On Tue, Jul 28, 2020 at 02:02:06PM -0400, Wietse Venema wrote:

> > The MSA needs be authenticated before password-equivalent authentication
> > is performed.
> 
> Authenticate what hostname? The SRV record is like an MX record on
> steroids, there are no guarantees about what hostname to expect. 

Exactly, and yet, implicit (or perhaps even explicit, I don't recall the
details) in RFC6186 is the expectation that the hostname to be checked
in the certificate will be the *target* of the SRV RRset.

There are of course SRV-ID subject alternative names, which would be fit
for purpose, but no mainstream CA that I know of issues such
certificates.

> Is DNS over HTTP supposed to be the answer for that?

No, that's just a transport, what's needed is authenticity of the data,
while DoH and DoT are only about privacy.  For authentic DNS records,
what's needed is DNSSEC.

Now of course a particular domain's MSAs could include in their
certificates some fixed name associated with the owner-name of
the SRV RRset, and the SMTP client could be configured to expect
that name, rather than the SRV target, but I wonder how common
such deployments are in the wild.

What I see much more often than RFC6186 is various "autodiscover"
names in DNS, which serve XML data describing service location
in more detail than an SRV record:

    
https://www.blackhat.com/docs/asia-17/materials/asia-17-Nesterov-All-Your-Emails-Belong-To-Us-Exploiting-Vulnerable-Email-Clients-Via-Domain-Name-Collision-wp.pdf

Deployment of RFC6186 is AFAIK rather thin at present.

-- 
    Viktor.

Reply via email to