RE: dissemination of public encryption certificates

jpierre@netscape.com (Julien Pierre) Thu, 14 August 2003 23:10 UTC

Received: from above.proper.com (above.proper.com [208.184.76.39]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA01167 for <smime-archive@lists.ietf.org>; Thu, 14 Aug 2003 19:10:22 -0400 (EDT)
Received: from above.proper.com (localhost [127.0.0.1]) by above.proper.com (8.12.9/8.12.8) with ESMTP id h7EMkvqt022849 for <ietf-smime-bks@above.proper.com>; Thu, 14 Aug 2003 15:46:57 -0700 (PDT) (envelope-from owner-ietf-smime@mail.imc.org)
Received: (from majordom@localhost) by above.proper.com (8.12.9/8.12.9/Submit) id h7EMkvHh022848 for ietf-smime-bks; Thu, 14 Aug 2003 15:46:57 -0700 (PDT)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-smime@mail.imc.org using -f
Received: from netscape.com (r2d2.aoltw.net [64.236.137.26]) by above.proper.com (8.12.9/8.12.8) with ESMTP id h7EMkuqt022841 for <ietf-smime@imc.org>; Thu, 14 Aug 2003 15:46:56 -0700 (PDT) (envelope-from jpierre@netscape.com)
Received: from judge.mcom.com (judge.nscp.aoltw.net [10.169.8.47]) by netscape.com (8.10.0/8.10.0) with ESMTP id h7EMkk312991 for <ietf-smime@imc.org>; Thu, 14 Aug 2003 15:46:46 -0700 (PDT)
Received: from kitty.nscp.aoltw.net ([10.169.25.23]) by judge.mcom.com (Netscape Messaging Server 4.15) with ESMTP id HJMSLK00.O21; Thu, 14 Aug 2003 15:46:32 -0700
Date: Thu, 14 Aug 2003 15:47:41 -0700
From: jpierre@netscape.com
Subject: RE: dissemination of public encryption certificates
To: Hallam-Baker Phillip <pbaker@verisign.com>
cc: 'Steve Hole' <steve.hole@messagingdirect.com>, ietf-smime@imc.org
In-Reply-To: <2A1D4C86842EE14CA9BC80474919782E01113021@mou1wnexm02.verisign.com>
Message-ID: <3F3C118D.3090904@netscape.com>
References: <2A1D4C86842EE14CA9BC80474919782E01113021@mou1wnexm02.verisign.com>
X-Mailer: AOL Communicator (20030811Trnk.1 Win)
Organization: Netscape
MIME-Version: 1.0
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg="sha1"; boundary="------------ms010704000904080802040505"
Sender: owner-ietf-smime@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-smime/mail-archive/>
List-ID: <ietf-smime.imc.org>
List-Unsubscribe: <mailto:ietf-smime-request@imc.org?body=unsubscribe>

Philip,

Hallam-Baker, Phillip wrote on 08/14/2003, 10:30:
 >
 > 1) Signature
 >         Signature is only possible by changingthe message format.
 > Unfortunately there are still a lot of people out there with broken, non
 > S/MIME capable email clients. Probably more of those than have broken
 > email
 > servers. Of course at this point it is difficult to do anything about
 > this.

I don't think there is any way around that problem, the client simply 
must have at least basic MIME support to support S/MIME signed messages.
Unfortunately, there are many e-mail clients that cannot be supported, 
eg. the very basic e-mail "clients" included in some devices such as 
older cell phones.
The best that we can do is ensure that new client software going forward 
has the proper MIME & S/MIME support.

 > 2) Encryption
 >         Encryption is a big problem for end users, it is simply not
 > transparent. We need to link PKI to the DNS in some way, the SRV service
 > looks the best choice. LDAP is not going to be the answer here, even
 > if you
 > find the right LDAP server the schema issues still have to be solved.
 > Sure
 > LDAP could address the problem - but only to the extent a Turing machine
 > could and only with changes to make LDAP aware of PKI concepts like trust
 > paths.

I think you are overly pessimistic here about the ability of LDAP to 
solve the problem. I agree with you however that a proper schema needs 
to be in place, and that is certainly a problem that hasn't been solved.

 > 3) The end to end obsession
 >         One of the major reasons the IETF has failled in the security
 > space
 > is that the end to end principle alone does not address security issues.
 > Perimeter security is a major concern for enterprises.
 >
 >         As I have been digging into this issue I have discovered that
 > 'end-to-end security' is actually a shiboleth. Go look at the RFCs with
 > security architecture design discussions and you will not find it. Clark
 > never applied it to security either in the naive form that has become the
 > received version.
 >
 >         What we need to do is to build specs that address multi-layer
 > security concerns. It should not be necessary for everyone to have a
 > certificate just to be able to do security. It should be possible to sign
 > outgoing messages at either the end user level OR the domain name
 > level - I
 > only care that an email came from Merril Lynch, not that it came from
 > Freddy
 > Bloggs in accounts.

S/MIME signing can be implemented transparently in the way you want as 
well. Merryl Lynch could have a certificate with regular expressions in 
it, matching all of its employees. The internal Merryl SMTP e-mail 
server, perhaps setup with SSL and some basic authentication of 
employees, could automatically sign each outgoing e-mail message with 
that certificate. This really is not end-to-end at all but I believe it 
can work today. You just have to be a little creative.

 > > The solution is (and always has been) to do a lookup.  The
 > > problem is that
 > > there is no directory to look up from.   Global X.500/LDAP
 > > directories are
 > > *never* going to happen.
 >
 > Amen brother, Amen.

I find it really ironic that I can lookup phone numbers for anyone 
listed in the united states, knowing such sensitive information as their 
name and physical address, through a free service like 
www.switchboard.com, but I can't look-up their e-mail certificate 
knowing their e-mail address ?
I'm sure there is lots of politics involved, but surely the logistics of 
running this service shouldn't be so much of a problem ?

-- 
I am the dog in dogfood