Hi Viktor,

Thanks for your comments!

I agree we SHOULD tone down a few of the requirements, to make sure we do accommodate the opportunistic use case.

OTOH I agree with Aaron on (for example) still forbidding export-level ciphers.

We all should compromise a little bit so that we can have a single BCP for both the authenticated and unauthenticated use cases.

Best,
        Yaron

On 10/14/2014 11:30 AM, Viktor Dukhovni wrote:
On Tue, Oct 14, 2014 at 12:47:33AM +0300, Yaron Sheffer wrote:

What's new?

- Lots of edits and some section rearrangement (thanks Sean!)
- A short but important section on unauthenticated TLS.

Please replace the long obsolete reference to:

     https://tools.ietf.org/html/draft-dukhovni-smtp-opportunistic-tls-01

and even more obsolete:

     https://tools.ietf.org/html/draft-ietf-dane-smtp-01

with

     https://tools.ietf.org/html/draft-ietf-dane-smtp-with-dane-12

which supersedes both.

I don't know whether it makes sense to mention that authentication
via DANE TLSA might some day obviate the need for CRLs.  I am
guessing that this being a BCP, and DANE not yet being a significant
current practice, such a comment might be premature.  However, the
text does contain some "forward looking statements" about future
"must staple" signals, ... and thus perhaps other "forward looking
statements" might not be out of place.

Comments on particular text:
----------------------------

1.
The text about <128-bit ciphersuites is a bit imprecise:

     Implementations SHOULD NOT negotiate cipher suites that use
     algorithms offering less than 128 bits of security.        

     Rationale: Cipher suites that offer between 112-bits and 128-bits  
     of security are not considered weak at this time, however it is    
     expected that their useful lifespan is short enough to justify     
     supporting stronger cipher suites at this time.  128-bit ciphers   
     are expected to remain secure for at least several years, and      
     256-bit ciphers "until the next fundamental technology        
     breakthrough".  Note that some legacy cipher suites (e.g. 168-bit     
     3DES) have an effective key length which is smaller than their     
     nominal key length (112 bits in the case of 3DES).  Such cipher    
     suites should be evaluated according to their effective key        
     length.

The Rationale says "between" without clarifying which end-points
are included.  Presumably the grey-zone is [112, 128).  I've seen
no credible suggestions that anyone is remotely close to brute-forcing
a 128-bit key through exhaustive search.  So perhaps "at least
several years", is rather too gloomy.

Finally, with opportunistic TLS, even 112-bit 3DES is stronger than
cleartext, and the "SHOULD NOT" does not apply.  After all, in
these cases not finding a mutually agreeable cipher suite typically
leads to cleartext transmission, and cleartext is by far the weakest
option.  I've not been able to convince Wietse that we should
disable any algorithms with opportunistic TLS (even 40bit export-grade
RC4).  And he's not wrong, even though I've not seen any evidence
of its use in years, so I would be willing to risk cleartext with
any miraculous export-only peers.

And in particular the "MUST NOT" for RC4 is also inapplicable with
opportunistic TLS.

2.
SNI requirement is I think too strong:

     TLS implementations MUST support the Server Name Indication (SNI)  
     extension for those higher level protocols which would benefit from        
     it, including HTTPS.  However, unlike implementation, the use of SNI       
     in particular circumstances is a matter of local policy.   

TLS clients SHOULD certainly signal SNI where applicable.  However,
MUST is too strong IMHO.  If the client is using opportunistic TLS
(without authentication), the server certificate is irrelevant,
and sending SNI might trigger handshake failures if the server has
no matching certificate (SMTP MTAs don't even know which reference
identifier applies to the peer).

For server applications which for various reasons don't support
multiple server identities, there is no reason to require SNI.
Such servers can simply ignore all SNI extensions in the client
HELLO.  I have no intention of adding server-side SNI support in
Postfix.  The Postfix SMTP client uses SNI only with DANE
authentication, because with DANE it is finally possibly to reliably
infer a server reference identifier (the TLSA base domain).

3.
SSL Protocol version recommendations.

Once again with unauthenticated opportunistic TLS even SSL 3.0 or
TLS 1.0 is (much) better than cleartext.  So the MUST NOT SSL 3.0
and SHOULD NOT TLS 1.0 are too strong.

4.
Integrity protection text:

     This document assumes that data integrity protection is always one of      
     the goals of a deployment.  In cases when integrity is not required,       
     it does not make sense to employ TLS in the first place.  There are        
     attacks against confidentiality-only protection that utilize the lack      
     of integrity to also break confidentiality (see e.g.  [DegabrieleP07]      
     in the context of IPsec).

It is not clear whether this is talking about integrity via
authenticated key exchange?  Or integrity protection of the data
stream via HMAC, AEAD, ...?  If the former, then there is once again
a conflict with keeping opportunistic TLS in scope.


_______________________________________________
Uta mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/uta

Reply via email to