Re: [Uta] Comments on STS Strict Transport Security

2016-03-22 Thread Daniel Margolis
Heh, thanks for the feedback. I will try to make sure we used consistent language. In specifics, my intended meanings: * authentication: determining that the policy is published by the domain owner (either because it was delivered over DNSSEC or because it was delivered over HTTPS with a trusted

Re: [Uta] Comments on STS Strict Transport Security

2016-03-22 Thread Daniel Margolis
explicitly state it, I presume reports can be > sent even when “to” is set to “true”? If so the draft should be explicit > about this. If not, why not? > > Neil > > On 22 Mar 2016, at 11:24, Daniel Margolis wrote: > > Heh, thanks for the feedback. > > I will try

Re: [Uta] "webby" STS and DANE/DNSSEC co-existence

2016-04-12 Thread Daniel Margolis
I'm not sure if I'm being stupid here, but what does it mean for STS to be "trumped" by DANE (or the reverse)? Do you mean that if the recipient domain/MX has both STS and DANE you will *only* validate the DANE policy? If we instead said that senders who validate STS must honor STS and senders who

Re: [Uta] draft-brotman-mta-sts/

2016-05-01 Thread Daniel Margolis
On Mon, May 2, 2016 at 12:55 AM, Viktor Dukhovni wrote: > > > On May 1, 2016, at 5:00 PM, John Levine wrote: > > > >> So using the domain as-is and dealing with any provisioning politics > >> looks to be the only sensible option. > > > > Not to put Daniel on the spot, but since he happens to wor

Re: [Uta] CBOR, XML, JSON (was Re: Updated SMTP STS Draft)

2016-05-05 Thread Daniel Margolis
On Thu, May 5, 2016 at 6:40 PM, John R Levine wrote: > Random CNAMEs and SNI play poorly together. Might as well just use the > TXT record to point people at the real name of the server. > Heh. But in this case we don't really need HTTPS (or any validation), since the SMTP reports can be sent w

Re: [Uta] SMTP STS: Indicating policy for subdomains

2016-05-15 Thread Daniel Margolis
On Sat, May 14, 2016 at 11:02 AM, Vladimir Dubrovin wrote: > 1. Alice makes certificate request for mx1.example.org to any public CA > choosing hostmas...@mx1.example.org as a validation address > Because Bob does not expect any mail to be received for > @mx1.example.org, he has no separate STS p

Re: [Uta] review of mta-sts-01

2016-08-11 Thread Daniel Margolis
Trimmed to a few parts I have immediate comment/questions on: On Tue, Aug 9, 2016 at 9:08 PM, Viktor Dukhovni wrote: > > Should this still apply when the names are DNSSEC validated? Or > should clients that obtain DNSSEC "secure" MX RRsets (or denial > of existence) skip the MX constraints in th

Re: [Uta] review of mta-sts-01

2016-08-16 Thread Daniel Margolis
On Fri, Aug 12, 2016 at 5:24 PM, Viktor Dukhovni wrote: > Delivery disruption that's due to stale policy is IMHO far less > likely to be the cause of problems, and so doing synchronous HTTPS > refresh and retry is I think too much complexity and latency for > too little gain. I'd like to see tha

Re: [Uta] review of mta-sts-01

2016-09-07 Thread Daniel Margolis
On Wed, Sep 7, 2016 at 4:57 PM, Viktor Dukhovni wrote: > If 404 is a soft fail, and maxage=0 is revocation, what should a sending > MTA > do when it encounters a 404 (or indeed an HTTPS connection timeout, > handshake > failure, ...)? Retry the HTTPS policy lookup on every delivery? Employ > so

Re: [Uta] MTA STS and HTTPS fetch timeouts

2016-10-01 Thread Daniel Margolis
Fair point on the pseudocode. My point wasn't so much that it's not useful as that it's hard and I have to carve out some time to sit down and try to do a better job of it. ;) Regarding 3.2, I think you're misinterpreting (due to, as I think Stephen pointed out, a misuse of the "MAY" terminology a

Re: [Uta] Questions about MTA STS complexity

2016-12-17 Thread Daniel Margolis
On Sat, Dec 17, 2016 at 12:04 AM, Alberto Bertogli wrote: > But using HTTPS only has the same polling frequency. The MTA doesn't > need to trigger the probe any more often than with the current proposal. > I think you're basically right about polling frequency, but I believe there are two other

Re: [Uta] Updated drafts for MTA-STS & TLSRPT

2017-02-23 Thread Daniel Margolis
Thanks for the comments! Comments inline. On Mon, Feb 20, 2017 at 9:16 PM, David Illsley wrote: > In general, the fact the a complete failure causes a policy update makes > this simple and safe. There are a couple of reasons why I think it's not > quite that easy: > 1. It's not desirable for a '

Re: [Uta] Updated drafts for MTA-STS & TLSRPT

2017-03-01 Thread Daniel Margolis
Ugh, you're right. Seems like I screwed up the merge or something. I can't remember what I was doing. Anyway, since we have to submit another draft for the whole CNAME issue I guess no harm done. :-/ If only we had some sort of code review process to review code. What an idea. Thanks for the clo

Re: [Uta] Comments on draft-ietf-uta-mta-sts-03

2017-03-27 Thread Daniel Margolis
I'm also not convinced that it is harder to block the HTTPS request, since the hostname there is not the nexthop domain but is itself a special hostname ("mta-sts"). Given that, an attacker who can block the TXT can just block the CNAME/A/ record for "mta-sts". You'd have to get rid of that an

Re: [Uta] MTA-STS-03 review

2017-04-18 Thread Daniel Margolis
2017 at 9:32 PM, wrote: > > On Tue, Apr 04, 2017 at 04:20:59PM +0200, Daniel Margolis wrote: > > > > Can you explain a little more what you mean? The mitigation is to > publish a > > > new policy with the correct values, so certainly anyone who does so > > >

Re: [Uta] Review of draft-ietf-uta-mta-sts-04

2017-04-23 Thread Daniel Margolis
Thanks. Comments inline, mostly ticking off changes. :) I have pushed all my changes in response to this to the git repo and they should appear in our next draft. On Wed, Apr 19, 2017 at 1:05 PM, Alexey Melnikov wrote: > Hi, > Below is my early "AD review" of the document. I think it is in pre

Re: [Uta] draft-ietf-uta-mta-sts-07 STS policy removal.

2017-08-08 Thread Daniel Margolis
Hi, Viktor, Thanks for the thorough writeup. A question about the "requirements" stated: 1. We need to provide a means for a domain to transition > from having an STS policy to not having an STS policy. > 2. The transition process should not look like failure to > obtain the policy, gen

Re: [Uta] draft-ietf-uta-mta-sts-07 STS policy removal.

2017-08-09 Thread Daniel Margolis
On Tue, Aug 8, 2017 at 10:20 PM, Viktor Dukhovni wrote: > > > On Aug 8, 2017, at 6:24 PM, Daniel Margolis > wrote: > > > > mode=none still requires period refresh via HTTPS. So it fails the > > requirement to be able to erase all trace of STS. > > > >

Re: [Uta] draft-ietf-uta-mta-sts-07 STS policy removal.

2017-08-09 Thread Daniel Margolis
On Wed, Aug 9, 2017 at 10:48 AM, Viktor Dukhovni wrote: > On Wed, Aug 09, 2017 at 08:52:48AM -0700, Daniel Margolis wrote: > > > The time period during which a domain who opts out of STS must publish > the > > "opt out" signal--regardless of how it is expressed--

[Uta] 302 redirects (was "MTA-STS and HTTP cache control")

2017-08-20 Thread Daniel Margolis
l let him chime in and maybe correct me. ;) On Sun, Aug 20, 2017 at 7:17 PM, Viktor Dukhovni wrote: > > > On Aug 20, 2017, at 1:08 PM, Daniel Margolis > wrote: > > > > Policies fetched via HTTPS are only valid if the HTTP response code is > 200 (OK). > > HTTP 3xx

Re: [Uta] 302 redirects (was "MTA-STS and HTTP cache control")

2017-09-05 Thread Daniel Margolis
ply delegate the > mta-sts zone as the policy indicator TXT record doesn’t sit in it. > > On Mon, 21 Aug 2017 at 20:47, Daniel Margolis > wrote: > >> My point was that if you host on Microsoft, you could have >> >> https://policy.example.com <-- cert

Re: [Uta] 302 redirects (was "MTA-STS and HTTP cache control")

2017-09-06 Thread Daniel Margolis
> On Tue, Sep 05, 2017 at 08:04:24PM +0200, Daniel Margolis wrote: > > > I had it in my head that a CNAME could only point to an A or , but I > > can't find anything like that in the RFC at a quick glance, so perhaps I > > made that up. > > You've made t

Re: [Uta] Rationale for mts-sts.

2017-09-16 Thread Daniel Margolis
Jim and Viktor basically get it right, I think. I don't believe this has any security value in warding off a DOS; anyone who can inject a TXT record to a non-implementing domain can also inject the A or CNAME for mta-sts.example.com. What this does do which has real security value is allow you to

Re: [Uta] Feedback and questions about MTA-STS rev10

2017-10-12 Thread Daniel Margolis
The MX-selection-vs-validation discussion (and change; note that in draft 03 and prior it worked the way you suggest) was in this thread: https://www.ietf.org/mail-archive/web/uta/current/msg01914.html. I agree that the modifying-MX-selection-loop is mostly a red herring, since you can do as you s

Re: [Uta] STS and SNI (was Re: Interaction between MTA-STS and DANE)

2017-10-24 Thread Daniel Margolis
I believe Google's MTAs are sending SNI. But the only time this would matter would be for cases like https://support.google.com/a/answer/2520500?hl=en, since ordinarily nobody is validating identities on server-to-server SMTP. Regarding arguments in favor of supporting SNI, Jim made the best attem

Re: [Uta] Establishing minimum TLS requirements for use with STS

2017-11-01 Thread Daniel Margolis
I've draft language stolen from HTTP/2 that just requires TLS 1.2 or higher. If people want more specific language on this (e.g. blacklisted cipher suites, MTI ciphers), please suggest it. On Sun, Oct 29, 2017 at 1:05 AM Viktor Dukhovni wrote: > > > > On Oct 28, 2017, at 4:32 PM, Hanno Böck wr

Re: [Uta] SNI text from 7672

2018-04-18 Thread Daniel Margolis
Thanks. I think this is consistent with what was added here: https://github.com/mrisher/smtp-sts/blob/master/mta-sts.txt#L633. If not, let me know. Thanks again. On Fri, Mar 23, 2018 at 12:38 AM Viktor Dukhovni wrote: > > > > On Mar 22, 2018, at 4:17 PM, Daniel Kahn Gillmor > wrote: > > > >> >

Re: [Uta] Last Call: (SMTP MTA Strict Transport Security (MTA-STS)) to Proposed Standard

2018-04-18 Thread Daniel Margolis
Apologies for the slow reply here. (I was on vacation.) Ned: thanks for the clear summary. I'll start working on those issues. Dave: thanks also for the direct feedback. To be honest, though, after all this discussion, I'm somewhat struggling to sort out what's actionable from what isn't, as I su

Re: [Uta] Ben Campbell's Discuss on draft-ietf-uta-smtp-tlsrpt-18: (with DISCUSS and COMMENT)

2018-04-18 Thread Daniel Margolis
Hey. Thanks for the feedback. On Mon, Apr 16, 2018 at 6:10 AM Ben Campbell wrote: > > -- > DISCUSS: > -- > > I plan to ballot "Yes" for this, but there is an is

Re: [Uta] Eric Rescorla's Discuss on draft-ietf-uta-mta-sts-17: (with DISCUSS and COMMENT)

2018-05-04 Thread Daniel Margolis
Whoah. Long thread. For the record, I believe it's trivial to implement the hostname filtering without applying it to the MX selection loop (and I think I've made this observation before): if an invalid certificate is (as it must be) detected after connecting to the chosen MX candidate (and thus c

Re: [Uta] Eric Rescorla's Discuss on draft-ietf-uta-mta-sts-17: (with DISCUSS and COMMENT)

2018-05-06 Thread Daniel Margolis
on issue, but I am generally hesitant to change things now if we don't have to. On Sun, May 6, 2018 at 8:41 PM Viktor Dukhovni wrote: > > > > On May 6, 2018, at 12:55 PM, Daniel Margolis > wrote: > > > > 2. Why is the "mx" pattern matched against the SA

Re: [Uta] Eric Rescorla's Discuss on draft-ietf-uta-mta-sts-17: (with DISCUSS and COMMENT)

2018-05-07 Thread Daniel Margolis
Yes, that was exactly my point. That's why I was saying this is really an implementation detail (albeit one you'd want to call out); the only fundamental protocol question at issue is whether we should consider valid a policy that matches only the cert but not the hostname itself. On Mon, May 7, 2

Re: [Uta] Benjamin Kaduk's No Objection on draft-ietf-uta-mta-sts-17: (with COMMENT)

2018-05-10 Thread Daniel Margolis
On Thu, May 10, 2018 at 12:38 AM Benjamin Kaduk wrote: > On Wed, May 09, 2018 at 11:43:50AM -0700, Ned Freed wrote: > > > Benjamin Kaduk has entered the following ballot position for > > > draft-ietf-uta-mta-sts-17: No Objection > > > > > When responding, please keep the subject line intact and r

Re: [Uta] Warren Kumari's Discuss on draft-ietf-uta-mta-sts-17: (with DISCUSS)

2018-05-10 Thread Daniel Margolis
Right. An attacker who can inject false DNS resolutions can, of course, redirect either the fixed mta-sts host or insert a spoofed TXT response--but by allowing the attacker to specify what hostname to use, it is more likely that attacks which indirectly allow an attacker to obtain a valid cert fo

Re: [Uta] Adam Roach's Discuss on draft-ietf-uta-mta-sts-17: (with DISCUSS)

2018-05-10 Thread Daniel Margolis
Thanks. We (as you may know) renamed "report" mode to "testing" mode late in the review process. I have fixed the errors in TLSRPT to be consistent with MTA-STS in our working draft. On Wed, May 9, 2018 at 8:49 AM Adam Roach wrote: > Adam Roach has entered the following ballot position for > dra

Re: [Uta] Ben Campbell's Yes on draft-ietf-uta-mta-sts-17: (with COMMENT)

2018-05-11 Thread Daniel Margolis
wrote: > > > > On May 10, 2018, at 2:13 PM, Daniel Margolis > wrote: > > > > No, it's just a rushed edit on my part. My intent was t say that you > should check the cached version against the version in HTTPS. > > > > One could argue (as you specu

Re: [Uta] Warren Kumari's Discuss on draft-ietf-uta-mta-sts-17: (with DISCUSS)

2018-05-14 Thread Daniel Margolis
Just to make sure I understand, your point was that there's no additional risk introduced by having arbitrary hostnames for the Policy Host, and having the hostname specified via the TXT record? I tend to agree about the security reasoning (i.e., that having the TXT provide indirection to the Poli

Re: [Uta] Eric Rescorla's Discuss on draft-ietf-uta-mta-sts-17: (with DISCUSS and COMMENT)

2018-05-19 Thread Daniel Margolis
Cool, me too. :) A few back and forth comments with Viktor on wording and we should be able to cut a new draft shortly. On Thu, May 17, 2018 at 3:22 PM Alberto Bertogli wrote: > On Sun, May 13, 2018 at 05:35:26PM +0200, Daniel Margolis wrote: > >A first cut of language here: &g

Re: [Uta] TLSRPT mx-host-pattern

2018-07-17 Thread Daniel Margolis
+1 for a JSON array. On Mon, Jul 16, 2018 at 11:43 PM Brotman, Alexander < alexander_brot...@comcast.com> wrote: > Hello, > > While someone was beginning to write their code for TLSRPT, they noticed > that mx-host-pattern is under specified. > >o "mx-host-pattern": The pattern of MX hostname

Re: [Uta] REQUIRETLS and MX spoofing

2018-10-24 Thread Daniel Margolis
is a "feature" of REQUIRETLS. > > -Jim > > On 10/24/18 5:59 AM, Daniel Margolis wrote: > > I don't disagree with the points made here. If you know you need TLS from > REQUIRETLS, and you know the desired MX identity from DNSSEC on the MX > records, you don't

Re: [Uta] Suggestion for minor MTA-STS improvement

2018-11-07 Thread Daniel Margolis
I don't think we discussed exactly that issue. We did entertain early on the idea of having the policy in a TXT record instead of via HTTPS, but moved to HTTPS for the obvious reasons. I do think the observation that you don't really even need the policy (except for the "mode" switch) in the event

Re: [Uta] MTA-STS with lots of domains

2019-01-09 Thread Daniel Margolis
Well, like I said, STS requires clients to provide SNI, so they should not consider it an STS violation if they don't send SNI and consequently get the wrong cert. I am not claiming your setup is broken--just that among possible fixes (a cert with many SANs, using SNI to serve one cert of many, re

Re: [Uta] tlsrpt

2019-04-28 Thread Daniel Margolis
e: > >>>>> "DM" == Daniel Margolis writes: > > DM> Google should only be sending TLSRPT reports for time periods in which > DM> there was mail sent. > > They send me daily reports for each of my tlsrpt zones to which they've > sent any ma