Re: [openpgp] Web Key Directory and advanced lookup method

Daniel Kahn Gillmor <dkg@fifthhorseman.net> Fri, 19 April 2019 13:39 UTC

Return-Path: <dkg@fifthhorseman.net>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 89D661202E3 for <openpgp@ietfa.amsl.com>; Fri, 19 Apr 2019 06:39:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=neutral reason="invalid (unsupported algorithm ed25519-sha256)" header.d=fifthhorseman.net header.b=9mEy3cVz; dkim=pass (2048-bit key) header.d=fifthhorseman.net header.b=wyR4LAXv
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YoI1mkRv3hg3 for <openpgp@ietfa.amsl.com>; Fri, 19 Apr 2019 06:39:20 -0700 (PDT)
Received: from che.mayfirst.org (che.mayfirst.org [162.247.75.118]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 035051202E4 for <openpgp@ietf.org>; Fri, 19 Apr 2019 06:39:18 -0700 (PDT)
DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/simple; d=fifthhorseman.net; i=@fifthhorseman.net; q=dns/txt; s=2019; t=1555681157; h=from : to : cc : subject : in-reply-to : references : date : message-id : mime-version : content-type : from; bh=So+gGi6ZmcQnO+vsoke8aYyQl2jBGjze4gJZ00IRC1k=; b=9mEy3cVzWw33nLdRGYquw8aaLcLaLVR41vaqyR3iIpgtxmlU4zz3rt80 FRJJMcKK3gqZmzXIDO58AmmxiO2SAA==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=fifthhorseman.net; i=@fifthhorseman.net; q=dns/txt; s=2019rsa; t=1555681156; h=from : to : cc : subject : in-reply-to : references : date : message-id : mime-version : content-type : from; bh=So+gGi6ZmcQnO+vsoke8aYyQl2jBGjze4gJZ00IRC1k=; b=wyR4LAXvKdVKdtlKUHZx3X/Xc3qZgRWkkuECJjk7uPwENjOFrP8QPbtj OMKQxoqElnxby4NaRqAwGcbDTQwLOcK9SNFq51Rb3wvUVGK3GjvLm3hw8A icv0dQKeffYSbJke6ew0gPAKguEZeu7qVnFDmV5nZAka3uT5IaUEDdJSoi 91qzseW5wLMBCeHrfJD7bHYSGo9YeHLzAy8cAzG+wFKa/i9nHFPu1o1ls5 eEe5gp+3hGiEwRWXzwaLoL+v51uRCQwFqz0CwHM3APsZj++PDnkNFZQrqj MA5nLCHUXI3clVsQCOqs36zCCKpuEJdmcUBJuCrci9d92WbI0/ehgA==
Received: from fifthhorseman.net (unknown [38.109.115.130]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by che.mayfirst.org (Postfix) with ESMTPSA id 436CAF99E; Fri, 19 Apr 2019 09:39:15 -0400 (EDT)
Received: by fifthhorseman.net (Postfix, from userid 1000) id 6EE0120299; Fri, 19 Apr 2019 03:18:26 -0400 (EDT)
From: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
To: Bart Butler <bartbutler@protonmail.com>, Wiktor Kwapisiewicz <wiktor=40metacode.biz@dmarc.ietf.org>
Cc: "openpgp@ietf.org" <openpgp@ietf.org>
In-Reply-To: <dCPoM33MfSao7HK_yYlAA2P0JoYuacknsS8b4cwdQIeH1KaZ94TixvqxJBhny2rFZ6WK097aj72bUvZqJmny1yDQslsQ3hFKrJvvR1b-3Zo=@protonmail.com>
References: <e4b26d9c-5942-3214-a9e4-caad42e682ee@metacode.biz> <dCPoM33MfSao7HK_yYlAA2P0JoYuacknsS8b4cwdQIeH1KaZ94TixvqxJBhny2rFZ6WK097aj72bUvZqJmny1yDQslsQ3hFKrJvvR1b-3Zo=@protonmail.com>
Autocrypt: addr=dkg@fifthhorseman.net; prefer-encrypt=mutual; keydata= mDMEXEK/AhYJKwYBBAHaRw8BAQdAr/gSROcn+6m8ijTN0DV9AahoHGafy52RRkhCZVwxhEe0K0Rh bmllbCBLYWhuIEdpbGxtb3IgPGRrZ0BmaWZ0aGhvcnNlbWFuLm5ldD6ImQQTFggAQQIbAQUJA8Jn AAULCQgHAgYVCgkICwIEFgIDAQIeAQIXgBYhBMS8Lds4zOlkhevpwvIGkReQOOXGBQJcQsbzAhkB AAoJEPIGkReQOOXG4fkBAO1joRxqAZY57PjdzGieXLpluk9RkWa3ufkt3YUVEpH/AP9c+pgIxtyW +FwMQRjlqljuj8amdN4zuEqaCy4hhz/1DbgzBFxCv4sWCSsGAQQB2kcPAQEHQERSZxSPmgtdw6nN u7uxY7bzb9TnPrGAOp9kClBLRwGfiPUEGBYIACYWIQTEvC3bOMzpZIXr6cLyBpEXkDjlxgUCXEK/ iwIbAgUJAeEzgACBCRDyBpEXkDjlxnYgBBkWCAAdFiEEyQ5tNiAKG5IqFQnndhgZZSmuX/gFAlxC v4sACgkQdhgZZSmuX/iVWgD/fCU4ONzgy8w8UCHGmrmIZfDvdhg512NIBfx+Mz9ls5kA/Rq97vz4 z48MFuBdCuu0W/fVqVjnY7LN5n+CQJwGC0MIA7QA/RyY7Sz2gFIOcrns0RpoHr+3WI+won3xCD8+ sVXSHZvCAP98HCjDnw/b0lGuCR7coTXKLIM44/LFWgXAdZjm1wjODbg4BFxCv50SCisGAQQBl1UB BQEBB0BG4iXnHX/fs35NWKMWQTQoRI7oiAUt0wJHFFJbomxXbAMBCAeIfgQYFggAJhYhBMS8Lds4 zOlkhevpwvIGkReQOOXGBQJcQr+dAhsMBQkB4TOAAAoJEPIGkReQOOXGe/cBAPlek5d9xzcXUn/D kY6jKmxe26CTws3ZkbK6Aa5Ey/qKAP0VuPQSCRxA7RKfcB/XrEphfUFkraL06Xn/xGwJ+D0hCw==
Date: Fri, 19 Apr 2019 03:18:25 -0400
Message-ID: <87wojqxy2m.fsf@fifthhorseman.net>
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg="pgp-sha512"; protocol="application/pgp-signature"
Archived-At: <https://mailarchive.ietf.org/arch/msg/openpgp/3ud0T-FFQb4fbo010y5F_HXg6Zs>
Subject: Re: [openpgp] Web Key Directory and advanced lookup method
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 19 Apr 2019 13:39:22 -0000

On Thu 2019-04-18 18:21:01 +0000, Bart Butler wrote:

> I'd say that this is less of an attack vector and more of a 'mischief'
> vector, and that public suffixes can easily protect themselves if it
> ever becomes an issue.

Why is this merely "mischief"?  I can publish semi-authoritative records
about the key material for all your users if you grant me access to a
single specific subdomain. without noticing the appearance of this
draft.  That sounds like more than mischief to me.

> WKD client implementations can also use the public suffix list
> themselves to prevent the problem--a quick search yields libraries for
> lots of platforms. Maybe this would be a reasonable suggestion to add
> to the RFC, but it also doesn't seem critical to me.

Resorting to the public suffix list is always a terrible solution, but
maybe it's what we have to rely on.  Writing down the explicit guidance
on what to do there, and what it's implications are, is probably a good
idea for thinking it through.  Would this suggest, for example, that no
e-mail address within @github.io would be able to effectively publish
their OpenPGP certificate via WKD?

      --dkg