spellchecker!

master
Bernie Hoeneisen 3 years ago
parent fa6b406c8e
commit 96c8918160

@ -18,7 +18,7 @@ normative:
RFC3156: # PGP/MIME #
RFC4880: # OpenPGP #
RFC4949:
RFC5322: # STMP #
RFC5322: # SMTP #
RFC7435: # Opportunistic Security #
I-D.melnikov-iana-reg-forwarded:
I-D.birk-pep:
@ -51,7 +51,7 @@ The pretty Easy privacy (pEp) propositions for email are based upon already
existing email and encryption formats (as PGP/MIME) and designed to allow for
easy implementable and interoperable opportunistic encryption: this ranges
from key distribution, secret key synchronization between own devices to
mechanims of metadata and content protection. This is achieved by
mechanisms of metadata and content protection. This is achieved by
moving the whole message (not only the body part) into the PGP/MIME encrypted
part. The proposed pEp Email Formats not only achieve simple forms of metadata
protection (like subject encryption), but also allow for sending email
@ -98,7 +98,7 @@ the following three objectives of pretty Easy privacy (pEp):
1. make email encryption as automatic as possible,
1. protect as much metadata as possible, and
1. provide an easy way to authenticate communicaton partners.
1. provide an easy way to authenticate communication partners.
A reference implementation of pEp for email is available for all major
platforms and it has been ported to many programming languages
@ -151,7 +151,7 @@ Examples:
security-wise, as centralized cryptographic key subversion at-scale is made
cheaper. Instead, key distribution MUST be handled in-band while communicating with other peers.
* No trust information MUST be attached to the communication partner's public
keys. This is metadata which MUST be held locally and seperately from the
keys. This is metadata which MUST be held locally and separately from the
keys. Trust is established between the peers directly (peer-to-peer) and no
trust information is held centrally (no support for the Web
of Trust): that is, while pEp MUST be able to work with OpenPGP keys which
@ -211,7 +211,7 @@ and MUST NOT happen on a server infrastructure.
All relevant pEp mechanisms and state information about other peers MUST be
held locally, on a peer's end-device. There MUST NOT be any reliance
on a email server or even a centralized network component to hold
relevant information for peers to be able to communicatate or to authenticate
relevant information for peers to be able to communicate or to authenticate
themselves. Email servers (like, SMTP or IMAP) are only used as transport
infrastructure for messages, but MUST not be relevant to hold actual state
between peers.
@ -229,7 +229,7 @@ identity, in which case the same key is attached to it.
All information about communication partners, like identities, keys and
aliases MUST be held on a user's end-device as state information. This SHOULD
be done using a structured format, to faciliate the synchronization of state
be done using a structured format, to facilitate the synchronization of state
information across various devices, taking into account multi-device scenarios,
which are common today.
@ -401,7 +401,7 @@ other MIME entities has
(1) a "text/plain" MIME entity with the PGP-encrypted content, and
(2) the sender's tranferable public key at the very end.
(2) the sender's transferable public key at the very end.
This variant MUST NOT be produced anymore.
@ -475,7 +475,7 @@ Decrypting "msg.asc" results in a multipart/mixed node, with three elements:
(1) a text part indicating this is the encapsulated message
(2) the origninal message encapsulated by a "message/rfc822" MIME
(2) the original message encapsulated by a "message/rfc822" MIME
entity, and
(3) the transferable sender's public key in ASCII-armored format.
@ -487,7 +487,7 @@ An unwrapped example looks like this:
{::include examples/msg-part-decrypted-pef-2-0.mkd}
{::include ../shared/fence-line.mkd}
<!-- HB: Isn't this simply a repetion of PEF-1.0?
<!-- HB: Isn't this simply a repetition of PEF-1.0?
##### Example PEF-2.0: pEp to non-pEp {#pef-2-0-ex1-compat}
@ -504,7 +504,7 @@ but immediately exposes the MIME content part(s), with the transferable
sender's public key at the very end. There's no full email encapsulation,
such that only the Subject header field gets protected by default.
Concretly, that "msg.asc" element, when decrypted, looks like the following:
Concretely, that "msg.asc" element, when decrypted, looks like the following:
#{::include ../shared/fence-line.mkd}
@ -517,16 +517,16 @@ Concretly, that "msg.asc" element, when decrypted, looks like the following:
### pEp Email Format 2.1 {#pef-2-1}
pEp Email Format 2.1 (PEF-2.1) introduces further pEp-specific header
fields to the inner message, which help to determine the behaviour
fields to the inner message, which help to determine the behavior
between pEp users.
<!-- TODO: Explain that behaviour. -->
<!-- TODO: Explain that behavior. -->
In normal interpersonal messaging those additional header fields are:
(1) "X-pEp-Wrapped-Message-Info: INNER" header field stating that the
message carrying this is to be considered the most inner message
containing the original email (this is particulary relevant for mixnet
containing the original email (this is particularly relevant for mixnet
or other scenarios of nested messaging; cf. {{pEp.mixnet}})
(2) "X-pEp-Sender-FPR" header field with the value set to sender's full 160-bit
@ -606,7 +606,7 @@ rely on the plaintext "pEp-Message-Wrapped-Info: OUTER" and
nested message and its encrypted header fields.
On the wire, no difference is visble to example {{pef-2-1-ex1}} above:
On the wire, no difference is visible to example {{pef-2-1-ex1}} above:
#{::include ../shared/fence-line.mkd}
@ -625,7 +625,7 @@ The "msg.asc" part, on the other hand, looks like this:
Please note that this basically is a PEF-2.0 format, but with the additional
pEp-specific headers for the wrapped RFC 822 message.
This ensures interoperablity with clients which are only capable of rendering
This ensures interoperability with clients which are only capable of rendering
PEF-2.0.
##### Example PEF-2.1: pEp to non-pEp
@ -669,7 +669,7 @@ recipients
1. Bcc recipients for which no encryption keys are available
1. Bcc recipients for which encryption keys are avialble
1. Bcc recipients for which encryption keys are available
It's RECOMMENDED that if the original message the user drafted is
saved in the user's sent folder, that all recipient
@ -727,7 +727,7 @@ most end-user scenarios, the servers users work with, are considered
untrusted.
For trusted environments (e.g., in organizations) and to conform to legally
binding archivign regulations, pEp implementations MUST provide a
binding archiving regulations, pEp implementations MUST provide a
"Trusted Server" option. With the user's explicit consent (opt-in),
unencrypted copies of the Messages MUST be held on the mail servers
controlled by the organization.
@ -745,7 +745,7 @@ However, the key length MUST be at least 2048 bits. Elliptic curve keys with
at least 256 bits MUST be supported, but SHOULD NOT yet be generated and
announced by default for interoperability reasons.
If for an identity there's an RSA keypair with less than 2048 bits, new keys
If for an identity there's an RSA key pair with less than 2048 bits, new keys
MUST be generated.
## Private Keys
@ -959,7 +959,7 @@ standardizing pEp. {{ISOC.bnet}}
* Describe / Reference KeySync (and other sync, through IMAP)
* Add keypair revocation strategy
* Add key pair revocation strategy
* Create clearer relations to the pEp rating draft (draft-marques-pep-rating),
as this plays an important role in how Messages are rendered and how they
@ -974,3 +974,16 @@ standardizing pEp. {{ISOC.bnet}}
situations / mirrors and describe operations.
* Explain Key Mapping (between OpenPGP and S/MIME)
<!-- LocalWords: utf docname toc sortrefs symrefs MIMESEC keysync
-->
<!-- LocalWords: interoperable mixnet MUAs plaintext se HB pef IMAP
-->
<!-- LocalWords: ux URI URIs pEpkey asc msg artefacts msc compat
-->
<!-- LocalWords: FPR RSA unsecure Volker Hoeneisen Programme ISOC
-->
<!-- LocalWords: bnet Changelog artefact TODOs KeyImport KeySync
-->
<!-- LocalWords: EncStatus
-->

@ -436,14 +436,14 @@
<link href="#rfc.authors" rel="Chapter">
<meta name="generator" content="xml2rfc version 2.45.3 - https://tools.ietf.org/tools/xml2rfc" />
<meta name="generator" content="xml2rfc version 2.40.0 - https://tools.ietf.org/tools/xml2rfc" />
<link rel="schema.dct" href="http://purl.org/dc/terms/" />
<meta name="dct.creator" content="Marques, H." />
<meta name="dct.identifier" content="urn:ietf:id:draft-pep-email-00" />
<meta name="dct.issued" scheme="ISO8601" content="2020-07-03" />
<meta name="dct.abstract" content="The pretty Easy privacy (pEp) propositions for email are based upon already existing email and encryption formats (as PGP/MIME) and designed to allow for easy implementable and interoperable opportunistic encryption: this ranges from key distribution, secret key synchronization between own devices to mechanims of metadata and content protection. This is achieved by moving the whole message (not only the body part) into the PGP/MIME encrypted part. The proposed pEp Email Formats not only achieve simple forms of metadata protection (like subject encryption), but also allow for sending email messages through a mixnet. Such enhanced forms of metadata protection are explicitly in scope of this document. The goal of pEp for email is to automate operations in order to make email encryption usable by a wider range of Internet users, to achieve wide application of confidentiality and privacy practices in the real world. The proposed operations and formats are targeted to Opportunistic Security scenarios and are already implemented in several applications of pretty Easy privacy (pEp). " />
<meta name="description" content="The pretty Easy privacy (pEp) propositions for email are based upon already existing email and encryption formats (as PGP/MIME) and designed to allow for easy implementable and interoperable opportunistic encryption: this ranges from key distribution, secret key synchronization between own devices to mechanims of metadata and content protection. This is achieved by moving the whole message (not only the body part) into the PGP/MIME encrypted part. The proposed pEp Email Formats not only achieve simple forms of metadata protection (like subject encryption), but also allow for sending email messages through a mixnet. Such enhanced forms of metadata protection are explicitly in scope of this document. The goal of pEp for email is to automate operations in order to make email encryption usable by a wider range of Internet users, to achieve wide application of confidentiality and privacy practices in the real world. The proposed operations and formats are targeted to Opportunistic Security scenarios and are already implemented in several applications of pretty Easy privacy (pEp). " />
<meta name="dct.abstract" content="The pretty Easy privacy (pEp) propositions for email are based upon already existing email and encryption formats (as PGP/MIME) and designed to allow for easy implementable and interoperable opportunistic encryption: this ranges from key distribution, secret key synchronization between own devices to mechanisms of metadata and content protection. This is achieved by moving the whole message (not only the body part) into the PGP/MIME encrypted part. The proposed pEp Email Formats not only achieve simple forms of metadata protection (like subject encryption), but also allow for sending email messages through a mixnet. Such enhanced forms of metadata protection are explicitly in scope of this document. The goal of pEp for email is to automate operations in order to make email encryption usable by a wider range of Internet users, to achieve wide application of confidentiality and privacy practices in the real world. The proposed operations and formats are targeted to Opportunistic Security scenarios and are already implemented in several applications of pretty Easy privacy (pEp). " />
<meta name="description" content="The pretty Easy privacy (pEp) propositions for email are based upon already existing email and encryption formats (as PGP/MIME) and designed to allow for easy implementable and interoperable opportunistic encryption: this ranges from key distribution, secret key synchronization between own devices to mechanisms of metadata and content protection. This is achieved by moving the whole message (not only the body part) into the PGP/MIME encrypted part. The proposed pEp Email Formats not only achieve simple forms of metadata protection (like subject encryption), but also allow for sending email messages through a mixnet. Such enhanced forms of metadata protection are explicitly in scope of this document. The goal of pEp for email is to automate operations in order to make email encryption usable by a wider range of Internet users, to achieve wide application of confidentiality and privacy practices in the real world. The proposed operations and formats are targeted to Opportunistic Security scenarios and are already implemented in several applications of pretty Easy privacy (pEp). " />
</head>
@ -477,7 +477,7 @@
<span class="filename">draft-pep-email-00</span></p>
<h1 id="rfc.abstract"><a href="#rfc.abstract">Abstract</a></h1>
<p>The pretty Easy privacy (pEp) propositions for email are based upon already existing email and encryption formats (as PGP/MIME) and designed to allow for easy implementable and interoperable opportunistic encryption: this ranges from key distribution, secret key synchronization between own devices to mechanims of metadata and content protection. This is achieved by moving the whole message (not only the body part) into the PGP/MIME encrypted part. The proposed pEp Email Formats not only achieve simple forms of metadata protection (like subject encryption), but also allow for sending email messages through a mixnet. Such enhanced forms of metadata protection are explicitly in scope of this document.</p>
<p>The pretty Easy privacy (pEp) propositions for email are based upon already existing email and encryption formats (as PGP/MIME) and designed to allow for easy implementable and interoperable opportunistic encryption: this ranges from key distribution, secret key synchronization between own devices to mechanisms of metadata and content protection. This is achieved by moving the whole message (not only the body part) into the PGP/MIME encrypted part. The proposed pEp Email Formats not only achieve simple forms of metadata protection (like subject encryption), but also allow for sending email messages through a mixnet. Such enhanced forms of metadata protection are explicitly in scope of this document.</p>
<p>The goal of pEp for email is to automate operations in order to make email encryption usable by a wider range of Internet users, to achieve wide application of confidentiality and privacy practices in the real world.</p>
<p>The proposed operations and formats are targeted to Opportunistic Security scenarios and are already implemented in several applications of pretty Easy privacy (pEp).</p>
<h1 id="rfc.status"><a href="#rfc.status">Status of This Memo</a></h1>
@ -633,7 +633,7 @@
<ol>
<li>make email encryption as automatic as possible,</li>
<li>protect as much metadata as possible, and</li>
<li>provide an easy way to authenticate communicaton partners.</li>
<li>provide an easy way to authenticate communication partners.</li>
</ol>
<p id="rfc.section.1.p.9">A reference implementation of pEp for email is available for all major platforms and it has been ported to many programming languages (cf. <a href="#implementation-status" class="xref">Section 11</a> for an overview).</p>
<h1 id="rfc.section.1.1">
@ -675,7 +675,7 @@
<ul>
<li>pEp implementers MUST NOT make queries to public key servers by default. The reason for this is to make it more expensive for centralized network actors to learn a user&#8217;s social graph. This is also problematic security-wise, as centralized cryptographic key subversion at-scale is made cheaper. Instead, key distribution MUST be handled in-band while communicating with other peers.</li>
<li>No trust information MUST be attached to the communication partner&#8217;s public keys. This is metadata which MUST be held locally and seperately from the keys. Trust is established between the peers directly (peer-to-peer) and no trust information is held centrally (no support for the Web of Trust): that is, while pEp MUST be able to work with OpenPGP keys which carry trust information, this trust information MUST not be used to signal any trust level.</li>
<li>No trust information MUST be attached to the communication partner&#8217;s public keys. This is metadata which MUST be held locally and separately from the keys. Trust is established between the peers directly (peer-to-peer) and no trust information is held centrally (no support for the Web of Trust): that is, while pEp MUST be able to work with OpenPGP keys which carry trust information, this trust information MUST not be used to signal any trust level.</li>
<li>pEp-enabled MUAs MUST either engage in a signed-and-encrypted communication or in unsigned plaintext communication. While the signatures attached to plaintext messages can be verified, signed-only messages per se do not increase security as long as the corresponding public key is not authenticated. Signed-only messages do not improve privacy either.</li>
</ul>
<h1 id="rfc.section.2.2">
@ -703,7 +703,7 @@
<h1 id="rfc.section.2.6">
<a href="#rfc.section.2.6">2.6.</a> <a href="#peer-to-peer" id="peer-to-peer">Peer-to-Peer</a>
</h1>
<p id="rfc.section.2.6.p.1">All relevant pEp mechanisms and state information about other peers MUST be held locally, on a peer&#8217;s end-device. There MUST NOT be any reliance on a email server or even a centralized network component to hold relevant information for peers to be able to communicatate or to authenticate themselves. Email servers (like, SMTP or IMAP) are only used as transport infrastructure for messages, but MUST not be relevant to hold actual state between peers.</p>
<p id="rfc.section.2.6.p.1">All relevant pEp mechanisms and state information about other peers MUST be held locally, on a peer&#8217;s end-device. There MUST NOT be any reliance on a email server or even a centralized network component to hold relevant information for peers to be able to communicate or to authenticate themselves. Email servers (like, SMTP or IMAP) are only used as transport infrastructure for messages, but MUST not be relevant to hold actual state between peers.</p>
<h1 id="rfc.section.2.7">
<a href="#rfc.section.2.7">2.7.</a> <a href="#ux" id="ux">User Experience (UX)</a>
</h1>
@ -712,7 +712,7 @@
<a href="#rfc.section.2.8">2.8.</a> <a href="#identity-system" id="identity-system">Identity System</a>
</h1>
<p id="rfc.section.2.8.p.1">In pEp for email, a user is a person or group which can have one or more identities, each represented by email addresses. Every identity has an own key attached to it. An email address can also be an alias for an already existing identity, in which case the same key is attached to it.</p>
<p id="rfc.section.2.8.p.2">All information about communication partners, like identities, keys and aliases MUST be held on a user&#8217;s end-device as state information. This SHOULD be done using a structured format, to faciliate the synchronization of state information across various devices, taking into account multi-device scenarios, which are common today.</p>
<p id="rfc.section.2.8.p.2">All information about communication partners, like identities, keys and aliases MUST be held on a user&#8217;s end-device as state information. This SHOULD be done using a structured format, to facilitate the synchronization of state information across various devices, taking into account multi-device scenarios, which are common today.</p>
<p id="rfc.section.2.8.p.3">In pEp&#8217;s reference implementation (cf. <a href="#implementation-status" class="xref">Section 11</a>), keys are hold using the key store of the cryptographic library used, while peer-specific state information, including trust information is held in a simple relational database.</p>
<p id="rfc.section.2.8.p.4">[[ <strong>TODO</strong>: Check optimal order the following sections. ]]</p>
<h1 id="rfc.section.2.8.1">
@ -878,7 +878,7 @@ Content-Disposition: attachment; filename="pEpkey.asc"
</h1>
<p id="rfc.section.2.9.2.1.p.1">An earlier variant of PEF-1.0 started with a &#8220;multipart/mixed&#8221; MIME node, which in case of a simple text-only email without attachments and other MIME entities has</p>
<p id="rfc.section.2.9.2.1.p.2">(1) a &#8220;text/plain&#8221; MIME entity with the PGP-encrypted content, and</p>
<p id="rfc.section.2.9.2.1.p.3">(2) the sender&#8217;s tranferable public key at the very end.</p>
<p id="rfc.section.2.9.2.1.p.3">(2) the sender&#8217;s transferable public key at the very end.</p>
<p id="rfc.section.2.9.2.1.p.4">This variant MUST NOT be produced anymore.</p>
<p id="rfc.section.2.9.2.1.p.5">An example of this deprecated variant of PEF-1.0 looks as follows:</p>
<pre>
@ -977,7 +977,7 @@ Content-Disposition: inline; filename="msg.asc"
</pre>
<p id="rfc.section.2.9.3.p.10">Decrypting &#8220;msg.asc&#8221; results in a multipart/mixed node, with three elements:</p>
<p id="rfc.section.2.9.3.p.11">(1) a text part indicating this is the encapsulated message</p>
<p id="rfc.section.2.9.3.p.12">(2) the origninal message encapsulated by a &#8220;message/rfc822&#8221; MIME entity, and</p>
<p id="rfc.section.2.9.3.p.12">(2) the original message encapsulated by a &#8220;message/rfc822&#8221; MIME entity, and</p>
<p id="rfc.section.2.9.3.p.13">(3) the transferable sender&#8217;s public key in ASCII-armored format.</p>
<p id="rfc.section.2.9.3.p.14">An unwrapped example looks like this:</p>
<pre>
@ -1034,9 +1034,9 @@ Content-Disposition: attachment; filename="pEpkey.asc"
<h1 id="rfc.section.2.9.4">
<a href="#rfc.section.2.9.4">2.9.4.</a> <a href="#pef-2-1" id="pef-2-1">pEp Email Format 2.1</a>
</h1>
<p id="rfc.section.2.9.4.p.1">pEp Email Format 2.1 (PEF-2.1) introduces further pEp-specific header fields to the inner message, which help to determine the behaviour between pEp users.</p>
<p id="rfc.section.2.9.4.p.1">pEp Email Format 2.1 (PEF-2.1) introduces further pEp-specific header fields to the inner message, which help to determine the behavior between pEp users.</p>
<p id="rfc.section.2.9.4.p.2">In normal interpersonal messaging those additional header fields are:</p>
<p id="rfc.section.2.9.4.p.3">(1) &#8220;X-pEp-Wrapped-Message-Info: INNER&#8221; header field stating that the message carrying this is to be considered the most inner message containing the original email (this is particulary relevant for mixnet or other scenarios of nested messaging; cf. <a href="#pEp.mixnet" class="xref">[pEp.mixnet]</a>)</p>
<p id="rfc.section.2.9.4.p.3">(1) &#8220;X-pEp-Wrapped-Message-Info: INNER&#8221; header field stating that the message carrying this is to be considered the most inner message containing the original email (this is particularly relevant for mixnet or other scenarios of nested messaging; cf. <a href="#pEp.mixnet" class="xref">[pEp.mixnet]</a>)</p>
<p id="rfc.section.2.9.4.p.4">(2) &#8220;X-pEp-Sender-FPR&#8221; header field with the value set to sender&#8217;s full 160-bit public key fingerprint (e.g., &#8220;1234567890ABCDEF1234567890ABCDEF12345678&#8221;), and</p>
<p id="rfc.section.2.9.4.p.5">(3) the &#8220;X-pEp-Version&#8221; header field set to version &#8220;2.1&#8221;.</p>
<p id="rfc.section.2.9.4.p.6">As with PEF-2.0 <a href="#pef-2-0" class="xref">Section 2.9.3</a>, in PEF-2.1 the actual email (inner message) is encapsulated by a MIME entity (&#8220;Content-Type: message/rfc822&#8221;), which is the second part of a &#8220;multipart/mixed&#8221; MIME node. The first part of this MIME node contains a &#8220;text/plain&#8221; MIME entity, which SHOULD be used to inform about the nature of this format (in case a non-pEp client encounters in the mailbox). It MAY be used to carry the intended subject of the inner message (which is not done in current reference implementations). Like with the PEF-1.0 (cf. <a href="#pef-1-0" class="xref">Section 2.9.2</a>) and PEF 2.0 (cf. <a href="#pef-2-0" class="xref">Section 2.9.3</a>), the third (and last) part of this &#8220;multipart/mixed&#8221; MIME node MUST contain the sender&#8217;s public key.</p>
@ -1140,7 +1140,7 @@ Content-Disposition: attachment; filename="pEpkey.asc"
<p id="rfc.section.2.9.6.p.2">Messages sent or received in unencrypted form, SHOULD NOT be saved in encrypted form on the email server: this reflects the Privacy Status the user encountered when sending or receiving the email and thus meets the user&#8217;s expectations.</p>
<p id="rfc.section.2.9.6.p.3">Instead, message drafts MUST always be saved with the identity&#8217;s public key.</p>
<p id="rfc.section.2.9.6.p.4">Other messages sent and received MUST be saved encrypted by default: for most end-user scenarios, the servers users work with, are considered untrusted.</p>
<p id="rfc.section.2.9.6.p.5">For trusted environments (e.g., in organizations) and to conform to legally binding archivign regulations, pEp implementations MUST provide a &#8220;Trusted Server&#8221; option. With the user&#8217;s explicit consent (opt-in), unencrypted copies of the Messages MUST be held on the mail servers controlled by the organization.</p>
<p id="rfc.section.2.9.6.p.5">For trusted environments (e.g., in organizations) and to conform to legally binding archiving regulations, pEp implementations MUST provide a &#8220;Trusted Server&#8221; option. With the user&#8217;s explicit consent (opt-in), unencrypted copies of the Messages MUST be held on the mail servers controlled by the organization.</p>
<h1 id="rfc.section.3">
<a href="#rfc.section.3">3.</a> <a href="#key-management" id="key-management">Key Management</a>
</h1>
@ -1148,7 +1148,7 @@ Content-Disposition: attachment; filename="pEpkey.asc"
<a href="#rfc.section.3.1">3.1.</a> <a href="#key-generation" id="key-generation">Key Generation</a>
</h1>
<p id="rfc.section.3.1.p.1">A pEp-enabled Mail User Agent MUST consider every email account as an new identity: for each identity, a different key pair MUST be created automatically if no key material with sufficient length is available. By default, RSA-4096 key pairs for OpenPGP encryption <a href="#RFC4880" class="xref">[RFC4880]</a> SHOULD be generated automatically for each email account. However, the key length MUST be at least 2048 bits. Elliptic curve keys with at least 256 bits MUST be supported, but SHOULD NOT yet be generated and announced by default for interoperability reasons.</p>
<p id="rfc.section.3.1.p.2">If for an identity there&#8217;s an RSA keypair with less than 2048 bits, new keys MUST be generated.</p>
<p id="rfc.section.3.1.p.2">If for an identity there&#8217;s an RSA key pair with less than 2048 bits, new keys MUST be generated.</p>
<h1 id="rfc.section.3.2">
<a href="#rfc.section.3.2">3.2.</a> <a href="#private-keys" id="private-keys">Private Keys</a>
</h1>
@ -1490,7 +1490,7 @@ Content-Disposition: attachment; filename="pEpkey.asc"
<li>Eventually move the many TODOs into this Open Issues section.</li>
<li>Describe KeyImport to induce the import from secret keys from other devices</li>
<li>Describe / Reference KeySync (and other sync, through IMAP)</li>
<li>Add keypair revocation strategy</li>
<li>Add key pair revocation strategy</li>
<li>Create clearer relations to the pEp rating draft (draft-marques-pep-rating), as this plays an important role in how Messages are rendered and how they need to be presented (after rating) for a user to have awareness about his privacy status in any given situation.</li>
<li>Make document more coherent: check with pEp&#8217;s general draft pieces to fill on both sides and how to reference them vice-versa (this is now pending on the reworked general draft to be published).</li>
<li>Elaborate more on the X-EncStatus header field and for Trusted Server situations / mirrors and describe operations.</li>

@ -17,7 +17,7 @@ Abstract
already existing email and encryption formats (as PGP/MIME) and
designed to allow for easy implementable and interoperable
opportunistic encryption: this ranges from key distribution, secret
key synchronization between own devices to mechanims of metadata and
key synchronization between own devices to mechanisms of metadata and
content protection. This is achieved by moving the whole message
(not only the body part) into the PGP/MIME encrypted part. The
proposed pEp Email Formats not only achieve simple forms of metadata
@ -189,7 +189,7 @@ Internet-Draft pretty Easy privacy (pEp) Email July 2020
2. protect as much metadata as possible, and
3. provide an easy way to authenticate communicaton partners.
3. provide an easy way to authenticate communication partners.
A reference implementation of pEp for email is available for all
major platforms and it has been ported to many programming languages
@ -288,7 +288,7 @@ Internet-Draft pretty Easy privacy (pEp) Email July 2020
o No trust information MUST be attached to the communication
partner's public keys. This is metadata which MUST be held
locally and seperately from the keys. Trust is established
locally and separately from the keys. Trust is established
between the peers directly (peer-to-peer) and no trust information
is held centrally (no support for the Web of Trust): that is,
while pEp MUST be able to work with OpenPGP keys which carry trust
@ -358,7 +358,7 @@ Internet-Draft pretty Easy privacy (pEp) Email July 2020
All relevant pEp mechanisms and state information about other peers
MUST be held locally, on a peer's end-device. There MUST NOT be any
reliance on a email server or even a centralized network component to
hold relevant information for peers to be able to communicatate or to
hold relevant information for peers to be able to communicate or to
authenticate themselves. Email servers (like, SMTP or IMAP) are only
used as transport infrastructure for messages, but MUST not be
relevant to hold actual state between peers.
@ -377,7 +377,7 @@ Internet-Draft pretty Easy privacy (pEp) Email July 2020
All information about communication partners, like identities, keys
and aliases MUST be held on a user's end-device as state information.
This SHOULD be done using a structured format, to faciliate the
This SHOULD be done using a structured format, to facilitate the
synchronization of state information across various devices, taking
into account multi-device scenarios, which are common today.
@ -716,7 +716,7 @@ Internet-Draft pretty Easy privacy (pEp) Email July 2020
(1) a "text/plain" MIME entity with the PGP-encrypted content, and
(2) the sender's tranferable public key at the very end.
(2) the sender's transferable public key at the very end.
This variant MUST NOT be produced anymore.
@ -886,7 +886,7 @@ Internet-Draft pretty Easy privacy (pEp) Email July 2020
(1) a text part indicating this is the encapsulated message
(2) the origninal message encapsulated by a "message/rfc822" MIME
(2) the original message encapsulated by a "message/rfc822" MIME
entity, and
(3) the transferable sender's public key in ASCII-armored format.
@ -961,14 +961,14 @@ Internet-Draft pretty Easy privacy (pEp) Email July 2020
2.9.4. pEp Email Format 2.1
pEp Email Format 2.1 (PEF-2.1) introduces further pEp-specific header
fields to the inner message, which help to determine the behaviour
fields to the inner message, which help to determine the behavior
between pEp users.
In normal interpersonal messaging those additional header fields are:
(1) "X-pEp-Wrapped-Message-Info: INNER" header field stating that the
message carrying this is to be considered the most inner message
containing the original email (this is particulary relevant for
containing the original email (this is particularly relevant for
mixnet or other scenarios of nested messaging; cf. [pEp.mixnet])
(2) "X-pEp-Sender-FPR" header field with the value set to sender's
@ -1155,7 +1155,7 @@ Internet-Draft pretty Easy privacy (pEp) Email July 2020
considered untrusted.
For trusted environments (e.g., in organizations) and to conform to
legally binding archivign regulations, pEp implementations MUST
legally binding archiving regulations, pEp implementations MUST
provide a "Trusted Server" option. With the user's explicit consent
(opt-in), unencrypted copies of the Messages MUST be held on the mail
servers controlled by the organization.
@ -1181,7 +1181,7 @@ Internet-Draft pretty Easy privacy (pEp) Email July 2020
at least 256 bits MUST be supported, but SHOULD NOT yet be generated
and announced by default for interoperability reasons.
If for an identity there's an RSA keypair with less than 2048 bits,
If for an identity there's an RSA key pair with less than 2048 bits,
new keys MUST be generated.
3.2. Private Keys
@ -1743,7 +1743,7 @@ Internet-Draft pretty Easy privacy (pEp) Email July 2020
o Describe / Reference KeySync (and other sync, through IMAP)
o Add keypair revocation strategy
o Add key pair revocation strategy
o Create clearer relations to the pEp rating draft (draft-marques-
pep-rating), as this plays an important role in how Messages are

Loading…
Cancel
Save