Skip to content

Commit

Permalink
clean up one last doc
Browse files Browse the repository at this point in the history
  • Loading branch information
dkg committed Dec 22, 2016
1 parent fa03e7f commit f2fd45a
Show file tree
Hide file tree
Showing 3 changed files with 33 additions and 54 deletions.
9 changes: 0 additions & 9 deletions doc/index.rst
Original file line number Diff line number Diff line change
Expand Up @@ -52,15 +52,6 @@ and privacy enthusiasts.

:doc:`faq`

unsorted collection of docs and fragments
+++++++++++++++++++++++++++++++++++++++++

The following docs need refinement and incorporation into
our sorted, maintained collection.

:doc:`message-encryption`


.. _`contact channels`:

Channels
Expand Down
45 changes: 0 additions & 45 deletions doc/message-encryption.rst

This file was deleted.

33 changes: 33 additions & 0 deletions doc/next-steps.rst
Original file line number Diff line number Diff line change
Expand Up @@ -63,3 +63,36 @@ see :doc:`backup`
.. todo::

We need guidance on how backups might be done safely.


Guidance on masking Key IDs
---------------------------

If any recipients are in `Bcc:` (rather than `To:` or `Cc:`), and the
key types used are all OpenPGP (`type=p`), then the agent SHOULD mask
the recipient key ID in the generated PKESK packets that correspond to
the Bcc'ed recipents. It does not need to mask recipient key IDs of
normal recipients.

Masking of Key IDs is done by setting the key ID to all-zeros. See
the end of section 5.1 RFC 4880 for more details. Users of GnuPG can
use the `--hidden-recipient` argument to indicate a recipient who will
be masked.

This is so that the message encryption does not leak much additional
metadata beyond what is already found in the headers of the message.
It still leaks the number of additional recipients, but the additional
work and usability issues involved with fixing that metadata leak
suggest that it's better to leave that to a future level.


Encrypted headers
-----------------

.. todo::

Document interaction with encrypted headers: if something like
memoryhole ever makes it possible to hide normal `To:` and `Cc:`
headers, then we need to rethink our approach to handling PKESK
leakage further.

0 comments on commit f2fd45a

Please sign in to comment.