Re: STARTTLS & EHLO: Errata text?

Hector Santos <hsantos@santronics.com> Fri, 30 January 2009 14:53 UTC

Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n0UEr1M7087521 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 30 Jan 2009 07:53:01 -0700 (MST) (envelope-from owner-ietf-smtp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n0UEr1MS087520; Fri, 30 Jan 2009 07:53:01 -0700 (MST) (envelope-from owner-ietf-smtp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-smtp@mail.imc.org using -f
Received: from winserver.com (mail.catinthebox.net [208.247.131.9]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n0UEqoc5087513 for <ietf-smtp@imc.org>; Fri, 30 Jan 2009 07:53:00 -0700 (MST) (envelope-from hsantos@santronics.com)
Received: by winserver.com (Wildcat! SMTP Router v6.3.452.5) for ietf-smtp@imc.org; Thu, 29 Jan 2009 22:45:26 -0500
Received: from hdev1 ([65.10.45.22]) by winserver.com (Wildcat! SMTP v6.3.452.5) with ESMTP id 2772948796; Thu, 29 Jan 2009 22:45:25 -0500
Message-ID: <498277A6.2070007@santronics.com>
Date: Thu, 29 Jan 2009 22:44:38 -0500
From: Hector Santos <hsantos@santronics.com>
Organization: Santronics Software, Inc.
User-Agent: Thunderbird 2.0.0.0 (Windows/20070326)
MIME-Version: 1.0
To: Russ Allbery <rra@stanford.edu>
CC: ietf-smtp@imc.org
Subject: Re: STARTTLS & EHLO: Errata text?
References: <497DE492.4080506@pscs.co.uk> <497DED29.70402@att.com> <497ED420.30708@pscs.co.uk> <alpine.LSU.2.00.0901271403220.4546@hermes-2.csi.cam.ac.uk> <497F86CB.60904@att.com> <alpine.LSU.2.00.0901281434440.4546@hermes-2.csi.cam.ac.uk> <498088B8.9040404@pscs.co.uk> <alpine.LSU.2.00.0901291310080.4546@hermes-2.csi.cam.ac.uk> <4981C0D5.1010401@pscs.co.uk> <4981C6BD.2040900@att.com> <37F39FF37390694B69567838@PST.JCK.COM> <4981E1AB.9000002@att.com> <6.2.5.6.2.20090129094120.02f234a0@resistor.net> <01N4VB00O5UQ00007A@mauve.mrochek.com> <49823FDC.4000006@isode.com> <49825E78.7080303@santronics.com> <87ab99le53.fsf@windlord.stanford.edu>
In-Reply-To: <87ab99le53.fsf@windlord.stanford.edu>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Sender: owner-ietf-smtp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-smtp/mail-archive/>
List-ID: <ietf-smtp.imc.org>
List-Unsubscribe: <mailto:ietf-smtp-request@imc.org?body=unsubscribe>

Russ Allbery wrote:
> Hector Santos <hsantos@santronics.com> writes:
>> Alexey Melnikov wrote:
> 
>>> I would like suggest an alternative: how about saying
>>>
>>> The server MUST NOT trust any information obtained from the client,
>>> such as command verbs and their arguments, prior to the TLS
>>> negotiation.  The client MUST NOT trust any information obtained from
>>> the server, such as the list of SMTP service extensions, prior to the
>>> TLS negotiation.
>>>
>>> This avoid the whole issue of what the client/server must and must not
>>> remember.
>> I don't follow the client MUST NOT trust statement.  Is it not suppose to
>> believe what the server presents for extensions?
>>
>>    S:  We supports STARTTLS, AUTH CRAM-MD5
>>    C:  Liar!! No you don't, I don't believe you.
>>
>> ??
> 
> It's not supposed to trust what the server said before STARTTLS, since
> everything sent before STARTTLS may have been provided by a
> man-in-the-middle attacker.  It's stronger than just not assuming that the
> same extensions apply.  Even if extensions happen to still be available,
> trusting the extension return before STARTTLS can permit an attacker to
> launch a down-negotiation attack, for example.

Maybe I don't see it.  If the client is being fooled, one would think 
that it would be to relax the client, not push it into a more secured 
mode.

In either case, the client has to use what is presented. It can't 
assume anything else (that wasn't presented). That was my main point.


-- 
Sincerely

Hector Santos, CTO
http://www.santronics.com
http://santronics.blogspot.com