Re: [Uta] draft-moore-smtp-addrquery

Keith Moore <moore@network-heretics.com> Sat, 01 August 2015 05:31 UTC

Return-Path: <moore@network-heretics.com>
X-Original-To: uta@ietfa.amsl.com
Delivered-To: uta@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C42141ACEFE for <uta@ietfa.amsl.com>; Fri, 31 Jul 2015 22:31:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level:
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_LOW=-0.7] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8fQVgOaeW1tg for <uta@ietfa.amsl.com>; Fri, 31 Jul 2015 22:31:29 -0700 (PDT)
Received: from out1-smtp.messagingengine.com (out1-smtp.messagingengine.com [66.111.4.25]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D2A881ACEE7 for <uta@ietf.org>; Fri, 31 Jul 2015 22:31:28 -0700 (PDT)
Received: from compute4.internal (compute4.nyi.internal [10.202.2.44]) by mailout.nyi.internal (Postfix) with ESMTP id 4781E20AB8 for <uta@ietf.org>; Sat, 1 Aug 2015 01:31:28 -0400 (EDT)
Received: from frontend2 ([10.202.2.161]) by compute4.internal (MEProxy); Sat, 01 Aug 2015 01:31:28 -0400
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d= messagingengine.com; h=content-transfer-encoding:content-type :date:from:in-reply-to:message-id:mime-version:references :subject:to:x-sasl-enc:x-sasl-enc; s=smtpout; bh=umLXK7ImkVvEppg QAfQ+a9a1ch8=; b=bSnf+ej60TUaM8/67k25Rx7gdd/DnRIis/6rBAGYzcs92z+ KZkpZ0xbp6nJtnTPzrVjE/s0vI7XKrS2F2WloKdc1Sp9OINNCiitZT9+eyTdipkf 8MdfRAYvN/CWI3odvATl6fiMzKms3PlI/3xWSXSi8fiVEOpZKPFMSnMpgxwc=
X-Sasl-enc: t/TqhhZggBMFXb4jpvxTTKuC2E1vF3sEY8XJj+TndLwE 1438407087
Received: from [192.168.1.66] (108-221-180-15.lightspeed.knvltn.sbcglobal.net [108.221.180.15]) by mail.messagingengine.com (Postfix) with ESMTPA id 7980C68019B; Sat, 1 Aug 2015 01:31:27 -0400 (EDT)
Message-ID: <55BC5996.7060604@network-heretics.com>
Date: Sat, 01 Aug 2015 01:31:02 -0400
From: Keith Moore <moore@network-heretics.com>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:31.0) Gecko/20100101 Thunderbird/31.8.0
MIME-Version: 1.0
To: uta@ietf.org
References: <20150722055913.60220.qmail@ary.lan> <55AF3E46.6090306@network-heretics.com> <20150729220204.GI25592@mournblade.imrryr.org> <55BA4413.9050900@network-heretics.com> <20150730175247.GX4347@mournblade.imrryr.org> <55BA82F2.6090401@network-heretics.com> <20150731152857.GI4347@mournblade.imrryr.org> <55BBBD1D.8050707@network-heretics.com> <20150731203310.GU4347@mournblade.imrryr.org> <55BBFB97.3000302@network-heretics.com> <20150801051433.GZ4347@mournblade.imrryr.org>
In-Reply-To: <20150801051433.GZ4347@mournblade.imrryr.org>
Content-Type: text/plain; charset="windows-1252"; format="flowed"
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/uta/QilqIs23c8AxcWv5RElkFcfpwvo>
Subject: Re: [Uta] draft-moore-smtp-addrquery
X-BeenThere: uta@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: UTA working group mailing list <uta.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/uta>, <mailto:uta-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/uta/>
List-Post: <mailto:uta@ietf.org>
List-Help: <mailto:uta-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/uta>, <mailto:uta-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 01 Aug 2015 05:31:30 -0000

On 08/01/2015 01:14 AM, Viktor Dukhovni wrote:
> On Fri, Jul 31, 2015 at 06:49:59PM -0400, Keith Moore wrote:
>
>>> They'd also need new SMTP software to support
>>> AQRY.  That software would need to be well maintained too.  I trust
>>> the DNSSEC validation code in unbound and BIND more than I would
>>> trust the same to some application library.  The former are likely
>>> to get more relevant scrutiny.
>> And you might be right.   But what you find trustworthy, and what is
>> available to most users, are completely different things.
> Again what is available to users is largely irrelevant provided
> all the hard-lifting is done by the MSA.

It's pointless to continue arguing about this.

>> It _might_ be okay for an MUA running in a resource-constrained environment
>> to trust the MSA to do DNSSEC verification and signature verification on the
>> data.  But if an MUA implementor is going to go that route, it might as well
>> just be a split MUA and have the server side of that MUA responsible for
>> encryption.   I find it dubious that an environment that is too resource
>> constrained for key verification is not too resource constrained to do
>> public key encryption of the message.
> I did not mention anything about resource constraints.  The contraints
> are rather mobility in and out of captive portals and port 25
> blocking.  With super-computers in every pocket, I'm not too
> concerned about the cost of performing a couple of public key
> operations now and then.  Much cheaper than streaming Neflix.

Agree about pocket super-computers.  Can you elaborate on what you mean 
by "mobility in and out of captive portals"?


>>> You can trust anything you want, but the DV TLS cert does not merit
>>> any trust.
>> Neither do DNSSEC-signed TLSA records, then.
> The logic escapes me.

Both X.509 DV and DNSSEC-signed TLSA records basically equate control 
over the domain with the required assurance.   That's already a leap 
because an email address really isn't a person's identity, the domain 
isn't really designed to be a CA (even for its own users), and the 
sender really wants to send to a person rather than whoever happens to 
be currently associated with an email address.   But let's accept that 
as a necessary limitation for now.   X.509 DV has the additional problem 
that any trusted CA can sign any key.   DNSSEC has better partitioning, 
as you point out, but trusting the AD bit is a hole big enough to fly a 
747 through, and there are lots of known implementation bugs.   So the 
threats are different, but I can't make a case that in practice DANE is 
inherently more secure than X.509 DV.

>> As far as I can tell, they're approximately equivalent in that respect.
> No DNSSEC is stronger than DV

Only if you ignore the other weaknesses in DNSSEC protocol and 
implementations.  See above.

>>> I call it a design feature.  I think AQPX makes this scale much
>>> better,
>> I don't see how.   It doesn't lessen the load on either the MX server or the
>> MUA client, and it increases network traffic overall.
> It facilitates controlling abuse, which would otherwide dwarf the
> volume of legitimate traffic.

No it doesn't, because there's no way to prevent abusive clients from 
talking directly to SMTP servers.   Port 25 blocking, while widespread, 
is far from universal.

>>> The resolver on the MSA is part of the OS operated by the same
>>> sysadmin who operates the MSA.
>> Perhaps.  But axiomatically expecting the MUA to trust the MSA is still a
>> Bad Idea.  If the MSA host is compromised, it doesn't matter whether the
>> compromise is in the MSA code itself or in its resolver.
> Indeed, if the MSA is compromised, users may see forged keys, but
> the MSA would have to stay compromised indefinitely, or users would
> later see unforged keys, and MUAs might let users know that keys
> for a recipient changed, and that they might double check that this
> happened with the correspondent.

So it's just like when using an ssh client that says "hey, the remote 
host's key changed".   Users learn to click "ok" and continue as if 
nothing happened.


Keith