[Secdispatch] Dispatch requested: Encrypted e-mail with cleartext copies

Daniel Kahn Gillmor <dkg@fifthhorseman.net> Tue, 21 February 2023 23:46 UTC

Return-Path: <dkg@fifthhorseman.net>
X-Original-To: secdispatch@ietfa.amsl.com
Delivered-To: secdispatch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 60200C15E406 for <secdispatch@ietfa.amsl.com>; Tue, 21 Feb 2023 15:46:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.303
X-Spam-Level:
X-Spam-Status: No, score=-6.303 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, RDNS_NONE=0.793, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=neutral reason="invalid (unsupported algorithm ed25519-sha256)" header.d=fifthhorseman.net header.b="r1eDZctq"; dkim=pass (2048-bit key) header.d=fifthhorseman.net header.b="wVzx0qlV"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jostcWLQq4td for <secdispatch@ietfa.amsl.com>; Tue, 21 Feb 2023 15:46:24 -0800 (PST)
Received: from che.mayfirst.org (unknown [162.247.75.117]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AB190C15C533 for <secdispatch@ietf.org>; Tue, 21 Feb 2023 15:46:24 -0800 (PST)
DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/simple; d=fifthhorseman.net; i=@fifthhorseman.net; q=dns/txt; s=2019; t=1677023182; h=from : to : subject : date : message-id : mime-version : content-type : from; bh=JocCgurTyP79dyV09BjQiYkhhwfvxwKjPpch+1bPKP0=; b=r1eDZctq1cCSYaesl9i0G2jW3ZL8TomT+HUmHQkKpfY/jgF97nMlKmEEd6qKjZnKGc/lK 55kAhHd+37qYKUfAw==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=fifthhorseman.net; i=@fifthhorseman.net; q=dns/txt; s=2019rsa; t=1677023182; h=from : to : subject : date : message-id : mime-version : content-type : from; bh=JocCgurTyP79dyV09BjQiYkhhwfvxwKjPpch+1bPKP0=; b=wVzx0qlV8fnbMxMMUHapciE9P7oRrZw4JBSdODEp2FQ08quXuyQBx711E4zjEdk2iyYyi 5yfPj3PsnlwJcXFlXqZzic0CTLOBH40LQltUXgnmO9/GXd0C/s4LyswEqxXX/D1787oVkmp 6MSfscgyjabWbJCLNKf0UaT44zBIyvJeNRTCNfH+zyH6s9xIEPPJrbOBfOdDvk5nZHBwibm +TSMWSrvRMuIVgICeTse4GpdJ6NEjnHKTxT0vTE77Sc/5ivnk5RQBl/MQ3bB4XvEZA5qNmp KQBEnlDRCujgU/Mde3dR+QBtXBcKFPnkL/bKY95sXLP0r81xMcRkwVemA2sA==
Received: from fifthhorseman.net (lair.fifthhorseman.net [108.58.6.98]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) server-digest SHA384) (No client certificate requested) by che.mayfirst.org (Postfix) with ESMTPSA id 79759F9AD for <secdispatch@ietf.org>; Tue, 21 Feb 2023 18:46:22 -0500 (EST)
Received: by fifthhorseman.net (Postfix, from userid 1000) id A840420509; Tue, 21 Feb 2023 18:46:18 -0500 (EST)
From: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
To: secdispatch@ietf.org
Autocrypt: addr=dkg@fifthhorseman.net; prefer-encrypt=mutual; keydata= mDMEX+i03xYJKwYBBAHaRw8BAQdACA4xvL/xI5dHedcnkfViyq84doe8zFRid9jW7CC9XBiI0QQf FgoAgwWCX+i03wWJBZ+mAAMLCQcJEOCS6zpcoQ26RxQAAAAAAB4AIHNhbHRAbm90YXRpb25zLnNl cXVvaWEtcGdwLm9yZ/tr8E9NA10HvcAVlSxnox6z62KXCInWjZaiBIlgX6O5AxUKCAKbAQIeARYh BMKfigwB81402BaqXOCS6zpcoQ26AADZHQD/Zx9nc3N2kj13AUsKMr/7zekBtgfSIGB3hRCU74Su G44A/34Yp6IAkndewLxb1WdRSokycnaCVyrk0nb4imeAYyoPtBc8ZGtnQGZpZnRoaG9yc2VtYW4u bmV0PojRBBMWCgCDBYJf6LTfBYkFn6YAAwsJBwkQ4JLrOlyhDbpHFAAAAAAAHgAgc2FsdEBub3Rh dGlvbnMuc2VxdW9pYS1wZ3Aub3JnL0Gwxvypz2tu1IPG+yu1zPjkiZwpscsitwrVvzN3bbADFQoI ApsBAh4BFiEEwp+KDAHzXjTYFqpc4JLrOlyhDboAAPkXAP0Z29z7jW+YzLzPTQML4EQLMbkHOfU4 +s+ki81Czt0WqgD/SJ8RyrqDCtEP8+E4ZSR01ysKqh+MUAsTaJlzZjehiQ24MwRf6LTfFgkrBgEE AdpHDwEBB0DkKHOW2kmqfAK461+acQ49gc2Z6VoXMChRqobGP0ubb4kBiAQYFgoBOgWCX+i03wWJ BZ+mAAkQ4JLrOlyhDbpHFAAAAAAAHgAgc2FsdEBub3RhdGlvbnMuc2VxdW9pYS1wZ3Aub3Jnfvo+ nHoxDwaLaJD8XZuXiaqBNZtIGXIypF1udBBRoc0CmwICHgG+oAQZFgoAbwWCX+i03wkQPp1xc3He VlxHFAAAAAAAHgAgc2FsdEBub3RhdGlvbnMuc2VxdW9pYS1wZ3Aub3JnaheiqE7Pfi3Atb3GGTw+ jFcBGOaobgzEJrhEuFpXREEWIQQttUkcnfDcj0MoY88+nXFzcd5WXAAAvrsBAIJ5sBg8Udocv25N stN/zWOiYpnjjvOjVMLH4fV3pWE1AP9T6hzHz7hRnAA8d01vqoxOlQ3O6cb/kFYAjqx3oMXSBhYh BMKfigwB81402BaqXOCS6zpcoQ26AADX7gD/b83VObe14xrNP8xcltRrBZF5OE1rQSPkMNy+eWpk eCwA/1hxiS8ZxL5/elNjXiWuHXEvUGnRoVj745Vl48sZPVYMuDgEX+i03xIKKwYBBAGXVQEFAQEH QIGex1WZbH6xhUBve5mblScGYU+Y8QJOomXH+rr5tMsMAwEICYjJBBgWCgB7BYJf6LTfBYkFn6YA CRDgkus6XKENukcUAAAAAAAeACBzYWx0QG5vdGF0aW9ucy5zZXF1b2lhLXBncC5vcmcEAx9vTD3b J0SXkhvcRcCr6uIDJwic3KFKxkH1m4QW0QKbDAIeARYhBMKfigwB81402BaqXOCS6zpcoQ26AAAX mwD8CWmukxwskU82RZLMk5fm1wCgMB5z8dA50KLw3rgsCykBAKg1w/Y7XpBS3SlXEegIg1K1e6dR fRxL7Z37WZXoH8AH
Date: Tue, 21 Feb 2023 18:46:17 -0500
Message-ID: <87bklmk2eu.fsf@fifthhorseman.net>
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg="pgp-sha256"; protocol="application/pgp-signature"
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdispatch/sXvQ4YpONZGmOs1RV4OWwVl4BhM>
Subject: [Secdispatch] Dispatch requested: Encrypted e-mail with cleartext copies
X-BeenThere: secdispatch@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Security Dispatch <secdispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdispatch/>
List-Post: <mailto:secdispatch@ietf.org>
List-Help: <mailto:secdispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 21 Feb 2023 23:46:29 -0000

Hi secdispatch folks--

I've just published
https://datatracker.ietf.org/doc/draft-dkg-mail-cleartext-copy/ with an
attempt to outline some concerns i've seen about e-mail messages that
are encrypted to some recipients but sent or stored in the clear to
others.

This causes some amount of user confusion and message handling failures
and can be yet another papercut that we inflict on users of end-to-end
e-mail encryption.

The draft (at -01 today) currently has some problem statement work, and
a handful of possible (but mutually-exclusive) solutions.

Since fixing the problem in the generic case for e-mail will invariably
involve multiple interoperating parties, i think this lands squarely in
the IETF's purview; but i'm not sure where.

- EMAILCORE seems charterbound to not accept new work.

- LAMPS is currently handling draft-ietf-lamps-e2e-mail-guidance (i'm
  also the lead author on that), which is implicated, but many of the
  possible solutions require defining a new e-mail header, which is
  outside of LAMPS remit as i understand it.

- ???

I'd welcome suggestions about where this should land in the IETF.  If we
can't resolve it clearly on list here, i'd also be happy to present the
problem space at secdispatch in Yokohama.

Though i know this mailing list isn't the right place, i'd also welcome
any review of the draft, either by private e-mail (please cite the full
draft name) or as issues on the gitlab issue tracker
https://gitlab.com/dkg/cleartext-copy

all the best,

        --dkg