[ietf-smtp] Two recent Internet-Drafts about using TLS with email protocols

Keith Moore <moore@network-heretics.com> Wed, 23 October 2013 17:48 UTC

Return-Path: <moore@network-heretics.com>
X-Original-To: ietf-smtp@ietfa.amsl.com
Delivered-To: ietf-smtp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0921D11E81F7 for <ietf-smtp@ietfa.amsl.com>; Wed, 23 Oct 2013 10:48:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.598
X-Spam-Level:
X-Spam-Status: No, score=-3.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id el1W8eT5biWu for <ietf-smtp@ietfa.amsl.com>; Wed, 23 Oct 2013 10:48:07 -0700 (PDT)
Received: from out3-smtp.messagingengine.com (out3-smtp.messagingengine.com [66.111.4.27]) by ietfa.amsl.com (Postfix) with ESMTP id 70E8111E81CC for <ietf-smtp@ietf.org>; Wed, 23 Oct 2013 10:48:07 -0700 (PDT)
Received: from compute4.internal (compute4.nyi.mail.srv.osa [10.202.2.44]) by gateway1.nyi.mail.srv.osa (Postfix) with ESMTP id B07602300C for <ietf-smtp@ietf.org>; Wed, 23 Oct 2013 13:48:06 -0400 (EDT)
Received: from frontend2 ([10.202.2.161]) by compute4.internal (MEProxy); Wed, 23 Oct 2013 13:48:06 -0400
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d= messagingengine.com; h=message-id:date:from:mime-version:to :subject:references:in-reply-to:content-type; s=smtpout; bh=cUIb LU8WeO4l4AylmfCslo+yIgQ=; b=NFq41bbcXapWTdYIJSuSL5bpdYmAfYpuFaro mt9nLNnyZmTu0oVZ4ZvP7toiTe+sW3rK/NSWdOGTjEULmdRcF7f5VCHWPr2IGw0r ozuoQNCSQ3H4kUXTOtdT9mrIqTeX4PwuKw3VUyvahaH39O/5YFh4N9DzWQvhzOdf H4R61BI=
X-Sasl-enc: 9oRww4CxI0H9ZohdXVTIt52vvffOHF00FfMoO2RZuvyB 1382550485
Received: from [192.168.1.4] (unknown [65.16.145.177]) by mail.messagingengine.com (Postfix) with ESMTPA id 9F3076800EA; Wed, 23 Oct 2013 13:48:05 -0400 (EDT)
Message-ID: <52680BD1.5020807@network-heretics.com>
Date: Wed, 23 Oct 2013 13:48:01 -0400
From: Keith Moore <moore@network-heretics.com>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:24.0) Gecko/20100101 Thunderbird/24.0
MIME-Version: 1.0
To: ietf-smtp@ietf.org
References: <CAAFsWK1OROeda-=Ov9pGs=TpeDcxm=d6MDKVxw4Vi6X4LxWLYw@mail.gmail.com>
In-Reply-To: <CAAFsWK1OROeda-=Ov9pGs=TpeDcxm=d6MDKVxw4Vi6X4LxWLYw@mail.gmail.com>
Content-Type: multipart/alternative; boundary="------------010004070406090503020702"
Subject: [ietf-smtp] Two recent Internet-Drafts about using TLS with email protocols
X-BeenThere: ietf-smtp@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "Discussion of issues related to Simple Mail Transfer Protocol \(SMTP\) \[RFC 821, RFC 2821, RFC 5321\]" <ietf-smtp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf-smtp>, <mailto:ietf-smtp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf-smtp>
List-Post: <mailto:ietf-smtp@ietf.org>
List-Help: <mailto:ietf-smtp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf-smtp>, <mailto:ietf-smtp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 23 Oct 2013 17:48:12 -0000

I'd like to call the list's attention to two other Internet-Drafts
regarding use of TLS with email protocols:

1. draft-ietf-dane-smtp-with-dane-00
<http://datatracker.ietf.org/doc/draft-ietf-dane-smtp-with-dane/>

This is (mostly) about SMTP mail relaying using Opportunistic TLS, and
how to make it work well by using TLSA records to both (a) provide a
secure indication that the SMTP server supports STARTTLS (thus thwarting
MITM downgrading attacks) and (b) provide a way to verify that the SMTP
server is the right server (given a chain of DNSSEC-signed
MX/CNAME/A/AAAA etc. records) without requiring the server to present a
TLS certificate for every possible DNS name for which that server is
authorized to accept mail.

The document seems to be fairly well written and worked out in a decent
amount of detail.   It proposes Opportunistic TLS rather than an SMTP
extension or message header that would require secure delivery for the
entire path.   For mail relaying I think Opportunistic TLS is a more
realizable goal.  But even if people want to propose an SMTP extension
to mandate use of TLS for the remainder of the path to the recipient, I
think it would need to use the certificate verification mechanisms
described in this draft.

2. draft-moore-email-tls-00
<http://datatracker.ietf.org/doc/draft-moore-email-tls/>
This is a document recommending use of TLS in all interactions between
MUAs and mail servers (IMAP, POP, Submission).   It basically has two
sets of recommendations - one for client and server implementations, and
another for mail service providers - because there are operational as
well as implementation concerns.

This started out to be a document recommending TLS for both MUA-MSP
interactions and for mail relaying, but it turned out that the two cases
are different enough that trying to specify both in the same document
made it too large and complex.   When I discovered that
draft-ietf-dane-smtp-with-dane-00 existed and used the same approach I
was recommending, and also that the dane-smtp draft had things worked
out in more detail, I removed the portions from my draft that related to
SMTP relaying. 


To me it seems that a comprehensive approach to encrypting email traffic
actually needs to cover three separate cases: (1) mail relaying, (2)
MUA-MSP interactions, and (3) end-to-end encryption.   Cases (1) and (2)
are similar in goal - protect emails being transmitted over the network
from eavesdroppers and active attacks - but subtly different in
implementation.   Case (3) protects emails from being disclosed to
servers which are operated by third parties and which might be
compromised.   None of these is sufficient by itself, because (1) and
(2) by themselves don't protect the messages while they're stored on
third-party servers, and (3) doesn't protect against traffic analysis -
which when dealing with mass surveillance seems to be as important as
protecting the actual contents of the messages.

Of these, the most difficult problem seems to be (3).   Solutions for
(3) e.g. PGP and S/MIME have been around for a long time, but they
haven't been widely deployed.    This seems like an area that is worth
revisiting.

Keith