Re: [openpgp] Remove email metadata by encrypting headers using the published DKIM key

Stephen Farrell <stephen.farrell@cs.tcd.ie> Sun, 26 June 2022 19:48 UTC

Return-Path: <stephen.farrell@cs.tcd.ie>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3D412C1A7F1F for <openpgp@ietfa.amsl.com>; Sun, 26 Jun 2022 12:48:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.887
X-Spam-Level:
X-Spam-Status: No, score=-3.887 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, NICE_REPLY_A=-1.876, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=cs.tcd.ie
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dpZLFD2BlEak for <openpgp@ietfa.amsl.com>; Sun, 26 Jun 2022 12:48:47 -0700 (PDT)
Received: from EUR05-AM6-obe.outbound.protection.outlook.com (mail-am6eur05on2123.outbound.protection.outlook.com [40.107.22.123]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 54E60C18BCBD for <openpgp@ietf.org>; Sun, 26 Jun 2022 12:48:46 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=buAQJjeH3N+TkwbpIwwefqCDi/6SQHBf2f7EqHkCopgwRGl+0AlLWkrAn31OUDRGLR6+Fnk9iyqKpohy12VtrUZnQda0/Qyw2QXtwxGBEvT2jIDRhLn7sDc0/GLs8QPfqQH4VuPiWaDvQEcwMqXE/xU8TPmvVqi/EjfwdFoOWIuc4CoqAkUd4zTOj48UmDISVkIUpIkQzLNWbbCl6l+b6UKvXJg3aHxB6kovol+LrjzpcHSW7fHtV31G6MBs/i3Orw61CmkWqEWibfMdWjg3Ooo/VWotuMePnesNVBMprjltyJ8IWLBPHMPYP6U131iEIK5VlxaamZy5Ks5JK3QV0Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=s+xKH8D1Zb4+vEOrNifu+oBXqRt67nXFJeRnlYI2h7g=; b=YpwmDrmkh1eJQOV7D+HzUsY66qFZZNrv5qfFfZp5KdcF+CxNCw4l6OJ4kSOuMFsHUCCKSScdDhi+WPCKkHFD9/RHFaEvyguYnX9avdLRdig9mRsZ3B+g4No8CZFcnmazKRvXB88xRDmRXPmGr4g4GO5XroB9DykdTrUhuaelXjzSKIqH1Gn0FCd09rk+W7ysxM+hI2eDlLpyPiBICZTAfwArzuIJuhz9Qtk9uH3mpTCd9mBlfMONzJtVgIjtNcW0zsPXY86RMXiAg175YbCqd7ivBvLv9CIHrqsoPKgSvW4VbZAYl6m+wcx1fxFuhpJx+z9iHDtrYiTP/ILmVMWdaw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cs.tcd.ie; dmarc=pass action=none header.from=cs.tcd.ie; dkim=pass header.d=cs.tcd.ie; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cs.tcd.ie; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=s+xKH8D1Zb4+vEOrNifu+oBXqRt67nXFJeRnlYI2h7g=; b=KyruBvrrsiEsAuUk7WImsPGfWm8+gd2Nbxo1GgMa/Nzv/pVkCWiuC79/MnyjqbeKkoq7HeFc6Z4Zys8BNmN//OSUQ97CEJvVc81hS3w7OnmVTfpFTP/GDiCKgwnDUiae3OX/WKHz1JiKfizu7xh0HTIBcsXGWmJi//d3Xa5+c2+S+HC0f3BNR3eg4ViBIi8x27zyRTUNIMXvhFJwLUZoqxmYVosPPezn74ZNcG71o7DalZPcX92kldI0j+mToG0ta+/7EGeEv8iu59WUA3fA6R0CR/byNyEZrWApk3py1eOk4IrpIibEVYsKu/fJBWNXDF5MV0aPVIr/8LxC42atag==
Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=cs.tcd.ie;
Received: from DB7PR02MB5113.eurprd02.prod.outlook.com (2603:10a6:10:77::15) by DB9PR02MB6891.eurprd02.prod.outlook.com (2603:10a6:10:213::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5373.18; Sun, 26 Jun 2022 19:48:42 +0000
Received: from DB7PR02MB5113.eurprd02.prod.outlook.com ([fe80::8491:63e9:5e84:2d61]) by DB7PR02MB5113.eurprd02.prod.outlook.com ([fe80::8491:63e9:5e84:2d61%6]) with mapi id 15.20.5373.018; Sun, 26 Jun 2022 19:48:42 +0000
Message-ID: <9f4351e1-3d09-5844-1f99-5b2f9135fa33@cs.tcd.ie>
Date: Sun, 26 Jun 2022 20:48:41 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.9.1
Content-Language: en-US
To: Kai Engert <kaie@kuix.de>, openpgp <openpgp@ietf.org>
References: <f9585e88-635b-4385-afca-0de845acb875@kuix.de>
From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
In-Reply-To: <f9585e88-635b-4385-afca-0de845acb875@kuix.de>
Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="------------YFyv4u0JPDL5AK06D2uLlB96"
X-ClientProxiedBy: DBBPR09CA0045.eurprd09.prod.outlook.com (2603:10a6:10:d4::33) To DB7PR02MB5113.eurprd02.prod.outlook.com (2603:10a6:10:77::15)
MIME-Version: 1.0
X-MS-Exchange-MessageSentRepresentingType: 1
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 2b0dbabb-2cf6-4325-daae-08da57acdfb6
X-MS-TrafficTypeDiagnostic: DB9PR02MB6891:EE_
X-MS-Exchange-SharedMailbox-RoutingAgent-Processed: True
X-TCD-Routed-via-EOP: Routed via EOP
X-TCD-ROUTED: Passed-Transport-Routing-Rules
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: NBUDCWsCjUjGpLAVEcqQdGwF/Lm0SD5rtPSxbXR5fxh8jpLmsZAL85FW8CUrxCOBtcRgVF6s3LyoB9aw+zJ9RRAiEd/XyT1ORmzzcrkJFuBvZxMQiVm+XeMcU2VK+VPOkiHIAHUpend/2uMge/RscFg86aJ4CWMrPYiGvcTh+RCOP88v+LTgVPB6gQFtBicM1uhPlyDqJmX+cBl2ptET0ua4+5g9zBClWPyG0b/Yp1koQDdAvNXpdXuJFnAoDVp4DWcledSlCE83lwVyYERNMaXwbhSfOYOHJTOpYAKt/b5UCkoYrElz0mSN2on8+8fY1dFoPtHQ7/MGvtaxINeR082E8tb+k0+qTNBcP76RX6yiAsgsdQsGXMfJ7xFgGLDtoaQglB9akewmrCPP4VwyYdSgWDwk3NgXjf1Y++HiRHepXksh066cdYmT3aUs28KPcSTLQqFvN0HNx+v5tcbvH3lY+C3xXyRN4H+eKwkBwcy8q6FIRc68U80MymZ+L2z9tb4eS1p8jW8z80dPYjH+oXram+tY55z+5S42FJg68Yvpo7QMlbXCyVBlWhr3YhjxPCXvKC5SedFc9A/kxR5MOV9zHtAdqu7WVgJcmMGz2gN6xYfKZGbadjGRFypxyd2c6+u8Km+YYXYU0FqpKCHY7hYZDX1KElottxSlTLJp4Ibgfg+riLbjX5yuU5z3pOFBXFa9OiMpKlFsnVmmP+C/BGIoS+5sFek8Uw4wAV/qFZCb5iHHDLYG2OwqCEYbF2OXAaFATONkdnIF7vfDiykVi7rYkgSzhkvm+aQMnK6b4S+WBuh0u8CnhkrsG+wwoQ6Z0E2WYZ4qgDx9yLMQPixhFhTg7R631bsQmle1utLbfo4=
X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DB7PR02MB5113.eurprd02.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230016)(4636009)(39860400002)(136003)(396003)(366004)(376002)(346002)(6486002)(31696002)(186003)(966005)(66476007)(5660300002)(110136005)(44832011)(6512007)(478600001)(41300700001)(86362001)(786003)(38100700002)(316002)(6506007)(53546011)(33964004)(31686004)(2906002)(83380400001)(36756003)(2616005)(235185007)(66946007)(66556008)(8936002)(8676002)(21480400003)(45980500001)(43740500002); DIR:OUT; SFP:1102;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: HyRACqaG08J9mT/CwN4qd1BeCZS8wenvs2Cb6CH+BtBDRFx8pePd2G/cs7tG42tMLMLwOYuR6K8OJdoqk4mKfZ5ruk5YBfsNqFgrLm87M4Y+UTDmt/FqliU+qpTQ9O9pYvtNGW7EvF/Z75/gssuCQL7HEtW2XqJEO75YDQWU9racmyhpU2hKfl/K1XPGuuCmDQDZAzMotXohg7/gTgyVeAdsVjFIBOCmo/MIDk1HV5YhbSeWe4CvYivFzl/GzFFw4KTpb2xmi3sWjj0UmP74Qn2oaf/DB2awo8lXU3F9i/gK2qovb37CLbLLkEYKQMbn15l2ZJ5iY3VYIHrL8HwdqgbSVvUOOmZq+5PqpYDfyR4esAdOncBR/m/jvlqpjeWeoKOiWjH7l3+rFjliqod9I4v1PFINz9RnXcD1kOK/2dk/5dzEayci8KNm1KSP+t5rIsQKOz4Flu4TJ8ZZSsGgmGAlmGYFxgYXn1ShlmF7F6TX2NYNVU9PzyKcDJymn0llyIM2NF5L3AbiyY4Nj5BQ346PtIY84kMKdliqw82Vzf9C870qOplwfEEokezgWKr1HSdu7Y64VoayBlW5Epd39M8i01eeUbVcKEzxoK8OWdrTv6LYg63NlJL6z924gvATkz/z9SynI4r2jRhNMuxeQL8ovuuqZFtIYbulQYsvEqkMA0Y8e/K46eLvzwdQIhMfnea0hD+YwWVNJmuRxesfv/ernO1CbWICAbHJJ9gQHcDA7F0HLP/GpXI2BRtUAiiZb1TXhd9Ki7D9IjGbCfmtofzQE0xwNkOUPcSXRdOeHZmKv761FOeHuHBexoKJPGl+6sFZ/bGN6TJQfU8eQHfTa/m1/JMoMwTsNNdBHBkPEppJvgAm/LZGWbcEb1NMGNllOYcO6AD971tDAd1IARnGuzR/7lcgkdM0VlLaKKNgucrhmkl4BWcLY+A+uAOxcCaQh1xrhq583RWBmvQO46RVK1YnaOtzDTux+nESW8M6lkQwul168yzy2TrmlA4tVumc39973SyV1oDCok5oBnv3C8Oru31Aj889GC4HbzJfI2ac05uo2P7cIprinDNGZOGNM9ZN5Pzau8582q33+geD/mWY88axrGkq09EPgfy4pW+yir0pYAtlGt/L+RG5+PiP0AUyg2gtLbHR2hGnDhj90wgYbzmMGI0f/gDeoGVFdVa3Pdljn6V5qj2JpnUokmpaGJGzdNnvxBlC+S64iscukcYI9qKzIFb94JfmCipKvQf8IgSSrfbKbDTfpTy7UuJDkk5edMeakWpzkdMdOl5GzIbfSpZDXbm5qj8EkZxlF9cKs5EsTUEQat2cQPGH2kL4Tdyi5Xr+sF8OOvFdXdqI2J7VbwDtLzsjDeEzVeSLNeqvWSvlOM8PbrdCir4qprNrl1Dj6c3XsRk23A9Vse1vcqCOojfPGd3ZKScD3Jv08zK0y+Wd8An/miCbiUw3aPEwjVA/PSEJlj6dJLxBlrnlq7yTpK2ecvrWLdAckSf8LqaE9NkuYdh9Mxt7/K8KNapa0sT+SYNgp6p8lCOQ8R0/EnwrSdz8BM+OdpokIvBiBv/5EZ/qQaQNUxLz+v3KiSddPu30kNtDwQkF2Z8PYrPmVVJG5MG1xdThYdh5NcXywXn4ClbUEqOfh4VsYnK3edI4
X-OriginatorOrg: cs.tcd.ie
X-MS-Exchange-CrossTenant-Network-Message-Id: 2b0dbabb-2cf6-4325-daae-08da57acdfb6
X-MS-Exchange-CrossTenant-AuthSource: DB7PR02MB5113.eurprd02.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 26 Jun 2022 19:48:42.7203 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: d595be8d-b306-45f4-8064-9e5b82fbe52b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: DxOCSoe1ReN6TKAdknggcp1yA4LJGNR6qtv5egpVUI01/ZDbBYfn1YEMKz+ojIgf
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB9PR02MB6891
Archived-At: <https://mailarchive.ietf.org/arch/msg/openpgp/JA4BMgXZ-A_fGT0DKkN7BBQuVi0>
Subject: Re: [openpgp] Remove email metadata by encrypting headers using the published DKIM key
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 26 Jun 2022 19:48:52 -0000

Hiya,

On 23/06/2022 09:31, Kai Engert wrote:
> I'd like to drop the following idea about reducing some metadata from 
> emails.
> 
> While the OpenPGP list isn't the perfect fit for this suggestion, I'm 
> guessing that many of you might have an opinion on this idea, given that 
> PGP is related to privacy and email. Please suggest a better place to 
> discuss this, if there is one.

I think you're correct in the above (that this isn't the best
list for this). I'd suggest secdispatch@ietf.org would be a
good fit, perhaps after an initial I-D has been crafted. (To
be clear: I'm not objecting to initial discussion here just
noting that this list isn't a place where we ought aim to
dispatch or dispose of the idea.)

Cheers,
S.

PS: Personally, I'd share some of the concerns mcr expressed
about the idea being practical - one additional issue would
be that, for this to be anywhere near reliable, you'd need a
marker on the public key RR in the DNS to signal the decrypt
capability, which means changes to DKIM public keys, which I
think means it'd be near as easy to publish new RRs for the
new purpose, with new keys. (Given that domains generally do
not ever change their DKIM public keys;-)

> 
> While this idea might be applicable to additional email headers, I'll 
> start by talking about the recipient headers TO and CC.
> 
> Today, emails leak information about the sender and the recipients of an 
> email to everyone along the route.
> 
> If a domain has published an RSA key for DKIM signatures on DNS (and 
> signals on DNS that it opts in to the encryption mechanism described 
> here), then agents that send email to that domain could encrypt the list 
> of recipients.
> 
> For example, if the intended recipient is someone@example.com, the agent 
> could encrypt "someone" and encode it as base64. The software on the 
> recipient server could then use the DKIM key to decrypt the message.
> 
> Simply replacing the addresses doesn't work for emails with recipients 
> on more than one domain, because the server on each recipient domain 
> must be able to decrypt the list of recipients.
> 
> So maybe alice@business.example.com could be replaced by 
> enc-recip-1@business.example.com, and bob@ngo.example.com could be 
> replaced by enc-recip-2@ngo.example.com, and an email header for each 
> combination of {recipient, destination-domain} could be added:
> 
> X-enc-recip-which: (replacement-identifier) 
> (encrypted-base64-encoded-mailbox-name) (domain key that can decrypt 
> this cipher)
> 
> Example:
> 
> X-enc-recip-to: enc-recip-1 ZWNpbGEK business.example.com
> X-enc-recip-to: enc-recip-2 b2JiCg== business.example.com
> X-enc-recip-cc: enc-recip-1 RUNJTEEK ngo.example.com
> X-enc-recip-cc: enc-recip-2 T0JCCg== ngo.example.com
> 
> Possibly also:
> 
> X-enc-from: enc-recip-0 Y2hhcmxpZQo= business.example.com
> X-enc-from: enc-recip-0 Q0hBUkxJRQo= ngo.example.com
> 
> Some domains want to use separate servers for sending emails and 
> receiving emails, and they might prefer to store the DKIM sending key on 
> the servers for outgoing email, only. That would require that optionally 
> a separate key could be published by the domain for receiving encrypted 
> headers. Because some sort of signaling is required that allows a server 
> to opt in to receive encrypted headers, it might be better to not reuse 
> the DKIM keys, but rather define a separate DNS record for publishing an 
> encryption key for receiving such headers.
> 
> Above this paragraph is the generic description of the new idea that 
> could (maybe) reduce the amount of meta data in emails.
> 
> Below this line is a rough idea for a potential application. I'm not 
> claiming the idea is practical, I'm just offering it as an example for 
> how the metadata reduction could be beneficial.
> 
> Let's say uncensored@example.com is an email robot, that offers the 
> retrieval of documents from wikipedia.org and archive.org, intended for 
> users like Garry, who lives in Censorland, which censors access to those 
> sites.
> 
> Garry sends email to uncensored@example.com, asking for the wikipedia 
> article on Special-Peace-Collaboration.
> 
> If the email address uncensored@example.com can be seen in the email in 
> the clear, then the admins of Censorland can easily block it as undesired.
> 
> However, if example.com is a large email provider, encrypting the true 
> recipient mailbox is a domain fronting approach to make blocking the 
> mailbox difficult.
> 
> The email that Garry sends could be encrypted using OpenPGP, to hide 
> which article Garry is requesting. Garry could also include their public 
> key, allowing the email robot to encrypt the article that is sent to 
> Garry by email in response.
> 
> (When sending the response to Garry, in addition to encrypting the 
> article, the email should also use a fake sender address, to not reveal 
> the true origin of the email to the Censorland email server operators.)
> 
> Sent in the hope these ideas make some sense and could be useful.
> 
> Kai
> 
> 
> _______________________________________________
> openpgp mailing list
> openpgp@ietf.org
> https://www.ietf.org/mailman/listinfo/openpgp