----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

I am balloting YES because I believe it is important to publish this. But there
are a few issues I think should be resolved first:

Substantive:

-2: There are several instances of lower case versions of 2119 keywords. If
those are intentional, then please use the updated boilerplate from 8174.

fixed in my draft of -10.

-4.1, last paragraph: "It is RECOMMENDED that new users be required to use TLS
version 1.1
    or greater from the start."
Is 1.1 correct? Why not start with 1.2?

TLS 1.1 was a deliberate choice.  Reality is that some new users will still be using old mail user agents, and there are often other factors that impair users' ability to upgrade.   If new users were _required_ to use TLS 1.2, that would essentially prevent them from getting new email service, or maybe force them to spend large amounts of money for new hardware and/or software in order to do so.  Either that or mail service providers might legitimately claim that they had good reason to take exception to the RECOMMENDED keyword and the paragraph would have no beneficial effect.

It's basically a judgment call - what policy on the part of mail service providers results in the best security overall?   It appears possible to err on the side of either too strict or too loose.

That said, some of the text in this draft is three years old, and conditions have changed somewhat in that interval.   If 99% of deployed user agents implement TLS 1.2, requiring 1.2 for new users would probably not bother me.  But if the figure were closer to 90%, it would bother me.   Maybe someone has actual figures, but I suspect the actual level of deployment is still well less than 90%.

-5, bullet starting with: MUAs SHOULD provide a prominent visual indication "
This section seems to merit a MUST NOT level requirement about displaying the
visual indication without sufficient evidence of confidentiality.

Hmm.   I'm probably okay with that in principle.   The problem I have with it is that the draft (appropriately IMO) gives MUA implementors latitude as to what indications to assign to what levels of confidentiality.   I am not immediately sure how to reconcile that decision with a MUST NOT requirement that denies implementors that latitude.   But I took a stab at it:

    <t>MUAs SHOULD provide a prominent indication of the level of
    confidentiality associated with an account configuration that is
    appropriate for the user interface (for example, a "lock" icon or
    changed background color for a visual interface, or some sort of
    audible indication for an audio user interace), at appropriate
    times and/or locations in order to inform the user of the
    confidentiality of the communications associated with that
    account.  For example, this might be done whenever (a) prompting
    the user for authentication credentials, (b) the user is composing
    mail that will be sent to a particular submission server, (c) a
    list of accounts is displayed (particularly if the user can select
    from that list to read mail), or (d) the user is requesting to
    view or update any configuration data that will be stored on a
    remote server.  If, however, an MUA provides such an indication,
    it MUST NOT indicate confidentiality for any connection that does
    not at least use TLS 1.1 with certificate verification and also
    meet the minimum confidentiality requirements configured for that
    account.</t>
-5.4: I'm confused at why certificate pinning is okay for explicitly invalid
certificates, when click-through overrides were previously recommended against.
It seems like the same level of abuse is likely. (It's one thing to allow a
user to set policy for an invalid cert; it's another to prompt them to do so.)

I don't believe the current language allows for click-through overrides for invalid certificates - the text explicitly says :

    Certificate pinning is only appropriate during mail account
    setup and MUST NOT be offered as an option in response to a failed
    certificate validation for an existing mail account.

Offhand, the current compromise seems about right to me - yes, you can tell your MUA to use a certificate that is self-signed, expired, or has a name that doesn't match the DNS name used during account configuration; but the MUA isn't allowed (MUST NOT) to prompt you to let you access your account anyway if the certificate is invalid and the account wasn't already explicitly configured to permit such access.

-5.5: How would a client determine that a client cert could be safely used with
a particular server? (What does "safely" mean in this context?)
Good point.  This is Chris's text so I'm not entirely sure what his concern was.  My guesses are: (a) there's a privacy risk associated with disclosing a client cert with one identity to a server that might know the user by a different identity; and (b) if for whatever reason the server doesn't like the client cert, it might deny access to the mail account even though it would have granted access based on the other credentials presented by the user in POP/IMAP/Submission authentication.   But offhand I don't know how the client could know when using the client cert is "safe" other than by having been explicitly configured to do so.  Even "it has worked in the past" might not be good enough because the cert could have expired or been revoked, or the server changed its policies, since then.

My inclination is to remove the "client has determined that the certificate can be safely used" clause, but I'd like to see what Chris suggests here.


Editorial:

- Abstract: Please mention the updated RFCs
is it conventional to do so, given that the Updates: heading should be present?
-4: "The following practices are recommended "
There are some MUSTs in those practices. That makes them required, not merely
recommended.

ok
-4, first and third bullets: s/ which / that
ok
-4.1, first paragraph: The two "MAYs" seem more like statements of fact.

Uppercase MAY is deliberate.   Those statements are intended to explicitly give latitude to operators.
-5, 3rd bullet: "MUAs MUST NOT consider "
s/consider/treat   (unless we are talking about humans are AIs :-)  )
ok

Thanks for the careful review.

Keith

_______________________________________________
Uta mailing list
Uta@ietf.org
https://www.ietf.org/mailman/listinfo/uta

Reply via email to