Re: [dane] Barry Leiba's Discuss on draft-ietf-dane-smtp-with-dane-17: (with DISCUSS and COMMENT)

Paul Wouters <paul@nohats.ca> Tue, 26 May 2015 00:31 UTC

Return-Path: <paul@nohats.ca>
X-Original-To: dane@ietfa.amsl.com
Delivered-To: dane@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1DFF11A1A55; Mon, 25 May 2015 17:31:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.111
X-Spam-Level:
X-Spam-Status: No, score=-0.111 tagged_above=-999 required=5 tests=[BAYES_20=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5nFDN-xdlHLq; Mon, 25 May 2015 17:31:32 -0700 (PDT)
Received: from mx.nohats.ca (mx.nohats.ca [193.110.157.68]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8E9FF1A1A3E; Mon, 25 May 2015 17:31:32 -0700 (PDT)
Received: from localhost (localhost [IPv6:::1]) by mx.nohats.ca (Postfix) with ESMTP id 3lwbnX1RjKz4xl; Tue, 26 May 2015 02:31:28 +0200 (CEST)
Authentication-Results: mx.nohats.ca; dkim=pass (1024-bit key) header.d=nohats.ca header.i=@nohats.ca header.b=mRs8QxeP
X-OPENPGPKEY: Message passed unmodified
X-Virus-Scanned: amavisd-new at mx.nohats.ca
Received: from mx.nohats.ca ([IPv6:::1]) by localhost (mx.nohats.ca [IPv6:::1]) (amavisd-new, port 10024) with ESMTP id 6-XDc3T3pIRp; Tue, 26 May 2015 02:31:27 +0200 (CEST)
Received: from bofh.nohats.ca (206-248-139-105.dsl.teksavvy.com [206.248.139.105]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx.nohats.ca (Postfix) with ESMTPS; Tue, 26 May 2015 02:31:26 +0200 (CEST)
Received: from bofh.nohats.ca (bofh.nohats.ca [127.0.0.1]) by bofh.nohats.ca (Postfix) with ESMTP id BEFB08004A; Mon, 25 May 2015 20:31:24 -0400 (EDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nohats.ca; s=default; t=1432600284; bh=jia4mXXHFyP179zMCAzcyxdBhYjSYrREluJL229KcfM=; h=Date:From:To:cc:Subject:In-Reply-To:References; b=mRs8QxePiSfI4vWXS6X4VYEVdxIqntdO1BTyiIYJYd1ZGdfAv+5AAwgFol8l6uZdE Ec1WOfS760rGt0wNrwuTEhOUNChtoM8SiirB6aTBd4SRA6VqJl6kmy2XuDuVDBssKo jxFf5n/mVAYr0WA1dsP3R7KG+DGIBPBckdSSGlWk=
Received: from localhost (paul@localhost) by bofh.nohats.ca (8.15.1/8.15.1/Submit) with ESMTP id t4Q0VN6s007190; Mon, 25 May 2015 20:31:23 -0400
X-Authentication-Warning: bofh.nohats.ca: paul owned process doing -bs
Date: Mon, 25 May 2015 20:31:23 -0400
From: Paul Wouters <paul@nohats.ca>
To: Mark Andrews <marka@isc.org>
In-Reply-To: <20150526000338.D70AC2F50D87@rock.dv.isc.org>
Message-ID: <alpine.LFD.2.11.1505252020130.5996@bofh.nohats.ca>
References: <20150524204121.31745.72546.idtracker@ietfa.amsl.com> <20150525020430.GK17272@mournblade.imrryr.org> <841AFD92-8615-43BF-98B4-48770FA72235@ogud.com> <20150526000338.D70AC2F50D87@rock.dv.isc.org>
User-Agent: Alpine 2.11 (LFD 23 2013-08-11)
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset="US-ASCII"; format="flowed"
Archived-At: <http://mailarchive.ietf.org/arch/msg/dane/WjOr4X8ID6rlcjoLq0q8VZFmLuY>
Cc: draft-ietf-dane-smtp-with-dane@ietf.org, The IESG <iesg@ietf.org>, dane WG list <dane@ietf.org>
Subject: Re: [dane] Barry Leiba's Discuss on draft-ietf-dane-smtp-with-dane-17: (with DISCUSS and COMMENT)
X-BeenThere: dane@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: DNS-based Authentication of Named Entities <dane.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dane>, <mailto:dane-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dane/>
List-Post: <mailto:dane@ietf.org>
List-Help: <mailto:dane-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dane>, <mailto:dane-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 May 2015 00:31:35 -0000

On Tue, 26 May 2015, Mark Andrews wrote:

> In addition it is just plain pointless to do the lookup.
>
> If the A/AAAA is insecure the TLSA lookup will be insecure due to
> there being not DNSSEC trusted path the TLSA node.

I don't understand this. Wether the A/AAA is spoofed or someone
with sufficient power to redirect routing of that range to them
is the same thing. So even if the A/AAAA were trusted by DNSSEC,
you don't know if you are talking to the real or rogue servers
in that IP.

>  You can't prove
> whether the server was supposed to offer STARTTLS or not.

Yes you can? The presence of TLSA means you MUST do STARTTLS,
and not downgrade to plaintext. Sure, it can be spoofed but
you're not posting anything signed with DNSSEC, you're not
losing any security here?

>  Faked answers can "prove" either assertion.

Sure. Not signing will not help against active attacks. But publishing
unsigned could help you agaisnt passive attacks.

> You don't get a viable trust anchor if you do get back a TLSA record
> as the answer will be insecure.  SMTP servers can already be
> configured to accept CERTS where you don't have a trust anchor for
> that server if you just want to have a encrypted stream to stop
> casual snooping of traffic and the server happens to say it supports
> STARTTLS.

That is true. You don't win much by an out-of-band insecure TLSA lookup.

> The main reason for not doing the lookup is that it is pointless
> (see above).  The very much secondary reason for not doing the
> lookup is that there is a very small percentage of servers that
> mishandle TLSA lookups.  SMTP servers are going to have to handle
> these broken servers once they get secure A/AAAA responses.

If broken servers are indistinguishable from an attack, then it is
an attack, and things should break. (yes spoken without operator hat on)

>>> When the MX RRset is secure, but the A/AAAA records are insecure,
>>> no TLSA lookup takes place.  I think that proceeding with (soft-fail)
>>> TLSA lookups when the MX RRset is insecure invites implementation
>>> errors.

I don't like that because I would like to be able to publish TLSA
records in my nohats.ca zone pointing to some mail service I use
that uses certificates but are not themselves dnssec signed. eg:

nohats.ca. IN MX 5 mail.insecure-bigmail.com.
nohats.ca. IN TLSA <blob>

As for insecure TLSA records themselves, while I would prefer we
would use them in a better-than-nothing sense, I am more fearful of
implementations just not bothering or forgetting to check for DNSSEC
and blindly trusting these. So I think it is more clear to just say
ignore insecure TLSA records.

Paul