Re: [Uta] Last Call: <draft-ietf-uta-smtp-require-tls-07.txt> (SMTP Require TLS Option) to Proposed Standard

Stephan Bosch <stephan@rename-it.nl> Fri, 25 January 2019 21:58 UTC

Return-Path: <stephan@rename-it.nl>
X-Original-To: uta@ietfa.amsl.com
Delivered-To: uta@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A804B12872C; Fri, 25 Jan 2019 13:58:40 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vD0kwofO8kZt; Fri, 25 Jan 2019 13:58:38 -0800 (PST)
Received: from sogo.guto.nl (guto.nl [178.21.117.49]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 378E31271FF; Fri, 25 Jan 2019 13:58:34 -0800 (PST)
Received: from klara.student.utwente.nl ([130.89.162.218] helo=[10.168.3.2]) by sogo.guto.nl with esmtpsa (TLS1.2:RSA_AES_128_CBC_SHA1:128) (Exim 4.80) (envelope-from <stephan@rename-it.nl>) id 1gn9UX-0007GG-Qv; Fri, 25 Jan 2019 22:58:30 +0100
To: uta@ietf.org
Cc: draft-ietf-uta-smtp-require-tls@ietf.org
References: <154842843614.29150.7231551831323471834.idtracker@ietfa.amsl.com>
From: Stephan Bosch <stephan@rename-it.nl>
Message-ID: <8c6ca7b1-5803-bb2d-f3bd-d0b1053c6a27@rename-it.nl>
Date: Fri, 25 Jan 2019 22:58:25 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.4.0
MIME-Version: 1.0
In-Reply-To: <154842843614.29150.7231551831323471834.idtracker@ietfa.amsl.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 7bit
Content-Language: en-US
X-SA-Exim-Connect-IP: 130.89.162.218
X-SA-Exim-Mail-From: stephan@rename-it.nl
X-SA-Exim-Version: 4.2.1 (built Mon, 26 Dec 2011 16:24:06 +0000)
X-SA-Exim-Scanned: Yes (on sogo.guto.nl)
Archived-At: <https://mailarchive.ietf.org/arch/msg/uta/CbEXFpuM0F5q6_GpuZwLs0b9Wjk>
Subject: Re: [Uta] Last Call: <draft-ietf-uta-smtp-require-tls-07.txt> (SMTP Require TLS Option) to Proposed Standard
X-BeenThere: uta@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: UTA working group mailing list <uta.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/uta>, <mailto:uta-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/uta/>
List-Post: <mailto:uta@ietf.org>
List-Help: <mailto:uta-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/uta>, <mailto:uta-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 25 Jan 2019 21:58:41 -0000

Hi,

Op 25/01/2019 om 16:00 schreef The IESG:
> Abstract
>
>
>     The SMTP STARTTLS option, used in negotiating transport-level
>     encryption of SMTP connections, is not as useful from a security
>     standpoint as it might be because of its opportunistic nature;
>     message delivery is, by default, prioritized over security.  This
>     document describes an SMTP service extension, REQUIRETLS, and message
>     header field, RequireTLS.  If the REQUIRETLS option or RequireTLS
>     message header field is used when sending a message, it asserts a
>     request on the part of the message sender to override the default
>     negotiation of TLS, either by requiring that TLS be negotiated when
>     the message is relayed, or by requesting that recipient-side policy
>     mechanisms such as MTA-STS and DANE be ignored when relaying a
>     message for which security is unimportant.
>
> The file can be obtained via
> https://datatracker.ietf.org/doc/draft-ietf-uta-smtp-require-tls/
>
> IESG discussion can be tracked via
> https://datatracker.ietf.org/doc/draft-ietf-uta-smtp-require-tls/ballot/

I just quickly reviewed this document. I notice that this extension also 
applies to LMTP. Now, I wonder what should happen when Sieve [RFC 5228] 
is involved there, particularly when actions like "redirect", "reject", 
"vacation" [RFC 5230] and "notify" [RFC 5435] [RFC 5436] are involved. 
Do the security requirements get forwarded though Sieve for the outgoing 
SMTP messages? What happens when "notify" sends a notification using a 
protocol other than SMTP (e.g. XMPP [RFC 5437])?

Also, Sieve has a couple of extensions called "envelope-dsn" and 
"redirect-dsn" [RFC 6009] that would be affected by these changes. First 
of all, I'd assume the "RET" field will get an additional value 
possibility. But, are there also semantic changes?

Regards,


Stephan.