Re: [Uta] New Version Notification for draft-levine-additional-registered-clauses-00

2019-01-25 Thread ned+uta
> I think the better approach here is to say that SNI logging adds to the > information about the message's origins and history, and the same > considerations as to whether or not to include things like server IPs also > apply to SNI information. Seems reasonable. In the usual case that you

Re: [Uta] New Version Notification for draft-levine-additional-registered-clauses-00

2019-01-25 Thread John R Levine
I think the better approach here is to say that SNI logging adds to the information about the message's origins and history, and the same considerations as to whether or not to include things like server IPs also apply to SNI information. Seems reasonable. In the usual case that you can tell

Re: [Uta] [ietf-smtp] New Version Notification for draft-levine-additional-registered-clauses-00

2019-01-25 Thread ned+uta
>> By the nature of e-mail, the recipient of a message already knows who >> the sender sent it to, since he or she got it.  The Received headers go >> into the message itself, not third party logs. > > Mail list archives and mail corpus leaks do expose that to more > than one recipient.

Re: [Uta] New Version Notification for draft-levine-additional-registered-clauses-01

2019-01-25 Thread Stephen Farrell
Hiya, On 25/01/2019 22:11, Viktor Dukhovni wrote: > Like John, I am very skeptical about the applicability of ESNI to > SMTP. I also agree with John and you that ESNI doesn't seem compelling for SMTP. Nonetheless, I'm often wrong, and maybe in this case too, so if ESNI is seen to be used then

Re: [Uta] New Version Notification for draft-levine-additional-registered-clauses-00

2019-01-25 Thread ned+uta
> I suggest calling out ESNI specifically as a reason to not log the > SNI in the security considerations, e.g. via: > OLD: >In a few >circumstances, a new Additional-registered-clause might disclose >information to a recipient that was otherwise unavailable. > NEW: >In a few

Re: [Uta] New Version Notification for draft-levine-additional-registered-clauses-01

2019-01-25 Thread Viktor Dukhovni
> On Jan 25, 2019, at 4:38 PM, Stephen Farrell > wrote: > > 2. The new text in s4 is wrong, a mail server will generally > have access to the value from ESNI or the h/s will likely fail, > and the TLS server will treat that as the SNI to use for server > certificate selection. The issue isn't

Re: [Uta] Last Call: (SMTP Require TLS Option) to Proposed Standard

2019-01-25 Thread Stephan Bosch
Hi, Op 25/01/2019 om 16:00 schreef The IESG: Abstract The SMTP STARTTLS option, used in negotiating transport-level encryption of SMTP connections, is not as useful from a security standpoint as it might be because of its opportunistic nature; message delivery is, by default,

Re: [Uta] New Version Notification for draft-levine-additional-registered-clauses-01

2019-01-25 Thread Stephen Farrell
Hiya, On 25/01/2019 18:08, John R Levine wrote: > I've uploaded a new version that reflects the recent discussions. > > Because I am a grumpy old guy I will not tell you what it says so if you > want to know, you will have to read all four pages of it: Sorry to have made you (more:-) grumpy,

Re: [Uta] New Version Notification for draft-levine-additional-registered-clauses-00

2019-01-25 Thread Salz, Rich
> sni domain.name > esni yes Works for me. (Stephen's right about ESNI and its use of DNS BTW) ___ Uta mailing list Uta@ietf.org https://www.ietf.org/mailman/listinfo/uta

Re: [Uta] New Version Notification for draft-levine-additional-registered-clauses-00

2019-01-25 Thread Stephen Farrell
On 25/01/2019 17:15, John R Levine wrote: > > How about this? > >  sni domain.name >  esni yes Works for me. With the "esni yes" otpion as a SHOULD level thing, a MUST is maybe too much (just in case the MTA code can't determine that ESNI was used). Thanks, S. 0x5AB2FAF17B172BEA.asc

Re: [Uta] New Version Notification for draft-levine-additional-registered-clauses-00

2019-01-25 Thread Salz, Rich
>Again though I am not arguing for widespread use of ESNI in SMTP here, just that if someone has decided to use ESNI, we don't unexpectedly leak the value that they've chosen to try not expose. Yes, the ESNI attribute should be present/not-present and not the actual value.

Re: [Uta] New Version Notification for draft-levine-additional-registered-clauses-00

2019-01-25 Thread John R. Levine
No. That's not how ESNI works with the current draft, nor how I guess it'll evolved. The TLS server (MTA in this case) has to publish a key share and other stuff in the DNS for ESNI to work and has to keep the DNS content and TLS server config in-whack. So merely upgrading a library won't turn on

Re: [Uta] New Version Notification for draft-levine-additional-registered-clauses-00

2019-01-25 Thread Stephen Farrell
On 25/01/2019 16:36, John R Levine wrote: > >> But, if someone has decided to setup ESNI for an MTA (which will >> need them to take action to do that), then I'd assume they have >> a reason. At that point, exposing the ESNI value in the message >> is what I'm arguing to not recommend. > >

Re: [Uta] New Version Notification for draft-levine-additional-registered-clauses-00

2019-01-25 Thread John R Levine
By the nature of e-mail, the recipient of a message already knows who the sender sent it to, since he or she got it.  The Received headers go into the message itself, not third party logs. Mail list archives and mail corpus leaks do expose that to more than one recipient. Indeed, but unless

Re: [Uta] [ietf-smtp] New Version Notification for draft-levine-additional-registered-clauses-00

2019-01-25 Thread Salz, Rich
>I don’t think there is universal agreement with IESG that I-Ds qualify. So > you might need to talk to your AD ;-). It would be really good if the IESG could decide on this; IANA registry requirements shouldn't vary by individual. ___ Uta

Re: [Uta] New Version Notification for draft-levine-additional-registered-clauses-00

2019-01-25 Thread Stephen Farrell
Hiya, On 25/01/2019 15:00, John R Levine wrote: > > More to the point, though, I think you're overlooking two fundamental > differences between SNI in SMTP and in HTTP.  On the web, only the > client making the request knows what web page she's looking for, and the > log info is saved on the

[Uta] Last Call: (SMTP Require TLS Option) to Proposed Standard

2019-01-25 Thread The IESG
The IESG has received a request from the Using TLS in Applications WG (uta) to consider the following document: - 'SMTP Require TLS Option' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive

Re: [Uta] New Version Notification for draft-levine-additional-registered-clauses-00

2019-01-25 Thread John R Levine
Your assumptions may or may not hold. The MTA can't tell. But it can tell that ESNI was used. (Well, it's likely a TLS stack that does ESNI will provide a way for the application to know ESNI was used, but not certain.) Having added SNI to my MTA last week, I can say the MTA can definitely

Re: [Uta] New Version Notification for draft-levine-additional-registered-clauses-00

2019-01-25 Thread Stephen Farrell
On 25/01/2019 02:37, John R Levine wrote: >> Even if this isn't a big leak, I think it's still worth preserving >> a way in which SNIs don't leak - if the TLS client and server and >> TLS client's DNS setup (and maybe the TLS server's too) are all >> such that we've not leaked the SNI in any of

Re: [Uta] [ietf-smtp] New Version Notification for draft-levine-additional-registered-clauses-00

2019-01-25 Thread Alexey Melnikov
Hi all, On 24 Jan 2019, at 23:41, Salz, Rich wrote: >> As I have always understood it, "spec required" means a >published, stable, readily-accessible, etc., specification. >Not necessarily an RFC but, until the definition of an I-D is >changed to eliminate all of the "don't