summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorelijah <elijah@riseup.net>2014-04-28 23:39:13 -0700
committerelijah <elijah@riseup.net>2014-04-28 23:39:13 -0700
commit58651087c00f8a11170c7d7efd7ba087e759b1d5 (patch)
tree52a5d32b9879ab7f7a776c08ea0bc48451ac6d92
parentfaf48b9e4928b8479a68b004033cb383ad4dd4f7 (diff)
refreshed secure-email from upstream
-rw-r--r--docs/tech/secure-email/en.md31
1 files changed, 25 insertions, 6 deletions
diff --git a/docs/tech/secure-email/en.md b/docs/tech/secure-email/en.md
index 3be7e14..f894bf0 100644
--- a/docs/tech/secure-email/en.md
+++ b/docs/tech/secure-email/en.md
@@ -35,6 +35,7 @@ Contents:
1. [LEAP Encryption Access Project](#leap)
1. [Post-email alternatives](#post-email-alternatives)
1. [Bitmessage](#bitmessage)
+ 1. [Bote mail](#bote-mail)
1. [Cables](#cables)
1. [Dark Mail Alliance](#p2p-dark-mail-alliance)
1. [Enigmabox](#enigmabox)
@@ -62,6 +63,8 @@ This is where we are now: we have public key technology that is excessively diff
* Key availability: Almost every attempt to solve the key validation problem turns into a key availability problem, because once you have validated a public key, you need to make sure that this validation is available to the user on all the possible devices they might want to send or receive messages on.
* Key revocation: What happens when a private key is lost, and a user want to issue a new public key? None of the projects in this report have an answer for how to deal with this in a post-CA and post-WoT world.
+The projects that use a public key as a unique identifier do not have the key validation problem, because they do no need to try to bind a human memorable identifier to a long non-memorable public key: they simply enforce the use of the public key as the user's address. For example, rather than `alice@example.org` as the identifier, these systems might use `8b3b2213ff00e5fb684b003d005ed2fb`. In place of the key validation problem, this approach raises the key exchange problem: how do two parties initially exchange long public keys with one another? This approach is taken by all the P2P projects listed here (although there do exist some P2P application that don't use public key identifiers).
+
Some of the major experimental approaches to solving the problem of public key discovery and validation include:
1. Inline: Many of the projects here plan to simply include the user's public key as an attachment to every outgoing email (or in a footer or SMTP header).
@@ -85,18 +88,20 @@ All schemes for metadata protection face the prospect of increasing Spam (since
<a name="forward-secrecy"></a>Forward Secrecy
-----------------------------------------------------------
-Forward secrecy is a security property that prevents an attacker from saving messages today and then later decrypting these messages once they have captured the user's private key. Without forward secrecy, an attacker might also be able to capture messages today and simply wait for computers to become powerful enough to crack the encryption by brute force. Traditional email encryption offers no forward secrecy.
+Forward secrecy is a security property that prevents an attacker from saving messages today and then later decrypting these messages once they have captured the user's private key. Without forward secrecy, an attacker is more likely to be able to capture messages today and simply wait for computers to become powerful enough to crack the encryption by brute force. Traditional email encryption offers no forward secrecy.
All methods for forward secrecy involve a process where two parties negotiate an ephemeral key that is used for a short period of time to secure their communication. In many cases, the ephemeral key is generated anew for every single message. Traditional schemes for forward secrecy are incompatible with the asynchronous nature of email communication, since with email you still need to be able to send someone a message even if they are not online and ephemeral key generation requires a back and forth exchange between both parties.
-There are several new experimental (and tricky) protocols that attempt to achieve both forward secrecy and support for asynchronous communication, but none have yet emerged as a standard. Another possible approach is to use traditional encryption with no support for forward secrecy but instead rely on a scheme for automatic key discovery and validation in order to frequently rotate keys. This way, a user could throw away their private key every few days, achieving a very crude form of forward secrecy.
+There are several new experimental (and tricky) protocols that attempt to achieve both forward secrecy and support for asynchronous communication, but none have yet emerged as a standard. These protocols either (1) require an initial bootstrap message that is not forward secret, (2) require an initial synchronous exchange to start the process, or (3) rely on a pool of pre-generated ephemeral key pairs that can be used on first contact. When the continually changing ephemeral key for a conversation is lost by either party, then the initialization stage is performed again.
+
+Another possible approach is to use traditional encryption with no support for forward secrecy but instead rely on a scheme for automatic key discovery and validation in order to frequently rotate keys. This way, a user could throw away their private key every few days, achieving a very crude form of forward secrecy.
<a name="data-availability"></a>Data Availability
-----------------------------------------------------------
Users today demand data availability: they want to be able to access their messages and send messages from any device they choose, wherever they choose, and whenever they choose. Most importantly, they don't want the loss of any particular device to result in a loss of all their data. For insecure communication, achieving data availability is dead simple: simply store everything in the cloud. For secure communication, however, we have no proven solutions to this problem. As noted above, the key management problem is also really a data availability problem.
-Most of the projects here have postponed dealing with the data availability problem. A few have used IMAP to synchronize data or developed their own secure synchronization protocol.
+Most of the email projects here have postponed dealing with the data availability problem. A few have used IMAP to synchronize data or developed their own secure synchronization protocol. Several of the email-like P2P approaches rely on a P2P network for data availability.
<a name="secure-authentication"></a>Secure Authentication
-----------------------------------------------------------
@@ -154,7 +159,7 @@ PrivateSky was a secure web-based email service that chose to shut down because
The makers of the secure search engine [startpage.com](https://startpage.com) have announced they will be providing secure email service.
-Despite the tag line as the "world's most private email," StartMail is remarkably insecure. If offers regular IMAP service and a webmail interface that supports OpenPGP, but the user still must trust StartMail entirely. For example when you authenticate, your password string is sent to StartMail, and new OpenPGP keypairs are generated on the server, not the client. The website also makes some dubious statements, such as claiming to be more secure because their TLS server certificate supports extended validation.
+Despite the tag line as the "world's most private email," StartMail is remarkably insecure. It offers regular IMAP service and a webmail interface that supports OpenPGP, but the user still must trust StartMail entirely. For example when you authenticate, your password string is sent to StartMail, and new OpenPGP keypairs are generated on the server, not the client. The website also makes some dubious statements, such as claiming to be more secure because their TLS server certificate supports extended validation.
Verdict: oil of snake
@@ -473,10 +478,24 @@ Disadvantages:
* because there is no forward secrecy, it is especially problematic that anyone can grab an encrypted copy of any message in the system. This means if the private key is ever compromised, then all the past messages can be decrypted easily by anyone using the system.
* relies on proof of work for spam prevention, which is probably not actually that preventative (spammers often steal CPU anyway).
+<a name="bote-mail"></a>Bote mail
+-----------------------------------------------------------
+
+[i2pbote.i2p.us](http://i2pbote.i2p.us) (or [i2pbote.i2p](http://i2pbote.i2p) if using i2p)
+
+Bote mail (aka [IMail](https://en.wikipedia.org/wiki/IMail)) is an email-like communication protocol that uses the anonymizing network I2p for transport. Bote mail stores messages in a global distribute hash table for up to 100 days, during which time the client has an opportunity to download and store the message.
+
+**Keys**: Bote mail uses public-key based addresses. You can create as many identities as you want, each identity corresponding to a ECDSA or NTRU key-pair.
+
+**Application**: Users interact with the user interface through a webmail interface, although the client is running locally.
+
+* Written in: Java
+* License: GPLv3
+
<a name="cables"></a>Cables
-----------------------------------------------------------
-https://github.com/mkdesu/cables
+[github.com/mkdesu/cables](https://github.com/mkdesu/cables)
* Written in: C, Bash
* License: GPL v2
@@ -507,7 +526,7 @@ P2P secure, encrypted email system.
<a name="goldbug"></a>Goldbug
-----------------------------------------------------------
-http://goldbug.sf.net
+[goldbug.sf.net](http://goldbug.sf.net)
* Written in: C++, Qt
* License: BSD