Re: [Uta] "webby" STS and DANE/DNSSEC co-existence

Chris Newman <chris.newman@oracle.com> Mon, 18 April 2016 19:43 UTC

Return-Path: <chris.newman@oracle.com>
X-Original-To: uta@ietfa.amsl.com
Delivered-To: uta@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BB77C12DA84 for <uta@ietfa.amsl.com>; Mon, 18 Apr 2016 12:43:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.217
X-Spam-Level:
X-Spam-Status: No, score=-5.217 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id P70AvPRG7Pyl for <uta@ietfa.amsl.com>; Mon, 18 Apr 2016 12:43:56 -0700 (PDT)
Received: from userp1040.oracle.com (userp1040.oracle.com [156.151.31.81]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6170D12B048 for <uta@ietf.org>; Mon, 18 Apr 2016 12:43:55 -0700 (PDT)
Received: from aserv0021.oracle.com (aserv0021.oracle.com [141.146.126.233]) by userp1040.oracle.com (Sentrion-MTA-4.3.2/Sentrion-MTA-4.3.2) with ESMTP id u3IJhiaG025764 (version=TLSv1 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Mon, 18 Apr 2016 19:43:44 GMT
Received: from gotmail.us.oracle.com (gotmail.us.oracle.com [10.133.152.174]) by aserv0021.oracle.com (8.13.8/8.13.8) with ESMTP id u3IJhhpg019703; Mon, 18 Apr 2016 19:43:43 GMT
MIME-version: 1.0
Content-disposition: inline
Content-type: text/plain; charset="utf-8"
Received: from Nifty.local (unknown [10.145.239.114]) by gotmail.us.oracle.com (Oracle Communications Messaging Server 8.0.0.0.0 64bit (built Mar 19 2015)) with ESMTPSA id <0O5U00D4WHGEJV00@gotmail.us.oracle.com>; Mon, 18 Apr 2016 12:43:35 -0700 (PDT)
Date: Mon, 18 Apr 2016 12:43:20 -0700
From: Chris Newman <chris.newman@oracle.com>
To: Jim Fenton <fenton@bluepopcorn.net>, uta@ietf.org
Message-id: <etPan.571538dd.14af4bae.918@Nifty.local>
In-reply-to: <57145842.2050604@bluepopcorn.net>
References: <570C0CD2.9030401@cs.tcd.ie> <20160411212128.GA26423@mournblade.imrryr.org> <CANtKdUekXNkVvsfq0UjCiaaPVBgoVGfrfnYUrdoOf0EegXMuPg@mail.gmail.com> <20160413014304.GB26423@mournblade.imrryr.org> <CANtKdUf0kN5aOmX0-NsyQXz_+PRGfaXa37DFZoCX3FqdYh5CpA@mail.gmail.com> <etPan.570e8549.3d8c14b4.1614d@jcaps-rd2.us.oracle.com> <57107E44.3040108@bluepopcorn.net> <etPan.5712752a.309ce839.18439@dhcp-adc-twvpn-3-vpnpool-10-154-102-192.vpn.oracle.com> <57145842.2050604@bluepopcorn.net>
X-Mailer: Airmail (351)
Content-transfer-encoding: quoted-printable
X-Source-IP: aserv0021.oracle.com [141.146.126.233]
Archived-At: <http://mailarchive.ietf.org/arch/msg/uta/yObQWPPW0UAdeTx5Br7lV_gKPO0>
Subject: Re: [Uta] "webby" STS and DANE/DNSSEC co-existence
X-BeenThere: uta@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: UTA working group mailing list <uta.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/uta>, <mailto:uta-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/uta/>
List-Post: <mailto:uta@ietf.org>
List-Help: <mailto:uta-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/uta>, <mailto:uta-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Apr 2016 19:43:58 -0000

 
On April 17, 2016 at 13:45:24 , Jim Fenton (fenton@bluepopcorn.net(mailto:fenton@bluepopcorn.net)) wrote:
> On 4/16/16 10:23 AM, Chris Newman wrote:
> >  
> >>> So while Viktor made a compelling case that the TLS version directive is not appropriate for SMTP relay, I think it is appropriate for the MUA STS scenario where it’s simpler to implement, where very old MUAs are in wide use requiring permissive servers, and I’d really like to be sure my client is using the stronger versions of TLS as long as I don’t have to manually configure it.
>  
> I'm a little confused by the language in section 9.1 "All [client and
> server] implementations MUST be configurable to support implicit TLS
> using the TLS 1.2 protocol or later." So why not insist in TLS 1.2 all
> the time? There must be a deployment corner case that I'm not considering.  

SSL appliance boxes tend to get updated slowly. Also the model has to cover two versions to explain how upgrading works.

> But, as you noted in section 6, the choice of TLS version isn't the only
> thing that needs to be considered. Why does TLS version rise to the
> level of importance of creating a directive, but cipher suite doesn't?  

Cipher suites are necessarily fluid and it’s not always clear whether one will be better than another indefinitely. To the extent we can have TLS stack vendors be the only people who care about what cipher suites are enabled/preferred, we’re going to have better outcomes than if we expect non-security folks to control those knobs. The primary need is the ability to turn on/off old cipher suites as dictated by a site’s interoperability vs. security balance. Client policy is more likely to cause problems than to improve security in the cipher suite area.

The TLS version, on the other hand, is where the security community really ratchets up the minimum security for TLS. Minimum version is controllable in TLS APIs, and indeed a common TLS client design error is failure to expose that control knob. Thus when SSL3 & TLS1.0 vulnerabilities became well known, it required software updates to turn those versions off in many products (rather than a configuration or policy change). Having it in the standard might encourage implementers to pay attention to that important TLS stack control knob.

> I don't see the complexity and interoperability risk associated with all
> this to be warranted by the relatively low level of security risk.  

For MUAs, this is not complex. It would be very straightforward to implement (a few lines of code) once the account confidentiality level model is implemented (which is the important part of MUA STS). I don’t see significant interoperability risk in the MUA space.

> Also, if we're talking about some unification of STS and DEEP (as
> "MUA-STS" or something, if I recall correctly), and the STS policy is
> retrieved in a "webby" manner, the policy record probably also needs to
> adhere to its own standards for TLS version, cipher suite, etc. Which
> could be problematic if an attacker can publish a record for a
> known-vulnerable cipher suite or something.  

Unification is a non-goal. Protocol/model alignment where it makes sense is the goal. I believe a strong case has been made that STS policy is very application-specific. In SMTP relay STS, the default is deliver forward with zero security and there is communication with many badly behaved peers that all have to be tracked separately. The business motivation is: 1. never bounce legitimate mail to avoid support costs and 2. generate a reputation for confidentiality whether or not that reputation is reflected in reality. The ISPs with these two motivations control their SMTP relay clients & servers. Just getting the cert checked in the most barebones fashion is going to be a difficult ask for the infrastructure. The MUA world is different. Many MUAs already support an “SSL-required” mode that checks certs — they just have no way to move from the no-SSL to SSL-required mode and no indication of which mode is active. ISPs generally don’t control which MUA the customer uses, so the ISP motivation is to make the common MUAs work well. If (and only if) the MUA provides a visual indication of the account confidentiality level, the ISPs will change to get the label. There also tend to be a lot of very old MUAs in use in some countries, so ISPs often have very permissive server configurations (e.g., likely to support TLS1.0, RC4, SHA1, etc to interoperate with old MUAs). Ratcheting up the minimum TLS version is much easier to implement in MUA STS than SMTP relay STS, and it’s more likely to actually improve security.

	- Chris