On 2022-08-03 at 17:32:56 UTC-0400 (Wed, 03 Aug 2022 16:32:56 -0500)
Jarland Donnell via mailop <jarl...@mxroute.com>
is rumored to have said:

Firefox does not speak MTA, so you are talking about a completely
different problem.  MTA is oportunistic TLS, web is required TLS.

Are equivalencies a bad thing though?

Only if you are saying things like 2+2=5, as in this case.

I'm talking about a general acceptance of the idea that a user should not be given a false sense of security by being presented with confirmation of a secure connection when it isn't secure.

A generic "confirmation of a secure connection" is not a part of any MTA-MTA interaction.

Both the client and server *negotiate* security mechanisms to a common ground of overall TLS version and ciphersuite. They AGREE on the specific details of their security. And in any case, a TLSv1.0 session using a good ciphersuite is no less secure for SMTP than a TLSv1.3 session using the same ciphersuite.

I shouldn't have to hold back from using similar situations in illustrations simply because they're not a 1:1 match in irrelevant ways.

The fact that SMTP is supposed to fall back to plaintext automatically when STARTTLS fails is entirely relevant to whether you allow TLS versions that are not inherently unsafe when used with SMTP.

The relevancy as pointed out in my words remains, stripping end users from any connection to the technical details of a mail server is to be completely ignorant of the exceptional growth of individual mail server administrators who need guidance and rely on a sane industry to perform sane activities around them.

Oh... I'm so sorry to have to break it to you, but I have bad news...

Email is messy and imperfect and largely run by people and orgs whose behavior is not well-described by the word "sane."

Telling them "no" when it isn't sane to tell them yes is sane behavior. If it isn't, then telling any end user anywhere at any time using any application "no" instead of "You have a secure connection" under any any every circumstance including ones in which the connection is in fact not secure, would be equally as insane regardless of their choice in protocol.

How is that in any way relevant to the use of TLSv1.0 between MTAs speaking SMTP?

There is no end user involved. There is no "You have a secure connection" assertion by either side except for a mutual agreement on which specific ciphers and protocols to use. When STARTTLS fails in SMTP, there may not even be a new connection made before the client goes ahead in plaintext.

The government wire tapping the upstream provider to catch your packets isn't going to say "Oh this is SMTP, I'm not supposed to touch it." There's no universal bro code to leave SMTP alone and only spy on HTTP activity.

That's really not it.

Catching packets and analyzing them is not all that is involved in compromising a TLSv1.0 or 1.1 session. All of the attacks I am aware of require the ability to elicit a lot of repeated or predictable traffic between server and client on one session. This can be feasible when the underlying protocol is HTTP, but is not feasible with SMTP.



--
Bill Cole
b...@scconsult.com or billc...@apache.org
(AKA @grumpybozo and many *@billmail.scconsult.com addresses)
Not Currently Available For Hire
_______________________________________________
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

Reply via email to