Re: Bruce Schneier's Proposal to dedicate November meeting to saving the Internet from the NSA

Phillip Hallam-Baker <hallam@gmail.com> Fri, 06 September 2013 03:56 UTC

Return-Path: <hallam@gmail.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CB80421E81A5 for <ietf@ietfa.amsl.com>; Thu, 5 Sep 2013 20:56:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.413
X-Spam-Level:
X-Spam-Status: No, score=-2.413 tagged_above=-999 required=5 tests=[AWL=0.186, BAYES_00=-2.599, HTML_MESSAGE=0.001, NO_RELAYS=-0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MQzfWYGnftk4 for <ietf@ietfa.amsl.com>; Thu, 5 Sep 2013 20:56:20 -0700 (PDT)
Received: from mail-lb0-x22e.google.com (mail-lb0-x22e.google.com [IPv6:2a00:1450:4010:c04::22e]) by ietfa.amsl.com (Postfix) with ESMTP id 4E83A11E8242 for <ietf@ietf.org>; Thu, 5 Sep 2013 20:56:15 -0700 (PDT)
Received: by mail-lb0-f174.google.com with SMTP id w6so2408444lbh.33 for <ietf@ietf.org>; Thu, 05 Sep 2013 20:56:14 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=YFMNgr6yui7JHg7Z5G1R2OB8sQmoF41xtd9iy8Awbxw=; b=GBGspqPePgzLU1wbmifDChlrGN/E1rmBFaj4sTyiPqLnnrKkVNDjgWHxBAwNn4SQht LEaRrdW07t2guj81v3n7iPXGC5Xo6svME/Bjo2IdaSCbZpNzjfmish771ObmXPCxumZJ yY4H/BaLZjZdjUpBbG4LNM0N4jIAVk892FmpghERMloDj7GGoBVz+FZKPOVmrON2joO/ QI/zASqaOfAMURx7/fOViH8puP4Yyc6VgXmo4P+hYPUnzf3F6uJDF9EMqiGad8F75Tbp tUaR0VgdJ1sJ+Rbc20kPjXVEMJviaI+ntrSX+QH/AzXcGNe0tE+Soe48M9N51/3nFLWp 1KIA==
MIME-Version: 1.0
X-Received: by 10.152.36.98 with SMTP id p2mr327146laj.14.1378439774149; Thu, 05 Sep 2013 20:56:14 -0700 (PDT)
Received: by 10.112.148.165 with HTTP; Thu, 5 Sep 2013 20:56:14 -0700 (PDT)
In-Reply-To: <20130906033254.GH62204@mx1.yitter.info>
References: <5F053C0B-4678-4680-A8BF-62FF282ADDCE@softarmor.com> <alpine.BSF.2.00.1309051743130.47262@hiroshima.bogus.com> <52293197.1060809@gmail.com> <CAMm+LwjdN478yyU=J7=GTpQxqtdgP8wtdEtna50X+WtA-bV3hg@mail.gmail.com> <52294BDC.4060707@gmail.com> <20130906033254.GH62204@mx1.yitter.info>
Date: Thu, 05 Sep 2013 23:56:14 -0400
Message-ID: <CAMm+Lwg9kJymBWaEXwZfQ=P5Uo-UmYoNvvzewnXjUu+mhg+QTQ@mail.gmail.com>
Subject: Re: Bruce Schneier's Proposal to dedicate November meeting to saving the Internet from the NSA
From: Phillip Hallam-Baker <hallam@gmail.com>
To: Andrew Sullivan <ajs@anvilwalrusden.com>
Content-Type: multipart/alternative; boundary="089e0158b5e815218904e5af053a"
Cc: IETF Discussion Mailing List <ietf@ietf.org>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 06 Sep 2013 03:56:23 -0000

On Thu, Sep 5, 2013 at 11:32 PM, Andrew Sullivan <ajs@anvilwalrusden.com>wrote:

> On Fri, Sep 06, 2013 at 03:28:28PM +1200, Brian E Carpenter wrote:
> >
> > OK, that's actionable in the IETF, so can we see the I-D before
> > the cutoff?
>
> Why is that discussion of this nailed to the cycle of IETF meetings?


It is not. I raised the challenge over a week ago in another forum. Last
thing I would do is to give any institution veto power.


The design I think is practical is to eliminate all UI issues by insisting
that encryption and decryption are transparent. Any email that can be sent
encrypted is sent encrypted.

So that means that we have to have a key distribution infrastructure such
that when you register a key it becomes available to anyone who might need
to send you a message. We would also wish to apply the Certificate
Transparency approach to protect the Trusted Third Parties from being
coerced, infiltrated or compromised.


Packaging the implementation is not difficult, a set of proxies for IMAP
and SUBMIT enhance and decrypt the messages.

The client side complexity is separated from the proxy using Omnibroker.


-- 
Website: http://hallambaker.com/