Re: [Uta] Benjamin Kaduk's Discuss on draft-ietf-uta-smtp-require-tls-07: (with DISCUSS and COMMENT)

Viktor Dukhovni <ietf-dane@dukhovni.org> Thu, 21 February 2019 05:54 UTC

Return-Path: <ietf-dane@dukhovni.org>
X-Original-To: uta@ietfa.amsl.com
Delivered-To: uta@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5B53212F1A6; Wed, 20 Feb 2019 21:54:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level:
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xNVuDAw5sFLn; Wed, 20 Feb 2019 21:54:21 -0800 (PST)
Received: from straasha.imrryr.org (straasha.imrryr.org [100.2.39.101]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 291FB130E89; Wed, 20 Feb 2019 21:54:21 -0800 (PST)
Received: from [10.200.0.109] (unknown [8.2.105.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by straasha.imrryr.org (Postfix) with ESMTPSA id 3D09E2B8F9D; Thu, 21 Feb 2019 00:54:18 -0500 (EST)
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 12.2 \(3445.102.3\))
From: Viktor Dukhovni <ietf-dane@dukhovni.org>
In-Reply-To: <155072491254.20210.15187912705241578950.idtracker@ietfa.amsl.com>
Date: Thu, 21 Feb 2019 00:54:17 -0500
Cc: uta@ietf.org, uta-chairs@ietf.org, draft-ietf-uta-smtp-require-tls@ietf.org
Reply-To: The IESG <iesg@ietf.org>, uta@ietf.org, uta-chairs@ietf.org, draft-ietf-uta-smtp-require-tls@ietf.org
Content-Transfer-Encoding: 7bit
Message-Id: <290706DA-2C5E-4255-8BB7-C6951B385CD6@dukhovni.org>
References: <155072491254.20210.15187912705241578950.idtracker@ietfa.amsl.com>
To: The IESG <iesg@ietf.org>
X-Mailer: Apple Mail (2.3445.102.3)
Archived-At: <https://mailarchive.ietf.org/arch/msg/uta/hu4wTc_bbmiGhXr4sLAIs4PSOcE>
Subject: Re: [Uta] Benjamin Kaduk's Discuss on draft-ietf-uta-smtp-require-tls-07: (with DISCUSS and COMMENT)
X-BeenThere: uta@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: UTA working group mailing list <uta.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/uta>, <mailto:uta-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/uta/>
List-Post: <mailto:uta@ietf.org>
List-Help: <mailto:uta-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/uta>, <mailto:uta-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Feb 2019 05:54:24 -0000

> On Feb 20, 2019, at 11:55 PM, Benjamin Kaduk <kaduk@mit.edu> wrote:
> 
> While I understand that there can be cases where it is desired to ignore
> recipient-domain indications to use TLS, such as to report problems with
> the TLS capabilities of those domains, I have strong qualms about
> describing this protocol as an "override" for DANE and MTA-STS, or that
> such recipient-domain signals should be "ignored".  In effect, by
> attempting to do so, this document is fundamentally modifying the
> protocol semantics for (SMTP) DANE and MTA-STS, something that can only
> properly be done by clearly calling out the behavior change and an
> Updates: relationship with the documents whose semantics are being
> modified.  Alternately, it could also be reasonable to remove claims of
> "override" or "ignore" and to leave the semantics of the header field as
> being that the sender requests one behavior, and the MTA can balance the
> requests of the sender and recipient at their own discretion. This is
> still not a great option, though, as it would seem to put multiple IETF
> proposed standards at odds with each other.

My take is rather different.  I see "REQUIRETLS = no" as an enabler of
adoption for DANE and MTA-STS, and as the primary feature of this draft
that will have a more significant positive security impact (by paving
the way to adoption of more secure transport by default) than the
"REQUIRETLS = yes" option, which likely won't see much use.

There's no conflict with DANE and MTA-STS here, neither trumps the
senders local policy, whether set by the administrator or delegated
by the administrator to the user.

While we can hope that operational excellence will make delivery problems
due to botched MTA-STS or DANE rare, there will surely be temporary outages
here and there, and giving users a mechanism to work around them is better
than disabling transport security for all users at the first whiff of a
problem, defeating much of the protection that DANE and MTA-STS would
enable.

Providers that support a user override, can be much more confident that
enabling recipient security policy will be something their users can
work with, because on a delivery failure, the user can resend with
"REQUIRETLS = no" if the message requires little privacy protection,
but is time sensitive.  The user knows best which messages are OK to
resend without authentication (possibly in the clear).

Companies where there are regulatory constraints to not let users
override transport security policy (HIPAA, ...) can elect to not support
"REQUIRETLS = no" and even strip the header to reduce the likelihood
of it taking effect downstream.

-- 
	Viktor.