Re: Thunderbird S/MIME guys - Digitally-Signed Mail in e-Commerce - FC05 survey

2005-04-07 Thread Ram A M
Strongly agree. This the model that Apple uses in their systems and
this is the only way to serve multiple user types well.

Personally I like a brief interview type approach at initial install.

___
Mozilla-security mailing list
Mozilla-security@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-security


Re: Thunderbird S/MIME guys - Digitally-Signed Mail in e-Commerce - FC05 survey

2005-04-07 Thread Nelson B
Ian G wrote:
Right.  And now we reach a big philosophical
issue for Mozilla, which has been mooted upon
in these very pages of late.
Who is Mozilla for?  Who is Tbird courting?
If it's the average user a.k.a. Joe Sixpack,
then we have one way of looking at how to
secure his traffic.
If it's Terry Techie, then we might expect
him to learn the steps, the model, the customs.
But not Joe & Josephine Mixed Dozen.
Now, I'm assuming the 'average user', because
that's what I was told, and it's unfair to anyone
to flip back and forth in a conversation.  But,
I do recognise that ... this has created a very
big tension, especially in places like S/MIME,
where the setup assumes Terry Techie, and Terry
is quite happy with the product as it is.
I agree.  I think the answer is: both.
Most of our users are Joe, but most of our developers are Terry.
So we get this odd mix.
My proposed solution:  modal behavior.
Out of the box, it's geared to Joe.
But Terry finds the button in the prefs to enable "advanced" mode.
--
Nelson B
___
Mozilla-security mailing list
Mozilla-security@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-security


Re: Thunderbird S/MIME guys - Digitally-Signed Mail in e-Commerce - FC05 survey

2005-03-29 Thread Ian G
Julien Pierre wrote:
Thus, for individual users' self-signed certs to work, everybody would 
need to blindly trust everybody else's individual cert. I don't see how 
you expect that to actually be workable.

I'd just consider it a step better than unprotected
email.  It's what you get for free, you get what you
paid for.  I know that my kid sister ain't gonna be
listening any more and the next door neighbours won't
be scanning for gossip either.  Later on when it
becomes important, I guess I'll need to upgrade the
cert.
(Marketing wise, CAs love this, or should.  It gives
them clear clues as to where to sell.)

In email, you and I know each other and we
don't need any CA to tell us that.

That's what you may think ! Emails travel through a myriad of servers, 
routers, in a non-realtime fashion, and are very susceptible to attacks 
such as interception. An MITM attack that may be relatively difficult to 
achieve with real-time SSL is much easier to do with e-mail.

Ever seen any?  Ever heard of any?  I know of
one MITM attack on an unencrypted person where
one would think that crypto might have made a
difference.  That's one victim in about 15
years of the net...  I'm sure there are more,
but there aren't enough to make a meaningful
statistical model.  Which means it isn't much
of a threat.
I know they are possible, I know they aren't hard,
but they don't happen.  They are not really a
threat to users.  Unless they happen.

Later on, as an option,
we may very well want to go to the CA and
ask for "a third opinion" just like one might
go to the doctor and ask for a "second opinion"
if one is diagnosed as due to kick the bucket
tomorrow.  But this should be strictly optional,
the email application should be built on self-
signed certs as a primary principle.

Using your analogy, I conclude that when you go see a doctor the first 
time, you don't want to know whether he is licensed.

As it happens, the last doctor I went to was run
out of his country for some drunken surgery accident.
He's quite a character, instead of giving a prescription
he took a handful of pills out of this huge jar and
gave me those.  Worked fine, he's an honest doctor,
and his reputation around the community was quite
reasonable.
But, yes, analogies can suck quite quickly :)
Anyway, it's a terrible analogy. With e-mail, there is nothing that 
proves your prior relationship, as there is with a physical meeting with 
your doctor.

E-mail accounts get hacked into all the time. Unless you verify identity 
externally, an e-mail address by itself is not sufficient to establish 
trust. You could read your self-signed certs' fingerprints to each other 
over the phone before trusting them, and that would be secure . But a CA 
is a a much more practical, generic, and scalable, way to go.

I think you are mistaking my intention.  I do not
intend this suggestion to indicate to users that
they are really benefiting in *identity* terms,
only in encryption terms...  Frankly, the business
of reading finger prints is like the business of
SSH users checking keys (even though some people
say "check the server key" I don't even know how
to do that ... and I use SSH all the time and have
for many many years).  Same in the PGP world, most
people just encrypt, encrypt, encrypt.
I wouldn't object to self-signed certs if the UI to trust a self-signed 
cert you just received (either via SSL or S/MIME) required you to type 
in the fingerprints in the cert you expected, without the ability to see 
anything in the actual cert but its DNSname or email address. Trust 
would be added only if there was a match. I suspect most people would 
not be able to confirm the fingerprints, and thus would not blindly 
trust any self-signed certs they received . They would then figure out 
it's better to use CAs after all.

Yes, show the finger prints, and offer a choice
to select a match or a petname.  And show a red
pen or key instead of a blue one or something when
an email comes in.  No big deal.

Right, so send an email with the key.  Just don't
force it to be a signed email, or don't hide the
key exchange such that users are encouraged to
"turn on siging" so as to get the key exchange.

You can send an unsigned e-mail with a copy of the cert as an 
attachment, but I don't think mozilla will process those messages. This 
bug has been on my plate for years and none of my management over the 
years at Netscape/AOL/Sun has ever found it important enough, so it's 
still in my queue at https://bugzilla.mozilla.org/show_bug.cgi?id=36246 
. It doesn't look like any mozilla S/MIME user has ever cared, either ! 
But if you want to fix it, be my guest. I have 35 bugs assigned at this 
time, and the number never seems to go down - unfortunately, whenever I 
fix one bug, I invariably uncover 2 or 3 other previously unknown bugs ...

:-)  I wouldn't know where to start.  Getting into
something like these systems would take a least a
month of hacking, and I'm currently drowning in my
own p

Re: Thunderbird S/MIME guys - Digitally-Signed Mail in e-Commerce - FC05 survey

2005-03-29 Thread Ian G
Julien Pierre wrote:
Hmm, ok, well I suppose that's true as an assumption,
and looking at Account / Settings ... the cert that
is now selected to sign for this email address is
*not* for this email address.  This may explain why
it didn't in the end sign for this email  ;-)

File a bug on the UI - it should be able to filter on e-mail address in 
the drop-down list, and either show only the matching certs, or warn you 
if you try to select one that doesn't match the account e-mail address.
I tried that, thanks!

No, create the cert without a CA and self-sign
it.  I know you won't like that, but IMHO until
that is done, S/MIME mail will never take off.

That's if you consider that self-signed certs have any value, and that 
there is any benefit to having people deploy S/MIME with self-signed 
certs, vs users not deploying S/MIME. IMO, there isn't, and the later is 
 actually preferrable to the former .

Well, there's a vote for denying people access to
S/MIME unless they go through CAs.  I personally
don't see how that can fit with Mozilla's goals
and ethos, especially as it is intended to deliver
security to the average user.  Who, we are all
agreed, is not going to go through a CA just to
send an encrypted email.  It just ain't gonna
happen, even CACert is too expensive for the
average user.

I know you disagree on that point, but nevertheless, deploying S/MIME 
with self-signed certs will just give users a false sense of security.
A false sense of security only arises if we techies
tell them its secure, when it isn't.  Simple solution
to that is ... don't tell them it's totally secure.
Just tell the truth - it's secure against eavesdroppers.
Most users are not as dumb as techies think.
If you just come out and say "this encryption system
is not perfect, but it's free.  It has some quirks
to it, so don't trust your best secrets to it..."
they'll understand.
It's a bit like WEP, conceptually, which can be
cracked in seconds.  You don't see too many
people saying "turn off WEP, you'll be more
secure because you won't have a false sense of
security..."

Most people have no out-of-bounds channel to help them make the decision 
of trusting a self-signed-cert or not. And once trusted, these 
self-signed certs cannot be revoked, because they are roots, as somebody 
else already pointed out.

Most average users have out of band channels with most
people they email.  It is only us techies that spend
most of our lives glues to our screens emailing people
in other continents that don't have out of band
channels.

If you want to use that kind of environment without any binding of key 
to identity, there are other protocols available, such as PGP. Keep 
self-signed certs out of S/MIME .
My goal is security, not preservation or destruction
of one or more products.  I couldn't care less about
S/MIME, PGP, browsing, or TCP/IP.  I only care about
whether the users have some security.
I see security in S/MIME, dormant.  What would it
take to enable that?  Make it spread virally?
There is no basis to _require_ a CA to handle
email, that's something that should be optional
and for companies, mostly.

It should be required for any reasonable understanding of the word 
"security". If everybody used self-signed certs, then the "security" 
button should be replaced with "screwing myself with crypto I don't 
understand", instead .

LOL... No, the problem with all the above is that
you have not and you cannot define security.
In terribly brief terms, anything you come up with
will probably be self-referential or subjective.
You literally cannot deliver any security to the
user until you have defined it, and as a point
of fact, in the PKI world, security is undefined
except as "what we do" or the like.
Which means it is not defined in terms suitable for
anyone to say this is better than that.
...
S/MIME requires the sending party to know his recipient's public key. 
That key is embedded in X.509 certificates.

Sorry, yes, I did discover later on that this is
simply an implementation choice.  The S/MIME standard
doesn't say how the certs should be delivered, so
there should be no problem in variants.

The S/MIME signature provides proof the sender is in possession of the 
private key matching the public key in his certificate. The certificate 
establishes the key was issued to the owner of the e-mail address.

If a self-signed certificate was used, anybody could send a fake email, 
signed with a self-signed cert, and there would be absolutely no way for 
the recipient to know that it didn't come from the legitimate owner of 
the email address listed in the certificate.

Yes, although if the petnames system were in
place this would be a defence against that.
Not that this would be a big deal, I don't
see self signed certs as anymore than a kludge
to enable S/MIME for later upgrading.  I'd
happily accept fake emails if I knew I could
encrypt to the 10 or so people I share secrets
with.

The recipient might respond with an encrypted me

Re: Thunderbird S/MIME guys - Digitally-Signed Mail in e-Commerce - FC05 survey

2005-03-29 Thread Julien Pierre
Ian,
Ian G wrote:
Right, but considering that this is *email*
and CAs are simply some optional extra to do
with commercial users (and we saw what they
want) then when it comes to *email* there is
no need to bash anyone's head over any issue.
There is nothing in X.509 or S/MIME specs that says CAs are "simply 
optional extra to do with commercial users" ! That's only your 
mischaracterization . In fact to be able to verify a cert, you need to 
supply a known list of trust anchors as input. A self-signed cert isn't 
an exception. To verify it, you need to have previously trusted it .

Thus, for individual users' self-signed certs to work, everybody would 
need to blindly trust everybody else's individual cert. I don't see how 
you expect that to actually be workable.

In email, you and I know each other and we
don't need any CA to tell us that.
That's what you may think ! Emails travel through a myriad of servers, 
routers, in a non-realtime fashion, and are very susceptible to attacks 
such as interception. An MITM attack that may be relatively difficult to 
achieve with real-time SSL is much easier to do with e-mail.

Later on, as an option,
we may very well want to go to the CA and
ask for "a third opinion" just like one might
go to the doctor and ask for a "second opinion"
if one is diagnosed as due to kick the bucket
tomorrow.  But this should be strictly optional,
the email application should be built on self-
signed certs as a primary principle.
Using your analogy, I conclude that when you go see a doctor the first 
time, you don't want to know whether he is licensed.

Anyway, it's a terrible analogy. With e-mail, there is nothing that 
proves your prior relationship, as there is with a physical meeting with 
your doctor.

E-mail accounts get hacked into all the time. Unless you verify identity 
externally, an e-mail address by itself is not sufficient to establish 
trust. You could read your self-signed certs' fingerprints to each other 
over the phone before trusting them, and that would be secure . But a CA 
is a a much more practical, generic, and scalable, way to go.

I wouldn't object to self-signed certs if the UI to trust a self-signed 
cert you just received (either via SSL or S/MIME) required you to type 
in the fingerprints in the cert you expected, without the ability to see 
anything in the actual cert but its DNSname or email address. Trust 
would be added only if there was a match. I suspect most people would 
not be able to confirm the fingerprints, and thus would not blindly 
trust any self-signed certs they received . They would then figure out 
it's better to use CAs after all.

No, public key encryption does not require that
you need to use the signed email feature to distro
the keys.  You can use ordinary email, you can
use key servers (in fact that's what x.509
assumed, a worldwide 'telephone directory' for
all the people onthe planet or somesuch), you
could use biz cards with barcodes...
The signed email allows proof-of-posesssion of the key of the sender.
Just reading the public key in the cert doesn't. It's not strictly 
required, but the signed message actually adds security, especially if 
the message is signed with a key contained in a cert that somebody else 
(ie. a CA) vouched for, not a made-up self-signed cert .

What specifically I am referring to there is that
the S/MIME application has decided to make its
operation *dependent* on signed emails.  That's
not good, neither from an architectural pov nor a
meaning pov (as described above).
It isn't dependent on it. Mozilla already supports LDAP lookup of certs 
by e-mail addresses for S/MIME. This works well in intranet corporate 
environments. It breaks down in the public internet, because there is no 
worldwide public directory of certs to e-mail addresses, unfortunately.

Fortunately, when you configure LDAP lookups in mozilla, S/MIME will 
look up your recipients' cert in LDAP, in addition to your local 
certificate database, not instea of it.

Right, so send an email with the key.  Just don't
force it to be a signed email, or don't hide the
key exchange such that users are encouraged to
"turn on siging" so as to get the key exchange.
You can send an unsigned e-mail with a copy of the cert as an 
attachment, but I don't think mozilla will process those messages. This 
bug has been on my plate for years and none of my management over the 
years at Netscape/AOL/Sun has ever found it important enough, so it's 
still in my queue at https://bugzilla.mozilla.org/show_bug.cgi?id=36246 
. It doesn't look like any mozilla S/MIME user has ever cared, either ! 
But if you want to fix it, be my guest. I have 35 bugs assigned at this 
time, and the number never seems to go down - unfortunately, whenever I 
fix one bug, I invariably uncover 2 or 3 other previously unknown bugs ...

Coming back to the here and now ... I suppose the
workaround is to turn off signing, and send an
empty signed email to anyone you want to communicate
wi

Re: Thunderbird S/MIME guys - Digitally-Signed Mail in e-Commerce - FC05 survey

2005-03-29 Thread Julien Pierre
Ian G wrote:
Hi Julien,
Julien Pierre wrote:
Ian,
Ian G wrote:
For encryption, just now I tried again, and I
may have figured out the problem:  it requires
me to select a certificate, which wasn't
obvious the first time I went through the various
dialogues;  it should just automatically select
the one cert that is there (actually it should
automatically create, sign and select a cert on
install time .. but that's another debate).

That's making a pretty big assumption - that you only have one cert in 
the database that matches your email address(es).

Hmm, ok, well I suppose that's true as an assumption,
and looking at Account / Settings ... the cert that
is now selected to sign for this email address is
*not* for this email address.  This may explain why
it didn't in the end sign for this email  ;-)
File a bug on the UI - it should be able to filter on e-mail address in 
the drop-down list, and either show only the matching certs, or warn you 
if you try to select one that doesn't match the account e-mail address.

So now I have to figure out how to find a cert for
this email address.  Now given that it took like
10 minutes of clicking around by an expert in the
CA's business to do with the one cert I've got, I'm
not hopeful!
Especially as there is no button to create a cert.
That's usually done by visiting a CA's web page and going through the 
enrollment process .

They are, at least in Mozilla mail. One of the buttons, between 
"spell" and "save, is called "security". It's got a drop-down menu to 
select encryption and/or signing.

A that's what that funny little thing
on the button is.  OK, that's better.
It confused me the first time too ...
   1. it should create and select a cert on
   install.

That would require a relationship with a CA and automated protocol.

No, create the cert without a CA and self-sign
it.  I know you won't like that, but IMHO until
that is done, S/MIME mail will never take off.
That's if you consider that self-signed certs have any value, and that 
there is any benefit to having people deploy S/MIME with self-signed 
certs, vs users not deploying S/MIME. IMO, there isn't, and the later is 
 actually preferrable to the former .

I know you disagree on that point, but nevertheless, deploying S/MIME 
with self-signed certs will just give users a false sense of security. 
Most people have no out-of-bounds channel to help them make the decision 
of trusting a self-signed-cert or not. And once trusted, these 
self-signed certs cannot be revoked, because they are roots, as somebody 
else already pointed out.

If you want to use that kind of environment without any binding of key 
to identity, there are other protocols available, such as PGP. Keep 
self-signed certs out of S/MIME .

There is no basis to _require_ a CA to handle
email, that's something that should be optional
and for companies, mostly.
It should be required for any reasonable understanding of the word 
"security". If everybody used self-signed certs, then the "security" 
button should be replaced with "screwing myself with crypto I don't 
understand", instead .

Besides, the install time wouldn't be the right time to do it, or at 
least not the only time. E-mail account creation time would be.

Oh, yes, excellent point.

For signatures, that's less interesting to me,
but I'll try to sign this email, and if that
works, it will be because the Cert was not
selected.

Signatures are the way encryption certificates are transmitted, so 
they are rather crucial. If you don't sign your messages, people won't 
be able to write you encrypted messages.

?  Why is that?  Why do I need to sign a mail to
send a cert?  Why can't the cert be sent anyway,
anytime?
My personal policy (and recommendation) would be
to never sign email, because it has no clear
meaning.  At least in OpenPGP it is undefined
what the meaning is, by definition!  But in
S/MIME, I don't know what it is defined to mean.
So this would result in encryption being denied.
That's ludicruous!  Is that in the standard?
S/MIME requires the sending party to know his recipient's public key. 
That key is embedded in X.509 certificates.

Therefore, the very first time two people want to communicate with 
encryption using S/MIME, one party needs to send his certificate to the 
other. That's typically done by sending an unencrypted, signed message. 
 It's not required to be done that way. It can be distributed by other 
means as well, such as LDAP directories.

The S/MIME signature provides proof the sender is in possession of the 
private key matching the public key in his certificate. The certificate 
establishes the key was issued to the owner of the e-mail address.

If a self-signed certificate was used, anybody could send a fake email, 
signed with a self-signed cert, and there would be absolutely no way for 
the recipient to know that it didn't come from the legitimate owner of 
the email address listed in the certificate.

The recipient might respond with

Re: Thunderbird S/MIME guys - Digitally-Signed Mail in e-Commerce - FC05 survey

2005-03-29 Thread Ian G
(Belated reply, now that my email is working
again after toasted power supply problems!)

| view of what they had decided they meant, or are
| big enough and ugly enough to take their punishment
| if ever called to do so.
|
| What Simson showed was not only that the users
| didn't know what that meaning was (no big deal)
| but the users didn't even understand what the
| question was.  They are basically unaware and/or
| confused about the entire process.
|
P.T. Barnum is as right today as he was a century ago. But ignorance on
their part should not be construed as same on those who do understand.

Right.  And now we reach a big philosophical
issue for Mozilla, which has been mooted upon
in these very pages of late.
Who is Mozilla for?  Who is Tbird courting?
If it's the average user a.k.a. Joe Sixpack,
then we have one way of looking at how to
secure his traffic.
If it's Terry Techie, then we might expect
him to learn the steps, the model, the customs.
But not Joe & Josephine Mixed Dozen.
Now, I'm assuming the 'average user', because
that's what I was told, and it's unfair to anyone
to flip back and forth in a conversation.  But,
I do recognise that ... this has created a very
big tension, especially in places like S/MIME,
where the setup assumes Terry Techie, and Terry
is quite happy with the product as it is.

| Fun debate!
I suspect S/MIME is a square block to your round hole at least vis-a-vis
certs in email apps. You might be interested in Ciphire
(https://www.ciphirebeta.com/) an application that addresses some of the
problems you've mentioned here and in the past.

Yes, I looked at Ciphire.  In terms of getting
crypto out to the people - Mozilla's undebated
target audience - I'm not sure that Ciphire adds
anything over OpenPGP clients.  Sure, it might
address the key distro issues better than say
S/MIME, but it has to still carry the burden of
being a downloaded client that just does crypto.

iang
--
News and views on what matters in finance+crypto:
http://financialcryptography.com/
___
Mozilla-security mailing list
Mozilla-security@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-security


Re: Thunderbird S/MIME guys - Digitally-Signed Mail in e-Commerce - FC05 survey

2005-03-27 Thread HJ
Duane wrote:
Ian G wrote:

Ah, ok, I recall this being mentioned a squillion
times.  Now it happens to me :-/

So yea, now you know why it's important for mozilla guys to come up with
a database that can be shared between both apps...
Or that people would like to keep using the Mozilla Suite because of 
this perhaps?


OK, so I manually installed the root from CACert
into TBird.  And ... yoohoo, this mail should go
out signed :-)

yup...
___
Mozilla-security mailing list
Mozilla-security@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-security


Re: Thunderbird S/MIME guys - Digitally-Signed Mail in e-Commerce - FC05 survey

2005-03-26 Thread Duane
Ian G wrote:

> Ah, ok, I recall this being mentioned a squillion
> times.  Now it happens to me :-/

So yea, now you know why it's important for mozilla guys to come up with
a database that can be shared between both apps...

> OK, so I manually installed the root from CACert
> into TBird.  And ... yoohoo, this mail should go
> out signed :-)

yup...

-- 

Best regards,
 Duane

http://www.cacert.org - Free Security Certificates
http://www.nodedb.com - Think globally, network locally
http://www.sydneywireless.com - Telecommunications Freedom
http://happysnapper.com.au - Sell your photos over the net!
http://e164.org - Using Enum.164 to interconnect asterisk servers

"In the long run the pessimist may be proved right,
but the optimist has a better time on the trip."
___
Mozilla-security mailing list
Mozilla-security@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-security


Re: Thunderbird S/MIME guys - Digitally-Signed Mail in e-Commerce - FC05 survey

2005-03-26 Thread Ian G
Duane wrote:
Because tbird and ffox don't share a keystore you have to manually
import the root cert, although from memory exporting the private key for
your client cert should take the root cert with it...

Ah, ok, I recall this being mentioned a squillion
times.  Now it happens to me :-/
OK, so I manually installed the root from CACert
into TBird.  And ... yoohoo, this mail should go
out signed :-)
Thanks guys!
Next step, encryption!
iang
--
News and views on what matters in finance+crypto:
http://financialcryptography.com/


smime.p7s
Description: S/MIME Cryptographic Signature


Re: Thunderbird S/MIME guys - Digitally-Signed Mail in e-Commerce - FC05 survey

2005-03-26 Thread Duane
Ian G wrote:

> (So, dumb user question, but was I right in
> my guess that CACert certs aren't working in
> Tbird at the moment?  Or do I need to keep
> looking for some other problem?  Basically,
> TBird won't let me email with signing as the
> cert is invalid, so it says.)

Because tbird and ffox don't share a keystore you have to manually
import the root cert, although from memory exporting the private key for
your client cert should take the root cert with it...

-- 

Best regards,
 Duane

http://www.cacert.org - Free Security Certificates
http://www.nodedb.com - Think globally, network locally
http://www.sydneywireless.com - Telecommunications Freedom
http://happysnapper.com.au - Sell your photos over the net!
http://e164.org - Using Enum.164 to interconnect asterisk servers

"In the long run the pessimist may be proved right,
but the optimist has a better time on the trip."
___
Mozilla-security mailing list
Mozilla-security@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-security


Re: Thunderbird S/MIME guys - Digitally-Signed Mail in e-Commerce - FC05 survey

2005-03-26 Thread Ian G
Duane wrote:
Ian G wrote:

Right, but considering that this is *email*
and CAs are simply some optional extra to do
with commercial users (and we saw what they
want) then when it comes to *email* there is
no need to bash anyone's head over any issue.

I see 2 primary benefits of including a CA in the chain, firstly email
is spoofable, and unless you plan to use a white list to annoy the crap
out of everyone before you'll accept mail then the CA in most cases
includes a minimum level before issuing, at least I don't know of any
testing certs issued without a mail probe.
2nd benefit is in the revokation, how many PGP keys are floating round
in cyber space that can't be revoked?

Right.  I think CAs can add some value to
the certificates in email, and if any of
these ideas see the light of day, I'd suggest
that the implementors think about how they
migrate users from "self-signed" basic level
to something a bit better.  Migration from
nothing to adequate to strong is a much easier
task than leaping from nothing to everything.
(So, dumb user question, but was I right in
my guess that CACert certs aren't working in
Tbird at the moment?  Or do I need to keep
looking for some other problem?  Basically,
TBird won't let me email with signing as the
cert is invalid, so it says.)
iang
--
News and views on what matters in finance+crypto:
http://financialcryptography.com/
___
Mozilla-security mailing list
Mozilla-security@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-security


Re: Thunderbird S/MIME guys - Digitally-Signed Mail in e-Commerce - FC05 survey

2005-03-26 Thread Duane
Ian G wrote:

> Right, but considering that this is *email*
> and CAs are simply some optional extra to do
> with commercial users (and we saw what they
> want) then when it comes to *email* there is
> no need to bash anyone's head over any issue.

I see 2 primary benefits of including a CA in the chain, firstly email
is spoofable, and unless you plan to use a white list to annoy the crap
out of everyone before you'll accept mail then the CA in most cases
includes a minimum level before issuing, at least I don't know of any
testing certs issued without a mail probe.

2nd benefit is in the revokation, how many PGP keys are floating round
in cyber space that can't be revoked?

-- 

Best regards,
 Duane

http://www.cacert.org - Free Security Certificates
http://www.nodedb.com - Think globally, network locally
http://www.sydneywireless.com - Telecommunications Freedom
http://happysnapper.com.au - Sell your photos over the net!
http://e164.org - Using Enum.164 to interconnect asterisk servers

"In the long run the pessimist may be proved right,
but the optimist has a better time on the trip."
___
Mozilla-security mailing list
Mozilla-security@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-security


Re: Thunderbird S/MIME guys - Digitally-Signed Mail in e-Commerce - FC05 survey

2005-03-26 Thread Ian G
J. Wren Hunt wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
Ian G wrote:
|
| Right, but considering that this is *email*
| and CAs are simply some optional extra to do
| with commercial users (and we saw what they
| want) then when it comes to *email* there is
| no need to bash anyone's head over any issue.
|
| In email, you and I know each other and we
| don't need any CA to tell us that.
|
Well, I know who you purport to be. And currently I have no reason to
doubt that you are indeed the esteemed Ian G! ;-) But I receive emails
on a daily basis from those purporting to be from the late Yassir
Arafat's widow, and the personal barrister of the late Mbeke Sese-Sese
Seiko, etc.,  Do I believe them? Not likely. If I'm doing correspondence
from someone whom I already have a close relationship with, for example
family members, then an anonymous cert works perfectly. Any attempt at
subterfuge (e.g., forging, etc.,) would most likely be easily detected
as you *know* their writing styles, etc., Not so from a person who's
persona you may be familiar with but not known to you personally (as
would might be the case with many participants on this list to one 
another).

Right, exactly.  But the scenario you describe
is not real world.  Are you likely to do
business with someone who purports to be the
late Yassir Arafat's widow and she has a cert
that just so happens to claim that?
How many times have you ... needed to know
who someone was, and then relied upon their
cert?  Me, I'd just pick up the phone.  Not
because the cert might be wrong, but because
it doesn't say anywhere near enough to be
reliable for a judgement that might be worth
paying for.
We all know the standard story about how you
can't trust people over the net.  What I'm
saying is that for email, certs don't change
that.  They just don't enter into real life
calculations for the average user.  Even if
the certs were deployed in a massive basis,
and even if users understood them, they would
not rely on them.  They'd pick up the phone.
(For commerce, that might be different,
although Simson's paper might suggest otherwise.)
So using the S/MIME infrastructure is strongly
pointed at getting some encryption out there.
That could be done any way we like, but making
it depend on signing or CAs will kill it (or
has already killed it).

| So what does it mean?
|
| In OpenPGP, there is no defined meaning to
| signing in the code or spec, so it means
| ... whatever the signer wanted it to mean.
|
It takes two to form a relationship. So it's the receiver as well as the
sender.

Let the receiver beware!  A relationship
may say something about a signature's meaning,
but there is nothing in the tech or the dox
that might back that up.  That's why an OpenPGP
signature is worth whatever the relationship
says its worth.  Perfect!

| Which is *safe*.  Sign away, it's whatever
| you want it to mean.
|
If a person wants to be "Batman" and another "Robin", as long as they
are comfortable with these personas then this model works for them.

Right, and if I sign as Iang, and I also go
around saying my sig is my word is my bond,
and let's do deals, then I've created an
expectation that my signature has meaning.

Again it takes two parties to agree to a contract. I'll never digitally
sign anything that I wouldn't not hand-sign. But if you can recognize my
physical handwriting then why not its digital counterpart?  I can
repudiate or not-repudate both my physical and digital signatures as
needed. I fail to follow your logic here for non-signing.

How do you know you can repudiate your S/MIME sig?
The RFC says it is non-repudiable, and some laws
say the same thing.
The logic is quite simple.  Unless we can
define with reasonable certainty what the
signature means, then don't do it.  It might
be used against you in the future.
OpenPGP's sig is quite well defined as undefined.
So it's up to you.  S/MIME's sig however is not
undefined, but has meaning.  I just don't know
what it is, so if I were to use it, I would be
signing without knowing what I was doing.
(And the same applies to everyone who doesn't
know what it is.  Which is most all of us.)

| What specifically I am referring to there is that
| the S/MIME application has decided to make its
| operation *dependent* on signed emails.  That's
| not good, neither from an architectural pov nor a
| meaning pov (as described above).
|
No, it's not dependent. Just heavily used by most MUAs.

Sure.  In terms of deployment, "heavily used" and
relied up on for key exchange is close enough to
what I mean.

|> Most usually this is done via sending a signed-message beforehand. You
|> may opt to have him ftp/telnet/ssh/carrier-pigeon the key, but
|> nonetheless you gotta have it.
|
|
| Right, so send an email with the key.  Just don't
| force it to be a signed email, or don't hide the
| key exchange such that users are encouraged to
| "turn on siging" so as to get the key exchange.
|
You're welcome to pluck mine off my various web

Re: Thunderbird S/MIME guys - Digitally-Signed Mail in e-Commerce - FC05 survey

2005-03-26 Thread Ian G
J. Wren Hunt wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
Ian G wrote:
| So now I have to figure out how to find a cert for
| this email address.  Now given that it took like
| 10 minutes of clicking around by an expert in the
| CA's business to do with the one cert I've got, I'm
| not hopeful!
|
| Especially as there is no button to create a cert.
|
You are more than welcome to create a self-signed cert. But surely you
are aware of the ramifications of such an approach. That's why we've
been bashing our collective heads for these past months on Root CA
policies eh - a shared common root?

Right, but considering that this is *email*
and CAs are simply some optional extra to do
with commercial users (and we saw what they
want) then when it comes to *email* there is
no need to bash anyone's head over any issue.
In email, you and I know each other and we
don't need any CA to tell us that.
Later on, as an option,
we may very well want to go to the CA and
ask for "a third opinion" just like one might
go to the doctor and ask for a "second opinion"
if one is diagnosed as due to kick the bucket
tomorrow.  But this should be strictly optional,
the email application should be built on self-
signed certs as a primary principle.
(Now, browsing is a completely different app
so these comments don't necessarily apply.)

|My personal policy (and recommendation) would be
|to never sign email, because it has no clear
|meaning.  At least in OpenPGP it is undefined
|what the meaning is, by definition!
That's news to me! People sign using OpenPGP all the time!

Yes, exactly.  Let me clarify:  In S/MIME,
I recommend not signing because I don't as
yet understand what it means (and according
to Simson Garfinkel et al's paper posted
yesterday, there's little hope that the users
know what it means).
So what does it mean?
In OpenPGP, there is no defined meaning to
signing in the code or spec, so it means
... whatever the signer wanted it to mean.
Which is *safe*.  Sign away, it's whatever
you want it to mean.
So, what does it mean in S/MIME?  We know
it's not 'undefined' because there are CA
signed certs involved
And the RFC2633 says S/MIME provides:
   "authentication, message integrity and non-repudiation
   of origin (using digital signatures)"
Or somesuch.  (I haven't read it, I just found
it by accident.)  Maybe there's a better one
somewhere in that doc, but that doesn't satisfy
and it's got a red flag in it - non-reputation.
So the conclusion should be the same as what the
lawyers say - "don't sign anything you don't
understand."

|So this would result in encryption being denied.
|That's ludicruous!  Is that in the standard?
Well yeah, that's why it's called "public-key" encryption. You somehow
have to have your correspondent's public-key before encrypting to him.

No, public key encryption does not require that
you need to use the signed email feature to distro
the keys.  You can use ordinary email, you can
use key servers (in fact that's what x.509
assumed, a worldwide 'telephone directory' for
all the people onthe planet or somesuch), you
could use biz cards with barcodes...
What specifically I am referring to there is that
the S/MIME application has decided to make its
operation *dependent* on signed emails.  That's
not good, neither from an architectural pov nor a
meaning pov (as described above).
Most usually this is done via sending a signed-message beforehand. You
may opt to have him ftp/telnet/ssh/carrier-pigeon the key, but
nonetheless you gotta have it.
Right, so send an email with the key.  Just don't
force it to be a signed email, or don't hide the
key exchange such that users are encouraged to
"turn on siging" so as to get the key exchange.
Coming back to the here and now ... I suppose the
workaround is to turn off signing, and send an
empty signed email to anyone you want to communicate
with.  OK, I can live with that!
But it does make S/MIME much more clunky and less
likely to deploy.
iang
--
News and views on what matters in finance+crypto:
http://financialcryptography.com/
___
Mozilla-security mailing list
Mozilla-security@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-security


Re: Thunderbird S/MIME guys - Digitally-Signed Mail in e-Commerce - FC05 survey

2005-03-26 Thread J. Wren Hunt
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
Ian G wrote:
| So now I have to figure out how to find a cert for
| this email address.  Now given that it took like
| 10 minutes of clicking around by an expert in the
| CA's business to do with the one cert I've got, I'm
| not hopeful!
|
| Especially as there is no button to create a cert.
|
You are more than welcome to create a self-signed cert. But surely you
are aware of the ramifications of such an approach. That's why we've
been bashing our collective heads for these past months on Root CA
policies eh - a shared common root?
|My personal policy (and recommendation) would be
|to never sign email, because it has no clear
|meaning.  At least in OpenPGP it is undefined
|what the meaning is, by definition!
That's news to me! People sign using OpenPGP all the time!
|So this would result in encryption being denied.
|That's ludicruous!  Is that in the standard?
Well yeah, that's why it's called "public-key" encryption. You somehow
have to have your correspondent's public-key before encrypting to him.
Most usually this is done via sending a signed-message beforehand. You
may opt to have him ftp/telnet/ssh/carrier-pigeon the key, but
nonetheless you gotta have it.
- --
Cheers!
J. Wren Hunt
Cambridge, MA. USA
- 
"In theory, there is no difference between theory and practice. But, in
practice, there is." - Jan L.A. van de Snepscheut
+--+
| v-card   http://wrenhunt.homelinux.org/data/wren.vcf |
| x.509http://wrenhunt.homelinux.org/data/thawte_wren_hunt.cer |
| OpenPGP  ADF5 1432 A59E 8F4D 4AE7  4DFE 03FA 91E1 4A24 D6F4  |
+--+
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.1 (Darwin)
iD8DBQFCRV4cA/qR4Uok1vQRA2DiAJsFFJfrNCVBZ6aqRLpknIcMD6KB4wCg5MTz
wAUr+8FxeuT7cmXCLjE4cyU=
=ho02
-END PGP SIGNATURE-
___
Mozilla-security mailing list
Mozilla-security@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-security


Re: Thunderbird S/MIME guys - Digitally-Signed Mail in e-Commerce - FC05 survey

2005-03-25 Thread Duane
Ian G wrote:

> That would be a bug, if true.  Even if one were not
> aghast at the temerity of restricting signatures to
> people with paid permission ... I would have thought
> it blindingly obvious that the *verification* is where
> the quality of the signature chain should be checked.

The entire certificate chain is actually sent, so I'm most interested in
what solution mozilla guys can come up with to link the trust db from
firefox to thunderbird so people don't have to keep exporting/importing,
bit like exporting from MS IE to MS Outlook, most annoying really...

> (It doesn't say anywhere that the cert is not "trusted"
> by Thunderbird so it may be that there is another
> problem elsewhere.  Are CACerts and Thunderbird
> compatible  ?  Hey Duane, any daylight down there?)

Actually I'm in the US atm... and technically it's 2pm in Australia :)

-- 

Best regards,
 Duane

http://www.cacert.org - Free Security Certificates
http://www.nodedb.com - Think globally, network locally
http://www.sydneywireless.com - Telecommunications Freedom
http://happysnapper.com.au - Sell your photos over the net!
http://e164.org - Using Enum.164 to interconnect asterisk servers

"In the long run the pessimist may be proved right,
but the optimist has a better time on the trip."
___
Mozilla-security mailing list
Mozilla-security@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-security


Re: Thunderbird S/MIME guys - Digitally-Signed Mail in e-Commerce - FC05 survey

2005-03-25 Thread Ian G
Ian G wrote:
Hmm, ok, well I suppose that's true as an assumption,
and looking at Account / Settings ... the cert that
is now selected to sign for this email address is
*not* for this email address.  This may explain why
it didn't in the end sign for this email  ;-)

Well, I just tried it from the proper email address,
and it didn't work.  This time I read the popup
carefully, and it said "check if the cert is valid
and *TRUSTED* ..."
So, I have a CACert certificate.  And I suppose what
I am being told is that this is not trusted ... and
therefore I am not permitted to sign?  (And because I
can't sign I can't encrypt :-)
That would be a bug, if true.  Even if one were not
aghast at the temerity of restricting signatures to
people with paid permission ... I would have thought
it blindingly obvious that the *verification* is where
the quality of the signature chain should be checked.
(It doesn't say anywhere that the cert is not "trusted"
by Thunderbird so it may be that there is another
problem elsewhere.  Are CACerts and Thunderbird
compatible  ?  Hey Duane, any daylight down there?)
Anyway, thanks for your help guys.
Question - should all this be bug filed, or is it all
covered in some standard somewhere, so no point?  I'm
really an OpenPGP guy, so it's no big issue to me
personally, but if there is any intention to get this
stuff deployed for average users then I can have a
go at filing a bug.
iang
--
News and views on what matters in finance+crypto:
http://financialcryptography.com/
___
Mozilla-security mailing list
Mozilla-security@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-security


Re: Thunderbird S/MIME guys - Digitally-Signed Mail in e-Commerce - FC05 survey

2005-03-25 Thread Ian G
Hi Julien,
Julien Pierre wrote:
Ian,
Ian G wrote:
For encryption, just now I tried again, and I
may have figured out the problem:  it requires
me to select a certificate, which wasn't
obvious the first time I went through the various
dialogues;  it should just automatically select
the one cert that is there (actually it should
automatically create, sign and select a cert on
install time .. but that's another debate).

That's making a pretty big assumption - that you only have one cert in 
the database that matches your email address(es).

Hmm, ok, well I suppose that's true as an assumption,
and looking at Account / Settings ... the cert that
is now selected to sign for this email address is
*not* for this email address.  This may explain why
it didn't in the end sign for this email  ;-)
So now I have to figure out how to find a cert for
this email address.  Now given that it took like
10 minutes of clicking around by an expert in the
CA's business to do with the one cert I've got, I'm
not hopeful!
Especially as there is no button to create a cert.
But it's true the interface definitely doesn't make it obvious how to 
turn on signing and encryption .

But, in Options/Security I found a menu that
gave options to encrypt and to sign.  They need
to be on the chrome somewhere, imho.

They are, at least in Mozilla mail. One of the buttons, between "spell" 
and "save, is called "security". It's got a drop-down menu to select 
encryption and/or signing.

A that's what that funny little thing
on the button is.  OK, that's better.

So I guess the thing is to set the default in
Edit / Account Settings / [EMAIL PROTECTED] /
Security / Encryption to say Never and then to
override that by clicking the Options/Security/
Encrypt each time?

Yep.
In summary,
   1. it should create and select a cert on
   install.

That would require a relationship with a CA and automated protocol.
No, create the cert without a CA and self-sign
it.  I know you won't like that, but IMHO until
that is done, S/MIME mail will never take off.
There is no basis to _require_ a CA to handle
email, that's something that should be optional
and for companies, mostly.
Besides, the install time wouldn't be the right time to do it, or at 
least not the only time. E-mail account creation time would be.
Oh, yes, excellent point.

For signatures, that's less interesting to me,
but I'll try to sign this email, and if that
works, it will be because the Cert was not
selected.

Signatures are the way encryption certificates are transmitted, so they 
are rather crucial. If you don't sign your messages, people won't be 
able to write you encrypted messages.
?  Why is that?  Why do I need to sign a mail to
send a cert?  Why can't the cert be sent anyway,
anytime?
My personal policy (and recommendation) would be
to never sign email, because it has no clear
meaning.  At least in OpenPGP it is undefined
what the meaning is, by definition!  But in
S/MIME, I don't know what it is defined to mean.
So this would result in encryption being denied.
That's ludicruous!  Is that in the standard?
iang
--
News and views on what matters in finance+crypto:
http://financialcryptography.com/
___
Mozilla-security mailing list
Mozilla-security@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-security


Re: Thunderbird S/MIME guys - Digitally-Signed Mail in e-Commerce - FC05 survey

2005-03-25 Thread Julien Pierre
Ian,
Ian G wrote:
For encryption, just now I tried again, and I
may have figured out the problem:  it requires
me to select a certificate, which wasn't
obvious the first time I went through the various
dialogues;  it should just automatically select
the one cert that is there (actually it should
automatically create, sign and select a cert on
install time .. but that's another debate).
That's making a pretty big assumption - that you only have one cert in 
the database that matches your email address(es).

But it's true the interface definitely doesn't make it obvious how to 
turn on signing and encryption .

But, in Options/Security I found a menu that
gave options to encrypt and to sign.  They need
to be on the chrome somewhere, imho.
They are, at least in Mozilla mail. One of the buttons, between "spell" 
and "save, is called "security". It's got a drop-down menu to select 
encryption and/or signing.

So I guess the thing is to set the default in
Edit / Account Settings / [EMAIL PROTECTED] /
Security / Encryption to say Never and then to
override that by clicking the Options/Security/
Encrypt each time?
Yep.
In summary,
   1. it should create and select a cert on
   install.
That would require a relationship with a CA and automated protocol.
Besides, the install time wouldn't be the right time to do it, or at 
least not the only time. E-mail account creation time would be.

For signatures, that's less interesting to me,
but I'll try to sign this email, and if that
works, it will be because the Cert was not
selected.
Signatures are the way encryption certificates are transmitted, so they 
are rather crucial. If you don't sign your messages, people won't be 
able to write you encrypted messages.
___
Mozilla-security mailing list
Mozilla-security@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-security


Re: Thunderbird S/MIME guys - Digitally-Signed Mail in e-Commerce - FC05 survey

2005-03-25 Thread Ian G
J. Wren Hunt wrote:
Ian G wrote:
|
| I recently installed a good cert into my Thunderbird and I
| still cannot send out signed or encrypted email using S/MIME (I forget
| why).
|
Are you being facetious here?
Nope, I tried to get it going a couple of weeks
ago, and the interface has too many barriers in it.
Here's some quick gumbie notes dashed off, as I
try again.
For encryption, just now I tried again, and I
may have figured out the problem:  it requires
me to select a certificate, which wasn't
obvious the first time I went through the various
dialogues;  it should just automatically select
the one cert that is there (actually it should
automatically create, sign and select a cert on
install time .. but that's another debate).
Now that I've selected the cert, it gives me
two options on the Account Settings dialog:
   Never use encryption, and
   Required.
Well, neither of those are going to work and
when I saw that the first time I was mystified
why such a choice existed.  What's wrong with
   encrypt when possible;
   encrypt to whom possible?
So it now occurs to me that this cannot be
all there is to it, and clicking on this email's
Security padlock reveals ... recipient certs,
which is a big suprise!  Nice.
But, in Options/Security I found a menu that
gave options to encrypt and to sign.  They need
to be on the chrome somewhere, imho.
So I guess the thing is to set the default in
Edit / Account Settings / [EMAIL PROTECTED] /
Security / Encryption to say Never and then to
override that by clicking the Options/Security/
Encrypt each time?
In summary,
   1. it should create and select a cert on
   install.
   2. it should select or offer selection when
   a new signed cert on install.
   3. it should encrypt when it can, and
   offer an option to encrypt partially
   when it can't encrypt to all.
   4. there should be a big fat SEND&SIGN
   button next to Send.
   5. there should be a "valid" indicator
   next to each of the recipients, as
   well as an "no cert" for those who
   aren't known.
All, IMHO, second attempt impressions.

For signatures, that's less interesting to me,
but I'll try to sign this email, and if that
works, it will be because the Cert was not
selected.
6.  It would be nice if the From bar where
to go blue like Firefox.  The little
pen (is it?) at the bottom right is too
small to notice.
7.  Is there any way to attach a statement
to the signature indicating what it
means?  What does it mean?
iang
--
News and views on what matters in finance+crypto:
http://financialcryptography.com/
___
Mozilla-security mailing list
Mozilla-security@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-security


Re: Thunderbird S/MIME guys - Digitally-Signed Mail in e-Commerce - FC05 survey

2005-03-25 Thread J. Wren Hunt
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160

Ian G wrote:
|
| I recently installed a good cert into my Thunderbird and I
| still cannot send out signed or encrypted email using S/MIME (I forget
| why).
|
Are you being facetious here?
Wren
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.1 (Darwin)
iD8DBQFCRKT5A/qR4Uok1vQRA1XDAKDOPNE6hu++VCSJIVE5ai5YmRZQHQCgyZe2
7/tV5Ne8o4myoq0RDbs69kM=
=FyUN
-END PGP SIGNATURE-
___
Mozilla-security mailing list
Mozilla-security@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-security