Re: [Endymail] spam versus cleartext

Pete Resnick <presnick@qti.qualcomm.com> Sun, 07 September 2014 21:12 UTC

Return-Path: <presnick@qti.qualcomm.com>
X-Original-To: endymail@ietfa.amsl.com
Delivered-To: endymail@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5A07C1A067D for <endymail@ietfa.amsl.com>; Sun, 7 Sep 2014 14:12:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -8.653
X-Spam-Level:
X-Spam-Status: No, score=-8.653 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-1.652, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6VKWDg6fJw1X for <endymail@ietfa.amsl.com>; Sun, 7 Sep 2014 14:12:46 -0700 (PDT)
Received: from wolverine02.qualcomm.com (wolverine02.qualcomm.com [199.106.114.251]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C41A11A00F1 for <endymail@ietf.org>; Sun, 7 Sep 2014 14:12:46 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=qti.qualcomm.com; i=@qti.qualcomm.com; q=dns/txt; s=qcdkim; t=1410124366; x=1441660366; h=message-id:date:from:mime-version:to:cc:subject: references:in-reply-to:content-transfer-encoding; bh=vFGy3myhxEV1xFEcoIPV8iAh5kg0P7OuOFUHFbxHX2s=; b=sRD1cIt4O3tAjVQ1p1R5+zSsfzG00FFS2mpTXlcmUCU3mQ1C9yKOWA9S QPPFfrzWgbGLV6fg9XaQDwP8NkIkdpJ7L/dl/IpWdFAYP4d75IdpKAhf8 2Yh1NQVf/qur9jdmrLXhUHoIO2SFyxxI0GBg+6QSbPYwKZ6hs8RfD2nkX Q=;
X-IronPort-AV: E=McAfee;i="5600,1067,7554"; a="157004330"
Received: from ironmsg03-r.qualcomm.com ([172.30.46.17]) by wolverine02.qualcomm.com with ESMTP; 07 Sep 2014 14:12:46 -0700
X-IronPort-AV: E=Sophos;i="5.04,483,1406617200"; d="scan'208";a="746093355"
Received: from nasanexhc14.na.qualcomm.com ([172.30.48.23]) by Ironmsg03-R.qualcomm.com with ESMTP/TLS/RC4-SHA; 07 Sep 2014 14:12:46 -0700
Received: from nasanexhc05.na.qualcomm.com (172.30.48.2) by nasanexhc14.na.qualcomm.com (172.30.48.23) with Microsoft SMTP Server (TLS) id 14.3.181.6; Sun, 7 Sep 2014 14:12:45 -0700
Received: from presnick-mac.local (172.30.48.1) by qcmail1.qualcomm.com (172.30.48.2) with Microsoft SMTP Server (TLS) id 14.3.181.6; Sun, 7 Sep 2014 14:12:45 -0700
Message-ID: <540CCA3E.8020505@qti.qualcomm.com>
Date: Sun, 7 Sep 2014 18:12:30 -0300
From: Pete Resnick <presnick@qti.qualcomm.com>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.7; en-US; rv:1.9.1.9) Gecko/20100630 Eudora/3.0.4
MIME-Version: 1.0
To: Phillip Hallam-Baker <phill@hallambaker.com>
References: <540AABF8.8000605@cisco.com> <540C5BE1.6010405@qti.qualcomm.com> <CAMm+Lwh1JJQTOgRN_31b3+oTreeHzntBxx5sNeAFQAwnac9trw@mail.gmail.com>
In-Reply-To: <CAMm+Lwh1JJQTOgRN_31b3+oTreeHzntBxx5sNeAFQAwnac9trw@mail.gmail.com>
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit
X-Originating-IP: [172.30.48.1]
Archived-At: http://mailarchive.ietf.org/arch/msg/endymail/imP1Q5btuY8r3n3rp7A8zEItEIA
Cc: Eliot Lear <lear@cisco.com>, endymail <endymail@ietf.org>
Subject: Re: [Endymail] spam versus cleartext
X-BeenThere: endymail@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: <endymail.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/endymail>, <mailto:endymail-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/endymail/>
List-Post: <mailto:endymail@ietf.org>
List-Help: <mailto:endymail-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/endymail>, <mailto:endymail-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 07 Sep 2014 21:12:48 -0000

On 9/7/14 11:09 AM, Phillip Hallam-Baker wrote:
> On Sun, Sep 7, 2014 at 9:21 AM, Pete Resnick<presnick@qti.qualcomm.com>  wrote:
>
>    
>> Along similar lines to what John Levine said,: Obviously doing e2e crypto
>> gets you signatures. Since we are blue-skying here, I think it is perfectly
>> plausible to say, "If you want to send me e2e encrypted messages, you also
>> have to send me signed messages, and you don't or your signature is not in
>> my contacts list already, your encrypted mail is going to bounce." I think
>> it's possible that in the fullness of time, many users go to a contact-list
>> model of email (a la IM) where the mail simply bounces unless it has a
>> signature that is already in the contacts list.
>>      
>
> I think that is right, but not the whole picture.
>    

A tangential up-level: I haven't gotten through all of the mail on the 
list yet (travel and other things have slowed me down), but I do notice 
that there has been quite a bit of "whole picture" discussion. I think 
that's fine, as blue-skying does involve thinking about how all of the 
pieces fit together. But as Stephen and I said in the first message, the 
thing we're looking for on this list is to "identify some bit(s) of work 
that the IETF could credibly do that'd improve the real-world end-to-end 
security and privacy of email. And note that 'credible' there requires 
stuff to be both technically sane and to have a sufficient set of 
capable folks interested and willing to do work." So while it's 
*possible* that a forklift replacement of email as we know it might be 
one of those "bits of work", separating out some smaller work items that 
could eventually be fit together into a shiny new system are probably 
the more interesting ideas. :-)

That said, a couple of questions that have been rattling around in my brain:

> I see endymail as a subset of mail. All mail should be encrypted at
> the message layer but only whitelisted mail would be e2e encrypted.
>
> This can be done automatically as follows:
>
>
> A) Some sort of discovery infrastructure maps email addresses to key hashes.
> B) Some sort of discovery infrastructure maps key hashes to keys.
>    

I've been wondering about this. When I think about using crypto (whether 
encryption or signatures), it seems like requiring a discovery mechanism 
was increasing the burden. For many of my correspondents, with whom I'm 
currently communicating in the clear, a TOFU key exchange in those 
emails (authenticated out-of-band) might be a plausible mechanism.

When we think about this, do we really need to assume that we either use 
the old or the new, and never the twain shall meet?

pr

-- 
Pete Resnick<http://www.qualcomm.com/~presnick/>
Qualcomm Technologies, Inc. - +1 (858)651-4478