While double-checking logs after an MTA update, I saw something from
Gmail which is ... bemusing.  I'm wondering if there's any consensus on
how this should be handled in a manner which scales, given that Gmail
don't publish DANE records?

2018-04-16 01:14:55 [95041] 1f7sjN-000Oiu-7W
   => <censored>@gmail.com
   F=<censo...@spodhuis.org>
   P=<prvs=064468e5c1=censo...@spodhis.org>
   R=outbound_signed T=remote_dksign
   H=gmail-smtp-in.l.google.com [108.177.119.26]:25
   I=[94.142.241.89]:59754
   X=TLSv1.2:ECDHE-RSA-CHACHA20-POLY1305:256 CV=no
   DN="/OU=No SNI provided; please fix your client./CN=invalid2.invalid"
   K C="250 2.0.0 OK q15si10692445edd.343 - gsmtp" QT=1s DT=0s

What SNI do folks feel should be sent, for TLS on MX delivery, when DANE
is not in use?  Gmail has MTA-STS, but that's not even a published
standard yet, and not using SNI for a client not supporting SNI seems
"eminently sane" to me.  Further, I don't see anything in
draft-ietf-uta-mta-sts-15 saying how the SMTP clients should choose
which hostname to send in SNI.

I've overridden properties for delivery of mails for @gmail.com to
specify tlssni=gmail.com, which results in getting back the sort of DN
which I recall seeing in the past:

  DN="/C=US/ST=California/L=Mountain View/O=Google Inc/CN=mx.google.com"

but this is not scalable to all the other domains which outsource email
provision to Google.  Nor to all the other mail providers.

Should this be regarded as a sign that pressure is going to increase to
have clients implement MTA-STS, and so have some kind of https client
embedded in/alongside the MTA?

Should clients be switching to always providing SNI matching the domain,
and never reusing an SMTP connection opened to a valid MX host for mails
to recipients in other domains which use that same MX?

Or is the expectation that clients send an SNI matching the hostname of
the MX record, as per DANE, even though without DNSSEC that becomes
untrustworthy data?  That seems to me to be a security blunder to be
strenuously avoided: DANE can _only_ impose that requirement because of
DNSSEC.

Have I missed a draft/RFC somewhere which is spelling this out for the
non-DANE non-DNSSEC case?

Thanks,
-Phil

Attachment: signature.asc
Description: Digital signature

_______________________________________________
mailop mailing list
mailop@mailop.org
https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop

Reply via email to