[ietf-smtp] Review of draft-moore-email-tls-00.txt

Alexey Melnikov <alexey.melnikov@isode.com> Thu, 31 October 2013 17:22 UTC

Return-Path: <alexey.melnikov@isode.com>
X-Original-To: ietf-smtp@ietfa.amsl.com
Delivered-To: ietf-smtp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5E6CD21E808A for <ietf-smtp@ietfa.amsl.com>; Thu, 31 Oct 2013 10:22:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -103.065
X-Spam-Level:
X-Spam-Status: No, score=-103.065 tagged_above=-999 required=5 tests=[AWL=-0.466, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4y2eyRfKmqgO for <ietf-smtp@ietfa.amsl.com>; Thu, 31 Oct 2013 10:22:10 -0700 (PDT)
Received: from statler.isode.com (statler.isode.com [62.3.217.254]) by ietfa.amsl.com (Postfix) with ESMTP id EE47011E8169 for <ietf-smtp@ietf.org>; Thu, 31 Oct 2013 10:22:09 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; t=1383240128; d=isode.com; s=selector; i=@isode.com; bh=S2rF40I/7+aN4Y1VJgdozu2YOcy8TrtxUT7/V3T1N9Y=; h=From:Sender:Reply-To:Subject:Date:Message-ID:To:Cc:MIME-Version: In-Reply-To:References:Content-Type:Content-Transfer-Encoding: Content-ID:Content-Description; b=sT7s1dwKfGOUgHnXzmli87NbSEojgiKzTNbaB/CbWaEZ3gxylS+GpzPv27kixJFtyz+pGM rCqDv8fDO5sCjGX5M01do2ggTfuF3cK3njerM1ebxTs6kXOORiPaa1cYVq8Xk3xzSb4Zfy LW2D5DjfGK5Ci7z4YtPSWCv6139jkMQ=;
Received: from [172.16.1.29] (richard.isode.com [62.3.217.249]) by statler.isode.com (submission channel) via TCP with ESMTPA id <UnKRvgB8lyMI@statler.isode.com>; Thu, 31 Oct 2013 17:22:08 +0000
Message-ID: <527291C3.4080100@isode.com>
Date: Thu, 31 Oct 2013 17:22:11 +0000
From: Alexey Melnikov <alexey.melnikov@isode.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:17.0) Gecko/20130801 Thunderbird/17.0.8
To: Keith Moore <moore@network-heretics.com>
References: <CAAFsWK1OROeda-=Ov9pGs=TpeDcxm=d6MDKVxw4Vi6X4LxWLYw@mail.gmail.com> <52680BD1.5020807@network-heretics.com>
In-Reply-To: <52680BD1.5020807@network-heretics.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Cc: ietf-smtp@ietf.org
Subject: [ietf-smtp] Review of draft-moore-email-tls-00.txt
X-BeenThere: ietf-smtp@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "Discussion of issues related to Simple Mail Transfer Protocol \(SMTP\) \[RFC 821, RFC 2821, RFC 5321\]" <ietf-smtp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf-smtp>, <mailto:ietf-smtp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf-smtp>
List-Post: <mailto:ietf-smtp@ietf.org>
List-Help: <mailto:ietf-smtp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf-smtp>, <mailto:ietf-smtp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 31 Oct 2013 17:22:15 -0000

Hi Keith,
I am glad to see your draft. Some specific comments:

2.1.  Mail Server Requirements

    The following requirements apply to IMAP, POP, and Submission server
    implementations:

    All IMAP, POP, and Submission servers MUST be configurable to support
    the use of TLS and the Implicit TLS mechanism when communicating with
    MUAs.

While reading your document I was wondering where the secure submission
is defined. Then I finally found a request for a new port in the IANA
considerations section.

Several MUAs and multiple MSPs implement secure submission on port 465.
This was never document and is not registered. (I think this was a Microsoft
invention, but I don't know exact history.) The port is officially
assigned to another protocol.

There are a couple of problems with that. One is trying to register 
unofficially used 465.
Alternatively, we can try to register a new port, but what are the 
chances of people
actually migrating to the new default for secure submission?


2.2.  Mail User Agent Requirements

    This section describes requirements on Mail User Agents (MUAs) using
    IMAP, POP, and/or Submission protocols.

    Note: Requirements pertaining to use of Submission servers are also
    applicable to use of SMTP servers (whether on port 25 or on another
    port as advertised by a SRV record with _smtp._tcp or _smtps._tcp
    label) for mail submission.

This note seems a bit out of place, as you already mentioned elsewhere
that MTA-to-MTA SMTP is out of scope for this document. Plus you are sort
of trying to register smtps here, but you really don't.


2.2.8.  Requirements for MUA use of TLS

    MUAs MUST use the procedure defined in [RFC6125] to determine whether
    a server's TLS certificate contains an identifier which matches the
    DNS name to which the MUA is attempting to connect, and MUST abort
    the TLS session if the server's certificate does not present an
    identifier that matches one of the MUA's predetermined reference
    identifiers for that server.

    It is important to avoid using DNS names obtained from SRV records
    (rather than from explicit user configuration) as reference
    identifiers when comparing with presented identifiers in TLS server
    certificates, unless those SRV records were signed with DNSSEC and
    the signatures were verified by the MUA.

    Note in Draft: [I-D.melnikov-email-tls-certs] describes a profile of
    [RFC6125] for use in MUA checking of presented identifiers in TLS
    server certificates.

Not surprisingly, I think that you should delete the second quoted paragraph
(my draft already includes it) and update the first paragraph to reference
[I-D.melnikov-email-tls-certs]. This would also make 
[I-D.melnikov-email-tls-certs]
normative.

The problem with your first paragraph is that just referencing RFC 6125 is
not enough to get interoperability, because any use of RFC 6125
needs to describe use or non use of several parameters, like SRV-ID, 
CN-ID, etc.


2.2.12.  Use of DANE by MUAs

   o  TLSA record exists and has a valid DNSSEC signature, and the
       public key specified in a TLSA record matches the public key in
       the X.509 certificate presented by the server.  However, the
       server certificate is not signed by a trusted certificate
       authority,

I think this might not be relevant, depending on the TLSA record type used.

       nor has the MUA been explicitly configured ("pinned")
       to accept that particular certificate.  In this case the
       connection MUST gracefully terminate the session with the server
       without attempting to authenticate or request services.

Isn't this the case for asking the user to pin the certificate?

3.3.  TLS Server Certificate Requirements

    MSPs MUST maintain valid server certificates for all servers. Those
    server certificates MUST present DNS-IDs and SRV-IDs conforming to
    [RFC6125] and which will be recognized by MUAs meeting the
    requirements of this memo.  In addition, those server certificates
    MAY provide other DNS-IDs, SRV-IDs, or CN-IDs needed for
    compatibility with legacy MUAs.

Again, I think this should reference [I-D.melnikov-email-tls-certs].


    [RFC4409]  Gellens, R. and J. Klensin, "Message Submission for Mail",
               RFC 4409, April 2006.

This was obsoleted by RFC 6409, so there is no need to reference both 
Normatively.