On Fri, Aug 21, 2015 at 10:41:49PM -0700, Alice Wonder wrote:

> I received a rather weird e-mail, it seems to have been generated by an MTA
> because it was sent to the e-mail listed as the contact in my certificate,
> the e-mail listed in whois for my domain, and the postmaster e-mail.

Sorry my DANE monitoring notices look "weird", at least some people
find them informative.

> It claims:

    s/claims/states/

> Only certificate usages DANE-TA(2) and DANE-EE(3) are supported
> with SMTP.  See:
>
> https://tools.ietf.org/html/draft-ietf-dane-smtp-with-dane-19#section-3.1.3

Correct.

> ---
> 
> The certificate is a 1 0 1 and not a 3 0 1
> 
> It seems to suggest that I change the TLSA record to 3 0 1

Or even better a "3 1 1".

> 
> I get that other SMTP servers shouldn't be expected to do CA validation, but
> should one really mis-identify a CA signed cert as self-signed just because
> the other MTAs are not going to be able to validate it?

It is not a "mis-identification" or a "mis-representation" to
publish a DANE end-entity (usage 3) binding for a CA-issued
certificate.

> It seems more logical to me that if an MTA is using DANE validation and
> encounters a certificate with a 0 or 1 that it treat the certificate as if
> it was a 2 or 3 rather than asking the other MTA to mis-identify the
> certificate.

There is no "mis-identification".  You'd be publishing a TLSA
certificate binding that is self-contained and independent of the
public CA Web PKI.  Just because a certificate is issued by a
public CA, does not mean that the DANE record for opportunistic
TLS needs to be a "CA constraint". See also:

    https://tools.ietf.org/html/draft-ietf-dane-ops-16#section-4.1

> A certificate has to be used for TLS communication, whether it is
> self-signed or not doesn't matter - the TLSA fingerprint can still be
> validated whether it is a 1 0 1 or 3 0 1 TLSA entry.
> 
> So why would an IETF draft suggest that they shouldn't be used?

The drafts contain explanations that need not be repeated here.
Note that usage 0 cannot be safely mapped to usage 2, because the
usage 0 publisher might not be including self-signed root certs in
his wire chain (e.g. Microsoft Exchange TLS can't send root certs
in the chain).  And if all SMTP clients map PKIX-EE(1) to DANE-EE(3),
the right thing to do is to *publish* 3, and not rely on there being
an ad-hoc mapping that violates the standard semantics of the record.

> Expecting administrators with signed certificates to break the RFC for DANE
> just because some (all?) MTAs will not check with a CA seems bad.

No, breaking the RFC would be not adhering to the published usage
semantics.  Publishing usage 3 for a CA issued cert is entirely
valid.

-- 
        Viktor.

Reply via email to