home *** CD-ROM | disk | FTP | other *** search
- > a) PEM is end-to-end; for it to have any value, both ends must be enabled
- > for PEM. Feasible for a small group, but not for ubiquitous e-mail (yet) -
- > just think of the key management problems for 20,000 naive users. How would
- > PEM fit into IMAP? It would render all IMAP's fancy MIME-searching features
- > useless, given that PEM specifically applies itself to the entire message.
- > All IMAP would see is a lot of encrypted stuff.
-
- The issue of MIME-PEM incompatibility is a general one that affects many things
- besides IMAP. This is being addressed by the PEM working group; there is an
- Internet Draft available that describes one approach to resolving this. If this
- approach is used IMAP's MIME facilities change from being inappropriate for PEM
- processing to just the thing you need to do PEM processing.
-
- There's more to PEM processing than getting at the PEM material in the message,
- however. In particular, the handling of certificates is a very nasty problem.
- An IMAP client using PEM must at a minimum be able to:
-
- (1) Retrieve the current user's certificate (including the private key).
- (2) Obtain certificates for other users.
- (3) Validate certificates for other users (this is a complex topic in its
- own right and one that can be broken up in several ways).
-
- At present there are no established protocols for doing this. X.500 may provide
- part of the solution but really isn't positioned correctly -- you can use X.500
- to obtain certificates but the X.500 client has to do all the tracking, alias
- handling, and validation itself. A SUBSTANTIAL amount of code is involved in
- doing all this stuff... This is not desireable in a lightweight client. (Nor is
- having an entire OSI stack, although LDAP presents a viable solution in this
- area.)
-
- What is needed is an extremely lightweight means of obtaining and checking
- certificates using a remote trusted server. This could be part of IMSP, I
- guess. If so, there has to be mutual authentication of client and server (a la
- Kerberos) and either the IMSP protocol must support encryption of various
- pieces of critical data or the entire data stream must be encrypted. I would
- prefer the former for performance reasons.
-
- Ned
-
-
-