On Mon, May 20, 2013 at 08:16:11AM -0700, Paul Hoffman wrote:

> On May 20, 2013, at 7:09 AM, Viktor Dukhovni <[email protected]> wrote:
> 
> > This proposed protocol supports opportunistic TLS with DANE
> > authentication resistant to MITM downgrade attacks.
> 
> This seems like really important work. Lots of people turn on
> STARTTLS in SMTP with no actual certificate verification because
> the want better than nothing security but don't want the operational
> overhead of actually rejecting bad TLS. It seems like this proposal
> actually gets them better protection with the same lack of overhead
> if they don't want to reject. It also gives those who want to reject
> bad TLS a better basis to do so.

I should note that my draft substantively overlaps draft-ietf-dane-smtp-01.
Core differences:

    - The new draft includes a more expansive treatment of the semantics of the
      various TLSA RR types in the context of SMTP.

    - The new draft addresses SMTP submission with RFC 6409 SRV records.

    - The new draft specifies the target of a CNAME as the base name for TLSA
      lookups with MX hosts (and with non-MX domains).

Since https://tools.ietf.org/html/draft-ietf-dane-smtp-01#section-3
also specifies opportunistic security, the core premise is common
to the two drafts.  Perhaps the two drafts can be merged.

-- 
        Viktor.
_______________________________________________
dane mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dane

Reply via email to