Thank you, guys, for the great discussion and great points on both 'sides' :-)
It would be great if the authors could capture the requirements (and maybe even 
scenarios, as John suggested) in the draft.
It seems that you are setting a high bar by discussing at depth the scenarios, 
the requirements, and the implementation in a single document cycle! 
We should probably arrange for a longer session in Berlin to go over the 
material and the discussion points to let the whole audience to judge :-).
Orit.

> -----Original Message-----
> From: Uta [mailto:[email protected]] On Behalf Of Viktor Dukhovni
> Sent: Friday, May 06, 2016 1:52 AM
> To: [email protected]
> Subject: Re: [Uta] CBOR, XML, JSON (was Re: Updated SMTP STS Draft)
> 
> On Fri, May 06, 2016 at 02:14:37PM +0700, Aaron Zauner wrote:
> 
> > > The current form is not the final form.  To the expect that the
> > > draft  emphasizes statistical reporting over problem alerting it
> > > needs to be corrected.
> >
> > I'm aware of that, but if the draft turns out to be a delivery reporting
> system, I'm not going to support it.
> 
> The draft will likely move forward with at least one of us not
> entirely in agreement with its content.  I think the most productive
> approach is to raise your issues as best you can.  You can of course
> walk away as or when you see fit.
> 
> I think we should stop the deep dive and come back to prioritizing
> goals.  Rank and/or replace the below, and then we can figure out
> how to address the right problem:
> 
>     * Near real-time forward-path alerting of (likely) receiver
>       misconfiguration?
> 
>     * Aggregate reporting of authentication success/failure
>       stats?
> 
>     * CT-like reporting to public "observatories"?
> 
>     * Other goals?
> 
> We may also have to pin down some technical details:
> 
>     * Reliability of report delivery?  (DMARC is not trying
>       to defend against MiTM attacks so is not concerned with
>       MiTM attacks on the reporting channel, here things are
>       different).
> 
> Relevant issues for aggregate reporting might include:
> 
>     * How long should a sender keep on trying to deliver a report?
>     * How often to retry?
>     * How does one avoid DoSing a target site with reports?
> 
> The above will require some care.
> 
> The simplest thing to in the near term do is to just communicate
> authentication failure inline, and either continue delivery (if
> authentication is not yet in hard-fail mode) or move on to the next
> MX host.  This gets to the right party in near real-time.
> 
> Sites that want real time reports of this sort would enable
> a new ESMTP feature advertisement that makes it possible for
> the client to send:
> 
>       TLSSTATUS DANE|STS NOSTARTTLS
>       TLSSTATUS DANE|STS UNTRUSTED
>       TLSSTATUS DANE|STS NOTMATCHED
>       TLSSTATUS DANE|STS SUCCESS
>       TLSSTATUS FALLBACK
> 
>     (handshake failures are communicated via TLS alerts)
>     (the FALLBACK status is for cleartext retries after
>      STARTTLS failure in opportunistic mode).
> 
> The MTA on the receiving end can log these, and raise alarms under
> appropriate conditions.  This would need support in sending and
> receiving MTAs and does not require either a "mailto:"; or "http"
> reporting address.  Just new inline signalling.
> 
> If the status is signalled as part of an actual delivery it might
> also be recorded in new message trace headers.  Tony Finch some
> time ago suggested "Transmitted:" as a sender-added trace header
> to complement "Received:".  It did not get traction at the time,
> but still looks like a reasonable idea.
> 
> > I understand this is what you consider relevant. I'd like to know why and
> > how attacks happen as well, if possible.
> 
> Reporting that conveys longer-term metrics is admittedly also of
> some interest, but we rather strongly disagree on its relative
> importance at this early stage of the evolution of authenticated
> MTA-to-MTA transport.
> 
> > > There will first be non-IETF documents in this space, and perhaps
> > > ultimately some IETF BCPs once we have even more operational
> > > experience.
> >
> > Which non-IETF documents? Where?
> 
> Some folks are writing a DANE BCP for SMTP with Postfix, and we'll
> try to include as material as possible that is MTA-neutral.  I'll
> let you known once we have something ready.
> 
> > No it isn't shaky, it's non-existent. People that currently deploy LE
> > certs on their mailservers do so on their own, without guidance and
> without
> > any support nor automation.
> 
> Well some guidance is available in the LE community forum posts,
> one of mine is even administratively pinned.  But more is possible.
> 
> > And I'm sorry to say: I don't care about DNSSEC
> 
> [ This sounds needlessly dogmatic. ]
> 
> > Again: there's currently neither incentive nor effort within LE to look
> > at DANE. Nor enough man-power available. Nor is it really relevant in my
> > opinion.
> 
> At least one of the folks behind LE has been reasonably supportive,
> though admittedly not yet to the extent of explicit support for
> DANE in the tooling.
> 
> > I'd rather consider every detail than rush a standard through the IETF
> > process.
> 
> I am also not in a hurry to skip important details.
> 
> --
>       Viktor.
> 
> _______________________________________________
> Uta mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/uta

_______________________________________________
Uta mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/uta

Reply via email to