Re: [saag] Ubiquitous Encryption: spam filtering

Eliot Lear <lear@cisco.com> Tue, 30 June 2015 06:46 UTC

Return-Path: <lear@cisco.com>
X-Original-To: saag@ietfa.amsl.com
Delivered-To: saag@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 345F21B3702 for <saag@ietfa.amsl.com>; Mon, 29 Jun 2015 23:46:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.511
X-Spam-Level:
X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pwSrC-VV-Zaq for <saag@ietfa.amsl.com>; Mon, 29 Jun 2015 23:46:02 -0700 (PDT)
Received: from aer-iport-1.cisco.com (aer-iport-1.cisco.com [173.38.203.51]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B6DD21B36FE for <saag@ietf.org>; Mon, 29 Jun 2015 23:46:01 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=1616; q=dns/txt; s=iport; t=1435646763; x=1436856363; h=message-id:date:from:mime-version:to:cc:subject: references:in-reply-to; bh=GezTC8rCHxmBTvHHNDtGdpzdzc0dFI65MnmPdoLOMNo=; b=JbGB0AuTGagXTzcfDNjQxJMpOtCaXaGqKF6iZI0bdZ1XAANlbYIGu36Z fSG0uPkdr37vWoto2hld+u9t1ww62MMxc260O/rE087uc+Yh46mfMBzsG JHytLZ0XI2UjgXkEdKDqANcVxE6xXebnCtyXmrqbYaFVBkEX3EXwmOZGL 4=;
X-Files: signature.asc : 481
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0CDAwCSOpJV/xbLJq1bh2K6EwmHXwKBdBQBAQEBAQEBgQqEIwEBBCNWEAshIQICDwJGBgEMAQcBAYgrs1aWeQEBAQEBAQEBAQEBAQEBAQEBAQEBAReLSoQjEAIBUAeCaIFDAQSUBIIlgVCHYIg2kAUmg3w8gnkBAQE
X-IronPort-AV: E=Sophos;i="5.15,375,1432598400"; d="asc'?scan'208";a="567478448"
Received: from aer-iport-nat.cisco.com (HELO aer-core-3.cisco.com) ([173.38.203.22]) by aer-iport-1.cisco.com with ESMTP; 30 Jun 2015 06:46:01 +0000
Received: from [10.61.222.239] ([10.61.222.239]) by aer-core-3.cisco.com (8.14.5/8.14.5) with ESMTP id t5U6jx6u026602; Tue, 30 Jun 2015 06:45:59 GMT
Message-ID: <55923B28.70305@cisco.com>
Date: Tue, 30 Jun 2015 08:46:00 +0200
From: Eliot Lear <lear@cisco.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: joel jaeggli <joelja@bogus.com>, Phillip Hallam-Baker <phill@hallambaker.com>, John Levine <johnl@taugh.com>
References: <20150623151902.89304.qmail@ary.lan> <CAMm+LwjG7=r1B5J2P9WNpEefs9kC+b9ZLM+Q71-KJ=3jb6Gq_Q@mail.gmail.com> <559236DF.7080203@bogus.com>
In-Reply-To: <559236DF.7080203@bogus.com>
Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="5neJtC3qdodhR93XwET0uVj9Qjm85q272"
Archived-At: <http://mailarchive.ietf.org/arch/msg/saag/Q8fg_dh8z1FS5VihRg4XLx4QsaQ>
Cc: "saag@ietf.org" <saag@ietf.org>
Subject: Re: [saag] Ubiquitous Encryption: spam filtering
X-BeenThere: saag@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Security Area Advisory Group <saag.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/saag>, <mailto:saag-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/saag/>
List-Post: <mailto:saag@ietf.org>
List-Help: <mailto:saag-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/saag>, <mailto:saag-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 30 Jun 2015 06:46:03 -0000

Hi,

On 6/30/15 8:27 AM, joel jaeggli wrote:

>>
>> Main constraint is that you don't want to accept end-to-end encrypted
>> email unless it is signed by someone you know. So the endy mail problem
>> becomes an introduction problem. 
> The fact that parties that are known to each other have not in general
> been mutually authenticated is a, if not the, significant conduit of
> phishing.
>
>

That is A component but not THE component.  When someone gets hacked,
the bad guy usually has access to sufficient bonafides to get something
through the MSA.  To avoid this we would have to go to OOB
authentication systems, and that just ain't happening.

Eliot