Re: [ietf-smtp] Possible cont4ibution to moving forward with RFC5321bis SMTP

Viktor Dukhovni <ietf-dane@dukhovni.org> Fri, 27 December 2019 01:17 UTC

Return-Path: <ietf-dane@dukhovni.org>
X-Original-To: ietf-smtp@ietfa.amsl.com
Delivered-To: ietf-smtp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B99221200E7 for <ietf-smtp@ietfa.amsl.com>; Thu, 26 Dec 2019 17:17:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level:
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5VhUTyNnTKjU for <ietf-smtp@ietfa.amsl.com>; Thu, 26 Dec 2019 17:17:57 -0800 (PST)
Received: from straasha.imrryr.org (straasha.imrryr.org [100.2.39.101]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 114BB12009C for <ietf-smtp@ietf.org>; Thu, 26 Dec 2019 17:17:57 -0800 (PST)
Received: from [10.200.2.180] (sdzac10-108-1-nat.nje.twosigma.com [8.2.105.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by straasha.imrryr.org (Postfix) with ESMTPSA id 63B2429946B for <ietf-smtp@ietf.org>; Thu, 26 Dec 2019 20:17:56 -0500 (EST)
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 13.0 \(3608.40.2.2.4\))
From: Viktor Dukhovni <ietf-dane@dukhovni.org>
In-Reply-To: <dfa17007-a637-88d8-339c-a6225b1648c5@network-heretics.com>
Date: Thu, 26 Dec 2019 20:17:55 -0500
Content-Transfer-Encoding: quoted-printable
Reply-To: ietf-smtp@ietf.org
Message-Id: <2D41D855-2043-43B0-BDC8-8E85E8ED6373@dukhovni.org>
References: <FCDE38AEA7DDB9BB0FB206F9@PSB> <0cbf23be-dbfc-f78f-8e63-d92d6e34fbf0@network-heretics.com> <37C195CAA3295DE832711B38@PSB> <434a885c-3709-b90b-40cd-4c45ba339666@network-heretics.com> <64DEBBA8-FEBC-499B-80A0-EF49A2210BB2@dukhovni.org> <dfa17007-a637-88d8-339c-a6225b1648c5@network-heretics.com>
To: ietf-smtp@ietf.org
X-Mailer: Apple Mail (2.3608.40.2.2.4)
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf-smtp/QAjy-P44MxycKaJfWhVvF7DlzuU>
Subject: Re: [ietf-smtp] Possible cont4ibution to moving forward with RFC5321bis SMTP
X-BeenThere: ietf-smtp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Discussion of issues related to Simple Mail Transfer Protocol \(SMTP\) \[RFC 821, RFC 2821, RFC 5321\]" <ietf-smtp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf-smtp>, <mailto:ietf-smtp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf-smtp/>
List-Post: <mailto:ietf-smtp@ietf.org>
List-Help: <mailto:ietf-smtp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf-smtp>, <mailto:ietf-smtp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 27 Dec 2019 01:17:59 -0000

> On Dec 26, 2019, at 7:29 PM, Keith Moore <moore@network-heretics.com> wrote:
> 
> I'd support a carefully-worded recommendation to use TLS when relaying, as long as it didn't (yet) recommend blocking mail based on absence of TLS and (probably) cautioned against doing so outside of some narrow corner cases.

+1.  As much as spend cycles promoting appropriate use of TLS, I also
caution against overzealous enforcement.  For example, RFC7435.

> I suspect that there are a lot of devices out there sending cleartext mail, that probably can't be upgraded for the useful lifetime of the device.  And using TLS to send mail from a device, actually makes the device more fragile because it implies a need to upgrade the CAs that the device trusts.

For SMTP relay that's less of an issue, because unlike SUBMIT and IMAP,
SMTP (relay) STARTTLS is by default unauthenticated.

For authentication of inter-domain relay, we have DANE and MTA-STS, which
enable authentication opportunistically, when advertised by the peer.

DANE provides always on downgrade resistance, while MTA-STS is not downgrade
resistant on first contact (or when cached policies expire due to sufficiently
infrequent traffic).

> (I do also wonder how many existing SMTP servers can handle TLS with client
> certificates, because that seems like that would also be a recommendation
> worth considering.)

Most don't request client certs, and the client can't unilaterally include
these in the TLS handshake when not requested by the server.  Even when the
server does request client certs, it is presently not a good idea to send
client certs to strangers, because failure to validate these may cause
connection abort in some stacks.

Therefore, for now client certs should be enabled only for use with peers
that are known to need them (typically to authenticate outbound relaying),
and not otherwise.

Before we could encourage use of client-certs in inter-domain relaying, we'd
need to first encourage asking for them, while treating failure to validate
them as equivalent to absence of certificates, rather than reason to abort
the TLS handshake.

-- 
	Viktor.