On Thu, Mar 14, 2019 at 9:38 AM Viktor Dukhovni <vik...@dukhovni.org> wrote:

> > On Mar 14, 2019, at 11:53 AM, Eric Rescorla <e...@rtfm.com> wrote:
> >
> > We had a bunch more discussion on this on the IESG call. It seems like
> > the primary use case for TLS-Required=no may be to exempt what's
> basically
> > the control channel from the requirement to use TLS. So, for instance,
> > I am getting persistent bounces from you and I want to notify you
> > about it, so I send that notification with the TLS-Required=no flag set
> > [0].
>
> That's one use case, but another important use case, is giving *users*
> the ability to resent low-sensitivity but time-sensitive messages, that
> bounced or were delayed because of downstream misconfiguration.
>
> Think "Happy Birthday Grandma" (ideally not belated) postcard (i.e.
> cleartext OK).
>

Well, my point is that this use case is in direct conflict with the plain
text of the semantics of MTA-STS.



> > Assuming that's right, then ISTM that actually this is not the ideal
> > design, both because it's not clear how the flag gets set and because
> > the recipient has had no chance to weigh in.
>
> The "flag" gets set by the MUA, by adding the appropriate header.  For
> webmail clients, that'd be something the WebUI could provide as option
> when the user is reviewing a bounce or a delay notice for a message he
> sent that did not (yet? and will likely not as-is) make it to the intended
> recipient.
>
> For power-users (postmasters, or other technologists) using Mutt, Pine, ...
> the header can just be added in their favourite message editor.
>

Yes, that's what my footnote assumes. This seems pretty weak.


> > What I would suggest would
> > instead be to extend MTA-STS and DANE to exempt specific "control"
> > addresses (e.g., Postmaster) from mandatory TLS. This seems like it
> > would solve the main problem while avoiding opening the can of
> > users just marking routine messages as non-sensitive.
>
> Unfortunately, that does not work.  These days, a large fraction of
> domains have no working "postmaster" addresses.  The technical contact
> addresses for many domains are no longer published in WHOIS, but one
> may be able to scrape a responsible user from the website, or from
> the DNS SOA "mrname".
>
> There are no "control address" localparts that work for (essentially)
> all domains, and email to "postmaster" may actually in some cases be
> sensitive, and unrelated to transport security obstacles.
>

> By far the more reliable notification channel, is email to an actual
> user, who knows how to reach support for his provider, or in SOHO
> cases knows (or is) the administrator in person.
>

I think you are misunderstanding me. I am saying that the same indication
that says "use TLS" should also list the exempt addresses.

-Ekr


> [ I've been sending DANE-related misconfiguration notices since 2014,
>   and postmaster@ bounces back as undeliverable in ~30% of the cases,
>   and is not necessarily read by anyone even if delivered, I typically
>   include additional notice recipients whenever available. ]
>
> --
>         Viktor.
>
>
_______________________________________________
Uta mailing list
Uta@ietf.org
https://www.ietf.org/mailman/listinfo/uta

Reply via email to