Um, port25 has nice tee shirts but it isn't open source.

I never said it was? I'm aware it's a closed-source product. And it's quite good - I've been using it extensively in the past. Though their devs. were very cooperative and reversing *would* have been easy given we got debug symbols for their binaries,.. :x

There's a bottle of wine in my fridge that the head of development at port25 gave me. He's very nice, and very competent, but he's also very busy. The last time I talked to him he was working on EAI, and I gather there's a long list of other stuff to add and improve. We could probably get STS reporting on the list, and on the similar lists for MDaemon and Communigate and Openwave and Momentum, but by the time it's written, tested, packaged, shipped, and the customers put it into their installation schedules, it'll be at least a couple of years. That's why "ask your favorite distro to update" isn't going to work any time soon in the places that matter.

My original point which I thought, perhaps wrongly, was obvious, is that all of these MTAs already have TLS support, so if we define a way to receive failure reports that doesn't need MTA changes, they can start collecting reports now and fixing their configuration errors. Our experience with DMARC is that at for the first year, hardly anyone but Google and Yahoo were sending reports, but since they handle so much mail to everyone else, if you published a DMARC record and started collecting reports, you'd find out a lot about your mail configuration, and invariably learn about configuration mistakes you could just fix.

We really need a threat model beyond "someone might be spying on me."

Sorry, but I completely disagree. Because "someone" *is* spying on all of us! 
It's called full-take and they do it in real-time. Have you been reading the news since 
June 2013?

Of course there's lots of spying, but I hope we all remember the maxim never to attribute to evil what can be explained by incompetence. For every TLS session broken by malicious spying, there will be many more broken by misconfigured TLS in the MTA, or a firewall in the wrong place, or any of the other reasons we all know. The sooner people can start collecting info about the failures, the sooner they can start fixing the screwups that cause them.

I'm not saying we should ignore malicious MITM, but I also think that anyone smart enough to do MITM is likely to be smart enough to defeat whatever reporting we invent if they care enough to do so, or in places like Tunisia where everyone uses one or two state-controlled ISPs, prevent users from circumventing MITM even when they're aware of it.

So we should try and understand what are the reasons that TLS fails, and start with approaches that can address the most common ones.

Regards,
John Levine, [email protected], Taughannock Networks, Trumansburg NY
Please consider the environment before reading this e-mail.

_______________________________________________
Uta mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/uta

Reply via email to