Re: STARTTLS & EHLO: Errata text?

Hector Santos <hsantos@santronics.com> Fri, 30 January 2009 20:07 UTC

Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n0UK7D05002580 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 30 Jan 2009 13:07:13 -0700 (MST) (envelope-from owner-ietf-smtp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n0UK7Dei002579; Fri, 30 Jan 2009 13:07:13 -0700 (MST) (envelope-from owner-ietf-smtp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-smtp@mail.imc.org using -f
Received: from winserver.com (ntbbs.santronics.com [208.247.131.9]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n0UK7BuV002572 for <ietf-smtp@imc.org>; Fri, 30 Jan 2009 13:07:12 -0700 (MST) (envelope-from hsantos@santronics.com)
Received: by winserver.com (Wildcat! SMTP Router v6.3.452.5) for ietf-smtp@imc.org; Fri, 30 Jan 2009 15:07:48 -0500
Received: from hdev1 ([65.10.45.22]) by winserver.com (Wildcat! SMTP v6.3.452.5) with ESMTP id 2831890296; Fri, 30 Jan 2009 15:07:47 -0500
Message-ID: <49835DE2.3030403@santronics.com>
Date: Fri, 30 Jan 2009 15:06:58 -0500
From: Hector Santos <hsantos@santronics.com>
Organization: Santronics Software, Inc.
User-Agent: Thunderbird 2.0.0.0 (Windows/20070326)
MIME-Version: 1.0
To: Tony Finch <dot@dotat.at>
CC: Tony Hansen <tony@att.com>, ietf-smtp@imc.org
Subject: Re: STARTTLS & EHLO: Errata text?
References: <497DE492.4080506@pscs.co.uk> <497DED29.70402@att.com> <497ED420.30708@pscs.co.uk> <alpine.LSU.2.00.0901271403220.4546@hermes-2.csi.cam.ac.uk> <497F86CB.60904@att.com> <alpine.LSU.2.00.0901281434440.4546@hermes-2.csi.cam.ac.uk> <498088B8.9040404@pscs.co.uk> <alpine.LSU.2.00.0901291310080.4546@hermes-2.csi.cam.ac.uk> <4981C0D5.1010401@pscs.co.uk> <4981C6BD.2040900@att.com> <37F39FF37390694B69567838@PST.JCK.COM> <4981E1AB.9000002@att.com> <alpine.LSU.2.00.0901301832470.4795@hermes-2.csi.cam.ac.uk>
In-Reply-To: <alpine.LSU.2.00.0901301832470.4795@hermes-2.csi.cam.ac.uk>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Sender: owner-ietf-smtp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-smtp/mail-archive/>
List-ID: <ietf-smtp.imc.org>
List-Unsubscribe: <mailto:ietf-smtp-request@imc.org?body=unsubscribe>

Tony Finch wrote:
> I suggest that this paragraph should read:
> 
>    Upon completion of the TLS handshake, the SMTP protocol is reset to
>    the initial state (the state in SMTP after a server issues a 220
>    service ready greeting).  The requirement in [RFC5321] that "a client
>    MUST issue HELO or EHLO before starting a mail transaction" also
>    applies to this fresh state.
> 
>    The server MUST NOT trust any knowledge obtained from the client before
>    the TLS negotiation itself.  The client MUST NOT trust any knowledge
>    obtained from the server before the TLS negotiation itself.  This
>    includes all commands, arguments, replies, and extended exchanges
>    (though in typical use there is little more than the client's EHLO
>    command and the server's reply).


This is much better form of the consolidated input.

But I still to get the  "Client MUST NOT trust" statement.  It has to 
trust, blind or otherwise, what the server presented up to this point 
before it can go to the next step.

In my view, I think it should say:

    The client MUST NOT presume the server extensions apply
    in the secure state as it may have changed.

To me, that is enough to give the client the incentive and 
understanding that it needs to re-issue EHLO.

Alternatively, stop confusing people any further with these beating 
around the bush subjective reasons, nix all attempts to explain the 
"whys," and just say:

   The client MUST re-issue the EHLO/HELO before attempting to begin
   a MAIL FROM transaction after secured SMTP is established.

which would keep it consistent with 2821/5321.



-- 
Sincerely

Hector Santos, CTO
http://www.santronics.com
http://santronics.blogspot.com