On 4/15/16 5:28 AM, Eric Rescorla wrote: > > On Thu, Apr 14, 2016 at 10:38 PM, Jim Fenton <fen...@bluepopcorn.net > <mailto:fen...@bluepopcorn.net>> wrote: > > On 4/13/16 10:43 AM, Chris Newman wrote: >> DANE is merely one method of validating a certificate, there can >> also be SMTP policy orthogonal to DANE. Take for example, DEEP’s >> “tls11” and “tls12” directives. Those specify a minimum >> acceptable version of TLS for future connections. Although we >> haven’t debated yet whether to include those in SMTP relay >> policy, I think it would make sense to include those directives, >> particularly given the problems we’ve seen with old versions of >> TLS causing real security problems. And there may be future >> policy directives we want that are even more compelling. So the >> question is where to put SMTP relay security policy that is >> orthogonal to DANE. Seems like wherever we choose to put the >> policy for SMTP relay STS (whether in a DNSSEC-protected DNS >> record, HTTPS well-known or SMTP+STARTTLS), that’s where we >> should always look for SMTP relay policy. >> >> > When you're deciding whether to publish an encryption policy, it's > important to consider whether there's a downgrade attack. > Fundamentally, we're trying to deal with a situation where an > intermediary can interfere with the negotiation of encryption, or > whether an impostor server can claim not to support encryption in > an effort to avoid a requirement to authenticate itself as would > happen when TLS is negotiated. > > I don't know the details of what TLS 1.2 fixes in TLS 1.1, but I > would only include tls11 and tls12 directives if there is a > downgrade attack where the attacker can claim to only support TLS > 1.1 and not 1.2 and benefit from that. Unless there is something > about certification verification that can be exploited, the > impostor server attack isn't possible because the impostor would > have to authenticate to negotiate TLS 1.1 as well. Similar > situation for the intermediary/MITM. > > Is there actually something in TLS 1.1 that can be exploited by > these sorts of attackers? If not, I wouldn't include those > directives. > > > Jim, > > TLS contains its own anti-downgrade measures. What's the reasoning for > adding ones here? > > -Ekr > That's exactly my point: I wouldn't include these directives.
-Jim
_______________________________________________ Uta mailing list Uta@ietf.org https://www.ietf.org/mailman/listinfo/uta