DANE is merely one method of validating a certificate, there can also be SMTP 
policy orthogonal to DANE. Take for example, DEEP’s “tls11” and “tls12” 
directives. Those specify a minimum acceptable version of TLS for future 
connections. Although we haven’t debated yet whether to include those in SMTP 
relay policy, I think it would make sense to include those directives, 
particularly given the problems we’ve seen with old versions of TLS causing 
real security problems. And there may be future policy directives we want that 
are even more compelling. So the question is where to put SMTP relay security 
policy that is orthogonal to DANE. Seems like wherever we choose to put the 
policy for SMTP relay STS (whether in a DNSSEC-protected DNS record, HTTPS 
well-known or SMTP+STARTTLS), that’s where we should always look for SMTP relay 
policy.

                - Chris
On April 12, 2016 at 17:48:25 , Daniel Margolis ([email protected]) wrote:

What's the complexity you're worried about? Is it mainly that there's another 
switch to flip incorrectly (i.e. inadvertent misconfiguration, at a greater 
risk due to the presence of more configurations) or the risk of malicious DoS? 

I think Stephen laid out the trade-offs fairly well. I can see the argument for 
telling recipients that if they already publish a DANE record they're probably 
fine and shouldn't really need an STS policy as well. But a "must" seems less 
helpful to me here; senders who have some external limitation that prevents 
them from implementing DNSSEC then must not implement STS? I'd be worried that 
some larger deployments might have trouble with that. 

On Wed, Apr 13, 2016 at 3:43 AM, Viktor Dukhovni <[email protected]> wrote:
On Tue, Apr 12, 2016 at 06:52:31PM +0200, Daniel Margolis wrote:

> I'm not sure if I'm being stupid here, but what does it mean for STS to be
> "trumped" by DANE (or the reverse)? Do you mean that if the recipient
> domain/MX has both STS and DANE you will *only* validate the DANE policy?

Correct.  Trying to enforce both is too complex, and needlessly
increases the risk of delivery problems.

> If we instead said that senders who validate STS must honor STS and senders
> who validate DANE must honor DANE, is there a conflict?

That language is either tautological, or unreasonable, if intended
to imply that systems capable of both must be willing to apply both
concurrently.

> I would presume that if there is either a DANE failure or an STS failure
> senders who validate both will treat it as a failure. Introducing a concept
> of priority strikes me as unnecessary. What am I missing?

I have no plans to support concurrent evaluation of potentially
conflicting policies.  DANE is more robust than STS, given a DANE
policy I see no reason to also consider STS policy.

Of course an administrator will be able to choose which policy
applies to a given nexthop, but not enforcement of both.

--
        Viktor.

_______________________________________________
Uta mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/uta

_______________________________________________  
Uta mailing list  
[email protected]  
https://www.ietf.org/mailman/listinfo/uta  
_______________________________________________
Uta mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/uta

Reply via email to