Re: [Uta] Eric Rescorla's Yes on draft-ietf-uta-email-deep-09: (with COMMENT)

Eric Rescorla <ekr@rtfm.com> Fri, 27 October 2017 19:24 UTC

Return-Path: <ekr@rtfm.com>
X-Original-To: uta@ietfa.amsl.com
Delivered-To: uta@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B2D9A137E0B for <uta@ietfa.amsl.com>; Fri, 27 Oct 2017 12:24:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=rtfm-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OrDNM8fsW8eb for <uta@ietfa.amsl.com>; Fri, 27 Oct 2017 12:24:57 -0700 (PDT)
Received: from mail-yw0-x236.google.com (mail-yw0-x236.google.com [IPv6:2607:f8b0:4002:c05::236]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 25D3513F43A for <uta@ietf.org>; Fri, 27 Oct 2017 12:24:55 -0700 (PDT)
Received: by mail-yw0-x236.google.com with SMTP id l32so6607015ywh.13 for <uta@ietf.org>; Fri, 27 Oct 2017 12:24:55 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rtfm-com.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=R9E0krqwncSZcLSi3GFzspYmOBoM+wOMYJP6iDft85M=; b=UIP9htXahbtlECd2fQwLuKzKZzRXbBvIzKMB2+1U46HWMClW9/iVodVlMhDqn/Mtmv tvwzqVG4lBhLtlpPvvIs/MrRCtj4g5UQqLI+iHGsWQR5OUDGP2vSQXs9n7Ecg3zHsl5a aBemm2MLMVlBWHBLOGqqjvEoKU9tnD/VgKY3Zw+SBux47MoZ+FwLjCkVs6FGRoyued9c dUEO/TwD5cpsj9gYEC7fyZ5+RZ3xcrpiy6wmrf+Z69muJ9ZFyjeRVv9nZri6HYes87eq g/Zagcr69S3YNX9ZxuaxUUaBviLqsWgqi5ns39dvuTGU6IZdOfBXgiWdZZWN5x6e9M73 E05w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=R9E0krqwncSZcLSi3GFzspYmOBoM+wOMYJP6iDft85M=; b=uNI+C3UAYgA/Wzd83rZPqn/zEozR+xMtzssI5QBj1uOCjJ1pDsJhyJAMTHalNvM0yP G/zbbW9eHkLkB+8FcgU6f+KNnwdBIIo1/dM5R3LezjRBsuRr6/h6BUODR7sAdopSiVca ct6+Pot0JNX8AKuvsGCEVevxMqhqz+1EoVSDtUfjZUlCyIen5vGtjR4T6Y7pg7wkIAWm jyF5miRhGxJ9aZWntUtX6mcq7lgXb0n/7gl3oUzIn+AJFjfqrTUQGWcSFv/2BeWIkRaf oxFoIHwAlJA8JeeLLlzZXXjyjoBTZ7rA8k8WDzQZX7gh7PvBnXXWqQBXrpb1/63e/LsN Jlrg==
X-Gm-Message-State: AMCzsaUdQoVmu/pV/TnsYkK/Hui68hWBQkjBHRtgrC86gsc0jw824bZe JsLrQ/O3QSYVY0TxcSw0zHHSNyMvzp0gsKLy2LWbGw==
X-Google-Smtp-Source: ABhQp+RGjZB3lgKUwGAkIev51cfpuoQl8eaJ0uwBn9mQ9NvI7Lh8L097SK8A4H/SCoBwcSjP+aCP83CEqZ2KsKKoRnE=
X-Received: by 10.129.172.75 with SMTP id z11mr1080073ywj.155.1509132294340; Fri, 27 Oct 2017 12:24:54 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.129.75.194 with HTTP; Fri, 27 Oct 2017 12:24:13 -0700 (PDT)
In-Reply-To: <DCE1B082-DE06-4ECA-98E6-26B21BDF4682@dukhovni.org>
References: <150852235551.15416.1247335476327491501.idtracker@ietfa.amsl.com> <98fddd93-a0a8-efa3-ce2e-530449ae536c@network-heretics.com> <8B20BC5A-A60A-4A31-9345-E970B31BC2C3@oracle.com> <a67ef1d0-1637-fe48-9fb1-664ad8b3172d@network-heretics.com> <D5ED7737-D201-41A2-B24D-661D10D19EE0@oracle.com> <CABcZeBPx2zS8Wr5179wkcmv-_=KeQSfCi91tb0OpSax7QbETPg@mail.gmail.com> <DCE1B082-DE06-4ECA-98E6-26B21BDF4682@dukhovni.org>
From: Eric Rescorla <ekr@rtfm.com>
Date: Fri, 27 Oct 2017 12:24:13 -0700
Message-ID: <CABcZeBOYnVLAc4GDvwaF859UjSx8VhFv7+LHDsj=AqYnbg459w@mail.gmail.com>
To: Viktor Dukhovni <ietf-dane@dukhovni.org>
Cc: uta-chairs@ietf.org, "uta@ietf.org" <uta@ietf.org>, draft-ietf-uta-email-deep@ietf.org, The IESG <iesg@ietf.org>
Content-Type: multipart/alternative; boundary="f403045e95ac52d0ba055c8c3ef1"
Archived-At: <https://mailarchive.ietf.org/arch/msg/uta/ovHtSh98KoRIa138ueQORt41sdU>
Subject: Re: [Uta] Eric Rescorla's Yes on draft-ietf-uta-email-deep-09: (with COMMENT)
X-BeenThere: uta@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: UTA working group mailing list <uta.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/uta>, <mailto:uta-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/uta/>
List-Post: <mailto:uta@ietf.org>
List-Help: <mailto:uta-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/uta>, <mailto:uta-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 27 Oct 2017 19:24:59 -0000

Yeah, this doesn't seem like an actually secure set of practices, which is
why we don't do it for HTTPS even when there are CNAMEs.

-Ekr


On Fri, Oct 27, 2017 at 12:20 PM, Viktor Dukhovni <ietf-dane@dukhovni.org>
wrote:

>
>
> > On Oct 27, 2017, at 2:34 PM, Eric Rescorla <ekr@rtfm.com> wrote:
> >
> > So to be clear, what you are saying is that when I enter "
> mail.example.com" but it's hosted on "mailhosting.com", and that
> indirection is done via SRV, that the certificate contains "
> mail.example.com" but the SNI contains "mailhosting.com"?
>
> I would expect a mail user agent that actually uses RFC 6186 to
> obtain the target name from SRV records (do any MUAs support this
> yet?) to set the reference identifier also to the SRV target,
> either because it was validated via DNSSEC, or via a confirmation
> dialogue.
>
> Thus both the SNI name and the reference identifier will the same,
> in your example "mailhosting.com".
>
> One might also secure the MUAs use of SRV records with DANE,
> see also https://tools.ietf.org/html/rfc7672#section-7
> https://tools.ietf.org/html/rfc7673 in which case the SNI
> would again be the target domain.  The server cannot know
> whether the client is statically configured to use the target
> name, used SRV with DANE, or SRV with just DNSSEC and WebPKI.
>
> The bottom line is that no matter how the client gets there,
> the SNI and reference identifier are the SRV target, but
> without DNSSEC, and with SRV-ID unlikely to be practiced,
> RFC 6816 requires user confirmation, with all its flaws...
>
> --
>         Viktor.
>
>
>
> --
>         Viktor.
>
>