diff options
Diffstat (limited to 'doc/rfc/rfc8314.txt')
-rw-r--r-- | doc/rfc/rfc8314.txt | 1459 |
1 files changed, 1459 insertions, 0 deletions
diff --git a/doc/rfc/rfc8314.txt b/doc/rfc/rfc8314.txt new file mode 100644 index 0000000..2abaa77 --- /dev/null +++ b/doc/rfc/rfc8314.txt @@ -0,0 +1,1459 @@ + + + + + + +Internet Engineering Task Force (IETF) K. Moore +Request for Comments: 8314 Windrock, Inc. +Updates: 1939, 2595, 3501, 5068, 6186, 6409 C. Newman +Category: Standards Track Oracle +ISSN: 2070-1721 January 2018 + + + Cleartext Considered Obsolete: Use of Transport Layer Security (TLS) + for Email Submission and Access + +Abstract + + This specification outlines current recommendations for the use of + Transport Layer Security (TLS) to provide confidentiality of email + traffic between a Mail User Agent (MUA) and a Mail Submission Server + or Mail Access Server. This document updates RFCs 1939, 2595, 3501, + 5068, 6186, and 6409. + +Status of This Memo + + This is an Internet Standards Track document. + + This document is a product of the Internet Engineering Task Force + (IETF). It represents the consensus of the IETF community. It has + received public review and has been approved for publication by the + Internet Engineering Steering Group (IESG). Further information on + Internet Standards is available in Section 2 of RFC 7841. + + Information about the current status of this document, any errata, + and how to provide feedback on it may be obtained at + https://www.rfc-editor.org/info/rfc8314. + +Copyright Notice + + Copyright (c) 2018 IETF Trust and the persons identified as the + document authors. All rights reserved. + + This document is subject to BCP 78 and the IETF Trust's Legal + Provisions Relating to IETF Documents + (https://trustee.ietf.org/license-info) in effect on the date of + publication of this document. Please review these documents + carefully, as they describe your rights and restrictions with respect + to this document. Code Components extracted from this document must + include Simplified BSD License text as described in Section 4.e of + the Trust Legal Provisions and are provided without warranty as + described in the Simplified BSD License. + + + + + +Moore & Newman Standards Track [Page 1] + +RFC 8314 Use of TLS for Email Submission/Access January 2018 + + +Table of Contents + + 1. Introduction ....................................................3 + 1.1. How This Document Updates Previous RFCs ....................3 + 2. Conventions and Terminology Used in This Document ...............4 + 3. Implicit TLS ....................................................5 + 3.1. Implicit TLS for POP .......................................5 + 3.2. Implicit TLS for IMAP ......................................5 + 3.3. Implicit TLS for SMTP Submission ...........................6 + 3.4. Implicit TLS Connection Closure for POP, IMAP, and + SMTP Submission ............................................7 + 4. Use of TLS by Mail Access Servers and Message Submission + Servers .........................................................7 + 4.1. Deprecation of Services Using Cleartext and TLS Versions + Less Than 1.1 ..............................................8 + 4.2. Mail Server Use of Client Certificate Authentication .......9 + 4.3. Recording TLS Ciphersuite in "Received" Header Field .......9 + 4.4. TLS Server Certificate Requirements .......................10 + 4.5. Recommended DNS Records for Mail Protocol Servers .........11 + 4.5.1. MX Records .........................................11 + 4.5.2. SRV Records ........................................11 + 4.5.3. DNSSEC .............................................11 + 4.5.4. TLSA Records .......................................11 + 4.6. Changes to Internet-Facing Servers ........................11 + 5. Use of TLS by Mail User Agents .................................12 + 5.1. Use of SRV Records in Establishing Configuration ..........13 + 5.2. Minimum Confidentiality Level .............................14 + 5.3. Certificate Validation ....................................15 + 5.4. Certificate Pinning .......................................15 + 5.5. Client Certificate Authentication .........................16 + 6. Considerations Related to Antivirus/Antispam Software + and Services ...................................................17 + 7. IANA Considerations ............................................17 + 7.1. POP3S Port Registration Update ............................17 + 7.2. IMAPS Port Registration Update ............................18 + 7.3. Submissions Port Registration .............................18 + 7.4. Additional Registered Clauses for "Received" Fields .......19 + 8. Security Considerations ........................................19 + 9. References .....................................................20 + 9.1. Normative References ......................................20 + 9.2. Informative References ....................................22 + Appendix A. Design Considerations .................................24 + Acknowledgements ..................................................26 + Authors' Addresses ................................................26 + + + + + + + +Moore & Newman Standards Track [Page 2] + +RFC 8314 Use of TLS for Email Submission/Access January 2018 + + +1. Introduction + + Software that provides email service via the Internet Message Access + Protocol (IMAP) [RFC3501], the Post Office Protocol (POP) [RFC1939], + and/or Simple Mail Transfer Protocol (SMTP) Submission [RFC6409] + usually has Transport Layer Security (TLS) [RFC5246] support but + often does not use it in a way that maximizes end-user + confidentiality. This specification describes current + recommendations for the use of TLS in interactions between Mail User + Agents (MUAs) and Mail Access Servers, and also between MUAs and Mail + Submission Servers. + + In brief, this memo now recommends that: + + o TLS version 1.2 or greater be used for all traffic between MUAs + and Mail Submission Servers, and also between MUAs and Mail Access + Servers. + + o MUAs and Mail Service Providers (MSPs) (a) discourage the use of + cleartext protocols for mail access and mail submission and + (b) deprecate the use of cleartext protocols for these purposes as + soon as practicable. + + o Connections to Mail Submission Servers and Mail Access Servers be + made using "Implicit TLS" (as defined below), in preference to + connecting to the "cleartext" port and negotiating TLS using the + STARTTLS command or a similar command. + + This memo does not address the use of TLS with SMTP for message relay + (where Message Submission [RFC6409] does not apply). Improving the + use of TLS with SMTP for message relay requires a different approach. + One approach to address that topic is described in [RFC7672]; another + is provided in [MTA-STS]. + + The recommendations in this memo do not replace the functionality of, + and are not intended as a substitute for, end-to-end encryption of + electronic mail. + +1.1. How This Document Updates Previous RFCs + + This document updates POP (RFC 1939), IMAP (RFC 3501), and Submission + (RFC 6409, RFC 5068) in two ways: + + 1. By adding Implicit TLS ports as Standards Track ports for these + protocols as described in Section 3. + + 2. By updating TLS best practices that apply to these protocols as + described in Sections 4 and 5. + + + +Moore & Newman Standards Track [Page 3] + +RFC 8314 Use of TLS for Email Submission/Access January 2018 + + + This document updates RFC 2595 by replacing Section 7 of RFC 2595 + with the preference for Implicit TLS as described in Sections 1 and 3 + of this document, as well as by updating TLS best practices that + apply to the protocols in RFC 2595 as described in Sections 4 and 5 + of this document. + + This document updates RFC 6186 as described herein, in Section 5.1. + +2. Conventions and Terminology Used in This Document + + The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", + "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and + "OPTIONAL" in this document are to be interpreted as described in + BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all + capitals, as shown here. + + The term "Implicit TLS" refers to the automatic negotiation of TLS + whenever a TCP connection is made on a particular TCP port that is + used exclusively by that server for TLS connections. The term + "Implicit TLS" is intended to contrast with the use of STARTTLS and + similar commands in POP, IMAP, SMTP Message Submission, and other + protocols, that are used by the client and the server to explicitly + negotiate TLS on an established cleartext TCP connection. + + The term "Mail Access Server" refers to a server for POP, IMAP, and + any other protocol used to access or modify received messages, or to + access or modify a mail user's account configuration. + + The term "Mail Submission Server" refers to a server for the protocol + specified in [RFC6409] (or one of its predecessors or successors) for + submission of outgoing messages for delivery to recipients. + + The term "Mail Service Provider" (or "MSP") refers to an operator of + Mail Access Servers and/or Mail Submission Servers. + + The term "Mail Account" refers to a user's identity with an MSP, that + user's authentication credentials, any user email that is stored by + the MSP, and any other per-user configuration information maintained + by the MSP (for example, instructions for filtering spam). Most MUAs + support the ability to access multiple Mail Accounts. + + For each account that an MUA accesses on its user's behalf, it must + have the server names, ports, authentication credentials, and other + configuration information specified by the user. This information, + which is used by the MUA, is referred to as "Mail Account + Configuration". + + + + + +Moore & Newman Standards Track [Page 4] + +RFC 8314 Use of TLS for Email Submission/Access January 2018 + + + This specification expresses syntax using the Augmented Backus-Naur + Form (ABNF) as described in [RFC5234], including the core rules + provided in Appendix B of [RFC5234] and the rules provided in + [RFC5322]. + +3. Implicit TLS + + Previous standards for the use of email protocols with TLS used the + STARTTLS mechanism: [RFC2595], [RFC3207], and [RFC3501]. With + STARTTLS, the client establishes a cleartext application session and + determines whether to issue a STARTTLS command based on server + capabilities and client configuration. If the client issues a + STARTTLS command, a TLS handshake follows that can upgrade the + connection. Although this mechanism has been deployed, an alternate + mechanism where TLS is negotiated immediately at connection start on + a separate port (referred to in this document as "Implicit TLS") has + been deployed more successfully. To encourage more widespread use of + TLS and to also encourage greater consistency regarding how TLS is + used, this specification now recommends the use of Implicit TLS for + POP, IMAP, SMTP Submission, and all other protocols used between an + MUA and an MSP. + +3.1. Implicit TLS for POP + + When a TCP connection is established for the "pop3s" service (default + port 995), a TLS handshake begins immediately. Clients MUST + implement the certificate validation mechanism described in + [RFC7817]. Once the TLS session is established, POP3 [RFC1939] + protocol messages are exchanged as TLS application data for the + remainder of the TCP connection. After the server sends an +OK + greeting, the server and client MUST enter the AUTHORIZATION state, + even if a client certificate was supplied during the TLS handshake. + + See Sections 5.5 and 4.2 for additional information on client + certificate authentication. See Section 7.1 for port registration + information. + +3.2. Implicit TLS for IMAP + + When a TCP connection is established for the "imaps" service (default + port 993), a TLS handshake begins immediately. Clients MUST + implement the certificate validation mechanism described in + [RFC7817]. Once the TLS session is established, IMAP [RFC3501] + protocol messages are exchanged as TLS application data for the + remainder of the TCP connection. If a client certificate was + provided during the TLS handshake that the server finds acceptable, + the server MAY issue a PREAUTH greeting, in which case both the + + + + +Moore & Newman Standards Track [Page 5] + +RFC 8314 Use of TLS for Email Submission/Access January 2018 + + + server and the client enter the AUTHENTICATED state. If the server + issues an OK greeting, then both the server and the client enter the + NOT AUTHENTICATED state. + + See Sections 5.5 and 4.2 for additional information on client + certificate authentication. See Section 7.2 for port registration + information. + +3.3. Implicit TLS for SMTP Submission + + When a TCP connection is established for the "submissions" service + (default port 465), a TLS handshake begins immediately. Clients MUST + implement the certificate validation mechanism described in + [RFC7817]. Once the TLS session is established, Message Submission + protocol data [RFC6409] is exchanged as TLS application data for the + remainder of the TCP connection. (Note: The "submissions" service + name is defined in Section 7.3 of this document and follows the usual + convention that the name of a service layered on top of Implicit TLS + consists of the name of the service as used without TLS, with an "s" + appended.) + + The STARTTLS mechanism on port 587 is relatively widely deployed due + to the situation with port 465 (discussed in Section 7.3). This + differs from IMAP and POP services where Implicit TLS is more widely + deployed on servers than STARTTLS. It is desirable to migrate core + protocols used by MUA software to Implicit TLS over time, for + consistency as well as for the additional reasons discussed in + Appendix A. However, to maximize the use of encryption for + submission, it is desirable to support both mechanisms for Message + Submission over TLS for a transition period of several years. As a + result, clients and servers SHOULD implement both STARTTLS on + port 587 and Implicit TLS on port 465 for this transition period. + Note that there is no significant difference between the security + properties of STARTTLS on port 587 and Implicit TLS on port 465 if + the implementations are correct and if both the client and the server + are configured to require successful negotiation of TLS prior to + Message Submission. + + Note that the "submissions" port provides access to a Message + Submission Agent (MSA) as defined in [RFC6409], so requirements and + recommendations for MSAs in that document, including the requirement + to implement SMTP AUTH [RFC4954] and the requirements of Email + Submission Operations [RFC5068], also apply to the submissions port. + + See Sections 5.5 and 4.2 for additional information on client + certificate authentication. See Section 7.3 for port registration + information. + + + + +Moore & Newman Standards Track [Page 6] + +RFC 8314 Use of TLS for Email Submission/Access January 2018 + + +3.4. Implicit TLS Connection Closure for POP, IMAP, and SMTP Submission + + When a client or server wishes to close the connection, it SHOULD + initiate the exchange of TLS close alerts before TCP connection + termination. The client MAY, after sending a TLS close alert, + gracefully close the TCP connection (e.g., call the close() function + on the TCP socket or otherwise issue a TCP CLOSE ([RFC793], + Section 3.5)) without waiting for a TLS response from the server. + +4. Use of TLS by Mail Access Servers and Message Submission Servers + + The following requirements and recommendations apply to Mail Access + Servers and Mail Submission Servers, or, if indicated, to MSPs: + + o MSPs that support POP, IMAP, and/or Message Submission MUST + support TLS access for those protocol servers. + + o Servers provided by MSPs other than POP, IMAP, and/or Message + Submission SHOULD support TLS access and MUST support TLS access + for those servers that support authentication via username and + password. + + o MSPs that support POP, IMAP, and/or Message Submission SHOULD + provide and support instances of those services that use Implicit + TLS. (See Section 3.) + + o For compatibility with existing MUAs and existing MUA + configurations, MSPs SHOULD also, in the near term, provide + instances of these services that support STARTTLS. This will + permit legacy MUAs to discover new availability of TLS capability + on servers and may increase the use of TLS by such MUAs. However, + servers SHOULD NOT advertise STARTTLS if the use of the STARTTLS + command by a client is likely to fail (for example, if the server + has no server certificate configured). + + o MSPs SHOULD advertise their Mail Access Servers and Mail + Submission Servers, using DNS SRV records according to [RFC6186]. + (In addition to making correct configuration easier for MUAs, this + provides a way by which MUAs can discover when an MSP begins to + offer TLS-based services.) Servers supporting TLS SHOULD be + advertised in preference to cleartext servers (if offered). In + addition, servers using Implicit TLS SHOULD be advertised in + preference to servers supporting STARTTLS (if offered). (See also + Section 4.5.) + + o MSPs SHOULD deprecate the use of cleartext Mail Access Servers and + Mail Submission Servers as soon as practicable. (See + Section 4.1.) + + + +Moore & Newman Standards Track [Page 7] + +RFC 8314 Use of TLS for Email Submission/Access January 2018 + + + o MSPs currently supporting such use of cleartext SMTP (on port 25) + as a means of Message Submission by their users (whether or not + requiring authentication) SHOULD transition their users to using + TLS (either Implicit TLS or STARTTLS) as soon as practicable. + + o Mail Access Servers and Mail Submission Servers MUST support + TLS 1.2 or later. + + o All Mail Access Servers and Mail Submission Servers SHOULD + implement the recommended TLS ciphersuites described in [RFC7525] + or a future BCP or Standards Track revision of that document. + + o As soon as practicable, MSPs currently supporting Secure Sockets + Layer (SSL) 2.x, SSL 3.0, or TLS 1.0 SHOULD transition their users + to TLS 1.1 or later and discontinue support for those earlier + versions of SSL and TLS. + + o Mail Submission Servers accepting mail using TLS SHOULD include in + the Received field of the outgoing message the TLS ciphersuite of + the session in which the mail was received. (See Section 4.3.) + + o All Mail Access Servers and Mail Submission Servers implementing + TLS SHOULD log TLS cipher information along with any connection or + authentication logs that they maintain. + + Additional considerations and details appear below. + +4.1. Deprecation of Services Using Cleartext and TLS Versions + Less Than 1.1 + + The specific means employed for deprecation of cleartext Mail Access + Servers and Mail Submission Servers MAY vary from one MSP to the next + in light of their user communities' needs and constraints. For + example, an MSP MAY implement a gradual transition in which, over + time, more and more users are forbidden to authenticate to cleartext + instances of these servers, thus encouraging those users to migrate + to Implicit TLS. Access to cleartext servers should eventually be + either (a) disabled or (b) limited strictly for use by legacy systems + that cannot be upgraded. + + After a user's ability to authenticate to a server using cleartext is + revoked, the server denying such access MUST NOT provide any + indication over a cleartext channel of whether the user's + authentication credentials were valid. An attempt to authenticate as + such a user using either invalid credentials or valid credentials + MUST both result in the same indication of access being denied. + + + + + +Moore & Newman Standards Track [Page 8] + +RFC 8314 Use of TLS for Email Submission/Access January 2018 + + + Also, users previously authenticating with passwords sent as + cleartext SHOULD be required to change those passwords when migrating + to TLS, if the old passwords were likely to have been compromised. + (For any large community of users using the public Internet to access + mail without encryption, the compromise of at least some of those + passwords should be assumed.) + + Transition of users from SSL or TLS 1.0 to later versions of TLS MAY + be accomplished by a means similar to that described above. There + are multiple ways to accomplish this. One way is for the server to + refuse a ClientHello message from any client sending a + ClientHello.version field corresponding to any version of SSL or + TLS 1.0. Another way is for the server to accept ClientHello + messages from some client versions that it does not wish to support + but later refuse to allow the user to authenticate. The latter + method may provide a better indication to the user of the reason for + the failure but (depending on the protocol and method of + authentication used) may also risk exposure of the user's password + over a channel that is known to not provide adequate confidentiality. + + It is RECOMMENDED that new users be required to use TLS version 1.1 + or greater from the start. However, an MSP may find it necessary to + make exceptions to accommodate some legacy systems that support only + earlier versions of TLS or only cleartext. + +4.2. Mail Server Use of Client Certificate Authentication + + Mail Submission Servers and Mail Access Servers MAY implement client + certificate authentication on the Implicit TLS port. Such servers + MUST NOT request a client certificate during the TLS handshake unless + the server is configured to accept some client certificates as + sufficient for authentication and the server has the ability to + determine a mail server authorization identity matching such + certificates. How to make this determination is presently + implementation specific. + + If the server accepts the client's certificate as sufficient for + authorization, it MUST enable the Simple Authentication and Security + Layer (SASL) EXTERNAL mechanism [RFC4422]. An IMAPS server MAY issue + a PREAUTH greeting instead of enabling SASL EXTERNAL. + +4.3. Recording TLS Ciphersuite in "Received" Header Field + + The ESMTPS transmission type [RFC3848] provides trace information + that can indicate that TLS was used when transferring mail. However, + TLS usage by itself is not a guarantee of confidentiality or + security. The TLS ciphersuite provides additional information about + the level of security made available for a connection. This section + + + +Moore & Newman Standards Track [Page 9] + +RFC 8314 Use of TLS for Email Submission/Access January 2018 + + + defines a new SMTP "tls" Received header additional-registered-clause + that is used to record the TLS ciphersuite that was negotiated for + the connection. This clause SHOULD be included whenever a Submission + server generates a Received header field for a message received via + TLS. The value included in this additional clause SHOULD be the + registered ciphersuite name (e.g., + TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) included in the "TLS Cipher + Suite Registry". In the event that the implementation does not know + the name of the ciphersuite (a situation that should be remedied + promptly), a four-digit hexadecimal ciphersuite identifier MAY be + used. In addition, the Diffie-Hellman group name associated with the + ciphersuite MAY be included (when applicable and known) following the + ciphersuite name. The ABNF for the field follows: + + tls-cipher-clause = CFWS "tls" FWS tls-cipher + [ CFWS tls-dh-group-clause ] + + tls-cipher = tls-cipher-name / tls-cipher-hex + + tls-cipher-name = ALPHA *(ALPHA / DIGIT / "_") + ; as registered in the IANA "TLS Cipher Suite Registry" + ; <https://www.iana.org/assignments/tls-parameters> + + tls-cipher-hex = "0x" 4HEXDIG + + tls-dh-group-clause = "group" FWS dh-group + ; not to be used except immediately after tls-cipher + + dh-group = ALPHA *(ALPHA / DIGIT / "_" / "-") + ; as registered in the IANA "TLS Supported Groups Registry" + ; <https://www.iana.org/assignments/tls-parameters> + +4.4. TLS Server Certificate Requirements + + MSPs MUST maintain valid server certificates for all servers. See + [RFC7817] for the recommendations and requirements necessary to + achieve this. + + If a protocol server provides service for more than one mail domain, + it MAY use a separate IP address for each domain and/or a server + certificate that advertises multiple domains. This will generally be + necessary unless and until it is acceptable to impose the constraint + that the server and all clients support the Server Name Indication + (SNI) extension to TLS [RFC6066]. Mail servers supporting the SNI + need to support the post-SRV hostname to interoperate with MUAs that + have not implemented [RFC6186]. For more discussion of this problem, + see Section 5.1 of [RFC7817]. + + + + +Moore & Newman Standards Track [Page 10] + +RFC 8314 Use of TLS for Email Submission/Access January 2018 + + +4.5. Recommended DNS Records for Mail Protocol Servers + + This section discusses not only the DNS records that are recommended + but also implications of DNS records for server configuration and TLS + server certificates. + +4.5.1. MX Records + + It is recommended that MSPs advertise MX records for the handling of + inbound mail (instead of relying entirely on A or AAAA records) and + that those MX records be signed using DNSSEC [RFC4033]. This is + mentioned here only for completeness, as the handling of inbound mail + is out of scope for this document. + +4.5.2. SRV Records + + MSPs SHOULD advertise SRV records to aid MUAs in determining the + proper configuration of servers, per the instructions in [RFC6186]. + + MSPs SHOULD advertise servers that support Implicit TLS in preference + to servers that support cleartext and/or STARTTLS operation. + +4.5.3. DNSSEC + + All DNS records advertised by an MSP as a means of aiding clients in + communicating with the MSP's servers SHOULD be signed using DNSSEC if + and when the parent DNS zone supports doing so. + +4.5.4. TLSA Records + + MSPs SHOULD advertise TLSA records to provide an additional trust + anchor for public keys used in TLS server certificates. However, + TLSA records MUST NOT be advertised unless they are signed using + DNSSEC. + +4.6. Changes to Internet-Facing Servers + + When an MSP changes the Internet-facing Mail Access Servers and Mail + Submission Servers, including SMTP-based spam/virus filters, it is + generally necessary to support the same and/or a newer version of TLS + than the one previously used. + + + + + + + + + + +Moore & Newman Standards Track [Page 11] + +RFC 8314 Use of TLS for Email Submission/Access January 2018 + + +5. Use of TLS by Mail User Agents + + The following requirements and recommendations apply to MUAs: + + o MUAs SHOULD be capable of using DNS SRV records to discover Mail + Access Servers and Mail Submission Servers that are advertised by + an MSP for an account being configured. Other means of + discovering server configuration information (e.g., a database + maintained by the MUA vendor) MAY also be supported. (See + Section 5.1 for more information.) + + o MUAs SHOULD be configurable to require a minimum level of + confidentiality for any particular Mail Account and refuse to + exchange information via any service associated with that Mail + Account if the session does not provide that minimum level of + confidentiality. (See Section 5.2.) + + o MUAs MUST NOT treat a session as meeting a minimum level of + confidentiality if the server's TLS certificate cannot be + validated. (See Section 5.3.) + + o MUAs MAY impose other minimum confidentiality requirements in the + future, e.g., in order to discourage the use of TLS versions or + cryptographic algorithms in which weaknesses have been discovered. + + o MUAs SHOULD provide a prominent indication of the level of + confidentiality associated with an account configuration that is + appropriate for the user interface (for example, a "lock" icon or + changed background color for a visual interface, or some sort of + audible indication for an audio user interface), at appropriate + times and/or locations, in order to inform the user of the + confidentiality of the communications associated with that + account. For example, this might be done whenever (a) the user is + prompted for authentication credentials, (b) the user is composing + mail that will be sent to a particular submission server, (c) a + list of accounts is displayed (particularly if the user can select + from that list to read mail), or (d) the user is asking to view or + update any configuration data that will be stored on a remote + server. If, however, an MUA provides such an indication, it + MUST NOT indicate confidentiality for any connection that does not + at least use TLS 1.1 with certificate verification and also meet + the minimum confidentiality requirements associated with that + account. + + o MUAs MUST implement TLS 1.2 [RFC5246] or later. Earlier TLS and + SSL versions MAY also be supported, so long as the MUA requires at + least TLS 1.1 [RFC4346] when accessing accounts that are + configured to impose minimum confidentiality requirements. + + + +Moore & Newman Standards Track [Page 12] + +RFC 8314 Use of TLS for Email Submission/Access January 2018 + + + o All MUAs SHOULD implement the recommended TLS ciphersuites + described in [RFC7525] or a future BCP or Standards Track revision + of that document. + + o MUAs that are configured to not require minimum confidentiality + for one or more accounts SHOULD detect when TLS becomes available + on those accounts (using [RFC6186] or other means) and offer to + upgrade the account to require TLS. + + Additional considerations and details appear below. + +5.1. Use of SRV Records in Establishing Configuration + + This document updates [RFC6186] by changing the preference rules and + adding a new SRV service label _submissions._tcp to refer to Message + Submission with Implicit TLS. + + User-configurable MUAs SHOULD support the use of [RFC6186] for + account setup. However, when using configuration information + obtained via this method, MUAs SHOULD ignore advertised services that + do not satisfy minimum confidentiality requirements, unless the user + has explicitly requested reduced confidentiality. This will have the + effect of causing the MUA to default to ignoring advertised + configurations that do not support TLS, even when those advertised + configurations have a higher priority than other advertised + configurations. + + When using configuration information per [RFC6186], MUAs SHOULD NOT + automatically establish new configurations that do not require TLS + for all servers, unless there are no advertised configurations using + TLS. If such a configuration is chosen, prior to attempting to + authenticate to the server or use the server for Message Submission, + the MUA SHOULD warn the user that traffic to that server will not be + encrypted and that it will therefore likely be intercepted by + unauthorized parties. The specific wording is to be determined by + the implementation, but it should adequately capture the sense of + risk, given the widespread incidence of mass surveillance of email + traffic. + + Similarly, an MUA MUST NOT attempt to "test" a particular Mail + Account configuration by submitting the user's authentication + credentials to a server, unless a TLS session meeting minimum + confidentiality levels has been established with that server. If + minimum confidentiality requirements have not been satisfied, the MUA + must explicitly warn that the user's password may be exposed to + attackers before testing the new configuration. + + + + + +Moore & Newman Standards Track [Page 13] + +RFC 8314 Use of TLS for Email Submission/Access January 2018 + + + When establishing a new configuration for connecting to an IMAP, POP, + or SMTP submission server, based on SRV records, an MUA SHOULD verify + that either (a) the SRV records are signed using DNSSEC or (b) the + target Fully Qualified Domain Name (FQDN) of the SRV record matches + the original server FQDN for which the SRV queries were made. If the + target FQDN is not in the queried domain, the MUA SHOULD verify with + the user that the SRV target FQDN is suitable for use, before + executing any connections to the host. (See Section 6 of [RFC6186].) + + An MUA MUST NOT consult SRV records to determine which servers to use + on every connection attempt, unless those SRV records are signed by + DNSSEC and have a valid signature. However, an MUA MAY consult SRV + records from time to time to determine if an MSP's server + configuration has changed and alert the user if it appears that this + has happened. This can also serve as a means to encourage users to + upgrade their configurations to require TLS if and when their MSPs + support it. + +5.2. Minimum Confidentiality Level + + MUAs SHOULD, by default, require a minimum level of confidentiality + for services accessed by each account. For MUAs supporting the + ability to access multiple Mail Accounts, this requirement SHOULD be + configurable on a per-account basis. + + The default minimum expected level of confidentiality for all new + accounts MUST require successful validation of the server's + certificate and SHOULD require negotiation of TLS version 1.1 or + greater. (Future revisions to this specification may raise these + requirements or impose additional requirements to address newly + discovered weaknesses in protocols or cryptographic algorithms.) + + MUAs MAY permit the user to disable this minimum confidentiality + requirement during initial account configuration or when subsequently + editing an account configuration but MUST warn users that such a + configuration will not assure privacy for either passwords or + messages. + + An MUA that is configured to require a minimum level of + confidentiality for a Mail Account MUST NOT attempt to perform any + operation other than capability discovery, or STARTTLS for servers + not using Implicit TLS, unless the minimum level of confidentiality + is provided by that connection. + + MUAs SHOULD NOT allow users to easily access or send mail via a + connection, or authenticate to any service using a password, if that + account is configured to impose minimum confidentiality requirements + and that connection does not meet all of those requirements. An + + + +Moore & Newman Standards Track [Page 14] + +RFC 8314 Use of TLS for Email Submission/Access January 2018 + + + example of "easy access" would be to display a dialog informing the + user that the security requirements of the account were not met by + the connection but allowing the user to "click through" to send mail + or access the service anyway. Experience indicates that users + presented with such an option often "click through" without + understanding the risks that they're accepting by doing so. + Furthermore, users who frequently find the need to "click through" to + use an insecure connection may become conditioned to do so as a + matter of habit, before considering whether the risks are reasonable + in each specific instance. + + An MUA that is not configured to require a minimum level of + confidentiality for a Mail Account SHOULD still attempt to connect to + the services associated with that account using the most secure means + available, e.g., by using Implicit TLS or STARTTLS. + +5.3. Certificate Validation + + MUAs MUST validate TLS server certificates according to [RFC7817] and + PKIX [RFC5280]. + + MUAs MAY also support DNS-Based Authentication of Named Entities + (DANE) [RFC6698] as a means of validating server certificates in + order to meet minimum confidentiality requirements. + + MUAs MAY support the use of certificate pinning but MUST NOT consider + a connection in which the server's authenticity relies on certificate + pinning as providing the minimum level of confidentiality. (See + Section 5.4.) + +5.4. Certificate Pinning + + During account setup, the MUA will identify servers that provide + account services such as mail access and mail submission (Section 5.1 + describes one way to do this). The certificates for these servers + are verified using the rules described in [RFC7817] and PKIX + [RFC5280]. In the event that the certificate does not validate due + to an expired certificate, a lack of an appropriate chain of trust, + or a lack of an identifier match, the MUA MAY offer to create a + persistent binding between that certificate and the saved hostname + for the server, for use when accessing that account's servers. This + is called "certificate pinning". + + (Note: This use of the term "certificate pinning" means something + subtly different than HTTP Public Key Pinning as described in + [RFC7469]. The dual use of the same term is confusing, but + unfortunately both uses are well established.) + + + + +Moore & Newman Standards Track [Page 15] + +RFC 8314 Use of TLS for Email Submission/Access January 2018 + + + Certificate pinning is only appropriate during Mail Account setup and + MUST NOT be offered as an option in response to a failed certificate + validation for an existing Mail Account. An MUA that allows + certificate pinning MUST NOT allow a certificate pinned for one + account to validate connections for other accounts. An MUA that + allows certificate pinning MUST also allow a user to undo the + pinning, i.e., to revoke trust in a certificate that has previously + been pinned. + + A pinned certificate is subject to a man-in-the-middle attack at + account setup time and typically lacks a mechanism to automatically + revoke or securely refresh the certificate. Note also that a man-in- + the-middle attack at account setup time will expose the user's + password to the attacker (if a password is used). Therefore, the use + of a pinned certificate does not meet the requirement for a minimum + confidentiality level, and an MUA MUST NOT indicate to the user that + such confidentiality is provided. Additional advice on certificate + pinning is presented in [RFC6125]. + +5.5. Client Certificate Authentication + + MUAs MAY implement client certificate authentication on the Implicit + TLS port. An MUA MUST NOT provide a client certificate during the + TLS handshake unless the server requests one and the MUA has been + authorized to use that client certificate with that account. Having + the end user explicitly configure a client certificate for use with a + given account is sufficient to meet this requirement. However, + installing a client certificate for use with one account MUST NOT + automatically authorize the use of that certificate with other + accounts. This is not intended to prohibit site-specific + authorization mechanisms, such as (a) a site-administrator-controlled + mechanism to authorize the use of a client certificate with a given + account or (b) a domain-name-matching mechanism. + + Note: The requirement that the server request a certificate is just a + restatement of the TLS protocol rules, e.g., Section 7.4.6 of + [RFC5246]. The requirement that the client not send a certificate + not known to be acceptable to the server is pragmatic in multiple + ways: the current TLS protocol provides no way for the client to know + which of the potentially multiple certificates it should use; also, + when the client sends a certificate, it is potentially disclosing its + identity (or its user's identity) to both the server and any party + with access to the transmission medium, perhaps unnecessarily and for + no useful purpose. + + + + + + + +Moore & Newman Standards Track [Page 16] + +RFC 8314 Use of TLS for Email Submission/Access January 2018 + + + A client supporting client certificate authentication with Implicit + TLS MUST implement the SASL EXTERNAL mechanism [RFC4422], using the + appropriate authentication command (AUTH for POP3 [RFC5034], AUTH for + SMTP Submission [RFC4954], or AUTHENTICATE for IMAP [RFC3501]). + +6. Considerations Related to Antivirus/Antispam Software and Services + + There are multiple ways to connect an AVAS service (e.g., "Antivirus + & Antispam") to a mail server. Some mechanisms, such as the de facto + "milter" protocol, are out of scope for this specification. However, + some services use an SMTP relay proxy that intercepts mail at the + application layer to perform a scan and proxy or forward to another + Mail Transfer Agent (MTA). Deploying AVAS services in this way can + cause many problems [RFC2979], including direct interference with + this specification, and other forms of confidentiality or security + reduction. An AVAS product or service is considered compatible with + this specification if all IMAP, POP, and SMTP-related software + (including proxies) it includes are compliant with this + specification. + + Note that end-to-end email encryption prevents AVAS software and + services from using email content as part of a spam or virus + assessment. Furthermore, although a minimum confidentiality level + can prevent a man-in-the-middle from introducing spam or virus + content between the MUA and Submission server, it does not prevent + other forms of client or account compromise. The use of AVAS + services for submitted email therefore remains necessary. + +7. IANA Considerations + +7.1. POP3S Port Registration Update + + IANA has updated the registration of the TCP well-known port 995 + using the following template [RFC6335]: + + Service Name: pop3s + Transport Protocol: TCP + Assignee: IESG <iesg@ietf.org> + Contact: IETF Chair <chair@ietf.org> + Description: POP3 over TLS protocol + Reference: RFC 8314 + Port Number: 995 + + + + + + + + + +Moore & Newman Standards Track [Page 17] + +RFC 8314 Use of TLS for Email Submission/Access January 2018 + + +7.2. IMAPS Port Registration Update + + IANA has updated the registration of the TCP well-known port 993 + using the following template [RFC6335]: + + Service Name: imaps + Transport Protocol: TCP + Assignee: IESG <iesg@ietf.org> + Contact: IETF Chair <chair@ietf.org> + Description: IMAP over TLS protocol + Reference: RFC 8314 + Port Number: 993 + + No changes to existing UDP port assignments for pop3s or imaps are + being requested. + +7.3. Submissions Port Registration + + IANA has assigned an alternate usage of TCP port 465 in addition to + the current assignment using the following template [RFC6335]: + + Service Name: submissions + Transport Protocol: TCP + Assignee: IESG <iesg@ietf.org> + Contact: IETF Chair <chair@ietf.org> + Description: Message Submission over TLS protocol + Reference: RFC 8314 + Port Number: 465 + + This is a one-time procedural exception to the rules in [RFC6335]. + This requires explicit IESG approval and does not set a precedent. + Note: Since the purpose of this alternate usage assignment is to + align with widespread existing practice and there is no known usage + of UDP port 465 for Message Submission over TLS, IANA has not + assigned an alternate usage of UDP port 465. + + Historically, port 465 was briefly registered as the "smtps" port. + This registration made no sense, as the SMTP transport MX + infrastructure has no way to specify a port, so port 25 is always + used. As a result, the registration was revoked and was subsequently + reassigned to a different service. In hindsight, the "smtps" + registration should have been renamed or reserved rather than + revoked. Unfortunately, some widely deployed mail software + interpreted "smtps" as "submissions" [RFC6409] and used that port for + email submission by default when an end user requested security + during account setup. If a new port is assigned for the submissions + service, either (a) email software will continue with unregistered + use of port 465 (leaving the port registry inaccurate relative to + + + +Moore & Newman Standards Track [Page 18] + +RFC 8314 Use of TLS for Email Submission/Access January 2018 + + + de facto practice and wasting a well-known port) or (b) confusion + between the de facto and registered ports will cause harmful + interoperability problems that will deter the use of TLS for Message + Submission. The authors of this document believe that both of these + outcomes are less desirable than a "wart" in the registry documenting + real-world usage of a port for two purposes. Although STARTTLS on + port 587 has been deployed, it has not replaced the deployed use of + Implicit TLS submission on port 465. + +7.4. Additional Registered Clauses for "Received" Fields + + Per the provisions in [RFC5321], IANA has added two additional- + registered-clauses for Received fields as defined in Section 4.3 of + this document: + + o "tls": Indicates the TLS cipher used (if applicable) + + o "group": Indicates the Diffie-Hellman group used with the TLS + cipher (if applicable) + + The descriptions and syntax of these additional clauses are provided + in Section 4.3 of this document. + +8. Security Considerations + + This entire document is about security considerations. In general, + this is targeted to improve mail confidentiality and to mitigate + threats external to the email system such as network-level snooping + or interception; this is not intended to mitigate active attackers + who have compromised service provider systems. + + Implementers should be aware that the use of client certificates with + TLS 1.2 reveals the user's identity to any party with the ability to + read packets from the transmission medium and therefore may + compromise the user's privacy. There seems to be no easy fix with + TLS 1.2 or earlier versions, other than to avoid presenting client + certificates except when there is explicit authorization to do so. + TLS 1.3 [TLS-1.3] appears to reduce this privacy risk somewhat. + + + + + + + + + + + + + +Moore & Newman Standards Track [Page 19] + +RFC 8314 Use of TLS for Email Submission/Access January 2018 + + +9. References + +9.1. Normative References + + [RFC793] Postel, J., "Transmission Control Protocol", STD 7, + RFC 793, DOI 10.17487/RFC0793, September 1981, + <https://www.rfc-editor.org/info/rfc793>. + + [RFC1939] Myers, J. and M. Rose, "Post Office Protocol - Version 3", + STD 53, RFC 1939, DOI 10.17487/RFC1939, May 1996, + <https://www.rfc-editor.org/info/rfc1939>. + + [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate + Requirement Levels", BCP 14, RFC 2119, + DOI 10.17487/RFC2119, March 1997, + <https://www.rfc-editor.org/info/rfc2119>. + + [RFC3207] Hoffman, P., "SMTP Service Extension for Secure SMTP over + Transport Layer Security", RFC 3207, DOI 10.17487/RFC3207, + February 2002, <https://www.rfc-editor.org/info/rfc3207>. + + [RFC3501] Crispin, M., "INTERNET MESSAGE ACCESS PROTOCOL - + VERSION 4rev1", RFC 3501, DOI 10.17487/RFC3501, + March 2003, <https://www.rfc-editor.org/info/rfc3501>. + + [RFC4033] Arends, R., Austein, R., Larson, M., Massey, D., and S. + Rose, "DNS Security Introduction and Requirements", + RFC 4033, DOI 10.17487/RFC4033, March 2005, + <https://www.rfc-editor.org/info/rfc4033>. + + [RFC5034] Siemborski, R. and A. Menon-Sen, "The Post Office Protocol + (POP3) Simple Authentication and Security Layer (SASL) + Authentication Mechanism", RFC 5034, DOI 10.17487/RFC5034, + July 2007, <https://www.rfc-editor.org/info/rfc5034>. + + [RFC5234] Crocker, D., Ed., and P. Overell, "Augmented BNF for + Syntax Specifications: ABNF", STD 68, RFC 5234, + DOI 10.17487/RFC5234, January 2008, + <https://www.rfc-editor.org/info/rfc5234>. + + [RFC5246] Dierks, T. and E. Rescorla, "The Transport Layer Security + (TLS) Protocol Version 1.2", RFC 5246, + DOI 10.17487/RFC5246, August 2008, + <https://www.rfc-editor.org/info/rfc5246>. + + + + + + + +Moore & Newman Standards Track [Page 20] + +RFC 8314 Use of TLS for Email Submission/Access January 2018 + + + [RFC5280] Cooper, D., Santesson, S., Farrell, S., Boeyen, S., + Housley, R., and W. Polk, "Internet X.509 Public Key + Infrastructure Certificate and Certificate Revocation List + (CRL) Profile", RFC 5280, DOI 10.17487/RFC5280, May 2008, + <https://www.rfc-editor.org/info/rfc5280>. + + [RFC5322] Resnick, P., Ed., "Internet Message Format", RFC 5322, + DOI 10.17487/RFC5322, October 2008, + <https://www.rfc-editor.org/info/rfc5322>. + + [RFC6186] Daboo, C., "Use of SRV Records for Locating Email + Submission/Access Services", RFC 6186, + DOI 10.17487/RFC6186, March 2011, + <https://www.rfc-editor.org/info/rfc6186>. + + [RFC6409] Gellens, R. and J. Klensin, "Message Submission for Mail", + STD 72, RFC 6409, DOI 10.17487/RFC6409, November 2011, + <https://www.rfc-editor.org/info/rfc6409>. + + [RFC6698] Hoffman, P. and J. Schlyter, "The DNS-Based Authentication + of Named Entities (DANE) Transport Layer Security (TLS) + Protocol: TLSA", RFC 6698, DOI 10.17487/RFC6698, + August 2012, <https://www.rfc-editor.org/info/rfc6698>. + + [RFC7525] Sheffer, Y., Holz, R., and P. Saint-Andre, + "Recommendations for Secure Use of Transport Layer + Security (TLS) and Datagram Transport Layer Security + (DTLS)", BCP 195, RFC 7525, DOI 10.17487/RFC7525, + May 2015, <https://www.rfc-editor.org/info/rfc7525>. + + [RFC7672] Dukhovni, V. and W. Hardaker, "SMTP Security via + Opportunistic DNS-Based Authentication of Named Entities + (DANE) Transport Layer Security (TLS)", RFC 7672, + DOI 10.17487/RFC7672, October 2015, + <https://www.rfc-editor.org/info/rfc7672>. + + [RFC7817] Melnikov, A., "Updated Transport Layer Security (TLS) + Server Identity Check Procedure for Email-Related + Protocols", RFC 7817, DOI 10.17487/RFC7817, March 2016, + <https://www.rfc-editor.org/info/rfc7817>. + + [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in + RFC 2119 Key Words", BCP 14, RFC 8174, + DOI 10.17487/RFC8174, May 2017, + <https://www.rfc-editor.org/info/rfc8174>. + + + + + + +Moore & Newman Standards Track [Page 21] + +RFC 8314 Use of TLS for Email Submission/Access January 2018 + + +9.2. Informative References + + [CERT-555316] + CERT, "Vulnerability Note VU#555316: STARTTLS plaintext + command injection vulnerability", Carnegie Mellon + University Software Engineering Institute, September 2011, + <https://www.kb.cert.org/vuls/id/555316>. + + [Email-TLS] + Moore, K., "Recommendations for use of TLS by Electronic + Mail Access Protocols", Work in Progress, draft-moore- + email-tls-00, October 2013. + + [MTA-STS] Margolis, D., Risher, M., Ramakrishnan, B., Brotman, A., + and J. Jones, "SMTP MTA Strict Transport Security + (MTA-STS)", Work in Progress, draft-ietf-uta-mta-sts-14, + January 2018. + + [POP3-over-TLS] + Melnikov, A., Newman, C., and M. Yevstifeyev, Ed., "POP3 + over TLS", Work in Progress, draft-melnikov-pop3- + over-tls-02, August 2011. + + [RFC2595] Newman, C., "Using TLS with IMAP, POP3 and ACAP", + RFC 2595, DOI 10.17487/RFC2595, June 1999, + <https://www.rfc-editor.org/info/rfc2595>. + + [RFC2979] Freed, N., "Behavior of and Requirements for Internet + Firewalls", RFC 2979, DOI 10.17487/RFC2979, October 2000, + <https://www.rfc-editor.org/info/rfc2979>. + + [RFC3848] Newman, C., "ESMTP and LMTP Transmission Types + Registration", RFC 3848, DOI 10.17487/RFC3848, July 2004, + <https://www.rfc-editor.org/info/rfc3848>. + + [RFC4346] Dierks, T. and E. Rescorla, "The Transport Layer Security + (TLS) Protocol Version 1.1", RFC 4346, + DOI 10.17487/RFC4346, April 2006, + <https://www.rfc-editor.org/info/rfc4346>. + + [RFC4422] Melnikov, A., Ed., and K. Zeilenga, Ed., "Simple + Authentication and Security Layer (SASL)", RFC 4422, + DOI 10.17487/RFC4422, June 2006, + <https://www.rfc-editor.org/info/rfc4422>. + + + + + + + +Moore & Newman Standards Track [Page 22] + +RFC 8314 Use of TLS for Email Submission/Access January 2018 + + + [RFC4954] Siemborski, R., Ed., and A. Melnikov, Ed., "SMTP Service + Extension for Authentication", RFC 4954, + DOI 10.17487/RFC4954, July 2007, + <https://www.rfc-editor.org/info/rfc4954>. + + [RFC5068] Hutzler, C., Crocker, D., Resnick, P., Allman, E., and T. + Finch, "Email Submission Operations: Access and + Accountability Requirements", BCP 134, RFC 5068, + DOI 10.17487/RFC5068, November 2007, + <https://www.rfc-editor.org/info/rfc5068>. + + [RFC5321] Klensin, J., "Simple Mail Transfer Protocol", RFC 5321, + DOI 10.17487/RFC5321, October 2008, + <https://www.rfc-editor.org/info/rfc5321>. + + [RFC6066] Eastlake 3rd, D., "Transport Layer Security (TLS) + Extensions: Extension Definitions", RFC 6066, + DOI 10.17487/RFC6066, January 2011, + <https://www.rfc-editor.org/info/rfc6066>. + + [RFC6125] Saint-Andre, P. and J. Hodges, "Representation and + Verification of Domain-Based Application Service Identity + within Internet Public Key Infrastructure Using X.509 + (PKIX) Certificates in the Context of Transport Layer + Security (TLS)", RFC 6125, DOI 10.17487/RFC6125, + March 2011, <https://www.rfc-editor.org/info/rfc6125>. + + [RFC6335] Cotton, M., Eggert, L., Touch, J., Westerlund, M., and S. + Cheshire, "Internet Assigned Numbers Authority (IANA) + Procedures for the Management of the Service Name and + Transport Protocol Port Number Registry", BCP 165, + RFC 6335, DOI 10.17487/RFC6335, August 2011, + <https://www.rfc-editor.org/info/rfc6335>. + + [RFC7469] Evans, C., Palmer, C., and R. Sleevi, "Public Key Pinning + Extension for HTTP", RFC 7469, DOI 10.17487/RFC7469, + April 2015, <https://www.rfc-editor.org/info/rfc7469>. + + [TLS-1.3] Rescorla, E., "The Transport Layer Security (TLS) Protocol + Version 1.3", Work in Progress, draft-ietf-tls-tls13-23, + January 2018. + + + + + + + + + + +Moore & Newman Standards Track [Page 23] + +RFC 8314 Use of TLS for Email Submission/Access January 2018 + + +Appendix A. Design Considerations + + This section is not normative. + + The first version of this document was written independently from the + October 2013 version of [Email-TLS] ("Recommendations for use of TLS + by Electronic Mail Access Protocols"). Subsequent versions merge + ideas from both documents. + + One author of this document was also the author of RFC 2595, which + became the standard for TLS usage with POP and IMAP, and the other + author was perhaps the first to propose that idea. In hindsight, + both authors now believe that that approach was a mistake. At this + point, the authors believe that while anything that makes it easier + to deploy TLS is good, the desirable end state is that these + protocols always use TLS, leaving no need for a separate port for + cleartext operation except to support legacy clients while they + continue to be used. The separate-port model for TLS is inherently + simpler to implement, debug, and deploy. It also enables a "generic + TLS load-balancer" that accepts secure client connections for + arbitrary foo-over-TLS protocols and forwards them to a server that + may or may not support TLS. Such load-balancers cause many problems + because they violate the end-to-end principle and the server loses + the ability to log security-relevant information about the client + unless the protocol is designed to forward that information (as this + specification does for the ciphersuite). However, they can result in + TLS deployment where it would not otherwise happen, which is a + sufficiently important goal that it overrides any problems. + + Although STARTTLS appears only slightly more complex than + separate-port TLS, we again learned the lesson that complexity is the + enemy of security in the form of the STARTTLS command injection + vulnerability (Computer Emergency Readiness Team (CERT) vulnerability + ID #555316 [CERT-555316]). Although there's nothing inherently wrong + with STARTTLS, the fact that it resulted in a common implementation + error (made independently by multiple implementers) suggests that it + is a less secure architecture than Implicit TLS. + + Section 7 of RFC 2595 critiques the separate-port approach to TLS. + The first bullet was a correct critique. There are proposals in the + HTTP community to address that, and the use of SRV records as + described in RFC 6186 resolves that critique for email. The second + bullet is correct as well but is not very important because useful + deployment of security layers other than TLS in email is small enough + to be effectively irrelevant. (Also, it's less correct than it used + to be because "export" ciphersuites are no longer supported in modern + versions of TLS.) The third bullet is incorrect because it misses + the desirable option of "use TLS for all subsequent connections to + + + +Moore & Newman Standards Track [Page 24] + +RFC 8314 Use of TLS for Email Submission/Access January 2018 + + + this server once TLS is successfully negotiated". The fourth bullet + may be correct, but it is not a problem yet with current port + consumption rates. The fundamental error was prioritizing a + perceived better design based on a mostly valid critique over + real-world deployability. But getting security and confidentiality + facilities actually deployed is so important that it should trump + design purity considerations. + + Port 465 is presently used for two purposes: for submissions by a + large number of clients and service providers and for the "urd" + protocol by one vendor. Actually documenting this current state is + controversial, as discussed in the IANA Considerations section. + However, there is no good alternative. Registering a new port for + submissions when port 465 is already widely used for that purpose + will just create interoperability problems. Registering a port + that's only used if advertised by an SRV record (RFC 6186) would not + create interoperability problems but would require all client + deployments, server deployments, and software to change + significantly, which is contrary to the goal of promoting the + increased use of TLS. Encouraging the use of STARTTLS on port 587 + would not create interoperability problems, but it is unlikely to + have any impact on the current undocumented use of port 465 and makes + the guidance in this document less consistent. The remaining option + is to document the current state of the world and support future use + of port 465 for submission, as this increases consistency and ease of + deployment for TLS email submission. + + + + + + + + + + + + + + + + + + + + + + + + + +Moore & Newman Standards Track [Page 25] + +RFC 8314 Use of TLS for Email Submission/Access January 2018 + + +Acknowledgements + + Thanks to Ned Freed for discussion of the initial concepts in this + document. Thanks to Alexey Melnikov for [POP3-over-TLS], which was + the basis of the POP3 Implicit TLS text. Thanks to Russ Housley, + Alexey Melnikov, and Dan Newman for review feedback. Thanks to + Paul Hoffman for interesting feedback in initial conversations about + this idea. + +Authors' Addresses + + Keith Moore + Windrock, Inc. + PO Box 1934 + Knoxville, TN 37901 + United States of America + + Email: moore@network-heretics.com + + + Chris Newman + Oracle + 440 E. Huntington Dr., Suite 400 + Arcadia, CA 91006 + United States of America + + Email: chris.newman@oracle.com + + + + + + + + + + + + + + + + + + + + + + + + +Moore & Newman Standards Track [Page 26] + |