Re: mail signing history, was Call for Community Feedback: Retiring IETF FTP Service

Stephen Farrell <stephen.farrell@cs.tcd.ie> Wed, 18 November 2020 22:30 UTC

Return-Path: <stephen.farrell@cs.tcd.ie>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AE0D43A0D9B for <ietf@ietfa.amsl.com>; Wed, 18 Nov 2020 14:30:00 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, NICE_REPLY_A=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cs.tcd.ie
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id c60sz5cx7Wyt for <ietf@ietfa.amsl.com>; Wed, 18 Nov 2020 14:29:58 -0800 (PST)
Received: from mercury.scss.tcd.ie (mercury.scss.tcd.ie [134.226.56.6]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6B6233A0DEA for <ietf@ietf.org>; Wed, 18 Nov 2020 14:29:57 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mercury.scss.tcd.ie (Postfix) with ESMTP id 94118BEE6; Wed, 18 Nov 2020 22:29:56 +0000 (GMT)
X-Virus-Scanned: Debian amavisd-new at scss.tcd.ie
Received: from mercury.scss.tcd.ie ([127.0.0.1]) by localhost (mercury.scss.tcd.ie [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3IepIcn4BOeL; Wed, 18 Nov 2020 22:29:54 +0000 (GMT)
Received: from [10.244.2.119] (95-45-153-252-dynamic.agg2.phb.bdt-fng.eircom.net [95.45.153.252]) by mercury.scss.tcd.ie (Postfix) with ESMTPSA id 5160ABEDB; Wed, 18 Nov 2020 22:29:54 +0000 (GMT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cs.tcd.ie; s=mail; t=1605738594; bh=abXQ/sjuFiRhthnLiIQEds52T5Y3jmW6PDV++f98hXs=; h=Subject:To:References:From:Date:In-Reply-To:From; b=HfTUb+/IjLgxd/haQBW9SFqQDs+okW7AKKn/YY0shAp3YffAUpLunA5Jz8VyTs/oh GRELV9wA/kqVyXiYzBq5ungYBW3JM2YGbswmMxWfUqxZp4a94Vx4BjZtsqZFzUD/mR XWUSdz0IKjxDe/FHfdDgNfNTdWnN/C0ZtEdhggIs=
Subject: Re: mail signing history, was Call for Community Feedback: Retiring IETF FTP Service
To: Michael Thomas <mike@mtcc.com>, ietf@ietf.org
References: <01RS5CFAY5S0005PTU@mauve.mrochek.com> <20201118211937.01A22278DC6F@ary.qy> <01RS5Q2L2D6Y005PTU@mauve.mrochek.com> <5239b5-3d2-4079-5f5d-f4a2e0c5552@taugh.com> <c9c6d83e-cf79-262e-ae0e-361050026912@mtcc.com> <e6c9a6b0-f412-76f0-24a4-d11512c1be36@cs.tcd.ie> <5b56c99c-d4ee-1275-5479-3aef9ab2ab11@mtcc.com>
From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
Message-ID: <abb3c271-7a9a-b3bc-1f4a-c68b2f55b35d@cs.tcd.ie>
Date: Wed, 18 Nov 2020 22:29:53 +0000
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.3.2
MIME-Version: 1.0
In-Reply-To: <5b56c99c-d4ee-1275-5479-3aef9ab2ab11@mtcc.com>
Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="Ksc6vupTS05QhMSH4jitdjcGVXgwNfIUc"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf/jyrx7aVIJaQYn5Ox8mYXiQmepwo>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 Nov 2020 22:30:01 -0000


On 18/11/2020 22:17, Michael Thomas wrote:
> 
> On 11/18/20 2:04 PM, Stephen Farrell wrote:
>>
>> Hiya,
>>
>> On 18/11/2020 21:51, Michael Thomas wrote:
>>>
>>> On 11/18/20 1:45 PM, John R Levine wrote:
>>>> On Wed, 18 Nov 2020, Ned Freed wrote:
>>>>> That said, a mechanism for publishing/expiring DKIM private keys is 
>>>>> something
>>>>> the IETF might want to standardize.
>>>>
>>>> I've started to publish my old private keys since I rotate every 
>>>> month but I agree a standard way to tell people where to look would 
>>>> be nice.
>>>>
>>> Why isn't just deleting/replacing the selector sufficient? It's not 
>>> as definitive but it's a lot simpler.
>>
>> Publishing the private key enables various forms of
>> denyability - if someone claims msg1 is original
>> anyone with access to the private can produce a
>> msg2 that seems as cryptographically correct but
>> is clearly bogus (e.g. containing lottery numbers
>> that post-date message timestamps).
> 
> 
> Yes, i acknowledge that above albeit obliquely. What i don't see is how 
> you align providers goals' with individual users' goals.

My guess is that email service providers that are
concerned about potential leakage of message store
content would be motivated to do this so as to
re-assure their users and/or maybe help avoid future
liability (financial or moral).

> 
> 
>>
>> Yes an adversary could have gotten an independent
>> signed timestamp on msg1 before the private was
>> published but that seems low probability.

> It really depends on the worth of the data, right? LEA would certainly 
> do such a thing if they were serveilling somebody.

Sure. The main adversary I had in mind for this mechanism
would be a message (store) leaker, not LEAs. I guess the
idea could be ineffective or even counterproductive
with other threat models, not sure - but would need
checking out, for sure.

>>
>> I'd support development of such a standard if it
>> had a good chance of deployment as I think it'd
>> also encourage key rotation.
>>
> I forget who said that they were surprised about lack of key rotation, 
> but color me completely unsurprised. This is just inertia 101. Maybe 
> large ESP's might get around to automating key rotation, but for the 
> vast majority enterprise this is going to be pretty low down the 
> priority list, and more likely an anti-goal as tracking whether their 
> employees are misbehaving is a feature not a bug.

Agreed. If, however, publishing old private keys is seen
as a way to reduce potential liability, then that might
motivate rotation. (That's my guess, but only a guess.)

Cheers,
S.


> 
> Mike
>