[Uta] Mirja Kühlewind's Yes on draft-ietf-uta-email-deep-09: (with COMMENT)

2017-10-23 Thread Mirja Kühlewind
Mirja Kühlewind has entered the following ballot position for draft-ietf-uta-email-deep-09: Yes When responding, please keep the subject line intact and reply to all email addresses included in the To and CC lines. (Feel free to cut this introductory paragraph, however.) Please refer to https://

Re: [Uta] STS and SNI (was Re: Interaction between MTA-STS and DANE)

2017-10-23 Thread Ivan Ristic
On Thu, Oct 19, 2017 at 10:03 AM, Daniel Margolis wrote: > Yes, I also don't see the point of vanity hosts, but I guess some people > want this for some reason. > > Ivan's language seems fine to me, for the most part, but I still wonder if > it wouldn't make STS implementation harder for MTA deve

Re: [Uta] Interaction between MTA-STS and DANE

2017-10-23 Thread Ivan Ristic
On Wed, Oct 18, 2017 at 8:39 PM, Viktor Dukhovni wrote: > > > > On Oct 18, 2017, at 3:29 PM, Daniel Margolis > wrote: > > > > Viktor, wearing your MTA-developer hat, any objections to requiring the > MTA to always send SNI? I don't know what common MTAs do about sending SNI. > > At present, Post

Re: [Uta] STS and SNI (was Re: Interaction between MTA-STS and DANE)

2017-10-23 Thread Ivan Ristic
There's another angle to take into account: SNI is mandatory to implement in TLS 1.3: https://tlswg.github.io/tls13-spec/draft-ietf-tls-tls13.html#rfc.section.9.2 For better or worse, SNI is part of TLS, and has been for more than a decade. IMO, all new standards should assume SNI by default and

Re: [Uta] STS and SNI (was Re: Interaction between MTA-STS and DANE)

2017-10-23 Thread Jeremy Harris
On 23/10/17 17:11, Ivan Ristic wrote: > On Thu, Oct 19, 2017 at 10:03 AM, Daniel Margolis > wrote: >> Ivan's language seems fine to me, for the most part, but I still wonder if >> it wouldn't make STS implementation harder for MTA developers than the >> alternative (which is to just say you can't

Re: [Uta] STS and SNI (was Re: Interaction between MTA-STS and DANE)

2017-10-23 Thread Viktor Dukhovni
> On Oct 23, 2017, at 12:24 PM, Ivan Ristic wrote: > > There's another angle to take into account: SNI is mandatory to implement in > TLS 1.3: > > > https://tlswg.github.io/tls13-spec/draft-ietf-tls-tls13.html#rfc.section.9.2 > > For better or worse, SNI is part of TLS, and has been for

Re: [Uta] STS and SNI (was Re: Interaction between MTA-STS and DANE)

2017-10-23 Thread Christian Huitema
On 10/18/2017 12:39 PM, Viktor Dukhovni wrote: > At present, Postfix always sends SNI when doing DANE and never otherwise. > The STS logic could be the same.  Mind you, SNI does introduce a privacy > leak, since SNI is sent in the clear.  So one could take the view that > the need for this is slim

Re: [Uta] STS and SNI (was Re: Interaction between MTA-STS and DANE)

2017-10-23 Thread Viktor Dukhovni
> On Oct 23, 2017, at 1:00 PM, Christian Huitema wrote: > > As Viktor says, the easy way for STS is to avoid the "multiplexed > server" scenario. In fact, that's a pretty natural use of MX records. > The MX record for "some-personal-server.com" would point to > "mta.example.net", the SNI would

Re: [Uta] STS and SNI (was Re: Interaction between MTA-STS and DANE)

2017-10-23 Thread Christian Huitema
On 10/23/2017 10:21 AM, Viktor Dukhovni wrote: >> On Oct 23, 2017, at 1:00 PM, Christian Huitema wrote: >> >> As Viktor says, the easy way for STS is to avoid the "multiplexed >> server" scenario. In fact, that's a pretty natural use of MX records. >> The MX record for "some-personal-server.com"

Re: [Uta] STS and SNI (was Re: Interaction between MTA-STS and DANE)

2017-10-23 Thread Viktor Dukhovni
> On Oct 23, 2017, at 1:39 PM, Christian Huitema wrote: > >> So while there is just one default certificate serving each of the >> millions of hosted domains, the SNI would leak the exact name of >> each domain. > > Maybe add a discussion of this specific privacy issue in the draft? It > looks

Re: [Uta] STS and SNI (was Re: Interaction between MTA-STS and DANE)

2017-10-23 Thread Ivan Ristic
On Mon, Oct 23, 2017 at 7:37 PM, Viktor Dukhovni wrote: > > In other words, where's the data that makes it possible to > understand whether SNI is actually useful, or mostly just > an auto-pilot design to look like virtual-hosting with HTTPS > where the requirements are very different. > Correct

[Uta] Establishing minimum TLS requirements for use with STS

2017-10-23 Thread Ivan Ristic
At present, STS doesn't impose any restrictions on the quality of TLS connection. Historically, new RFCs and protocols have been the only opportunity to enforce better security. For comparison, HTTP/2 introduced a requirement to use TLS 1.2 and suites with forward security and authenticated encrypt

Re: [Uta] Establishing minimum TLS requirements for use with STS

2017-10-23 Thread Yaron Sheffer
Which all sounds like RFC 7525, the TLS BCP, that was published by this very working group. Thanks, Yaron On 23/10/17 14:09, Ivan Ristic wrote: At present, STS doesn't impose any restrictions on the quality of TLS connection. Historically, new RFCs and protocols have been the only opp

Re: [Uta] Establishing minimum TLS requirements for use with STS

2017-10-23 Thread Andrei Popov
* …however the HTTP/2 approach seems sound overall. HTTP/2 RFC violates protocol layering by imposing restrictions on TLS parameters when the HTTP/2 ALPN ID is negotiated. When an HTTP/2 server is running on top of a general-purpose TLS stack, the TLS stack has to either implement HTTP/2-spe

Re: [Uta] STS and SNI (was Re: Interaction between MTA-STS and DANE)

2017-10-23 Thread Viktor Dukhovni
> On Oct 23, 2017, at 4:56 PM, Ivan Ristic wrote: > > Correct me if I am wrong, but at present no one checks if presented SMTP > certificates are valid. In fact, a major reason we need MTA-STS is to make a > clean start. You're not going to get the real-world data you're looking for > becaus

Re: [Uta] Establishing minimum TLS requirements for use with STS

2017-10-23 Thread Ivan Ristic
What you're describing is a usability problem. For example, HTTP/2 specifies a mandatory-to-implement suite (TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256); if the software implementing HTTP/2 followed the RFC, everything would just work. For example, they could refuse to run with invalid configuration, fo

Re: [Uta] Establishing minimum TLS requirements for use with STS

2017-10-23 Thread Andrei Popov
* For example, HTTP/2 specifies a mandatory-to-implement suite (TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256); if the software implementing HTTP/2 followed the RFC, everything would just work. For example, they could refuse to run with invalid configuration, forcing the issue. Whether connections s

Re: [Uta] STS and SNI (was Re: Interaction between MTA-STS and DANE)

2017-10-23 Thread Ivan Ristic
On Mon, Oct 23, 2017 at 10:45 PM, Viktor Dukhovni wrote: > > > > On Oct 23, 2017, at 4:56 PM, Ivan Ristic wrote: > > > > Correct me if I am wrong, but at present no one checks if presented SMTP > certificates are valid. In fact, a major reason we need MTA-STS is to make > a clean start. You're n

Re: [Uta] STS and SNI (was Re: Interaction between MTA-STS and DANE)

2017-10-23 Thread Viktor Dukhovni
> On Oct 23, 2017, at 6:39 PM, Ivan Ristic wrote: > >> If we conclude that there's no need for virtual-hosting of TLS >> (multiple chains at the same transport endpoint) with MTA-to-MTA >> SMTP, then there's demonstrably no need for SNI, no matter how >> much goodness it brings to the Web. > >

Re: [Uta] Mirja Kühlewind's Yes on draft-ietf-uta-email-deep-09: (with COMMENT)

2017-10-23 Thread Keith Moore
-- COMMENT: -- The document reads like a BCP to me. Was it discussed in the group to go for BCP? If yes, why was it decided to go not for BCP? If no, I would str

[Uta] Adam Roach's Yes on draft-ietf-uta-email-deep-09: (with COMMENT)

2017-10-23 Thread Adam Roach
Adam Roach has entered the following ballot position for draft-ietf-uta-email-deep-09: Yes When responding, please keep the subject line intact and reply to all email addresses included in the To and CC lines. (Feel free to cut this introductory paragraph, however.) Please refer to https://www.i

Re: [Uta] Adam Roach's Yes on draft-ietf-uta-email-deep-09: (with COMMENT)

2017-10-23 Thread Keith Moore
-- COMMENT: -- Balloting "Yes" because I think this is a very welcome and important update to its antecedent documents -- but I think there are a few simple chan

Re: [Uta] Mirja Kühlewind's Yes on draft-ietf-uta-email-deep-09: (with COMMENT)

2017-10-23 Thread Leif Johansson
On 2017-10-24 04:38, Keith Moore wrote: >> -- >> COMMENT: >> -- >> >> The document reads like a BCP to me. Was it discussed in the group to >> go for >> BCP? If