Replies: 1 comment 2 replies
-
The whole purpose of these guides is to have a public repo of the certs. Despite the fact it is not so realistic add/modify DNS records for every email account, it does not solve the problem of verification. The problem can be solved more efficiently by setting up a server to get the public cert before the encryption at ISP level, like PGP does. If you want to send an encrypted mail to john.doe@foobar.com would be as simplest as querying to foobar.com server asking for the john.doe cert. This is not standardized but it could be. Publishing CASTLE public keys in the DNS record would not do the trick. When browsers, email clients or Acrobat validate the signature, they use their own local trust stores. At each update, they refresh the local stores, but this is not something online. Plus, it does not add valuable trust to the chain. The trust of a signature does not come by the signer's certificate itself, but signer's certificate is trusted previously via an agreement, audit or other offline mechanisms. The only way (besides enterprise agreements) is the user trust the certificate being fully aware of it, which is translated onto accepting the cert into its own local trust store. If the solely purpose is to verify the S/MIME certificate, it contains the URI of CASTLE public certificate, which can be used to validate the signature (it is applicable to all X509 certificates). The public repository, like CT, does not add trust to the chain, but transparency. Adding transparency is important, specially for detecting suspicious issues to prevent fraud and hacks, but it does not replace the processes of gaining trust. Hashing emails is useful if you want to index them. If you need only to show or display, it is enough with obfuscation. The search by email is still available without obfuscation. |
Beta Was this translation helpful? Give feedback.
-
I have recently come across this guide from 2015 on publishing PKI and GPG keys over DNS (implying DNSSEC as well probably), and I would like to hear your thoughts on how this would work here? Can we get the castle signed keys publicly trusted like this? And there are other GPG methods, such as this older guide for serving the keys. Are there equivalent S/MIME ones for those also, to basically just point to castle CA's public repository link, e.g. like a PKA record?
Regarding publishing the emails online, it seems that they simply do it by hashing the user part of the email. Isn't that compliant enough for the castle repository over the obfuscation?
Beta Was this translation helpful? Give feedback.
All reactions