On Dec 15, 3:37 pm, Nelson Bolyard <[EMAIL PROTECTED]>
wrote:
> Daniel Dreymann wrote, On 2007-12-14 14:41:
>
> > The embedded certificate is only a tool. CertifiedEmail is a third-
> > party signature system. First we accredit senders to establish wether
> > they are good players with a good email reputation. Then, once they
> > are accredited, we certify *individual* messages, i.e. senders request
> > a "token" which includes our signature for every message they desire
> > to send.
>
> So, you do not sign the actual messages they generate, but only your own
> tokens, which are not computed as functions of their emails?

The token includes a hash of the message (submitted to us by the
sender), hence each the token is unique and valid for one specific
message only.

> > This provides us with real-time control which is necessary to
> > ensure CertifiedEmail is not abused.  These tokens are
> > cryptographically checked by the recipient and matched to the message.
>
> Contrast that with ordinary verification of standards-based S/MIME
> signed emails.  When a recipient verifies a signature, are there any
> parts of the email that are verified in S/MIME but not in your scheme,
> or conversely, any parts of the email that are verified in your scheme
> and not in S/MIME?

The entire body and selected headers are signed. Very much like DKIM.
CertifiedEmail 2.0 will be using DKIM for the signature layer but will
include all the security mechanism inherent to CE 1.0. The main thing
to grok here is that it's a third-party signature done on a per-
message basis.

> > Contrast that with a CA who vets a sender *once* and grants them a
> > certificate that would allow them to sign as many messages as they
> > want for a year. CertifiedEmail has built-in real-time security
> > mechanisms not available to a bless-and-forget CA.
>
> I guess that offers protection for the senders who cannot trust
> themselves to sign only the mails they legitimately want to send?

No: it mainly offers protection to the RECIPIENT, who can't trust a
message just because somebody unknown (or "known" through a Cert)
signed it. If getting an EV Cert would guarantee senders unlimited
delivery with impunity, senders (incl. legit ones) would buy one and
spam freely. One of the differences here is the reputation monitoring:
send too many unwanted messages and we revoke your privileges in real-
time.

> Seriously, I see how that offers you a feeling of having more control
> than an ordinary CA has, but how do your customers (the message senders)
> benefit from your extra level of control, as compared to what they would
> gen with ordinary S/MIME signatures?

The simple answer is that S/MIME buys them nothing. When we certify
their messages, they are guaranteed: a) delivery, b) trust icon in the
UI, c) images and links not suppressed,  d) delivery reports.

> > Mailbox providers who use CertifiedEmail and control the UI (e.g.
> > webmail) show a CE trust icon next to CE messages.
>
> Yes, The reason for my interest in your "system" is the (reported) fact
> that you've gotten a bunch of major web mail providers to sign up to
> deploy it.  Those providers have not previously provided any support for
> any signed email of any kind, not even for verifying received
> signatures.  So, you have made a major accomplishment by getting them to
> adopt this.
>
> But for some reason, rather than adopting the IETF standards (e.g.
> S/MIME) for signed emails, that already are widely implemented in MUA
> products, you've implemented a new non-standard format.  I'm sure that's
> good for your business, but the advantage to others is less clear to me.

I love standards but S/MIME was inappropriate for our needs and when
we developed CE 1.0, DKIM (or even DK) didn't exist. Now that DKIM is
an IETF standard, we will rev CE to 2.0 and we'll use DKIM for the
signature layer. But please realize that the signing technology is
just a tool: the breakthrough here is the business processes and the
agreements we tie between senders and receivers: unlike non-Certified
messages which are delivered on a best-effort basis, here there's an
explicit agreement (through a trusted intermediary) between the sender
of the message and the receiving mailbox providers.

> > We will release
> > next year a plug-in for Outlook Express that does the same. We will
> > support an open source effort to develop a similar plug-in for
> > Thunderbird.
>
> Outlook Express and Thunderbird both already offer full support for IETF
> standard S/MIME signed email.  So, why invent Yet Another format?
> Why not use the existing standard?  How is support for your private
> signature system preferable to the existing support for standards based
> signatures to the users of those MUA products?
>
> As I understand it, you desired to have some additional controls that
> other CAs don't have, giving you the ability to approve each individual
> message, rather than giving blanket approval to the businesses that are
> your customers.  Surely you could have achieved that without needing to
> invent a new signed message format/protocol.

We needed to invent a protocol for the sender to submit a token
request and for us to grant it. But more importantly, we can't afford
the CE icon to be showed next to messages that are not certified by us
(or by another authority adhering to the same per-message
certification mechanism) but simply self-signed by anybody who owns a
cert. So clearly whatever built-in support for S/MIME you have in MUAs
doesn't really help.

> IMO, the achievement of getting Webmail hosts to support signature
> verification would be so much greater if it had the ability to verify
> IETF standard signed emails from any source.  The special recognition
> that is given to signatures from your company could still be
> differentiated, without necessitating new non-standard signature
> verification, nor precluding standard signature verification.

You are right. But we go to DKIM, not S/MIME.

> > I'm happy to answer any questions here.
>
> Is there an open specification for your new signed email message format?
> Is it possible for others to analyze and vet (or not :) your new design
> without doing reverse engineering?

The design has been vetted by Cryptography Research (Paul Kocher), by
ISE (Avi Rubin) and of course by the security folks at AOL, Yahoo! and
our other partners. I'm not interested in widespread distribution of
the CE 1.0 docs as we will be finalizing the specs for CE 2.0 early
next year (which we'll probably make available for download on our
website). Having said that, if you want a copy of the doc and promise
not to further distribute, ping me off-list and I'll email you a copy.
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to