> On Oct 23, 2017, at 12:24 PM, Ivan Ristic <ivan.ris...@gmail.com> wrote:
> 
> There's another angle to take into account: SNI is mandatory to implement in 
> TLS 1.3:
> 
>     
> https://tlswg.github.io/tls13-spec/draft-ietf-tls-tls13.html#rfc.section.9.2
> 
> For better or worse, SNI is part of TLS, and has been for more than a decade. 
> IMO, all new standards should assume SNI by default and disable it only if 
> there are very strong reasons.

MTI is not always the same as mandatory to use.  Is it actually
required to be used?  SNI would clearly be used for the policy
retrieval (HTTPS), but is not an obvious requirement for MTA-to-MTA
SMTP.  There has to be a reason other than cargo-cult to send it.
That's what we're discussing.  Mere analogies to HTTP are rather
weak I'm afraid.

MTAs are not browsers or Web servers and have a very different
history and model of TLS deployment[1].  SNI is presently largely
unused with MTA-to-MTA SMTP.  RFC7672 requires servers that
implement DANE to continue with a default chain on receipt of
an unrecognized SNI name.  Perhaps the same could be an explicit
requirement for SMTP-STS, otherwise sending SNI could cause more
harm than good.

-- 
        Viktor.

[1] On the other hand this model is substantially more effective
at protecting a larger share of the traffic from passive attacks,
see https://transparencyreport.google.com/safer-email/overview
where we see that ~89% of email traffic to/from Google is TLS
encrypted.  Last I looked HTTPS was reported at around 50% of Web
traffic.
_______________________________________________
Uta mailing list
Uta@ietf.org
https://www.ietf.org/mailman/listinfo/uta

Reply via email to