From: “Attila T. Hun” <attila@hun.org>
To: Jon Callas <jon@pgp.com>
Message Hash: 75fd46577bf90c6c9b59e0865adebf54a33f3009ac47f49b0e54433f9c4dd38f
Message ID: <34482161.4AD6@hun.org>
Reply To: <19971016.032545.attila@hun.org>
UTC Datetime: 1997-10-18 02:47:26 UTC
Raw Date: Sat, 18 Oct 1997 10:47:26 +0800
From: "Attila T. Hun" <attila@hun.org>
Date: Sat, 18 Oct 1997 10:47:26 +0800
To: Jon Callas <jon@pgp.com>
Subject: Re: consensus on pgp? can we consolidate for action?
In-Reply-To: <19971016.032545.attila@hun.org>
Message-ID: <34482161.4AD6@hun.org>
MIME-Version: 1.0
Content-Type: text/plain
-----BEGIN PGP SIGNED MESSAGE-----
alas, I must have been less than clear with the
statement "sendmail type" daemon.
as Bill Stewart so aptly stated:
> sendmail is such a wretched hive of
> crime, corruption, and villainy that nobody in their right mind
> really wants to mess with it.
is an abomination; in fact, about 1980/1 or such, I had a
reason to carefully exam a few of the internals;
subsequently, Eric Allman had good reason to be very
circumspect where he crossed the street. <g> that
and the rules set of the M4 macro processor --an even worse
abomination. speaking of Eric, I have not seen or heard for
many years...?
as Bill also pointed out, somethings could be done via the
EHLO extensions, but the limitations would be to great.
secondly, as Jon Callas points out, there is the option of
TLS via SSL. however, that takes the wrapper off in a store
and forward situation and you can not control the hops.
** what I had in mind: **
literally a point to point, port to port daemon pair
--operating in a trusted pair mode.
if store and forward was necessary, there would be a
requirement for a dynamically maintained table similar
to DNS, and a means of securing the data. in order to
implement store and forward, a web of trust would be
essential, otherwise only point to point is feasible.
in other words, a system similar in function to MixMaster
except that it is fully end to end secure --well, as secure
as one can be using the IP carriers, SSL or not.
the are many nuances: for instance, provisions for key
lookup.
in all honesty, I have not been as concerned with all the
possibilities, just the design of and easily installable and
maintainable daemon to satisfy the basic requirement, and
sufficient hooks to implement functionality without
compromising security.
meanwhile, our hands are full with the PGP sell-out to the
man, willing, or kicking and screaming, or even sold out by
the vultures and beancounters with an agenda: money. even
without presuming a current sellout, I suspect the whole
affair was compromised from the gate --money talks, shit
walks; and, there are many other unanswered questions,
some which I floated a year ago; regardless, someone is
schilling for uncle.
in any event, all feedback is sincerely appreciated; none of
us, weathered and scratched old grizzlies like me, or
cheetahs new to the veldt, have a corner on ideas. to
survive, the old just get meaner, and trade on their
experience. <g>
attila
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: latin1
Comment: No safety this side of the grave. Never was; never will be
iQCVAwUBNEggyL04kQrCC2kFAQGI0wP+JPI1v675+hdVRpXGr9dnI/XBqPHbPIMk
v4PA4eIqFEVbH2j5jWXsG9pEK1DrGdFwJl26DSeV7dgkQAqOWNUdsNML2w+L8tiw
Vr+VFGBznv+1BmxoyPskWAddTtXxqKO9i6kHbNcwE2nKBG1SoxLWF6uCZdQClwME
VS5RC3jRTTQ=
=uOdC
-----END PGP SIGNATURE-----
Jon Callas wrote:
>
> At 01:18 AM 10/17/97 -0700, Bill Stewart wrote:
> At 08:40 AM 10/16/1997 +0000, Attila T. Hun wrote:
> > I have not seen any further discussion on my suggestion to
> > create a sendmail type daemon which implements DH between
> > mail clients. this, of course, is on the presumption that DH
> > is a wrapper for an already encrypted packet,
>
> DH between mail clients and servers is a really fine idea if you're
> starting from scratch, but sendmail is such a wretched hive of
> crime, corruption, and villainy that nobody in their right mind
> really wants to mess with it. You could implement it as a sendmail
> extension using the EHLO stuff, but you'd have to go get people
> to adopt it widely once you'd done it; I suppose if you could talk
> Netscape and Eudora into adding DH exchange to their client code
> and get it into a few popular servers, you'd have a large fraction
> of the Internet's email encrypted, which would be a Good Thing.
> It'd still have some major traffic analysis issues,
> and if you want to deal with the Man In The Middle problem,
> you need a key distribution infrastructure, which is much harder.
>
> An alternative approach is to encrypt everything using IPSEC,
> and you don't have to mess with Sendmail, but there are
> performance issues, and there's a lot of work getting it deployed also.
>
> There's another solution too -- make your mail servers talk with TLS
> (Transport Level Security, a.k.a. SSL).
>
> This solves some problems and not others. If your SMTP path includes any
> hops, then the message is in plaintext on that machine. Complicating it
> further, you cannot reliably enforce what the hops will be.
>
> This is one of the reasons that email keys are sometimes considered comm
> keys and sometimes storage keys.
>
> Jon
>
> -----
> Jon Callas jon@pgp.com
> Chief Scientist 555 Twin Dolphin Drive
> Pretty Good Privacy, Inc. Suite 570
> (415) 596-1960 Redwood Shores, CA 94065
> Fingerprints: D1EC 3C51 FCB1 67F8 4345 4A04 7DF9 C2E6 F129 27A9 (DSS)
> 665B 797F 37D1 C240 53AC 6D87 3A60 4628 (RSA)
Return to October 1997
Return to “Lucky Green <shamrock@cypherpunks.to>”