Re: [openpgp] Transport public keys inside the message body

Daniel Kahn Gillmor <dkg@fifthhorseman.net> Mon, 19 February 2024 16:10 UTC

Return-Path: <dkg@fifthhorseman.net>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AF030C14F6AA for <openpgp@ietfa.amsl.com>; Mon, 19 Feb 2024 08:10:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.107
X-Spam-Level:
X-Spam-Status: No, score=-7.107 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=neutral reason="invalid (unsupported algorithm ed25519-sha256)" header.d=fifthhorseman.net header.b="Q4dCUPZ7"; dkim=pass (2048-bit key) header.d=fifthhorseman.net header.b="Qol2PGox"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FqEeQYD6G0jS for <openpgp@ietfa.amsl.com>; Mon, 19 Feb 2024 08:10:16 -0800 (PST)
Received: from che.mayfirst.org (che.mayfirst.org [IPv6:2001:470:1:116::7]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D2171C151073 for <openpgp@ietf.org>; Mon, 19 Feb 2024 08:10:16 -0800 (PST)
DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/simple; d=fifthhorseman.net; i=@fifthhorseman.net; q=dns/txt; s=2019; t=1708359014; h=from : to : cc : subject : in-reply-to : references : date : message-id : mime-version : content-type : from; bh=E96QUA6dZBk7Z7JH4Uv6jIaGEB4tDqhbFY4HfRSp22A=; b=Q4dCUPZ7+99BupRdLOJYnPfzTZrvyQ4ug5EhAR4M/r+WKoz3QYv3njyJnb/5m6R3lHWpb DsbUfzaGFrppWOWDg==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=fifthhorseman.net; i=@fifthhorseman.net; q=dns/txt; s=2019rsa; t=1708359014; h=from : to : cc : subject : in-reply-to : references : date : message-id : mime-version : content-type : from; bh=E96QUA6dZBk7Z7JH4Uv6jIaGEB4tDqhbFY4HfRSp22A=; b=Qol2PGox44ekFWzSG4MrKFAfWXcAIgL0cPFtgGlFou9DjjOFk4imNmHTLhSeSS9VuMH04 LzT39RfJt5AbwxyIw9DtszgbPYgoph3p09mPEetZSDI+C0p8sHbhOippvGUZ9tKVzc0VpeF hC8Bke4Ey+IqR3V+6qkqtOsvJU/gUUb0lGjnT3DiymbvpeFOk+d3EL/GwU3ZuybOQkA4qaf ztT5t4ftfPUCjU5qdE8O8Hcum+nPkos+zqI4n0DKmKHnGlJqbMGEbN9/4PNJN9sXDS2oCF1 OTfpt/ms2Ylnfo82Yo8C2J14nfwpCimn5M136BznoZ8i2IksOCcA1lYrH18w==
Received: from fifthhorseman.net (lair.fifthhorseman.net [108.58.6.98]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) server-digest SHA384) (No client certificate requested) by che.mayfirst.org (Postfix) with ESMTPSA id 4EE7DF9DC; Mon, 19 Feb 2024 11:10:14 -0500 (EST)
Received: by fifthhorseman.net (Postfix, from userid 1000) id B87EA2046F; Mon, 19 Feb 2024 10:48:03 -0500 (EST)
From: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
To: Simon Josefsson <simon@josefsson.org>
Cc: openpgp@ietf.org
In-Reply-To: <87cyswpjxt.fsf@kaka.sjd.se>
References: <1a5e4659-c7a7-4c73-8427-eb391736794e@kuix.de> <0E2C8CD9-310A-48B5-B7F5-E11633DFE611@andrewg.com> <87h6i92rbd.fsf@fifthhorseman.net> <87cyswpjxt.fsf@kaka.sjd.se>
Autocrypt: addr=Daniel Kahn Gillmor; prefer-encrypt=mutual; keydata= xjMEZXEJyxYJKwYBBAHaRw8BAQdA5BpbW0bpl5qCng/RiqwhQINrplDMSS5JsO/YO+5Zi7HCi QQfFgoAMQWCZadnIAUJBdtHCwMLCQcDFQoIApsBAh4BFiEE1HcEDHDCFWpcKYVJu36RAUlea/ cACgkQu36RAUlea/edDQD+M2QjnoEyu/TjI+gRXBpXQ5jCsnnp9FdYhaSSUW/vZ8kBAJByWlj A9aMfVaVrmvgcYw7jzJz+gmZspBRB++5LZ20NzRc8ZGtnQGZpZnRoaG9yc2VtYW4ubmV0PsLA EQQTFgoAeQMLCQdHFAAAAAAAHgAgc2FsdEBub3RhdGlvbnMuc2VxdW9pYS1wZ3Aub3JnEu/CS CeyWwC6j4ihJr2u/z6delsF1pvYW3ufgf1L538DFQoIApsBAh4BFiEE1HcEDHDCFWpcKYVJu3 6RAUlea/cFAmWnX5AFCQXZ8EUACgkQu36RAUlea/cjVwD+ONjdHM74rAa6EEiiqaPjlptiaZx CVqFYXnib6EbZARkBAPnnR8pW8vCBnDXHKu65jNqwF3aH761NaOqqMFfppg8GzjMEZXEJyxYJ KwYBBAHaRw8BAQdAjX25Fq2Q9IUFeHy6yByIQPBnFOedFliuEiCIUzJsENDCwMUEGBYKAS1HF AAAAAAAHgAgc2FsdEBub3RhdGlvbnMuc2VxdW9pYS1wZ3Aub3JnwqKWsw56uoWVLIFcs7ZecJ gwpsSNevWCzbviKQ8yRLUCmwK+oAQZFgoAbwWCZXEJywkQdy0WHjXNS4FHFAAAAAAAHgAgc2F sdEBub3RhdGlvbnMuc2VxdW9pYS1wZ3Aub3JnEIJSOxuw2y/UJmg5M3BLpN0JYjODZpXiEVFu 1byARzMWIQR0vATEPYYIS+hnLAZ3LRYeNc1LgQAAsH8BAKg1C5LK/D7pSkXCD+jfTSP+CqM58 iHLjh4vKhpOKsTJAQCHldtEjxJ1ksPTFgG9HihHH7qc6/wvvLw77ETMpwlrAxYhBNR3BAxwwh VqXCmFSbt+kQFJXmv3BQJlp1+rBQkCF4lgAAoJELt+kQFJXmv3ydsA/2roQZ2Jm/7iUrg/2C5 ClWA/xbvPC31LyMkGGH2/rq8tAP9BgqLuCPnNTVPqeX9+9qqMmaFq7wmvjq5I+yycAw9CDc44 BGVxCcsSCisGAQQBl1UBBQEBB0BZMsRrRaaeFSYMF1ZdfRmVgBriDUIr99eDQ085BK14DgMBC AfCwAYEGBYKAG5HFAAAAAAAHgAgc2FsdEBub3RhdGlvbnMuc2VxdW9pYS1wZ3Aub3JnsazAWX tEHUPmSTmcRZAIsAsNiO8k0hdjsfRlRVipgJgCmwwWIQTUdwQMcMIValwphUm7fpEBSV5r9wU CZadfqwUJAheJYAAKCRC7fpEBSV5r90AjAPwLgY1iKiFJEj32SVD5f721929l79VxQB5FlQss x1n5kQEA6Uct2tPvbB6T7p5KG3Gl+tbi7oJAuxFmpkpW5/N2Owg=
Date: Mon, 19 Feb 2024 10:48:02 -0500
Message-ID: <87plws1mml.fsf@fifthhorseman.net>
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg="pgp-sha512"; protocol="application/pgp-signature"
Archived-At: <https://mailarchive.ietf.org/arch/msg/openpgp/0jhdzmHSChv8G25-LXCaPFRyhNg>
Subject: Re: [openpgp] Transport public keys inside the message body
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 19 Feb 2024 16:10:20 -0000

On Fri 2024-02-16 15:23:10 +0100, Simon Josefsson wrote:
> Daniel Kahn Gillmor <dkg@fifthhorseman.net> writes:
>
>> OTOH, if the other side *is* capable, i'd like to signal my own
>> capability to them in a way that their tooling can pick up on, but is
>> otherwise invisible to a non-capable user.
>
> Would OpenPGP:'s preference field achieve this?
>
> https://datatracker.ietf.org/doc/html/draft-josefsson-openpgp-mailnews-header#section-3.3

I think it mostly does, except for the certificate distribution itself,
which is what this thread was about -- given either a URL or a key ID
(or fingerprint?) the recipient still has to do some work (including
interacting on the network) to get the certificate in question.

        --dkg