[148494] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] The next generation secure email solution

daemon@ATHENA.MIT.EDU (Guido Witmond)
Tue Dec 17 15:46:51 2013

X-Original-To: cryptography@metzdowd.com
Date: Tue, 17 Dec 2013 21:42:51 +0100
From: Guido Witmond <guido@witmond.nl>
To: cryptography@metzdowd.com
In-Reply-To: <alpine.LFD.2.02.1312171457330.3991@laptop.kerry-linux.ie>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============3364037071620515707==
Content-Type: multipart/signed; micalg=pgp-sha1;
 protocol="application/pgp-signature";
 boundary="----enig2RDWKFWJOMIWTSONXNODF"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
------enig2RDWKFWJOMIWTSONXNODF
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

On 12/17/13 15:03, Ralf Senderek wrote:
> Guido Witmond wrote:
>=20
>> You can use an untrusted CA to bootstrap. I show how it can be done at=
:
>>
>> http://eccentric-authentication.org/Brucon-Eccentric.pdf
>=20
> This is an interesting idea, because it provides certificates on demand=

> for ordinary users, if they decide to sign up to a certain site. The
> certs are then being used for other purposes, so the site does act as a=

> bootstap for using crypto. The one thing that this proposal relies on i=
s
> the availability of a common piece of software (user agent) that stores=

> the private key for the user. It's this part of the picture where thing=
s
> get tricky.

Hi Ralf,

There is more to it than just a user agent.

Although, that user agent (and the web-site doing certificate signing)
is sufficient to create client certificates at that site if you are only
interacting with that site, for example a shopping site.

For email replacement you need to validate that there is no man in the
middle. The user agent cannot do that alone. It needs a global list of
certificates signed by each site. I call that the 'Global Registry of
Dishonesty' as it will show any attempts at a MitM.

When that is in place, user agents can verify there is no MitM after the
first roundtrip of messages. And when one endpoint detects a MitM, it
reports it at that registry for the world to know. After that the
certificates are validated. From this point on, the the end points (end
users) can bootstrap other communication channels, such as ZRTP, etc.

Regards, Guido.


------enig2RDWKFWJOMIWTSONXNODF
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Icedove - http://www.enigmail.net/

iQIcBAEBAgAGBQJSsLdMAAoJEHPd8GglaNRmhH0P/A3Fv4pKUVGbSY78hc3UbHOs
rN8RUWzUgITyXhb+qtEmkf7up7tqJMiUHxHkoo3xGmygh5v1g9H503cMqXW9T+dH
SQEAQug/Fzg2TBnevpD9/+utVGkagWWK6Y6Cb9P8wUHb3QRd06BJKbjI6iyBLSrf
U2JrJrbFbgjgQnpumJZYj+3toDV+8SQkMyN4MrzWtbWLWZBoSjPo4aSXnVfMPNr0
ON1w1F2f88VJY20eCBuigt84+hS0IIHaL98Sm5oyZdAozwIgIeZZnv6L9ky5+lPp
1zPEaIo+7IvhuEd1Yw7eM/m05De9m/EMItGr8WUH3vIbQ78dt3JqafxVmSqJXJhs
KCTa6DnDym5awu4Miz07/tBGalOtiTheAePkEW4ZGuuPs8FjA3cc55WFv7twh5qX
M8O3C2ewvgr5REBmwQIxj3mcvPWYZLRerAfv8U2szsVG0g9uHgrzq5vw4KEKWo8N
C/au8x+PmtUtZftlIaKTi2rRADSlFBoINAHCaC8lhVjMLUChHUzhfc2VTq1np5nE
hOste5zHic9BkzwlL9s0sE5fCJCHeGAbVh5C82EkmI0cS255S6OnoDl7czaLBrrX
dW/b/kJP7AtnVXcBeX1YOdPClylfJnkZmljhhHiwCSfvl/ka5P/sY80nMDXD13Iu
bta9oQaFzFDzHSoDUbPC
=rUNl
-----END PGP SIGNATURE-----

------enig2RDWKFWJOMIWTSONXNODF--

--===============3364037071620515707==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography
--===============3364037071620515707==--

home help back first fref pref prev next nref lref last post