Re: Requesting comments on draft-cheney-safe-02.txt

"Cheney, Edward A SSG RES USAR USARC" <austin.cheney@us.army.mil> Fri, 31 July 2009 14:15 UTC

Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n6VEFnGG082745 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 31 Jul 2009 07:15:50 -0700 (MST) (envelope-from owner-ietf-smtp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n6VEFnXP082744; Fri, 31 Jul 2009 07:15:49 -0700 (MST) (envelope-from owner-ietf-smtp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-smtp@mail.imc.org using -f
Received: from mxoutps1.us.army.mil (mxoutps1.us.army.mil [143.69.250.38]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n6VEFmeY082736 for <ietf-smtp@imc.org>; Fri, 31 Jul 2009 07:15:49 -0700 (MST) (envelope-from austin.cheney@us.army.mil)
DomainKey-Signature: s=ako; d=us.army.mil; c=nofws; q=dns; h=From:X-AKO:X-IronPort-AV:Received:Received:To:Cc: Message-ID:Date:X-Mailer:MIME-Version:Content-Language: Subject:X-Accept-Language:Priority:In-Reply-To:References: Content-Type:Content-Disposition: Content-Transfer-Encoding; b=aZTIqwHdWAdDoHw0sazvcLw7kRIHk00kyA5Hljg8INbjQIg2R5YJmzGQ odXZ6n+W36pqHrMC3LhX24kNajH4Uw==;
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=us.army.mil; i=austin.cheney@us.army.mil; q=dns/txt; s=akodkim; t=1249049749; x=1280585749; h=from:sender:reply-to:subject:date:message-id:to:cc: mime-version:content-transfer-encoding:content-id: content-description:resent-date:resent-from:resent-sender: resent-to:resent-cc:resent-message-id:in-reply-to: references:list-id:list-help:list-unsubscribe: list-subscribe:list-post:list-owner:list-archive; z=From:=20"Cheney,=20Edward=20A=20SSG=20RES=20USAR=20USARC "=20<austin.cheney@us.army.mil>|Subject:=20Re:=20Requesti ng=20comments=20on=20draft-cheney-safe-02.txt|Date:=20Fri ,=2031=20Jul=202009=2018:15:47=20+0400|Message-ID:=20<f77 e8e12fb19.4a7334d3@us.army.mil>|To:=20Alessandro=20Vesely =20<vesely@tana.it>|Cc:=20ietf-smtp@imc.org|MIME-Version: =201.0|Content-Transfer-Encoding:=207bit|In-Reply-To:=20< 4A729978.5030209@tana.it>|References:=20<f6fecbd18af7.4a7 21c99@us.army.mil>=0D=0A=20<4A720D35.1000306@cybernothing .org>=0D=0A=20<f6e091e580a6.4a7258af@us.army.mil>=20<4A72 9978.5030209@tana.it>; bh=3Hin3wmG4/JBMdhnsh4maxFUQLAh+P49em6FP3TwsuU=; b=UXXra5gJXg4RqvpF2O/w5vUK0GXxR3sPk4aeWrAxmQDpR6twZe7+sR55 ALJSdBWMJ5cX34lLKNl+ghxLrTh1jEGK8g4umL9KjudDxTyJW18zOIuWc iX4AsQDzs+KNF5LObR2n0VibaOoVkZDkzk2vMN45N3whuhpTSKTHHN8xN s=;
From: "Cheney, Edward A SSG RES USAR USARC" <austin.cheney@us.army.mil>
X-AKO: 96503221:10.224.29.21:31 Jul 2009 14:15:47 +0000:$Webmail:None
X-IronPort-AV: E=Sophos;i="4.43,303,1246838400"; d="scan'208";a="96503221"
Received: from lb2pip21.int.ps1.us.army.mil (HELO us.army.mil) ([10.224.29.21]) by mxoutps1.us.army.mil with ESMTP; 31 Jul 2009 14:15:47 +0000
Received: from [10.224.32.177] (Forwarded-For: 217.163.18.130, [10.224.32.177]) by mail15.int.ps1.us.army.mil (mshttpd); Fri, 31 Jul 2009 18:15:47 +0400
To: Alessandro Vesely <vesely@tana.it>
Cc: ietf-smtp@imc.org
Message-ID: <f77e8e12fb19.4a7334d3@us.army.mil>
Date: Fri, 31 Jul 2009 18:15:47 +0400
X-Mailer: Sun Java(tm) System Messenger Express 6.3-6.03 (built Mar 14 2008; 32bit)
MIME-Version: 1.0
Content-Language: en
Subject: Re: Requesting comments on draft-cheney-safe-02.txt
X-Accept-Language: en
In-Reply-To: <4A729978.5030209@tana.it>
References: <f6fecbd18af7.4a721c99@us.army.mil> <4A720D35.1000306@cybernothing.org> <f6e091e580a6.4a7258af@us.army.mil> <4A729978.5030209@tana.it>
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit
Sender: owner-ietf-smtp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-smtp/mail-archive/>
List-ID: <ietf-smtp.imc.org>
List-Unsubscribe: <mailto:ietf-smtp-request@imc.org?body=unsubscribe>

Alessandro,

> Apparently, moving scripts execution to mail servers would also
> transfer vulnerability issues along the same path.
I attempted to resolve this problem as much as possible.

1) Scripts would not be executed by the client, so only the owner of the scripts could execute them.
2) I suggest that scripts must be executed in a sandbox location that is different from where they are stored on the server.  This idea is so if a script becomes corrupt or compromised during a session of communication that corruption would be limited to that single session.  A sandbox can also be regulated in how code is executed to prevent access to code outside the sandbox.

> Is it difficult
> to state whether a compromised server is better than a compromised
> client, but it is certainly better if at least one of them is not
> compromised.
I would say that it is better, only because of distribution of responsibilities.  A certain expectation is typically expected of a server administrator, especially if that server administrator is from a respected domain.  There is no expectation of responsibility or expertise to maintain the most basic of security controls from the user.

> In addition, it may be overly difficult to obtain real
> interactivity
> without local scripting.
Yes, the idea of event oriented execution would not be possible.  As a result loss of application interactivity would certainly occur locally.  The idea is to replace this luxury with rapid short bursts of data exchange between a client and the distant mail server.  The result is certainly less reliable than client-side scripting, but is more secure with a significantly higher degree of data integrity.

I am extremely hesitant to suggest that any event oriented execution should exist from an email client.  Its a drastic hard stop to completely remove the possibility of security compromise from the client.  I believe there is a middle ground where extremely limited interactions are possible from execution based upon client events, such as mere manipulation of the DOM.  It is very possible that such limited execution can be easily specified, but I believe this would be too easily abused.  I believe people know how things should work on the WWW and if provided the opportunity would do everything in their power to ensure that they work in email without regard for the standards or security compromises.

I will have to review the language of the specification to ensure I am not incorrectly communicating the definition of a CA.  I agree that the client should not have to manage any role of a CA or even distributed digital signatures.  I do state that a CA must be on a domain separate from any other involved agent in the transaction.  The idea is that this process exist to establish that the distant server is not a spoofed address in as much a transparent manner as possible.  I will reevaluate the language I have used to describe this process.

Thanks,
Austin

----- Original Message -----
From: Alessandro Vesely <vesely@tana.it>
Date: Friday, July 31, 2009 11:42
Subject: Re: Requesting comments on draft-cheney-safe-02.txt
To: "Cheney, Edward A SSG RES USAR USARC" <austin.cheney@us.army.mil>
Cc: ietf-smtp@imc.org


> Cheney, Edward A SSG RES USAR USARC wrote:
> > The idea is that security vulnerabilities on the internet occur 
> most significantly as a result of client-side scripting [...]  
> Client-side scripting cannot be removed unless an alternative 
> convention is proposed.
> > 
> > [...] The idea is that interactivity from client-side scripting 
> can be replaced by transaction interactivity.  Since mail servers 
> are intermediate agents [...]
> 
> Apparently, moving scripts execution to mail servers would also 
> transfer vulnerability issues along the same path. Is it difficult 
> to state whether a compromised server is better than a compromised 
> client, but it is certainly better if at least one of them is not 
> compromised. (Considering that many mail server also function as 
> http servers, for handling email via web forms, it seems unlikely 
> that the vulnerability added to the servers would thus be removed 
> from the clients.)
> 
> In addition, it may be overly difficult to obtain real 
> interactivity 
> without local scripting. Indeed, the draft defines what minimal 
> code 
> a client has to be allowed to execute. Allowing some more seems 
> likely to come as an optional feature...
> 
> Finally, if the model is meant for widespread use, it shouldn't 
> rely 
> on users' ability to obtain and maintain CA certificates on their 
> clients, or similar requirements, whose fulfillment doesn't seem 
> more likely than S/MIME or PGP deployment. IMHO, ensuring that the 
> server who has relayed the message is vouched for sending 
> transactions by a trusted authority may be more viable (see RFC 
> 5518). I would additionally provide for an SMTP extension whereby 
> that relaying server grants that it knows where the message has 
> originated from, and takes accountability for its content.
>