Re: PKI and S/MIME

Simon Josefsson <jas@extundo.com> Wed, 13 August 2003 23:30 UTC

Received: from above.proper.com (above.proper.com [208.184.76.39]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA11034 for <smime-archive@lists.ietf.org>; Wed, 13 Aug 2003 19:30:41 -0400 (EDT)
Received: from above.proper.com (localhost [127.0.0.1]) by above.proper.com (8.12.9/8.12.8) with ESMTP id h7DN65qt019231 for <ietf-smime-bks@above.proper.com>; Wed, 13 Aug 2003 16:06:05 -0700 (PDT) (envelope-from owner-ietf-smime@mail.imc.org)
Received: (from majordom@localhost) by above.proper.com (8.12.9/8.12.9/Submit) id h7DN65eH019230 for ietf-smime-bks; Wed, 13 Aug 2003 16:06:05 -0700 (PDT)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-smime@mail.imc.org using -f
Received: from yxa.extundo.com (178.230.13.217.in-addr.dgcsystems.net [217.13.230.178]) by above.proper.com (8.12.9/8.12.8) with ESMTP id h7DN63qt019225 for <ietf-smime@imc.org>; Wed, 13 Aug 2003 16:06:03 -0700 (PDT) (envelope-from jas@extundo.com)
Received: from latte.josefsson.org (yxa.extundo.com [217.13.230.178]) (authenticated bits=0) by yxa.extundo.com (8.12.9/8.12.9) with ESMTP id h7DN5rdk029769 (version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=OK); Thu, 14 Aug 2003 01:05:53 +0200
To: Anders Rundgren <anders.rundgren@telia.com>
Cc: Blake Ramsdell <blake@brutesquadlabs.com>, ietf-smime@imc.org, "'Sean P. Turner'" <turners@ieca.com>
Subject: Re: PKI and S/MIME
References: <!~!UENERkVCMDkAAQACAAAAAAAAAAAAAAAAABgAAAAAAAAARMPfbnbp50SwK3EZjypY2MKAAAAQAAAAgKsEuzBx/UKJjkGlJhOARAEAAAAA@brutesquadlabs.com> <iluisp2nhbz.fsf@latte.josefsson.org> <006901c361be$9f4ba080$0500a8c0@arport>
From: Simon Josefsson <jas@extundo.com>
X-Payment: hashcash 1.2 0:030813:anders.rundgren@telia.com:d22d10f4fbc624cb
X-Hashcash: 0:030813:anders.rundgren@telia.com:d22d10f4fbc624cb
X-Payment: hashcash 1.2 0:030813:blake@brutesquadlabs.com:5292953ee89c9b12
X-Hashcash: 0:030813:blake@brutesquadlabs.com:5292953ee89c9b12
X-Payment: hashcash 1.2 0:030813:ietf-smime@imc.org:c9f896028ba5f801
X-Hashcash: 0:030813:ietf-smime@imc.org:c9f896028ba5f801
X-Payment: hashcash 1.2 0:030813:turners@ieca.com:07e5266f3de80115
X-Hashcash: 0:030813:turners@ieca.com:07e5266f3de80115
Date: Thu, 14 Aug 2003 01:05:53 +0200
Message-ID: <iluk79hkvji.fsf@latte.josefsson.org>
User-Agent: Gnus/5.1003 (Gnus v5.10.3) Emacs/21.3.50 (gnu/linux)
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Sender: owner-ietf-smime@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-smime/mail-archive/>
List-ID: <ietf-smime.imc.org>
List-Unsubscribe: <mailto:ietf-smime-request@imc.org?body=unsubscribe>

Anders, you are right, it doesn't solve all problems.  However, in
some situations all you have is the email address of the recipient,
and in those situations locating the certificate through DNS is
simpler than many alternatives.  The certificate can be located
directly, like RFC 2538, or indirectly using SRV pointers to LDAP or
XKMS servers.  In either case, your ISP could add those DNS records as
yet another step in setting up an email account.

One potential advantage of storing certificates directly in DNS a'la
RFC 2538 would be that if we ever get DNSSEC, the certificate you
receive would be integrity protected.  (Whereas a SRV would only
provide you with a integrity protected name of the LDAP host.)

Regards,
Simon

"Anders Rundgren" <anders.rundgren@telia.com> writes:

> Simon,
> I respect your work with DNS for location but is this really
> universal?  How about my anders.rundgren@telia.com cert
> issued by VeriSign?  Would it be appropriate to require ISPs
> like Telia to maintain a directory pointing to various TTP CAs?
>
> Or should ever domain-owner become a CA?
>
> Anders
>
> ----- Original Message ----- 
> From: "Simon Josefsson" <jas@extundo.com>
> To: "Blake Ramsdell" <blake@brutesquadlabs.com>
> Cc: <ietf-smime@imc.org>; "'Sean P. Turner'" <turners@ieca.com>
> Sent: Wednesday, August 13, 2003 09:32
> Subject: Re: PKI and S/MIME
>
>
>
> "Blake Ramsdell" <blake@brutesquadlabs.com> writes:
>
>> There have been a number of messages recently about the use of PKI with
>> S/MIME, and the concerns about that.  I like to think that we're all
>> pretty much in agreement that we've established a consistent,
>> interoperable practice for the actual syntax and contents of S/MIME
>> messages, as well as a reasonable cut of a certificate syntax profile
>> for end-entity certificates.
>>
>> Should there be a profile for certificate usage (certificate repository,
>> distribution and revocation checking) that is specific for our problem
>> domain?  That is, select relevant other work and profile it for use in
>> the S/MIME interpersonal messaging domain?  I would imagine that this
>> would be a new draft, start with a summary of the requirements, and
>> progress to profiles of relevant standards.
>>
>> It's also not clear if this is something to discuss in this working
>> group, or somewhere else.
>>
>> Comments?
>
> Since in practice, addressing this problem would help in getting
> "opportunistic S/MIME" to work, I believe it would be useful to
> address it.  ("Opportunistic S/MIME" means to be able to encrypt
> messages to someone you don't have a prior trust relationship with,
> simply to provide encryption of data.  There is a man in the middle
> attack, of course, but in practice the result often isn't worse than
> not using S/MIME.)
>
> A strawman at a requirement:
>
> * Be able to locate a certificate for a Internet user given only her
>   email address.
>
> I should mention that this has been discussed several times before, in
> various fora, for similar applications (e.g., OpenPGP, IPSEC, SSH), so
> there is prior work to look at how to design this.  To do even more
> self-promoting, I'd again like to mention the following draft:
>
> http://josefsson.org/draft-josefsson-pkix-dns.txt
>
> which do discuss it for S/MIME context as well.  I don't have an
> opinion on if this WG is the proper place for it.
>
> Regards,
> Simon