Re: [Uta] tlsrpt

2019-04-12 Thread Brotman, Alexander
Yes, we've gotten a couple now. There was an announcement on their blog: https://security.googleblog.com/2019/04/gmail-making-email-more-secure-with-mta.html Mostly talking about MTA-STS, but they do mention that TLSRPT started as well. -- Alex Brotman Sr. Engineer, Anti-Abuse & Messaging Polic

Re: [Uta] Revised wording on security consideration re TLS-Required

2019-03-28 Thread Brotman, Alexander
-Abuse & Messaging Policy Comcast From: Jim Fenton Sent: Thursday, March 28, 2019 9:57 AM To: Brotman, Alexander ; uta@ietf.org Subject: Re: [Uta] Revised wording on security consideration re TLS-Required Good thought. Since it's acting as though it doesn't implement MTA-STS, then

Re: [Uta] Revised wording on security consideration re TLS-Required

2019-03-28 Thread Brotman, Alexander
Jim, I’m not sure how much of an impact this might have, but should there be a reference to TLSRPT? Either not to be counted or to explain the lack of TLS based on “TLS-Required: no” being set? -- Alex Brotman Sr. Engineer, Anti-Abuse & Messaging Policy Comcast From: Uta On Behalf Of Jim Fen

Re: [Uta] [EXTERNAL] Re: TLSRPT mx-host-pattern

2018-07-19 Thread Brotman, Alexander
Hello, Should that count as a consensus, or would others like additional information? Thank you -- Alex Brotman Sr. Engineer, Anti-Abuse Comcast From: Daniel Margolis [mailto:dmargo...@google.com] Sent: Tuesday, July 17, 2018 9:32 AM To: Brotman, Alexander Cc: uta@ietf.org Subject: [EXTERNAL

[Uta] TLSRPT mx-host-pattern

2018-07-16 Thread Brotman, Alexander
Hello, While someone was beginning to write their code for TLSRPT, they noticed that mx-host-pattern is under specified. o "mx-host-pattern": The pattern of MX hostnames from the applied policy. It is provided as a string, and is interpreted in the same manner as the "Checking o

Re: [Uta] List of domains supporting mta-sts?

2018-07-02 Thread Brotman, Alexander
Alberto, "comcast.net" also has an MTA-STS record, as well as a TLSRPT record. -- Alex Brotman Sr. Engineer, Anti-Abuse Comcast -Original Message- From: Uta [mailto:uta-boun...@ietf.org] On Behalf Of Alberto Bertogli Sent: Sunday, July 01, 2018 6:19 PM To: uta@ietf.org Subject: [Uta] Li

Re: [Uta] I-D Action: draft-ietf-uta-mta-sts-21.txt

2018-06-15 Thread Brotman, Alexander
email addresses/ > On Jun 15, 2018, at 2:09 PM, Brotman, Alexander > wrote: > > A few smaller updates for this. ABNF updates, and a few small language > changes. -- Viktor. ___ Uta mailing list Uta@ietf.org https://www.i

Re: [Uta] I-D Action: draft-ietf-uta-mta-sts-21.txt

2018-06-15 Thread Brotman, Alexander
A few smaller updates for this. ABNF updates, and a few small language changes. -- Alex Brotman Sr. Engineer, Anti-Abuse Comcast -Original Message- From: Uta [mailto:uta-boun...@ietf.org] On Behalf Of internet-dra...@ietf.org Sent: Friday, June 15, 2018 2:06 PM To: i-d-annou...@ietf.org

[Uta] Updated MTA-STS & TLSRPT Drafts

2018-05-21 Thread Brotman, Alexander
Hello, We have just uploaded a new revision for each of the above drafts. We believe we've incorporated all of the most recent feedback from reviewers. The largest change for MTA-STS was relating to the MX/SAN matching. For TLSRPT, we added a field for the DKIM record, removed mention of the

Re: [Uta] [EXTERNAL] Re: I-D Action: draft-ietf-uta-smtp-tlsrpt-19.txt

2018-05-10 Thread Brotman, Alexander
ERNAL] Re: I-D Action: draft-ietf-uta-smtp-tlsrpt-19.txt > On May 10, 2018, at 11:09 AM, Brotman, Alexander > wrote: > >> "The text in Section does not make it clear to what name the prefix >> "_smtp._tls" >> should be prepended. I think this would

Re: [Uta] [EXTERNAL] Re: MTA-STS (r16) & TLSRPT (r19)

2018-05-02 Thread Brotman, Alexander
Sure, let me get that in there. I'll try to get it uploaded shortly. -- Alex Brotman Sr. Engineer, Anti-Abuse Comcast -Original Message- From: Alexey Melnikov [mailto:alexey.melni...@isode.com] Sent: Wednesday, May 02, 2018 1:00 PM To: Brotman, Alexander ; uta@ietf.org Su

[Uta] MTA-STS (r16) & TLSRPT (r19)

2018-05-02 Thread Brotman, Alexander
Hello, We wanted to upload another set of drafts so that we could ensure we've properly addressed items previously raised. I believe Alexey and Ned were still discussing an item relating to MTA-STS, and the concerns from Sabrina for TLSRPT are still to be addressed. Please let us know if ther

Re: [Uta] Ben Campbell's Discuss on draft-ietf-uta-smtp-tlsrpt-18: (with DISCUSS and COMMENT)

2018-04-18 Thread Brotman, Alexander
For the DISCUSS section: We did note that the reports could be made to be submitted elsewhere via hijacked DNS, as you've noted. I don't believe that an expired or self-signed certificate from the HTTPS endpoint should be a reason to stop the submission, so we can leave it to the submitter. A

Re: [Uta] Suresh Krishnan's No Objection on draft-ietf-uta-smtp-tlsrpt-18: (with COMMENT)

2018-04-18 Thread Brotman, Alexander
Thank you for the correction, the IPs have been altered now. -- Alex Brotman Sr. Engineer, Anti-Abuse Comcast -Original Message- From: Suresh Krishnan [mailto:sur...@kaloom.com] Sent: Tuesday, April 17, 2018 10:44 PM To: The IESG Cc: draft-ietf-uta-smtp-tls...@ietf.org; Valery Smyslov

[Uta] New revisions for MTA-STS and TLSRPT

2018-04-04 Thread Brotman, Alexander
Folks, We're not there quite yet, but I wanted to send out some revised copies. I believe we still have a couple of outstanding questions to some folks, but we should have responses soon. I believe all of the changes are related to the meeting in London, or the WGLC items that were raised to

Re: [Uta] Genart last call review of draft-ietf-uta-smtp-tlsrpt-17

2018-03-26 Thread Brotman, Alexander
permiting the appropriate service See RFC 6376 section 3.6.1, description of s= tag. -Jim On 3/14/18 4:21 AM, Brotman, Alexander wrote: > I don't see any reason a specific DKIM selector wouldn't be possible. > > We'll see if we can get some language added to address th

Re: [Uta] Secdir last call review of draft-ietf-uta-smtp-tlsrpt-17

2018-03-26 Thread Brotman, Alexander
I may have missed the consensus on this. I don’t believe the final DNS entry is hugely important as it pertains to TLSRPT on its own, as long as it extends from the target domain. So, today we have "_smtp-tlsrpt.example.com", but it seems like to get more in line with a proper IANA registratio

Re: [Uta] Updated TLSRPT (WGLC Comments)

2018-03-26 Thread Brotman, Alexander
items causing reports show failures. 3) I believe 2 and 3 are similar situations. Does that answer some of your questions? -- Alex Brotman Sr. Engineer, Anti-Abuse Comcast -Original Message- From: Ayke van Laethem [mailto:a...@aykevl.nl] Sent: Saturday, March 24, 2018 5:56 PM To: Brotman, Alex

Re: [Uta] Genart last call review of draft-ietf-uta-smtp-tlsrpt-17

2018-03-14 Thread Brotman, Alexander
I don't see any reason a specific DKIM selector wouldn't be possible. We'll see if we can get some language added to address the clarifications you've requested. -- Alex Brotman Sr. Engineer, Anti-Abuse Comcast -Original Message- From: Joel M. Halpern [mailto:j...@joelhalpern.com] Sent

Re: [Uta] Secdir last call review of draft-ietf-uta-smtp-tlsrpt-17

2018-03-14 Thread Brotman, Alexander
[mailto:uta-boun...@ietf.org] On Behalf Of Phillip Hallam-Baker Sent: Tuesday, March 13, 2018 11:50 AM To: Brotman, Alexander Cc: uta@ietf.org; draft-ietf-uta-smtp-tlsrpt@ietf.org; i...@ietf.org; sec...@ietf.org Subject: Re: [Uta] Secdir last call review of draft-ietf-uta-smtp-tlsrpt-17 If

Re: [Uta] Secdir last call review of draft-ietf-uta-smtp-tlsrpt-17

2018-03-12 Thread Brotman, Alexander
I'm not opposed to change this to be in that form. I don't believe this would cause any technical issues. -- Alex Brotman Sr. Engineer, Anti-Abuse Comcast -Original Message- From: Phillip Hallam-Baker [mailto:hal...@gmail.com] Sent: Thursday, March 08, 2018 2:39 PM To: sec...@ietf.org

Re: [Uta] Updated TLSRPT (WGLC Comments)

2018-03-05 Thread Brotman, Alexander
r 4, 2018, at 1:47 PM, Brotman, Alexander > wrote: > > Hello folks, > > We used the feedback from folks during the WGLC and have submitted a new > version. This is mostly editorial changes or minor inconsistencies. We did > also remove any relation between the TLS-

[Uta] Updated TLSRPT (WGLC Comments)

2018-03-04 Thread Brotman, Alexander
Hello folks, We used the feedback from folks during the WGLC and have submitted a new version. This is mostly editorial changes or minor inconsistencies. We did also remove any relation between the TLS-Report-Submitter and the filename. If you have any comments, please let us know. Thank yo

[Uta] TLSRPT Update

2018-02-19 Thread Brotman, Alexander
Hello folks, We just updated TLSRPT and welcome comments. The changes mostly reflect comments from Viktor and others around the Content-Type. - Altered policy report section to be JSON strings - Content-Type changes to match comments from UTA mailing list - Added receiving IP Thank you for any

Re: [Uta] Updated TLSRPT

2018-02-05 Thread Brotman, Alexander
Sorry for the late response folks, last week was fairly busy. I'll work with Viktor to resolve the remaining changes, and discuss the Content-Type with Alexey. -- Alex Brotman Sr. Engineer, Anti-Abuse Comcast -Original Message- From: Uta [mailto:uta-boun...@ietf.org] On Behalf Of Vikto

[Uta] Updated TLSRPT

2018-01-26 Thread Brotman, Alexander
Hello, We uploaded a new version of the TLSRPT a few moments ago. The majority of the changes are meant to address comments submitted by Viktor Dukhovni (https://www.ietf.org/mail-archive/web/uta/current/msg02388.html). A rough list of changes: - Update to mime type - Add dnssec-required - T

Re: [Uta] TLSRPT further comments

2017-12-07 Thread Brotman, Alexander
To reference the other message, we'll change that reference for DANE. I'll try to respond in-line for this one. -- Alex Brotman Sr. Engineer, Anti-Abuse Comcast -Original Message- From: Uta [mailto:uta-boun...@ietf.org] On Behalf Of Viktor Dukhovni Sent: Tuesday, December 05, 2017 11:14

[Uta] Updated MTA-STS & TLSRPT

2017-11-10 Thread Brotman, Alexander
Hello folks, These two drafts were uploaded last night, and we'd like any feedback. For the MTA-STS, there are changes relating to SNI, minimum TLS version, and reverse proxy language. There are also some minor nits that were resolved. For TLSRPT, we added some language about DoS attacks, om

Re: [Uta] Updated MTA-STS & TLSRPT

2017-10-09 Thread Brotman, Alexander
iktor Dukhovni Sent: Monday, October 09, 2017 3:55 PM To: uta@ietf.org Subject: Re: [Uta] Updated MTA-STS & TLSRPT On Mon, Oct 09, 2017 at 06:24:36PM +, Brotman, Alexander wrote: > Do we think we really need to allow caching? From what are we trying > to protect the backend systems?

Re: [Uta] Updated MTA-STS & TLSRPT

2017-10-09 Thread Brotman, Alexander
Do we think we really need to allow caching? From what are we trying to protect the backend systems? Feels like it would be easier to disallow caching (or recommend against). I understand the sense that a smaller company could be overwhelmed by an attacker or ill-configured legit sender, but

Re: [Uta] Updated MTA-STS & TLSRPT

2017-10-02 Thread Brotman, Alexander
g the STS policy (which was a JSON body itself, which no longer is the case). -- Alex Brotman Sr. Engineer, Anti-Abuse Comcast -Original Message- From: James Cloos [mailto:cl...@jhcloos.com] Sent: Friday, September 29, 2017 2:54 PM To: Brotman, Alexander Cc: uta@ietf.org Subject: Re:

[Uta] Updated MTA-STS & TLSRPT

2017-09-28 Thread Brotman, Alexander
Folks, We've just uploaded new revisions for the drafts mentioned above. Not a ton of changes, but wanted to share with the group. MTA-STS: Added Policy Delegation and a few other clarifications TLSRPT: Changed the domains associated with reporting, added examples for policy-strings, and adde

Re: [Uta] 302 redirects (was "MTA-STS and HTTP cache control")

2017-09-05 Thread Brotman, Alexander
Quick conversation with some DNS folks, and they say that we can publish a TXT record at the apex of a delegated sub-domain. CNAMEs would not be allowed, but A/TXT should be okay. -- Alex Brotman Sr. Engineer, Anti-Abuse Comcast From: Uta [mailto:uta-boun...@ietf.org] On Behalf Of Daniel Margo

[Uta] New Drafts: MTA-STS & TLSRPT

2017-09-05 Thread Brotman, Alexander
Hello folks, The biggest change of these two is the addition of the "none" policy for the MTA-STS and the description of how to deactivate an existing policy. There are a few smaller items such as language for lengthy TXT records. There is also now a short section in TLSRPT about the HTTPS re

[Uta] New revisions: MTA-STS & TLSRPT

2017-08-15 Thread Brotman, Alexander
Hello folks, We just uploaded new versions of these drafts. For MTA-STS, the major change is the K/V is now in the main tree, and some ABNF cleanups. We're still working on incorporating some feedback from late last week. For TLSRPT, we've tried to incorporate feedback from the group. We al

Re: [Uta] WGLC on draft-ietf-uta-smtp-tlsrpt-06

2017-08-09 Thread Brotman, Alexander
Jim, To be clear, you'd like to remove the headers (5.3) and filename (5.1) sections, and have all the filtering based solely on the subject that is specified in 5.3? And relating to "draft-ietf-dnsop-attrleaf", could you clarify that a bit? Are you asking me to request an alteration of the a

[Uta] Updated TLSRPT Draft (v07)

2017-07-31 Thread Brotman, Alexander
Hello Folks, We attempted to incorporate the feedback from Alexey and Chris as best we could, and we believe we have addressed each of their concerns either via the updated draft or via the mailing list. The period for the WGLC is nearly over, and we wanted to try to provide an interim/updated

Re: [Uta] MTA-STS: A Key-Value Alternative

2017-07-17 Thread Brotman, Alexander
or similar) so that we don’t need to do this. -- Alex Brotman Sr. Engineer, Anti-Abuse Comcast x5364 From: David Illsley [mailto:davidills...@gmail.com] Sent: Monday, July 17, 2017 3:37 PM To: Brotman, Alexander Cc: uta@ietf.org Subject: Re: [Uta] MTA-STS: A Key-Value Alternative Is there a

[Uta] MTA-STS: A Key-Value Alternative

2017-07-17 Thread Brotman, Alexander
Hello, The authors of the MTA-STS draft and the UTA group have been attempting to reach a consensus on the issue of JSON versus KV for the policy file that is served via HTTPS. In order to attempt to get over that issue, we've made a rough draft[1] that now uses key-value pairs instead of JSO

[Uta] Updated MTA-STS Draft

2017-06-29 Thread Brotman, Alexander
All, A new draft for MTA-STS has been submitted. The changes include some wording relating to Certificate Validation, and IANA Registry sections. There is also some discussion on the list about the JSON/KV subject. We are looking forward to feedback regarding the previous items. Thank you.

Re: [Uta] AD review of draft-ietf-uta-smtp-tlsrpt-06.txt

2017-06-28 Thread Brotman, Alexander
We believe so. We'd like to gather as many comments as possible to go with Alexey's and bundle those up, and hopefully finalize this. -- Alex Brotman Sr. Engineer, Anti-Abuse Comcast x5364 -Original Message- From: Uta [mailto:uta-boun...@ietf.org] On Behalf Of Leif Johansson Sent: Wedn

Re: [Uta] AD review of draft-ietf-uta-smtp-tlsrpt-06.txt

2017-06-28 Thread Brotman, Alexander
Most of these seem reasonable, and we'll get to work sorting them out. The only question I have is relating to: -- o "policy-type": The type of policy that was applied by the sending domain. Presently, the only three valid choices are "tlsa", "sts", and the litera

[Uta] Updated MTA-STS and TLSRPT drafts

2017-05-31 Thread Brotman, Alexander
Hello, We just uploaded new revisions of the MTA-STS and TLSRPT. We made some minor clarifications in MTA-STS. For the TLSRPT we created a new content-type to define the tlsrpt data, which should make the processing a bit easier. We do still need to create some of the IANA sections, and we'l

[Uta] Updated MTA-STS & TLSRPT Drafts

2017-05-04 Thread Brotman, Alexander
Hello folks, A fair bit of these updates were cleanup for various smaller items. Some changes to the pseudocode, clearing language around cached policies, and addressing many of the items Alexey had noted. We still have a few of Alexey's notes to go over in the near future, as well as the IAN

Re: [Uta] mtp-tlsrpt-04 review

2017-04-07 Thread Brotman, Alexander
lsrpt-04 review On 06/04/17 14:17, Brotman, Alexander wrote: > In section 4, it mentions the Policy section should include the domain for > which the policy was applied. I can add another reference in Section 3 if > that's preferred. The point I'm trying to make is that the ge

Re: [Uta] mtp-tlsrpt-04 review

2017-04-06 Thread Brotman, Alexander
In section 4, it mentions the Policy section should include the domain for which the policy was applied. I can add another reference in Section 3 if that's preferred. We can add an explicit CNAME mention. With regard to the JSON policy (though that's STS, not TLSRPT). It's a small file, whi

[Uta] Updated MTA-STS & TLSRPT Drafts

2017-04-05 Thread Brotman, Alexander
Hello, I meant to send these yesterday, but got sidetracked with some things at the office, as well as a rather long meeting. Probably the biggest alteration is that we altered both to utilize the SAN instead of the CN for hostname/policy validation. We made several clarifications, and update

[Uta] Updated drafts for MTA-STS & TLSRPT

2017-02-15 Thread Brotman, Alexander
Folks, We uploaded new revisions for MTA-STS and TLSRPT. There are minor changes to each: 1) Remove the "_" from DNS records to be consistent with A/ records used with the HTTPS retrieval, and make this a bit less confusing for deployments. We did this for both MTA-STS and TLSRPT. 2) Cla

Re: [Uta] draft-brotman-smtp-tlsrpt

2016-05-01 Thread Brotman, Alexander
If a system is misbehaving in some way that causes TLS problems, it may be malfunctioning in other ways that would prevent reports from making it to the appropriate place. It might be useful to get that new command (QUIT does not take an optional parameter that I'm aware) to indicate to the rec

Re: [Uta] draft-brotman-mta-sts/

2016-05-01 Thread Brotman, Alexander
>From what I know of my organization, it would be easier to create a separate >hostname (policy._mta_sts.comcast.net) than to get some content served by the >main domain's realm (comcast.net/foo/bar/sts-policy). I'm not saying it can't >be done, just that I interact often with the DNS group I w

[Uta] Updated SMTP STS Draft

2016-04-25 Thread Brotman, Alexander
Hello, We've incorporated much of the feedback we've received from the community, and would like to present updated drafts. * One of the most evident changes is that we've split the draft into two separate documents; one for the STS policy, and one for the TLS reporting. These are meant to r

Re: [Uta] Dealing with STARTTLS Stripping

2015-12-09 Thread Brotman, Alexander
so that others can easily follow along. -- Alex Brotman Engineer, Anti-Abuse Comcast x5364 -Original Message- From: Aaron Zauner [mailto:a...@azet.org] Sent: Friday, December 04, 2015 5:56 PM To: Brotman, Alexander Cc: uta@ietf.org Subject: Re: [Uta] Dealing with STARTTLS Stripping

Re: [Uta] Dealing with STARTTLS Stripping

2015-12-04 Thread Brotman, Alexander
Aaron, There's a group of folks from M3AAWG that are working toward a sort of mechanism for SMTP, roughly using some ideas relating to HSTS and/or certificate transparency. The idea being that you would specify a published policy where a sender can see that you expect that sessions will be enc