On 12/9/15 10:59 PM, Tom Hendrikx wrote:

>> unbound-host -rvD spike.porcupine.org
>> unbound-host -rvD postfix.org
>> unbound-host -rvD mail.cloud9.net

> Most DNSxLs are ip based, not hostname based.

In fact I used the reverse IP to query the DNSBL.

> The client's ip is provided by the tcp/ip stack of our own server. No DNSSEC needed.

A MITM attack can easily spoof those values. DNSSEC is the only way I have to verify the correspondence between the info I have and the info from your tcp/ip stack, that is, it is the only way I have to know whether I am connected to you or the MITM. In the case of e-mail, to get into my inbox you would need to implement SPF, DKIM, DMARC, and DANE.

DNSSEC works for your e-mail, for your web page, and pretty much everything else you are serving on the internet. Are you sure that your postfix distribution via http is exactly the one we downloaded? A MITM can spoof your web page, delivering a tampered package with its tampered signature. The only way you have to shield us both from
the MITM is to use a well configured DNSSEC, with HTTPS and TLSA.

> If you need more trust in DNSxL data retrieval, then sign up and pay for list access, ...

Do you realise that this is breaking the e-mail infrastructure? The problem we are discussing here is part of the greater problem of net neutrality and our right to speak. My standpoint here is that you do not need to pay for your e-mail to get into my inbox. If you want to exchange e-mail, all you need is a "proper" e-mail server. If we are pushed and pulled into purchasing dogmatic DNSxL, we will soon find out that the same are effectively censoring e-mail, because they can black-list your IP. They can also white-list spammers. No, DNSxL is not the solution. DNSxL is part of the problem.

I prefer direct, point-to-point, DNSSEC authentication with DANE. I do not want to throw away the baby with the bathwater, however. If I instruct my DNSSEC resolver to reject all those "insecure" IPs, and I instruct postfix to reject all non-DANE clients, then you automatically disappear from the internet. So far, I have managed to keep the baby, rejecting only 1% of it.
The remaining 3% of bathwater does not go away with DNSxL, as you can see.
As small as it looks,3% bath water is evidence of a security problem: a single e-mail from that pool is good enoughto cause damages while hiding its identity from the forensics.

We must find a way to reject telnet-like cloud-based e-mails.


SB

Reply via email to