On Sat, Dec 13, 2014 at 06:17:24PM -0000, John Levine wrote:

> * verify an incoming signature without reference to a CA
> * encrypt mail to people who haven't already sent you a key
> 
> Of the two, the second seems much more important.  If it's only the
> first, I don't think it's worth the effort.

[ I understand and in part agree with your point, but I think
  even the first alone is not as vacuous as it might seem. ]

Well I don't see to many organizations outsourcing user enrollment
to a CA, or wanting to operate an RA, so the CA-trust thing is not
so much the issue as the problem of getting CA signatures for the
user certificates, having to handle revocation via a CA, ...

What DANE can do is make it possible to just use your enterprise
CA.  For example, the Microsoft CA is very difficult to use for a
Windows shop, with DANE this can be extend to issuing certificates
that others can validate.

And I am not sure that first contact end-to-end encryption in which
only the final recipient gets to read the mail will be terribly
popular in a world of spam and email malware.  In many ways,
signature-only with key exchange on reply has security advantages
that may make it a popular mode of deployment.

-- 
        Viktor.

_______________________________________________
dane mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dane

Reply via email to