Hi Karl,

I don't understand how this relates to TLS. S/MIME traffic is self-protected and does not need to be transported over TLS. S/MIME is also independent of SMTP.

But yes, if you can store a self-signed *CA* certificate in your DNS zone, then you should be able to pull it off.

Thanks,
        Yaron

On 09/16/2013 08:45 AM, Karl Malbrain wrote:
Yaron,
 From what I've learned about DANE, domain owners can publish their own
self-signed server certificate through the DNS system.  By using TLS
strong authentication, the S/MIME client doesn't need to have the
server's certificate checked against a CA. Rather the S/MIME  layer
needs to match the DANE delivered certificate with the certificate sent
by the server during the TLS negotiation. This is a very small change to
the S/MIME to TLS protocol layer interface to query from TLS the server
certificate presented, and a similar change to the SMTP to S/MIME
interface to pass along the DANE delivered certificate along with the
server IP address.
Unfortunately, I'm not a TLS nor an S/MIME expert so I can't specify the
exact interface changes needed to utilize strong authentication in the
TLS interface to S/MIME, or the SMTP interface to S/MIME. Perhaps
someone who knows what they are talking about in this area can help.
Karl Malbrain

*From:* Yaron Sheffer <[email protected]>
*To:* James Cloos <[email protected]>
*Cc:* [email protected]; Stephen Farrell <[email protected]>
*Sent:* Sunday, September 15, 2013 11:08 AM
*Subject:* Re: [perpass] Why Yaron can't encrypt: S/MIME in the real world

Hi Jim,

I agree that storing users' public keys in DNS is weird.

But I also wonder about your proposal: it sounds like you're putting the
entire organization's list of employees on a public Web server.

Wouldn't the following be simpler and more natural than both proposals:

- The organization maintains its own CA, maybe just for S/MIME client certs.
- The CA cert is kept as a DNS record, signed by DANE.
- The CA cert is usage-limited, so it can be used for S/MIME only, and
only for addresses at this particular domain. [I suppose this is the
hard part. Is it allowed by X.509?]

Advantages:

- This would leave S/MIME unchanged.
- The cert validation code remains a combination of normal trust chain
processing plus DANE.
- No privacy issues: certificates are not published anywhere.
- Users are managed within the organization, with widely available tools.

Thanks,
     Yaron

On 09/15/2013 07:58 PM, James Cloos wrote:
 >>>>>> "YS" == Yaron Sheffer <[email protected]
<mailto:[email protected]>> writes:
 >
 > YS> S/MIME with DANE would alleviate this problem if organizations were
 > YS> allowed to generate their own certificates, including email certs,
 > YS> and have them chained to the DNS root of trust. I don't know if DANE
 > YS> supports this usage scenario by default.
 >
 > draft-ietf-dane-smime-02.txt exists.
 >
 > Webfinger may be a better choice, though.  It is defined in
 > draft-ietf-appsawg-webfinger-18.txt.
 >
 > Details on how to store public keys in webfinger are not yet specified
 > in any draft, afaics.
 >
 > Dane tlsa records of course can be used to secure the the webfinger uri.
 >
 > If one does that, the steps to find or verify an smime or pgp public key
 > include:
 >
 >    Convert the email address to a webfinger uri
 >
 >    Do the a/aaaa and tlsa lookups on the hostname in that uri
 >
 >    If those dnssec-verify, retrieve the uri
 >
 >    Find the public key (or a link to the public key) in the json reply
 >
 > The trust path, then, is rooted with the DS record for the dns root,
 > follows the dnssec path to the rrsigs for the a/aaaa and tlsa records
 > for the webfinger uri and trusts the content of the data retrieved from
 > the uri on the basis that it trusts the location of the uri.
 >
 > That seems a bit brittle, but not any worse than trusting a path from
 > some random ca of which one has never heard.  Or a path through a WoT
 > involving names/identifiers with which one is not familiar.
 >
 > And http serves large blobs better than dns does.
 >
 > -JimC
 >
_______________________________________________
perpass mailing list
[email protected] <mailto:[email protected]>
https://www.ietf.org/mailman/listinfo/perpass


_______________________________________________
perpass mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/perpass

Reply via email to