; Wed, 27 Aug 2014 17:02:50 +0000 (UTC)
X-Spam-Details: BAYES_00=-1.9, SPF_FAIL=0.001 (nekare.kjorling.se)
Received: from yeono.kjorling.se (h-9-65.a328.priv.bahnhof.se [46.59.9.65]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "yeono", Issuer "yeono" (not verified)) by nekare.kjorling.se (Postfix) with ESMTPS id BA81C114067 for <endymail@ietf.org>; Wed, 27 Aug 2014 17:02:41 +0000 (UTC)
Received: from yeono.kjorling.se (localhost [127.0.0.1]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (Client did not present a certificate) by yeono (Postfix) with ESMTPS id 5AF10140031 for <endymail@ietf.org>; Wed, 27 Aug 2014 19:02:41 +0200 (CEST)
Date: Wed, 27 Aug 2014 17:02:40 +0000
From: Michael =?utf-8?B?S2rDtnJsaW5n?= <michael@kjorling.se>
To: endymail@ietf.org
Message-ID: <20140827170240.GN7149@yeono.kjorling.se>
References: <53FD0B7D.8070705@qti.qualcomm.com> <20140827155841.GO14392@mournblade.imrryr.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <20140827155841.GO14392@mournblade.imrryr.org>
Archived-At: http://mailarchive.ietf.org/arch/msg/endymail/QRxBaifEgFIT33Gh1goiiTl8hdI
Subject: Re: [Endymail] Off we go...
X-BeenThere: endymail@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: <endymail.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/endymail>, <mailto:endymail-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/endymail/>
List-Post: <mailto:endymail@ietf.org>
List-Help: <mailto:endymail-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/endymail>, <mailto:endymail-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Aug 2014 17:02:55 -0000

On 27 Aug 2014 15:58 +0000, from ietf-dane@dukhovni.org (Viktor Dukhovni):
> So I'd like to see support for delivery-time encryption in LMTP
> servers (dovecot, ...).  This gets the recipient's mail protected
> in storage regardless of the payload encryption capabilities of
> the sender.  Yes, this is not an end-to-end mechanism, and it may
> be too late if at some point en-route the message was transmitted
> in the clear.

> What's the sweet-spot for protection of messages at rest that does
> not unacceptably impact usability?  Unlike IM conversations, that
> users expect to be largely ephemeral, people tend to "hoard" email
> as a long-term record of communication.

On the reverse side of the generally small, stamped, disk-shaped
metallic object to which we ascribe monetary value, otherwise known as
a coin, these to me both sound like implementation concerns.

There would be little stopping me from, today, taking an appropriate
library and adding it to the LMTP delivery chain code of my favorite
software. I could even almost certainly do something like the first
basically by chaining together procmail and gnupg/openssl/whatever on
the LMTP server and end user client side. Presto, email security at
rest server-side. No IETF work needed. With a few relatively simple
modifications, it should be possible to make the software guarantee
that (as far as the OS can guarantee it) a message never leaves server
RAM unencrypted. (We already have POP3 and IMAP4 over both SSL and
STARTTLS; it should be a relatively trivial change allowing encrypted
at rest messages to not be downloaded over an insecure connection.)

UAs can cache decryption keys for whatever period of time is deemed
reasonable, and the length of that period of time (and the allowed use
of cached keys without reauthentication) can be made configurable by
the user likely without overwhelming even relatively new users.
("Allow searching secure email without requiring a password" and
"Allow displaying secure email without requiring a password" could be
a start.) It wouldn't be perfect; for example, someone with a debugger
running on the system in question would be able to gain access to the
decryption keys; but then again at that point it's quite possible that
the user's system is rooted anyway, in which case transport security
doesn't help. (That needs quite different steps to mitigate, which
would seem to me to be outside of the scope of this discussion list.)

An issue that any end-to-end message encryption scheme would more or
less have to address, though, as I see it, is _how do I know that I am
encrypting to the right individual?_ Yes, computers could take care of
that part, especially once communications is established, but somehow
Alice still needs to know that she is sending that first message (and
encrypting it to) Bob Bravo, who uses bobb@example.net because Mallory
snatched bob@example.net. Considering that e-mail address mistypes are
quite common in the wild, and may very well result in the message
actually being delivered to the wrong person, initial establishment of
secure communications seems like something that would need addressing
(figuratively _and_ literally).

-- 
Michael Kjörling • https://michael.kjorling.semichael@kjorling.se
OpenPGP B501AC6429EF4514 https://michael.kjorling.se/public-keys/pgp
                 “People who think they know everything really annoy
                 those of us who know we don’t.” (Bjarne Stroustrup)