Part 2 of 2 -- see introduction to immediately prior note. --On Saturday, March 12, 2016 12:15 PM -0800 Doug Barton <dougb@xxxxxxxxxxxxx> wrote: > Given that the DNS RR in question is something the end user > has to explicitly request, the danger is not immediately > obvious to me. --On Saturday, March 12, 2016 4:09 PM -0500 Paul Wouters <paul@xxxxxxxxx> wrote: > 2 In an email server has paul@xxxxxxxxx and Paul@xxxxxxxxx, > AND these are different users, then instead of JUST mailing > the wrong user in plaintext, the wrong user is emailed > encrypted to that user. This is functionaly still better than > the current deployment, since only 1 wrong user can see the > (encrypted) email instead of everyone on the path plus the > user who can see the never-encrypted email. That depends entirely on the threat model you are concerned about. I (and others) have repeatedly asked that you be explicit in the I-D about applicable threat models (aka "the problem you are trying to solve") in more specificity then you have now and that you see if you can get consensus. If the goal is to try to get more email on the Internet encrypted as an "opportunistic" matter, then certainly your reasoning is correct, perhaps modulo one other issue. In our quest for more privacy, language like "everyone on the path" implies something similar to letters being posted in shop windows for public viewing before being delivered (or as a means of delivery). The reality is the most ISPs, and most operators of mail servers and relays, take at least some measures (often strong ones) to ensure that the collection of people who can get to a message in transit is very restricted and a lot short of "everyone". Yes, those measures, and the ISPs and mail providers themselves, can be subverted or forced to expose message traffic, but the parties who can do that aren't "everyone" either. If one is interested in attacks from them --either on you or as part of a pervasive surveillance effort-- then the threat model changes quite a bit. In particular, if a user has a sensitive information to transmit, information that will not be transmitted at all unless there is high assurance that it will go encrypted and encrypted in the key of the right party, then the choice between "one wrong person sees it" and "everyone sees it" is a not-starter. With the treat model implied by that sort "must go encrypted" model for sensitive material, the alternative to "correctly encrypted" is "don't send" and sending and delivering to the wrong party, encrypted with that party's key, is a disaster. In the hope of avoiding a rat hole, the above has nothing to do with the argument that everything should be encrypted to provide cover for the sensitive stuff or make life harder for those involved in pervasive surveillance. If one believes that everything should be encrypted, then it may be ok be less careful about how messages that are less sensitive are encrypted (keys found, etc.) than for ones containing really sensitive materials. best, john p.s. See last paragraph of part 1 for comments -- slightly less applicable here -- about the relationship of this discussion to the dane-openpgp draft.