On Wed, Jul 30, 2014 at 01:15:04AM +0200, BlueStar88 wrote:

> Am 29.07.2014 um 19:40 schrieb Viktor Dukhovni:
> > On Tue, Jul 29, 2014 at 07:24:41PM +0200, BlueStar88 wrote:
> >
> >> First we should extend DNS using another MX-like entry, to be able to
> >> define authoritative MTA client nodes for a specific domain, so we have
> >> something to stick on.
> > This was abandoned in favour of SPF, DKIM and DMARC.
> >
> >     http://tools.ietf.org/html/draft-crocker-csv-csa-00
> > It was an anti-spam measure, and has no direct bearing on TLS client
> > authentication.
> 
> That RFC is from 2005 and was considered for anti-spam, as you've said.
> But does that mean, it is buried forever?
> If we have a new - and quite serious - purpose here (having mutual TLS
> security in mind), it should be revived to support that.
> 
> If there's another way, I'm fine with that. But we have to improve here
> by any means, to keep up with the ongoing arms race.
> Having neat things like DNSSEC and DANE to backup up TLS security
> doesn't make much sense, if only one party/peer of each connection can
> uphold a certain security level.

I'm afraid magical thinking does not make progress in this space.
What's reasonable to do is constrained by what is possible to do,
(additional practical constraints also apply).  When you keep
suggesting the impossible, I can only continue to dismiss the
suggestions.

DANE is quite useful for authenticating the receiving server, even
if it plays no role in authenticating the client.  No authentication
system can magically break the asymmetry between the client and
server roles.  As I have explained multiple times it is not possible
to prevent MiTM on the server side when all clients are granted
the same authorization (to send mail to the server's domains).

Only when some clients are more authorized than others does
authentication ensure that MiTMed sessions don't hijack the authorized
privileges of the real client.

It is not possible to *prevent* MiTM on the server side.  The most
you can sometimes do is check that the alleged client identity is not
MiTMed, but that alleged identity may have been modified by the MiTM.

In other words, you can't stop downgrade attacks on the client
identity.  And I mean "can't" in a strong mathematical sense, not
in some practical sense that might change tomorrow.

Therefore, please cease the repeated suggestions that we do the
impossible.  It can't happen, and therefore it won't happen.

DANE authentication of clients won't stop MiTM.  However it can
generate an audit trail of known-good sessions, and can help to
simplify the management of custom access rights, replacing difficult
to coordinate fingerprints with associated verified reference
identities.  This could hypothentically also help with reputation
systems, ...

In no case can this help to thwart active attacks by nation-state
adversaries that want to intercept encrypted traffic.  That defense
remains the sole responsibility of the client.  No amount of magical
thinking changes this, even if my reasoning seems wrong or unclear.

-- 
        Viktor.

Reply via email to