Re: Why are mail servers not also key servers?

Doug Royer <douglasroyer@gmail.com> Thu, 20 April 2017 19:10 UTC

Return-Path: <douglasroyer@gmail.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B023513158F for <ietf@ietfa.amsl.com>; Thu, 20 Apr 2017 12:10:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id X-S6aXIF5f4W for <ietf@ietfa.amsl.com>; Thu, 20 Apr 2017 12:10:42 -0700 (PDT)
Received: from mail-oi0-x244.google.com (mail-oi0-x244.google.com [IPv6:2607:f8b0:4003:c06::244]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B27F9131585 for <ietf@ietf.org>; Thu, 20 Apr 2017 12:10:42 -0700 (PDT)
Received: by mail-oi0-x244.google.com with SMTP id a3so7399094oii.3 for <ietf@ietf.org>; Thu, 20 Apr 2017 12:10:42 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=subject:to:references:from:organization:message-id:date:user-agent :mime-version:in-reply-to; bh=U4vaGMDg566+UOPg78yXNL0W19NLDmgdar9OstHaNms=; b=DQB1Dk5ILoXPAu72w4spfxtqiPqsrjgeJLDgznh8Qly3b5kt5ZzZttMDAoxfM4vx3f 8s4CTQ/utbCqbJNhgARseWyXRYv1VpqitDIiqvAEFSy41tcJBq6YfXMKTGljnEsSb97z HUIzUztqH4IFL8l7vt3saQT8OYnLePU2GifufyWdI8dZbZX11RxbGAxhM1SnTdUcgH6E j/b7GzpWbXVU8RJ66JHO2BGN3323CSkIxYzuUklN+P4WDIORroNhgZdiwfwiGlJ0uSyH 8QcQ7/YN3hY/GndUSCs9auB8B65nphtdO5IjWXxEY6TLTdtq9wneFsdoDWFqpJA0ikIE xLCg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:references:from:organization :message-id:date:user-agent:mime-version:in-reply-to; bh=U4vaGMDg566+UOPg78yXNL0W19NLDmgdar9OstHaNms=; b=HvCfeMcC198eATVXxjzFcar6VOAc0GHMxrUGSCTKVNBS0/pyH7p2hL0ICJcdGkXudQ 16jSv2mnQAEo7YLAqdHogU/Y3jNUBheiIUYiPV/+M5F6bUg3xkZFIWxls6IQoT+G6GCQ 3FKej12Zj2UbyZqdpaqKwhY66o9P1eHU5DE7UHbWV/Cmp5T4uXUoZm6/yyKpZFuK4quH z3MHWJ10OFcTG4PjUHSv6G0BwtLJwqNTUZ16wyX7tTbVbzS5ej1/fDtYzJ8HwnWtT3aj Pb61lGcVBAL+KHYoeuubBMWp6pRvidKl1NJP2jKLNFfHmU94XjhxutW5rJ7QbuA+DThA dwPQ==
X-Gm-Message-State: AN3rC/7unOqilsQTW3r7tv/G3ec52RAb4zl4wHkeSeUKYXoaqNYQIhn+ FRSqPo5bIyN6fy2whsk=
X-Received: by 10.202.49.12 with SMTP id x12mr5491529oix.18.1492715441564; Thu, 20 Apr 2017 12:10:41 -0700 (PDT)
Received: from ?IPv6:2602:ae:1b37:7300::2? ([2602:ae:1b37:7300::2]) by smtp.googlemail.com with ESMTPSA id y67sm2910224ota.25.2017.04.20.12.10.39 for <ietf@ietf.org> (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 20 Apr 2017 12:10:40 -0700 (PDT)
Subject: Re: Why are mail servers not also key servers?
To: ietf@ietf.org
References: <849511c0-6526-ecbe-2b56-7b459eaf010b@hawaii.edu> <B897A3A3-4A47-4C74-B79F-4F93C86A338C@gmail.com> <82ab9e4d-05ba-bc39-c7d1-bda6ee8d9be5@hawaii.edu> <20170420173551.GN25754@mournblade.imrryr.org> <f5149504-12a1-728b-e685-3f75be6869c1@gmail.com> <063FA8A5-D94C-4537-8141-2A04374D4091@dukhovni.org>
From: Doug Royer <douglasroyer@gmail.com>
Organization: http://SoftwareAndServices.NET
Message-ID: <09e03f86-69d4-27b8-4923-c68388cc426f@gmail.com>
Date: Thu, 20 Apr 2017 13:10:38 -0600
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.0
MIME-Version: 1.0
In-Reply-To: <063FA8A5-D94C-4537-8141-2A04374D4091@dukhovni.org>
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg="sha-256"; boundary="------------ms090300040102080609020208"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf/kbDAjWSIBIT1PxG4x7wlQlLK7tc>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 20 Apr 2017 19:10:45 -0000

On 04/20/2017 12:53 PM, Viktor Dukhovni wrote:
 >
 >>> A major problems with all E2E email encryption proposals is unrelated
 >>> to key distribution, none of the extant MUAs provide an adequate
 >>> interface for E2E encrypted email.
 >>>        + Encrypted email is not searchable.
 >>
 >> Sure it is, by the recipient MUA, else the user could not read their 
email.
 >> It would not be searchable by a 3rd party - which is the point of 
encryption.
 >
 > Which MUAs index content of encrypted messages?  How does this work 
for clients
 > that store only a cache of recent messages, or webmail?

That is an implementation detail. If the MUA wants to see the message, 
it can, if it can't, its not an MUA.

Storing the message in a cache is orthogonal to if it is encrypted. I 
can cache the encrypted message, cache it after its decrypted, or not 
cache it at all.

Webmail does not work with encrypted email. Never will until you give 
your private key to some unknown email-web-server implementation and 
that systems unknown administrator. Not something the IETF should be 
recommending.

 >>>        + Encrypted email is difficult to scan for spam and malware
 >>
 >> The scan would have to take place in the MUA. Firewall scanners 
would fail,
 >> as they do now with S/MIME or encrypted PGP.
 >
 > Endpoint scans are often not nearly as effective.

No change to the current operation of encrypted email. The entire point 
of encrypted email is so that no one (including the server) can see the 
contents of encrypted email.

If your ISP holds your private key, then you have no privacy in your email.

 >>>        + Changing the private key can mean loss of access to email
 >>> 	encrypted under the old key.
 >>
 >> Only if you throw away old keys. Doctor, Doctor, it hurts when I do 
this.
 >> - So Do not do that :-)
 >
 > The mocking tone is entirely out of place.  Not all MUAs support 
multiple recipient
 > keys.

That is an implementation detail, not a protocol detail. If you want to 
see old email, don't throw away the key to that email.

 >>>        + Signatures stop verifying when the signature key expires,
 >>> 	even though they were valid at the the email was received.
 >>
 >> Again, do not throw away the old keys. An MUA should not allow a 
user to throw away
 >> any key needed for any message still in the store. Yep - complex.
 >
 > Should not is not the same as do not.  My point is and remains that 
E2E encryption
 > of email is not usable with today's MUAs, progress on some of the 
issues is both
 > difficult and unlikely.

I use E2E almost every day. Works fine. Update the MUA your using. If 
you do not want to update your MUA, then, your making the decision for 
things to not work. Its not a protocol issue.

A Web-clients MUA have a problem, because you would have to store the 
private key in the email-web-server. I would not do that, so I will not 
use an MUA that allows my private key to be given to another server, 
managed by some unknown person. They have that problem now - no change.
Not fixable, unless you give away your private key. And again, not 
something the IETF should be recommending.


-- 

Doug Royer - (http://DougRoyer.US  http://goo.gl/yrxJTu )
DouglasRoyer@gmail.com
714-989-6135