Re: mail signing history, was Call for Community Feedback: Retiring IETF FTP Service

Michael Thomas <mike@mtcc.com> Wed, 18 November 2020 22:17 UTC

Return-Path: <mike@fresheez.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5E6643A083F for <ietf@ietfa.amsl.com>; Wed, 18 Nov 2020 14:17:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.651
X-Spam-Level:
X-Spam-Status: No, score=-1.651 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.25, NICE_REPLY_A=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=mtcc-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xFoGAvd-clDK for <ietf@ietfa.amsl.com>; Wed, 18 Nov 2020 14:17:20 -0800 (PST)
Received: from mail-pg1-x534.google.com (mail-pg1-x534.google.com [IPv6:2607:f8b0:4864:20::534]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3B9D53A0844 for <ietf@ietf.org>; Wed, 18 Nov 2020 14:17:20 -0800 (PST)
Received: by mail-pg1-x534.google.com with SMTP id t21so2299373pgl.3 for <ietf@ietf.org>; Wed, 18 Nov 2020 14:17:20 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mtcc-com.20150623.gappssmtp.com; s=20150623; h=subject:to:references:from:message-id:date:user-agent:mime-version :in-reply-to:content-transfer-encoding:content-language; bh=SfEECzeRUkYhcrs2qWQDdnD7Os+Iac1cGrTEIiKO8C4=; b=O3o54zHzprPCEi6Ty4ac8jQZmCsX6EephbT1wWxjFYDKQt24PIniTxa1FtEUsE242q FydQo62nvpgUzG8W8Nk8bShMJqI3LR/Zobgb6BwykABR67803qjXWPmesrdOqGHm8P0V MPq3VG923XuUHll4IAG4v7W11SfJBsjYNaz/X4N40n8/7id1qaNNDL2FK1b1O3soLlgJ liCgJCabbjgNrzVxYDFUdCe3Vj9OmmvAP3GqFmkUrBzGMZ2oy7K4zUcmkWkb04v7aJvl JLN7GhRBEb+O9F9ZzM4jtbg/0o94FO17QS7pG7yIcrkH7LBdC51utu0c5plaq2KqD0i3 C4OA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-transfer-encoding :content-language; bh=SfEECzeRUkYhcrs2qWQDdnD7Os+Iac1cGrTEIiKO8C4=; b=LbfGBpBHjI4toJGCeB/hqgHH3K/ZBeOuhzrx6tw2X8IDPckZK/Drf5OkKA5RQBOzBd S704j/tD/U5cnQrpQT2tiYgztWT2XlzJMe2bY4zVi3MDqqz/pGIEE33r9WlotufwI9/3 saWd3XBcgMQNiWBtra/jpeunyjZoUz/HvErtrOj8Vx8+0NIsptZHCOCgjfk9AO676pu8 DSlokFZ549zKsj44rcZYbzEF7942JXsb4AMLisFMWWbMLaa3omv4HxN7oENKqVQQlAyT r/4tkvY4ax+eLRpGkkKakvGclNQtskBeEpBcYRfEZZkU4b8IwwY+6zsQ7S9kyYoiFiPV eMLQ==
X-Gm-Message-State: AOAM5336JUZtu8cY7fbT012TaN5PmZSV6H7oZhWFrhO5EwQn2mr/b3g9 846GfcEgsmjdRx5CybgZVXUwJt8YlhmSRg==
X-Google-Smtp-Source: ABdhPJycU7wae3jXw8pUQNcrGwX/jwq0IbgRp/ERafXSWqzRX+uYRatJ7a6vGjec2apFsLNBk7OTEg==
X-Received: by 2002:a63:2ad0:: with SMTP id q199mr10421568pgq.257.1605737839270; Wed, 18 Nov 2020 14:17:19 -0800 (PST)
Received: from mike-mac.lan (107-182-37-5.volcanocom.com. [107.182.37.5]) by smtp.gmail.com with ESMTPSA id 203sm26440296pfw.116.2020.11.18.14.17.18 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Wed, 18 Nov 2020 14:17:18 -0800 (PST)
Subject: Re: mail signing history, was Call for Community Feedback: Retiring IETF FTP Service
To: Stephen Farrell <stephen.farrell@cs.tcd.ie>, ietf@ietf.org
References: <01RS5CFAY5S0005PTU@mauve.mrochek.com> <20201118211937.01A22278DC6F@ary.qy> <01RS5Q2L2D6Y005PTU@mauve.mrochek.com> <5239b5-3d2-4079-5f5d-f4a2e0c5552@taugh.com> <c9c6d83e-cf79-262e-ae0e-361050026912@mtcc.com> <e6c9a6b0-f412-76f0-24a4-d11512c1be36@cs.tcd.ie>
From: Michael Thomas <mike@mtcc.com>
Message-ID: <5b56c99c-d4ee-1275-5479-3aef9ab2ab11@mtcc.com>
Date: Wed, 18 Nov 2020 14:17:17 -0800
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:68.0) Gecko/20100101 Thunderbird/68.12.1
MIME-Version: 1.0
In-Reply-To: <e6c9a6b0-f412-76f0-24a4-d11512c1be36@cs.tcd.ie>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 7bit
Content-Language: en-US
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf/25Xn18vf7usBmq8W4mzDGMJURyQ>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 Nov 2020 22:17:21 -0000

On 11/18/20 2:04 PM, Stephen Farrell wrote:
>
> Hiya,
>
> On 18/11/2020 21:51, Michael Thomas wrote:
>>
>> On 11/18/20 1:45 PM, John R Levine wrote:
>>> On Wed, 18 Nov 2020, Ned Freed wrote:
>>>> That said, a mechanism for publishing/expiring DKIM private keys is 
>>>> something
>>>> the IETF might want to standardize.
>>>
>>> I've started to publish my old private keys since I rotate every 
>>> month but I agree a standard way to tell people where to look would 
>>> be nice.
>>>
>> Why isn't just deleting/replacing the selector sufficient? It's not 
>> as definitive but it's a lot simpler.
>
> Publishing the private key enables various forms of
> denyability - if someone claims msg1 is original
> anyone with access to the private can produce a
> msg2 that seems as cryptographically correct but
> is clearly bogus (e.g. containing lottery numbers
> that post-date message timestamps).


Yes, i acknowledge that above albeit obliquely. What i don't see is how 
you align providers goals' with individual users' goals.


>
> Yes an adversary could have gotten an independent
> signed timestamp on msg1 before the private was
> published but that seems low probability.
It really depends on the worth of the data, right? LEA would certainly 
do such a thing if they were serveilling somebody.
>
> I'd support development of such a standard if it
> had a good chance of deployment as I think it'd
> also encourage key rotation.
>
I forget who said that they were surprised about lack of key rotation, 
but color me completely unsurprised. This is just inertia 101. Maybe 
large ESP's might get around to automating key rotation, but for the 
vast majority enterprise this is going to be pretty low down the 
priority list, and more likely an anti-goal as tracking whether their 
employees are misbehaving is a feature not a bug.

Mike