[Uta] "webby" STS and DANE/DNSSEC co-existence

Stephen Farrell <stephen.farrell@cs.tcd.ie> Mon, 11 April 2016 20:45 UTC

Return-Path: <stephen.farrell@cs.tcd.ie>
X-Original-To: uta@ietfa.amsl.com
Delivered-To: uta@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D1B4C12EAD5 for <uta@ietfa.amsl.com>; Mon, 11 Apr 2016 13:45:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.297
X-Spam-Level:
X-Spam-Status: No, score=-5.297 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cs.tcd.ie
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ByPzfOxFCw1J for <uta@ietfa.amsl.com>; Mon, 11 Apr 2016 13:45:13 -0700 (PDT)
Received: from mercury.scss.tcd.ie (mercury.scss.tcd.ie [134.226.56.6]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 687D912E436 for <uta@ietf.org>; Mon, 11 Apr 2016 13:45:13 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mercury.scss.tcd.ie (Postfix) with ESMTP id 640DBBDF9 for <uta@ietf.org>; Mon, 11 Apr 2016 21:45:10 +0100 (IST)
X-Virus-Scanned: Debian amavisd-new at scss.tcd.ie
Received: from mercury.scss.tcd.ie ([127.0.0.1]) by localhost (mercury.scss.tcd.ie [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DntjE_kligsb for <uta@ietf.org>; Mon, 11 Apr 2016 21:45:08 +0100 (IST)
Received: from [10.87.49.100] (unknown [86.46.23.241]) by mercury.scss.tcd.ie (Postfix) with ESMTPSA id 2F6AFBDD0 for <uta@ietf.org>; Mon, 11 Apr 2016 21:45:08 +0100 (IST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cs.tcd.ie; s=mail; t=1460407508; bh=ZYQQE9Q++jxvGJrnv6xX075Q9FjLdHBUmfwPqjd5Tfw=; h=To:From:Subject:Date:From; b=p6GDzq9ehW9O1+cxdd3zxb+hZ0r5/6awEDXr3MYPx84ejTP/ZBfXeR5VS5z5wi3YV tFS2GkHaH5htWd9fhyJOn0ne4SDTgu8MhYgjm7FeD7DbGXYwOi2aENHlC40G8EKzr/ viKnRxJDQHICSQ5ilbXfSx/drdEffJElxTySuucA=
To: "uta@ietf.org" <uta@ietf.org>
From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
Openpgp: id=D66EA7906F0B897FB2E97D582F3C8736805F8DA2; url=
Message-ID: <570C0CD2.9030401@cs.tcd.ie>
Date: Mon, 11 Apr 2016 21:45:06 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.6.0
MIME-Version: 1.0
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg="sha-256"; boundary="------------ms090201000000020901000808"
Archived-At: <http://mailarchive.ietf.org/arch/msg/uta/K5VzClYdB6mg4syc2UTlPlPQdNQ>
Subject: [Uta] "webby" STS and DANE/DNSSEC co-existence
X-BeenThere: uta@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: UTA working group mailing list <uta.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/uta>, <mailto:uta-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/uta/>
List-Post: <mailto:uta@ietf.org>
List-Help: <mailto:uta-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/uta>, <mailto:uta-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 11 Apr 2016 20:45:16 -0000

Hiya,

With no hats, I'd like to argue that the WG should pursue
the "webby" STS proposal, but should also ensure that we
do not damage progress made by those who are deploying the
DANE/DNSSEC approach to securing MTA-MTA connections.

I think we can do that by requiring that outbound MTAs
that implement the "webby" approach MUST/SHOULD first test
for, and process, TLSA records for the next MX in the path.
In  other words the "webby" approach is tried 2nd.

In more detail, my reasoning is as follows:

- The DANE/DNSSEC approach works and when deployed does
  move MTA-MTA use of TLS beyond opportunistic security.
  And indeed some folks have deployed that and gotten the
  benefits.
- Deploying DANE/DNSSEC requires DNSSEC (fairly obviously;-)
  and the fact is that DNSSEC deployment is not something
  that everyone who wants to move beyond opportunistic
  security is currently willing to do.
- We can, and probably will, define a "webby" to achieve
  the same desired effect of getting beyond opportunistic
  security. Daniel and co's STS aprooach (as outlined for
  the next revision in B-A) is one such, and seems like
  it's one that can work.
- Any such webby approach will inherently involve us in
  re-inventing a lot of what we get from DANE/DNSSEC. That's
  a bit of a pain, but inevitable and not a reason to not
  do STS. (The goal here is not perfection but to enable
  folks to do better than opportunistic security after all.)
- My guess is that the webby approach will end up being
  a bit less secure/safe compared to the DANE/DNSSEC way
  of doing things, mostly due to it having to depend on
  some kind of TOFU step that gets repeated whenever DNS
  without DNSSEC is used (i.e. when something cached
  expires).
- We therefore end up with two ways to do one thing. One
  ("webby") likely to be deployed by some bigger mail
  processors who don't currently do DNSSEC, and another
  DANE/DNSSEC that will likely be better and that's where
  we'd (as in the IETF) really prefer us all to end up
  when/if possible.
- I think that saying one MUST first try DANE/DNSSEC is
  correct, but there may be cases where e.g. DNSSEC is
  just never going to visibly work for an MTA so it may
  be correct to say one SHOULD first try DANE/DNSSEC
  with the exception being cases where one knows at
  coding time that you'll never see an RRSIG or similar.

Anyway with two ways, I really hope the WG conclude that
we want both to be deployable without one damaging the
other. There are of course other ways to try ensure we can
sensibly live with both DANE/DNSSEC and webby STS and
yet help folks move beyond opportunistic security, but
I think the way outlined above is likely best if the folks
who develop MTAs can accept it.

Cheers,
S.

PS: Yes, this is entirely jumping the gun, and is only
something the WG would need to decide a bit down the road.
But since we had a good discussion of the topic in B-A,
I wanted to send this before I forget it all, as I'm quite
likely to do;-)