Re: Expired e-mail addresses

Phillip Hallam-Baker <phill@hallambaker.com> Thu, 17 August 2023 16:22 UTC

Return-Path: <hallam@gmail.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6847AC151520 for <ietf@ietfa.amsl.com>; Thu, 17 Aug 2023 09:22:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.394
X-Spam-Level:
X-Spam-Status: No, score=-6.394 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FORGED_FROMDOMAIN=0.25, FREEMAIL_FROM=0.001, HEADER_FROM_DIFFERENT_DOMAINS=0.249, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_FILL_THIS_FORM_SHORT=0.01, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SARp46l6MfkE for <ietf@ietfa.amsl.com>; Thu, 17 Aug 2023 09:22:36 -0700 (PDT)
Received: from mail-oo1-f44.google.com (mail-oo1-f44.google.com [209.85.161.44]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A4C8BC151097 for <ietf@ietf.org>; Thu, 17 Aug 2023 09:22:36 -0700 (PDT)
Received: by mail-oo1-f44.google.com with SMTP id 006d021491bc7-56d8bc0d909so30727eaf.3 for <ietf@ietf.org>; Thu, 17 Aug 2023 09:22:36 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1692289356; x=1692894156; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=Gqpzw9X+9gCjGh5Swm5qT89woeslpSmH+zJx6PQmbXQ=; b=g0aXYR+U5gd7rXK6QOdbLWYeMpG/eIIGP7AT3cBhtuTv9yw/JIQA+X0Ei4yuWZnIuI SHU1QQU8CogkXpw/JNqFMda1yZmu3uvJIiL3G8cvt7x0eoPXfl0WCyjm8JlIH61WOHPU Xc/M8JgRl4srNRm41EwDYoflm44unF9je/EnXAkL1ABaXYN7Wihw/oKMRgnqZCZ/shA/ ogesGkjY7gPQEavt6Jqr4tqZ1aXNjSEsLUnE16D2a+cUSl1Lvn5jwmIev59hFYmMlTyx BIZWVf/0Rbx1FJEshYkv3ugaypGDdAp7dn8np6WG5z0qVX6KzfzV/ttK31O0oRS32IMR JFMg==
X-Gm-Message-State: AOJu0Yzt8A93ejd/uT8MYvF6lTvYsai7B1CX4dgj5USIm+Y87UqYLOmn 8nE5o+InirgsXMheqH8Ul+XgkR4/0ij8By6eJcEjohbfAvs=
X-Google-Smtp-Source: AGHT+IGLkzpkuhgkIFcKvmp2zPi7RTJIjRY7NHkrbHMe/mwmHmiAZpAYYADX6S152AuUREQBoSKOk+luQehpH4uI+gY=
X-Received: by 2002:a4a:2713:0:b0:566:fba5:e51b with SMTP id l19-20020a4a2713000000b00566fba5e51bmr156489oof.7.1692289355746; Thu, 17 Aug 2023 09:22:35 -0700 (PDT)
MIME-Version: 1.0
References: <VI1PR07MB67046917DBB3BD47E73C1338C61AA@VI1PR07MB6704.eurprd07.prod.outlook.com>
In-Reply-To: <VI1PR07MB67046917DBB3BD47E73C1338C61AA@VI1PR07MB6704.eurprd07.prod.outlook.com>
From: Phillip Hallam-Baker <phill@hallambaker.com>
Date: Thu, 17 Aug 2023 12:22:24 -0400
Message-ID: <CAMm+LwihkrA9VGBZPMCp6E7h1UCQr5rWbjxg+mphyonGe9Jp1g@mail.gmail.com>
Subject: Re: Expired e-mail addresses
To: tom petch <daedulus@btconnect.com>
Cc: "ietf@ietf.org" <ietf@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000e82081060320d1a9"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf/t4v3b_eVJGSGOCziRU6UnpvfmTk>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "IETF-Discussion. This is the most general IETF mailing list, intended for discussion of technical, procedural, operational, and other topics for which no dedicated mailing lists exist." <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 17 Aug 2023 16:22:40 -0000

This is a much more general problem with email: DNS names are rented not
owned, email users have much less than a DNS name.

It should be possible to have an email contact address that never expires.
Yes, they blew it for SMTP, but SMTP holds a diminishing share of the
messaging market. The EU is pushing the walled gardens to support
interoperability. Permanent email addresses are an easy technical problem,
the real issue is social and business.

As always with these things, if you have no spec people demand a spec, then
when you propose a spec, they demand code and once you have code, they say
you are just protecting your code. Well I do have running code, but that is
besides the point. There is really only one approach to permanent human
readable email addresses that makes sense.


First, begin with an unreadable identifier, a fingerprint of the user's
public key. I have tried to make this format as compact as possible and
this is the best I can do to make it pretty for use in a document or
business card:

MDDK-7N6A-727A-JZNO-STRX-XKS7

That is a truncated SHA-2-512 fingerprint in UDF format, if people were
going to use these, the best approach would be to present these to the user
for verification and improve the precision when validating the actual
public key. So we can go from the 120 bit work factor above to 260 bits:

MDDK-7N6A-727A-JZNO-STRX-XKS7-DJAF-XI6O-ZSLU-2VOA-TZQ6-JMHP-TSXP


If this is the user's permanent public key, we can create a permanent email
identifier by establishing a registry to which users submit signed
assertions of the form 'my current active messaging addresses are mailto:
alice@example.com, signal:666-666-6666, etc' only in JSON because JSON is
kewl. Or as is the approach in the callsign registry, a signed assertion
giving the current location from which a signed contact assertion can be
obtained. This allows for access control on the contact information.

The natural way to run such a registry, as I proposed back when I tried to
buy out the Haber-Stornetta patents before Bitcoin or Blockchain existed,
is in a chained notary log. I have plenty of prior art. Use of a notary log
allows the potential ambiguity of which update was submitted last to be
eliminated.


But once one decides a registry with a notary chain is needed for any
purpose, it might as well issue human readable aliases which map to the
fingerprints. A very marginal increase in technical complexity. So I can
have @phillip_hallam-baker, @phill_hallam-baker, @hallam and @phb all
mapped to the same fingerprint. And I can have other aliases mapped to
different fingerprints for pseudonymity.

Now of course there are a few IPR etc issues, which I go into at length in
the draft. The bottom line is that just as with any other aspect of
security, the issues of trademarks etc. are so much easier when you
consider them up front rather than pretending they do not exist and then
creating a very expensive band aid.


The main cost of running such a registry is supporting the query function
and so I propose that be something done by other providers. The registry
just publishes the updates to its incremental log in real time and let
other folk do the query. This is critical because a callsign registration
is (normally) for life. Try to register @microsoft if you are not the
Redmond Club and it will be lawyers at dawn.

It would be necessary to charge for registrations to stop the system being
spammed into the ground by squatters. But that could be a very small one,
$5 for 50 registrations should be enough to meet the costs of the registry.
Since supply is limited and so as not to leave money on the table, I
propose to charge exponentially higher prices for names shorter than 9
characters. This surplus then goes to support development of secure open
source software, contribute to standards organization running, etc. etc.


The callsign registry is described here:

https://datatracker.ietf.org/doc/draft-hallambaker-mesh-callsign/

The callsign registry does not require use of the other Mesh technologies.
But I am not aware of anyone else really developing a PKI designed for
personal use by non-technical people. My criteria here is not 'could my
mother use it', she has a science degree, My criteria is 'could my wife use
it without constantly asking me for tech support', she has a degree in
rocket science from MIT.

https://datatracker.ietf.org/doc/draft-hallambaker-mesh-architecture/


On Thu, Aug 17, 2023 at 5:53 AM tom petch <daedulus@btconnect.com> wrote:

> Is there anywhere, RFC Editor possibly, that tracks changes of e-mail
> addresses for contributors?
> I just posted a response to an Erratum and got a number of bounces, one of
> which was a change of address, change of affiliation, for an AD; this is
> something which could equally apply to any author.
> I have also seen WG Chairs struggle to contact RFC authors in relationship
> to IPR issues or with respect to updating an elderly RFC, likewise IANA
> with regard to registrations..
> It would seem to me that it matters, sometimes more than others, that we
> can still contact people who have contributed in the past.
>
> Tom Petch
>