On Wed, May 21, 2014 at 08:51:48AM +0200, David Schweikert wrote:

> Hi Viktor,
> 
> On Tue, May 20, 2014 at 14:21:22 +0000, Viktor Dukhovni wrote:
> > Facebook made the same mistakes you did:
> > 
> >     http://www.metzdowd.com/pipermail/cryptography/2014-May/021344.html
> 
> In that thread you say that CA certs are futile for SMTP servers.

That's the one sentence version, in response to Facebook's implied
assertion that SMTP STARTTLS at sites with CA-issued certs is
somehow further along the evolutionary path towards a secure SMTP
backbone than at sites without.

The unstated context is "at Internet scale".  I know about the
"secure" level, after all I developed that feature for Postfix,
while also serving as postmaster for a large company with many SMTP
secure TLS peering relationships.  This non-scalable use-case is
explained in section 1.3 of the DANE draft.

> You might say that DANE is better, and I agree, but CA certificates are
> the current solution to this problem, and certainly will remain
> important until DANE becomes more widespread.

The problem with "secure" is that it requires bilateral coordination.
Thus O(n^2) effort for a network of size n.  This cannot and will
not secure SMTP by default.

> Also, we don't do "fingerprint" because we don't want to maintain the
> fingerprint database (and deal with sudden changes, etc.).

Indeed, but you still maintain a policy table with per-destination
policy, contact numbers when things go wrong, custom matching rules
when the MX host certificates contain something other than the
recipient domain or a sub-domain there-of, ...

I urge companies that implement "secure" or "encrypt" with business
partners to implement DNSSEC and publish TLSA RRs.  Demand DANE
support from your MTA vendors and/or email service providers.

-- 
        Viktor.

Reply via email to