DANE for SMTP. Viktor Dukhovni & Wes Hardaker. IETF 87, Berlin July 2013



Similar documents
DANE Secured Demonstration. Wes Hardaker Parsons

One year of DANE Tales and Lessons Learned. sys4.de

The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.

Configuring an External Domain

Encryption of Traffic

Unifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Gateway

A Step-by-Step guide for implementing DANE with a Proof of Concept

Instructions Microsoft Outlook Express Page 1

Introduction to the DANE Protocol

Encryption. Administrator Guide

CipherMail Gateway Quick Setup Guide

DNSSEC Applying cryptography to the Domain Name System

Configuration Network Management Card-2

DNSSEC - Why Network Operators Should Care And How To Accelerate Deployment

Next Steps In Accelerating DNSSEC Deployment

IETF DPRIVE WG: Encrypting DNS

A D M I N I S T R A T O R V 1. 0

Internet Security [1] VU Engin Kirda

March PGP White Paper. Transport Layer Security (TLS) & Encryption: Complementary Security Tools

Neither Snow Nor Rain Nor MITM... An Empirical Analysis of Delivery Security

BREAKING HTTPS WITH BGP HIJACKING. Artyom Gavrichenkov R&D Team Lead, Qrator Labs

Emacs SMTP Library. An Emacs package for sending mail via SMTP. Simon Josefsson, Alex Schroeder

Computer Networks - CS132/EECS148 - Spring

Securing End-to-End Internet communications using DANE protocol

Transport server data paths

How to Configure the Windows DNS Server

A quick overview of the DANE WG. * DNS-based Authentication of Named Entities

Part 5 DNS Security. SAST01 An Introduction to Information Security Martin Hell Department of Electrical and Information Technology

Configuring Security for SMTP Traffic

Mail agents. Introduction to Internet Mail. Message format (2) Authenticating senders

Talk-101 User Guide. DNSGate

SSL and Browsers: The Pillars of Broken Security

JAVAMAIL API - SMTP SERVERS

The Use of DNS Resource Records

1. Open the preferences screen by opening the Mail menu and selecting Preferences...

The Domain Name System from a security point of view

Apache Security with SSL Using Ubuntu

Setting up Microsoft Office 365

Internet Standards. Sam Silberman, Constant Contact

Using WinGate 6 . Concepts, Features, and Configurations.

Using TLS Encryption with Microsoft Outlook 2007

Migration Quick Reference Guide for Administrators

Copyright

Scan Report Executive Summary. Part 2. Component Compliance Summary IP Address :

Configuring a Domain to work with your Server

Setting Up Sharp MX-Color Imagers To Scan To

Set up Outlook for your new student e mail with IMAP/POP3 settings

Analyzing DANE's Response to Known DNSsec Vulnerabilities

Outlook Express. Make Changes in Red: Open up Outlook Express. From the Menu Bar. Tools to Accounts - Click on Mail Tab.

Celframe - Easy Linux - Lesson 8 - Server

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Instructions Android Smartphone & Tablet Page 1

Deploying DNSSEC: From End-Customer To Content

Erado Archiving & Setup Instruction Microsoft Exchange 2010 Push Journaling

. Daniel Zappala. CS 460 Computer Networking Brigham Young University

How to set up the Integrated DNS Server for Inbound Load Balancing

DNS at NLnet Labs. Matthijs Mekking

Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce. Domain Name System

Guardian Digital Secure Mail Suite Quick Start Guide

Understanding Secure Shell Host Keys

Local DNS Attack Lab. 1 Lab Overview. 2 Lab Environment. SEED Labs Local DNS Attack Lab 1

Basic Exchange Setup Guide

T.38 fax transmission over Internet Security FAQ

Switching Your DNS WiredTree

SMTPSWITCH MAILER V6 FEATURES

Mail Server Scenarios and Configurations

FaxCore Ev5 -To-Fax Setup Guide

Digital certificates and SSL

Securing DNS Infrastructure Using DNSSEC

Exchange 2007/2010 Journaling for Cryoserver

Technical Note. ISP Protection against BlackListing. FORTIMAIL Deployment for Outbound Spam Filtering. Rev 2.2

Acano solution. Third Party Call Control Guide. March E

OpenSRS Service DNS Configuration Guide

Setting up Microsoft Office 365

Migration Project Plan for Cisco Cloud Security

How to use ArGoSoft Mail Server.NET Freeware

Cisco TelePresence Video Communication Server Basic Configuration (Control with Expressway)

Configuration Information

Mail system components. Electronic Mail MRA MUA MSA MAA. David Byers

SIP and VoIP 1 / 44. SIP and VoIP

Collateral Damage. Consequences of Spam and Virus Filtering for the System. Peter Eisentraut 22C3. credativ GmbH.

- Domain Name System -

Internal Server Names and IP Address Requirements for SSL:

IP Phone Presence Setup

Networking Domain Name System

Chapter 4 Virtual Private Networking

1. Open the preferences screen by opening the Mail menu and selecting Preferences...

Outlook Express. Make Changes in Red: Open up Outlook Express. From the Menu Bar. Tools to Accounts - Click on. User Information

TLS and SRTP for Skype Connect. Technical Datasheet

Position Paper: Security and Simplicity

Transcription:

DANE for SMTP Viktor Dukhovni & Wes Hardaker IETF 87, Berlin July 2013 1

Addresses in SMTP <mailbox@example.com> is security agnostic: SMTP with and without TLS runs over port 25 There is no URI scheme to designate SMTP vs. SMTPS STARTTLS is used to signal TLS support SMTP is multi-hop store & forward TLS is hop-by-hop SMTP addresses are NOT transport addresses Typical minimum number of hops is 3 Some may be protected, some may not MX RRs abstract hop destinations via DNS 2

Sending E-Mail Today MX Priority #1 Sender s MTA SMTP Exchange Email Author MX Priority #2 DNS Records 1. Sender transmits to their Mail Transfer Agent (MTA) 2. MTA uses the receiver s DNS MX records to find a destination MTA 3. The sender s MTA sends email to the receiver s MTA Receiver s MTA 3

Problem #1: Fake MX Records MX Priority #1 SMTP Exchange MX Priority #2 Up-To-No-Good Server Email Author Sender s MTA MX Priority #3 Plain DNS Records Maybe Delivers but May Not Unfortunately, it is possible to create fake MX records, allowing an attacker to pretend to be the right real destination. Receiver s MTA s 4

Solution #1: DNSSEC MX Priority #1 MX Priority #1 Up-To-No-Good Server Sender s MTA SMTP Exchange MX Priority #2 Email Author DNSSEC Protected Records DNSSEC ensures that only good DNS records are believable. Receiver s MTA s 5

Problem #2: Unprotected SMTP Eavesdropping Is Easy! MX Priority #1 Sender s MTA SMTP Exchange MX Priority #2 Email Author Most SMTP server to server exchanges are unencrypted. Receiver s MTA 6

Solution #2: TLS-Protected SMTP MX Priority #1 Sender s MTA SMTP Exchange MX Priority #2 Email Author SMTP can run over encrypted TLS, but: Few servers do Management of CA Trust Anchors is hard MTA software doesn't distribute TAs Receiver s MTA 7

Problem #3: SMTP Man-in-the-Middle I don t speak TLS, sorry! Email Author Sender s MTA Up-To-No-Good Server SMTP over TLS uses the STARTTLS command Man-in-the-middle allows for I don t support STARTTLS Current policy is to deliver unencrypted if TLS is unavailable Receiver s MTA 8

Solution #3: SMTP over TLS with DANE MX Priority #1 Sender s ISP SMTP Exchange MX Priority #2 Email Author A DANE record indicates you MUST use TLS! Receiver s ISP 9

TLS and SMTP Summary MX/A... RRsets are insecure without DNSSEC Sender does not know when or how to use TLS Except via administrative policy There is no user to click OK Security must just work With no MUST use signal, fallback to no-tls STARTTLS allows for MITM downgrade attack 10

DANE and SMTP With DNSSEC and DANE we can: Harden MX lookup via DNSSEC Provide downgrade-resistant TLS support Publish authentication public key digests (or keys) Incremental adoption, without bilateral coordination! It turns on automatically when both sides support it 11

DANE and SMTP SMTP TLS security depends on DNSSEC If DNSSEC is broken, all bets are off CAs and TLS alone fail to secure the transport Usage 0 has same DNSSEC exposure as usage 2 Usage 1 has same DNSSEC exposure as usage 3 Some MTAs (Exim and Postfix) have stated: they may map 0 2 and 1 3 Will have empty CA lists by default 12

SMTP Referral Choices Host SMTP yourself Good: MX to your own internal name Ehhh: No MX: CNAME to your mail host (legal) Outsource SMTP service Good: MX exchange name to their name Ehhh: No MX: Use CNAMEs (legal but discouraged) Bad: Copy their A and TLSA records to your zone (and point MX to your copies) Don't do this anywhere (illegal): Ugly: MX records point to a CNAME 13

SMTP hosting example Easy example - MX to the outsourced name: In client.com's zone: client.com. In provider.com's zone: IN MX 1 mx1.provider.com. mx1.provider.com. IN A. _25._tcp.mx1.provider.com. IN TLSA SNI: uses mx1.provider.com. Only a single certificate is needed (for mx1.provider.com ) 14

TLSA records and MX records MX exchange name TLSA base domain This is the TLS transport end-point Certificate peername: SHOULD be the TLSA base name MAY be the domain of the email address or configured transport domain The provider publishes the TLSA record for their keys The client simply points and doesn't publish data SNI not essential to support multiple client domains Operational guidance: Use MX records this way! 15

DANE SMTP Model Summary Opportunistic and downgrade-resistant No interactive user: reliability must be paramount Trusts DNSSEC Recommends type 3 and then 2 Type 0 and 1 usage are undefined and SHOULD NOT be used Certificate chains MUST include the TA 16

What To Do With This Work? Merge content with draft-ietf-dane-smtp? Publish different components separately? 17

Extra Slides

PKIX and SMTP Handy for bilateral secure-channels Manually configured TLS expectation policies and keys Explicit TLS requirement not dependent on competence of remote DNS operator Explicit sender choice of (agreed upon) CA(s) No bleeding edge code, tested TLS PKI. However fragile when peer switches MX providers, CAs, etc. without notice. Only viable for peer sites willing to coordinate infrastructure changes with sender! 19

SMTP Hosting With CNAMEs RFC 5321 Section 5.1: If a CNAME record is found, the resulting name is processed as if it were the initial name. Many domains are MX-hosted by outside providers. Almost always via MX RRs CNAMEs are an edge case: bob@some-cname.example.com is rare mail.example.com IN MX 1 cname.example.com is illegal Transport mappings, however, use CNAMEs My server directly maps example.com to smtp.example.net 20

SMTP hosting via MX CNAME (illegal) MTAs may support RFC non-conformant CNAMEs in MX hostnames. Example, MX host a CNAME in provider's zone: In client.com's zone: client.com. IN MX 1 mx1.provider.com In provider.com's zone: mx1.provider.com. IN CNAME realmx.provider.com. realmx.provider.com. IN A 192.0.2.1 _25._tcp.realmx.provider.com. IN TLSA Works with TLSA RR at either MX exchange name Or CNAME target if MTA and DNS operator agree. 21

SMTP hosting via MX CNAME (illegal) Example, MX host a CNAME in client's zone: In client.com's zone: client.com. IN MX 1 mx.client.com. mx.client.com IN CNAME mx.provider.com. _25._tcp.mx.client.com. IN TLSA ; (case I) In provider.com's zone: mx.provider.com. IN A 192.0.2.1 _25._tcp.mx.provider.com. IN TLSA Case I (looking for a TLSA before CNAME expansion) problematic: Provider must use a per-client certificate to match each client's MX base domain. TLSA record must be copied/tracked from provider's server(s). Case II (looking for a TLSA record after CNAME expansion): works just fine if MTA chases CNAMEs on MX records. Proposal: MTAs must chase CNAMEs to determine TLSA base name. ; (case II) 22

DNS and SMTP DNS trust unavoidable Only place to store hop-by-hop security requirements TLS Peername checks must trust the DNS (they're pulling the peername from the MX record) Without DNSSEC: Spoofable MX records Downgrade vulnerable TLS No authentication 23

SMTP hosting and IP copying Harder example - MX points to an internal name: In client.example.com's zone: client.com. IN MX 1 intmx.client.com. ; data copied from provider's records: intmx.client.com. IN A 192.0.2.1 ; provider's address _25._tcp.intmx.client.com. IN TLSA Requires client copy outsource data Bad practice for A records Bad practice for TLSA records SNI scaling issues with large # of certificates Operational Guidance: Don't do this 24