SlideShare a Scribd company logo
© Men & Mice http://menandmice.com
email transport security
MTA-STS vs. DANE
1
© Men & Mice http://menandmice.com 

© ISC http://www.isc.org
Agenda
1. Recap: the problem with Mail Transport Security
2. SMTP MTA Strict Transport Security (MTA-STS)
3. SMTP Security via Opportunistic DNS-Based
Authentication of Named Entities (DANE)
Transport Layer Security (TLS)
4. SMTP TLS Reporting
2
© Men & Mice http://menandmice.com
the problem with email
transport security
3
© Men & Mice http://menandmice.com
Short recap
we've discussed email transport security before
see previous Webinar – "DNSSEC & DANE – E-Mail
security reloaded" (link below) for details
so here just a short recap …
4
https://www.menandmice.com/resources/webinar-dnssec-and-dane-e-mail-security/
© Men & Mice http://menandmice.com
Transport Encryption
Example of a protocol (HTTP/HTTPS) using a
dedicated port und URI for encrypted
communication
5
Port 80 - unencrypted
Port 443 - encrypted
© Men & Mice http://menandmice.com
Transport Encryption
SMTP (email) uses in-protocol signalling to
bootstrap encryption. The signalling is unsecured
and can be intercepted
6
Port 25 - unencrypted
Greeting - unencrypted
Greeting - unencrypted
Feature-List - unencrypted
Request encryption - unencrypted
Greeting - encrypted
© Men & Mice http://menandmice.com
STARTTLS interception
7
https://www.eff.org/de/deeplinks/2014/11/starttls-downgrade-attacks
https://arstechnica.com/security/2015/10/dont-count-on-starttls-to-automatically-encrypt-your-sensitive-e-mails/
https://blog.filippo.io/the-sad-state-of-smtp-encryption/
© Men & Mice http://menandmice.com
STARTTLS weakness
the core problem:
the receiving side cannot communicate its encryption
policy
the sending side cannot infer the encryption policy, it
need to guess
solutions available/worked on in the IETF:
SMTP MTA Strict Transport Security (MTA-STS)
SMTP with DANE (MTA-DANE)
8
© Men & Mice http://menandmice.com
SMTP MTA Strict Transport
Security (MTA-STS)
draft-ietf-uta-mta-sts
9
© Men & Mice http://menandmice.com
MTA-STS
MTA-STS 

(Message-Transfer-Agent Strict-Transport-Security)
a mail receiving domain publishes its encryption
policy
•via a TXT record in DNS
•plus a JSON document on an TLS secured web-server
10
draft-ietf-uta-mta-sts
https://tools.ietf.org/html/draft-ietf-uta-mta-sts
© Men & Mice http://menandmice.com
MTA-STS for "example.com"
the administrator of the domain "example.com" will
publish a TXT-record
at the "well-known" sub-domain "_mta-sts"
containing the version number of this domains mail-
transport encryption policy
use of DNSSEC is recommended
11
_mta-sts.example.com. 900 IN TXT "v=STSv1; id=20170411;"
MTA-STS
version
encryption
policy
version
© Men & Mice http://menandmice.com
MTA-STS for "example.com"
the administrator of the domain "example.com" will
also
publish a JSON document
at the "well-known" sub-domain "mta-sts" and the
path ".well-known/mta-sts.json"
12
https://mta-sts.example.com/.well-known/mta-sts.json
TLS secured
path to
JSON
document
mta-sts
domain
© Men & Mice http://menandmice.com
MTA-STS for "example.com"
example content of the JSON document
13
{
"version": "STSv1",
"mode": "enforce",
"mx": [".mail.example.com"],
"max_age": 123456
}
MTA-STS
version
"enforce" or
"report"
Common Name
or Subject
Alternative Name
DNS-ID present in
the X.509
certificate
presented by any
MX receiving mail
for this domain
max
lifetime of
the policy
© Men & Mice http://menandmice.com
MTA-STS
14
sending
MTA
sending
MUA
DNS(SEC)
resolver
auth
DNS
receiving
MTA
policy
webserver
sendingdomain
receivingdomain
Internet
© Men & Mice http://menandmice.com
MTA-STS
15
sending
MTA
sending
MUA
DNS(SEC)
resolver
auth
DNS
receiving
MTA
policy
webserver
mail
delivered to
MTA
© Men & Mice http://menandmice.com
MTA-STS
16
sending
MTA
sending
MUA
DNS(SEC)
resolver
auth
DNS
receiving
MTA
policy
webserver
checks
policy
cache
© Men & Mice http://menandmice.com
MTA-STS
17
sending
MTA
sending
MUA
DNS(SEC)
resolver
auth
DNS
receiving
MTA
policy
webserver
request
mta-sts TXT
record in
DNS
_mta-sts.example.com. TXT ?
_mta-sts.example.com. 900 IN TXT "v=STSv1; id=20170411;"
© Men & Mice http://menandmice.com
MTA-STS
18
sending
MTA
sending
MUA
DNS(SEC)
resolver
auth
DNS
receiving
MTA
policy
webserver
request
JSON policy
from web
server
https://mta-sts.example.com/.well-known/mta-sts.json
verify TLS
x509
security
store policy
in cache
© Men & Mice http://menandmice.com
MTA-STS
19
sending
MTA
sending
MUA
DNS(SEC)
resolver
auth
DNS
receiving
MTA
policy
webserver
STARTTLS
SMTP
session
validate x509
certificate
against policy
© Men & Mice http://menandmice.com
MTA-STS
20
sending
MTA
sending
MUA
DNS(SEC)
resolver
auth
DNS
receiving
MTA
policy
webserver
deliver mail
© Men & Mice http://menandmice.com
SMTP Security via Opportunistic DNS-
Based Authentication of Named Entities
(DANE) Transport Layer Security (TLS)
RFC 7672
21
© Men & Mice http://menandmice.com
MTA-DANE
SMTP with DANE signals the encryption policy of a
mail-server via DNSSEC secured DNS
the TLSA record holds the full certificate (or a hash
of the certificate) which can be verified against the
certificate presented by the receiving mail server
MTA-DANE is standardised in RFC 7672 (Oct 2015)
22
© Men & Mice http://menandmice.com
MTA-DANE
23
sending
MTA
sending
MUA
DNSSEC
resolver
auth
DNS
receiving
MTA
mail
delivered to
MTA
© Men & Mice http://menandmice.com
MTA-DANE
24
sending
MTA
sending
MUA
DNSSEC
resolver
auth
DNS
receiving
MTA
MTA
requests
TLSA record
_25._tcp.mail01.example.com. TLSA
_25._tcp.mail01.example.com. TLSA 3 1 1 (

BDC6A9F8312BF24C81D[..]387A147 )
validate
DNSSEC
chain of
trust
© Men & Mice http://menandmice.com
MTA-DANE
25
sending
MTA
sending
MUA
DNS(SEC)
resolver
auth
DNS
receiving
MTA
STARTTLS
SMTP
session
validate x509
certificate
against TLSA
cert/hash
© Men & Mice http://menandmice.com
MTA-DANE
26
sending
MTA
sending
MUA
DNS(SEC)
resolver
auth
DNS
receiving
MTA
deliver mail
© Men & Mice http://menandmice.com
DANE success stories
Cloudmark will support
MTA-DANE in the
upcoming release 5.2
Cloudmark has about
12% global market share
(20% of mobile
accounts) in the email
business
27
https://blog.cloudmark.com/2017/03/27/dane-and-email-security/
© Men & Mice http://menandmice.com
DANE success stories
large German mail
service provider
(web.de/gmx.de/1&1)
support MTA-DANE
over 50% market 

share in Germany
28
https://de.slideshare.net/GMX_Deutschland/e-mailstudie-2015-deutsche-anbieter-bevorzugt
https://www.heise.de/newsticker/meldung/Abhoersicherheit-Web-de-sichert-Mail-Transport-zusaetzlich-per-DANE-ab-3175333.html
© Men & Mice http://menandmice.com
DANE success stories
the Dutch government
requests MTA-DANE
from government
agencies
29
https://www.ncsc.nl/english/current-topics/news/ncsc-publishes-factsheet-secure-the-connections-of-mail-servers.html
© Men & Mice http://menandmice.com
DANE success stories
German "Federal Office
for Information Security"
requires MTA-DANE for
"secure e-mail"
certification
30
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Publikationen/TechnischeRichtlinien/TR03108/TR03108-1.pdf
© Men & Mice http://menandmice.com
Comparing 

MTA-STS vs. MTA-DANE
31
© Men & Mice http://menandmice.com
MTA-STS vs. MTA-DANE
MTA-STS does not require DNSSEC (but it is
recommended)
MTA-STS defines a policy cache
MTA-STS requires x509 certificates that validate against a
root-CA-certificate (no "self-signed" certs)
MTA-STS requires a HTTPS server to serve the policy
JSON document
MTA-STS requires validation of the HTTPS connection to
fetch the policy document
32
© Men & Mice http://menandmice.com
MTA-STS vs. MTA-DANE
MTA-DANE does require DNSSEC
MTA-DANE has no policy cache (but the TTL on TLSA
records can work as such)
MTA-DANE allows "self-signed" certificates
MTA-DANE policy can be changed by switching the TLSA-
record in DNS
MTA-DANE TLS-cert rollover need to be in sync with TLSA
record(s)
MTA-DANE relies on the trust on the DNSSEC chain
33
© Men & Mice http://menandmice.com
SMTP TLS Reporting
draft-ietf-uta-smtp-tlsrpt
34
© Men & Mice http://menandmice.com
SMTP TLS reporting
SMTP TLS reporting defines a protocol to signal a reporting channel about SMTP
encryption failures
the sending MTA can report issues with TLS encryption to the receiving MTA
operator
SMTP TLS reporting can be used with MTA-STS and MTA-DANE
Reports include:
•MITM attacks (certification mismatch)
•expired certificates
•server not answering
•certificate not validating against Root-CA
•…
35
https://tools.ietf.org/html/draft-ietf-uta-smtp-tlsrpt
© Men & Mice http://menandmice.com
SMTP TLS reporting
the administrator of a mail domain publishes the
reporting policy as a TXT-record in DNS
using the "well-known" subdomain "_smtp-tlsrpt"
inside the mail domain
Example (SMTP-Report):





Example (HTTP-Report):
36
https://tools.ietf.org/html/draft-ietf-uta-smtp-tlsrpt
_smtp-tlsrpt.example.com. IN TXT 
"v=TLSRPTv1;rua=mailto:reports@example.com"
_smtp-tlsrpt.example.com. IN TXT "v=TLSRPTv1; 
rua=https://reporting.example.com/v1/tlsrpt"
© Men & Mice http://menandmice.com
SMTP TLS reporting
37
sending
MTA
sending
MUA
DNS(SEC)
resolver
auth
DNS
receiving
MTA
STARTTLS
SMTP
session
x509 certificate
fails to validate
against TLSA
cert/hash
© Men & Mice http://menandmice.com
SMTP TLS reporting
38
sending
MTA
sending
MUA
DNS(SEC)
resolver
auth
DNS
receiving
MTA
MTA requests
_smtp-tlsrpt TXT
record
_smtp-tlsrpt.example.com. TXT
_smtp-tlsrpt.example.com. IN TXT 
"v=TLSRPTv1;rua=mailto:reports@example.com"
© Men & Mice http://menandmice.com
SMTP TLS reporting
39
sending
MTA
sending
MUA
DNS(SEC)
resolver
auth
DNS
receiving
MTA
deliver
report mail
© Men & Mice http://menandmice.com
SMTP TLS reporting
Example JSON-Report
40
https://tools.ietf.org/html/draft-ietf-uta-smtp-tlsrpt
{
"organization-name": "Company-X",
"date-range": {
"start-datetime": "2016-04-01T00:00:00Z", "end-datetime": "2016-04-01T23:59:59Z"
},
"contact-info": "sts-reporting@company-x.com", "report-id": "5065427c-23d3-47ca-b6e0-946ea0e8c4be",
"policy": {
"policy-type": "sts",
"policy-string": "{ "version": "STSv1","mode": "report", "mx": ["*.example.com"], "max_age": 86400 }",
"policy-domain": "company-y.com", "mx-host": "*.mail.company-y.com"
},
"summary": {
"success-aggregate": 5326, "failure-aggregate": 303
}
"failure-details": [{
"result-type": "certificate-expired", "sending-mta-ip": "98.136.216.25",
"receiving-mx-hostname": "mx1.mail.company-y.com", "session-count": 100
}, {
"result-type": "starttls-not-supported", "sending-mta-ip": "98.22.33.99",
"receiving-mx-hostname": "mx2.mail.company-y.com", "session-count": 200,
"additional-information": "hxxps://reports.company-x.com/report_info?id=5065427c-23d3#StarttlsNotSupported"
}]
}
reporting
company
report time-
range 

(24 hours)
contact
information
used policy
report
summary
failure
details
© Men & Mice http://menandmice.com
Next
41
© Men & Mice http://menandmice.com
Men & Mice DNS Training
•Introduction to DNS & BIND Hands-On Class
•September 18 – 20, 2017 (Zurich, Switzerland)
42
https://www.menandmice.com/training/
© Men & Mice http://menandmice.com
Men & Mice DNS Training
•Introduction & Advanced DNS and BIND Topics
Hands-On Class
•September 18 – 22, 2017 (Zurich, Switzerland)
43
https://www.menandmice.com/training/
© Men & Mice http://menandmice.com
Men & Mice DNS Training
•DNS & BIND (German Language)
•May 22 – 24, 2017, Essen, DE
•DNSSEC and DANE (German Language)
•December 4-12, 2017, Essen, DE
44
http://linuxhotel.de/
© Men & Mice http://menandmice.com
our next webinar 

Certification Authority Authorization Record
The CAA Record (Certification Authority Authorization) is used to signal
which certification authority (CA) is allowed to issue x509 certificates for
a given domain. CAA creates a DNS mechanism that enables domain
name owners to whitelist CAs that are allowed to issue certificates for
their hostnames.
Starting from September 2017, certificate issuing CA must support the
CAA record.
We will explain the CAA record, how it works, how to enter CAA into a
zone and how certification authorities are about to use the record.
Join us for a 45 minutes webinar with a Q&A session at the end, on
Thursday, May 18th, 2017 at 5:00 PM CEST/ 3:00 PM GMT/ 11:00 AM
EDT / 8:00 AM PDT.
45
© Men & Mice http://menandmice.com
Thank you!
Questions? Comments?
46

More Related Content

PDF
Overview of the ARC Protocol for Email
Steve Jones
 
DOCX
Cloud computing notes unit I as per RGPV syllabus
NANDINI SHARMA
 
PPTX
Citrix and Desktop Migration Success
eG Innovations
 
PPT
comment réussir son powerpoint
1hope
 
PDF
Apache Flink par Bilal Baltagi Paris Spark Meetup Dec 2015
Modern Data Stack France
 
PPTX
La logique propositionnelle
Chiheb Ouaghlani
 
PDF
Firefoxの日和見暗号がカジュアルに無効化された話
Muneaki Nishimura
 
PDF
DNSSEC and DANE – E-Mail security reloaded
Men and Mice
 
Overview of the ARC Protocol for Email
Steve Jones
 
Cloud computing notes unit I as per RGPV syllabus
NANDINI SHARMA
 
Citrix and Desktop Migration Success
eG Innovations
 
comment réussir son powerpoint
1hope
 
Apache Flink par Bilal Baltagi Paris Spark Meetup Dec 2015
Modern Data Stack France
 
La logique propositionnelle
Chiheb Ouaghlani
 
Firefoxの日和見暗号がカジュアルに無効化された話
Muneaki Nishimura
 
DNSSEC and DANE – E-Mail security reloaded
Men and Mice
 

Similar to SMTP STS (Strict Transport Security) vs. SMTP with DANE (20)

PDF
Analysis of SMTP TLS Implementations - BtCIRT National Cybersecurity Conferen...
APNIC
 
PDF
4th ICANN APAC-TWNIC Engagement forum & 39th TWNIC OPM: Analysis of SMTP TLS ...
APNIC
 
PDF
AusCERT2023: Analysis of SMTP TLS Implementations
APNIC
 
PDF
ThaiNOG 5: Security Tutorial
APNIC
 
PDF
DNS based Authentication of Named Entities (DANE)
Port25 Solutions
 
PDF
ION Santiago - DNSSEC and DANE Based Security for TLS
Deploy360 Programme (Internet Society)
 
PDF
How to use Domino as a Mail Server in a Modern World
Martijn de Jong
 
PDF
Prism-Proof Cloud Email Services
hughpearse
 
PPTX
secure-email-domain-name-system-design.pptx
Muhammad Salahuddien
 
PPTX
Simple mail transfer protocol
Anagha Ghotkar
 
PDF
TLS, SPF, DKIM, DMARC, authenticated email
rinnocente
 
DOCX
NIST Special Publication 800-52 Revision 2 Guidelines .docx
gibbonshay
 
DOCX
NIST Special Publication 800-52 Revision 2 Guidelines .docx
vannagoforth
 
PPTX
SeaSec East: Green Locks For You & Me
Wendy Knox Everette
 
PPTX
DANE/DNSSEC/TLS Testing in the go6Lab - ION Cape Town
Deploy360 Programme (Internet Society)
 
PPTX
ION Sri Lanka - DANE: The Future of TLS
Deploy360 Programme (Internet Society)
 
PPTX
How to encrypt everything that moves and keep it usable
Denis Gundarev
 
PDF
Why Encryption is Not Optional in 2025.pdf
Secure Titan
 
PDF
Green Locks for You and Me
Wendy Knox Everette
 
PDF
How to send DNS over anything encrypted
Men and Mice
 
Analysis of SMTP TLS Implementations - BtCIRT National Cybersecurity Conferen...
APNIC
 
4th ICANN APAC-TWNIC Engagement forum & 39th TWNIC OPM: Analysis of SMTP TLS ...
APNIC
 
AusCERT2023: Analysis of SMTP TLS Implementations
APNIC
 
ThaiNOG 5: Security Tutorial
APNIC
 
DNS based Authentication of Named Entities (DANE)
Port25 Solutions
 
ION Santiago - DNSSEC and DANE Based Security for TLS
Deploy360 Programme (Internet Society)
 
How to use Domino as a Mail Server in a Modern World
Martijn de Jong
 
Prism-Proof Cloud Email Services
hughpearse
 
secure-email-domain-name-system-design.pptx
Muhammad Salahuddien
 
Simple mail transfer protocol
Anagha Ghotkar
 
TLS, SPF, DKIM, DMARC, authenticated email
rinnocente
 
NIST Special Publication 800-52 Revision 2 Guidelines .docx
gibbonshay
 
NIST Special Publication 800-52 Revision 2 Guidelines .docx
vannagoforth
 
SeaSec East: Green Locks For You & Me
Wendy Knox Everette
 
DANE/DNSSEC/TLS Testing in the go6Lab - ION Cape Town
Deploy360 Programme (Internet Society)
 
ION Sri Lanka - DANE: The Future of TLS
Deploy360 Programme (Internet Society)
 
How to encrypt everything that moves and keep it usable
Denis Gundarev
 
Why Encryption is Not Optional in 2025.pdf
Secure Titan
 
Green Locks for You and Me
Wendy Knox Everette
 
How to send DNS over anything encrypted
Men and Mice
 
Ad

More from Men and Mice (20)

PPTX
Cisco Live 2019: New Best Practices for Hybrid and Multicloud Network Strategies
Men and Mice
 
PDF
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOS
Men and Mice
 
PDF
Part 2 - Local Name Resolution in Windows Networks
Men and Mice
 
PDF
Namespaces for Local Networks
Men and Mice
 
PDF
The DNSSEC KSK of the root rolls
Men and Mice
 
PDF
The CAA-Record for increased encryption security
Men and Mice
 
PDF
DNSSEC signing Tutorial
Men and Mice
 
PDF
BIND 9 logging best practices
Men and Mice
 
PDF
DNS High-Availability Tools - Open-Source Load Balancing Solutions
Men and Mice
 
PDF
Fighting Abuse with DNS
Men and Mice
 
PDF
What is new in BIND 9.11?
Men and Mice
 
PDF
Yeti DNS - Experimenting at the root
Men and Mice
 
PDF
Windows Server 2016 Webinar
Men and Mice
 
PDF
Kea DHCP – the new open source DHCP server from ISC
Men and Mice
 
PDF
DNSTap Webinar
Men and Mice
 
PDF
RIPE 71 and IETF 94 reports webinar
Men and Mice
 
PDF
Keeping DNS server up-and-running with “runit
Men and Mice
 
PDF
PowerDNS Webinar - Part 2
Men and Mice
 
PDF
PowerDNS Webinar
Men and Mice
 
PDF
IETF 93 Review Webinar
Men and Mice
 
Cisco Live 2019: New Best Practices for Hybrid and Multicloud Network Strategies
Men and Mice
 
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOS
Men and Mice
 
Part 2 - Local Name Resolution in Windows Networks
Men and Mice
 
Namespaces for Local Networks
Men and Mice
 
The DNSSEC KSK of the root rolls
Men and Mice
 
The CAA-Record for increased encryption security
Men and Mice
 
DNSSEC signing Tutorial
Men and Mice
 
BIND 9 logging best practices
Men and Mice
 
DNS High-Availability Tools - Open-Source Load Balancing Solutions
Men and Mice
 
Fighting Abuse with DNS
Men and Mice
 
What is new in BIND 9.11?
Men and Mice
 
Yeti DNS - Experimenting at the root
Men and Mice
 
Windows Server 2016 Webinar
Men and Mice
 
Kea DHCP – the new open source DHCP server from ISC
Men and Mice
 
DNSTap Webinar
Men and Mice
 
RIPE 71 and IETF 94 reports webinar
Men and Mice
 
Keeping DNS server up-and-running with “runit
Men and Mice
 
PowerDNS Webinar - Part 2
Men and Mice
 
PowerDNS Webinar
Men and Mice
 
IETF 93 Review Webinar
Men and Mice
 
Ad

Recently uploaded (20)

PDF
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PDF
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PDF
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
PDF
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
PDF
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
PDF
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
PPTX
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
PDF
REPORT: Heating appliances market in Poland 2024
SPIUG
 
PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
REPORT: Heating appliances market in Poland 2024
SPIUG
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 

SMTP STS (Strict Transport Security) vs. SMTP with DANE

  • 1. © Men & Mice http://menandmice.com email transport security MTA-STS vs. DANE 1
  • 2. © Men & Mice http://menandmice.com 
 © ISC http://www.isc.org Agenda 1. Recap: the problem with Mail Transport Security 2. SMTP MTA Strict Transport Security (MTA-STS) 3. SMTP Security via Opportunistic DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) 4. SMTP TLS Reporting 2
  • 3. © Men & Mice http://menandmice.com the problem with email transport security 3
  • 4. © Men & Mice http://menandmice.com Short recap we've discussed email transport security before see previous Webinar – "DNSSEC & DANE – E-Mail security reloaded" (link below) for details so here just a short recap … 4 https://www.menandmice.com/resources/webinar-dnssec-and-dane-e-mail-security/
  • 5. © Men & Mice http://menandmice.com Transport Encryption Example of a protocol (HTTP/HTTPS) using a dedicated port und URI for encrypted communication 5 Port 80 - unencrypted Port 443 - encrypted
  • 6. © Men & Mice http://menandmice.com Transport Encryption SMTP (email) uses in-protocol signalling to bootstrap encryption. The signalling is unsecured and can be intercepted 6 Port 25 - unencrypted Greeting - unencrypted Greeting - unencrypted Feature-List - unencrypted Request encryption - unencrypted Greeting - encrypted
  • 7. © Men & Mice http://menandmice.com STARTTLS interception 7 https://www.eff.org/de/deeplinks/2014/11/starttls-downgrade-attacks https://arstechnica.com/security/2015/10/dont-count-on-starttls-to-automatically-encrypt-your-sensitive-e-mails/ https://blog.filippo.io/the-sad-state-of-smtp-encryption/
  • 8. © Men & Mice http://menandmice.com STARTTLS weakness the core problem: the receiving side cannot communicate its encryption policy the sending side cannot infer the encryption policy, it need to guess solutions available/worked on in the IETF: SMTP MTA Strict Transport Security (MTA-STS) SMTP with DANE (MTA-DANE) 8
  • 9. © Men & Mice http://menandmice.com SMTP MTA Strict Transport Security (MTA-STS) draft-ietf-uta-mta-sts 9
  • 10. © Men & Mice http://menandmice.com MTA-STS MTA-STS 
 (Message-Transfer-Agent Strict-Transport-Security) a mail receiving domain publishes its encryption policy •via a TXT record in DNS •plus a JSON document on an TLS secured web-server 10 draft-ietf-uta-mta-sts https://tools.ietf.org/html/draft-ietf-uta-mta-sts
  • 11. © Men & Mice http://menandmice.com MTA-STS for "example.com" the administrator of the domain "example.com" will publish a TXT-record at the "well-known" sub-domain "_mta-sts" containing the version number of this domains mail- transport encryption policy use of DNSSEC is recommended 11 _mta-sts.example.com. 900 IN TXT "v=STSv1; id=20170411;" MTA-STS version encryption policy version
  • 12. © Men & Mice http://menandmice.com MTA-STS for "example.com" the administrator of the domain "example.com" will also publish a JSON document at the "well-known" sub-domain "mta-sts" and the path ".well-known/mta-sts.json" 12 https://mta-sts.example.com/.well-known/mta-sts.json TLS secured path to JSON document mta-sts domain
  • 13. © Men & Mice http://menandmice.com MTA-STS for "example.com" example content of the JSON document 13 { "version": "STSv1", "mode": "enforce", "mx": [".mail.example.com"], "max_age": 123456 } MTA-STS version "enforce" or "report" Common Name or Subject Alternative Name DNS-ID present in the X.509 certificate presented by any MX receiving mail for this domain max lifetime of the policy
  • 14. © Men & Mice http://menandmice.com MTA-STS 14 sending MTA sending MUA DNS(SEC) resolver auth DNS receiving MTA policy webserver sendingdomain receivingdomain Internet
  • 15. © Men & Mice http://menandmice.com MTA-STS 15 sending MTA sending MUA DNS(SEC) resolver auth DNS receiving MTA policy webserver mail delivered to MTA
  • 16. © Men & Mice http://menandmice.com MTA-STS 16 sending MTA sending MUA DNS(SEC) resolver auth DNS receiving MTA policy webserver checks policy cache
  • 17. © Men & Mice http://menandmice.com MTA-STS 17 sending MTA sending MUA DNS(SEC) resolver auth DNS receiving MTA policy webserver request mta-sts TXT record in DNS _mta-sts.example.com. TXT ? _mta-sts.example.com. 900 IN TXT "v=STSv1; id=20170411;"
  • 18. © Men & Mice http://menandmice.com MTA-STS 18 sending MTA sending MUA DNS(SEC) resolver auth DNS receiving MTA policy webserver request JSON policy from web server https://mta-sts.example.com/.well-known/mta-sts.json verify TLS x509 security store policy in cache
  • 19. © Men & Mice http://menandmice.com MTA-STS 19 sending MTA sending MUA DNS(SEC) resolver auth DNS receiving MTA policy webserver STARTTLS SMTP session validate x509 certificate against policy
  • 20. © Men & Mice http://menandmice.com MTA-STS 20 sending MTA sending MUA DNS(SEC) resolver auth DNS receiving MTA policy webserver deliver mail
  • 21. © Men & Mice http://menandmice.com SMTP Security via Opportunistic DNS- Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) RFC 7672 21
  • 22. © Men & Mice http://menandmice.com MTA-DANE SMTP with DANE signals the encryption policy of a mail-server via DNSSEC secured DNS the TLSA record holds the full certificate (or a hash of the certificate) which can be verified against the certificate presented by the receiving mail server MTA-DANE is standardised in RFC 7672 (Oct 2015) 22
  • 23. © Men & Mice http://menandmice.com MTA-DANE 23 sending MTA sending MUA DNSSEC resolver auth DNS receiving MTA mail delivered to MTA
  • 24. © Men & Mice http://menandmice.com MTA-DANE 24 sending MTA sending MUA DNSSEC resolver auth DNS receiving MTA MTA requests TLSA record _25._tcp.mail01.example.com. TLSA _25._tcp.mail01.example.com. TLSA 3 1 1 (
 BDC6A9F8312BF24C81D[..]387A147 ) validate DNSSEC chain of trust
  • 25. © Men & Mice http://menandmice.com MTA-DANE 25 sending MTA sending MUA DNS(SEC) resolver auth DNS receiving MTA STARTTLS SMTP session validate x509 certificate against TLSA cert/hash
  • 26. © Men & Mice http://menandmice.com MTA-DANE 26 sending MTA sending MUA DNS(SEC) resolver auth DNS receiving MTA deliver mail
  • 27. © Men & Mice http://menandmice.com DANE success stories Cloudmark will support MTA-DANE in the upcoming release 5.2 Cloudmark has about 12% global market share (20% of mobile accounts) in the email business 27 https://blog.cloudmark.com/2017/03/27/dane-and-email-security/
  • 28. © Men & Mice http://menandmice.com DANE success stories large German mail service provider (web.de/gmx.de/1&1) support MTA-DANE over 50% market 
 share in Germany 28 https://de.slideshare.net/GMX_Deutschland/e-mailstudie-2015-deutsche-anbieter-bevorzugt https://www.heise.de/newsticker/meldung/Abhoersicherheit-Web-de-sichert-Mail-Transport-zusaetzlich-per-DANE-ab-3175333.html
  • 29. © Men & Mice http://menandmice.com DANE success stories the Dutch government requests MTA-DANE from government agencies 29 https://www.ncsc.nl/english/current-topics/news/ncsc-publishes-factsheet-secure-the-connections-of-mail-servers.html
  • 30. © Men & Mice http://menandmice.com DANE success stories German "Federal Office for Information Security" requires MTA-DANE for "secure e-mail" certification 30 https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Publikationen/TechnischeRichtlinien/TR03108/TR03108-1.pdf
  • 31. © Men & Mice http://menandmice.com Comparing 
 MTA-STS vs. MTA-DANE 31
  • 32. © Men & Mice http://menandmice.com MTA-STS vs. MTA-DANE MTA-STS does not require DNSSEC (but it is recommended) MTA-STS defines a policy cache MTA-STS requires x509 certificates that validate against a root-CA-certificate (no "self-signed" certs) MTA-STS requires a HTTPS server to serve the policy JSON document MTA-STS requires validation of the HTTPS connection to fetch the policy document 32
  • 33. © Men & Mice http://menandmice.com MTA-STS vs. MTA-DANE MTA-DANE does require DNSSEC MTA-DANE has no policy cache (but the TTL on TLSA records can work as such) MTA-DANE allows "self-signed" certificates MTA-DANE policy can be changed by switching the TLSA- record in DNS MTA-DANE TLS-cert rollover need to be in sync with TLSA record(s) MTA-DANE relies on the trust on the DNSSEC chain 33
  • 34. © Men & Mice http://menandmice.com SMTP TLS Reporting draft-ietf-uta-smtp-tlsrpt 34
  • 35. © Men & Mice http://menandmice.com SMTP TLS reporting SMTP TLS reporting defines a protocol to signal a reporting channel about SMTP encryption failures the sending MTA can report issues with TLS encryption to the receiving MTA operator SMTP TLS reporting can be used with MTA-STS and MTA-DANE Reports include: •MITM attacks (certification mismatch) •expired certificates •server not answering •certificate not validating against Root-CA •… 35 https://tools.ietf.org/html/draft-ietf-uta-smtp-tlsrpt
  • 36. © Men & Mice http://menandmice.com SMTP TLS reporting the administrator of a mail domain publishes the reporting policy as a TXT-record in DNS using the "well-known" subdomain "_smtp-tlsrpt" inside the mail domain Example (SMTP-Report):
 
 
 Example (HTTP-Report): 36 https://tools.ietf.org/html/draft-ietf-uta-smtp-tlsrpt _smtp-tlsrpt.example.com. IN TXT "v=TLSRPTv1;rua=mailto:[email protected]" _smtp-tlsrpt.example.com. IN TXT "v=TLSRPTv1; rua=https://reporting.example.com/v1/tlsrpt"
  • 37. © Men & Mice http://menandmice.com SMTP TLS reporting 37 sending MTA sending MUA DNS(SEC) resolver auth DNS receiving MTA STARTTLS SMTP session x509 certificate fails to validate against TLSA cert/hash
  • 38. © Men & Mice http://menandmice.com SMTP TLS reporting 38 sending MTA sending MUA DNS(SEC) resolver auth DNS receiving MTA MTA requests _smtp-tlsrpt TXT record _smtp-tlsrpt.example.com. TXT _smtp-tlsrpt.example.com. IN TXT "v=TLSRPTv1;rua=mailto:[email protected]"
  • 39. © Men & Mice http://menandmice.com SMTP TLS reporting 39 sending MTA sending MUA DNS(SEC) resolver auth DNS receiving MTA deliver report mail
  • 40. © Men & Mice http://menandmice.com SMTP TLS reporting Example JSON-Report 40 https://tools.ietf.org/html/draft-ietf-uta-smtp-tlsrpt { "organization-name": "Company-X", "date-range": { "start-datetime": "2016-04-01T00:00:00Z", "end-datetime": "2016-04-01T23:59:59Z" }, "contact-info": "[email protected]", "report-id": "5065427c-23d3-47ca-b6e0-946ea0e8c4be", "policy": { "policy-type": "sts", "policy-string": "{ "version": "STSv1","mode": "report", "mx": ["*.example.com"], "max_age": 86400 }", "policy-domain": "company-y.com", "mx-host": "*.mail.company-y.com" }, "summary": { "success-aggregate": 5326, "failure-aggregate": 303 } "failure-details": [{ "result-type": "certificate-expired", "sending-mta-ip": "98.136.216.25", "receiving-mx-hostname": "mx1.mail.company-y.com", "session-count": 100 }, { "result-type": "starttls-not-supported", "sending-mta-ip": "98.22.33.99", "receiving-mx-hostname": "mx2.mail.company-y.com", "session-count": 200, "additional-information": "hxxps://reports.company-x.com/report_info?id=5065427c-23d3#StarttlsNotSupported" }] } reporting company report time- range 
 (24 hours) contact information used policy report summary failure details
  • 41. © Men & Mice http://menandmice.com Next 41
  • 42. © Men & Mice http://menandmice.com Men & Mice DNS Training •Introduction to DNS & BIND Hands-On Class •September 18 – 20, 2017 (Zurich, Switzerland) 42 https://www.menandmice.com/training/
  • 43. © Men & Mice http://menandmice.com Men & Mice DNS Training •Introduction & Advanced DNS and BIND Topics Hands-On Class •September 18 – 22, 2017 (Zurich, Switzerland) 43 https://www.menandmice.com/training/
  • 44. © Men & Mice http://menandmice.com Men & Mice DNS Training •DNS & BIND (German Language) •May 22 – 24, 2017, Essen, DE •DNSSEC and DANE (German Language) •December 4-12, 2017, Essen, DE 44 http://linuxhotel.de/
  • 45. © Men & Mice http://menandmice.com our next webinar 
 Certification Authority Authorization Record The CAA Record (Certification Authority Authorization) is used to signal which certification authority (CA) is allowed to issue x509 certificates for a given domain. CAA creates a DNS mechanism that enables domain name owners to whitelist CAs that are allowed to issue certificates for their hostnames. Starting from September 2017, certificate issuing CA must support the CAA record. We will explain the CAA record, how it works, how to enter CAA into a zone and how certification authorities are about to use the record. Join us for a 45 minutes webinar with a Q&A session at the end, on Thursday, May 18th, 2017 at 5:00 PM CEST/ 3:00 PM GMT/ 11:00 AM EDT / 8:00 AM PDT. 45
  • 46. © Men & Mice http://menandmice.com Thank you! Questions? Comments? 46