Re: On email and web security

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Yes, this is what was meant.  Any of the encryption methods for email -- PGP, PEM, SMIME -- generate a symmetric key and use it once to encrypt the text of the message and then the symmetric key is encrypted with the receiver's public key.  To send a message to multiple recipients, the symmetric key is encrypted separately with each of the recipients' public keys and all of these are included in the message.

To send to a mailing list, the sender must either have a copy of the list or the system managing the list must decrypt and re-encrypt the message.  Neither of these is a good fit with the current email architecture.  The former is secure but unwieldy; the latter is reasonably efficient but breaks the desired end-to-end security.

Steve

Sent from my iPhone

> On Jan 2, 2016, at 2:25 AM, <l.wood@xxxxxxxxxxxx> <l.wood@xxxxxxxxxxxx> wrote:
> 
> 
> "If Alice wants to encrypt the message for a group of people, she has to encrypt the message for every member of the group."
> 
> really? not encrypt the message to a random key, then encrypt that key separately to each member? much less processing...
> ________________________________________
> From: ietf <ietf-bounces@xxxxxxxx> on behalf of Phillip Hallam-Baker <phill@xxxxxxxxxxxxxxx>
> Sent: Saturday, 2 January 2016 8:32:53 AM
> To: Doug Royer
> Cc: IETF Discussion Mailing List
> Subject: Re: On email and web security
> 
>> On Fri, Jan 1, 2016 at 3:37 PM, Doug Royer <douglasroyer@xxxxxxxxx> wrote:
>>> On 12/30/2015 01:17 PM, Fred Baker (fred) wrote:
>>> ...
>>> 
>>> First, I note that this email is going out unencrypted. Why?
>> 
>> Confused - for private lists -I see your point. For public lists, what
>> would you want still private after the email is publicly listed on the
>> IETF email-list web servers?
> 
> The IETF list archives are a public document. But that is not the
> general case for mailing lists. And right now we don't have a good
> protocol for mailing list security, nor does SMTP handle mailing lists
> very well at all.
> 
> This is one of the areas where the gap between where we are today and
> where we want to be is simply too great to make working on top of the
> legacy infrastructure of SMTP, SMIME & PGP viable. All three need
> major modification to work. All three will need new code.
> 
> Right now I am building tools that apply the Mesh to the IETF
> protocols as they are. One necessary component in that infrastructure
> is a public email profile that contains information such as :
> 
> SignedData {
>    "ProfileMailPublic" : {
>        "address" : "fred@xxxxxxxxx",
>        "name": "Fred Baker",
>        "udf": "MB2GK-6DUF5-YGYYL-JNY5E-RWSHZ-SV75J"
>        "connection": [{
>             "protocol": "SMTP",
>             "encrypt": "OpenPGP",
>             "prefer": "encrypt",
>             "require": "sign",
>             "key": { ... key data here ... }
>             }]
>        }
>    }
> 
> What this is saying is that Fred prefers to have all his mail sent via
> SMTP encrypted using OpenPGP format using the specified key. Without
> that piece of information, it is not possible to have a tool that
> automatically encrypts mail sent to Fred. Right now I read my mail on
> 3 desktops, 2 laptops, 1 phone, 2 iPads and a watch. If people send me
> encrypted mail I can only read it on the one laptop with the private
> key.
> 
> Don't worry about the privacy implications at this stage. They are
> important but the way to address them is through a kimono protocol.
> This is Fred's public profile that is world readable. He might also
> have an encrypted profile that is only visible to people once they
> connect. It is also possible to obfusticate this profile by encrypting
> it under Fred's email address.
> 
> One of the reasons I realized something like the Mesh was needed is
> that before mail can be sent encrypted by default, there has to be a
> way to provision the decryption key out to every device the user might
> want to read their mail on. And that process has to be completely
> automated and completely under the user's control. I am really fed up
> with all these cloud services where I invest my time and effort
> managing data that I don't control and gets deleted at the whim of the
> developer. Yes, I am talking to you Apple who resets all my settings
> with every iOS or OSX upgrade. No I do not want to go through the new
> features tour, it might be interesting to you but it is junk mail to
> me.
> 
> 
> We can also use the same profile mechanism to advertise support for a
> new messaging protocol. So people with legacy SMTP clients can still
> send mail to Fred but people with clients that support the new
> protocol can make use of the new security capabilities.
> 
> OK, so what are those capabilities? Well, 20 years ago Matt Blaze and
> some other folk invented a concept called Proxy Re-Encryption and now
> that we are moving to ECC based encryption, it is a technique that
> solves a lot of our current security problems.
> 
> Traditional public key exchange is a 2 party protocol, Alice encrypts
> the message for Bob. If Alice wants to encrypt the message for a group
> of people, she has to encrypt the message for every member of the
> group.
> 
> Proxy re-encryption or Recryption for short is a technique that allows
> Alice to encrypt a message to send to a group and then an untrusted
> third party proxy can then recrypt the messages so that each member of
> the group can read them but the proxy cannot decrypt the message
> itself. This means that the proxy can be a service in the cloud
> without introducing a new point of vulnerability which would be the
> case if we did this sort of thing with traditional RSA encryption.
> 
> One area where this type of capability is valuable is in the mailing
> list problem. Another is in an IMAP style mail server where the user
> has 8 devices and wants each to have a different decryption key so
> that they can re-establish their security is a device is lost,
> compromised, whatever. Another place where it is very useful is for
> sharing documents in an enterprise. The last is the subject of a
> patent claim but fortunately the claim expires in a couple of years.
> 
> 
> Recryption is powerful. We could cobble together extensions to SMTP,
> IMAP, POP3, XMPP, etc. to make it work, but it is actually rather
> simpler to design a new general purpose messaging service that allows
> users to upload 'blobs' of content and make them visible to groups of
> users through control of their recryption groups (which can be thought
> of as a security label).
> 
> At root, there isn't any difference between Mail, Mailing Lists, News,
> Blogs, Messaging, Chat, VOIP, Dropbox. In every case we have a
> protocol in which a user uploads 'chunks' of data that are made
> visible to a set of recipients. The only difference is in the way that
> the notification takes place and the path the chunks follow.
> 
> It is a powerful technique but as I say, encumbered for a couple of
> years. So if we build out the user-centric key infrastructure in those
> two years, we will be ready to start deploying the schemes when the
> patents expire.
> 





[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Fedora Users]