For me, the purpose of this debate is finding out what users can expect from Mozilla by way of security. For the purpose of this question, we see below that users can be divided into corporate users and individuals.


Michael Ströder wrote:
Ian G wrote:
Well, strange...

sure, snipping this.

The root cause is that protecting e-mails is not enforced/endorsed
within companies even if they have a working infrastructure. The lack of
training is the consequence of this.

OK, so would you agree that this is not very useful for the non-company people, like yours and my mum?

If so, if we agree on that, we might also say "well, companies can look after themselves;" and/or "Mozilla has no offering suitable for secure email for ordinary users."

I don't know about you, but I'm here at Mozilla to get a solution to everyone. Companies come second in my book, because they can pay. Probably, this is just a personal fetish of mine, and I don't mind being told that Mozilla doesn't agree. But currently, its mission seems to suggest that *all users* and especially non-corporate users are the ones that Mozilla targets.


They can spot a worthless system much more easily than engineers. What they can't do is explain why it is worthless; they simply bypass it. This is why smart product is always developed in association with lots of user feedback, and paper designs generally don't succeed.

As I wrote the users themselves felt better after protecting e-mails
with encryption. They are savvy. They know that it's bad not to encrypt e-mails.

In another project my task was to explicitly support external partners
of a company with a S/MIME infrastructure to get S/MIME-enabled. A
normal user from within that company had triggered this support request.
I tried to contact the admins of several external partners to help them but they just ignored it. => the lack of security requirements in the
contracts were the root cause for failure. This has to be enhanced.


Right, but that doesn't change the underlying economic model: the use of S/MIME does not sustain itself. You need to put in fines or penalties or additional costs in order to make it work. Without that, it is not "economic". However, you always have to pay those fines/costs/penalties ... and these need to be balanced against the benefit of S/MIME. So even with the fees/rules/contracts, S/MIME is not economic until you have shown the benefit.

This is a classical failing of the security world. Having established the absolute need for "secure X" we then run around and organise the business such that there are incentives to ensure "secure X". However, there is no particular analysis that it was worth the cost, because it is assumed to be "worth any cost".


And any other signature/encryption/whatever standard will suffer from this.

If by "standard" you mean "security model," that's simply not true.

Yes, IMO the security model is part of a standard (cryptographic protocol).


Except, the things found in modern standards are more security templates or examples than models. They are more akin to recipes. If you have threats like X,Y,Z, and you have business like A,B,C, then you can do 1,2,3.

Security models are individual to businesses and individuals. They derive from threat to the persons, which again are peculiar to businesses and individuals. WYTM? Without walking that path, we are simply "protecting what we can" rather than "protecting the business."


Skype delivers the goods and takes only a few minutes of training.

I don't trust Skype! AFAIK the protocol and security model was never
publicly reviewed. And it only works with access to a central
infrastructure. I'd never accept such a thing.


Good. So you -- and a few others here -- don't like Skype. However, you are far out-numbered by the ones who do. Luckily, you have a choice in your client software, and this is not a big issue for you.

However, my point in pushing these examples is not to get you to adopt the product (choice!) but to consider the model (what you can get for very little user interaction and zero paid cost). This architectural model offers benefits that could be utilised by Mozilla's users, as opposed to what corporate customers might pay for. More below on this...


Correct me if I'm wrong, but I don't think any standards approach ever came up with a security model that works for users.

A pretty broad statement...


DNSsec, IPSec, S/MIME, PKI in general, WAP, WEP, ...

SSL was invented before it went to standards. SSH: same. OpenPGP followed the designs of PRZ then PGP Inc. Hush was a private design.

Skype never made it to standards. New payment systems also tend to avoid standards.

The point is that standards committees *may* be able to standardise an already successful design; they do not seem to have any record in creating new designs, nor fixing old designs.

As I say, correct me if I am wrong!  Counterpoints might be:  GSM?


It is a curious thing: I have been using Tbird for many years, and each time I've never managed to transport more than a portion of the stuff across. I just spent some time looking and couldn't find the magic command, so I always wonder... I know there is a thing called profiles, but where does one import & export them?

By simply copying files? That's how I'm doing it.


Right, this is out of scope for users. (And, sure, I have enough unix experience to figure it out too, but, these days I treat such a thing as a bug.)


Either your mobile also runs the apps or you have to integrate your mobile with the PC on which the whatever-you-call-your-standard-enabled app runs. The latter is the same problem space like using smartcards/readers or USB tokens as key store.

Right. Guess what: user-oriented applications like webmail, google tools, skype (cough!) and so forth solve this problem by integrating the entire database into some form of network store.

I wouldn't trust anybody to run my personal key store on the Internet.
Period.


There is an assumption that private/public keys have to be treated as key pairs, protected by the person and distributed to the public. This may be ok for a system that is built that way, but it's only an assumption.

It's just architecture, private keys are to be used, not treated like sacred objects.

Consider that most systems use password and username. This is *the standard* albeit defacto. To move this to a "personal key store on the net" scenario, we encrypt the private key with the password. Indeed, we encrypt the entire account store with the password. This way, we can log in from whereever and get access to the whole lot. The client downloads the encrypted store, decrypts it with the password, then extracts the private key.

Hey presto, an application that is better than today's standard.


And most of my friends (non IT people) don't use webmail. They
use MUAs on their PCs with POP3/SMTP.

It is odd! There are two big groups here, with no real favourites. The market isn't giving us any clear signals.


* it needs a few tweaks in UI to align it with the safe usage models, so, for example the "signing" icon has to go because it cannot be used
for signing, because signing is needed for key distribution.  It also
cannot be used for signing unless reference is made to the conditions of signing, and no UI vendor has ever wanted to give time&space to a CPS.

Maybe it's me but frankly I don't understand what you say here.
Especially I don't see the need for a "UI vendor" to define a CPS (if
Certificate Practice Statement is meant here).

Not quite, what I mean here is that somehow, the user has to figure out what is happening.

Yes.

 The PKI view is that this is done by referring to the CPS.

No.


How so? How do you define any use of certs without referring to the CPS or equivalent set of documents?

Recall Nelson's view that he does not sign anything without reading. The wider principle here is that one should not enter into an agreement unless it is understood.

Yes.

Now, applied to S/MIME, if it implied some form digital signing over emails, then it should not be used, because one cannot read the implied contract (CPS, or whatever), and nobody else is stepping up to say it's ok, sign away, we're watching your back. Full understanding is not possible, at any of many layers and levels.

Whether one would like to use S/MIME to sign something legally binding is beyond my scope. That would be a business decision evaluating the risk in a certain context.

In order to satisfy users' needs for clarity, the governance UI should present a workable human signing view to the user. But, as we have seen in recent threads, that is fantasy. It's a non-starter.

Ergo, S/MIME client UI implementations should be modified to drop any sense of signing, by default, and the digsigs should be used for integrity protection and key distribution.

You're wildly mixing stuff here.


That's partly the point. If the user can sanely untangle the stuff, then well and good. I claim she cannot. If you-as-insider can, then that's a start, but it needs to be put in a framework that is both safe for users and understandable. That we haven't got.


Everybody is a trust manager. All day everybody is making trust decisions. But there's no ultimate trust.

No user can make a trust decision without evaluation of the circumstances.

In fact evaluation of the circumstances is never done completely.


Of course.


 Without info, it is called gambling.

Yes, that's exactly what we all do each and every day when making trust decisions: If I go to a bakery in the morning buying a brezel for breakfast I have a very vague idea of whether I can really trust them for not doing any harm to my health with the food they are selling. Even though this shop has a certificate in the sales room proving that this baker has the title "Meister" (needed in Germany) it's completely impractical to evaluate all the circumstances of this little deal. So yes, it's simply gambling with high risks.


No, not at all. When you go to the bakery you get a brezel. The risk of you not getting a brezel is very low. The information you get is reliable, even if you do not "audit" the very making of your brezel. This is called risk management.

(BTW, what is a brezel?)

When you go to the casino and put some chips down on the 00, you have a 1 in 48 (or somesuch) chance of getting a win. That's called gambling. It's also highly reliable, you can calculate your odds, but the info of the future event is lacking.

Huge difference.

Well, my feeling is that I said everything I have to say in this context.


It's a tough subject :) But I think we have got to the point where your context is more or less the corporate usage, and my context is more or less the individual user.

iang
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to