On 9/7/14 11:09 AM, Dave Crocker wrote:
On 9/7/2014 6:21 AM, Pete Resnick wrote:
   Obviously doing e2e
crypto gets you signatures.
No it doesn't.  As a matter of practice, it probably will, but the
technology does not require it.  Sigs are an entirely independent action
when doing object encryption.

Signatures, just like encryption, are part of cryptography. If you are doing cryptography (in the way we normally do so for e2e encryption), you can do signatures too. That's all I meant.

Since we are blue-skying here, I think it is
perfectly plausible to say, "If you want to send me e2e encrypted
messages, you also have to send me signed messages,
So you want to eliminate anonymous communications?  Anonymity has
historical importance for some kinds of communication.

Pseudonymity (i.e., a signature that is not attached to a particular human identity) may be sufficient for most cases. Doing so would still require a prior-to-real-communication step of me allowing that signature into my whitelist/contact list/whatever. For my personal email, I am perfectly willing to say, "You get two choices: (1) You set up a prior relationship with me with your signature, and only then do you get to encrypt e2e; or (2) you only get to encrypt as far as my spam scanning service."

Now, to take a recent example, the only way for Snowden to contact me encrypted, unbrokered, and anonymously would involve a rather interesting maneuver to get into my whitelist. But I think I can live with that.

and you don't or
your signature is not in my contacts list already, your encrypted mail
is going to bounce." I think it's possible that in the fullness of time,
many users go to a contact-list model of email (a la IM) where the mail
simply bounces unless it has a signature that is already in the contacts
list.
The Procrustean bed always makes things simpler, and with only a few,
uhhh... shortcomings.

Indeed. And that is true of both this future environment where I would bounce mail without a required signature, and my current environment that requires me (or my agent) to accept, scan, review, and otherwise deal with anonymous mail. Each has....shortcomings.

My point is not that signing is bad or checking against address books is
bad, but that mandating such things constrains legitimate communication
in important ways.

Let's not miss the point that we are *currently* constraining legitimate communication in important ways, as my weekly hunt through my spam folder and my occasional out-of-band, "Why did my mail bounce?" complaint amply demonstrate. I choose my tradeoffs, I get the advantages and disadvantages of those tradeoffs.

pr

--
Pete Resnick<http://www.qualcomm.com/~presnick/>
Qualcomm Technologies, Inc. - +1 (858)651-4478

_______________________________________________
Endymail mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/endymail

Reply via email to