Re: [Endymail] spam versus cleartext

Phillip Hallam-Baker <phill@hallambaker.com> Sun, 07 September 2014 14:09 UTC

Return-Path: <hallam@gmail.com>
X-Original-To: endymail@ietfa.amsl.com
Delivered-To: endymail@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 659351A04B7 for <endymail@ietfa.amsl.com>; Sun, 7 Sep 2014 07:09:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.278
X-Spam-Level:
X-Spam-Status: No, score=-1.278 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FM_FORGED_GMAIL=0.622, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jM1yFqENZ9Qs for <endymail@ietfa.amsl.com>; Sun, 7 Sep 2014 07:09:44 -0700 (PDT)
Received: from mail-la0-x22b.google.com (mail-la0-x22b.google.com [IPv6:2a00:1450:4010:c03::22b]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DE5B11A04B0 for <endymail@ietf.org>; Sun, 7 Sep 2014 07:09:43 -0700 (PDT)
Received: by mail-la0-f43.google.com with SMTP id gi9so4873962lab.16 for <endymail@ietf.org>; Sun, 07 Sep 2014 07:09:42 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:in-reply-to:references:date:message-id:subject :from:to:cc:content-type; bh=GMBD/U2PhqOEvlLDV/7RoyWOTpmg4Kc2vNmuS5Ct5+c=; b=YUhec5nTscnXlwq+OX0dIYyW1PcaLOIUKFsAj7jzQp5RXtM01yaFnXWRZ1WL3C8j7Z Hbnu7pZswHWGxegB7U87c9NyK4HSoxtONzcqmj3PMjJQNaRbmPO2YUL4qjrjUFY9/8v4 KCstFZk6ksoxUUqPeYRog80jUcqkJ6u4dVYNvFZtLhz67E1aZBuB8Bqp+q/+4seCa1HW S2fFIAI0aW8lfUzC4fbb6xon6C+CD+8fPe4iYgZklr6kwRJEM6ncjmWcCaG9lLIG25YX jSo7HHdZcIgnudt+mv8J6fCQzgR/0SCctKebEnSvCzUTcjbuvcAwXcKVY8G5yAu+DKqE 0CKA==
MIME-Version: 1.0
X-Received: by 10.152.26.133 with SMTP id l5mr10366359lag.4.1410098982074; Sun, 07 Sep 2014 07:09:42 -0700 (PDT)
Sender: hallam@gmail.com
Received: by 10.112.122.50 with HTTP; Sun, 7 Sep 2014 07:09:41 -0700 (PDT)
In-Reply-To: <540C5BE1.6010405@qti.qualcomm.com>
References: <540AABF8.8000605@cisco.com> <540C5BE1.6010405@qti.qualcomm.com>
Date: Sun, 7 Sep 2014 10:09:41 -0400
X-Google-Sender-Auth: X2UTWreP1Oul2CoMlGJb-9uhYjg
Message-ID: <CAMm+Lwh1JJQTOgRN_31b3+oTreeHzntBxx5sNeAFQAwnac9trw@mail.gmail.com>
From: Phillip Hallam-Baker <phill@hallambaker.com>
To: Pete Resnick <presnick@qti.qualcomm.com>
Content-Type: text/plain; charset=UTF-8
Archived-At: http://mailarchive.ietf.org/arch/msg/endymail/q2JtLozr0U_E45_NQLYRY01Oogo
Cc: endymail <endymail@ietf.org>, Eliot Lear <lear@cisco.com>
Subject: Re: [Endymail] spam versus cleartext
X-BeenThere: endymail@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: <endymail.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/endymail>, <mailto:endymail-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/endymail/>
List-Post: <mailto:endymail@ietf.org>
List-Help: <mailto:endymail-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/endymail>, <mailto:endymail-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 07 Sep 2014 14:09:45 -0000

On Sun, Sep 7, 2014 at 9:21 AM, Pete Resnick <presnick@qti.qualcomm.com> wrote:
> On 9/6/14 3:38 AM, Eliot Lear wrote:
>>
>> In the early days fo perpass we had lengthy discussions about the
>> tension between privacy and ability of security systems to reduce spam.
>> Below is an article from a gentleman who used to work at Google, which I
>> thought this group might find interesting.
>>
>> https://moderncrypto.org/mail-archive/messaging/2014/000780.html
>>
>
>
> Along similar lines to what John Levine said,: Obviously doing e2e crypto
> gets you signatures. Since we are blue-skying here, I think it is perfectly
> plausible to say, "If you want to send me e2e encrypted messages, you also
> have to send me signed messages, and you don't or your signature is not in
> my contacts list already, your encrypted mail is going to bounce." I think
> it's possible that in the fullness of time, many users go to a contact-list
> model of email (a la IM) where the mail simply bounces unless it has a
> signature that is already in the contacts list.


I think that is right, but not the whole picture.

I see endymail as a subset of mail. All mail should be encrypted at
the message layer but only whitelisted mail would be e2e encrypted.

This can be done automatically as follows:


A) Some sort of discovery infrastructure maps email addresses to key hashes.
B) Some sort of discovery infrastructure maps key hashes to keys.
C) Inbound mail server has an encryption key
D) User has an endymail encryption key.


1) Alice sends a message to Bob <bob@example.com>om>, she doesn't know him yet.

Alice's email client uses infrastructure A and B to pull the best
public data for bob. This turns out to be a domain level record with
the mail server key (C).

Mail is opportunistically encrypted under the mail server key (C).
Mail server decrypts then (optional) re-encrypts message for delivery
to Bob.

The sent mail includes a header with Alice's encryption key
fingerprint. It is signed using either DKIM or S/MIME depending on the
settings specified in the key record.


2) Bob receives message

2a) Bob reads message hits the 'spam' key
2b) Bob reads message, does nothing
2c) Bob replies to message

Only 2c is going to result in Bob's client whitelisting Alice. His
response contains the key fingerprint that Bob needs to perform
retrieval of the key using infrastructure B.


3) Alice sends another message to Bob after his reply

Client notes that it is whitelisted and pulls the key from infrastructure B.


Note:

1) This whole process is completely frictionless. Neither Alice nor
Bob has to do anything differently.

2) This is only one point on the security spectrum. In other
applications we might allow easier access to the endy key or might not
allow access at all.

3) The reason for decoupling the key from the system via a key hash is
that it enables key rollover.


One question left open in the above is how we prevent the use of
infrastructure A as a means to obtain email addresses.

I am currently working on efficient ways to do that.