On Mon, Oct 23, 2017 at 7:37 PM, Viktor Dukhovni <ietf-d...@dukhovni.org>
wrote:

>
> In other words, where's the data that makes it possible to
> understand whether SNI is actually useful, or mostly just
> an auto-pilot design to look like virtual-hosting with HTTPS
> where the requirements are very different.
>

Correct me if I am wrong, but at present no one checks if presented SMTP
certificates are valid. In fact, a major reason we need MTA-STS is to make
a clean start. You're not going to get the real-world data you're looking
for because why would anyone bother when all certificates are being
ignored, and MTAs downgrade to plaintext anyway.

SNI was not in SSL 3.0 and TLS 1.0 because back then there was no need for
it. And now, 20+ years, we have this:


https://developer.akamai.com/blog/2017/10/20/encrypting-web-need-support-tls-sni-remaining-clients/

The real question is how shall we protect email 20+ years from now. And, if
SNI is not mandated now, what hoops shall we have to go through to make
things right :)

Thus, my view is that MTA-STS should be a clean and robust protocol,
designed learning from mistakes of the past.


--
>         Viktor.
>
> P.S.
>
>   Some may notice that I failed to do the necessary research
>   on this for RFC7672, and just assumed that SNI might be
>   needed and chose to require it, just in case.  Sorry about
>   that...  At the time I wanted above all else to maximize
>   the chance that   an advertised TLSA record would match,
>   and SNI could hypothetically be needed.  I did not consider
>   proscribing such a dependency.  The same questions should
>   have applied.
>
> _______________________________________________
> Uta mailing list
> Uta@ietf.org
> https://www.ietf.org/mailman/listinfo/uta
>



-- 
Ivan
_______________________________________________
Uta mailing list
Uta@ietf.org
https://www.ietf.org/mailman/listinfo/uta

Reply via email to