From nobody Tue Mar 28 21:05:23 2023
Return-Path: <hernani.marques@pep.foundation>
X-Original-To: medup@ietfa.amsl.com
Delivered-To: medup@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1])
 by ietfa.amsl.com (Postfix) with ESMTP id 98AB7C1522C8
 for <medup@ietfa.amsl.com>; Tue, 28 Mar 2023 21:05:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.894
X-Spam-Level: 
X-Spam-Status: No, score=-1.894 tagged_above=-999 required=5
 tests=[BAYES_00=-1.9, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001,
 SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001,
 URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001]
 autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194])
 by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id TqrEHhCdpgnB for <medup@ietfa.amsl.com>;
 Tue, 28 Mar 2023 21:05:19 -0700 (PDT)
Received: from dragon.pibit.ch (dragon.pibit.ch [185.203.114.4])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256)
 (No client certificate requested)
 by ietfa.amsl.com (Postfix) with ESMTPS id B1B99C14F726
 for <medup@ietf.org>; Tue, 28 Mar 2023 21:05:18 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1])
 by dragon.pibit.ch (Postfix) with ESMTP id D93F321401B4
 for <medup@ietf.org>; Wed, 29 Mar 2023 06:05:15 +0200 (CEST)
Received: from dragon.pibit.ch ([127.0.0.1])
 by localhost (dragon.pibit.ch [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id OOj4VpiTvtGt for <medup@ietf.org>;
 Wed, 29 Mar 2023 06:05:15 +0200 (CEST)
Received: from [192.168.30.117] (fs9875f8f8.knge201.ap.nuro.jp
 [152.117.248.248])
 by dragon.pibit.ch (Postfix) with ESMTPSA id 35B01214007B
 for <medup@ietf.org>; Wed, 29 Mar 2023 06:05:14 +0200 (CEST)
Message-ID: <6cb4bf8e-50c3-8b0d-212b-918c4abb0e00@pep.foundation>
Date: Wed, 29 Mar 2023 06:05:11 +0200
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101
 Thunderbird/102.9.0
Content-Language: en-US
From: =?UTF-8?B?SGVybsOibmkgTWFycXVlcyAocOKJoXAgZm91bmRhdGlvbik=?=
 <hernani.marques@pep.foundation>
To: medup@ietf.org
X-Pep-Version: 2.1
Content-Type: multipart/mixed; boundary="15e5509d278c901046501d91569db9a5"
Archived-At: <https://mailarchive.ietf.org/arch/msg/medup/kG26qHMUoXOWMB17W97bgwucbSU>
Subject: [Medup] On Extra Keys in pEp
X-BeenThere: medup@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Missing Elements for Decentralized and Usable Privacy <medup.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/medup>,
 <mailto:medup-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/medup/>
List-Post: <mailto:medup@ietf.org>
List-Help: <mailto:medup-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/medup>,
 <mailto:medup-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 29 Mar 2023 04:05:22 -0000

--15e5509d278c901046501d91569db9a5
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable

Dear folks


At yesterday's MEDUP Side Meeting the question was raised from someone =20
from a Japanese University (cannot remember the name anymore...), that =20
end-to-end encryption can impose issues if you've an organizational =20
setting with the regulatory framework to be able to decrypt work-related =
=20
messages for archiving purposes (in Switzerland, e.g., you need to able =20
to show all relevant documentation of a company for the last 10 years).

That's of course a problem---the proposition here is to have an Extra =20
Key basically being an additional public key to which you encrypt =20
*additionally* all outgoing messages; the corresponding secret key is =20
then hold, e.g., by a CISO or at least a very small group of people who =20
hold that in a secure place with restricted access; in case mails must =20
be disclosed, the corresponding secret key can be used to decrypt =20
(specific) messages. UX-wise it's also important that the employees =20
clearly see that the outgoing messages are also encrypted to an =20
*additional* key.

We describe that in our general draft, point 7.3, briefly:

https://datatracker.ietf.org/doc/html/draft-pep-general-02=23section-7.3

Running Code exists and can be found here:

https://gitea.pep.foundation/pEp.foundation/pEpEngine/src/branch/master/s=
rc/message=5Fapi.c

You also find lines like that, reflecting what's written in 7.3; e.g., =20
code line 3261 to 3263

=5Bsnip=5D

    // Ensure we don't encrypt to extra keys if this is a non-org account=

     if (=21(target=5Fid->flags & PEP=5Fidf=5Forg=5Fident))
         extra =3D NULL;

=5B/snip=5D

Any thoughts on that approach=3F



Greets --hernani

-- =20
p=E2=89=A1p foundation: https://pep.foundation/

--15e5509d278c901046501d91569db9a5
Content-Type: application/pgp-keys
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="sender_key.asc"
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--15e5509d278c901046501d91569db9a5--

