I have carefully read the draft-ietf-dane-smime-08 draft as well and have
found no problems with it and find it clear and concise.

Being better at engineering than reading+writing, I implemented the draft
in the form of on-line record generator and outlook email translator and it
works.

Thanks to the authors for this draft.  It was easy to follow.

-Rick Lamb




On Sun, Jul 19, 2015 at 3:52 PM, Rose, Scott <[email protected]> wrote:

>  I have read the SMIMEA -08 draft and support it being "undeterred" and
> put back on track.  NIST also has some (old) test code that we want to host
> and have sponsored SMIMEA work in the past.  Our previous work has used the
> format described in the current draft.
>
>
>  I have heard of two potential privacy concerns that the WG may want
> included in the Security Considerations section:
>
>
>  First, if the _smimecert.<domain> is hosted by a service provider (i.e.
> not the domain owner), the service provider can see who may be receiving
> encrypted mail and may also learn the source IP address and other potential
> information.  Of course, the hosting provider also knows the whole list of
> (hashed) cert holders in the domain as well.  Pervasive monitoring may also
> discover this (source IP A is looking for a cert for person X in order to
> send them mail), but qname-minimization may mitigate this to a degree.
>
>
>  Second, clients looking to validate a digital signature using SMIMEA
> queries may also be signaling a read receipt.  If the original sender knows
> the recursive servers of the recipient, The sender could get an idea as to
> when the receiver MUA validated the digital signature by observing SMIMEA
> queries to their domain.  This isn't a showstopper IMHO as recipients with
> cached digital signature certs may not send queries.
>
>
>  To summarize as some suggested text (as a starting point at least - not
> happy with it, but it is the best my brain allows right now):
>
>
>  *****
>
> In addition to the zone walking vulnerability, SMIMEA aware senders and
> receivers may also leak information when querying for SMIMEA RRs for
> validating digital signatures and discovering a recipient's S/MIME
> encryption certificate. SMIMEA RR queries may leak information about who is
> planning to send, or has receive S/MIME protected email messages.  DNS
> privacy techniques such as qname-minimization may mitigate some of the
> leakage.
>
>
>  *****
>
>
>  Scott
>
>
>
>
_______________________________________________
dane mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dane

Reply via email to