Response to the USG's proposal to use MTA-STS for securing E-Mail

by Viktor Dukhovni and Wes Hardaker

Executive Summary

We are responding to the proposal for requiring MTA-STS for securing E-Mail traffic within government networks. We have reviewed the proposal and request that the government reconsider the choice of MTA-STS as it is inferior to DANE-SMTP. The U.S. government is well positioned to deploy the superior DANE-SMTP since approximately 86% of federal .GOV domains are DNSSEC signed.

We believe that the U.S. Government’s selection of MTA-STS is driven by the desire to leverage cloud-hosted E-Mail solutions coupled with a perception that cloud E-Mail hosting providers can largely support only MTA-STS and not DANE-SMTP with DNSSEC.

In this response, we explain why DANE-SMTP is equally viable in the cloud, in government networks in general, provides better security than MTA-STS, avoids needless trust in potentially hostile nation-state CAs, is substantially more broadly deployed than MTA-STS and offers better interoperability with the broader Internet E-Mail ecosystem.

Background

Two different IETF protocols are defined for protecting server to server (MTA-to-MTA) SMTP transport against active attacks. They each have different deployment and security properties, which is the basis for why two different solutions exist.

DANE-SMTP

DANE-SMTP (RFC7672) uses DNSSEC to ensure:

MTA-STS

MTA-STS (RFC8461) is a less secure E-Mail protection mechanism,per its own specification description, than DANE-SMTP. It is useful only for domains that are for some reason unable to deploy DNSSEC. Its weaknesses are also documented in its specification in Section 10 of RFC8461.

MTA-STS publishes policy via a combination of untrusted DNS TXT records that signal the expected presence of an MTA-STS policy at a well-known URL for the receiving domain. MTA-STS requires implementation of an additional Internet protocol – HTTPS – within the SMTP mail delivery process. MTA-STS also relies on senders maintaining long-term policy caches. The use of these caches fail to protect traffic to E-Mail service to domains that are not yet in or have expired from the policy cache. This amounts to accepting “trust on first use” as an acceptable security policy, unlike DANE-SMTP which always guarantees security.

Security weaknesses of MTA-STS mitigated by DANE-SMTP

MTA-STS, as RFC8461 itself acknowledges, is less secure than its DANE-SMTP counterpart. Specifically:

The MTA-STS specification acknowledges these weaknesses in section 10 and section 2 which notes (last paragraph) that in order to avoid downgraded security MTA-STS success must not preempt DANE-SMTP policy failure.

Deployment metrics of secured SMTP technologies

Background: DNSSEC

In the past, DNSSEC, which is required for DANE-SMTP, was difficult to deploy and maintain. However, recent advances in authoritative server technologies have substantially addressed these concerns. For example, recent versions of BIND and Knot DNS have received high praise for their ability to automate management of DNSSEC signed zones with little burden on DNS operators.

Presently, there are over 16 million DNSSEC-signed domains and growing. An even more significant increase is expected shortly as GoDaddy, which controls 40% of the DNS registrar market space, starts rolling out DNSSEC support planned for hopefully Q4 2021. They have recently shared their technical plans to deploy DNSSEC to a substantial fraction of customer domains at recent DNS-OARC and ICANN DNS workshops .

MTA-STS

DNS TXT record data collected by Rapid7’s Project Sonar combined with a poll of any associated MTA-STS HTTPS policy records identifies just over 3000 domains with an MTA-STS “enforce” policy. Most of these are SOHO domains, and only 16 are in the Tranco top 1 million list:

Domain Tranco Rank
mail.ru 121
gmail.com 339
wp.pl 1313
googlemail.com 21216
sudo.ws 75948
list.ru 88540
socketlabs.com 96678
servus.at 141528
cybre.space 147271
bk.ru 239940
twinhelix.com 262763
inbox.ru 310966
courtesan.com 447401
azulle.com 505453
testssl.sh 621273
incolumitas.com 923382

DANE-SMTP

Use of DANE to secure server-to-server SMTP traffic is growing steadily. Today, DANE-SMTP is deployed for over 2.8 million domains — roughly a thousand times more than the number of MTA-STS domains.

There are 3701 DANE-SMTP protected domains in the Tranco top 1 million list, and 280 have ranks above all but the top 4 MTA-STS domains. The top 32 Tranco DANE-SMTP domains and their ranks are:

Domain Tranco Rank
debian.org 276
ietf.org 321
xfinity.com 695
web.de 806
gmx.net 942
openssl.org 974
freebsd.org 996
army.mil 1206
bund.de 1252
navy.mil 1336
comcast.net 1491
isc.org 1711
mpg.de 1789
protonmail.com 1894
cwi.nl 2023
univie.ac.at 2379
xs4all.nl 2640
one.com 2656
habr.com 2663
torproject.org 2748
startpage.com 3290
uni-muenchen.de 3529
tum.de 3766
bayern.de 3848
rijksoverheid.nl 4196
govtrack.us 4338
mail.com 4423
uib.no 4599
utwente.nl 4651
thalesgroup.com 4753
bundesregierung.de 4804
cuni.cz 4989

Software support for DANE and DANE-SMTP

Support for DANE and DANE-SMTP is widely available in both commercial and open source toolkits.

DANE-SMTP and cloud providers

The majority of the domains supporting DANE-SMTP protection are hosted by cloud service providers. Some of the better known providers are:

Enabling DANE-SMTP for a DNSSEC-signed customer domain whose email is hosted by a cloud SMTP service provider requires no additional effort on the customer’s part. They just need to publish MX records that reference the cloud provider’s designated DANE-SMTP-enabled SMTP servers.

The SMTP service provider can then enable DANE-SMTP across all such customer domains simply by ensuring that their SMTP servers are likewise in a signed DNS zone, and have published the associated DANE TLSA records.

Of the major US-based cloud E-Mail providers:

E-mail service providers can freely choose to offer multiple sets of SMTP server names to clients in order to provide different logical names best suited to a given group of customers. Consequently, deploying DANE-SMTP at cloud providers like Google and Microsoft can be achieved without requiring that any of their existing domains support DNSSEC. If a provider does not yet have a suitable DNSSEC-signed domain for providing DANE support, they can easily register a new one. (Google already has smtp.goog, and Microsoft has near-term plans to provision a new signed domain.).

Customers that desire to deploy DANE-SMTP need only point their MX records to cloud-provider SMTP server names within the service providers DNSSEC-signed domains, like the smtp.goog names. For example, a number of Google customers have elected to use the DNSSEC-signed MX names in anticipation of future DANE support, and there are open support tickets requesting that Google enable DANE-SMTP.

Google and Microsoft are the dominant email hosting providers in the U.S. market, and we see no substantive barriers to DANE-SMTP deployment by these providers. If the USG wishes to make use of these SMTP service providers, we believe they would enable DANE-SMTP quickly and easily to comply.

DANE-SMTP deployment within the USG

DANE-SMTP is already employed by DoD on the mail.mil MX hosts, which are the sole MX hosts of:

There are an additional 46 DoD domains that have partially deployed DANE-SMTP.

U.S. Government selection of DANE-SMTP vs MTA-STS

In networks where DNSSEC is deployed, DANE-SMTP should always be the protection mechanism of choice.

The only time in which MTA-STS should be deployed is in networks where DNSSEC security is not yet available and will not be available soon (although this space is shrinking rapidly). Since 86% of .gov domains already have DNSSEC, DANE-SMTP should be selected as the preferred E-Mail security mechanism for government networks to maximally protect USG E-Mail transmissions.

As some sending systems of interest to the USG might only support MTA-STS, it may be appropriate for a cloud hosting provider to support both MTA-STS and DANE-SMTP. In this case the USG domain would have to also publish and maintain a suitable MTA-STS policy.