> More importantly, I think MTA-STS should > mandate SNI usage. I believe you 
> are referring to HTTPS MTA-STS policy distribution service, and do no see any 
> reason not to include SNI requirements in the spec.


Sent from Yahoo Mail for iPhone


On Friday, October 13, 2017, 8:19 AM, Ivan Ristic <ivan.ris...@gmail.com> wrote:

On Thu, Oct 12, 2017 at 12:03 PM, Daniel Margolis <dmargo...@google.com> wrote:


I think I agree with your assessment. I just think it would be better to 
clearly say "MTA-STS is not designed to be used with DANE". Otherwise, you will 
inevitably get people attempting to use it. Well, that will probably happen 
anyway, but you'd at least be able to point them to the spec :)

It can be so used. Of course, if you publish an MTA-STS policy that is invalid, 
senders who validate MTA-STS may not deliver mail to you, similarly if you 
publish a TLSA record for your MX that is invalid. I would not say anyone has 
to choose one or the other, especially since that may limit their ability to 
secure mail to their domain (since some senders may only validate DANE and some 
may only validate MTA-STS). We do not want to tell people to make a choice, do 
we?

Furthermore, it is not compatible with sending SNI either. There are
servers out there that will outright abort on unknown SNI, and the SNI
specification explcitly states this as one of recommended outcomes,
with note that trying to continue probably won't work.

To be clear, the specification suggests SNI as useful for policy hosting (on 
the HTTPS endpoint), not MX matching. There's not a direct relationship between 
SNI on the MTA-to-MTA connection and the MX identity verification, except 
insofar as that if SNI is used, the MX just has to return a certificate which 
matches the policy, same as if SNI is not used.

I am sorry, I couldn't find where SNI is mentioned in the MTA-STS spec; could 
you point me to the relevant section?
More importantly, I think MTA-STS should mandate SNI usage. It's taken the 
HTTPS world many years to finally approach the point where virtual secure 
hosting is possible. Given that MTA-STS is opt-in, I think SNI should be 
mandatory. Otherwise anyone offering mass-email hosting will be in a world of 
pain, having to resort to splitting traffic across IP addresses.
 

I will respond more thoroughly on the other thread, though, to keep these two 
points separate. 
On Thu, Oct 12, 2017 at 12:37 PM, Ilari Liusvaara <ilariliusva...@welho.com> 
wrote:

On Thu, Oct 12, 2017 at 11:16:18AM +0100, Ivan Ristic wrote:
>
> Sorry, I should have made it more clear. I was using the conflict to give a
> supporting example for the conversation in the other thread.
>
> The custom MX hostname validation in MTA-STS conflicts with DANE, not
> because it's DANE, but because it does way differently from everything else
> in TLS. In TLS, you decide which host you want to connect to, then you
> validate the connection is valid for that hostname.

It does not just conflict with DANE, it also conflicts with some TLS
client APIs. And I would imagine that authors of such APIs would _not_
be supportive of additions to support nonstandard name matching (I
can certainly say I am not).

Furthermore, it is not compatible with sending SNI either. There are
servers out there that will outright abort on unknown SNI, and the SNI
specification explcitly states this as one of recommended outcomes,
with note that trying to continue probably won't work.



-Ilari

______________________________ _________________
Uta mailing list
Uta@ietf.org
https://www.ietf.org/mailman/l istinfo/uta



______________________________ _________________
Uta mailing list
Uta@ietf.org
https://www.ietf.org/mailman/ listinfo/uta





-- 
Ivan_______________________________________________
Uta mailing list
Uta@ietf.org
https://www.ietf.org/mailman/listinfo/uta



_______________________________________________
Uta mailing list
Uta@ietf.org
https://www.ietf.org/mailman/listinfo/uta

Reply via email to