> On Oct 23, 2018, at 5:05 PM, Jim Fenton <[email protected]> wrote:
> 
>> And yet, my preference would have been to not take this approach.
>> Rather each domain that wants to support "REQUIRETLS=YES", would
>> need to implement MTA-STS or DANE.  If they already have a signed
>> MX RRset, they could often just add TLSA records and have DANE for
>> little extra effort.
>> 
>> The "fly in the ointment" is that many domains are signed, but their
>> MX providers are not, and so they would then have to implement
>> MTA-STS, just to benefit from protection against MX record forgery
>> that they already have by virtue of DNSSEC.
> 
> Let's think about that case more. If the mailbox domain is DNSSEC-signed (so 
> we got the right MX host), shouldn't it be sufficient for the mail server to 
> authenticate itself with a certificate that chains up to a trusted CA? I 
> don't see why MTA-STS is needed in this case.

You've missed my point, we're in agreement.  What I was saying was
that *without* your proposal to let DNSSEC suffice, in the absence
of DANE for the hosting provider's MX host (if the MX host is in-house
the domain could easily also deploy DANE) a signed domain would then
need MTA-STS, but that's a silly requirement, because it just poorly
adds back what the domain already has, namely protection against MX
forgery.

-- 
        Viktor.

_______________________________________________
Uta mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/uta

Reply via email to