> On Oct 23, 2017, at 12:17 PM, Ivan Ristic <ivan.ris...@gmail.com> wrote:
> 
> Not in practice. If you're not using vanity MX, it's obvious where the email
> is going.

Actually (ignoring for the moment the clear-text DNS query leak, which
DNSPRIV is supposed to address) the opposite is true.  When sending email
without SNI to any of the domains below the TLS network traffic looks
largely the same (no leak of the recipient domain).

We can only make progress on the pros/cons of SNI for SMTP STS if we
can get the basic facts straight.  The quoted text above is simply
wrong.

cleanis.nu. IN MX 0 cleanis-nu.mail.protection.outlook.com.
cleanis-nu.mail.protection.outlook.com. IN A 213.199.154.170
cleanis-nu.mail.protection.outlook.com. IN A 213.199.154.202

targetoo.co.uk. IN MX 0 targetoo-co-uk.mail.protection.outlook.com.
targetoo-co-uk.mail.protection.outlook.com. IN A 213.199.154.170
targetoo-co-uk.mail.protection.outlook.com. IN A 213.199.154.202

tib.nu. IN MX 0 tib-nu.mail.protection.outlook.com.
tib-nu.mail.protection.outlook.com. IN A 213.199.154.170
tib-nu.mail.protection.outlook.com. IN A 213.199.154.202

taberna.no. IN MX 10 taberna-no.mail.protection.outlook.com.
taberna-no.mail.protection.outlook.com. IN A 213.199.154.170
taberna-no.mail.protection.outlook.com. IN A 213.199.154.202

(IP addresses vary based on global DNS load balancers).

So SNI would add a privacy leak channel to SMTP TLS.  The same
leak presently exists for the DNS MX lookup, but that's
cached, so made less frequently, and may be at some point
in part addressed via DPRIV.

-- 
        Viktor.

Reply via email to