>>>>> Ben Hutchings <b...@decadent.org.uk> writes:
>>>>> On Mon, 2016-10-24 at 15:15 +0000, Ivan Shmakov wrote:
>>>>> Ben Hutchings <b...@decadent.org.uk> writes:

[…]

 >>> Those certificates look as expected.  Since TLS encryption of SMTP
 >>> between servers is opportunistic, there's no particular reason to
 >>> use a widely trusted CA for server certificates.  A MITM can just
 >>> as easily block STARTTLS as substitute their own key.

        My point is: the absence of ‘TLS’ in Received: is a cleaner
        indication of the possible tampering of the message.  On the
        contrary, its presence in the headers and (or) MX logs may turn
        to be misleading when the sending side routinely disregards the
        absence of a valid signature on the certificate.

        The “opportunisticity” of ESMTPS does not seem relevant.

 >> That’s not necessarily any different to the HTTP(S) case.

 >> For instance, when the user first uses ‘example.com’ as the resource
 >> identifier, the Web user agent (usually) issues a GET request to the
 >> said host’s HTTP server in the plain.  At which point the server
 >> responds with a 302 redirect, pointing to the resource proper (say,
 >> https://example.com/.)

 >> That behavior is hardly any less opportunistic, and is prone to the
 >> very same attack, as demonstrated by ‘sslstrip’.

 > Although that's mitigated by HSTS and bookmarking of https: URLs.

        It’s been argued that, as all the CAs are trusted equally (if at
        all) by the user agent, it makes sense to minimize the number of
        CAs trusted by any specific user – so to reduce the “attack
        surface” – and, if necessary, rely on “security exceptions”
        instead for the HTTPS sites that use X.509 certificates signed
        by marginal (with respect to that same specific user) CAs.

        Obviously, implementing RFC 6797 “No User Recourse” provision to
        the letter makes that impossible.  Now, given that it seems way
        easier to disable HSTS support altogether in the user agent than
        to patch one up to get some more sensible behavior…

        That said, I see no reason there can’t be some STRICTSECURITY
        EHLO keyword, analogous in function to the HSTS header.
        Of course, so long as non-TLS ESMTP remains functional –
        something that, unfortunately, gradually goes away for HTTP.

[…]

PS.  Now, it makes me wonder, since when are we standardizing
        applications to give more heed to the whims of the remote’s
        administrator than to the application’s own user?  Free software
        used to be better than that; or so I recall.

-- 
FSF associate member #7257  58F8 0F47 53F5 2EB2 F6A5  8916 3013 B6A0 230E 334A

Reply via email to