Automatic key verification / CERT in DNS / RFC4398
Julian Mehnle
julian at mehnle.net
Tue Apr 4 15:37:35 CEST 2006
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Jeroen Massar wrote:
> [GnuPG 1.4.3 / Public Key Association (PKA) / CERT in DNS / RFC 4398]
> Can we start doing automatic key verification for mail !?
>
> It would be really good if there would now come a draft which will
> propose the standard order of getting a key, when one doesn't have it or
> wants to get it again. This release of GnuPG allows one to already
> specify it. It would be really good if this was standardized and also
> implemented. Especially in combination with a domain policy (which could
> be incorporated in say SPF).
Indeed the SPF project has plans to introduce another revision of the SPF
protocol, now that SPFv1 (v=spf1) will be out as an IETF RFC within the
next few weeks. While v=spf1 only supports IP-address-based authenti-
cation of the envelope sender, the idea has long been for SPF to be much
more than that, i.e. to be a "Sender Policy Framework" allowing domain
owners to specify a wide range of policies, covering non-envelope (RFC
2822) identities and authentication methods like DKIM, PGP, and S/MIME.
The rough timeline could be for that revision to be released sometime in
Q3/2006 to Q1/2007, depending on the feature set chosen (which is still
open to debate).
> Thus, eg I mail from jeroen at unfix.org, one can lookup _policy.unfix.org,
> which will say "mail:PGP:required" or something similar. SMTP
> clients/servers receiving mail signed by me, can then use one, or more,
> of the key retrieval techniques to fetch the key. PKA + Cert become very
> good for this and thus allow automatic verification. When the mail is
> not signed or falsely signed, one can discard the message based on the
> policy.
> [...]
> This all though leads to a concern on the placing of the CERTS. Having a
> large user base would mean that one has say 600k records or more in the
> main zone for a domain, which gets reloaded every now and then when one
> needs to update it. It would IMHO be better to be able to off load those
> records to say _cert.example.org. [...]
While for v=spf1 mostly TXT RRs are used in practice, SPF has been assigned
a dedicated "SPF" RR type (code 99), which is already being used (queried)
by a few implementations. Also, SPF's macro feature would be useful for
specifying custom DNS zone layouts for where to search for key records.
(Are there ones besides CERT/RFC2538/RFC4398?)
What do folks -- especially the gnupg-devel ones -- think about using SPF
for that purpose? Are there any non-obvious fundamental issues that need
to be taken into account?
Julian.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)
iD8DBQFEMnagwL7PKlBZWjsRAqKmAKDbwBS6mMeL5iTJXs6hruyVg7wHqACeMyVg
nP5IOM8KGtZE8+v9P9Jdj+s=
=IowF
-----END PGP SIGNATURE-----
More information about the Gnupg-devel
mailing list