On Mon, May 05, 2014 at 10:15:11PM -0700, [email protected] wrote:

>       Title           : SMTP security via opportunistic DANE TLS
>       Authors         : Viktor Dukhovni
>                         Wes Hardaker
>       Filename        : draft-ietf-dane-smtp-with-dane-09.txt
>       Pages           : 34
>       Date            : 2014-05-05

Changes from -08:

    - Document organization feedback from Olafur.  Some long sections
      broken up into smaller pieces, and some sub-sections promoted to
      top-level sections.

    - SMTP clients MAY elect to make use of TLSA records after "insecure"
      MX redirection, but MUST NOT misrepresent this as secure delivery.

    - Server logs SHOULD show the original (not CNAME expanded) MX hostname
      when the MX RRset is "insecure".  Otherwise, redirection leading
      to downgrades may not be "tamper-evident".

    - SMTP clients MAY elect to make use of "insecure" TLSA records (typically
      resulting from "insecure" CNAME indirection from
      _port._tcp.<servername>, as the zone containing <servername> is
      always signed when TLSA records are requested).  Again, MUST NOT
      misrepresent resulting security.

    - Routine corrections already discussed, based on Tom Ritter's feedback.

-- 
        Viktor.

_______________________________________________
dane mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dane

Reply via email to