Re: [ietf-smtp] why are we reinventing mta-sts ?

Viruthagiri Thirumavalavan <giri@dombox.org> Mon, 07 October 2019 13:33 UTC

Return-Path: <giri@dombox.org>
X-Original-To: ietf-smtp@ietfa.amsl.com
Delivered-To: ietf-smtp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8FD43120020 for <ietf-smtp@ietfa.amsl.com>; Mon, 7 Oct 2019 06:33:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=dombox.org
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tdZBrmCtzekH for <ietf-smtp@ietfa.amsl.com>; Mon, 7 Oct 2019 06:33:38 -0700 (PDT)
Received: from mail-pf1-x434.google.com (mail-pf1-x434.google.com [IPv6:2607:f8b0:4864:20::434]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A4F2912008F for <ietf-smtp@ietf.org>; Mon, 7 Oct 2019 06:33:38 -0700 (PDT)
Received: by mail-pf1-x434.google.com with SMTP id q21so8657002pfn.11 for <ietf-smtp@ietf.org>; Mon, 07 Oct 2019 06:33:38 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=dombox.org; s=default; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=zASWGt3lMrbgFkqRzWHq6y+4X+aagXTFmc5J3eZbTTk=; b=LZLRvJm+seyj50dc0j2ExVuupo6az/TUsLbQtpDbKjjDD5wTgqVVEinUZBoF2jA/jh FMlLCBfb6Y+KHIbQhOS6L+qgqR+PPzRQdX4Shmobnm/hMS2fS57hDTvTuhcihXhWgsjM KV/ohwANjQevp8N59QgDIKSOlNjbFqU/B96Ih4PNym2SxnkktWroXAGyCQPP3vccAz6q ozkgVWLyxfdfLnxCZnpUZDdRNWo4ubRaiCHppOzVyhMNWqCseperdbA0iZQZEbaZN0uK bvLYlvuK3xzxgCCmssZcMsxpad58YAyotCXebsMZ0gXsKW17jWEdMSaMJrRnnDQoLeh1 woHw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=zASWGt3lMrbgFkqRzWHq6y+4X+aagXTFmc5J3eZbTTk=; b=iz7h4O36spK/zldNqxWqCleh2D+ZoYKsnkKiHjipv4kzwNnzINF4+pI3AFu2nEmfPP nHyBg6Epp5xgGAp9pwUYsMVhSeeW7VAOzuY3Yw6CrYvRLIsiqqsPKIxDxsLjORpJH4Ic cp7DEF16+RlwZHQmk0H8no06JbPyQ2VMJXICoyGEdQDWVfN9V7gJ2AUzYycii1JujdBQ J5Fyaiu6Llv10+QyIC6u1GxEMzpK+H8k6v6EgQCUh0qLsvzXBmm4zZ6PHfQ6v5GnFlf/ i2RZYWhqPv51Y6Az0z68Wq/japhF5V8YAA7DY1Ka4Zhqw3Ft5ApNHKARDDVA3t5wAlYU VtcQ==
X-Gm-Message-State: APjAAAWyH8lyU4xVG3S4nHNqDO5yid1Wfb5J0NFGLKUdBWVlwkWW0Q4S OIEM1GO/H4Osm0YRlGk/axnXcs7O5vniLxFQjLqPpA==
X-Google-Smtp-Source: APXvYqyrjFuKwfk+Ohti7SSH5tYdBUXfl7e7r3q6VIAiHoXBe+a723PuwgkG+CZGrlosyuiWjOswKpDtv+QdVuxdWGQ=
X-Received: by 2002:a17:90a:fd86:: with SMTP id cx6mr34008739pjb.61.1570455217983; Mon, 07 Oct 2019 06:33:37 -0700 (PDT)
MIME-Version: 1.0
References: <20191007002348.GA23742@x2.esmtp.org> <20191007015616.BE113BB3D68@ary.qy> <CANtKdUeC0NVfvVpbHtwd=OoO=BoT8KNWVx8BGF-GPZPU-zo6QA@mail.gmail.com> <249ffeeb-44eb-b180-52e1-866e755c5cc1@network-heretics.com>
In-Reply-To: <249ffeeb-44eb-b180-52e1-866e755c5cc1@network-heretics.com>
From: Viruthagiri Thirumavalavan <giri@dombox.org>
Date: Mon, 07 Oct 2019 19:03:12 +0530
Message-ID: <CAOEezJSU1XY0knj=bLz2FgrnZLTM9ZU0Jf1e0q32UrNp7NV8rA@mail.gmail.com>
To: Keith Moore <moore@network-heretics.com>
Cc: SMTP Discuss <ietf-smtp@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000676672059452197f"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf-smtp/owT1lvUKFlZ_G0uRU1-uIyjzIhY>
Subject: Re: [ietf-smtp] why are we reinventing mta-sts ?
X-BeenThere: ietf-smtp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Discussion of issues related to Simple Mail Transfer Protocol \(SMTP\) \[RFC 821, RFC 2821, RFC 5321\]" <ietf-smtp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf-smtp>, <mailto:ietf-smtp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf-smtp/>
List-Post: <mailto:ietf-smtp@ietf.org>
List-Help: <mailto:ietf-smtp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf-smtp>, <mailto:ietf-smtp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 07 Oct 2019 13:33:41 -0000

Yes, I didn't explicitly mention that.

I worded like this.

Where “starttls-” says “Our port 25 supports Opportunistic TLS. So if
> STARTTLS command not found in the EHLO response or certificate is invalid,
> then drop the connection”.


Certificate becomes invalid when the protected MX target not found in the
certificate presented.

On Mon, Oct 7, 2019 at 6:06 PM Keith Moore <moore@network-heretics.com>
wrote:

> On 10/7/19 5:11 AM, Daniel Margolis wrote:
>
> > I've only quickly skimmed the original thread, but it seems like the
> > argument is about this magic DNS prefix for MX records that would
> > indicate "this MX should offer STARTTLS", right?
> >
> > As John says, the new proposal also requires DNSSEC, no? It seems like
> > the primary difference is that the new proposal is simpler by
> > indicating only that the server supports TLS, but not what identity it
> > presents? Why is that desirable?
>
> I didn't see this explicitly specified in the proposal, but IMO the
> server certificate should match the target of the MX record.
>
> And depending on DNSSEC probably does impair the ability of this to be
> deployed.   But if DoT can be used instead of DNSSEC, it seems to me
> that this might be easier to deploy than MTA-STS.
>
> Granted, MTA-STS exists already and enjoys some support.   A new
> proposal thus has a high bar to clear in order to be accepted as a
> standard.   But I don't think it's wrong to discuss other ideas.
>
> Keith
>
>
> _______________________________________________
> ietf-smtp mailing list
> ietf-smtp@ietf.org
> https://www.ietf.org/mailman/listinfo/ietf-smtp
>


-- 
Best Regards,

Viruthagiri Thirumavalavan
Dombox, Inc.