Re: [Endymail] Off we go...

Tom Ritter <tom@ritter.vg> Wed, 27 August 2014 02:20 UTC

Return-Path: <tom@ritter.vg>
X-Original-To: endymail@ietfa.amsl.com
Delivered-To: endymail@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 26DCE1A0371 for <endymail@ietfa.amsl.com>; Tue, 26 Aug 2014 19:20:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.379
X-Spam-Level:
X-Spam-Status: No, score=-1.379 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FM_FORGED_GMAIL=0.622, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wI_gQ0iVFKHB for <endymail@ietfa.amsl.com>; Tue, 26 Aug 2014 19:20:45 -0700 (PDT)
Received: from mail-ie0-x22b.google.com (mail-ie0-x22b.google.com [IPv6:2607:f8b0:4001:c03::22b]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BCB5D1A036A for <endymail@ietf.org>; Tue, 26 Aug 2014 19:20:45 -0700 (PDT)
Received: by mail-ie0-f171.google.com with SMTP id at1so12688873iec.30 for <endymail@ietf.org>; Tue, 26 Aug 2014 19:20:45 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ritter.vg; s=vg; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :content-type; bh=VUxOGoTeTEheRMhXgF0Y0ldcnPj5bbpIaWPauR8VwtY=; b=uuDgxk4XAxgFnMrtLUd4ZxiRU7n7wookxdpgQOIrSBs/IRwAEaY6vGVSfQbmq6eFHA NALw9vluzklG2gKko2TzbLZQYnLD0njYTkUn3lsnQFNtbpRS4ILtkSjj+rbrWQ66Z0eF PMOoj+2kiAHciNaDolCxoNzvzNVtvpFOiJa0g=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:content-type; bh=VUxOGoTeTEheRMhXgF0Y0ldcnPj5bbpIaWPauR8VwtY=; b=Wv4Pgt9tcFKILLfzP68j7IJ0kPtlXZf/3WqtyBKWQcmtykmcUZCvx7W8W39HTEBL3T 2WwIR3Lqqo4/CMmXVRNcjv838DLIi7a7KOG1Cp5D1LcaSlSlfQYQhPHP/5zXC2qBLrU9 HKrSdhXPjOQmsjsxgSeLLVkuRl+c4uyejoDtxMmVvA5MsmbrhYm4xUr8JqEb5CaPa2U4 +Z1xAARc01Lo1cHFQKoSQie8I27esZVJqdrlz05wudnBcUVglRWbJpRablYTJlPDsvap HozTVoNNoefEdjxvVnC3ucibQZEqqfVaED5JTrIDYEnwnYouU1QDMvj6SYlE9AN3XxrO fgAg==
X-Gm-Message-State: ALoCoQm7ezvHfGcVwTK1qVuU5v02tCIkRxMZVLVOPzcym/rfUeKZLdv9UuW1zaQXVsEdlsMUGGj1
X-Received: by 10.43.167.196 with SMTP id nf4mr31447155icc.22.1409106045090; Tue, 26 Aug 2014 19:20:45 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.107.10.104 with HTTP; Tue, 26 Aug 2014 19:20:25 -0700 (PDT)
In-Reply-To: <53FD0B7D.8070705@qti.qualcomm.com>
References: <53FD0B7D.8070705@qti.qualcomm.com>
From: Tom Ritter <tom@ritter.vg>
Date: Tue, 26 Aug 2014 21:20:25 -0500
Message-ID: <CA+cU71nkrhqmjra9Thkw-vSNGFQPX2=nY5FUL6drxeo9rxd8uw@mail.gmail.com>
To: endymail@ietf.org
Content-Type: text/plain; charset=ISO-8859-1
Archived-At: http://mailarchive.ietf.org/arch/msg/endymail/gtMD-Dj4r4QTkbr0VNWzjo1ApyY
Subject: Re: [Endymail] Off we go...
X-BeenThere: endymail@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: <endymail.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/endymail>, <mailto:endymail-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/endymail/>
List-Post: <mailto:endymail@ietf.org>
List-Help: <mailto:endymail-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/endymail>, <mailto:endymail-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Aug 2014 02:20:47 -0000

On 26 August 2014 17:34, Pete Resnick <presnick@qti.qualcomm.com> wrote:
> So off we go... What projects are folks working on

Prior to Snowden's revelations, a friend and I had given some
thought[0] to a system that supported provider-to-provider encryption,
where the end could be extended on either side to end-to-provider or
end-to-end encryption.  Along the way we thought about distributing
keys over HTTPS vs DNS[1], authenticity[2], a report-only deployment
mode[3], and other stuff.  We shelved our proposal, but published our
thoughts in a document that we hoped would add some thoughts and
context to future discussions.  Full spec is at
https://github.com/tomrittervg/uee

I can't claim to be working on this, but I'm excited about
https://datatracker.ietf.org/doc/draft-ietf-dane-smtp-with-dane/

I'm also tangentially involved (through my job) with NCC Group's
.trust initiative[4].  There are a lot of policy controls, but also
technical ones. Some of the guarantees you will have when
communicating with a domain in the .trust gTLD will be that the domain
will have valid TLS certificates for StartTLS, will have StartTLS
available, will use DNSSEC, DKIM, and a host of other technical
requirements.

-tom


[0] https://ritter.vg/blog-uee_email_encryption.html
[1] https://github.com/tomrittervg/uee/blob/master/appendix-key-distro-choice.md
[2] https://github.com/tomrittervg/uee/blob/master/proposal.md#key-authenticity
[3] https://github.com/tomrittervg/uee/blob/master/proposal.md#report-only-mode
[4] https://www.nccgroup.com/media/112014/trust-faq.pdf