John, 

Thank you for your input 
we will take your textual suggestion under advisement, 

Thanks 
Olafur 


> On Nov 9, 2016, at 8:32 PM, John Levine <jo...@taugh.com> wrote:
> 
> This draft is still a bad idea for all the reasons I described the
> last time it came around.  Nothing has changed.
> 
> If you do publish it, I'd suggest much stronger language in the first
> sentence of section 9 on security considerations.  The security model
> for S/MIME certs has always been that the trust flows from the CA to
> the user without involving the user's mail operator.  Now the domain
> is the trust source for all of its users.  Sometimes that's
> reasonable, sometimes not, and there's no way you can tell without
> knowing information about the domain that's not in the DNS.
> 
> The fifth paragraph, on mail operator MITM attacks on user mail, is
> also much too weak.  If the domain is a bank that is required by law
> to archive its employee communications, MITM is reasonable.  If it's a
> public mail operator that uses MITM to compile dossiers of user info
> to sell to marketers, and to edit ads and web bugs into the messages
> into mail before re-encrypting them, all without user permission, it's
> not.  If the mail is from another user on the same system, it'll
> re-sign the mail, too.  Of course, the mail operator will assure you
> it's "required to be able to read everyone's encrypted email" by its
> business plan.
> 
> R's,
> John

_______________________________________________
dane mailing list
dane@ietf.org
https://www.ietf.org/mailman/listinfo/dane

Reply via email to