Skip to main content

Open Pluggable Edge Services (OPES) SMTP Use Cases
draft-ietf-opes-smtp-use-cases-06

Revision differences

Document history

Date Rev. By Action
2012-08-22
06 (System) post-migration administrative database adjustment to the No Objection position for Sam Hartman
2012-08-22
06 (System) post-migration administrative database adjustment to the No Objection position for Russ Housley
2006-01-20
06 Amy Vezza State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza
2006-01-12
06 Amy Vezza IESG state changed to Approved-announcement sent
2006-01-12
06 Amy Vezza IESG has approved the document
2006-01-12
06 Amy Vezza Closed "Approve" ballot
2006-01-12
06 Amy Vezza State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Amy Vezza
2006-01-10
06 (System) New version available: draft-ietf-opes-smtp-use-cases-06.txt
2006-01-09
06 Russ Housley [Ballot Position Update] Position for Russ Housley has been changed to No Objection from Discuss by Russ Housley
2006-01-06
06 Sam Hartman [Ballot Position Update] Position for Sam Hartman has been changed to No Objection from Discuss by Sam Hartman
2006-01-06
05 (System) New version available: draft-ietf-opes-smtp-use-cases-05.txt
2005-11-14
06 Russ Housley
[Ballot discuss]
Section 4.5, Secure Email handling, raises security considerations
  that are not discussed in the security considerations section.  The
  security considerations section …
[Ballot discuss]
Section 4.5, Secure Email handling, raises security considerations
  that are not discussed in the security considerations section.  The
  security considerations section essentially says that RFC 3837 covers
  all of the things that need to be said.  However, RFC 3837 does not
  discuss the placement of cryptographic keys in the OPES server that
  would be needed to implement the services described in section 4.5.

  RFC 3837 says:
  >
  > Generally, OPES services cannot be applied to data protected with
  > end-to-end encryption methods because the decryption key cannot be
  > shared with OPES processors without compromising the intended
  > confidentiality of the data.  This means that if the endpoint
  > policies permit OPES services, the data must either be transmitted
  > without confidentiality protections or an alternative model to end-
  > to-end encryption must be developed, one in which the confidentiality
  > is guaranteed hop-by-hop.  Extending the end-to-end encryption model
  > is out of scope of this work.

  Please discuss end-to-end encryption in the security considerations.

  Please discuss the addition of digital signatures by the OPES server
  in the security considerations.

RH> Draft -04 addresses my end-to-end encryption comment; however, the
RH> digital signature comment was not addressed.
2005-11-14
06 Russ Housley
[Ballot discuss]
Section 4.5, Secure Email handling, raises security considerations
  that are not discussed in the security considerations section.  The
  security considerations section …
[Ballot discuss]
Section 4.5, Secure Email handling, raises security considerations
  that are not discussed in the security considerations section.  The
  security considerations section essentially says that RFC 3837 covers
  all of the things that need to be said.  However, RFC 3837 does not
  discuss the placement of cryptographic keys in the OPES server that
  would be needed to implement the services described in section 4.5.

  RFC 3837 says:
  >
  > Generally, OPES services cannot be applied to data protected with
  > end-to-end encryption methods because the decryption key cannot be
  > shared with OPES processors without compromising the intended
  > confidentiality of the data.  This means that if the endpoint
  > policies permit OPES services, the data must either be transmitted
  > without confidentiality protections or an alternative model to end-
  > to-end encryption must be developed, one in which the confidentiality
  > is guaranteed hop-by-hop.  Extending the end-to-end encryption model
  > is out of scope of this work.

  Please discuss end-to-end encryption in the security considerations.

  Please discuss the addition of digital signatures by the OPES server
  in the security considerations.

RH> Sraft -04 addresses my end-to-end encryption comment; however, the
RH> digital signature comment was not addressed.
2005-11-11
06 (System) Sub state has been changed to AD Follow up from New Id Needed
2005-11-11
04 (System) New version available: draft-ietf-opes-smtp-use-cases-04.txt
2005-09-29
06 Amy Vezza State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Amy Vezza
2005-09-29
06 Margaret Cullen [Ballot Position Update] New position, No Objection, has been recorded for Margaret Wasserman by Margaret Wasserman
2005-09-29
06 Allison Mankin [Ballot Position Update] New position, No Objection, has been recorded for Allison Mankin by Allison Mankin
2005-09-28
06 (System) State Changes to IESG Evaluation from IESG Evaluation - Defer by system
2005-09-16
06 (System) Removed from agenda for telechat - 2005-09-15
2005-09-15
06 Sam Hartman
[Ballot discuss]
I'm concerned that the architecture envisioned by this document does
not support some of the IAB recommendations in RFC 3238.  I believe …
[Ballot discuss]
I'm concerned that the architecture envisioned by this document does
not support some of the IAB recommendations in RFC 3238.  I believe
these recommendations are desirable and so I'm holding a discuss.

I have two concerns.  First, the document proposes that OPES focus on
MTA behavior rather than MSA or MDA behavior.  This seems inconsistent
with recommendation 2.1:

  (2.1) One-party consent: An OPES framework standardized in the IETF
      must require that the use of any OPES service be explicitly
        authorized by one of the application-layer end-hosts (that is, either
            the content provider or the client).
           
I realize this recommendation is targeted at the web, but the email
form of this recommendation would probably be something like an OPES
SMTP binding standardized in the IETF MUST require that the OPES
service is explicitly authorized by either the message sender or
recipient.  It may be possible to do this while focusing on MTAs, but
significant thought (not evident in this document) needs to be given
to this issue.

My second concern is that the document anticipates only a profile of
OCP for SMTP, not a profile of SMTP for OPES.  The distinction is
important.  The first case does not focus on describing or
standardizing behavior changes to the SMTP server, only standardizing
the interactions of the SMTP server with the OCP server.  I understand
this approach was taken for HTTP; I think it is a mistake there and an
even more critical mistake for SMTP.  Here are some issues where the
SMTP server behavior needs to be considered.  First, the client needs
to communicate its explicit authorization.  I can believe that servers
may be preconfigured, but it seems that given the wide variety of MUAs
out there, if explicit authorization is given, that mechanism needs to
be standardized.

Second, I don't see how IAB recommendation 2.2 (the client must invoke
OPES by IP address for client services) can be addressed without
specifying changes to the SMTP server.


Similarly, providing senders the required tracing information will
require changes to the SMTP server beyond the OCP interactions.

One possible response to this discuss is that these issues are out of
scope for this document.  That's fine provided you tell me what
document I can expect to review these issues in.  I believe that the
review needs to be early enough that not too much is fixed and that if
major questions come up they can be addressed.  As such, I recommend
the answer not be the OCP SMTP document.
2005-09-15
06 Sam Hartman [Ballot Position Update] New position, Discuss, has been recorded for Sam Hartman by Sam Hartman
2005-09-15
06 David Kessens [Ballot Position Update] New position, No Objection, has been recorded for David Kessens by David Kessens
2005-09-15
06 Bert Wijnen [Ballot Position Update] Position for Bert Wijnen has been changed to No Objection from Undefined by Bert Wijnen
2005-09-15
06 Bert Wijnen
[Ballot comment]
In the example in sect 3.1.1 it uses IP addresses:

      C: HELO [192.168.0.138]
      S: 250 mail.example.com Hello …
[Ballot comment]
In the example in sect 3.1.1 it uses IP addresses:

      C: HELO [192.168.0.138]
      S: 250 mail.example.com Hello [192.168.0.138]

that do not conform to RFC3330 which sets aside a range
of IP addresses (192.0.2.0/24) for use in examples.
2005-09-15
06 Bert Wijnen [Ballot Position Update] New position, Undefined, has been recorded for Bert Wijnen by Bert Wijnen
2005-09-15
06 Margaret Cullen State Changes to IESG Evaluation - Defer from IESG Evaluation by Margaret Wasserman
2005-09-15
06 Bill Fenner
[Ballot comment]
I'm not sure I can reconcile the first sentence of the last paragraph of section 3 with the first sentence of section 3.1: …
[Ballot comment]
I'm not sure I can reconcile the first sentence of the last paragraph of section 3 with the first sentence of section 3.1:

  In this work the OPES processor may be any agent that is
  participating in SMTP exchanges, including an MSA, MTA, MDA, and MUA.
[...]
  In this work an MTA is the OPES processor device that sits in the
  data stream of the SMTP protocol.

The first mail server in Figure 3 is both an MSA and an MTA; if the OCP callout happens during the MSA's reception of the message from the MUA then that seems to contradict the second of the above sentences.


Is there a reason for the ordering of OCP first or last in "OCP/SMTP" vs. "HTTP/OCP"?  [4] never seems to refer to itself as HTTP/OCP.


Do any of these use cases enable 'graylisting'?  4.8 seems close except it seems to only mention permanent rejection.
2005-09-15
06 Bill Fenner [Ballot Position Update] New position, No Objection, has been recorded for Bill Fenner by Bill Fenner
2005-09-14
06 Michelle Cotton IANA Comments:
No IANA Considerations section.
We understand this document to have NO IANA Actions.
2005-09-14
06 Brian Carpenter [Ballot Position Update] Position for Brian Carpenter has been changed to No Objection from Undefined by Brian Carpenter
2005-09-14
06 Brian Carpenter
[Ballot comment]
Nits from Gen-ART review by Spencer Dawkins:

I found a few nits, probably AUTH-48, but just to write them down now:

- In …
[Ballot comment]
Nits from Gen-ART review by Spencer Dawkins:

I found a few nits, probably AUTH-48, but just to write them down now:

- In the last paragraph of the Introduction, there were just a few too many pronouns for me to easily parse

  This work focuses on SMTP based services that want to modify command
  values and those that want to block commands by defining an error
  response that the MTA should send in response to the response it
  received.

I wasn't sure what "those" and "it" were actually pointing to (I could guess, but I'd be guessing).

- OCP isn't expanded on first use.

- The text under Figure 3 refers to "the MTA (the OPES processor)", but there are three MTAs in Figure 3, all with OCP callout servers. Should this have been plural, or was the reference to one of the three MTAs (and, if so, which one)?

- In Section 4.1, one of the actions is "The attachment is removed by an error message" - should this be "replaced by an error message"? "removed, and an error message generated"? Or did I misunderstand?

- In Section 5, I think what you're saying is "this document does not describe any new protocol functionality, it only shows use cases for OPES with SMTP, so does not introduce any new security considerations beyond current considerations for SMTP and OPES" - sorry, but we see enough "no new security considerations" that we get suspicious quickly!
2005-09-14
06 Brian Carpenter [Ballot Position Update] New position, Undefined, has been recorded for Brian Carpenter by Brian Carpenter
2005-09-14
06 Mark Townsley [Ballot Position Update] New position, No Objection, has been recorded for Mark Townsley by Mark Townsley
2005-09-12
06 Scott Hollenbeck [Ballot Position Update] New position, No Objection, has been recorded for Scott Hollenbeck by Scott Hollenbeck
2005-09-09
06 Russ Housley
[Ballot discuss]
Section 4.5, Secure Email handling, raises security considerations
  that are not discussed in the security considerations section.  The
  security considerations section …
[Ballot discuss]
Section 4.5, Secure Email handling, raises security considerations
  that are not discussed in the security considerations section.  The
  security considerations section essentially says that RFC 3837 covers
  all of the things that need to be said.  However, RFC 3837 does not
  discuss the placement of cryptographic keys in the OPES server that
  would be needed to implement the services described in section 4.5.

  RFC 3837 says:
  >
  > Generally, OPES services cannot be applied to data protected with
  > end-to-end encryption methods because the decryption key cannot be
  > shared with OPES processors without compromising the intended
  > confidentiality of the data.  This means that if the endpoint
  > policies permit OPES services, the data must either be transmitted
  > without confidentiality protections or an alternative model to end-
  > to-end encryption must be developed, one in which the confidentiality
  > is guaranteed hop-by-hop.  Extending the end-to-end encryption model
  > is out of scope of this work.

  Please discuss end-to-end encryption in the security considerations.

  Please discuss the addition of digital signatures by the OPES server
  in the security considerations.
2005-09-09
06 Russ Housley [Ballot Position Update] New position, Discuss, has been recorded for Russ Housley by Russ Housley
2005-09-09
06 Ted Hardie [Ballot Position Update] New position, Yes, has been recorded for Ted Hardie
2005-09-09
06 Ted Hardie Ballot has been issued by Ted Hardie
2005-09-09
06 Ted Hardie Created "Approve" ballot
2005-09-09
06 (System) Ballot writeup text was added
2005-09-09
06 (System) Last call text was added
2005-09-09
06 (System) Ballot approval text was added
2005-09-06
06 Ted Hardie State Changes to IESG Evaluation from Publication Requested by Ted Hardie
2005-09-06
06 Ted Hardie Placed on agenda for telechat - 2005-09-15 by Ted Hardie
2005-07-21
06 Dinara Suleymanova Draft Added by Dinara Suleymanova in state Publication Requested
2005-07-15
03 (System) New version available: draft-ietf-opes-smtp-use-cases-03.txt
2005-07-06
02 (System) New version available: draft-ietf-opes-smtp-use-cases-02.txt
2005-06-15
01 (System) New version available: draft-ietf-opes-smtp-use-cases-01.txt
2005-02-10
00 (System) New version available: draft-ietf-opes-smtp-use-cases-00.txt