SlideShare a Scribd company logo
© Men & Mice http://menandmice.com
email transport security
MTA-STS vs. DANE
1
© Men & Mice http://menandmice.com 

© ISC http://www.isc.org
Agenda
1. Recap: the problem with Mail Transport Security
2. SMTP MTA Strict Transport Security (MTA-STS)
3. SMTP Security via Opportunistic DNS-Based
Authentication of Named Entities (DANE)
Transport Layer Security (TLS)
4. SMTP TLS Reporting
2
© Men & Mice http://menandmice.com
the problem with email
transport security
3
© Men & Mice http://menandmice.com
Short recap
we've discussed email transport security before
see previous Webinar – "DNSSEC & DANE – E-Mail
security reloaded" (link below) for details
so here just a short recap …
4
https://www.menandmice.com/resources/webinar-dnssec-and-dane-e-mail-security/
© Men & Mice http://menandmice.com
Transport Encryption
Example of a protocol (HTTP/HTTPS) using a
dedicated port und URI for encrypted
communication
5
Port 80 - unencrypted
Port 443 - encrypted
© Men & Mice http://menandmice.com
Transport Encryption
SMTP (email) uses in-protocol signalling to
bootstrap encryption. The signalling is unsecured
and can be intercepted
6
Port 25 - unencrypted
Greeting - unencrypted
Greeting - unencrypted
Feature-List - unencrypted
Request encryption - unencrypted
Greeting - encrypted
© Men & Mice http://menandmice.com
STARTTLS interception
7
https://www.eff.org/de/deeplinks/2014/11/starttls-downgrade-attacks
https://arstechnica.com/security/2015/10/dont-count-on-starttls-to-automatically-encrypt-your-sensitive-e-mails/
https://blog.filippo.io/the-sad-state-of-smtp-encryption/
© Men & Mice http://menandmice.com
STARTTLS weakness
the core problem:
the receiving side cannot communicate its encryption
policy
the sending side cannot infer the encryption policy, it
need to guess
solutions available/worked on in the IETF:
SMTP MTA Strict Transport Security (MTA-STS)
SMTP with DANE (MTA-DANE)
8
© Men & Mice http://menandmice.com
SMTP MTA Strict Transport
Security (MTA-STS)
draft-ietf-uta-mta-sts
9
© Men & Mice http://menandmice.com
MTA-STS
MTA-STS 

(Message-Transfer-Agent Strict-Transport-Security)
a mail receiving domain publishes its encryption
policy
•via a TXT record in DNS
•plus a JSON document on an TLS secured web-server
10
draft-ietf-uta-mta-sts
https://tools.ietf.org/html/draft-ietf-uta-mta-sts
© Men & Mice http://menandmice.com
MTA-STS for "example.com"
the administrator of the domain "example.com" will
publish a TXT-record
at the "well-known" sub-domain "_mta-sts"
containing the version number of this domains mail-
transport encryption policy
use of DNSSEC is recommended
11
_mta-sts.example.com. 900 IN TXT "v=STSv1; id=20170411;"
MTA-STS
version
encryption
policy
version
© Men & Mice http://menandmice.com
MTA-STS for "example.com"
the administrator of the domain "example.com" will
also
publish a JSON document
at the "well-known" sub-domain "mta-sts" and the
path ".well-known/mta-sts.json"
12
https://mta-sts.example.com/.well-known/mta-sts.json
TLS secured
path to
JSON
document
mta-sts
domain
© Men & Mice http://menandmice.com
MTA-STS for "example.com"
example content of the JSON document
13
{
"version": "STSv1",
"mode": "enforce",
"mx": [".mail.example.com"],
"max_age": 123456
}
MTA-STS
version
"enforce" or
"report"
Common Name
or Subject
Alternative Name
DNS-ID present in
the X.509
certificate
presented by any
MX receiving mail
for this domain
max
lifetime of
the policy
© Men & Mice http://menandmice.com
MTA-STS
14
sending
MTA
sending
MUA
DNS(SEC)
resolver
auth
DNS
receiving
MTA
policy
webserver
sendingdomain
receivingdomain
Internet
© Men & Mice http://menandmice.com
MTA-STS
15
sending
MTA
sending
MUA
DNS(SEC)
resolver
auth
DNS
receiving
MTA
policy
webserver
mail
delivered to
MTA
© Men & Mice http://menandmice.com
MTA-STS
16
sending
MTA
sending
MUA
DNS(SEC)
resolver
auth
DNS
receiving
MTA
policy
webserver
checks
policy
cache
© Men & Mice http://menandmice.com
MTA-STS
17
sending
MTA
sending
MUA
DNS(SEC)
resolver
auth
DNS
receiving
MTA
policy
webserver
request
mta-sts TXT
record in
DNS
_mta-sts.example.com. TXT ?
_mta-sts.example.com. 900 IN TXT "v=STSv1; id=20170411;"
© Men & Mice http://menandmice.com
MTA-STS
18
sending
MTA
sending
MUA
DNS(SEC)
resolver
auth
DNS
receiving
MTA
policy
webserver
request
JSON policy
from web
server
https://mta-sts.example.com/.well-known/mta-sts.json
verify TLS
x509
security
store policy
in cache
© Men & Mice http://menandmice.com
MTA-STS
19
sending
MTA
sending
MUA
DNS(SEC)
resolver
auth
DNS
receiving
MTA
policy
webserver
STARTTLS
SMTP
session
validate x509
certificate
against policy
© Men & Mice http://menandmice.com
MTA-STS
20
sending
MTA
sending
MUA
DNS(SEC)
resolver
auth
DNS
receiving
MTA
policy
webserver
deliver mail
© Men & Mice http://menandmice.com
SMTP Security via Opportunistic DNS-
Based Authentication of Named Entities
(DANE) Transport Layer Security (TLS)
RFC 7672
21
© Men & Mice http://menandmice.com
MTA-DANE
SMTP with DANE signals the encryption policy of a
mail-server via DNSSEC secured DNS
the TLSA record holds the full certificate (or a hash
of the certificate) which can be verified against the
certificate presented by the receiving mail server
MTA-DANE is standardised in RFC 7672 (Oct 2015)
22
© Men & Mice http://menandmice.com
MTA-DANE
23
sending
MTA
sending
MUA
DNSSEC
resolver
auth
DNS
receiving
MTA
mail
delivered to
MTA
© Men & Mice http://menandmice.com
MTA-DANE
24
sending
MTA
sending
MUA
DNSSEC
resolver
auth
DNS
receiving
MTA
MTA
requests
TLSA record
_25._tcp.mail01.example.com. TLSA
_25._tcp.mail01.example.com. TLSA 3 1 1 (

BDC6A9F8312BF24C81D[..]387A147 )
validate
DNSSEC
chain of
trust
© Men & Mice http://menandmice.com
MTA-DANE
25
sending
MTA
sending
MUA
DNS(SEC)
resolver
auth
DNS
receiving
MTA
STARTTLS
SMTP
session
validate x509
certificate
against TLSA
cert/hash
© Men & Mice http://menandmice.com
MTA-DANE
26
sending
MTA
sending
MUA
DNS(SEC)
resolver
auth
DNS
receiving
MTA
deliver mail
© Men & Mice http://menandmice.com
DANE success stories
Cloudmark will support
MTA-DANE in the
upcoming release 5.2
Cloudmark has about
12% global market share
(20% of mobile
accounts) in the email
business
27
https://blog.cloudmark.com/2017/03/27/dane-and-email-security/
© Men & Mice http://menandmice.com
DANE success stories
large German mail
service provider
(web.de/gmx.de/1&1)
support MTA-DANE
over 50% market 

share in Germany
28
https://de.slideshare.net/GMX_Deutschland/e-mailstudie-2015-deutsche-anbieter-bevorzugt
https://www.heise.de/newsticker/meldung/Abhoersicherheit-Web-de-sichert-Mail-Transport-zusaetzlich-per-DANE-ab-3175333.html
© Men & Mice http://menandmice.com
DANE success stories
the Dutch government
requests MTA-DANE
from government
agencies
29
https://www.ncsc.nl/english/current-topics/news/ncsc-publishes-factsheet-secure-the-connections-of-mail-servers.html
© Men & Mice http://menandmice.com
DANE success stories
German "Federal Office
for Information Security"
requires MTA-DANE for
"secure e-mail"
certification
30
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Publikationen/TechnischeRichtlinien/TR03108/TR03108-1.pdf
© Men & Mice http://menandmice.com
Comparing 

MTA-STS vs. MTA-DANE
31
© Men & Mice http://menandmice.com
MTA-STS vs. MTA-DANE
MTA-STS does not require DNSSEC (but it is
recommended)
MTA-STS defines a policy cache
MTA-STS requires x509 certificates that validate against a
root-CA-certificate (no "self-signed" certs)
MTA-STS requires a HTTPS server to serve the policy
JSON document
MTA-STS requires validation of the HTTPS connection to
fetch the policy document
32
© Men & Mice http://menandmice.com
MTA-STS vs. MTA-DANE
MTA-DANE does require DNSSEC
MTA-DANE has no policy cache (but the TTL on TLSA
records can work as such)
MTA-DANE allows "self-signed" certificates
MTA-DANE policy can be changed by switching the TLSA-
record in DNS
MTA-DANE TLS-cert rollover need to be in sync with TLSA
record(s)
MTA-DANE relies on the trust on the DNSSEC chain
33
© Men & Mice http://menandmice.com
SMTP TLS Reporting
draft-ietf-uta-smtp-tlsrpt
34
© Men & Mice http://menandmice.com
SMTP TLS reporting
SMTP TLS reporting defines a protocol to signal a reporting channel about SMTP
encryption failures
the sending MTA can report issues with TLS encryption to the receiving MTA
operator
SMTP TLS reporting can be used with MTA-STS and MTA-DANE
Reports include:
•MITM attacks (certification mismatch)
•expired certificates
•server not answering
•certificate not validating against Root-CA
•…
35
https://tools.ietf.org/html/draft-ietf-uta-smtp-tlsrpt
© Men & Mice http://menandmice.com
SMTP TLS reporting
the administrator of a mail domain publishes the
reporting policy as a TXT-record in DNS
using the "well-known" subdomain "_smtp-tlsrpt"
inside the mail domain
Example (SMTP-Report):





Example (HTTP-Report):
36
https://tools.ietf.org/html/draft-ietf-uta-smtp-tlsrpt
_smtp-tlsrpt.example.com. IN TXT 
"v=TLSRPTv1;rua=mailto:reports@example.com"
_smtp-tlsrpt.example.com. IN TXT "v=TLSRPTv1; 
rua=https://reporting.example.com/v1/tlsrpt"
© Men & Mice http://menandmice.com
SMTP TLS reporting
37
sending
MTA
sending
MUA
DNS(SEC)
resolver
auth
DNS
receiving
MTA
STARTTLS
SMTP
session
x509 certificate
fails to validate
against TLSA
cert/hash
© Men & Mice http://menandmice.com
SMTP TLS reporting
38
sending
MTA
sending
MUA
DNS(SEC)
resolver
auth
DNS
receiving
MTA
MTA requests
_smtp-tlsrpt TXT
record
_smtp-tlsrpt.example.com. TXT
_smtp-tlsrpt.example.com. IN TXT 
"v=TLSRPTv1;rua=mailto:reports@example.com"
© Men & Mice http://menandmice.com
SMTP TLS reporting
39
sending
MTA
sending
MUA
DNS(SEC)
resolver
auth
DNS
receiving
MTA
deliver
report mail
© Men & Mice http://menandmice.com
SMTP TLS reporting
Example JSON-Report
40
https://tools.ietf.org/html/draft-ietf-uta-smtp-tlsrpt
{
"organization-name": "Company-X",
"date-range": {
"start-datetime": "2016-04-01T00:00:00Z", "end-datetime": "2016-04-01T23:59:59Z"
},
"contact-info": "sts-reporting@company-x.com", "report-id": "5065427c-23d3-47ca-b6e0-946ea0e8c4be",
"policy": {
"policy-type": "sts",
"policy-string": "{ "version": "STSv1","mode": "report", "mx": ["*.example.com"], "max_age": 86400 }",
"policy-domain": "company-y.com", "mx-host": "*.mail.company-y.com"
},
"summary": {
"success-aggregate": 5326, "failure-aggregate": 303
}
"failure-details": [{
"result-type": "certificate-expired", "sending-mta-ip": "98.136.216.25",
"receiving-mx-hostname": "mx1.mail.company-y.com", "session-count": 100
}, {
"result-type": "starttls-not-supported", "sending-mta-ip": "98.22.33.99",
"receiving-mx-hostname": "mx2.mail.company-y.com", "session-count": 200,
"additional-information": "hxxps://reports.company-x.com/report_info?id=5065427c-23d3#StarttlsNotSupported"
}]
}
reporting
company
report time-
range 

(24 hours)
contact
information
used policy
report
summary
failure
details
© Men & Mice http://menandmice.com
Next
41
© Men & Mice http://menandmice.com
Men & Mice DNS Training
•Introduction to DNS & BIND Hands-On Class
•September 18 – 20, 2017 (Zurich, Switzerland)
42
https://www.menandmice.com/training/
© Men & Mice http://menandmice.com
Men & Mice DNS Training
•Introduction & Advanced DNS and BIND Topics
Hands-On Class
•September 18 – 22, 2017 (Zurich, Switzerland)
43
https://www.menandmice.com/training/
© Men & Mice http://menandmice.com
Men & Mice DNS Training
•DNS & BIND (German Language)
•May 22 – 24, 2017, Essen, DE
•DNSSEC and DANE (German Language)
•December 4-12, 2017, Essen, DE
44
http://linuxhotel.de/
© Men & Mice http://menandmice.com
our next webinar 

Certification Authority Authorization Record
The CAA Record (Certification Authority Authorization) is used to signal
which certification authority (CA) is allowed to issue x509 certificates for
a given domain. CAA creates a DNS mechanism that enables domain
name owners to whitelist CAs that are allowed to issue certificates for
their hostnames.
Starting from September 2017, certificate issuing CA must support the
CAA record.
We will explain the CAA record, how it works, how to enter CAA into a
zone and how certification authorities are about to use the record.
Join us for a 45 minutes webinar with a Q&A session at the end, on
Thursday, May 18th, 2017 at 5:00 PM CEST/ 3:00 PM GMT/ 11:00 AM
EDT / 8:00 AM PDT.
45
© Men & Mice http://menandmice.com
Thank you!
Questions? Comments?
46

More Related Content

What's hot

Composants et fonctionnement d'un Switch Cisco
Composants et fonctionnement d'un Switch Cisco Composants et fonctionnement d'un Switch Cisco
Composants et fonctionnement d'un Switch Cisco
DJENNA AMIR
 
Route Redistribution
Route RedistributionRoute Redistribution
Route Redistribution
Netwax Lab
 
Protocole IKE/IPsec
Protocole IKE/IPsecProtocole IKE/IPsec
Protocole IKE/IPsec
Thomas Moegli
 
Advancing IoT Communication Security with TLS and DTLS v1.3
Advancing IoT Communication Security with TLS and DTLS v1.3Advancing IoT Communication Security with TLS and DTLS v1.3
Advancing IoT Communication Security with TLS and DTLS v1.3
Hannes Tschofenig
 
Https
HttpsHttps
Futurex Secure Key Injection Solution
Futurex Secure Key Injection SolutionFuturex Secure Key Injection Solution
Futurex Secure Key Injection Solution
Greg Stone
 
Spanning tree protocol
Spanning tree protocolSpanning tree protocol
Spanning tree protocol
Muhammad Arshad
 
Introduction to SSH
Introduction to SSHIntroduction to SSH
Introduction to SSHHemant Shah
 
Advanced Captive Portal - pfSense Hangout June 2017
Advanced Captive Portal - pfSense Hangout June 2017Advanced Captive Portal - pfSense Hangout June 2017
Advanced Captive Portal - pfSense Hangout June 2017
Netgate
 
Securing TCP connections using SSL
Securing TCP connections using SSLSecuring TCP connections using SSL
Securing TCP connections using SSL
Sagar Mali
 
SSH - Secure Shell
SSH - Secure ShellSSH - Secure Shell
SSH - Secure Shell
Peter R. Egli
 
Ssl in a nutshell
Ssl in a nutshellSsl in a nutshell
Ssl in a nutshell
Frank Kelly
 
Programming smart contracts in solidity
Programming smart contracts in solidityProgramming smart contracts in solidity
Programming smart contracts in solidity
Emanuel Mota
 
SSL TLS Protocol
SSL TLS ProtocolSSL TLS Protocol
SSL TLS Protocol
Devang Badrakiya
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
Open ssl certificate (https) for hotspot mikrotik
Open ssl certificate (https) for hotspot mikrotikOpen ssl certificate (https) for hotspot mikrotik
Open ssl certificate (https) for hotspot mikrotik
Aldi Nor Fahrudin
 
Protocoles SSL/TLS
Protocoles SSL/TLSProtocoles SSL/TLS
Protocoles SSL/TLS
Thomas Moegli
 

What's hot (20)

Composants et fonctionnement d'un Switch Cisco
Composants et fonctionnement d'un Switch Cisco Composants et fonctionnement d'un Switch Cisco
Composants et fonctionnement d'un Switch Cisco
 
Route Redistribution
Route RedistributionRoute Redistribution
Route Redistribution
 
Protocole IKE/IPsec
Protocole IKE/IPsecProtocole IKE/IPsec
Protocole IKE/IPsec
 
Advancing IoT Communication Security with TLS and DTLS v1.3
Advancing IoT Communication Security with TLS and DTLS v1.3Advancing IoT Communication Security with TLS and DTLS v1.3
Advancing IoT Communication Security with TLS and DTLS v1.3
 
Https
HttpsHttps
Https
 
Futurex Secure Key Injection Solution
Futurex Secure Key Injection SolutionFuturex Secure Key Injection Solution
Futurex Secure Key Injection Solution
 
Spanning tree protocol
Spanning tree protocolSpanning tree protocol
Spanning tree protocol
 
Introduction to SSH
Introduction to SSHIntroduction to SSH
Introduction to SSH
 
Tuto pfsense
Tuto pfsenseTuto pfsense
Tuto pfsense
 
Advanced Captive Portal - pfSense Hangout June 2017
Advanced Captive Portal - pfSense Hangout June 2017Advanced Captive Portal - pfSense Hangout June 2017
Advanced Captive Portal - pfSense Hangout June 2017
 
Securing TCP connections using SSL
Securing TCP connections using SSLSecuring TCP connections using SSL
Securing TCP connections using SSL
 
SSH - Secure Shell
SSH - Secure ShellSSH - Secure Shell
SSH - Secure Shell
 
Ssl in a nutshell
Ssl in a nutshellSsl in a nutshell
Ssl in a nutshell
 
Programming smart contracts in solidity
Programming smart contracts in solidityProgramming smart contracts in solidity
Programming smart contracts in solidity
 
SSL TLS Protocol
SSL TLS ProtocolSSL TLS Protocol
SSL TLS Protocol
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
Open ssl certificate (https) for hotspot mikrotik
Open ssl certificate (https) for hotspot mikrotikOpen ssl certificate (https) for hotspot mikrotik
Open ssl certificate (https) for hotspot mikrotik
 
Ip multicast
Ip multicastIp multicast
Ip multicast
 
Protocoles SSL/TLS
Protocoles SSL/TLSProtocoles SSL/TLS
Protocoles SSL/TLS
 
Ch15
Ch15Ch15
Ch15
 

Similar to SMTP STS (Strict Transport Security) vs. SMTP with DANE

Automated Analysis of TLS 1.3
Automated Analysis of TLS 1.3Automated Analysis of TLS 1.3
Automated Analysis of TLS 1.3
vpnmentor
 
Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.
Jayanth Dwijesh H P
 
SSL/TLS
SSL/TLSSSL/TLS
Let's Encrypt + DANE
Let's Encrypt + DANELet's Encrypt + DANE
attachment_3998 (3).pdf
attachment_3998 (3).pdfattachment_3998 (3).pdf
attachment_3998 (3).pdf
ssuser02a37f1
 
White paper screen
White paper screenWhite paper screen
White paper screeneltincho89
 
Ssl and tls
Ssl and tlsSsl and tls
Ssl and tls
Rana assad ali
 
Computer network (4)
Computer network (4)Computer network (4)
Computer network (4)
NYversity
 
Getting Started with AWS IoT
Getting Started with AWS IoTGetting Started with AWS IoT
Getting Started with AWS IoT
Amazon Web Services
 
Transport Layer Security
Transport Layer Security Transport Layer Security
Transport Layer Security
Ibrahiem Mohammed
 
Curso: Redes y telecomunicaciones: 07 Protoclos TCP/IP
Curso: Redes y telecomunicaciones: 07 Protoclos TCP/IPCurso: Redes y telecomunicaciones: 07 Protoclos TCP/IP
Curso: Redes y telecomunicaciones: 07 Protoclos TCP/IP
Jack Daniel Cáceres Meza
 
HTTPS
HTTPSHTTPS
List of useful security related http headers
List of useful security related http headersList of useful security related http headers
List of useful security related http headers
한익 주
 
ION Santiago - DNSSEC and DANE Based Security for TLS
ION Santiago - DNSSEC and DANE Based Security for TLSION Santiago - DNSSEC and DANE Based Security for TLS
ION Santiago - DNSSEC and DANE Based Security for TLS
Deploy360 Programme (Internet Society)
 
ION Bucharest - Deploying DNSSEC
ION Bucharest - Deploying DNSSECION Bucharest - Deploying DNSSEC
ION Bucharest - Deploying DNSSEC
Deploy360 Programme (Internet Society)
 
BSET_Lecture_Crypto and SSL_Overview_FINAL
BSET_Lecture_Crypto and SSL_Overview_FINALBSET_Lecture_Crypto and SSL_Overview_FINAL
BSET_Lecture_Crypto and SSL_Overview_FINALGlenn Haley
 
ENSURING FAST AND SECURE GAMING APPLICATION DOWNLOADS GLOBALLY
ENSURING FAST AND SECURE GAMING APPLICATION DOWNLOADS GLOBALLYENSURING FAST AND SECURE GAMING APPLICATION DOWNLOADS GLOBALLY
ENSURING FAST AND SECURE GAMING APPLICATION DOWNLOADS GLOBALLY
CDNetworks
 
MTLS - Securing Microservice Architecture with Mutual TLS Authentication
MTLS - Securing Microservice Architecture with Mutual TLS AuthenticationMTLS - Securing Microservice Architecture with Mutual TLS Authentication
MTLS - Securing Microservice Architecture with Mutual TLS Authentication
Laurentiu Meirosu
 

Similar to SMTP STS (Strict Transport Security) vs. SMTP with DANE (20)

Automated Analysis of TLS 1.3
Automated Analysis of TLS 1.3Automated Analysis of TLS 1.3
Automated Analysis of TLS 1.3
 
Sequere socket Layer
Sequere socket LayerSequere socket Layer
Sequere socket Layer
 
Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.
 
SSL/TLS
SSL/TLSSSL/TLS
SSL/TLS
 
Let's Encrypt + DANE
Let's Encrypt + DANELet's Encrypt + DANE
Let's Encrypt + DANE
 
attachment_3998 (3).pdf
attachment_3998 (3).pdfattachment_3998 (3).pdf
attachment_3998 (3).pdf
 
White paper screen
White paper screenWhite paper screen
White paper screen
 
Lab08Email
Lab08EmailLab08Email
Lab08Email
 
Ssl and tls
Ssl and tlsSsl and tls
Ssl and tls
 
Computer network (4)
Computer network (4)Computer network (4)
Computer network (4)
 
Getting Started with AWS IoT
Getting Started with AWS IoTGetting Started with AWS IoT
Getting Started with AWS IoT
 
Transport Layer Security
Transport Layer Security Transport Layer Security
Transport Layer Security
 
Curso: Redes y telecomunicaciones: 07 Protoclos TCP/IP
Curso: Redes y telecomunicaciones: 07 Protoclos TCP/IPCurso: Redes y telecomunicaciones: 07 Protoclos TCP/IP
Curso: Redes y telecomunicaciones: 07 Protoclos TCP/IP
 
HTTPS
HTTPSHTTPS
HTTPS
 
List of useful security related http headers
List of useful security related http headersList of useful security related http headers
List of useful security related http headers
 
ION Santiago - DNSSEC and DANE Based Security for TLS
ION Santiago - DNSSEC and DANE Based Security for TLSION Santiago - DNSSEC and DANE Based Security for TLS
ION Santiago - DNSSEC and DANE Based Security for TLS
 
ION Bucharest - Deploying DNSSEC
ION Bucharest - Deploying DNSSECION Bucharest - Deploying DNSSEC
ION Bucharest - Deploying DNSSEC
 
BSET_Lecture_Crypto and SSL_Overview_FINAL
BSET_Lecture_Crypto and SSL_Overview_FINALBSET_Lecture_Crypto and SSL_Overview_FINAL
BSET_Lecture_Crypto and SSL_Overview_FINAL
 
ENSURING FAST AND SECURE GAMING APPLICATION DOWNLOADS GLOBALLY
ENSURING FAST AND SECURE GAMING APPLICATION DOWNLOADS GLOBALLYENSURING FAST AND SECURE GAMING APPLICATION DOWNLOADS GLOBALLY
ENSURING FAST AND SECURE GAMING APPLICATION DOWNLOADS GLOBALLY
 
MTLS - Securing Microservice Architecture with Mutual TLS Authentication
MTLS - Securing Microservice Architecture with Mutual TLS AuthenticationMTLS - Securing Microservice Architecture with Mutual TLS Authentication
MTLS - Securing Microservice Architecture with Mutual TLS Authentication
 

More from Men and Mice

Cisco Live 2019: New Best Practices for Hybrid and Multicloud Network Strategies
Cisco Live 2019: New Best Practices for Hybrid and Multicloud Network StrategiesCisco Live 2019: New Best Practices for Hybrid and Multicloud Network Strategies
Cisco Live 2019: New Best Practices for Hybrid and Multicloud Network Strategies
Men and Mice
 
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOS
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOSPart 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOS
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOS
Men and Mice
 
Part 2 - Local Name Resolution in Windows Networks
Part 2 - Local Name Resolution in Windows NetworksPart 2 - Local Name Resolution in Windows Networks
Part 2 - Local Name Resolution in Windows Networks
Men and Mice
 
Namespaces for Local Networks
Namespaces for Local NetworksNamespaces for Local Networks
Namespaces for Local Networks
Men and Mice
 
How to send DNS over anything encrypted
How to send DNS over anything encryptedHow to send DNS over anything encrypted
How to send DNS over anything encrypted
Men and Mice
 
The DNSSEC KSK of the root rolls
The DNSSEC KSK of the root rollsThe DNSSEC KSK of the root rolls
The DNSSEC KSK of the root rolls
Men and Mice
 
The CAA-Record for increased encryption security
The CAA-Record for increased encryption securityThe CAA-Record for increased encryption security
The CAA-Record for increased encryption security
Men and Mice
 
DNSSEC signing Tutorial
DNSSEC signing Tutorial DNSSEC signing Tutorial
DNSSEC signing Tutorial
Men and Mice
 
BIND 9 logging best practices
BIND 9 logging best practicesBIND 9 logging best practices
BIND 9 logging best practices
Men and Mice
 
DNS High-Availability Tools - Open-Source Load Balancing Solutions
DNS High-Availability Tools - Open-Source Load Balancing SolutionsDNS High-Availability Tools - Open-Source Load Balancing Solutions
DNS High-Availability Tools - Open-Source Load Balancing Solutions
Men and Mice
 
Fighting Abuse with DNS
Fighting Abuse with DNSFighting Abuse with DNS
Fighting Abuse with DNS
Men and Mice
 
What is new in BIND 9.11?
What is new in BIND 9.11?What is new in BIND 9.11?
What is new in BIND 9.11?
Men and Mice
 
Yeti DNS - Experimenting at the root
Yeti DNS - Experimenting at the rootYeti DNS - Experimenting at the root
Yeti DNS - Experimenting at the root
Men and Mice
 
Windows Server 2016 Webinar
Windows Server 2016 WebinarWindows Server 2016 Webinar
Windows Server 2016 Webinar
Men and Mice
 
Kea DHCP – the new open source DHCP server from ISC
Kea DHCP – the new open source DHCP server from ISCKea DHCP – the new open source DHCP server from ISC
Kea DHCP – the new open source DHCP server from ISC
Men and Mice
 
DNSTap Webinar
DNSTap WebinarDNSTap Webinar
DNSTap Webinar
Men and Mice
 
RIPE 71 and IETF 94 reports webinar
RIPE 71 and IETF 94 reports webinarRIPE 71 and IETF 94 reports webinar
RIPE 71 and IETF 94 reports webinar
Men and Mice
 
Keeping DNS server up-and-running with “runit
Keeping DNS server up-and-running with “runitKeeping DNS server up-and-running with “runit
Keeping DNS server up-and-running with “runit
Men and Mice
 
PowerDNS Webinar - Part 2
PowerDNS Webinar - Part 2PowerDNS Webinar - Part 2
PowerDNS Webinar - Part 2
Men and Mice
 
PowerDNS Webinar
PowerDNS Webinar PowerDNS Webinar
PowerDNS Webinar
Men and Mice
 

More from Men and Mice (20)

Cisco Live 2019: New Best Practices for Hybrid and Multicloud Network Strategies
Cisco Live 2019: New Best Practices for Hybrid and Multicloud Network StrategiesCisco Live 2019: New Best Practices for Hybrid and Multicloud Network Strategies
Cisco Live 2019: New Best Practices for Hybrid and Multicloud Network Strategies
 
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOS
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOSPart 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOS
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOS
 
Part 2 - Local Name Resolution in Windows Networks
Part 2 - Local Name Resolution in Windows NetworksPart 2 - Local Name Resolution in Windows Networks
Part 2 - Local Name Resolution in Windows Networks
 
Namespaces for Local Networks
Namespaces for Local NetworksNamespaces for Local Networks
Namespaces for Local Networks
 
How to send DNS over anything encrypted
How to send DNS over anything encryptedHow to send DNS over anything encrypted
How to send DNS over anything encrypted
 
The DNSSEC KSK of the root rolls
The DNSSEC KSK of the root rollsThe DNSSEC KSK of the root rolls
The DNSSEC KSK of the root rolls
 
The CAA-Record for increased encryption security
The CAA-Record for increased encryption securityThe CAA-Record for increased encryption security
The CAA-Record for increased encryption security
 
DNSSEC signing Tutorial
DNSSEC signing Tutorial DNSSEC signing Tutorial
DNSSEC signing Tutorial
 
BIND 9 logging best practices
BIND 9 logging best practicesBIND 9 logging best practices
BIND 9 logging best practices
 
DNS High-Availability Tools - Open-Source Load Balancing Solutions
DNS High-Availability Tools - Open-Source Load Balancing SolutionsDNS High-Availability Tools - Open-Source Load Balancing Solutions
DNS High-Availability Tools - Open-Source Load Balancing Solutions
 
Fighting Abuse with DNS
Fighting Abuse with DNSFighting Abuse with DNS
Fighting Abuse with DNS
 
What is new in BIND 9.11?
What is new in BIND 9.11?What is new in BIND 9.11?
What is new in BIND 9.11?
 
Yeti DNS - Experimenting at the root
Yeti DNS - Experimenting at the rootYeti DNS - Experimenting at the root
Yeti DNS - Experimenting at the root
 
Windows Server 2016 Webinar
Windows Server 2016 WebinarWindows Server 2016 Webinar
Windows Server 2016 Webinar
 
Kea DHCP – the new open source DHCP server from ISC
Kea DHCP – the new open source DHCP server from ISCKea DHCP – the new open source DHCP server from ISC
Kea DHCP – the new open source DHCP server from ISC
 
DNSTap Webinar
DNSTap WebinarDNSTap Webinar
DNSTap Webinar
 
RIPE 71 and IETF 94 reports webinar
RIPE 71 and IETF 94 reports webinarRIPE 71 and IETF 94 reports webinar
RIPE 71 and IETF 94 reports webinar
 
Keeping DNS server up-and-running with “runit
Keeping DNS server up-and-running with “runitKeeping DNS server up-and-running with “runit
Keeping DNS server up-and-running with “runit
 
PowerDNS Webinar - Part 2
PowerDNS Webinar - Part 2PowerDNS Webinar - Part 2
PowerDNS Webinar - Part 2
 
PowerDNS Webinar
PowerDNS Webinar PowerDNS Webinar
PowerDNS Webinar
 

Recently uploaded

RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 

Recently uploaded (20)

RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 

SMTP STS (Strict Transport Security) vs. SMTP with DANE

  • 1. © Men & Mice http://menandmice.com email transport security MTA-STS vs. DANE 1
  • 2. © Men & Mice http://menandmice.com 
 © ISC http://www.isc.org Agenda 1. Recap: the problem with Mail Transport Security 2. SMTP MTA Strict Transport Security (MTA-STS) 3. SMTP Security via Opportunistic DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) 4. SMTP TLS Reporting 2
  • 3. © Men & Mice http://menandmice.com the problem with email transport security 3
  • 4. © Men & Mice http://menandmice.com Short recap we've discussed email transport security before see previous Webinar – "DNSSEC & DANE – E-Mail security reloaded" (link below) for details so here just a short recap … 4 https://www.menandmice.com/resources/webinar-dnssec-and-dane-e-mail-security/
  • 5. © Men & Mice http://menandmice.com Transport Encryption Example of a protocol (HTTP/HTTPS) using a dedicated port und URI for encrypted communication 5 Port 80 - unencrypted Port 443 - encrypted
  • 6. © Men & Mice http://menandmice.com Transport Encryption SMTP (email) uses in-protocol signalling to bootstrap encryption. The signalling is unsecured and can be intercepted 6 Port 25 - unencrypted Greeting - unencrypted Greeting - unencrypted Feature-List - unencrypted Request encryption - unencrypted Greeting - encrypted
  • 7. © Men & Mice http://menandmice.com STARTTLS interception 7 https://www.eff.org/de/deeplinks/2014/11/starttls-downgrade-attacks https://arstechnica.com/security/2015/10/dont-count-on-starttls-to-automatically-encrypt-your-sensitive-e-mails/ https://blog.filippo.io/the-sad-state-of-smtp-encryption/
  • 8. © Men & Mice http://menandmice.com STARTTLS weakness the core problem: the receiving side cannot communicate its encryption policy the sending side cannot infer the encryption policy, it need to guess solutions available/worked on in the IETF: SMTP MTA Strict Transport Security (MTA-STS) SMTP with DANE (MTA-DANE) 8
  • 9. © Men & Mice http://menandmice.com SMTP MTA Strict Transport Security (MTA-STS) draft-ietf-uta-mta-sts 9
  • 10. © Men & Mice http://menandmice.com MTA-STS MTA-STS 
 (Message-Transfer-Agent Strict-Transport-Security) a mail receiving domain publishes its encryption policy •via a TXT record in DNS •plus a JSON document on an TLS secured web-server 10 draft-ietf-uta-mta-sts https://tools.ietf.org/html/draft-ietf-uta-mta-sts
  • 11. © Men & Mice http://menandmice.com MTA-STS for "example.com" the administrator of the domain "example.com" will publish a TXT-record at the "well-known" sub-domain "_mta-sts" containing the version number of this domains mail- transport encryption policy use of DNSSEC is recommended 11 _mta-sts.example.com. 900 IN TXT "v=STSv1; id=20170411;" MTA-STS version encryption policy version
  • 12. © Men & Mice http://menandmice.com MTA-STS for "example.com" the administrator of the domain "example.com" will also publish a JSON document at the "well-known" sub-domain "mta-sts" and the path ".well-known/mta-sts.json" 12 https://mta-sts.example.com/.well-known/mta-sts.json TLS secured path to JSON document mta-sts domain
  • 13. © Men & Mice http://menandmice.com MTA-STS for "example.com" example content of the JSON document 13 { "version": "STSv1", "mode": "enforce", "mx": [".mail.example.com"], "max_age": 123456 } MTA-STS version "enforce" or "report" Common Name or Subject Alternative Name DNS-ID present in the X.509 certificate presented by any MX receiving mail for this domain max lifetime of the policy
  • 14. © Men & Mice http://menandmice.com MTA-STS 14 sending MTA sending MUA DNS(SEC) resolver auth DNS receiving MTA policy webserver sendingdomain receivingdomain Internet
  • 15. © Men & Mice http://menandmice.com MTA-STS 15 sending MTA sending MUA DNS(SEC) resolver auth DNS receiving MTA policy webserver mail delivered to MTA
  • 16. © Men & Mice http://menandmice.com MTA-STS 16 sending MTA sending MUA DNS(SEC) resolver auth DNS receiving MTA policy webserver checks policy cache
  • 17. © Men & Mice http://menandmice.com MTA-STS 17 sending MTA sending MUA DNS(SEC) resolver auth DNS receiving MTA policy webserver request mta-sts TXT record in DNS _mta-sts.example.com. TXT ? _mta-sts.example.com. 900 IN TXT "v=STSv1; id=20170411;"
  • 18. © Men & Mice http://menandmice.com MTA-STS 18 sending MTA sending MUA DNS(SEC) resolver auth DNS receiving MTA policy webserver request JSON policy from web server https://mta-sts.example.com/.well-known/mta-sts.json verify TLS x509 security store policy in cache
  • 19. © Men & Mice http://menandmice.com MTA-STS 19 sending MTA sending MUA DNS(SEC) resolver auth DNS receiving MTA policy webserver STARTTLS SMTP session validate x509 certificate against policy
  • 20. © Men & Mice http://menandmice.com MTA-STS 20 sending MTA sending MUA DNS(SEC) resolver auth DNS receiving MTA policy webserver deliver mail
  • 21. © Men & Mice http://menandmice.com SMTP Security via Opportunistic DNS- Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) RFC 7672 21
  • 22. © Men & Mice http://menandmice.com MTA-DANE SMTP with DANE signals the encryption policy of a mail-server via DNSSEC secured DNS the TLSA record holds the full certificate (or a hash of the certificate) which can be verified against the certificate presented by the receiving mail server MTA-DANE is standardised in RFC 7672 (Oct 2015) 22
  • 23. © Men & Mice http://menandmice.com MTA-DANE 23 sending MTA sending MUA DNSSEC resolver auth DNS receiving MTA mail delivered to MTA
  • 24. © Men & Mice http://menandmice.com MTA-DANE 24 sending MTA sending MUA DNSSEC resolver auth DNS receiving MTA MTA requests TLSA record _25._tcp.mail01.example.com. TLSA _25._tcp.mail01.example.com. TLSA 3 1 1 (
 BDC6A9F8312BF24C81D[..]387A147 ) validate DNSSEC chain of trust
  • 25. © Men & Mice http://menandmice.com MTA-DANE 25 sending MTA sending MUA DNS(SEC) resolver auth DNS receiving MTA STARTTLS SMTP session validate x509 certificate against TLSA cert/hash
  • 26. © Men & Mice http://menandmice.com MTA-DANE 26 sending MTA sending MUA DNS(SEC) resolver auth DNS receiving MTA deliver mail
  • 27. © Men & Mice http://menandmice.com DANE success stories Cloudmark will support MTA-DANE in the upcoming release 5.2 Cloudmark has about 12% global market share (20% of mobile accounts) in the email business 27 https://blog.cloudmark.com/2017/03/27/dane-and-email-security/
  • 28. © Men & Mice http://menandmice.com DANE success stories large German mail service provider (web.de/gmx.de/1&1) support MTA-DANE over 50% market 
 share in Germany 28 https://de.slideshare.net/GMX_Deutschland/e-mailstudie-2015-deutsche-anbieter-bevorzugt https://www.heise.de/newsticker/meldung/Abhoersicherheit-Web-de-sichert-Mail-Transport-zusaetzlich-per-DANE-ab-3175333.html
  • 29. © Men & Mice http://menandmice.com DANE success stories the Dutch government requests MTA-DANE from government agencies 29 https://www.ncsc.nl/english/current-topics/news/ncsc-publishes-factsheet-secure-the-connections-of-mail-servers.html
  • 30. © Men & Mice http://menandmice.com DANE success stories German "Federal Office for Information Security" requires MTA-DANE for "secure e-mail" certification 30 https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Publikationen/TechnischeRichtlinien/TR03108/TR03108-1.pdf
  • 31. © Men & Mice http://menandmice.com Comparing 
 MTA-STS vs. MTA-DANE 31
  • 32. © Men & Mice http://menandmice.com MTA-STS vs. MTA-DANE MTA-STS does not require DNSSEC (but it is recommended) MTA-STS defines a policy cache MTA-STS requires x509 certificates that validate against a root-CA-certificate (no "self-signed" certs) MTA-STS requires a HTTPS server to serve the policy JSON document MTA-STS requires validation of the HTTPS connection to fetch the policy document 32
  • 33. © Men & Mice http://menandmice.com MTA-STS vs. MTA-DANE MTA-DANE does require DNSSEC MTA-DANE has no policy cache (but the TTL on TLSA records can work as such) MTA-DANE allows "self-signed" certificates MTA-DANE policy can be changed by switching the TLSA- record in DNS MTA-DANE TLS-cert rollover need to be in sync with TLSA record(s) MTA-DANE relies on the trust on the DNSSEC chain 33
  • 34. © Men & Mice http://menandmice.com SMTP TLS Reporting draft-ietf-uta-smtp-tlsrpt 34
  • 35. © Men & Mice http://menandmice.com SMTP TLS reporting SMTP TLS reporting defines a protocol to signal a reporting channel about SMTP encryption failures the sending MTA can report issues with TLS encryption to the receiving MTA operator SMTP TLS reporting can be used with MTA-STS and MTA-DANE Reports include: •MITM attacks (certification mismatch) •expired certificates •server not answering •certificate not validating against Root-CA •… 35 https://tools.ietf.org/html/draft-ietf-uta-smtp-tlsrpt
  • 36. © Men & Mice http://menandmice.com SMTP TLS reporting the administrator of a mail domain publishes the reporting policy as a TXT-record in DNS using the "well-known" subdomain "_smtp-tlsrpt" inside the mail domain Example (SMTP-Report):
 
 
 Example (HTTP-Report): 36 https://tools.ietf.org/html/draft-ietf-uta-smtp-tlsrpt _smtp-tlsrpt.example.com. IN TXT "v=TLSRPTv1;rua=mailto:reports@example.com" _smtp-tlsrpt.example.com. IN TXT "v=TLSRPTv1; rua=https://reporting.example.com/v1/tlsrpt"
  • 37. © Men & Mice http://menandmice.com SMTP TLS reporting 37 sending MTA sending MUA DNS(SEC) resolver auth DNS receiving MTA STARTTLS SMTP session x509 certificate fails to validate against TLSA cert/hash
  • 38. © Men & Mice http://menandmice.com SMTP TLS reporting 38 sending MTA sending MUA DNS(SEC) resolver auth DNS receiving MTA MTA requests _smtp-tlsrpt TXT record _smtp-tlsrpt.example.com. TXT _smtp-tlsrpt.example.com. IN TXT "v=TLSRPTv1;rua=mailto:reports@example.com"
  • 39. © Men & Mice http://menandmice.com SMTP TLS reporting 39 sending MTA sending MUA DNS(SEC) resolver auth DNS receiving MTA deliver report mail
  • 40. © Men & Mice http://menandmice.com SMTP TLS reporting Example JSON-Report 40 https://tools.ietf.org/html/draft-ietf-uta-smtp-tlsrpt { "organization-name": "Company-X", "date-range": { "start-datetime": "2016-04-01T00:00:00Z", "end-datetime": "2016-04-01T23:59:59Z" }, "contact-info": "sts-reporting@company-x.com", "report-id": "5065427c-23d3-47ca-b6e0-946ea0e8c4be", "policy": { "policy-type": "sts", "policy-string": "{ "version": "STSv1","mode": "report", "mx": ["*.example.com"], "max_age": 86400 }", "policy-domain": "company-y.com", "mx-host": "*.mail.company-y.com" }, "summary": { "success-aggregate": 5326, "failure-aggregate": 303 } "failure-details": [{ "result-type": "certificate-expired", "sending-mta-ip": "98.136.216.25", "receiving-mx-hostname": "mx1.mail.company-y.com", "session-count": 100 }, { "result-type": "starttls-not-supported", "sending-mta-ip": "98.22.33.99", "receiving-mx-hostname": "mx2.mail.company-y.com", "session-count": 200, "additional-information": "hxxps://reports.company-x.com/report_info?id=5065427c-23d3#StarttlsNotSupported" }] } reporting company report time- range 
 (24 hours) contact information used policy report summary failure details
  • 41. © Men & Mice http://menandmice.com Next 41
  • 42. © Men & Mice http://menandmice.com Men & Mice DNS Training •Introduction to DNS & BIND Hands-On Class •September 18 – 20, 2017 (Zurich, Switzerland) 42 https://www.menandmice.com/training/
  • 43. © Men & Mice http://menandmice.com Men & Mice DNS Training •Introduction & Advanced DNS and BIND Topics Hands-On Class •September 18 – 22, 2017 (Zurich, Switzerland) 43 https://www.menandmice.com/training/
  • 44. © Men & Mice http://menandmice.com Men & Mice DNS Training •DNS & BIND (German Language) •May 22 – 24, 2017, Essen, DE •DNSSEC and DANE (German Language) •December 4-12, 2017, Essen, DE 44 http://linuxhotel.de/
  • 45. © Men & Mice http://menandmice.com our next webinar 
 Certification Authority Authorization Record The CAA Record (Certification Authority Authorization) is used to signal which certification authority (CA) is allowed to issue x509 certificates for a given domain. CAA creates a DNS mechanism that enables domain name owners to whitelist CAs that are allowed to issue certificates for their hostnames. Starting from September 2017, certificate issuing CA must support the CAA record. We will explain the CAA record, how it works, how to enter CAA into a zone and how certification authorities are about to use the record. Join us for a 45 minutes webinar with a Q&A session at the end, on Thursday, May 18th, 2017 at 5:00 PM CEST/ 3:00 PM GMT/ 11:00 AM EDT / 8:00 AM PDT. 45
  • 46. © Men & Mice http://menandmice.com Thank you! Questions? Comments? 46