Re: [ietf-smtp] Followup to your reply on the IETF-SMTP mailing list

Alessandro Vesely <vesely@tana.it> Mon, 24 May 2021 10:43 UTC

Return-Path: <vesely@tana.it>
X-Original-To: ietf-smtp@ietfa.amsl.com
Delivered-To: ietf-smtp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6B47D3A2338 for <ietf-smtp@ietfa.amsl.com>; Mon, 24 May 2021 03:43:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.498
X-Spam-Level:
X-Spam-Status: No, score=-1.498 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, NICE_REPLY_A=-0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_SBL=0.5, URIBL_SBL_A=0.1] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1152-bit key) header.d=tana.it
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tLiv_8TF1VqA for <ietf-smtp@ietfa.amsl.com>; Mon, 24 May 2021 03:43:13 -0700 (PDT)
Received: from wmail.tana.it (wmail.tana.it [62.94.243.226]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6367D3A2369 for <ietf-smtp@ietf.org>; Mon, 24 May 2021 03:43:12 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=tana.it; s=delta; t=1621852987; bh=KVMbRBhmJVvriY/LWcNTqsuUdBAbaIe7QKoceP4i4aw=; l=4903; h=To:References:Cc:From:Date:In-Reply-To; b=Dfn190v65+vltBYT89V2WXIxIiJFGwE/swNFrahYjO7JIYXLJ+hPXSIW/LT12cGyf dLToSMumrpXH7Atj6X7Bx7iqgb3qMwMs7kprFPE5x4ciSHBfn/iA8QaXStbqnLD2sc GLpyTg3SFo3RTFjiwX+z3ew6+FsoAMXsKWwAGAqLJ5Gq8XeoIplbQNXHxVQiq
Authentication-Results: tana.it; auth=pass (details omitted)
Original-From: Alessandro Vesely <vesely@tana.it>
Original-Cc: SMTP Interest Group <ietf-smtp@ietf.org>
Received: from [172.25.197.111] (pcale.tana [172.25.197.111]) (AUTH: CRAM-MD5 uXDGrn@SYT0/k, TLS: TLS1.3, 128bits, ECDHE_RSA_AES_128_GCM_SHA256) by wmail.tana.it with ESMTPSA id 00000000005DC053.0000000060AB833B.0000716A; Mon, 24 May 2021 12:43:07 +0200
To: Kaspar Etter <kaspar@ef1p.com>
References: <A697C6EE-4D8C-4C92-92B7-6AD5FA177625@ef1p.com>
Cc: SMTP Interest Group <ietf-smtp@ietf.org>
From: Alessandro Vesely <vesely@tana.it>
Message-ID: <f4408787-915a-34e9-86d9-f9dc419c3a8c@tana.it>
Date: Mon, 24 May 2021 12:43:06 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.9.0
MIME-Version: 1.0
In-Reply-To: <A697C6EE-4D8C-4C92-92B7-6AD5FA177625@ef1p.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Language: en-US
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf-smtp/kUhlTQqlY3-cA3FO1i3MhE6zy_E>
Subject: Re: [ietf-smtp] Followup to your reply on the IETF-SMTP mailing list
X-BeenThere: ietf-smtp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Discussion of issues related to Simple Mail Transfer Protocol \(SMTP\) \[RFC 821, RFC 2821, RFC 5321\]" <ietf-smtp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf-smtp>, <mailto:ietf-smtp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf-smtp/>
List-Post: <mailto:ietf-smtp@ietf.org>
List-Help: <mailto:ietf-smtp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf-smtp>, <mailto:ietf-smtp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 May 2021 10:43:19 -0000

Hi Kaspar,

On Sun 23/May/2021 15:16:57 +0200 Kaspar Etter wrote:
> 
> I wasn’t subscribed to the IETF SMTP mailing list when you wrote 
> https://mailarchive.ietf.org/arch/msg/ietf-smtp/Lqfwg9DfaxmYAv_S5WGiOPsJFCw/. 
> Since I’m too lazy to compose this followup message manually, I can’t continue 
> the conversation on the mailing list, and so I decided to write to you personally.


As the discussion is fully non-personal, I think you don't mind if I CC the list.


>> One thing is the definition of /email service provider/.  The wikipedia article
>> you link to is correctly named /Mailbox provider/.  A number of people consider
>> ESPs a different kind of business.  Others, especially foreigners, don't grok 
>> that.
> 
> I don’t like the term “mailbox provider” because these companies provide much 
> more than just a mailbox, namely email submission and delivery, spam 
> prevention, and message filtering with Sieve or some other interface. For me, 
> email service provider is a suitable equivalent to Internet service provider 
> (ISP). Do you think of Mailgun, SendGrid, Postmark, etc. when you hear “email 
> service provider”? I called them SMTP service providers or email delivery 
> vendors in the box about reputation 
> (https://explained-from-first-principles.com/email/#reputation).


Hm... /email delivery vendor/ sounds interesting.  Unfortunately, ESP is well 
established already (among the people who knows what that is).

Mailbox provider was told me by JD Falk when I was caught in the same trap:
https://web.archive.org/web/20100613121358/http://mipassoc.org/pipermail/abuse-feedback-report/2009q3/000360.html

Even if MPs offer many more services, mailboxes are associated with email 
addresses, which are the most noteworthy elements of visibility.

An alternative name is MSP (without 'E'), defined in email arch. as:

    Transit:    Mail Service Providers (MSPs) that offer value-added
                capabilities for Edge ADMDs, such as aggregation and
                filtering.


>> I'd note that the author's email address is usually considered more private
>> than the (temporary) IP address used for submission.  Yet, in this respect,
>> protocols are not clear about what submitters are allowed to put in the
>> From:/MAIL FROM addresses.  Even if the SMTP operator DKIM signs From: and
>> restricts MAIL FROM by SPF, it is not formally required to check those values.
> 
> I’m not sure what you wanted to get at, but I responded to Bron on the mailing 
> list.


Traditional email software allows to tinker with originator data, in part for 
the sake to grant anonymity.  Some providers restrict it, but no RFC require 
them to be valid.


>> Did you find clients that execute Javascript?
> 
> No. Did I imply this? I tested everything I was interested in with the same few 
> mail clients.


No, I didn't see the topic of remote code execution in your article.  However, 
Javascript can be embedded inside html pages, where browsers normally execute 
it.  I hope email clients don't, but I don't recall feature statements in this 
regard.


>>> [CNAMEs in SPF]
>> OTOH, resolvers can deliver the target without requiring an extra call.  And
>> the number of calls is the only thing an SPF verifier can/should count.
> 
> This requires the use of DNSSEC (see 
> https://explained-from-first-principles.com/email/#name-chaining-attacks, 
> but many companies use SPF without DNSSEC.


A recursive resolver doesn't have to be DNSSEC aware.  A client issues a call 
and looks for a TXT RR in the response.  A fussy client has to explicitly look 
for CNAME records in order to increase the count when it finds them.  IMHO, it 
makes no sense.  Resolving implies additional calls issued by the resolver to 
navigate any involved zone cut, and these are certainly not counted.


>> Neither am I.  However, I'd note a couple of points:
>>
>> * It's not clear who provides web hosting for MTA-STS.  Is it a third role?
>>
>> * Domain owner should prepare new TSLA RRs /before/ the MX operator changes
>> key/certificate.  Failure to sync might entail a few days of blackout.
> 
> I’m not sure to whom you addressed these questions. The answer to the first 
> question is that it doesn’t matter (from the perspective of the standard).


While not important for users, a web server is not necessarily part of an email 
hosting contract.  In various circumstances, the web site operator is an extra 
party, which requires coordination with both the mail operator and the domain 
owner.


> And the beauty of TLSA records is that the MX operator maintains them. All I
> have to do as a domain owner is to deploy/enable DNSSEC on my domain.

You're right.  I assumed the TLSA record was not a CNAME.  I guess you mean:

_25._tcp.my-domain.example. IN CNAME _25._tcp.MX-operator.example.



Best
Ale
--