> On Mar 12, 2019, at 8:01 PM, Eric Rescorla <e...@rtfm.com> wrote:
> 
> I'm sorry, but I don't see how any of this is meaningfully different from the
> situation with HSTS. In both cases, the receiving system indicates that
> the sending system ought to use secure transport, and if the sending
> system conforms to the specification providing that indication, it is
> required to use secure transport. See:
> https://tools.ietf.org/html/rfc8461#section-5

The difference is that MTAs with published DANE and MTA-STS policies
nevertheless in the majority of cases still accept email not only
from senders who don't do DANE or MTA-STS (and use unauthenticated
opportunistic STARTLS), but also in cleartext!

Unlike HSTS where the port 80 website typically only serve the HSTS
policy and a redirect to HTTPS, the MTA's published DANE or MTA-STS
policy is an offer of support for security delivery to the sender,
it is NOT a mandate.

The normative MUSTs in e.g. the DANE SMTP RFC are there to ensure that
senders implement DANE correctly *when* they choose to do that, and don't
do something half-baked leading to a false sense of security.

There is no expectation that DANE preƫmpts sender policy, and MTAs use
whatever rules they have for a particular "envelope" to determine the
relevant security policy.  The present draft just adds an important
signal from the sending user.

My perspective on the SMTP security landscape is based on 18 years of
Postfix development and a decade as Postmaster at Morgan Stanley where
among other activities (email for the Google IPO) I managed mandatory
TLS peering with many business partners, and saw first hand what it
takes to deal with all the edge-cases.  Email is different from the Web,
and experience learned in one doesn't always carry over to the other.

-- 
        Viktor.

_______________________________________________
Uta mailing list
Uta@ietf.org
https://www.ietf.org/mailman/listinfo/uta

Reply via email to