Re: [Endymail] spam versus cleartext
Viktor Dukhovni <ietf-dane@dukhovni.org> Mon, 08 September 2014 03:09 UTC
Return-Path: <ietf-dane@dukhovni.org>
X-Original-To: endymail@ietfa.amsl.com
Delivered-To: endymail@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1])
by ietfa.amsl.com (Postfix) with ESMTP id 9D90F1A6ED8
for <endymail@ietfa.amsl.com>; Sun, 7 Sep 2014 20:09:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5
tests=[BAYES_00=-1.9] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44])
by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id h5esrpl3eiyE for <endymail@ietfa.amsl.com>;
Sun, 7 Sep 2014 20:09:44 -0700 (PDT)
Received: from mournblade.imrryr.org (mournblade.imrryr.org [38.117.134.19])
(using TLSv1.1 with cipher AECDH-AES256-SHA (256/256 bits))
(No client certificate requested)
by ietfa.amsl.com (Postfix) with ESMTPS id 64ED51A1F20
for <endymail@ietf.org>; Sun, 7 Sep 2014 20:09:44 -0700 (PDT)
Received: by mournblade.imrryr.org (Postfix, from userid 1034)
id 592532AB2D0; Mon, 8 Sep 2014 03:09:41 +0000 (UTC)
Date: Mon, 8 Sep 2014 03:09:41 +0000
From: Viktor Dukhovni <ietf-dane@dukhovni.org>
To: endymail@ietf.org
Message-ID: <20140908030941.GT26920@mournblade.imrryr.org>
References: <540AABF8.8000605@cisco.com>
<CAMm+Lwh1JJQTOgRN_31b3+oTreeHzntBxx5sNeAFQAwnac9trw@mail.gmail.com>
<540C5BE1.6010405@qti.qualcomm.com>
<540CCA3E.8020505@qti.qualcomm.com>
<alpine.BSF.2.11.1409071906310.16169@joyce.lan>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <alpine.BSF.2.11.1409071906310.16169@joyce.lan>
User-Agent: Mutt/1.5.23 (2014-03-12)
Archived-At: http://mailarchive.ietf.org/arch/msg/endymail/dhf3OmhQAi0owI36ZYrsuZyHIls
Subject: Re: [Endymail] spam versus cleartext
X-BeenThere: endymail@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: endymail@ietf.org
List-Id: <endymail.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/endymail>,
<mailto:endymail-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/endymail/>
List-Post: <mailto:endymail@ietf.org>
List-Help: <mailto:endymail-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/endymail>,
<mailto:endymail-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 08 Sep 2014 03:09:48 -0000
On Sun, Sep 07, 2014 at 07:06:54PM -0400, John R Levine wrote: > Take current implementations of S/MIME and adjust them to allow > self-signed certificates in addition to (or instead of) ones signed by > a list of CAs configured into the MUA. Apple's desktop Mail.app allows one (via Keychain) to bind a particular (self-signed or not) key to a particular sender. With Outlook the only choice is to trust the issuing CA for all addresses. As for what the IETF can do, maybe address sign-then-encrypt vs. encrypt-then-sign in S/MIME unless I missed the memo and this is no longer an issue. The SMIMEA draft is not yet published, I don't recall seeing a mechanism there to explicitly publish domain (gateway) keys, in addition to or instead of keys for each user. Perhaps wildcard DNS entries can simulate gateway keys. When SMIMEA records supply only the hash of a trust anchor, or of a user certificate, rather than the key, then the relevant public keys would have to be conveyed in band. For example via a reply from the user as suggested by Phillip Hallam-Baker. Thus SMIMEA is compatible with various more detailed models of key distribution. SMIMEA might not directly expose the actual public keys of individual users or even their hashes, rather it could simply publish a fixed certification authority that issues X.509 email certificates to the users of a domain. This can make the initial contact leaf of faith more secure. It might be useful to define message headers that an MSA or border outbound MTA should use to infer e2e encryption policy, for example by sending mail only when a suitable encryption key is available for a recipient. Gateways could send signed, but unencrypted contact requests to such users requesting a signed response (which could be verified via SMIMEA). Receiving user agents could respond directly with a signed message, or insert similar headers to have the recipient's gateway provide the requisite signature and public key certs. So mostly what's missing is new MUA code to support new key management models. Implementations may unearth the need for new headers or other relevant standards that enable the new feature set, but my guess is that for now what is missing is new code more than new standards. Perhaps this list will produce something unexpected that will lead the way to new implementations, but my guess is that it will be other way around. -- Viktor.
- [Endymail] spam versus cleartext Eliot Lear
- Re: [Endymail] spam versus cleartext Stephen Farrell
- Re: [Endymail] spam versus cleartext Eliot Lear
- Re: [Endymail] spam versus cleartext Viktor Dukhovni
- Re: [Endymail] spam versus cleartext Phillip Hallam-Baker
- Re: [Endymail] spam versus cleartext John Levine
- Re: [Endymail] spam versus cleartext Pete Resnick
- Re: [Endymail] spam versus cleartext Phillip Hallam-Baker
- Re: [Endymail] spam versus cleartext Dave Crocker
- Re: [Endymail] spam versus cleartext Viktor Dukhovni
- Re: [Endymail] spam versus cleartext Pete Resnick
- Re: [Endymail] spam versus cleartext Eliot Lear
- Re: [Endymail] spam versus cleartext Kathleen Moriarty
- Re: [Endymail] spam versus cleartext Dave Crocker
- Re: [Endymail] spam versus cleartext Dave Crocker
- Re: [Endymail] spam versus cleartext Stephen Farrell
- Re: [Endymail] spam versus cleartext Dave Crocker
- Re: [Endymail] spam versus cleartext John Levine
- Re: [Endymail] spam versus cleartext Watson Ladd
- Re: [Endymail] spam versus cleartext John Levine
- Re: [Endymail] spam versus cleartext Eliot Lear
- Re: [Endymail] spam versus cleartext Cyrus Daboo
- Re: [Endymail] spam versus cleartext Kathleen Moriarty
- Re: [Endymail] where's the end, was spam versus c… John Levine
- Re: [Endymail] spam versus cleartext Phillip Hallam-Baker
- Re: [Endymail] where's the end, was spam versus c… Watson Ladd
- Re: [Endymail] where's the end, was spam versus c… John R Levine
- Re: [Endymail] spam versus cleartext Pete Resnick
- Re: [Endymail] spam versus cleartext Phillip Hallam-Baker
- Re: [Endymail] spam versus cleartext John R Levine
- Re: [Endymail] spam versus cleartext Viktor Dukhovni
- Re: [Endymail] spam versus cleartext Phillip Hallam-Baker
- Re: [Endymail] spam versus cleartext Werner Koch
- Re: [Endymail] spam versus cleartext Brandon Long
- Re: [Endymail] spam versus cleartext Phillip Hallam-Baker
- Re: [Endymail] spam versus cleartext Phillip Hallam-Baker
- Re: [Endymail] spam versus cleartext Leo Vegoda
- Re: [Endymail] spam versus cleartext Viktor Dukhovni
- Re: [Endymail] spam versus cleartext Cyrus Daboo
- Re: [Endymail] spam versus cleartext Phillip Hallam-Baker
- Re: [Endymail] spam versus cleartext Dave Crocker
- Re: [Endymail] spam versus cleartext John R Levine
- Re: [Endymail] spam versus cleartext Dave Crocker
- Re: [Endymail] spam versus cleartext John R Levine
- Re: [Endymail] spam versus cleartext Dave Crocker