Re: Why are mail servers not also key servers?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



--On Friday, April 21, 2017 09:52 -0600 Doug Royer
<douglasroyer@xxxxxxxxx> wrote:

> On 04/21/2017 09:48 AM, John C Klensin wrote:
> 
>> 
>> In addition, as others have pointed out, if you can't trust
>> your email (server) provider, then expecting others to trust
>> keys on the basis that they are obtained from that server may
>> not make a lot of sense.
> 
> You do not have to trust your or their email server. If you
> trust the cert issuer. Then use the result.
> 
> If you do not trust the cert issuer, then do not use the
> results.

Doug,

Sorry... should have been more explicit (or just stayed out of
this).  While I agree with you, given the current state of
certification quality readily available to most of us and the
process needed, in the general case, to verify a cert, I have a
lot of trouble figuring out what this thread is about if getting
the cert from the mail server doesn't add value.

There are, as Rich points out, too many cases (perhaps a large
number every year) where a direct connection cannot be made from
the MUA to the remote server (final delivery MTA or something
verifiably under its control).  For almost any case involving
relaying rather than that sort of direct connection (and some
that don't), cert requests risk being used to propel a DoS or
blowback attack unless the server can verify the identity of the
MUA or at least the submission server, creating a chicken and
egg problem at best. 

The one advantage the (final delivery) mail server has is that
is is able to know --and, in general, is the only system that
knows -- which email addresses in its systems are aliases for
which other one, including such things as whether case-folding
works (and, for non-ASCII local parts, what it even means).
However, some of the discussions now going on in LAMPS
notwithstanding, the certificate issuer generally doesn't have
access to that information so the cert one gets back may not
match the address you asked about closely enough that, in the
general case, you can make a competent decision as to whether or
not to trust it.

Each one of those complications, including any returned
certificates that can't be trusted without further verification
(that might be all of them), makes the value proposition for
fixing a mail server to return certificate over something
mail-related less attractive... and the answer to the original
question in the subject line closer to "why bother?".   And, if
the plan is to connect to that server over something other than
email protocols, then it seems to me there is relatively little
advantage of trying to tie the discovery and retrieval
mechanisms to the email infrastructure rather than treating its
as a service we already know how to find with the DNS (even
though that doesn't solve all of the problems.  So that answer
is, again, "why bother?" except for a very selected set of cases.

Back to trying to get useful work done.

    john









[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Fedora Users]