Re: [Uta] "webby" STS and DANE/DNSSEC co-existence

Daniel Margolis <dmargolis@google.com> Wed, 13 April 2016 09:04 UTC

Return-Path: <dmargolis@google.com>
X-Original-To: uta@ietfa.amsl.com
Delivered-To: uta@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 74CF112DC41 for <uta@ietfa.amsl.com>; Wed, 13 Apr 2016 02:04:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.696
X-Spam-Level:
X-Spam-Status: No, score=-3.696 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=google.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DHG49fpgFxP0 for <uta@ietfa.amsl.com>; Wed, 13 Apr 2016 02:04:15 -0700 (PDT)
Received: from mail-io0-x233.google.com (mail-io0-x233.google.com [IPv6:2607:f8b0:4001:c06::233]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2E29912D81D for <uta@ietf.org>; Wed, 13 Apr 2016 02:04:15 -0700 (PDT)
Received: by mail-io0-x233.google.com with SMTP id o126so62119117iod.0 for <uta@ietf.org>; Wed, 13 Apr 2016 02:04:15 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc; bh=KQ7ueq/EOHhURBgqqwJVqKpLtPoWVVBX1ixhr6S+o18=; b=jQPA0Qj0EhIVUA6Nj1LHXJ+rrRBkByy3FubVQDVb/7KPfhltxkwaf0ZQ3eR61//T8N zI5meHwjQQKS/Q+s8rZEFh+67KUUetBe1WyDF3QH0HQ5KaTg3ap+3NIg5nU3QEf1U/0V 1Ot7YRWflegzVDvlnUPOJIsJ90Cvhc91nYxCCAL7qKsH40qQIxzwSVidFA7LBw6WXu9S 5pt16QY0jUUHH/4RVEV17wPpG7mS94fhsSKgGRDlslksCFEeYhT6NT3j9Mk9G6Pr7Zk/ D521NV1x/cDAla0GsnFU36GhXbscXHeOtYFodAuwW+A30l9hwjkr5JmS8MyedX299TVr QFFw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc; bh=KQ7ueq/EOHhURBgqqwJVqKpLtPoWVVBX1ixhr6S+o18=; b=Y/Ug5WYZs9BZwVgp/Va0oQvwu+9r9cnE2jiUjjoTfCQqxn1Fxc7r5rNNkGkApkQ63d Qg/24c4jxU1X/MhJPDRXZJUSNS8PWUCo1hk6bLVVH+pImH1nTJvZj7k9Kim0XYy33Dbi +1b+X9NiROVZg+pTUZRfk573IDTwtj0K8rpI/dQVpDVQiK7JxdF4puYcU6ri5P5XvNSD yK1qg7tAbsAEKi2QCfosRnc4qE7nPoIuQIF5XqIY/7hg00ga/UraYe2UoaUFf04HwtuP i7J6rtFxk3/s5k+mErruZ+c2s/Bu0WAYbqfB0btX9gJY8LmJLsnvQ17bNURbB9WgpRsy MUbg==
X-Gm-Message-State: AOPr4FXbA59xJf4w6JrfI8lXwpGPlUzetLMXDbbjBsCq9lpi3gvJh3jSILCaSUV4sHKNlkk8b9TyTHKdQVSO0du7
MIME-Version: 1.0
X-Received: by 10.107.12.67 with SMTP id w64mr9786115ioi.114.1460538254312; Wed, 13 Apr 2016 02:04:14 -0700 (PDT)
Received: by 10.64.91.226 with HTTP; Wed, 13 Apr 2016 02:04:14 -0700 (PDT)
In-Reply-To: <5249C8ED-CACD-4765-909E-CB8EB218BF10@noware.co.uk>
References: <570C0CD2.9030401@cs.tcd.ie> <20160411212128.GA26423@mournblade.imrryr.org> <CANtKdUekXNkVvsfq0UjCiaaPVBgoVGfrfnYUrdoOf0EegXMuPg@mail.gmail.com> <20160413014304.GB26423@mournblade.imrryr.org> <CANtKdUf0kN5aOmX0-NsyQXz_+PRGfaXa37DFZoCX3FqdYh5CpA@mail.gmail.com> <5249C8ED-CACD-4765-909E-CB8EB218BF10@noware.co.uk>
Date: Wed, 13 Apr 2016 11:04:14 +0200
Message-ID: <CANtKdUctfEKuQAscMkt_A5wcA84Z4y3L4KvcsxVd2Qb0NRBtgw@mail.gmail.com>
From: Daniel Margolis <dmargolis@google.com>
To: Neil Cook <neil.cook@noware.co.uk>
Content-Type: multipart/alternative; boundary="001a113f92b6d4f13705305a0f19"
Archived-At: <http://mailarchive.ietf.org/arch/msg/uta/aiHevSaEeZgbMKxmvckpkrToLQM>
Cc: uta@ietf.org
Subject: Re: [Uta] "webby" STS and DANE/DNSSEC co-existence
X-BeenThere: uta@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: UTA working group mailing list <uta.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/uta>, <mailto:uta-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/uta/>
List-Post: <mailto:uta@ietf.org>
List-Help: <mailto:uta-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/uta>, <mailto:uta-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2016 09:04:17 -0000

Ah, in that case, I totally misunderstood. Sorry about that.

I don't have a big problem with saying that *if* you support both you
should do DANE first. But I must admit, I still don't really understand the
value in specifying this explicitly: recipients still have to assume a
misconfiguration in either policy may result in dropped mail, so this isn't
a great mitigation for misconfigurations or deliberate DoS. My view (in
previous discussions of the same question) was that we would simply not
specify this--which infrastructure to trust seems like it's something that
the sender determines on their own; it's (obviously) impossible for the
recipient to dictate this ("Let me give you my CA-signed proof that I want
you to always trust CAs."), so a sender can reasonably say that they would
prefer DNSSEC to WebPKI or vice versa (or fail if either fails). But this
isn't a big point to me, so I'm flexible about it.

On Wed, Apr 13, 2016 at 10:40 AM, Neil Cook <neil.cook@noware.co.uk> wrote:

>
> On 13 Apr 2016, at 08:48, Daniel Margolis <dmargolis@google.com> wrote:
>
> What's the complexity you're worried about? Is it mainly that there's
> another switch to flip incorrectly (i.e. inadvertent misconfiguration, at a
> greater risk due to the presence of more configurations) or the risk of
> malicious DoS?
>
>
> Checking both is not a good idea. DANE support scenarios like self-signed
> certs, which STS does not.
>

Yes, but if you have a self-signed cert, you aren't going to have an STS
policy, so that's a different scenario than what we're discussing, no?

This is distinct from the first analogy that crossed my mind, which is Web
browsers who support DANE: in the web browser case, WebPKI is essentially
the default, so for DANE to work (with self-signed certs) we need to be
clear that DANE trumps WebPKI. But in the SMTP case the default is nothing,
so if someone explicitly requests STS or DANE, both policies must work
independently (or else they're going to be missing mail from senders who
validate only one or the other).


>
> I think Stephen laid out the trade-offs fairly well. I can see the
> argument for telling recipients that if they already publish a DANE record
> they're probably fine and shouldn't really need an STS policy as well. But
> a "must" seems less helpful to me here; senders who have some external
> limitation that prevents them from implementing DNSSEC then must not
> implement STS? I'd be worried that some larger deployments might have
> trouble with that.
>
>
> We’re only talking about what precedence to use for senders who support
> both, not saying that recipients must support both. If sender who supports
> both DANE/DNSSEC and STS encounters a TLSA record it MUST honour that, and
> not use STS. If a sender supporting both only sees one or the other, then
> it’s fine. Senders which only support one or the other are also fine.
>
> Neil
>
> On Wed, Apr 13, 2016 at 3:43 AM, Viktor Dukhovni <ietf-dane@dukhovni.org>
> wrote:
>
>> On Tue, Apr 12, 2016 at 06:52:31PM +0200, Daniel Margolis wrote:
>>
>> > I'm not sure if I'm being stupid here, but what does it mean for STS to
>> be
>> > "trumped" by DANE (or the reverse)? Do you mean that if the recipient
>> > domain/MX has both STS and DANE you will *only* validate the DANE
>> policy?
>>
>> Correct.  Trying to enforce both is too complex, and needlessly
>> increases the risk of delivery problems.
>>
>> > If we instead said that senders who validate STS must honor STS and
>> senders
>> > who validate DANE must honor DANE, is there a conflict?
>>
>> That language is either tautological, or unreasonable, if intended
>> to imply that systems capable of both must be willing to apply both
>> concurrently.
>>
>> > I would presume that if there is either a DANE failure or an STS failure
>> > senders who validate both will treat it as a failure. Introducing a
>> concept
>> > of priority strikes me as unnecessary. What am I missing?
>>
>> I have no plans to support concurrent evaluation of potentially
>> conflicting policies.  DANE is more robust than STS, given a DANE
>> policy I see no reason to also consider STS policy.
>>
>> Of course an administrator will be able to choose which policy
>> applies to a given nexthop, but not enforcement of both.
>>
>> --
>>         Viktor.
>>
>> _______________________________________________
>> Uta mailing list
>> Uta@ietf.org
>> https://www.ietf.org/mailman/listinfo/uta
>>
>
> _______________________________________________
> Uta mailing list
> Uta@ietf.org
> https://www.ietf.org/mailman/listinfo/uta
>
>
>