On Thu, Apr 14, 2016 at 10:38 PM, Jim Fenton <fen...@bluepopcorn.net> wrote:

> On 4/13/16 10:43 AM, Chris Newman wrote:
>
> DANE is merely one method of validating a certificate, there can also be
> SMTP policy orthogonal to DANE. Take for example, DEEP’s “tls11” and
> “tls12” directives. Those specify a minimum acceptable version of TLS for
> future connections. Although we haven’t debated yet whether to include
> those in SMTP relay policy, I think it would make sense to include those
> directives, particularly given the problems we’ve seen with old versions of
> TLS causing real security problems. And there may be future policy
> directives we want that are even more compelling. So the question is where
> to put SMTP relay security policy that is orthogonal to DANE. Seems like
> wherever we choose to put the policy for SMTP relay STS (whether in a
> DNSSEC-protected DNS record, HTTPS well-known or SMTP+STARTTLS), that’s
> where we should always look for SMTP relay policy.
>
>
> When you're deciding whether to publish an encryption policy, it's
> important to consider whether there's a downgrade attack. Fundamentally,
> we're trying to deal with a situation where an intermediary can interfere
> with the negotiation of encryption, or whether an impostor server can claim
> not to support encryption in an effort to avoid a requirement to
> authenticate itself as would happen when TLS is negotiated.
>
> I don't know the details of what TLS 1.2 fixes in TLS 1.1, but I would
> only include tls11 and tls12 directives if there is a downgrade attack
> where the attacker can claim to only support TLS 1.1 and not 1.2 and
> benefit from that. Unless there is something about certification
> verification that can be exploited, the impostor server attack isn't
> possible because the impostor would have to authenticate to negotiate TLS
> 1.1 as well.  Similar situation for the intermediary/MITM.
>
> Is there actually something in TLS 1.1 that can be exploited by these
> sorts of attackers?  If not, I wouldn't include those directives.
>

Jim,

TLS contains its own anti-downgrade measures. What's the reasoning for
adding ones here?

-Ekr


>
>
> -Jim
>
> _______________________________________________
> Uta mailing list
> Uta@ietf.org
> https://www.ietf.org/mailman/listinfo/uta
>
>
_______________________________________________
Uta mailing list
Uta@ietf.org
https://www.ietf.org/mailman/listinfo/uta

Reply via email to