Re: [Uta] Eric Rescorla's Yes on draft-ietf-uta-email-deep-09: (with COMMENT)

Viktor Dukhovni <ietf-dane@dukhovni.org> Fri, 27 October 2017 19:20 UTC

Return-Path: <ietf-dane@dukhovni.org>
X-Original-To: uta@ietfa.amsl.com
Delivered-To: uta@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AB2CE137E0B; Fri, 27 Oct 2017 12:20:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level:
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tLFQg-IRinEO; Fri, 27 Oct 2017 12:20:49 -0700 (PDT)
Received: from mournblade.imrryr.org (mournblade.imrryr.org [108.5.242.66]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3A39213F3E6; Fri, 27 Oct 2017 12:20:49 -0700 (PDT)
Received: from [192.168.1.161] (straasha.imrryr.org [100.2.39.101]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mournblade.imrryr.org (Postfix) with ESMTPSA id 6E2517A330D; Fri, 27 Oct 2017 19:20:42 +0000 (UTC) (envelope-from ietf-dane@dukhovni.org)
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 11.0 \(3445.1.7\))
From: Viktor Dukhovni <ietf-dane@dukhovni.org>
In-Reply-To: <CABcZeBPx2zS8Wr5179wkcmv-_=KeQSfCi91tb0OpSax7QbETPg@mail.gmail.com>
Date: Fri, 27 Oct 2017 15:20:42 -0400
Cc: "uta@ietf.org" <uta@ietf.org>, draft-ietf-uta-email-deep@ietf.org, The IESG <iesg@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <DCE1B082-DE06-4ECA-98E6-26B21BDF4682@dukhovni.org>
References: <150852235551.15416.1247335476327491501.idtracker@ietfa.amsl.com> <98fddd93-a0a8-efa3-ce2e-530449ae536c@network-heretics.com> <8B20BC5A-A60A-4A31-9345-E970B31BC2C3@oracle.com> <a67ef1d0-1637-fe48-9fb1-664ad8b3172d@network-heretics.com> <D5ED7737-D201-41A2-B24D-661D10D19EE0@oracle.com> <CABcZeBPx2zS8Wr5179wkcmv-_=KeQSfCi91tb0OpSax7QbETPg@mail.gmail.com>
To: uta-chairs@ietf.org
X-Mailer: Apple Mail (2.3445.1.7)
Archived-At: <https://mailarchive.ietf.org/arch/msg/uta/6Dq9q62azNZcoirRiFiAC9ocI2E>
Subject: Re: [Uta] Eric Rescorla's Yes on draft-ietf-uta-email-deep-09: (with COMMENT)
X-BeenThere: uta@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: UTA working group mailing list <uta.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/uta>, <mailto:uta-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/uta/>
List-Post: <mailto:uta@ietf.org>
List-Help: <mailto:uta-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/uta>, <mailto:uta-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 27 Oct 2017 19:20:50 -0000


> On Oct 27, 2017, at 2:34 PM, Eric Rescorla <ekr@rtfm.com> wrote:
> 
> So to be clear, what you are saying is that when I enter "mail.example.com" but it's hosted on "mailhosting.com", and that indirection is done via SRV, that the certificate contains "mail.example.com" but the SNI contains "mailhosting.com"?

I would expect a mail user agent that actually uses RFC 6186 to
obtain the target name from SRV records (do any MUAs support this
yet?) to set the reference identifier also to the SRV target,
either because it was validated via DNSSEC, or via a confirmation
dialogue.

Thus both the SNI name and the reference identifier will the same,
in your example "mailhosting.com".

One might also secure the MUAs use of SRV records with DANE,
see also https://tools.ietf.org/html/rfc7672#section-7
https://tools.ietf.org/html/rfc7673 in which case the SNI
would again be the target domain.  The server cannot know
whether the client is statically configured to use the target
name, used SRV with DANE, or SRV with just DNSSEC and WebPKI.

The bottom line is that no matter how the client gets there,
the SNI and reference identifier are the SRV target, but
without DNSSEC, and with SRV-ID unlikely to be practiced,
RFC 6816 requires user confirmation, with all its flaws...

-- 
	Viktor.



-- 
	Viktor.