Re: Requesting comments on draft-cheney-safe-02.txt

John C Klensin <john+smtp@jck.com> Fri, 07 August 2009 10:56 UTC

Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n77AuKti058335 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 7 Aug 2009 03:56:20 -0700 (MST) (envelope-from owner-ietf-smtp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n77AuJHX058334; Fri, 7 Aug 2009 03:56:19 -0700 (MST) (envelope-from owner-ietf-smtp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-smtp@mail.imc.org using -f
Received: from bs.jck.com (ns.jck.com [209.187.148.211]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n77AuAAG058318 (version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=NO) for <ietf-smtp@imc.org>; Fri, 7 Aug 2009 03:56:19 -0700 (MST) (envelope-from john+smtp@jck.com)
Received: from [127.0.0.1] (helo=localhost) by bs.jck.com with esmtp (Exim 4.34) id 1MZN7E-000CNx-V4; Fri, 07 Aug 2009 06:56:05 -0400
Date: Fri, 07 Aug 2009 06:56:04 -0400
From: John C Klensin <john+smtp@jck.com>
To: Rich Kulawiec <rsk@gsp.org>, ietf-smtp@imc.org
Subject: Re: Requesting comments on draft-cheney-safe-02.txt
Message-ID: <FFFD9066BE1617C943428AF6@PST.JCK.COM>
In-Reply-To: <20090807100147.GA16131@gsp.org>
References: <f6fecbd18af7.4a721c99@us.army.mil> <4A720D35.1000306@cybernothing.org> <f6e091e580a6.4a7258af@us.army.mil> <20090807100147.GA16131@gsp.org>
X-Mailer: Mulberry/4.0.8 (Win32)
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
Sender: owner-ietf-smtp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-smtp/mail-archive/>
List-ID: <ietf-smtp.imc.org>
List-Unsubscribe: <mailto:ietf-smtp-request@imc.org?body=unsubscribe>

--On Friday, August 07, 2009 06:01 -0400 Rich Kulawiec
<rsk@gsp.org> wrote:

> 
> On Fri, Jul 31, 2009 at 02:36:31AM +0400, Cheney, Edward A SSG
> RES USAR USARC wrote:
>> The idea is that security vulnerabilities on the internet
>> occur most significantly as a result of client-side scripting
>> from documents transmitted across HTTP.
> 
> Even we grant for the purpose of argument that these are the
> "most significant", and I see no evidence that they are, these
> are not Internet security vulnerabilities.
> 
> These are (a) web browser and (b) operating system
> vulnerabilities, and are quite readily mitigated by making
> sensible choices about both. Further mitigation is possible by
> using in-band filtering/blocking (such as HTTP proxies which
> filter or block traffic) or by using browser extensions (e.g.,
> NoScript).  These are much simpler and directed solutions that
> are available immediately, without any need for protocol
> engineering.
> 
> If, on the other hand, poor choices of web browser and/or
> operating system (or mail client, for that matter) are made,
> then it really doesn't matter whether traffic moves via HTTP
> or SMTP or anything else: those systems WILL be compromised.
>...
 
Reinforcing this point, I note that there are several MUAs that
interpret HTML in a very limited environment, preventing
execution of scripts, web bugs, etc., rather than
indiscriminately invoking full browsers each time an HTML
message comes in.  And, as Rich points out, those precautions do
not require protocol engineering, much less convincing those who
develop and send messages to adopt different tools and
procedures.

   john