[Mailman-Developers] Encrypted lists predictable difficulties and implementation needs

J.B. Nicholson jbn at forestfield.org
Thu Mar 16 00:31:44 EDT 2017


Rich Kulawiec wrote:
> What all of this means is that once a list passes N members, where
> we can debate about N, the probability that at least one of those
> members has already been compromised even before they've joined the
> list starts rapidly increasing.

I understand there are more insecure devices on the Internet all the time 
and that's unfortunate, but I don't think it's avoidable. What do you 
suggest we do about this using Mailman (since this is Mailman-developers)?

Perhaps this means I don't understand what the goals of combining a mailing 
list and public key cryptography are (could someone please state what those 
goals are?). I took the goals to be the following:

- make changes in messages easier to identify at the endpoints. So long as 
posters use strong cryptography methods and sign+encrypt their posts. Sure, 
a compromised device could change the message between the time someone 
writes their message and the time they sign+encrypt it, thus 
signing+encrypting an altered message. But we have that problem now and I 
don't see anyone calling for all research work to stop on any number of 
other things because of it. Also, for those without compromised devices who 
know what they're doing (a smaller set of people, as you point out) posts 
to mailing lists are likely easily changeable without most people being the 
wiser or having any ability to verify short of constantly asking others 
"Did you really post this?". Given how much en route data alteration is 
going on, it seems we ought to do something to at least let the user know 
the message they're looking at has a high likelihood of not being what was 
sent.

- provide a practical means of using extant services (along with most of 
the UI expectations and technical advantages we've come to expect) to 
convey encrypted data and store encrypted data such that the plaintext of a 
message is not often exposed to any program server-side.

- allow users to do some degree of identity confirmation. With what I've 
seen in this thread so far, poster identities are as verifiable as public 
key encryption and web of trust allow. If I see a post from someone I trust 
whom I know knows how to use, say, GPG correctly I then have increased 
confidence their post was signed by them. Currently, where lists are 
typically entirely plaintext, I understand it's quite easy for someone to 
post in someone else's name and email address and for any network operator 
(such as one's ISP) to alter the data en route.

But I could have the goals of this entire endeavor completely wrong, in 
which case I await correction.


More information about the Mailman-Developers mailing list