[Last-Call] Re: [Emailcore] Re: Re: Re: Last Call: <draft-ietf-emailcore-rfc5321bis-42.txt> (Simple Mail Transfer Protocol) to Internet Standard

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




--On Saturday, March 29, 2025 12:32 +0100 Francesco Gennai
<francesco.gennai@xxxxxxxxx> wrote:

> On Sat, Mar 29, 2025 at 3:27 AM Viktor Dukhovni
> <ietf-dane@xxxxxxxxxxxx> wrote:
> 
>> On Fri, Mar 28, 2025 at 06:21:01PM -0700, Rob Sayre wrote:
>> 
>> > I propose deleting this section entirely:
>> > 
>> > 
>> https://datatracker.ietf.org/doc/html/draft-ietf-emailcore-rfc5321
>> bis-42#section-7.1
>> > 
>> > The AS covers it well, and I do understand the desire not to put
>> > some transient specs in this document.
>> > 
>> > Look at the first part: "The authenticity of SMTP mail is
>> > inherently insecure".
>> 
>> If it is possible to reach consensus on a more modest/concise
>> version of 7.1, I would not be opposed, provided:
>> 
>>     - The benefit justifies an effort to reach such consensus.
>>     - Such a simplification is in scope for the document update.
>> 
>> Minimal replacement text to refine could be:
>> 
>>     Authentication of message origin and content lies outside the
>>     scope of the core SMTP protocol specified in this document.
>>     In general one cannot assume that the envelope sender address,
>>     "From:", "Sender:" or other headers are not forged, that the
>>     message is not a replay, or that it has not been materially
>>     modified in transit.
>> 
>>     Various extensions of the SMTP protocol and/or message
>>     structure offer partial mitigations of the above risks, but no
>>     holistic scalable solution has yet been developed.
>> 
>> But it is not clear that expending the effort to reach consensus
>> is in scope or justified.
>> 
> 
> Trying to reach consensus with a minimal change, could DKIM be cited
> in this paragraph? (always from section 7.1):
> 
>    Various protocol extensions and configuration options that
> provide    authentication at the transport level (e.g., from an
> SMTP client to    an SMTP server) improve somewhat on the
> traditional situation    described above.  However, in general,
> they only authenticate one    server to another rather than a chain
> of relays and servers, much    less authenticating users or user
> machines.  Consequently, unless    they are accompanied by careful
> handoffs of responsibility in a    carefully designed trust
> environment, they remain inherently weaker    than end-to-end
> mechanisms that use digitally signed messages rather    than
> depending on the integrity of the transport system.
> 
>   for example:
> 
>    Various protocol extensions and configuration options that
> provide    authentication at the transport level (e.g., DKIM
> [RFC6376]) improve    somewhat on the traditional situation
> described above.  However, in    general, they only authenticate
> one server to another rather than a    chain of relays and servers,
> much less authenticating users or user    machines.
>    .. . ..

Francesco,

Let me see if I can explain what the problem --both with your very
thoughtful suggestion and some others I think are, at best, less
complete -- looks like from my point of view.   The sentence without
the specific reference is clearly hand waving, but that is probably
ok precisely because it does not point to any particular spec.  Per
my earlier exchange with ekr, if we do cite DKIM, we have some
obligation to explain what "authenticate" means because what DKIM
does is not what most of the email community (implementers and users)
have traditionally meant by that term.  And, as soon as we start
explaining that, we are not adding a few words but starting down the
slippery slope of explaining DKIM and its limitations.  We could do
some of that by pointing to specific sections of the current DKIM
document and citing draft-gondwana-dkim2-motivation, but that runs
into the difficulty of a document that we expect to be very stable
over a long period of time (rfc5321bis) citing documents that are in
flux.

In principle, we could cite DKIM in more or less the fashion you
suggest and point people to the A/S for a more complete explanation.
However, there seems to be little agreement so far about what such an
explanation should be.  If the reference to the A/S were still
informative, I/we could probably devise some text to the effect of
"that document is expected to include...", but long-standing
principles about stability of references materials (and, arguably,
common sense) prevent doing that with a normative reference.


> Off topic respect to this discussion:
> 
> I noticed that the original paragraph states:
> 
>   Various protocol extensions and configuration options that provide
>   authentication at the transport level
>   ***>  (e.g., from an SMTP client to an SMTP server)
>   improve somewhat on the traditional situation
>   described above.
> 
>   However, in general,
>   ***> they only authenticate one server to another
>   rather than a chain of relays and servers
> 
> client-server in the example then
>    "they only authenticate one server to another
> that does not sound perfectly aligned.

Good catch.  The source of the problem is that we've got some of
those extensions that help assure a client that it is talking to the
right server and others (or variations on the same ones) that try to
assure servers about the legitimacy or authenticity or the client or
the incoming message.  Speaking as author/editor, if we can agree
that this is an editorial problem, rather than a substantive one for
which specific consensus is needed, I'll try to figure out how to
adjust the wording without making it much more complicated.   If we
cannot reach that agreement, it is not clear to me that an
improvement is worth further holding up the document (and, at least
indirectly, progress on the A/S) for another round of Last Calls and
impassioned discussions.

thanks,
   john

-- 
last-call mailing list -- last-call@xxxxxxxx
To unsubscribe send an email to last-call-leave@xxxxxxxx




[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux