Re: [Emailcore] Re: If some government makes STARTTLS illegal

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




--On Friday, November 1, 2024 13:36 -0700 Rob Sayre
<sayrer@xxxxxxxxx> wrote:

> Hi,
> 
> I think the reason to encrypt everything is more innocuous.
> 
> You get message integrity that way. This just helps prevent buggy
> programs, as they will break right away.

Rob,

I'm sure our colleagues who spend their professional lives on
security issues can explain this better than I can and will correct
me if I get this wrong.  With the understanding that I may not have
the terminology quite right either, I think the answer is "no".   If
you trust the integrity of all of the systems and people involved in
the message processing chain from end-to-end, sure, but then it it
not clear why need additional integrity protection.  However, to come
back to the usual example, if there are one or more of them that
cannot be trusted, and the message ends up in cleartext on a system
over which they have control, then tampering with it (or even
replacing it with a different message) and encrypting the result is
fairly easy and, if, if one is relying on encryption for the purpose,
there is any way the recipient can tell that either disclosure or
tampering/ rewriting occurred, I can't imagine what it would be...
unless the person or system doing the tampering is stupid, careless,
or wants it to be discovered.  

I also don't know what buggy programs might have to do with it.  With
most encryption methods of which I'm aware, a message consisting of
complete trash is no harder to encrypt than a good quality, intended,
one.

That might be somewhat different if the encryption mechanism were
very specific to message structure and, e.g., handled encryption for
different header fields differently, performing message conformance
checks against various standards along thee way.  But, as far as I
know, while some of our authentication integrity methods partially do
that, our encryption ones do not.  

What I've been told for nearly 50 years or so is that, if you want
message integrity protection, you want digital signatures over the
portion of the message you want to protect.  And you still need to be
sure that works from end to end, rather than relaying through some
intermediate where tampering might occur.

> SMTP is old and not always encrypted. But it can be a suggested
> approach, and not because all messages are super secret.

IMO, the strongest argument for "encrypt everything" is the one Barry
mentioned: relative to only encrypting selected messages,  it
considerably increases the burden on anyone would wants to inspect
messages by requiring them to try to decrypt all them.   What is
means in a world in which all of the messages between a pair of
source and destination systems are readily available in cleartext at
some intermediate point is an interesting question.

> I think we want "Hanlon's Razor" here:
> 
> https://en.wikipedia.org/wiki/Hanlon%27s_razor
> 
> "Never attribute to malice that which is adequately explained by
> stupidity."

And I don't see what that has to do with this particular problem.
The thread started from a comment about government prohibited
STAETTLS or government-prohibit encryption more generally.   Unless
you want to suggest that any government that would try that is
inherently stupid, those are deliberate actions.

> If the encryption can be defeated by a sophisticated attacker,
> that's not the worst result. It still prevents people from writing
> buggy programs unintentionally.

I don't see it; see above.

best,
   john




[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux