On Mon, Feb 24, 2014 at 07:03:21PM +0100, Dirk St?cker wrote:

> >Nonsense.  Patrick Koetter's .de domain is DNSSEC signed.  His
> >mailserver has TLSA records.  Enabling DNSSEC does not prevent you
> >from communicating with the rest of the world.  Furthermore, you
> >can enable DNSSEC validation in your resolver before your own domain
> >is signed.  The two are independent.
> 
> So what do you think really - How long will it take until 10% of all
> mail hosts use DANE/TLSA? Wouldn't it be a good idea to at least
> increase security (even a little bit) for what we have now? I'd be
> happy when a higher percentage would support TLS at all.

With a bit of luck roughly 5 years.  Exim has not implemented DANE
yet, and the RFC for DANE TLS for SMTP has not yet been ratified
by the IETF.  The first Postfix release with DANE just came out
last month, and is not in most O/S distributions.

We should see the RFC adopted in the next few months, and Exim
implementing this year.  Getting a major provider like Gmail, Yahoo,
AOL, ... would be nice, this will take a bit longer, but will make
a big impact when it does.

I'm working with the OpenSSL team to add DANE support to OpenSSL
so that other applications can adopt DANE without doing all the
hard work from the ground up.

Changing the infrastructure on Internet scale takes time.

> But you din't answer my question: What harm would it do, when the
> checks implemented already to verify certs and domain names and
> maybe TLS protocol quality are also executed for "Opportunistic TLS"
> and the results printed in the log?

You're asking for a verification status that would indicate
conditional MITM protection:

    - False negative: MITM protection is illusory when the MX
      hostname is compromised through DNS record forgery.

    - False positive: No claim of MITM protection when the MX
      host's certificate does not match what was expected, even
      though it is the right MX host.

    - False negative: Your root CA list contains a rogue CA, or
      an intermediate CA signed by a trusted CA is rogue.

    - False positive: Your root CA list contains too few CAs.

Most Postfix users would be ill-served by such a confusing signal.

> >No, DANE secures SMTP transport between publishing servers and
> >validating clients regardless of what everyone else is doing.  The
> >adoption model is incremental.
> 
> Is there a test server I can use to verify correct function? It does
> not sound like a good idea to send some test mails to a server
> without a permission to do so.

Testing is possible without sending email.  You just need to complete
a TLS handshake.

Since with DANE we know what an authenticated connection means, we
can and likely will soon add a setting which allows DANE to optionally
fall back to an MITM vulnerable mode ("encrypt" or "may") after
logging a warning, when authentication fails or TLS is unavailable
on the server.  That will allow more cautious users to pilot DANE
without worrying about denial of service.

-- 
        Viktor.

Reply via email to