Re: [secdir] [Uta] Secdir last call review of draft-ietf-uta-smtp-require-tls-07

Jim Fenton <fenton@bluepopcorn.net> Thu, 28 February 2019 23:19 UTC

Return-Path: <fenton@bluepopcorn.net>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6886613106F; Thu, 28 Feb 2019 15:19:40 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level:
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=bluepopcorn.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9QOy6ot-vb3Z; Thu, 28 Feb 2019 15:19:38 -0800 (PST)
Received: from v2.bluepopcorn.net (v2.bluepopcorn.net [IPv6:2607:f2f8:a994::2]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E6C2D130E96; Thu, 28 Feb 2019 15:19:37 -0800 (PST)
Received: from steel.local ([IPv6:2601:647:4300:2290:214e:1bd0:ac50:a2ec]) (authenticated bits=0) by v2.bluepopcorn.net (8.14.4/8.14.4/Debian-8+deb8u2) with ESMTP id x1SNJY2D028256 (version=TLSv1/SSLv3 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO); Thu, 28 Feb 2019 15:19:35 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=bluepopcorn.net; s=supersize; t=1551395975; bh=uf/dkvqjuRv6zda3OKwv1BXTevndr8O24+iH6CsMZJ8=; h=From:Subject:To:Cc:References:Date:In-Reply-To; b=mcPiw22TCTu6ld8mw2PfzS0wTUbaa8ALW+dCppYMAZltBPC9zQGwl6zZuVL7MRZe0 ZnHSJlKU4dOQNPzEGmLkHe7d+I6asAJy9ywQjx6LT1nslC4EXw6WWwYLxRsl6/2H3l 6uaWWsTaIMTHABNihOYL3eArgoykbwmcDH8rhHKw=
From: Jim Fenton <fenton@bluepopcorn.net>
To: Yaron Sheffer <yaronf.ietf@gmail.com>, secdir@ietf.org
Cc: uta@ietf.org, ietf@ietf.org, draft-ietf-uta-smtp-require-tls.all@ietf.org
References: <155086101448.5343.14630075460582755101@ietfa.amsl.com>
Openpgp: preference=signencrypt
Autocrypt: addr=fenton@bluepopcorn.net; prefer-encrypt=mutual; keydata= mQINBFJNz0MBEADME6UoNSsTvSDJOdzL4yWfH4HTTOOZZPUcM/at38j4joeBb2PdatlwCBtk 9ZjupxFK+Qh5NZC19Oa6CHo0vlqw7V1hx1MUhmSPbzKRcNFhJu0KcQdniI8qmsqoG50IELXN BPI5OEZ3chYHpoXXi2+VCkjXJyeoqRNwNdv6QPGg6O1FMbB+AcIZj3x5U18LnJnXv1i+1vBq CxbMP43VmryPf8BLufcEciXpMEHydHbrEBZb/r7SBkUhdQXjxRNcWOLeYvOVUOOrr1c+jvqm DEbTWUJVRnUro/WpZQBffFnymR0jjkdAa8eOVl/nF2oMLbaBsOMvxCRSSEcGhuqwbEappNVT 1nuBTbkJT/GGcXxc+lEx9uNj86oYC4384VZJMTd1BRI4qPXImNZCIdmpKegK743B6xxN6Qh1 Tg167pn9429JENQE/AFIVX5B/gpsg7Aq+3rmz9H6GbfovPvFV3TBTgsHCHAMC8XU+S4fhcqN PN0lbUeyb7g6wxaE+dYqC7TExx7G3prw4v66y0qS7ow/Cfw8XXOEkaFQ4XwP7nvfILT+9CcU yS8I40vlDFU9Wnt56CbGz0ZVQgHnwyPXL+S9kCcIwRLFx1M79s6T6qwX1TXadfpbi1uIw7XG TiPDT8Pk6i2y22oSSROyYD4D+wOhVkkvO0S8iZ3+LhAYUx86nwARAQABtCNKaW0gRmVudG9u IDxmZW50b25AYmx1ZXBvcGNvcm4ubmV0PokCVQQTAQIAPwIbAwYLCQgHAwIGFQgCCQoLBBYC AwECHgECF4AWIQS1nUkJe2fEXbvBaacbJaiwFdCfvgUCW4RXswUJCxkNcAAKCRAbJaiwFdCf vjdyD/wNUBktyTqGVI5JGE8TJX6+6bmq5HHJ/I+CgGNtyvjriNZdxZJ86L5Z7MIidBeUOXvl /DZK+1zvS/hq8oMe7rPMbSepHHdhMyVTBuWnUG3n48dYOMqQjttBxisauC9GXrejhDJeGP+y WDLRdkMs1h5M48MKpEHf69pvkb+CCewbJeJH3kpPc5Iv9lJEOM/SrGlR72RUsMHeBcc3ykPR CeW0MpXGKAo5QCRw51uvuy7jZdlxOrLMMvMSyqCVanaW2Iz8mXQKufahkDfjff/eBUgXSfxS L1H2ZUN8XeyLttn6iei0Jqs1aSTmU1y0XxMM5k0rgA+3PoZrkgYTSvVBQMhE+sIyeoiB9oat 5h7M7nZBXc4LQTEwMFCamE4GIaSkpLFwBBwZwPa487XKnPbGV6zr7sYEzDaCvkQGJdfw6NqA 5IxLgmAoCAWnp3h26OtUJ0lmgpRy/Vy4yinbVAvkBq1CB1gRlNDYn0Ton06Bz0ltSpBTWTzj m6zvnA2JLzyFrTc30PR22WD/m18/qgua7YCiP1xu88AsnY5HPgxDj88PDiiyuFftYHhSY0Dy nV+iz+NEPal/LaklqVmA1+l8qj/SPAdycbD/s2X6MHjPBamdBmzytuEZnv+LImPTkdswExLD AORVDaH2SYuznhFs7xZ/t1rB5Yo1l5eDGdTQ6KLsDLkCDQRSTc9DARAAwZaXYs3OzGlpqvSH 3HR9GjSzIeP0EmsBCjpfIdZbQBwQ3ZREiMGInNxV+xkdjLDg0ctrWzUCUe3plWe5NJkpjqm+ KMc7GKhyeWJ5MZRtVrh0VpFTqi8UwYPWumAYqE1y/U1me/zHpfG9EDwdSYqMkPF76Fy5W+vh ZP2ILKaY8qWSLyH8TPl5mFGBypfT8Q6UuzlRs2aTbsTtBX/qwH7gztMRJSjQtYo20AqCgBBH IA/0xV5qDH7CVYyKyPQ4tJLQ8/xyTysUS5fewrj8lZo/G9SaNtC3CEvrJYwyA0nvYB6+hJPM qMP/tyRXM/9XY3qO4Vxuc+m5fYbTZa5GYAZNNuB5dvqI1U0sFTWBEbpAeabqCQ40ZnFSj+t1 tBuwfj4ey/oJ78WRyg5+VTvPKRRubOmZcnzj5yfTS3VGxAZb4Nsj1S2f3KLP0Z+Cv4dt893I 2JWTChw7jA1omF0QTQaBq140n084PFndBHudrZ3cz+APC89iie2HQ4jGQldXZXnGySHnHlA+ WUyZ9wgOplW9F4Q/Lps1bnuh5VttPVpNfjX8hiV48al+b+ut4nfzXAripIRWF3TL72/6JqgE KNhRKyRn0S6BidieSyHWzqJR3Roi/YNTvyXyLh6i6jtByb3FbnhYf/9olobDpj0E+kTemLrw owre85gwupSphqlzVSUAEQEAAYkCPAQYAQIAJgIbDBYhBLWdSQl7Z8Rdu8FppxslqLAV0J++ BQJbhFZUBQkLF7qRAAoJEBslqLAV0J++wvgP/jPjfjH3zEGYhdv89B0vFsRIBDDZzJuMxZZL EW/FyqKqswTHt6HD2ScuiGNEsNWebKEZbj2+Y673KqWnBGMFuJovAzlLeNNxQToJq03pzm/9 4A0ePYk9xzrMgtW+DEUemWElvMbSwZYid8Zj4lAx+U/X6Dh7HPSTx8DO4BKRA4cLrASOaUuS /w8/2eTXNEJssqc8Shwq6bNO5cPXrjb/qJgbb/MOLp0Nn1vNIPjoi/88910pyOV9chYJJFRX zOofGwaRjvcO55X57lveBrNEgH453EHa7QAHL4wD2dbCd445YOPkn0mBNJe3Un5JTsi6IQaK NHUMfwTWrVWN8RapFaPv6YXVBEvpA13G88TFkR5UHlz6YEUMATmgJQpmTFRkPYT0DTEbL4/O ywFgqMzmY1ojKV/Z6iWCAHqVnyFr6NtTFmT/qkOtb933YWJZW6Pg/Us2rZHro7uvQ/bf7Uxb vkn4lX+VneDBjsk3RPnHO/6k8lY2xQ343O7QOedSkM6rJpB9IbgXvHJNJfAWV+L89ElZeKJr VNaQqAw/1uXM7s8MVc+qwoT+DN0jsdqkBcuBxnbYeyM/8X6wcZHopV74r7SAbH4TrtjcBft5 nyM0UroVaEXvJxLzL3kQTsHIiDtGVuYwDTHzVl9591fuyEe0cYZVP2WckXcuM7EUn4CPBUYJ
Message-ID: <1ff22763-bf46-2b89-aa09-ca55e979975f@bluepopcorn.net>
Date: Thu, 28 Feb 2019 15:19:28 -0800
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:60.0) Gecko/20100101 Thunderbird/60.5.0
MIME-Version: 1.0
In-Reply-To: <155086101448.5343.14630075460582755101@ietfa.amsl.com>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Content-Language: en-US
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/xtta7LL7U2G7AOcYaIf9zZfGNr8>
Subject: Re: [secdir] [Uta] Secdir last call review of draft-ietf-uta-smtp-require-tls-07
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2019 23:19:40 -0000

On 2/22/19 10:43 AM, Yaron Sheffer wrote:

> Reviewer: Yaron Sheffer
> Review result: Has Nits
>
> [Apologies for the late review.]
[And for the late response.]
>
> * Intro: To avoid confusion, please mention the header parameter "No" to
> clarify why the header is named RequireTLS when its semantics is the exact
> opposite, "prioritize delivery over ability to negotiate TLS"? The same
> confusion already arises in the abstract.
OK.
> * Sec. 2: it seems to be implied that
> when REQUIRETLS is used, STARTTLS MUST also be sent. Is this the case? If so,
> please mention it (it's obvious to you but not to a first time reader).
STARTTLS is normally needed, but wouldn't be if implicit TLS (i.e., on
submission port 465) is used.
> * I
> would have expected a parameter to be associated with REQUIRETLS to indicate
> whether DANE is required throughout the forwarding path, or MTA-STS, or either
> one will do. Although RFC 8461 takes care to not use the "opportunistic" word,
> it is in fact opportunistic to some degree (because an attacker can block the
> initial policy lookup with DNS) and so has different security properties than
> DANE. I am sure you've already beaten this horse to death, but if you have not,
> I think this is a real issue. The thing is, if ever we have widespread
> deployment of DANE (which I do NOT expect), this mechanism will not be as
> secure as it could have been. 


In earlier drafts, the REQUIRETLS SMTP parameter had options that
allowed the sender to specify whether DANE or certificate chain
verification of certificates (or either) should be used. That isn't
exactly the same as what you're suggesting, but it's close. The WG
consensus was to eliminate the option because it was considered to be
unnecessarily complex.


> * Sec. 2 security requirements: the session must
> employ TLS: does this include pre-negotiation of TLS before starting SMTP, or
> only session upgrade with STARTTLS? This is common in Submission, I'm not sure
> about MTA-to-MTA use.


Pre-negotiation of TLS or STARTTLS can be used with submission, and
REQUIRETLS can be specified at submission. There is no standard port for
MTA-to-MTA use.

> * RequireTLS header field: I believe that the REQUIRETLS
> parameter MUST NOT be used when the header field is there, why not mention it?


We have gotten other comments that this case should throw an error. We
will probably be doing this.

> * If we define a case where MTA-STS policy is to be ignored (when using
> RequireTLS: No), shouldn't this document be marked as Updates RFC 8461?


Alexey is researching this.

> * The
> word "no" appears twice in Sec. 3, capitalized as "NO" or "No". Are parameters
> case insensitive? 


Yes.

> * The case of REQUIRETLS+RequireTLS on receipt is
> interesting, and the MAY requirement (Sec. 4.1) makes it non-deterministic. Why
> don't we simply disallow it and reject the message? 


See above; this will probably be disallowed and cause it to throw an error.

> * The textual name is
> mentioned twice, once with and once without a space. 


Will be corrected.

> * 8.2 (active attacks):
> this solution is still vulnerable to the DNS blocking attack associated with
> MTA-STS (RFC 8461, Sec. 10.2), and this should be mentioned here.


If the REQUIRETLS SMTP option is used, either MTA-STS or DNSSEC
confirmation of the MX host is required. If DNS is blocked (and DNSSEC
is not used), transmission of messages requiring TLS fail. So I would
consider REQUIRETLS to be less vulnerable to that attack than MTA-STS by
itself, except possibly as a denial-of-service attack on
REQUIRETLS-tagged messages. There are much better ways to DOS a mail
server than this. Does it warrant mentioning?

Thanks for your review.

-Jim