On 01/01/14 06:03, Phillip Hallam-Baker wrote:
> On Mon, Dec 30, 2013 at 3:44 PM, Dave Crocker <d...@dcrocker.net> wrote:
> 
>> On 12/30/2013 12:38 PM, Paul Lambert wrote:
>>
>>> Another approach, however, is to start from scratch and to define an
>>>>> entirely new email system, which uses cryptographic addresses instead of
>>>>> human-readable identifiers. I guess that's the approach you are
>>>>> suggesting. Is this correct?
>>>>
>>> Yes - we should start from scratch (versus direct
>>> augmentation of S/MIME/PKI or PGP).
>>
>> Starting from scratch to build a new email system is not likely to
>> succeed, any more than the various, earlier efforts to do that succeeded,
>> back when the installed base was a few orders of magnitude smaller and
>> adoption of a new system relatively easier.
>>
>> And then there is the small matter of wondering how viable the human
>> factors of cryptographic email addresses will prove to be...
> 
> That can't be done in the current mail system but it is easy to do if there
> is a policy layer. Any mechanism that can be used to tell the sending mail
> client that S/MIME or PGP format mail is preferred can in principle be used
> to say that the mail should be sent over some JSON-B based REST scheme that
> provides a superset of SMTP and JABBER capabilities.

(I'm new to IETF lists so I beg some leeway with my comments whilst I
get a grip on the netiquette of posting)

It would seem to me the main stumbling block for mass adoption of PGP on
SMTP and OTR on IM has been the multiplicity of additional software
layers. The typical day to day users I encounter understandably find it
hard to understand why they should need multiple additional applications
to provide these services and they're just way too busy with the
kids/education/work balance to spend time learning both, let alone other
tools. The people I believe to be typical end users don't want to have
to mess around with different encryption systems (nor do I believe
should they need to) to the extent that even installing a 'no-click'
solution is too much.[1]

A policy layer, to my mind at least, could go a very long way in
reducing this all too human overhead.

I suspect XMPP/XEP may provide some ideas with regards to areas of
crossover between SMTP and IM. As I've seen it, a Group Chat is somewhat
analogous to a mail list, an IM sent in 'offline' mode is somewhat
analogous to SMTP and XMPP Federation is somewhat analogous to SMTP
relaying.

Certainly, I recall a time when a certain major webmail provider had
XMPP chats turn up in their webmail view[2].


Pete.

[1] <mini rant>It was a long fight to get users to look for the 'lock'
icon in their web browser. Now, I'm finding I have to get them to check
whether PFS is enabled, how about cipher size and type etc. as well as
trying to get what I'd call critical business infrastructure (ISPs,
banks, certain Govt depts) to fix their web servers so that people not
using outdated/broken ciphers can talk to them. The other day I went to
report some breakage to my ISP but couldn't because... their webserver
was using what I consider broken ciphers. I thus tried reporting this in
less than 140 characters using to me what was an obvious string [cipher
overlap] and the response was basically 'CANNOTREPRODUCE: I submitted
the forms successfully, try a different browser'. I get the feeling that
each type of encryption/security we make available for typical users
increases difficulty of uptake exponentially and would probably have a
go at proving this mathematically if it weren't 2014/01/01 08:15 where I
am at the moment</rant>

[2] If memory serves correctly, this was removed recently when they
federated their new Social platform with their Chat platform and
disabled external XMPP federation.

_______________________________________________
perpass mailing list
perpass@ietf.org
https://www.ietf.org/mailman/listinfo/perpass

Reply via email to