On 2015-08-06 15:51, Alexey Melnikov wrote:
> Hi Viktor,
> 
> On 18/06/2015 17:02, Viktor Dukhovni wrote:
>> On Wed, Jun 17, 2015 at 11:53:02AM +0100, Alexey Melnikov wrote:
>>>>     Filename        : draft-ietf-uta-email-tls-certs-03.txt
>>> I believe this version addresses WGLC comments. Let me know if I've
>>> missed
>>> anything.
>> Sorry, I've been away from the UTA list for a while, too few cycles
>> to keep up with everything.
>>
>> So while I did not raise this during WG LC (which may be over), I am
>> concerned about the first example in Section 6, namely:
>>
>>     Consider an IMAP-accessible email server which supports both
>>     IMAP and IMAPS (IMAP-over-TLS) at the host "mail.example.net"
>>     servicing email addresses of the form "[email protected]" and
>>     discoverable via DNS SRV lookups in domain "example.net" (DNS
>>     SRV records "_imap._tcp.example.net" and "_imaps._tcp.example.net").
>>     A certificate for this service needs to include SRV-IDs of
>>     "_imap.example.net" (when STARTTLS is used on the IMAP port)
>>     and "_imaps.example.net" (when TLS is used on IMAPS port).  See
>>     [RFC6186] for more details.  (Note that unlike DNS SRV there is
>>     no "_tcp" component in SRV-IDs) along with DNS-IDs of "example.net"
>>     and "mail.example.net".  It might also include CN-IDs of
>>     "mail.example.net" for backward compatibility with deployed
>>     infrastructure.
> I improved the example by splitting it into 2 parts (only server
> hostname is used and server hostname + RFC 6186 discovery procedure). I
> also fixed partial sentences that you spotted.
> 
> I also corrected/expanded text in Section 3 which talks how different
> "reference identifiers" are constructed. I discovered that the text was
> not as clear as it should have been.
>> The concern is that when this service is "discovered" via ordinary
>> DNS (i.e. no DNSSEC) the server name is not obtained securely, and
>> and any use of TLS authentication based on an insecurely obtained
>> reference identifier is "too late" to protect the user against MiTM
>> attacks.  This is not discussed in sufficient detail.
>>
>> In my view the "Security Considerations" section (6 coincidentally)
>> of RFC6186 places an unreasonable burden on the user to make subtle
>> security decisions:
>>
>>     A malicious attacker with access to the DNS server data, or able
>>     to get spoofed answers cached in a recursive resolver, can
>>     potentially cause MUAs to connect to any IMAP, POP3, or submission
>>     server chosen by the attacker.  In the absence of a secure DNS
>>     option, MUAs SHOULD check that the target FQDN returned in the
>>     SRV record matches the original service domain that was queried.
>>     If the target FQDN is not in the queried domain, MUAs SHOULD
>>     verify with the user that the SRV target FQDN is suitable for
>>     use before executing any connections to the host.  Alternatively,
>>     if TLS [RFC5246] is being used for the email service, MUAs MUST
>>     use the procedure outlined in Section 6 of [RFC6125] to verify
>>     the service.
>>
>> In the "SMTP security via opportunistic DANE TLS" draft, in section 7
>>
>>     
>> https://tools.ietf.org/html/draft-ietf-dane-smtp-with-dane-19#section-7
>>
>> I note that when SRV records are used to locate submission services,
>> similar conclusions to those reached in the MTA-to-MTA documention
>> ought to apply and DANE may well be the right security model once
>> one trusts DNS to handle service indirection:
>>
>>     We note that the SMTP protocol is also used between Message User
>>     Agents (MUAs) and Message Submission Agents (MSAs) [RFC6409].  In
>>     [RFC6186] a protocol is specified that enables an MUA to dynamically
>>     locate the MSA based on the user's email address.  SMTP connection
>>     security considerations for MUAs implementing [RFC6186] are largely
>>     analogous to connection security requirements for MTAs, and this
>>     specification could be applied largely verbatim with DNS MX records
>>     replaced by corresponding DNS Service (SRV) records
>>     [I-D.ietf-dane-srv].
>>
>>     However, until MUAs begin to adopt the dynamic configuration
>>     mechanisms of [RFC6186] they are adequately served by more
>>     traditional static TLS security policies.  Specification of DANE TLS
>>     for Message User Agent (MUA) to Message Submission Agent (MSA) SMTP
>>     is left to future documents that focus specifically on SMTP security
>>     between MUAs and MSAs.
>>
>> So now that you're specifically advocating support for RFC6186 and
>> DNS based dynamic configuration/redirection, perhaps it is time to
>> flesh out the discussion with a more complete security model (i.e.
>> DANE).
>>
>> At the very least, more text is needed to explain that just forging
>> ahead and trusting insecure SRV records is problematic, but once
>> DNSSEC *is* trusted, then there no downside to "in for a penny for
>> a pound" and using DANE keying also, and I believe there are real
>> advantages to doing so.
> 
> I added a new paragraph in the Security Considerations:
> 
>    TLS Server Identity Check for Email relies on use of trustworthy DNS
>    hostnames when constructing "reference identifiers" that are checked
>    against an email server certificate.  Such trustworthy names are
>    either entered manually (for example if they are advertised on a Mail
>    Service Provider's website), explicitly confirmed by the user (e.g.
>    if they are a target of a DNS SRV lookup) or derived using a secure
>    third party service (e.g.  DNSSEC-protected SRV records which are
>    verified by the client or trusted local resolver).  Future work in
>    this area might benefit from integration with DANE [RFC6698], but it
>    is not covered by this document.
> 
> As we also discussed, I am happy to co-edit with you a document that
> describes how to use DANE TLSA + DNSSEC for email server TLS identity
> verification.
> 
> Best Regards,
> Alexey

OK it sounds to me like these are small enough so we don't need another
WGLC. We'll ship it upstairs with these changes.

        Cheers Leif


_______________________________________________
Uta mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/uta

Reply via email to