> On May 7, 2018, at 4:15 AM, Daniel Margolis <d...@af0.net> wrote:
> 
> Yes, that was exactly my point. That's why I was saying this is really an 
> implementation detail (albeit one you'd want to call out); the only 
> fundamental protocol question at issue is whether we should consider valid a 
> policy that matches only the cert but not the hostname itself.

Yes, it boils down to whether we're willing to support MX hosts with
certificates that match something other than the MX host name as
seen in the MX RRset.  Operational practices would have to change
to require the exact MX hostname.  For example:

  tac-coburg.com. IN MX 10 mx-fhco-smart.rrze.uni-erlangen.de.
  mx-fhco-smart.rrze.uni-erlangen.de[131.188.11.23]
    name = mx-fhco-1.rrze.uni-erlangen.de
    name = mx-fhco-2.rrze.uni-erlangen.de
    name = mx-fhco-3.rrze.uni-erlangen.de
    name = mx-rz-1.rrze.uni-erlangen.de
    name = mx-rz-2.rrze.uni-erlangen.de
    name = mx-rz-3.rrze.uni-erlangen.de
    name = mx-rz.rrze.uni-erlangen.de
    name = mx-sub-1.rrze.uni-erlangen.de
    name = mx-sub-2.rrze.uni-erlangen.de
    name = mx-sub-3.rrze.uni-erlangen.de
    name = mx-uker-1.rrze.uni-erlangen.de
    name = mx-uker-2.rrze.uni-erlangen.de
    name = mx-uker-3.rrze.uni-erlangen.de
    depth = 0
      Issuer CommonName = FAU-CA
      Issuer Organization = Universitaet Erlangen-Nuernberg
      notBefore = 2014-09-29T10:16:00Z
      notAfter = 2019-07-09T23:59:00Z
      Subject CommonName = mx-rz.rrze.uni-erlangen.de
      Subject Organization = Universitaet Erlangen-Nuernberg

Out of 4238 MX hosts with working DANE TLSA records, 233 have certificates
in which none of the names match the MX hostname.  They could of course
change their practices or not adopt MTA-STS, but they seem to have their
reasons for the names used and can be unwilling to change.  One Russian
user whom I tried to convince to avoid aliases in the MX record quoted
Lenin (to suggest that my perspective fails to take his circumstances
into account):

  "Узок круг этих революционеров. Страшно далеки они от народа"

Which translates roughly as "Narrow is the circle of these revolutionaries.
They are too far removed from the people". :-)

>   * In "testing" mode one would still actually connect even to MX hosts
>     whose names don't match the cached policy.

If the draft is updated to change the matching rules, this issue would
need to be addressed, what should be the treatment of non-matching MX
hostnames in "testing" mode?

>   * In "enforce" mode, one could at the last moment optimize-out connections
>     to hosts which are sure to fail authentication, because the MX hostname
>     does not match the "mx" list.  This of course after loop eiimination, etc.

Here, there's a very small, but non-zero risk of running into dynamic
firewall rules by skipping a better priority MX host.  Some domains have
backup MX hosts whose primary purpose is to detect out-of-order connections
from botnets and the like, and access to the primary is blocked when a
client connects to the secondary first.  The domain would of course need
to be misconfigured to not list the primary in the MTA-STS policy.

If we ever do a spec for in-band reporting of authentication failure, that
would be another reason to make the connection anyway, and just signal that
the MX host is failing to match policy, before moving on to the next MX
host (or deferring the message).

-- 
        Viktor.

_______________________________________________
Uta mailing list
Uta@ietf.org
https://www.ietf.org/mailman/listinfo/uta

Reply via email to