- This thread pertains specifically to the use of P2P/DHT models
 - to replace traditional email as we know it today. There was
 - a former similarly named thread on this that diverged... from the
 - concept and challenge of P2P/DHT handling the transport and
 - lookups... back to more traditional models. This thread does not
 - care about those antique models, please do not take it there.
 - In short, we're attempting to examine and develop some form
 - of new transport that looks somewhat like a mix between secure
 - anonymous networks, string@pubkey node addressing, massive
 - decentralized dht-like scaling and finally a user facing daemon that
 - moves messages into and out of local spools for use by normal
 - user/system tools.
 - Pasting in a very rough and unflowing thread summary to date
 - for interested people to pick up and discuss, draft, etc.
 - =====
 - grarpamp...
 - > [pgp/smime email encryption, etc]
 - > What is the gap we have to close to turn this on by default?
 - How many times has this been rehashed the last six months?
 - You can't fix email as we know it today using todays bolt-ons,
 - protocols and corporate stakeholders/services trying to profit from it.
 - The only way to have any real global seamless success is to go
 - ground up with a completely new model. IMO, that will be some
 - form of p2p message system where every address is a crypto key,
 - masked for grandma by her contact list, decrypted out your p2p
 - daemon and piped into your local mail processing (MUA/filter/lists)
 - and filesystem (encryption). At least that way your local mail tools
 - will still work (no one will give those up anyway).
 - The problem is the antique centralized backend, it needs bypassed.
 - You've got neat stuff like Tor, bittorrent, bitcoin, etc already... so
 - boost email into the 2020's the same way. Then let the old world
 - email services try to keep up, and slowly die like everything else.
 - =====
 - grarpamp...
 - On Mon, Nov 25, 2013 at 1:01 AM, ianG <iang@iang.org> wrote:
 - > On 23/11/13 15:30 PM, Ralf Senderek wrote:
 - >> On Sat, 23 Nov 2013, David Mercer wrote:
 - >>
 - >>> But of course you're right about actual current usage, encrypted email
 - >>> is an
 - >>> epic fail on that measure regardless of format/protocol.
 - >>
 - >> Yes, but it's about time we do something about that. Do we *exactly know
 - >> why* it is such a failure?
 - >
 - > It's an interesting question, and one worth studying for pedagogical
 - > motives. From my experiences from both sides, it is clear that both sides
 - > failed. But for different reasons.
 - > Hence, I've concluded that email is unsecurable.
 - Obviously. It will never be able to escape the non-body
 - header content and third party routing, storage and analysis with
 - any form of patching over today's mail. And it's completely
 - ridiculous that people continue to invest [aka: waste] effort in
 - 'securing' it. The best you'll ever get clients down to is exposing
 - a single 'To:' header within an antique transport model that
 - forces you to authenticate to it in order to despam, bill, censor
 - and control you.
 - That system is cooked, done and properly fucked. Abandon it.
 - What the world needs now is a real peer to peer messaging
 - system that scales. Take Tor for a partial example... so long
 - as all the sender/recipient nodes [onions] are up, any message
 - you send will get through, encrypted, in real time. If a recipient
 - is not up, you queue it locally till they are... no third party ever
 - needed, and you get lossless delivery and confirmation for free.
 - Unmemorable node address?, quit crying and make use of your
 - local address book. Doesn't have plugins for current clients?,
 - so what, write some and use it if you're dumb enough to mix
 - the old and new mail.
 - The only real problem that still needs solved is scalability...
 - what p2p node lookup systems are out there that will handle
 - a messaging world's population worth of nodes [billions] and
 - their keys and tertiary data? If you can do that, you should
 - be able to get some anon transport over the p2p for free.
 - Anyway, p2p messaging and anonymous transports have
 - all been dreamed up by others before. But now is the
 - time to actually abandon traditional email and just do it.
 - If you build it, they will come.
 - =====
 - fabio...
 - I'm strongly against most the ideas to abbandon current email systems,
 - because the results will be to create wallet garden.
 - We need something interoperable with existing systems or the system will
 - just be used by a bunch of paranoid people or fostered by the marketing
 - of few cryptography company acquiring customers, not user.
 - =====
 - grarpamp...
 - It would be interoperable with current end user interfaces/tools, but not
 - directly with you@some.dotcom.
 - As with everything else, today's seeds grow into tomorrows garden, sometimes
 - you just have to thorougly plow under last year's chaff first, that's by design.
 - =====
 - viktor...
 - E-mail is basically business correspondence.
 - - E-mail is stored.
 - - E-mail is sent to many people outside your personal social network.
 - - Business recipients of email are often subject to corporate and/or
 - regulatory policy constraints that are in conflict with end-to-end
 - encryption.
 - The above list of features can be greatly expanded, and the
 - consequences elaborated, but I doubt may on this list truly need
 - to be re-educated about email.
 - So I will confidently predict that end-to-end secure email will
 - remain a niche service used by a tiny minority.
 - ...
 - Even businesses that one might expect to implement at least encryption
 - to the "gateway", are in many cases choosing to out-source their
 - gateway to 3rd-party providers (anti-spam and anti-virus offerings
 - only work with un-encrypted email, and in many cases the provider
 - also operates the entire mail store).
 - ....
 - [and others also said: tls, dane, skype, smime, ca's, smtp, etc]
 - =====
 - Jerry...
 - Medical, Financial
 - =====
 - grarpamp...
 - Nothing here changes, only the backend transport between nodes.
 - Once your node decrypts the message to your local system pipes,
 - you can do all this and more with it. Including running a 'business' node
 - and doing whatever you want with the plaintext after your node daemon
 - passes it to you. This is not about those ancient protocols. It's also
 - about 'messaging' not strictly 'email'... those lines are already well
 - blurred, no need to distinguish between them anymore. A 'light'
 - messaging client could simply ignore the non transport email headers,
 - or use your standard msg@nodekey address.
 - Please do not continue to talk about antique tradional centralized
 - systems in this thread, except of course to bash and route around them.
 - The speed of a real P2P/DHT replacement at scale is a research challenge.
 - =====
 - coderman...
 - this would make an interesting bet! i too believe this to be
 - impossible given the constraints.
 - =====
 - grarpamp...
 - I'm not so sure about this, look at all the global resources being poured
 - into traditional email, and attempts to 'fix' it. Now redirect fractional 1%
 - of those resources and put them into a P2P replacement. That's ftw.
 - =====
 - natanael...
 - Say hello to Bote mail on I2P.
 - I2P provides encrypted anonymizing networking, Bote mail provides DHT
 - based serverless encrypted mailing with public crypto keys as
 - addresses (ECDSA or NTRU).
 - http://i2p2.de and i2pbote.i2p (if you don't have I2P installed, add
 - .us to visit it via an inproxy).
 - There is also I2P Messenger that is encrypted P2P IM within I2P also
 - using public keys as addresses.
 - =====
 - cane...
 - You may have a look of "I2P Bote" it is severless, encrypted mail
 - system, address is the public key, P2P based... nice tool.
 - https://en.wikipedia.org/wiki/I2P#E-mail
 - =====
 - grarpamp...
 - > You may have a look of "I2P Bote" it is severless, encrypted mail
 - > system, address is the public key, P2P based... nice tool.
 - As in another post of mine, I'll be looking at that again.
 - My first take was that it stores the messages in the DHT,
 - which didn't seem scalable or reliable at all. I may be
 - wrong as I read more later.
 - > Afterwards you can add the "I2P Bote plugin", the serverless mail
 - > system. SMTP- and POP3 support was on the ToDo list some times ago, I
 - I think that's working now. And is the general idea, create a strong
 - overlay network with a frontend MUA's can speak to.
 - As an aside: If you can make that overlay net present an IPv6 tunnel
 - interface on the local host, that lets you use any IPv6 enabled
 - app over it. I'm doubting the world needs a dozen application
 - specific overlay networks. More like just a few classes of network.
 - - message based store and forward
 - - low latency IPv6 transport
 - - data storage and retrieval
 - =====
 - natanael...
 - Bote mail doesn't have to be used for it's anonymous properties, for
 - me that is just a bonus. For many people it is more than enough to be
 - able to know that it is impossible for anybody else than the intended
 - recipient to read the message thanks to public key addressing.
 - Guaranteed end-to-end security if you can verify the address.
 - I don't think anything that doesn't fundamentally rely on public key
 - addressing is the (long term) future. There will inevitably issues
 - otherwise, including more issues of the type we have with CA:s today.
 - For those who want to make it more user friendly, nothing stops you
 - from adding a transparent "address translation layer" where servers
 - are involved. When you want to send a message to a person with a human
 - readable address at a server, then the server could then reply with
 - the public key based address to the mail client, and the user would
 - have the option to see what that address is. It could even be logged
 - by the client, with TOFU/POP style trust system that reduces the
 - amount of trust you have to place in the server. No need to trust
 - anybody with plaintext.
 - =====
 - grarpamp...
 - I suggest such interfacing with the current legacy system will only prolong
 - it's long past due extinction. Build a better system and let them come to you,
 - not the other way around. And bolting in exits will only make it harder to
 - do correctly and optimally what you need to do as a P2P system. Please,
 - just forget about interfacing with the legacy transport system. If you really
 - need that you can run your own p2p daemon node that acts as your
 - automated gateway between the two. This is mostly about design of
 - the p2p side, not that.
 - =====
 - james...
 - It is my understanding of the proposed replacement for email. Magic
 - email addresses that in fact correspond to an identifier of a public
 - key, for example the hash of a rule that identifies the public key,
 - and which result in your message not in fact being passed along by
 - email protocols.
 - =====
 - grarpamp...
 - If you're not going to send directly to the very long account@nodepubkey, then
 - yes, you'll need to create another layer on top to hold your h(key). However,
 - the key must still be obtainable behind that since that is what the messages
 - will ultimately be encrypted and routed to. It's not much of a stretch beyond
 - that to ensure userland mail tools can handle say 8k long addresses. I'm not
 - against such a [vanity/shorthash] layer.
 - =====
 - natanael...
 - Bote mail and I2P messenger are two pieces of serverless software that
 - ALREADY is public key addressed within I2P. Have you tried them? You
 - need to add the public keys of the recipients to be able to send a
 - message to start with, although the DHT based search system Seedless
 - allow you to publish Bote mail addresses to the network.
 - (IMAP support for Bote mail is planned but not yet implemented, right
 - now it has a local web interface.)
 - Maybe Namecoin could work together with them to enable you to register
 - your key addresses to your nickname in a secure manner, but then you
 - still have to have a globally unique nickname and tell people the
 - exact spelling.
 - =====
 - > ralf...
 - > If you are so sure, can you tell us how the next generation secure email
 - > solution will solve the "trust problem", please.
 - grarpamp...
 - Though unclear, that sounds like the old trust of a CA/PKI system problem.
 - > How does the p2p daemon
 - > find the correct crypto key, so that every user can rely on its invisible
 - > performance?
 - In general I suggest that people wish to use messaging with each other
 - once they already know them (or have some other trusted web to them).
 - As in, Hey John, nice to meet ya today, what's your key (address), I'll
 - message you later. Or Hey Jane, what's John's address. Same for
 - employers, businesses, etc. Such peer groups bootstrap and grow
 - very fast. Thus the perceived need for a cold lookup of Ralf, isn't much of
 - a real one.
 - Once you know the address (node crypto key), you put it 'To: <key>',
 - mua hands to spool, p2p daemon reads spool, looks up key in DHT and
 - sends msg off across the transport to the far key (node) when it is
 - reachable. Hopefully the transport looks like I2P/Tor in being a secure
 - random hop layer. In fact, those could probably be used today, they
 - have the keys as nodes and user facing ports for inbound/outbound
 - daemons. They just need scaling work to n-billion nodes (users,
 - aka: the hard part). People are already plugging postfix, bittorrent,
 - etc into these networks.
 - Tor is not currently addressible at the user level by the full key,
 - it 'shortens' the key into a 16char onion address. As you may be
 - hinting at... yes, that is bad... collisions, and needing secondary lookup
 - layers into the full key. Tor may be moving to full key addressibility
 - soon, see tor-dev for that.
 - I2P (and Phantom, and probably GnuNet) are addressible with full keys.
 - So you can send to 'account@key' with them if you want, and keep the
 - John/Jane/Ralf human style lookups in your MUA addressbook (once
 - you know them) without needing a secondary lookup layer into the full key.
 - No, I am not sure. But when looking at some of the p2p transport
 - layers that have come along so far, it seems like a fairly strong
 - possibility for a new backend transport model while retaining user
 - level mail tools... mutt, maildrop, mailman, Thunderbird, etc. Most
 - of what you'd need there is support for very long addresses and
 - split horizon handoff to local daemon/spool based on recognizing
 - what the destination net is... .onion, .i2p, etc.
 - I'd like to read what Pond and I2P-Bote are doing with some parts of
 - this as well.
 - I don't believe you need a trusted CA/PKI service to successfully
 - bootstrap users and their addresses/keys into a new global messaging
 - system. If I want to know what some unknown like Bruce's key is, I'll
 - look it up on his website, social net, list posts, etc. If that's what you
 - mean.
 - =====
 - bill...
 - I feel like I walking in halfway into a conversation, I'm guessing this
 - started on the cryptography list that I'm not on.
 - Your DHT comment caught my attention though. What in particular about
 - DHTs don't seem scalable or reliable?
 - Seems like DHTs are regularly in the 5-10M range and I don't see any
 - reason that DHTs couldn't be 10 times that.
 - Any reasonable churn rate and reliability could be handled with
 - replication. The bit-torrent DHT for instance claims that 45% of users
 - that bootstrap from a central node are reachable 15 minutes later. So
 - typical setups involve 8 nodes per bin, and 20 bins. So every 15
 - minutes you ping 160 hosts, only reach 45%, and do some work to
 - repopulate the missing slots.
 - Given the simplicity of the bit-torrent DHT I think there's plenty of
 - room for improvement. Larger routing tables are obvious (at the cost of
 - more network bandwidth to track peers).
 - The most promising idea for DHT improvements I've seen is to divide
 - peers into 3 latency groups. High, medium, and low. Much like L1
 - cache, L2 cache, and main memory. That way common queries are very
 - fast, yet all queries still to find keys globally.
 - =====
 - grarpamp...
 - Bittorrent is already in the 100m node range. That's not enough. This
 - needs to replace every possible messaging user on the planet over
 - the duration of their actiive lifetime. That's at least a couple billion nodes.
 - Don't forget, you can always use disk to cache things.
 - =====
 - > james...
 - > Need a system for handing one's keys around that protects end users from
 - > the horrifying sight of actual keys or actual strong hashes of keys.
 - john...
 - But at the same time the system has to not say, "I can't deliver your
 - message to that person because an invisible gnotzaframmit that I won't
 - describe to you seems to be unavailable to me in the flabogrommit."
 - grarpamp...
 - Address books as usual. Name layer if need be. We are humans, we
 - learn new lexicons, we write manuals, that part is nothing to be afraid of.
 - Being afraid only holds you back.
 - =====
 - > grarpamp...
 - > I don't believe you need a trusted CA/PKI service to successfully
 - > bootstrap users and their addresses/keys into a new global messaging
 - > system. If I want to know what some unknown like Bruce's key is, I'll
 - > look it up on his website, social net, list posts, etc. If that's what you
 - > mean.
 - > guido...
 - > You can use an untrusted CA to bootstrap. I show how it can be done at:
 - >
 - > http://eccentric-authentication.org/Brucon-Eccentric.pdf
 - ralf...
 - This is an interesting idea, because it provides certificates on
 - demand for ordinary users, if they decide to sign up to a certain
 - site. The
 - certs are then being used for other purposes, so the site does act as a
 - bootstap for using crypto. The one thing that this proposal relies on is
 - the availability of a common piece of software (user agent) that stores
 - the private key for the user. It's this part of the picture where things
 - get tricky.
 - grarpamp...
 - There can be no non-distributed/redundant elements in this p2p system,
 - aka: no 'sites', certainly none with a realworld IP on them, and none where
 - very high percentages of them vanishing will disrupt the system for others.
 - This must replace email, therefore system disruption is intolerable.
 - =====
 
Stikked
