Re: UTA: Server certificate management (Re: Last Call: <draft-ietf-uta-email-tls-certs-05.txt>)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, Dec 01, 2015 at 03:34:32PM +0100, Harald Alvestrand wrote:

> If I understand this draft correctly, I object.
> 
> It says:
> 
> 
>    2.  When using email service discovery procedure specified in
>        [RFC6186] the client MUST also use the right hand side of the
>        email address as another "reference identifier" to compare
>        against SRV-ID identifier in the server certificate.

The key word in that text is "another".  This does not require the
server to have a certificate that matches this identifier, provided
there is some other some suitable identifier.  It provides additional
flexibility, not a constraint.

NOTE HOWEVER, that use of the server name from the SRV record as
a DNS-ID reference identifier offers no security at all absent
DNSSEC.  So "another" might become "only" in that case.  The 6186
approach to address lack of trustworthy identifiers basically boils
down to "ask the user".  Once the user confirms the SRV record it
becomes pinned, and the server name becomes one of the reference
identifiers.

My question upthread was whether this draft continues that legacy,
or departs from it.

HOWEVER:

> If I understand RFC 6186 correctly, a (possibly large scale) IMAP email
> service provider that wishes to serve a new domain "example org"
> according to RFC 6186 must do two things:

I am not aware of any adoption of RFC 6186.  Are there are any MUAs
actually doing RFC 6186 SRV lookups?  If there are none, is it worth
debating?

> - Change its certificate to include a complete list of all the domains
> it is serving, and have its CA sign off on that certificate.

Not needed in the "ask the user" approach, which is what 6186
entails.  Also not needed with SRV records protected with DNSSEC.
With plain-old SRV records, and no user confirmation, one is left
with no trustworthy identifiers other than SRV-ID (_imap.domainpart
of user's email address and the like).

So, if indeed MUAs want to implement this draft, and "ask the user"
is acknowledged as denial of reality, then they MUST use SNI.

For example RFC7671 and RFC7672 mandate SNI for DANE clients.

Indeed in TLS 1.3 SNI becomes mandatory to implement and send:

    https://tools.ietf.org/html/draft-ietf-tls-tls13-10#section-8.2

> The reason it cannot provide one certificate per served domain is that
> neither this specification nor any other specification I have found says
> that the client MUST include any distinguishing information (such as a
> Server Name Indication) that says what name it is expecting the server
> to provide service for.

See above.

-- 
	Viktor.




[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Fedora Users]