Re: [perpass] Another mail-related proposal

Jim Fenton <fenton@bluepopcorn.net> Tue, 20 August 2013 05:24 UTC

Return-Path: <fenton@bluepopcorn.net>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0FD9B11E8165 for <perpass@ietfa.amsl.com>; Mon, 19 Aug 2013 22:24:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.359
X-Spam-Level:
X-Spam-Status: No, score=-1.359 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, SARE_LWSHORTT=1.24]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vs5zQbUEBSPg for <perpass@ietfa.amsl.com>; Mon, 19 Aug 2013 22:24:11 -0700 (PDT)
Received: from v2.bluepopcorn.net (v2.bluepopcorn.net [IPv6:2607:f2f8:a994::2]) by ietfa.amsl.com (Postfix) with ESMTP id 97D4411E8101 for <perpass@ietf.org>; Mon, 19 Aug 2013 22:24:10 -0700 (PDT)
Received: from [68.164.244.154] (kernel.bluepopcorn.net [68.164.244.154]) (authenticated bits=0) by v2.bluepopcorn.net (8.14.3/8.14.3/Debian-9.4) with ESMTP id r7K5O4HV001944 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 19 Aug 2013 22:24:07 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=bluepopcorn.net; s=supersize; t=1376976248; bh=b/sCOjTT58pHAQrWUXI2k6dJntParmV6mr95342e/zE=; h=Message-ID:Date:From:MIME-Version:To:CC:Subject:References: In-Reply-To:Content-Type:Content-Transfer-Encoding; b=UYS9f8T3OVwFTqQcH8kRYbBfc3cwkEkOjXVsbVVKAfNUW6PJ3prVnJIuel5arHrIz 9rNXSJTcRlEixDnWer4+ZlN734S5bYPiu+F5Zle2FnkY8SV7pEquQPCpUMcxzY6huZ wiiBj09UEc1ZzAGCuYMi7WH5qPh0pSqEhTXbOWLc=
Message-ID: <5212FD71.6060200@bluepopcorn.net>
Date: Mon, 19 Aug 2013 22:24:01 -0700
From: Jim Fenton <fenton@bluepopcorn.net>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130803 Thunderbird/17.0.8
MIME-Version: 1.0
To: Randy Bush <randy@psg.com>
References: <520FE08B.80005@bluepopcorn.net> <alpine.LFD.2.10.1308171723400.14413@bofh.nohats.ca> <5210643F.8030709@bluepopcorn.net> <m2bo4vcuup.wl%randy@psg.com> <Pine.SGI.4.61.1308180959010.1312964@shell01.TheWorld.com> <5210F9D3.5010302@bluepopcorn.net> <m2zjsea6fd.wl%randy@psg.com> <52126423.2050209@bluepopcorn.net> <m21u5p9ox7.wl%randy@psg.com>
In-Reply-To: <m21u5p9ox7.wl%randy@psg.com>
X-Enigmail-Version: 1.5.2
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit
Cc: perpass@ietf.org
Subject: Re: [perpass] Another mail-related proposal
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "The perpass list is for discussion of the privacy properties of IETF protocols and concrete ways in which those could be improved. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 20 Aug 2013 05:24:16 -0000

On 08/19/2013 05:38 PM, Randy Bush wrote:
>>> and the nsa pwns the disk drives of the smtp relays.  e2e, please, in
>>> addition to transport.  in 1984, all data and traffic should be
>>> encrypted.
>> That goes to the question I had in my original message on this thread:
>> what is the threat model we are attempting to address? In the short term
>> at least, I consider transport-level encryption of email to be helpful,
>> because it raises the required attack complexity.
> i agree transport should be encrypted.  and, as someone has pointed out,
> we should know when that negotiation is not successful and be able to
> make some decisions.
>
> smtp is hop by hop.  just because A encrypts to B, A has zero assurance
> that B encrypts to C.  hence, e2e encryption is pretty much mandatory
> against a purely passive attacker.
>
...which goes back to the original thing I was suggesting: that A should
be able to signal to B that it should only relay the message (e.g., to
C) if the channel is also encrypted and that C also will observe the
restriction if it needs to relay the message further. Not as good as
end-to-end encryption, but an improvement nonetheless.

I believe the military folks might call this "Encrypt For Transmission
Only".

-Jim