On Tue, Jul 28, 2020 at 02:02:06PM -0400, Wietse Venema wrote:
> > The MSA needs be authenticated before password-equivalent authentication
> > is performed.
>
> Authenticate what hostname? The SRV record is like an MX record on
> steroids, there are no guarantees about what hostname to expect.
Exactly, and yet, implicit (or perhaps even explicit, I don't recall the
details) in RFC6186 is the expectation that the hostname to be checked
in the certificate will be the *target* of the SRV RRset.
There are of course SRV-ID subject alternative names, which would be fit
for purpose, but no mainstream CA that I know of issues such
certificates.
> Is DNS over HTTP supposed to be the answer for that?
No, that's just a transport, what's needed is authenticity of the data,
while DoH and DoT are only about privacy. For authentic DNS records,
what's needed is DNSSEC.
Now of course a particular domain's MSAs could include in their
certificates some fixed name associated with the owner-name of
the SRV RRset, and the SMTP client could be configured to expect
that name, rather than the SRV target, but I wonder how common
such deployments are in the wild.
What I see much more often than RFC6186 is various "autodiscover"
names in DNS, which serve XML data describing service location
in more detail than an SRV record:
https://www.blackhat.com/docs/asia-17/materials/asia-17-Nesterov-All-Your-Emails-Belong-To-Us-Exploiting-Vulnerable-Email-Clients-Via-Domain-Name-Collision-wp.pdf
Deployment of RFC6186 is AFAIK rather thin at present.
--
Viktor.