> On Oct 23, 2017, at 4:56 PM, Ivan Ristic <[email protected]> wrote:
> 
> Correct me if I am wrong, but at present no one checks if presented SMTP 
> certificates are valid. In fact, a major reason we need MTA-STS is to make a 
> clean start. You're not going to get the real-world data you're looking for 
> because why would anyone bother when all certificates are being ignored, and 
> MTAs downgrade to plaintext anyway.
> 
> SNI was not in SSL 3.0 and TLS 1.0 because back then there was no need for 
> it. And now, 20+ years, we have this:
> 
>     
> https://developer.akamai.com/blog/2017/10/20/encrypting-web-need-support-tls-sni-remaining-clients/
> 
> The real question is how shall we protect email 20+ years from now. And, if 
> SNI is not mandated now, what hoops shall we have to go through to make 
> things right :)
> 
> Thus, my view is that MTA-STS should be a clean and robust protocol, designed 
> learning from mistakes of the past.

These are generalities that ignore the specific issues at hand.
If we conclude that there's no need for virtual-hosting of TLS
(multiple chains at the same transport endpoint) with MTA-to-MTA
SMTP, then there's demonstrably no need for SNI, no matter how
much goodness it brings to the Web.

I still see no discussion of the use-cases that do or not motivate
the need for TLS virtual hosting with MTA-to-MTA (port 25) SMTP.
Let's not waste time on vague generalities.

Carping on TLS security in SMTP counter-productive, SMTP encrypts
a larger fraction of its traffic than the web does, precisely
because it is opportunistic.  Setting the bar too high can often
reduce overall security, RFC7435 is pertinent here.

-- 
        Viktor.

_______________________________________________
Uta mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/uta

Reply via email to