[Last-Call] Re: [Emailcore] Re: SECDIR Review of draft-ietf-emailcore-rfc5321bis-31

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Document: draft-ietf-emailcore-rfc5321bis-32.txt

I find myself in agreement with Donald here as far as the Security
Considerations go. Section 5 of RFC 3552 states in part:

   Authors MUST describe

      1.   which attacks are out of scope (and why!)
      2.   which attacks are in-scope
      2.1  and the protocol is susceptible to
      2.2  and the protocol protects against

   At least the following forms of attack MUST be considered:
   eavesdropping, replay, message insertion, deletion, modification, and
   man-in-the-middle.  Potential denial of service attacks MUST be
   identified as well.  If the protocol incorporates cryptographic
   protection mechanisms, it should be clearly indicated which portions
   of the data are protected and what the protections are (i.e.,
   integrity only, confidentiality, and/or endpoint authentication,
   etc.).  Some indication should also be given to what sorts of attacks
   the cryptographic protection is susceptible.  Data which should be
   held secret (keying material, random seeds, etc.) should be clearly
   labeled.

...

   It is insufficient to simply state that one's protocol should be run
   over some lower layer security protocol.  If a system relies upon
   lower layer security services for security, the protections those
   services are expected to provide MUST be clearly specified.  In
   addition, the resultant properties of the combined system need to be
   specified.

I don't believe that Section 7 (and in particular Section 7.1) do this
for SMTP, and I would ordinarily expect discussion of the topics
Donald indicates, namely transport security, DKIM, SPF, etc.  I
recognize that this is document a special case in that SMTP was
designed prior to the widespread deployment of cryptographic
techniques and so its relationship with them is different from (say)
that of QUIC and its embedded cryptography, but I think that goes
mostly to the technical details of the protocol, not the need to
clearly state the security properties of the resulting system.

As has been noted, I do see that some of these topics are discussed in
the A/S, though I have not studied it fully enough to determine if
they are adequately covered. In general, I would prefer not to have
the Security Considerations for a protocol deferred to another
document, but I do see that there is some force in the argument for a
separate specification. However, if it is to be separate, then I
believe that document needs to be a normative reference. The purpose
of the Security Considerations section is to ensure that the reader of
the specification is able to understand its security properties, and
therefore it should not be published until we know that together with
its normative references the document provides that clear picture.

-Ekr


On Sun, Oct 27, 2024 at 7:05 PM Donald Eastlake <d3e3e3@xxxxxxxxx> wrote:
I have provided the best feedback I could as a reviewer with a bit of
a security focus. I have a partially drafted response re nits but they
are just nits and I have decided it is not worth my effort to perfect
and send it. As a new set of eyes without the WG history, I hope my
feedback has improved the document.

Thanks,
Donald
===============================
 Donald E. Eastlake 3rd   +1-508-333-2270 (cell)
 2386 Panoramic Circle, Apopka, FL 32703 USA
 d3e3e3@xxxxxxxxx

On Sun, Oct 27, 2024 at 9:38 PM Dave Crocker <dhc@xxxxxxxxxxxx> wrote:
>
> On 10/27/2024 6:28 PM, Donald Eastlake wrote:
>
> I did not suggest a discussion of DMARK or DKIM. I suggested that they
> be mentioned.
>
> Donald,
>
> SMTP is a protocol specification.  The document already attempts to go far beyond it's scope for handling one submission and direct, associated deliveries.  It has quite a bit of text that seeks to be an general architecture document, as well as trying to cover activities outside of Internet Mail, per se.  It does these added jobs only partially, at best. There are historical reasons given, for not removing those bits of text, but it certainly does not justify adding more material that is best classed as a layer violation.
>
> DMARC, DKIM and SPF are all completely outside of the email transport protocol specification.  They are very much IN scope for a broader discussion of email as a service.  But that's a different goal.
>
> d/
>
> --
> Dave Crocker
> Brandenburg InternetWorking
> bbiw.net
> mast:@dcrocker@mastodon.social

--
last-call mailing list -- last-call@xxxxxxxx
To unsubscribe send an email to last-call-leave@xxxxxxxx
-- 
last-call mailing list -- last-call@xxxxxxxx
To unsubscribe send an email to last-call-leave@xxxxxxxx

[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux