Re: [Uta] Eric Rescorla's Yes on draft-ietf-uta-email-deep-09: (with COMMENT)

Eric Rescorla <ekr@rtfm.com> Fri, 27 October 2017 18:35 UTC

Return-Path: <ekr@rtfm.com>
X-Original-To: uta@ietfa.amsl.com
Delivered-To: uta@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A399613F5C9 for <uta@ietfa.amsl.com>; Fri, 27 Oct 2017 11:35:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=rtfm-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id S4tOQwjRyAda for <uta@ietfa.amsl.com>; Fri, 27 Oct 2017 11:35:02 -0700 (PDT)
Received: from mail-yw0-x22d.google.com (mail-yw0-x22d.google.com [IPv6:2607:f8b0:4002:c05::22d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8E7CF13A65C for <uta@ietf.org>; Fri, 27 Oct 2017 11:35:02 -0700 (PDT)
Received: by mail-yw0-x22d.google.com with SMTP id i198so6505601ywe.7 for <uta@ietf.org>; Fri, 27 Oct 2017 11:35:02 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rtfm-com.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=FiC2LYw+gG3EtztWuc3R9OY/54u6oKrchlb72A7jRiI=; b=dDMzjDr8G7Rb21f0hPIySjfipMJWz+0RXBg/W9RpZ3njks421bk9/vmzXOhIPTfYxf BesSeI+dIq95K4lH3aJUr9NB8DiwHQ9wRQImrUzj4mR+QPMDsIM0tIyPh8u96wy9uZ5q BZnm0Nkcf5odSfKjxGBVNNiH1YQdSQvpMC7MFHZYA4wjoXrMVwxGRqT+F2SqFvzVlvEp 58GkZ9sXV9P7uuxUw9OELsrLSGo7EfBURGY4Fnvyk+G6BMnFJhG2WNM0N7RdFQ9ntgt/ 7SMwhLaxI9gh7mmwAqPorJAsz9tHjoGWP29krq1rVDU56DQrRwLuCPdWQSEmGhvO3MsE IanA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=FiC2LYw+gG3EtztWuc3R9OY/54u6oKrchlb72A7jRiI=; b=DeBwbBxYSLZrpYChf4fJt55tTPLJeae9310ozCT34tnZzRpKIwvDNj/gJs/YZOuqRh 9Fw2c2T71sJ/lGyD/gKLK0dm9qzgojc0pK08+7zU4C8lp869a+glmkoQ3wgTJeoHjEaz lPsGiwMSWLbl4QysElg6R9TBgScg1ud3B91GT8Uunb2WEmV1uu9ZULPNt7rpuf77l/JX 6ej0xTVDfTD/O2J+a2j8jtqLDMinubas9fioMm9iUXkArMgVmJTNb5K8MqHYzPNRZYrl aGCpI3eep2X32qrBc3pzY3H1aWym+UoYQ8gPt1ZNwQblcFMyFq3FDkEy7uZUp//Yx7V9 z04Q==
X-Gm-Message-State: AMCzsaXZzgTnBob8unbnPHZohJFiUdDONht7Hnzd09ODLFAVkHp6q1Hh qlDRPkE+Fe4RXV9rHi7mhWmNBmXcpw02QWtB6ytn7Q==
X-Google-Smtp-Source: ABhQp+SqqKGcGdm/dLWyZknBtdzrTkX9sNaBmANP8RquJpkSckV/2Q+4SAcI7AZBGOx7idqpNmJRfhgnTst+CtL8pSY=
X-Received: by 10.129.172.75 with SMTP id z11mr985164ywj.155.1509129301680; Fri, 27 Oct 2017 11:35:01 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.129.75.194 with HTTP; Fri, 27 Oct 2017 11:34:21 -0700 (PDT)
In-Reply-To: <D5ED7737-D201-41A2-B24D-661D10D19EE0@oracle.com>
References: <150852235551.15416.1247335476327491501.idtracker@ietfa.amsl.com> <98fddd93-a0a8-efa3-ce2e-530449ae536c@network-heretics.com> <8B20BC5A-A60A-4A31-9345-E970B31BC2C3@oracle.com> <a67ef1d0-1637-fe48-9fb1-664ad8b3172d@network-heretics.com> <D5ED7737-D201-41A2-B24D-661D10D19EE0@oracle.com>
From: Eric Rescorla <ekr@rtfm.com>
Date: Fri, 27 Oct 2017 11:34:21 -0700
Message-ID: <CABcZeBPx2zS8Wr5179wkcmv-_=KeQSfCi91tb0OpSax7QbETPg@mail.gmail.com>
To: Chris Newman <chris.newman@oracle.com>
Cc: Keith Moore <moore@network-heretics.com>, The IESG <iesg@ietf.org>, draft-ietf-uta-email-deep@ietf.org, uta-chairs@ietf.org, Leif Johansson <leifj@sunet.se>, "uta@ietf.org" <uta@ietf.org>
Content-Type: multipart/alternative; boundary="f403045e95acf2782a055c8b8b97"
Archived-At: <https://mailarchive.ietf.org/arch/msg/uta/cuE7pK58DqlW8O6vUvSB3tfHgY4>
Subject: Re: [Uta] Eric Rescorla's Yes on draft-ietf-uta-email-deep-09: (with COMMENT)
X-BeenThere: uta@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: UTA working group mailing list <uta.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/uta>, <mailto:uta-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/uta/>
List-Post: <mailto:uta@ietf.org>
List-Help: <mailto:uta-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/uta>, <mailto:uta-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 27 Oct 2017 18:35:04 -0000

On Fri, Oct 27, 2017 at 11:03 AM, Chris Newman <chris.newman@oracle.com>
wrote:

> On 26 Oct 2017, at 19:56, Keith Moore wrote:
>
>> On 10/26/2017 07:18 PM, Chris Newman wrote:
>>
>> Line 304
>>>>>        preference to services supporting STARTTLS (if offered).  (See
>>>>>        also Section 4.5.)
>>>>> I note that 6186 is kind of unclear on what should go in SNI. It
>>>>> obviously
>>>>> needs to be what you are checking against (which 6186 gets right) but
>>>>> maybe
>>>>> it's worth clarifying in this document somewhere.
>>>>>
>>>> Hmm.    I might need to come back to that one.   Lots of layers to sift
>>>> through.  Feel free to suggest text.
>>>>
>>>
>>> I believe RFC 7817 handles this issue sufficiently.
>>>
>>
>> Not sure whether EKR was referring specifically to the use of SNI with
>> SRV records or not, but that's what I had assumed he meant.  So far I
>> haven't found any specific advice for (a) what name the MUA should specify
>> in SNI, or (b) what names the server should recognize and have certificates
>> for.   It's pretty clear that the server needs to have a certificate for
>> the name on the right hand side of the SRV record, but should it also have
>> a certificate for the name on the left hand side?  (e.g. _pop3s._
>> tcp.example.com?)  That would potentially make SRV discovery more secure.
>>
>> But I think that's well beyond what the WG (and IESG) approved.   So I
>> guess I'm inclined to leave the -10 text as it is now without specifically
>> addressing this issue.
>>
>
> I just re-read the related text a bit more carefully. Although RFC 7817
> adequately covers what subjectAltName identities mail servers need to
> support in certificates, it doesn't cover what goes in SNI (although it
> mentions SNI). Ditto for RFC 6186. This is annoying; the issue really
> should have been addressed in 7817 or 6125 :-(
>
> I suspect in practice that most MUAs use the post-SRV-lookup hostname in
> TLS SNI. And server support for that name form in SNI will be necessary to
> interoperate with MUAs that don't support RFC 6186 (or use an alternative
> autodiscovery mechanism in preference to RFC 6186). So the remaining
> question is would it be useful/helpful for a server to also support an SNI
> based on the SRV record or SRV-ID name? I don't think the answer to that
> question is important enough to justify a normative change to this document.
>
> To address this, I suggest we add a sentence to the end of section 4.4
> (just before the sentence referencing 7817):
>
> --
> Mail servers supporting SNI need to support the post-SRV hostname to
> interoperate with MUAs that have not implemented RFC 6186.
> --
>

So to be clear, what you are saying is that when I enter "mail.example.com"
but it's hosted on "mailhosting.com", and that indirection is done via SRV,
that the certificate contains "mail.example.com" but the SNI contains "
mailhosting.com"?

-Ekr

I view that as a statement of fact rather than a normative change so I
> think it's kosher. Saying more on the topic would probably cross the
> normative change line so I'd prefer not to go there.
>
>                 - Chris
>