Re: Open letter

2000-08-08 Thread David L. Nicol

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

"Ihnen, David" wrote:

 Maybe an extra-low-effort system would consist of a simply speaking a
 keyword into a microphone


I would find this more troublesome than typing my passphrase.

- -- 
  David Nicol 816.235.1187 [EMAIL PROTECTED]
Originator of the world's first combination bassinet and table saw
-BEGIN PGP SIGNATURE-
Version: perl -pe '$_=unpack("u*",$_);'
Comment: 92G5S="!!;F]T:5R(%!EFP@2%C:V5R"@``

iD8DBQE5kDOHJiOJhroV3bkRAtpcAJ4zQtG9qz925plFbbrtWEwveK38LwCeKjnf
/TkbHsLEy4a1ZK+yQ4mYl1k=
=DSp0
-END PGP SIGNATURE-



Re: Open letter

2000-07-31 Thread Dave Sill

Patrick Lambert [EMAIL PROTECTED] wrote:

Each SMTP server could compute a random set of keys when it
is installed, and a simple new command could be added to retrieve
the public key. When any connection is made between the servers,
a public key would be fetched. If the remote server has not been
upgraded and does not support PKI, then the transmission would
continue in a normal way. If both servers support it, then
encryption could be established, automatically, using PKI.

Congratulations, you've just reinvented RFC2487:

  http://www.ietf.org/rfc/rfc2487.txt

qmail patch available from:

  http://www.esat.kuleuven.ac.be/~vermeule/qmail/tls.patch

-Dave



Re: Open letter

2000-07-31 Thread Michael T. Babcock

Agreed: PGP (et. al.) is definately the answer, not server-to-server
encryption.  However, properly authenticated DNS (or an evolution
thereof) and resulting authenticated (S/Q)MTP sessions would be a leap
forward as well.

[EMAIL PROTECTED] wrote:

 The problem with your solution is that server to server encryption
 does not stop government and big corporations from looking at your
 mail on the mail server after it has arrived. Ask any system admin
 how hard it is to scan /var/mail or a users home directory. Answer,
 it's trivial.




Re: Open letter

2000-07-31 Thread Dave Sill

Blackey [EMAIL PROTECTED] wrote:

"
   The Bill means the UK government - specifically the Home Office and
   Home Secretary Jack Straw - can demand encryption keys to any and all
   data communications, with a prison sentence of two years for those who
   do not comply with the order.

(source "http://uk.news.yahoo.com/000728/101/aedvu.html")"

Yow. Well, you could always move to a free country. Luckily, one's
already been set up for you. :-)

Most email transmitted now doesn't require PGP protection, (or warrant it). I
know that with the amount of email I get in a day, I wouldn't want the
extra overhead of having to decrypt it all.

Ah, but if you only encrypt the stuff that needs to be encrypted,
you're waving a red flag and saying "Hey, look! I've got something to
hide!" Better to encrypt everything you can and keep the spooks
guessing.

The overhead should be acceptable with modern hardware--and well worth
it to preserve your privacy.

-Dave



Re: Open letter

2000-07-31 Thread Michael T. Babcock

And unfortunately, zero-effort security is, with current technology, an oxymoron.
Swipe-card key systems that do the authentication would be low-effort.  Retina
scanning cameras built into your monitor to do authentication would be low effort
as well.  Until then, people have to decide if its worth their effort or not.

[EMAIL PROTECTED] wrote:

 Key management is a non-zero effort, installation is a non-zero effort,
 cost is a non-zero effort and actual usage is a non-zero effort.

 Total transparency is what I define as "easy to use" in the context
 of the average email user (who probably has an email address at AOL).
 I'm afraid anything less won't get there.




RE: Open letter

2000-07-31 Thread Ihnen, David

Would you consider PGP more than a low-effort?  It would be zero effort if
we weren't concerned about the privacy of our own secret keys, thus keeping
them encrypted behind passwords.  

Maybe an extra-low-effort system would consist of a simply speaking a
keyword into a microphone, and using voiceprint authentication to decrypt
the secret keys.  Fortunately almost all computers have the ability to read
in decent quality audio.  Sending to particular people is no effort - the
public key aquisition can be automated.

Its interesting to think of the change in load on list servers.  Would you
encrypt to the list server, who then decrypts and re-encrypts for each
client, or would there be a collaborative key for the list that everybody
had the secret to and could decrypt?  More probably we would just
cleartext-sign the messages for source authentication, for backwards
compatibility, I suspect.

Either way, it can be zero-effort for the people generating the e-mail,
outside of authenticating your personal secret key, though accepting the
e-mail has the same effort problems.

I would be signing my messages pgp, if I could, but I haven't gotten ahold
of PGP 7 yet... and the earlier versions don't work on 2000.

David


-Original Message-
From: Michael T. Babcock [mailto:[EMAIL PROTECTED]]
Sent: Monday, July 31, 2000 9:06 AM
To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Subject: Re: Open letter


And unfortunately, zero-effort security is, with current technology, an
oxymoron.
Swipe-card key systems that do the authentication would be low-effort.
Retina
scanning cameras built into your monitor to do authentication would be low
effort
as well.  Until then, people have to decide if its worth their effort or
not.

[EMAIL PROTECTED] wrote:

 Key management is a non-zero effort, installation is a non-zero effort,
 cost is a non-zero effort and actual usage is a non-zero effort.

 Total transparency is what I define as "easy to use" in the context
 of the average email user (who probably has an email address at AOL).
 I'm afraid anything less won't get there.



Re: Open letter

2000-07-29 Thread markd

 This is an open letter to the developers of the main SMTP servers
 that are used all over the Internet. In recent years, we have all
 seen in the news the many instances where our privacy has been
 compromised by big corporations or governments. Some recent
 examples include the recent survey results that showed over 50%
 of corporations in the USA check their employees Internet usage
 and e-mails

The problem with your solution is that server to server encryption
does not stop government and big corporations from looking at your
mail on the mail server after it has arrived. Ask any system admin
how hard it is to scan /var/mail or a users home directory. Answer,
it's trivial.

Since most users do not run their own mail servers, but access
one via POP/IMAP, your solution will not affect the vast majority
of people.

The *real* solution is to use some form of end-to-end encryption.
In other words, encrypt your email before it leaves your email
program (whether it be on a PC, a server or a handheld device) in
such a way that only the recipient can decrypt it. PGP and their
ilk already provide this capability.

What I do agree with is that doing this is currently way too
hard for the average user and any efforts to make this easier
are a good thing. But you need to direct your letter at the
email client programmers rather then the email server
programmers.


Regards.



Re: Open letter

2000-07-29 Thread Blackey

On Sat, 29 Jul 2000, Patrick Lambert wrote:

 compromised by big corporations or governments. Some recent
 examples include the recent survey results that showed over 50%
 of corporations in the USA check their employees Internet usage
 and e-mails, the Carnivore system from the FBI, aimed at checking
 e-mails for potential criminal activity, and the UK law that
 would force the ISPs to send all e-mails from everyone to the
 government. This is without even talking about the many crackers

AFAIK, (and I could be wrong about this), the UK law also has a section
about PGP, making it a felony to NOT produce your PGP key on demand. 

"
   The Bill means the UK government - specifically the Home Office and
   Home Secretary Jack Straw - can demand encryption keys to any and all
   data communications, with a prison sentence of two years for those who
   do not comply with the order.

(source "http://uk.news.yahoo.com/000728/101/aedvu.html")"

Most email transmitted now doesn't require PGP protection, (or warrant it). I
know that with the amount of email I get in a day, I wouldn't want the
extra overhead of having to decrypt it all.

just my $0.02





Re: Open letter

2000-07-29 Thread Adam McKenna

On Sat, Jul 29, 2000 at 11:33:33AM -0700, [EMAIL PROTECTED] wrote:
 What I do agree with is that doing this is currently way too
 hard for the average user and any efforts to make this easier
 are a good thing. But you need to direct your letter at the
 email client programmers rather then the email server
 programmers.

I would have agreed with this 5 years ago, but the current version of WinPGP
for windows is so easy to use, that I don't believe this is the reason
anymore.  I think the majority of people don't use PGP/PKI for the following
reaons:

1)  They don't know it exists
2)  They don't want to spend the money on PGP (if they're not eligible to use
the freeware version
3)  They just don't consider their privacy to be important enough to warrant
the installation of a new software package.

--Adam



Re: Open letter

2000-07-29 Thread markd

On Sat, Jul 29, 2000 at 04:39:42PM -0400, Adam McKenna wrote:
 On Sat, Jul 29, 2000 at 11:33:33AM -0700, [EMAIL PROTECTED] wrote:
  What I do agree with is that doing this is currently way too
  hard for the average user and any efforts to make this easier
  are a good thing. But you need to direct your letter at the
  email client programmers rather then the email server
  programmers.
 
 I would have agreed with this 5 years ago, but the current version of WinPGP
 for windows is so easy to use, that I don't believe this is the reason
 anymore.  I think the majority of people don't use PGP/PKI for the following
 reaons:
 
 1)  They don't know it exists
 2)  They don't want to spend the money on PGP (if they're not eligible to use
 the freeware version
 3)  They just don't consider their privacy to be important enough to warrant
 the installation of a new software package.

Key management is a non-zero effort, installation is a non-zero effort,
cost is a non-zero effort and actual usage is a non-zero effort.

Total transparency is what I define as "easy to use" in the context
of the average email user (who probably has an email address at AOL).
I'm afraid anything less won't get there.


Regards.