Re: [Uta] Eric Rescorla's Discuss on draft-ietf-uta-smtp-require-tls-07: (with DISCUSS and COMMENT)

Viktor Dukhovni <ietf-dane@dukhovni.org> Thu, 28 February 2019 16:42 UTC

Return-Path: <ietf-dane@dukhovni.org>
X-Original-To: uta@ietfa.amsl.com
Delivered-To: uta@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D3EAA130F04; Thu, 28 Feb 2019 08:42:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level:
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VEOpmh28XE78; Thu, 28 Feb 2019 08:42:11 -0800 (PST)
Received: from straasha.imrryr.org (straasha.imrryr.org [100.2.39.101]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 721DB130F03; Thu, 28 Feb 2019 08:42:11 -0800 (PST)
Received: from [192.168.1.161] (unknown [192.168.1.161]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by straasha.imrryr.org (Postfix) with ESMTPSA id B34FA33174; Thu, 28 Feb 2019 11:42:09 -0500 (EST)
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 12.2 \(3445.102.3\))
From: Viktor Dukhovni <ietf-dane@dukhovni.org>
In-Reply-To: <CALaySJKdQziPJerfW9RJ_tExytaESjmfNMysRduYJ93z=kuyAg@mail.gmail.com>
Date: Thu, 28 Feb 2019 11:42:08 -0500
Cc: uta-chairs@ietf.org, draft-ietf-uta-smtp-require-tls@ietf.org, The IESG <iesg@ietf.org>
Reply-To: uta@ietf.org, uta-chairs@ietf.org, draft-ietf-uta-smtp-require-tls@ietf.org, The IESG <iesg@ietf.org>
Content-Transfer-Encoding: 7bit
Message-Id: <B1634A55-35BF-441A-B9AB-611DFBBFBA55@dukhovni.org>
References: <155076162945.8595.2671476533659571699.idtracker@ietfa.amsl.com> <554356ec-de3a-08ed-a920-0397813895e0@bluepopcorn.net> <CABcZeBPOWVhPTpBt3E8GsqH7LMtG4y04voqTCLS=PG3hZk+NaA@mail.gmail.com> <CALaySJKdQziPJerfW9RJ_tExytaESjmfNMysRduYJ93z=kuyAg@mail.gmail.com>
To: uta@ietf.org
X-Mailer: Apple Mail (2.3445.102.3)
Archived-At: <https://mailarchive.ietf.org/arch/msg/uta/qwxjrL21_BalZWIFYoL7rZFVGQs>
Subject: Re: [Uta] Eric Rescorla's Discuss on draft-ietf-uta-smtp-require-tls-07: (with DISCUSS and COMMENT)
X-BeenThere: uta@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: UTA working group mailing list <uta.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/uta>, <mailto:uta-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/uta/>
List-Post: <mailto:uta@ietf.org>
List-Help: <mailto:uta-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/uta>, <mailto:uta-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2019 16:42:14 -0000


> On Feb 28, 2019, at 11:01 AM, Barry Leiba <barryleiba@computer.org> wrote:
> 
> I have to agree with EKR about it not completely being the sender's
> decision, though for a rather different reason.  I really doubt that
> in the vast majority of cases any human user will actively choose or
> not choose this option on a message-by-message basis.

The primary motivation for "Require TLS = no" is to allow the user
to *resend" a message that is not getting through, or to reach the
destination domain's postmaster because of downstream (receiving
system misconfiguration), to send a message that requires no meaningful
confidentiality.  Individual users are very well positioned to make
that judgement call.  The sending domain's administrator does not
have to support user opt-out, when corporate risk from HIPAA or
similar trumps user preference.

This would not generally be something the user needs to decide
a priori when sending the initial message, it is a failure
fallback option, just like the various options to proceed despite
security issues in browsers, but requiring a new message tagged
appropriately, because delivery failure is asynchronous.

The sender may well be the postmaster of the sending domain, fully
aware of the semantics.

Indeed on my system, I have sender-dependent DANE policy, allowing
one sender address to reach recipients whose TLSA records are stale,
or otherwise broken.  That would be better replaced by the per
message "Require TLS = no".

-- 
-- 
	Viktor.