SMTP Strict Transport Security
SMTP Strict Transport Security
Posted Apr 22, 2016 2:43 UTC (Fri) by raven667 (subscriber, #5198)In reply to: SMTP Strict Transport Security by neilbrown
Parent article: SMTP Strict Transport Security
Posted Apr 22, 2016 2:59 UTC (Fri)
by neilbrown (subscriber, #359)
[Link] (1 responses)
Both ends of the connection can choose which levels of security are acceptable. A MITM attacker can always force the connection to use the lowest mutually acceptable level. The particular details of the negotiation are only of interest to implementers.
Posted Apr 22, 2016 16:01 UTC (Fri)
by raven667 (subscriber, #5198)
[Link]
A better question is why not just have clients cache the highest level of protocol you've detected for any particular server, and not allow negotiations to any lower version of protocol, my guess is that this has been thought through more clearly by the implementers who found that explicit notification from the server to engage this behavior fixes some corner cases. Many servers who offer STARTTLS today do so with invalid or expired certificates, I'm not even sure it's well defined what should be verified in the certificate to validate a connection today, you would not want clients to reject invalid certificates deployed today, but you would want to reject invalid certificates if the server owner has signaled that they expect them to be valid. Even better is that this policy signalling is out of band, via HTTPS or DNSSEC, that is harder to MITM today.
SMTP Strict Transport Security
I don't see how that it different to a deliberate choice to abort a connection if STARTTLS isn't offered, or fails.
SMTP Strict Transport Security