> On 14 Apr 2016, at 15:58, Daniel Margolis <dmargo...@google.com> wrote:
> 
> 
> On Thu, Apr 14, 2016 at 8:38 AM, Viktor Dukhovni <ietf-d...@dukhovni.org> 
> wrote:
> 
> If the STS spec is just for email between Yahoo and Gmail, sure,
> go for it.  Less work for me, I won't need to implement yet another
> transport security mechanism.
> 
> A more reasonably modest STS would stay well clear of prescribing
> such fine details.  Once the policy lookup requires WebPKI support,
> pinning MX host certs is fragile over-engineering.
> 
> To be clear, HPKP allows pinning a root or intermediate cert, not just the 
> host cert. I think pinning someone in the cert chain and not the host cert is 
> generally preferable (in terms of safety and ease of certificate rollover).

The SMTP-STS draft mentions 'certificate pinning' as future work. Would you 
really want to go the way of HPKP? It's been an utter deployment and management 
disaster [0] [1]. While I agree that pinning to host-keys will mean more 
trouble for admins, I do feel that HPKP in general is a completely wrong 
approach. Adding this on top of STS will most surely make mails bounce at 
massive scale, at least in small deployments. Companies like the ones authoring 
the STS draft will have proper engineering teams and man-power available. Not 
every MX on the internet is Gmail or Yahoo, just to reiterate my concern about 
STS's complexity and out-of-band behaviour.

I've repeatedly suggested a better solution for pinning that works with WebPKI 
based trust anchors and would not need a webserver along with an MTA.

To be honest: this is getting a bit frustrating. I feel the STS authors look 
for a solution that works well within their domains and management cycles, but 
that's far from the rest of the internet community - they do not have the same 
man-power as said companies have. And even automating HPKP is doomed to fail, 
some tried, I haven't seen a good working solution.

Aaron

[0] 
http://news.netcraft.com/archives/2016/03/30/http-public-key-pinning-youre-doing-it-wrong.html
 (current)
[1] https://www.internetsociety.org/sites/default/files/01_4_0.pdf (about a 
year old)

Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

_______________________________________________
Uta mailing list
Uta@ietf.org
https://www.ietf.org/mailman/listinfo/uta

Reply via email to