[openpgp] Re: Certificate discovery over HKP

Andrew Gallagher <andrewg@andrewg.com> Tue, 08 April 2025 19:41 UTC

Return-Path: <andrewg@andrewg.com>
X-Original-To: openpgp@mail2.ietf.org
Delivered-To: openpgp@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id BAC51192A7C3 for <openpgp@mail2.ietf.org>; Tue, 8 Apr 2025 12:41:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=andrewg.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WuZFHda8F-_w for <openpgp@mail2.ietf.org>; Tue, 8 Apr 2025 12:41:15 -0700 (PDT)
Received: from fum.andrewg.com (fum.andrewg.com [135.181.198.78]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id E040D192A7B5 for <openpgp@ietf.org>; Tue, 8 Apr 2025 12:41:14 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=andrewg.com; s=andrewg-com; t=1744141273; bh=hn4e++GOLPB8E84sp0BqRrz3uP7YEpLwpHDmm/u6C4U=; h=From:Subject:Date:References:Cc:In-Reply-To:To:From; b=MZj3tfgFihq0QEhLnm7r3bSYV5xaIBUdWYPObxDE29s1B9ErECxIS4G5MQl6Gs6uX 7fDIxTjNtmYD21bqgntYrESLGrGp6k/es50yZe7OkYB6yK2CMraQEyQ6+5vAzFfNJs wl43S+panx6vdcrZaZnlrn80rC5t9Lsi0fIGr5NVlRcOf1VihqHYyDiylxvBPhHIQT bKxgxKNI1VptvAZjqo5t3GFxKeKmiJ+V12EFEtG1TkRbyxsA3UIbg0HPMmmsJPU1Jq k6zo1LIoXxD02tQA+bEhwMKCsCeEuKno3w0OBuDphmJuqsqF8VBhXaD7KBaQOS9v1I D/Qx+Q8ccPmiQ==
Received: from smtpclient.apple (unknown [176.61.115.103]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (Client did not present a certificate) by fum.andrewg.com (Postfix) with ESMTPSA id E16F95EDF7; Tue, 8 Apr 2025 19:41:13 +0000 (UTC)
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
From: Andrew Gallagher <andrewg@andrewg.com>
Mime-Version: 1.0 (1.0)
Date: Tue, 08 Apr 2025 20:41:01 +0100
Message-Id: <64E8EDAE-CCD3-483C-BB7D-B08499253752@andrewg.com>
References: <-0Idgc9O4unvMWFMaXJXFqwK7IJCVXnK2ElLGWK8XjHd3juaDt-bShTiuu0V8KCDR_Uubqjr33I4F-A8xp9KpZkoJcORRXSHII9NXNaU64s=@protonmail.com>
In-Reply-To: <-0Idgc9O4unvMWFMaXJXFqwK7IJCVXnK2ElLGWK8XjHd3juaDt-bShTiuu0V8KCDR_Uubqjr33I4F-A8xp9KpZkoJcORRXSHII9NXNaU64s=@protonmail.com>
To: Daniel Huigens <d.huigens=40protonmail.com@dmarc.ietf.org>
X-Mailer: iPhone Mail (22D82)
Message-ID-Hash: 54NTAGRH3P4WAKK3YSXTUKYHLXNUTUDF
X-Message-ID-Hash: 54NTAGRH3P4WAKK3YSXTUKYHLXNUTUDF
X-MailFrom: andrewg@andrewg.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-openpgp.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: Andrew Gallagher <andrewg=40andrewg.com@dmarc.ietf.org>, "openpgp\\\\@ietf.org" <openpgp@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [openpgp] Re: Certificate discovery over HKP
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/openpgp/1qTIIJg84dngejtnQJ3fhcmGvdw>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Owner: <mailto:openpgp-owner@ietf.org>
List-Post: <mailto:openpgp@ietf.org>
List-Subscribe: <mailto:openpgp-join@ietf.org>
List-Unsubscribe: <mailto:openpgp-leave@ietf.org>

On 8 Apr 2025, at 19:35, Daniel Huigens <d.huigens=40protonmail.com@dmarc.ietf.org> wrote:
> 
> 
>> we can require that policy file lookups are covered by a
>> TLS certificate, but cannot yet require that SRV records be
>> covered by DNSSEC
> 
> In theory we could require that, it's just a question of whether the
> security gain is worth preventing sites without DNSSEC from using this,
> right?

Right. 

> Also, in the cold-email case, the most serious attack a MITM could do
> is to prevent the OpenPGP cert from being served altogether, and that's
> possible in either case (e.g. by just removing the openpgpkey subdomain
> DNS record).

An MITM could redirect to a malicious keyserver and serve a fake cert with an attacker-controlled encryption subkey. They could even bind the real subkey as a second encryption subkey to make the attack silent.

A