Treat model (was: Re: dane-openpgp 2nd LC resolution)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Part 2 of 2 -- see introduction to immediately prior note.

--On Saturday, March 12, 2016 12:15 PM -0800 Doug Barton
<dougb@xxxxxxxxxxxxx> wrote:

> Given that the DNS RR in question is something the end user
> has to explicitly request, the danger is not immediately
> obvious to me.

--On Saturday, March 12, 2016 4:09 PM -0500 Paul Wouters
<paul@xxxxxxxxx> wrote:

> 2 In an email server has paul@xxxxxxxxx and Paul@xxxxxxxxx,
> AND these are different users, then instead of JUST mailing
> the wrong user in plaintext, the wrong user is emailed
> encrypted to that user. This is functionaly still better than
> the current deployment, since only 1 wrong user can see the
> (encrypted) email instead of everyone on the path plus the
> user who can see the never-encrypted email.

That depends entirely on the threat model you are concerned
about.   I (and others) have repeatedly asked that you be
explicit in the I-D about applicable threat models (aka "the
problem you are trying to solve") in more specificity then you
have now and that you see if you can get consensus.   If the
goal is to try to get more email on the Internet encrypted as an
"opportunistic" matter, then certainly your reasoning is
correct, perhaps modulo one other issue.

In our quest for more privacy, language like "everyone on the
path" implies something similar to letters being posted in shop
windows for public viewing before being delivered (or as a means
of delivery).  The reality is the most ISPs, and most operators
of mail servers and relays, take at least some measures (often
strong ones) to ensure that the collection of people who can get
to a message in transit is very restricted and a lot short of
"everyone".  Yes, those measures, and the ISPs and mail
providers themselves, can be subverted or forced to expose
message traffic, but the parties who can do that aren't
"everyone" either.  If one is interested in attacks from them
--either on you or as part of a pervasive surveillance effort--
then the threat model changes quite a bit.

In particular, if a user has a sensitive information to
transmit, information that will not be transmitted at all unless
there is high assurance that it will go encrypted and encrypted
in the key of the right party, then the choice between "one
wrong person sees it" and "everyone sees it" is a not-starter.
With the treat model implied by that sort "must go encrypted"
model for sensitive material, the alternative to "correctly
encrypted" is "don't send" and sending and delivering to the
wrong party, encrypted with that party's key, is a disaster.

In the hope of avoiding a rat hole, the above has nothing to do
with the argument that everything should be encrypted to provide
cover for the sensitive stuff or make life harder for those
involved in pervasive surveillance.  If one believes that
everything should be encrypted, then it may be ok be less
careful about how messages that are less sensitive are encrypted
(keys found, etc.) than for ones containing really sensitive
materials.

best,
    john

p.s. See last paragraph of part 1 for comments -- slightly less
applicable here -- about the relationship of this discussion to
the dane-openpgp draft.





[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Fedora Users]