On 2/28/19 9:42 AM, Eric Rescorla wrote:
>
>
> On Thu, Feb 28, 2019 at 9:33 AM Jim Fenton <fen...@bluepopcorn.net
> <mailto:fen...@bluepopcorn.net>> wrote:
>
>     On 2/27/19 2:10 PM, Eric Rescorla wrote:
>>
>>
>>     On Tue, Feb 26, 2019 at 3:37 PM Jim Fenton
>>     <fen...@bluepopcorn.net <mailto:fen...@bluepopcorn.net>> wrote:
>>
>>         On 2/21/19 7:07 AM, Eric Rescorla wrote:
>>         >
>>         
>> ----------------------------------------------------------------------
>>         > DISCUSS:
>>         >
>>         
>> ----------------------------------------------------------------------
>>         >
>>         > I support Benjamin's DISCUSS.
>>         >
>>         > To elaborate on one point a bit: it seems to me that it's
>>         harmful to
>>         > security to allow the sender to unilaterally override the
>>         recipient's
>>         > preferences that something be encrypted. To forestall one
>>         argument,
>>         > yes, the sender knows the contents of the message, but the
>>         recipient
>>         > knows their own circumstances, and they may be at
>>         particular risk
>>
>>
>>         The general approach of REQUIRETLS is that the sender is in a
>>         good
>>         position to determine the sensitivity of the message(s) they are
>>         sending, because they know what the message is.
>>
>>
>>     Right, this is what I am disputing.
>
>
>     If I'm reading this correctly, you're concerned about the header
>     field (don't require TLS even if recipient domain policy says to)
>     rather than concerned about the REQUIRETLS SMTP extension
>     requiring the use of TLS. Let me know if this is incorrect.
>
>
> Yes.
>
>     The preferences we're talking about here (MTA-STS and DANE) are
>     basically advertisements saying, "if you send mail to this domain,
>     you should expect to use TLS when doing so."
>
>
> and "if you recognize this indicator, you should fail if the server
> doesn't do TLS", right? Just like HSTS.
>
>     There will always be SMTP clients that don't implement MTA-STS and
>     DANE (and possibly even STARTTLS) and will behave exactly as they
>     do today.
>
> Yes, this is the situation with HSTS as well.
>  
>
>     You described it correctly as a preference; if the sender wants to
>     emphasize delivery over security, they can ignore that preference.
>     That's basically what the header field (RequireTLS: no or perhaps
>     TLS-Required: no) does.
>
> Yes, what I am saying is that it's not solely the sender's decision,
> and that this is an indicator that privileges the sender's choice of
> nonsecurity over the recipient's; of security. Now, arguably, this is
> a weakness in the semantics of MTA-STS and DANE in that they could
> have three states: insecure OK, secure only, and secure only unless
> the sender explicitly says OK, But that's not how they are designed.


That's right, "secure only" is not the semantics of MTA-STS and DANE. So
TLS-Required: no is consistent with those semantics. It might be
interesting to see how MTA-STS and DANE could be extended to have the
other states, but the lack of those states is outside the scope of
TLS-Required: no.


>  
>
>>
>>         Ultimately, for the last
>>         hop anyway, the recipient has the ultimate control: they can
>>         refuse to
>>         accept a message unless STARTTLS has been negotiated.
>>
>>
>>     Actually, this doesn't work for two reasons:
>>
>>     1. There might be an active attacker.
>
>
>     Please elaborate on the type of active attacker you are referring to.
>
>
> A Dolev-Yao/3552 network attacker that controls the entire network.
>
>     An impostor SMTP server? Note that either DNSSEC or MTA-STS is
>     required in the secure (SMTP extension) case in order to guard
>     against forged MX records.
>
> Suppose that you are example.com <http://example.com> and you want to
> ensure that anyone who sends to you uses TLS. Rejecting non-TLS
> connections doesn't work because unless the sender enforces TLS, the
> attacker will just impersonate you, refuse to negotiate TLS, and then
> re-connect to you offering TLS.


Since MTA-STS and DANE do not have a "secure only" state, this is
outside the threat model of those protocols. Adding requirements to
clients implementing TLS-Required (such as that they check for MTA-STS
and DANE [and in turn implement DNSSEC]) doesn't do anything about the
bigger problem with clients who don't implement TLS-Required.

-Jim


_______________________________________________
Uta mailing list
Uta@ietf.org
https://www.ietf.org/mailman/listinfo/uta

Reply via email to