ietf
[Top] [All Lists]

Re: Last Call: <draft-ietf-dane-openpgpkey-05.txt> (Using DANE to Associate OpenPGP public keys with email addresses) to Proposed Standard

2015-09-11 14:35:23


--On Friday, September 11, 2015 17:55 +0000 Viktor Dukhovni
<ietf-dane(_at_)dukhovni(_dot_)org> wrote:

On Fri, Sep 11, 2015 at 11:53:59AM -0400, John C Klensin wrote:

(1) A delivery server at smtp.example.com, for whatever
reason, associates joesmith(_at_)smtp(_dot_)example(_dot_)com and
JoeSmith(_at_)smtp(_dot_)example(_dot_)com with different mailboxes.  That
policy might be thoroughly hidden from users, e.g., by the
latter address never being advertised but reached via an MX
record for example.net, i.e., the address
JoeSmith(_at_)example(_dot_)net [1]. 

End-to-end encryption aside, messages are often misaddressed by
users even for addresses a lot less similar than the proposed
example.  Sometimes with extreme consequences.  I recall one
example where a confidential message intended for a lawyer was
sent his brother the journalist...

I don't think that this draft materially changes the landscape.
Messages in transit should not be modified by relays.  Sites
that implement publication of keys should avoid overly similar
names, and would be wise to avoid names that differ only in
their case.

In short, I think this objection is not a particularly strong
one. My concerns with the draft are elsewhere.

Whether I agree with your conclusion or not, I just want to be
clear that the objection is to a combination of things, not a
single decision.  I believe that either things should not work
as they appear to be specified to need to work (the case you
conclude is "not particularly strong" above) _or_ that the
Security Considerations section be expanded to clearly identify
the risks and consequences (as you more or less do above).   One
or the other.  The objection is to "neither".

I believe that there are elements of this proposal that are "bad
protocol" (the use of hashes is a candidate for one of them) and
far more that are (just) "bad document".   The "bad document"
situation includes, but is not limited to, a Security
Considerations section that does not adequately analyze and
discuss important risk cases and normative references to expired
documents that are disguised as non-normative.   I don't feel a
need to make that distinction any more clearly than I have
already: I believe the Last Call comments that have been made so
far (including the things to which you do object) provide more
than enough justification to return this draft to the WG with
instructions to:

        * Sort out the difference between "inadequate document"
        and "problems with the protocol" and generate a document
        that solves the former problem
        
        * Sort out the protocol issues that directly interact
        with email system and DNS design and operations with the
        relevant communities of experts.

        * And, while it is separate from the above, describe the
        experiment to be performed, how it will be evaluated,
        and any issues that might arise in performing the
        experiment in a "live" Internet environment (including
        any measures needed to back away from it if it is not
        successful).

One might note that with both PGP and S/MIME, the public key
binding is via a "certificate" that also includes the user's
address.

One of us misunderstands DNSSEC.  It doesn't obtain anything.
It merely provides validation of one thing and one thing only,
which is an integrity check that a response to a DNS query
reflects what is actually in the DNS.  It is not, as the draft
can be read to assume or imply, a magical form of pixie dust
that, e.g., attests to the binding between a key found in the
DNS and a particular external user identity.

The DNS is a mechanism for publishing data.  That data can
include name to key bindings as appropriate.  The security of
such bindings is not unreasonably weak by comparison with
other plausible large scale approaches.

Probably someone else may be able to explain this better than I
can.  I believe we have a large-scale, worked, attack example of
people using strings that might appear similar until some (human
or machine) algorithm to lead users to misleading data and/or
into traps.  We often call the set of cases "phishing" and most
instances of it are completely immune to any protections offered
by DNSSEC because the data have been correctly paid for and
entered into the DNS -- there is, e.g., no spoofing of
responses.  If this particular RR TYPE, set of label formation
rules, and associated procedures provides adequate protection
against faked, similar-looking, mailbox names, I haven't been
able to find that out from reading the text (again, that may be
just a need for more discussion or strengthened Security
Considerations).

I was initially optimistic about Keith Moore's addrquery draft,
and still hold some hope for that, be he seems to think that
security for the masses needs to be as strong as covert agent
security, and we've had rather a long debate on the UTA list
that stands unresolved. In the mean time he may have run out
of cycles to push another draft revision.  So we'll see how
that evolves.

Whether in the form of "addrquery" or some other form of "ask
the delivery server for a key, or pointer to a key,
corresponding to a particular address"l, I see much more
potential there than getting into a situation in which the
information in the DNS (and how it is asked) have to parallel
what only the delivery server knows.  The observation that "do
you have a key for <string>", when sent to a delivery MTA,
discloses much less information than probing the DNS or trying
to canonicalize or guess, is an added attraction whether the
answer is "no", "here is the key", or "here is an FQDN from
which an appropriate query will get the key", adds to the
attraction.  In addition, there are well-understood and fairly
widely deployed mechanisms for authenticating an interaction
with an MTA and most MTAs that are designed for high performance
today almost have configurable rate-limiting mechanisms.
However, you may not want to pay any attention to that because
I'm a known fan of VRFY and some of the uses to which it could
be put... and we don't have a real/complete proposal along any
of the lines above that can be evaluated and scrutinized as
closely as the Openpgpkey one has been.

    john


<Prev in Thread] Current Thread [Next in Thread>