Re: [ietf-smtp] MTA-MTA SMTP and TLS-on-connect

Ned Freed <ned.freed@mrochek.com> Sun, 26 April 2020 22:54 UTC

Return-Path: <ned.freed@mrochek.com>
X-Original-To: ietf-smtp@ietfa.amsl.com
Delivered-To: ietf-smtp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2A5763A1514 for <ietf-smtp@ietfa.amsl.com>; Sun, 26 Apr 2020 15:54:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level:
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=mrochek.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id v16vveiE1QRu for <ietf-smtp@ietfa.amsl.com>; Sun, 26 Apr 2020 15:54:49 -0700 (PDT)
Received: from mauve.mrochek.com (mauve.mrochek.com [98.153.82.211]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C30733A14C5 for <ietf-smtp@ietf.org>; Sun, 26 Apr 2020 15:54:49 -0700 (PDT)
Received: from dkim-sign.mauve.mrochek.com by mauve.mrochek.com (PMDF V6.1-1 #35243) id <01RK62OLEFZK006DEN@mauve.mrochek.com> for ietf-smtp@ietf.org; Sun, 26 Apr 2020 15:49:45 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=mrochek.com; s=201712; t=1587941385; bh=45AxhvHGsp9gqyyJ5P5xXwo5KFvY4OSbRASd+HEwhkA=; h=Cc:Date:From:Subject:In-reply-to:References:To:From; b=h1IrpsGUu+PAwSr5hRjxGiwHNAKJI9tN/5zX0pTUwss8fosTrcQOiFyGbmCP5ayEC zqsXSaGFdpWH/YEts55k4xRzwn37m81OiPqLZjcsEV8HTZT+xXLy2yGVZSFJjPbTd5 9zvhuKMIKUjNr4jym9Aqofr15TQk1Q6DV3LuecLY=
MIME-version: 1.0
Content-transfer-encoding: 7bit
Content-type: TEXT/PLAIN; CHARSET="us-ascii"
Received: from mauve.mrochek.com by mauve.mrochek.com (PMDF V6.1-1 #35243) id <01RJM3XSTRLC000058@mauve.mrochek.com>; Sun, 26 Apr 2020 15:49:42 -0700 (PDT)
Cc: ietf-smtp@ietf.org, jgh@wizmail.org
Message-id: <01RK62OJMBJQ000058@mauve.mrochek.com>
Date: Sun, 26 Apr 2020 15:46:37 -0700
From: Ned Freed <ned.freed@mrochek.com>
In-reply-to: "Your message dated Sun, 26 Apr 2020 18:20:58 -0400" <20200426222058.DD30A1864B62@ary.qy>
References: <8d3d7446-db7d-ac04-2a36-258643254630@wizmail.org> <20200426222058.DD30A1864B62@ary.qy>
To: John Levine <johnl@taugh.com>
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf-smtp/iEijw9su5EQS05bxyVrvML_SHLo>
Subject: Re: [ietf-smtp] MTA-MTA SMTP and TLS-on-connect
X-BeenThere: ietf-smtp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Discussion of issues related to Simple Mail Transfer Protocol \(SMTP\) \[RFC 821, RFC 2821, RFC 5321\]" <ietf-smtp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf-smtp>, <mailto:ietf-smtp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf-smtp/>
List-Post: <mailto:ietf-smtp@ietf.org>
List-Help: <mailto:ietf-smtp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf-smtp>, <mailto:ietf-smtp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 26 Apr 2020 22:54:51 -0000

> In article <8d3d7446-db7d-ac04-2a36-258643254630@wizmail.org> you write:
> >Hi,
> >
> >Noting that https://tools.ietf.org/html/draft-sheffer-uta-rfc7525bis-00
> >section 3.2 says that TLS-on-connect SHOULD be preferred over STARTTLS
> >(my rephrasing) - and that while T-o-c is reasonably common for MSA-MTA
> >but not for MTA-MTA -
> >
> >should we think about technical means to facilitate the latter?

> Turns out the STARTTLS language was in RFC 7525 and we missed it.

> If this draft goes anywhere, I think we should tell them to fix it and
> say that STARTTLS and TLS-on-connect are equivalent if the path with
> STARTTLS requires its use, which I think reflects reality.

Agreed. The converse should also be mentioned: There's no advantage to
TLS-on-connect if failure means falling back to an unencrypted port.

All of which is a roundabout way of saying there's actually no security
justification for TLS-on-connect for SMTP, RFC 7525 notwithstanding.

				Ned