Dnia 19.10.2023 o godz. 09:56:49 Joachim Lindenberg via Postfix-users pisze:
> 
> I disagree.

Of course your points are valid, to some extent:

> - without additional authenticated encryption like SMTP-DANE, your
> end-to-end encrypted messages are only protected w.r.t. confidentiality
> (except sender and recipient addresses), there is no protection w.r.t. 
> integrity,

Usually all end-to-end email encryption solutions also allow for digital
signing, so if you both encrypt and sign, you are protected in both aspects.
Of course there's the next problem:

> - there is no standardized key management (almost nobody uses the
> respective RFCs), and https://keys.openpgp.org/ imho has issues,
> preventing mass adoption. And if there were mass adoption, we would see
> end-to-end encrypted spam that is not caught by spam filters.

This can be mitigated to some extent by the fact that you can encrypt/sign
not only using PGP, but also using S/MIME, with certificates issued by known
CAs - exactly like those used for web servers; most MUAs that support S/MIME
recognize them. I regularly get some emails (for example, my bank account
statements, or bills from my ISP) signed (but not encrypted) this way. Both
MUAs I use (mutt and Evolution) recognize and verify the signature, showing
the message as "signed". Thunderbird probably does it too.

As I said - these messages are only signed, not encrypted, because that
would require from me to have my own certificate and provide my public key
to the sender. I fully agree that this isn't something that can be easily
done and there are problems with widespread adoption of encryption.

The PGP model of trust was basically developed for people who personally
know each other, so they can exchange keys in a secure way and know that the
key actually belongs to the proper person. On a large scale, S/MIME model is
much better suited for end-to-end encryption and signing. However, getting
a S/MIME certificate, that can be used to *receive* mail, costs money.
You can *send* encrypted mail with no cost if the recipient has a S/MIME
certificate and provides it to you. As the certificate is issued by a
reputable CA, you have some degree of trust that the recipient is actually
who they claim to be - so the certificate can be quite safely sent via email
(that's the purpose of certificate after all - that it can be safely
presented over an unencrypted channel).

> - if you do not trust your administrators, pick a different one service,
> at least on your side.

The reality contradicts this. A huge number of people use Gmail, while we
know for certain that Gmail scans the contents of all emails - this is used
for ad profiling and for "smart" functions of Gmail inbox, like automatically
putting due dates mentioned in email into your calendar, finding locations
mentioned in your travel tickets and showing them on the map etc. Gmail
basically wants to be "smarter" than you and suggest you what you can/should
do with the email you just received. It can even suggest you what to write
when you are writing an email, "based on your writing style". Who knows
what are the other purposes Google uses the contents of emails for. And
people seem to be completely OK with this, or they don't care.

In summary, I think the "old school" approach to email security is still
valid and widespread adoption of TLS in mail *transport* didn't change it at
all. And that approach is: always assume that email that is not end-to-end
encrypted can be read by someone else and if you have something *really
sensitive* to send, either take effort to set up end-to-end encryption,
or use another method of communication.
-- 
Regards,
   Jaroslaw Rafa
   r...@rafa.eu.org
--
"In a million years, when kids go to school, they're gonna know: once there
was a Hushpuppy, and she lived with her daddy in the Bathtub."
_______________________________________________
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org

Reply via email to