Re: [openpgp] Intended Recipient observation

"Neal H. Walfield" <neal@walfield.org> Fri, 16 April 2021 16:42 UTC

Return-Path: <neal@walfield.org>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A05E63A2BFF for <openpgp@ietfa.amsl.com>; Fri, 16 Apr 2021 09:42:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level:
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xINGiTj2ZN9j for <openpgp@ietfa.amsl.com>; Fri, 16 Apr 2021 09:42:07 -0700 (PDT)
Received: from mail.dasr.de (mail.dasr.de [202.61.250.5]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CB22D3A2518 for <openpgp@ietf.org>; Fri, 16 Apr 2021 09:42:06 -0700 (PDT)
Received: from p5de92c26.dip0.t-ipconnect.de ([93.233.44.38] helo=forster.huenfield.org) by mail.dasr.de with esmtpsa (TLS1.3:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.92) (envelope-from <neal@walfield.org>) id 1lXRXb-00067Q-8S; Fri, 16 Apr 2021 18:41:59 +0200
Received: from grit.huenfield.org ([192.168.20.9] helo=grit.walfield.org) by forster.huenfield.org with esmtps (TLS1.3:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.92) (envelope-from <neal@walfield.org>) id 1lXRXa-0000UX-OK; Fri, 16 Apr 2021 18:41:58 +0200
Date: Fri, 16 Apr 2021 18:41:58 +0200
Message-ID: <87y2dinpux.wl-neal@walfield.org>
From: "Neal H. Walfield" <neal@walfield.org>
To: vedaal@nym.hush.com
Cc: openpgp <openpgp@ietf.org>
In-Reply-To: <20210416163101.3A49E80614A@smtp.hushmail.com>
References: <87zgxynw7x.wl-neal@walfield.org> <20210416163101.3A49E80614A@smtp.hushmail.com>
User-Agent: Wanderlust/2.15.9 (Almost Unreal) SEMI-EPG/1.14.7 (Harue) FLIM/1.14.9 (Gojō) APEL/10.8 EasyPG/1.0.0 Emacs/27 (x86_64-pc-linux-gnu) MULE/6.0 (HANACHIRUSATO)
MIME-Version: 1.0 (generated by SEMI-EPG 1.14.7 - "Harue")
Content-Type: text/plain; charset="US-ASCII"
X-SA-Exim-Connect-IP: 192.168.20.9
X-SA-Exim-Mail-From: neal@walfield.org
X-SA-Exim-Scanned: No (on forster.huenfield.org); SAEximRunCond expanded to false
Archived-At: <https://mailarchive.ietf.org/arch/msg/openpgp/zLnNCPHSgp4UsTaz0Wbw8LPrvaA>
Subject: Re: [openpgp] Intended Recipient observation
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 16 Apr 2021 16:42:13 -0000

On Fri, 16 Apr 2021 18:31:01 +0200,
vedaal@nym.hush.com wrote:
> On 4/16/2021 at 10:24 AM, "Neal H. Walfield" <neal@walfield.org> wrote:
>  Why would Alice want to import M's key?

In the software that I'm working on the "keyring" is simply a cache.
We aggresively harvest all keys that we encounter (storage is cheap),
and rely on our trust model to separate the wheat from the chaff.

>  Still, in order for her to Import M' as a new key by M, she would check first if M' was also signed by M.
>  If she then sees a decryption problem, she would (thanks to your pointing this out), 
>  check for duplicate subkey S in her keyring, and then find out that M does bear her ill will.

In my opinion, we should shift as little complexity as possible to the
user.  In our case, this means that Sequoia has to worry about a lot
more corner cases, such as this one, but I think it is worth it.

>  As most users are familiar with their encryption subkey's
>  fingerprint, it would be a good idea to check any prospective
>  public key for an encryption subkey fingerprint, before importing
>  it.

The user population that I'm targetting doesn't understand how to do
this nor do they want to learn about these nuances.

>  Thanks for pointing this out.
>  (Doesn't affect me though, as am from old school that doesn't use subkeys,
>  where the primary certificate signs, decrypts and authenticates).

Thanks for the feedback!

:) Neal