Email relaying opportunistic encryption technologies #603

Closed
opened 2018-11-19 09:15:54 +00:00 by ghost · 24 comments
ghost commented 2018-11-19 09:15:54 +00:00 (Migrated from github.com)

While most of us agree that PGP is the best way secure the contents of email, this sometimes is not possible and opportunistic TLS is still required to secure collection of email metadata when it is being relayed.

I think with our email table we should reward and try to motivate email providers (approach them) to adopt technologies which help secure transparently encryption between email servers and prevent downgrade attacks such as SPF, DKIM, DMARC, DNSSEC, DANE, MTA-STS RFC 8461 (September 2018) and SMTP TLS Reporting RFC 8460 (September 2018). We could reward them with a "gold, silver and bronze" star for adopting these technologies. For example for a Gold star everything would need to be supported (including both DANE and MTA-STS), we would have to determine the exact criteria still.

We should ultimately be encouraging these providers to join the StartTLS-Everywhere PolicyList run by the EFF. See their FAQ for more details.

Encryption Testing

SPF/DKIM/DMARC

Some background:

Why you should use DANE and MTA-STS

Some Initial tests
https://www.hardenize.com/report/mailbox.org/1542685973
https://www.hardenize.com/report/protonmail.com/1542685980
https://www.hardenize.com/report/tutanota.com/1542685984
https://www.hardenize.com/report/disroot.org/1542685841
https://www.hardenize.com/report/posteo.de/1542685991
https://www.hardenize.com/report/mailfence.com/1542685995
https://www.hardenize.com/report/runbox.com/1542685998
https://www.hardenize.com/report/startmail.com/1542686000
https://www.hardenize.com/report/kolabnow.com/1542685876
https://www.hardenize.com/report/neomailbox.com/1548419015

While most of us agree that [PGP](https://en.wikipedia.org/wiki/Pretty_Good_Privacy) is the best way secure the contents of email, this sometimes is not possible and [opportunistic TLS](https://en.wikipedia.org/wiki/Opportunistic_TLS#Weaknesses_and_mitigations) is still required to secure collection of email metadata when it is being relayed. I think with our [email table](https://www.privacytools.io/#email) we should reward and try to motivate email providers (approach them) to adopt technologies which help secure transparently encryption between email servers and prevent downgrade attacks such as [SPF](https://en.wikipedia.org/wiki/Sender_Policy_Framework), [DKIM](https://en.wikipedia.org/wiki/DKIM), [DMARC](https://en.wikipedia.org/wiki/DMARC), [DNSSEC](https://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions), [DANE](https://en.wikipedia.org/wiki/DNS-based_Authentication_of_Named_Entities), [MTA-STS RFC 8461 (September 2018)](https://tools.ietf.org/html/rfc8461) and [SMTP TLS Reporting RFC 8460 (September 2018)](https://tools.ietf.org/html/rfc8460). We could reward them with a "gold, silver and bronze" star for adopting these technologies. For example for a Gold star everything would need to be supported (including both DANE and MTA-STS), we would have to determine the exact criteria still. We should ultimately be encouraging these providers to join the [StartTLS-Everywhere PolicyList](https://starttls-everywhere.org/policy-list) run by the EFF. See their [FAQ](https://starttls-everywhere.org/faq) for more details. **Encryption Testing** - https://www.hardenize.com - this one is really comprehensive - https://starttls-everywhere.org - https://ssl-tools.net/mailservers - https://aykevl.nl/apps/mta-sts - https://testssl.sh `testssl.sh --starttls smtp example.com | aha --black --title "(smtp) example.com:587" > smtp.example.com.html` - `nmap --script ssl-enum-ciphers -p 465 example.com` **SPF/DKIM/DMARC** - https://www.mail-tester.com (SPF/DKIM/DMARC) - https://www.mail-tester.com/spf-dkim-check **Some background:** - https://www.netnod.se/sites/default/files/2016-12/Anders_Berggren_can_haz_secure_mail.pdf - https://www.internetsociety.org/blog/2014/09/email-hijacking-new-research-shows-why-we-need-dnssec-now - https://www.sidn.nl/a/dnssec/starttls-and-dane-may-be-made-mandatory-for-outgoing-mail-as-well - https://fastmail.blog/2016/12/20/dnssec-dane - https://www.hardenize.com/blog/mta-sts - https://www.hardenize.com/blog/smtp-tls-reporting-tls-rpt - https://fastmail.blog/2018/06/27/lets-starttls-everywhere - https://halon.io/blog/gmails-new-tls-icon/ - https://blog.google/products/gmail/making-email-safer-for-you-posted-by/ - https://www.fastmail.com/help/technical/senderauthentication.html **Why you should use DANE and MTA-STS** - https://news.ycombinator.com/item?id=18097564 - https://uhxy.com/technology/2018/01/21/DANE-vs-MTA-STS.html **Some Initial tests** https://www.hardenize.com/report/mailbox.org/1542685973 https://www.hardenize.com/report/protonmail.com/1542685980 https://www.hardenize.com/report/tutanota.com/1542685984 https://www.hardenize.com/report/disroot.org/1542685841 https://www.hardenize.com/report/posteo.de/1542685991 https://www.hardenize.com/report/mailfence.com/1542685995 https://www.hardenize.com/report/runbox.com/1542685998 https://www.hardenize.com/report/startmail.com/1542686000 https://www.hardenize.com/report/kolabnow.com/1542685876 https://www.hardenize.com/report/neomailbox.com/1548419015
ghost commented 2018-11-19 16:16:02 +00:00 (Migrated from github.com)

Good idea.

We could reward them with a "gold, silver and bronze" star for adopting these technologies.

The names could be something like "Great security", "Very good security", and "Good security". I suggest adding a reason behind each badge/star, explaining what's good/bad. Similar to how the * is used here, but we'd use numbers.

Good idea. > We could reward them with a "gold, silver and bronze" star for adopting these technologies. The names could be something like "Great security", "Very good security", and "Good security". I suggest adding a reason behind each badge/star, explaining what's good/bad. Similar to how the `*` is used [here](https://www.privacytools.io/#kdl), but we'd use numbers.
ghost commented 2018-11-19 16:26:29 +00:00 (Migrated from github.com)

"gold, silver and bronze" star

Ah yeah that wasn't literal, I hadn't really thought about the award would be called. But yes you're right.

I suggest adding a reason behind each badge/star

Yes I will define that over the coming days here, then I'll approach each of them and ask if they're looking at improving things and let them know about the intention to add it to privacytools.io. At the moment none of them would probably get a gold star.

The RFCs for MTA-STS and TLS-RPT are still very new so these changes won't go in for a while and I want to let them have a reasonable amount of time to do it.

> "gold, silver and bronze" star Ah yeah that wasn't literal, I hadn't really thought about the award would be called. But yes you're right. > I suggest adding a reason behind each badge/star Yes I will define that over the coming days here, then I'll approach each of them and ask if they're looking at improving things and let them know about the intention to add it to privacytools.io. At the moment none of them would probably get a gold star. The RFCs for MTA-STS and TLS-RPT are still very new so these changes won't go in for a while and I want to let them have a reasonable amount of time to do it.
ghost commented 2018-11-20 02:36:58 +00:00 (Migrated from github.com)

Edit from dngray: Remove "good" category, as we will only recommend great providers.

I think the preliminary categories will be and will be based on, domain security, SMTP encryption and authentication.

I have decided I think we should only have two categories, Good and Great. Something with 'poor' security should never be recommended and therefore should be removed.

Good and Great both require to be on the StartTLS-Everywhere Policy List, currently only mailfence.com, startmail.com and kolabnow.com are not but meet the requirements to be added.

Great

Domain Security:

SMTP:

Authentication and Policy:
No errors for the following:

  • SPF
  • DKIM
  • DMARC (requires DKIM and SPF) p may be none, quarantine or reject.

Other TLS RFCs:

Must have a plan for:

Providers to be removed

No domain control

SMTP:

  • Opportunistic TLS failed Unforgivable errors include:

    • Insecure anonymous ciphers eg ECDH_anon or DH_anon
    • EXPORT ciphers,
    • DES, RC2, RC4 etc
    • Insecure/Weak key exchange, (anonymous ciphers, DHE parameters below 2048bit or ECDHE parameters below 256 bit),
    • SSLv3 or lower support
    • No PFS
  • Neither DANE or MTA-STS+TLS-RPT

Authentication and Policy:

Other TLS RFCs:

Other Warnings

  • Blocking Hardenize tools or those used for auditing.

We should also encourage them to make sure they have no security errors on their WWW. Many users access email via a web interface eg:

Application Security

  • Frame Options - X-Frame-Options
  • XSS Protection - X-XSS-Protection
  • Content Type Options - X-Content-Type-Options

Note I left off Expect-CT currently a draft.

Any feedback would be appreciated I'll begin contacting the providers in a week for their thoughts on this.

**Edit from dngray: Remove "good" category, as we will only recommend great providers.** I think the preliminary categories will be and will be based on, domain security, SMTP encryption and authentication. I have decided I think we should only have two categories, **Good** and **Great**. Something with 'poor' security should never be recommended and therefore should be removed. **Good** and **Great** both require to be on the [StartTLS-Everywhere Policy List](https://starttls-everywhere.org/policy-list), currently only [mailfence.com](https://starttls-everywhere.org/results/?mailfence.com), [startmail.com](https://starttls-everywhere.org/results/?startmail.com) and [kolabnow.com](https://starttls-everywhere.org/results/?kolabnow.com) are not but meet the requirements to be added. ### Great **Domain Security:** - [DNSSEC](https://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions) - [DNS Certification Authority Authorization (CAA) Resource Record RFC844](https://tools.ietf.org/html/rfc6844) **SMTP:** - [TLS](https://en.wikipedia.org/wiki/Opportunistic_TLS) - No errors - Certificates - No errors (errors in chain, not matching domain etc) - [MTA-STS](https://tools.ietf.org/html/rfc8461) - [TLS-RPT](https://tools.ietf.org/html/rfc8460) - [DANE](https://en.wikipedia.org/wiki/DNS-based_Authentication_of_Named_Entities) - [STARTTLS-Everywhere](https://starttls-everywhere.org) policy list registration **Authentication and Policy:** No errors for the following: - [SPF](https://en.wikipedia.org/wiki/Sender_Policy_Framework) - [DKIM](https://en.wikipedia.org/wiki/DomainKeys_Identified_Mail) - [DMARC](https://en.wikipedia.org/wiki/DMARC) (requires DKIM and SPF) `p` may be `none`, `quarantine` or `reject`. **Other TLS RFCs:** - **Server suite preference** of TLS 1.2 or later - [Cleartext Considered Obsolete: Use of Transport Layer Security (TLS) for Email Submission and Access RFC 8314](https://datatracker.ietf.org/doc/html/rfc8314) (note only if submission over SMTP is permitted) See https://github.com/privacytoolsIO/privacytools.io/issues/603#issuecomment-442549165 Must have a plan for: - [Deprecating TLSv1.0 and TLSv1.1](https://datatracker.ietf.org/doc/draft-ietf-tls-oldversions-deprecate) See https://github.com/privacytoolsIO/privacytools.io/issues/603#issuecomment-443403963 ### Providers to be removed **No domain control** - [DNSSEC](https://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions) or - [DNS Certification Authority Authorization (CAA) Resource Record RFC844](https://tools.ietf.org/html/rfc6844) **SMTP:** - Opportunistic TLS failed **Unforgivable errors include:** - Insecure anonymous ciphers eg `ECDH_anon` or `DH_anon` - [EXPORT ciphers](https://en.wikipedia.org/wiki/Export_of_cryptography_from_the_United_States#PC_era), - [DES](https://en.wikipedia.org/wiki/Data_Encryption_Standard), [RC2](https://en.wikipedia.org/wiki/RC2), [RC4](https://en.wikipedia.org/wiki/RC4) etc - Insecure/Weak key exchange, (anonymous ciphers, DHE parameters below 2048bit or ECDHE parameters below 256 bit), - SSLv3 or lower support - No [PFS](https://en.wikipedia.org/wiki/Forward_secrecy) - Neither DANE or MTA-STS+TLS-RPT **Authentication and Policy:** - No [SPF](https://en.wikipedia.org/wiki/Sender_Policy_Framework) or - No [DKIM](https://en.wikipedia.org/wiki/DomainKeys_Identified_Mail) - No [DMARC](https://en.wikipedia.org/wiki/DMARC) (requires DKIM and SPF). **Other TLS RFCs:** - No **Server suite preference** defined. - [Cleartext Considered Obsolete: Use of Transport Layer Security (TLS) for Email Submission and Access RFC 8314](https://datatracker.ietf.org/doc/html/rfc8314) (note only if submission over SMTP is permitted) See https://github.com/privacytoolsIO/privacytools.io/issues/603#issuecomment-442549165 - No plan for [Deprecating TLSv1.0 and TLSv1.1](https://datatracker.ietf.org/doc/draft-ietf-tls-oldversions-deprecate) See https://github.com/privacytoolsIO/privacytools.io/issues/603#issuecomment-443403963 for information about vendor support, marketshare statistics. **Other Warnings** - Blocking Hardenize tools or those used for auditing. **We should also encourage them to make sure they have no security errors on their WWW. Many users access email via a web interface eg:** - Certificates - No errors (errors in chain, not matching domain etc) - TLS (eg PFS, Cipher/TLS preferences eg ECDHE/DHE and TLS 1.2+, authenticated encryption [GCM](https://en.wikipedia.org/wiki/Galois/Counter_Mode) or [CHACHA20](https://en.wikipedia.org/wiki/Salsa20#ChaCha_variant)) - DANE (any errors) - Mixed Content (not everything over HTTPS) - [HSTS (Strict Transport Security)](https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security) - [CSP (Content Security Policy)](https://en.wikipedia.org/wiki/Content_Security_Policy) - [SRI (Subresource Integrity)](https://en.wikipedia.org/wiki/Subresource_Integrity) **Application Security** - Frame Options - X-Frame-Options - XSS Protection - X-XSS-Protection - Content Type Options - X-Content-Type-Options Note I left off [Expect-CT](https://datatracker.ietf.org/doc/draft-ietf-httpbis-expect-ct) currently a draft. Any feedback would be appreciated I'll begin contacting the providers in a week for their thoughts on this.
ghost commented 2018-11-20 09:01:16 +00:00 (Migrated from github.com)

We can remove some but either way the ratings should be something like Good/Very good/Great as to not sound like we're recommending shitty providers.

I think the preliminary categories will be and will be based on, domain security, SMTP encryption and authentication.

Agreed.

Out of the providers we recommend I only use ProtonMail, so I don't know if we do this already, but we should only recommend providers with client-side encryption. Simply having SMTP TLS while claiming to encrypt things on the backend isn't good enough.

We can remove some but either way the ratings should be something like Good/Very good/Great as to not sound like we're recommending shitty providers. > I think the preliminary categories will be and will be based on, domain security, SMTP encryption and authentication. Agreed. Out of the providers we recommend I only use ProtonMail, so I don't know if we do this already, but we should only recommend providers with client-side encryption. Simply having SMTP TLS while claiming to encrypt things on the backend isn't good enough.
ghost commented 2018-11-20 09:10:45 +00:00 (Migrated from github.com)

We can remove some but either way the ratings should be something like Good/Very good/Great as to not sound like we're recommending shitty providers.

I have change it to "Good" and "Great" the "Providers to be Removed" list well those things I don't think are really negotiable. I shall wait to see what their input is on that.

Realistically I think the only providers that should get removed are the ones that have no plans to fix anything and don't want to talk to me about it. I would then be starting to look at them as unmaintained. Part of running an email provider is to stay current with the RFCs that the rest of the industry uses. This has primarily been the argument used against federated and decentralized protocols in the past but we all know the dangers of having everything centralized 😉. What I am hoping is that the providers realize that they are being compared against each other.

I don't believe this issue should be hurried as it may take time for them to implement some of these things (MTA-STS for example is new). They also may already have a timeline on when they want to do it with testing as some of these things require careful planning eg DNSSEC and DANE and can have pretty bad consequences if you 'do it wrong' ie The DANE fail list and DANE - Common Mistakes.

Out of the providers we recommend I only use ProtonMail, so I don't know if we do this already, but we should only recommend providers with client-side encryption. Simply having SMTP TLS while claiming to encrypt things on the backend isn't good enough.

The unfortunate fact is PGP is really only good for protecting the contents of an email. Client-side encryption isn't always possible either and will often be disabled by users in a pragmatic world where they want a copy of the email to in the recipient's inbox and not a https link to the email.

There are two sides of the argument as well, regarding client-side encryption. Some say that JavaScript client-side encryption enhances the surface area hugely and a provider could serve you a faulty JavaScript applet which in turn sends them back an un-encrypted copy. The only way to really be certain of that is to make sure they are in countries where the law does not allow that kind of weakness (although some countries may do it anyway clandestinely). As a result of this some believe that E2E encryption should ONLY be available in mail clients ie things like Enigmail or clients that use OpenKeychain. Fortunately the AutoCrypt spec makes this much more user friendly.

As a result of this I decided to avoid this argument in this issue. No email provider can 'prevent' you from using PGP. Fastmail wrote a good piece about why they don't offer pgp, though they are not one of our providers listed for geographical reasons, they are however dead right in their reasoning.

Opportunistic TLS is the only way to protect the metadata which user is sending emails to whom (PGP doesn't encrypt that).

In the coming days I shall be reaching out to each one of the providers to get their thoughts on it. I am sure that privacytools.io has driven some customers towards them I am interested in their plans.

I have also asked Hardenize for a list of domains to whitelist so that some of the providers that are currently rate limiting can whitelist those domains.

> We can remove some but either way the ratings should be something like Good/Very good/Great as to not sound like we're recommending shitty providers. I have change it to "Good" and "Great" the "Providers to be Removed" list well those things I don't think are really negotiable. I shall wait to see what their input is on that. Realistically I think the only providers that should get removed are the ones that have no plans to fix anything and don't want to talk to me about it. I would then be starting to look at them as unmaintained. Part of running an email provider is to stay current with the RFCs that the rest of the industry uses. This has primarily been the argument used against federated and decentralized protocols in the past but we all know the dangers of having everything centralized 😉. What I am hoping is that the providers realize that they are being compared against each other. I **don't** believe this issue should be hurried as it may take time for them to implement some of these things (MTA-STS for example is new). They also may already have a timeline on when they want to do it with testing as some of these things require careful planning eg DNSSEC and DANE and can have pretty bad consequences if you 'do it wrong' ie [The DANE fail list](https://danefail.org) and [DANE - Common Mistakes](https://dane.sys4.de/common_mistakes). > Out of the providers we recommend I only use ProtonMail, so I don't know if we do this already, but we should only recommend providers with client-side encryption. Simply having SMTP TLS while claiming to encrypt things on the backend isn't good enough. The unfortunate fact is PGP is really only good for protecting the contents of an email. Client-side encryption isn't always possible either and will often be disabled by users in a pragmatic world where they want a copy of the email to in the recipient's inbox and not a https link to the email. There are two sides of the argument as well, regarding client-side encryption. Some say that JavaScript client-side encryption enhances the surface area hugely and a provider could serve you a faulty JavaScript applet which in turn sends them back an un-encrypted copy. The only way to really be certain of that is to make sure they are in countries where the law does not allow that kind of weakness (although some countries may do it anyway clandestinely). As a result of this some believe that E2E encryption should **ONLY** be available in mail clients ie things like [Enigmail](https://www.enigmail.net) or clients that use [OpenKeychain](https://www.openkeychain.org). Fortunately the [AutoCrypt](https://autocrypt.org) spec makes this much more user friendly. As a result of this I decided to avoid this argument in this issue. No email provider can 'prevent' you from using PGP. [Fastmail wrote a good piece about why they don't offer pgp](https://fastmail.blog/2016/12/10/why-we-dont-offer-pgp/), though they are not one of our providers listed for geographical reasons, they are however dead right in their reasoning. Opportunistic TLS is the only way to protect the metadata which user is sending emails to whom (PGP doesn't encrypt that). In the coming days I shall be reaching out to each one of the providers to get their thoughts on it. I am sure that privacytools.io has driven some customers towards them I am interested in their plans. I have also asked Hardenize for a list of domains to whitelist so that some of the providers that are currently rate limiting can whitelist those domains.
ghost commented 2018-11-20 12:59:38 +00:00 (Migrated from github.com)

There are two sides of the argument as well, regarding client-side encryption. Some say that JavaScript client-side encryption enhances the surface area hugely and a provider could serve you a faulty JavaScript applet which in turn sends them back an un-encrypted copy.

True. Only a locally stored app, built from/hashchecked with a peer reviewed source would solve this.

There are many providers which are outside US and support SMTP TLS. I think the best metric to look at is implementation/willingness to implement more security features.

> There are two sides of the argument as well, regarding client-side encryption. Some say that JavaScript client-side encryption enhances the surface area hugely and a provider could serve you a faulty JavaScript applet which in turn sends them back an un-encrypted copy. True. Only a locally stored app, built from/hashchecked with a peer reviewed source would solve this. There are many providers which are outside US and support SMTP TLS. I think the best metric to look at is implementation/willingness to implement more security features.
ghost commented 2018-11-28 18:13:27 +00:00 (Migrated from github.com)

Another thing that I think we will add to the list is while not related to relaying I think is still very important the connection from the client to the MTA is just as important. We should encourage providers who provide STARTTLS only to support Cleartext Considered Obsolete: Use of Transport Layer Security (TLS) for Email Submission and Access RFC 8314 - January 2018.

Essentially port 25 being plain text SMTP, and 465 was supposed to be for SMTPS (explicit SSL/TLS). Anyway back in 1998 they decided to revoke that and go with STARTTLS on 587 which of course is susceptible to downgrade attacks.

Since then though providers like Gmail and others still did SMTPS on 465 despite IANA re-assigning the port. Now that RFC 8314 exists port 465 should be offered for SMTPS.

I observed 3 categories of providers, ones which do STARTTLS only(), ones which offer SMTPS(✔️) and ones which use some other secure method of connection(✔️).

SMTPS Support ✔️

Port 465 was only officially designated a secured port for mail submission (SMTPS) for a short period, and it is now considered a “legacy” port. Although many email programs and email services (like Runbox) support mail submission on port 465 using TLS/SSL, it is not officially designated for that any longer, and so sometimes compatibility may be an issue or you may find it referred to as a “legacy” port.

STARTTLS Only

Some other secure method ✔️

Another thing that I think we will add to the list is while not related to relaying I think is still **very** important the connection from the client to the MTA is just as important. We should encourage providers who provide STARTTLS only to support [Cleartext Considered Obsolete: Use of Transport Layer Security (TLS) for Email Submission and Access RFC 8314 - January 2018](https://datatracker.ietf.org/doc/html/rfc8314). Essentially port 25 being plain text [SMTP](https://en.wikipedia.org/wiki/Simple_Mail_Transfer_Protocol), and 465 was supposed to be for [SMTPS](https://en.wikipedia.org/wiki/SMTPS) (explicit SSL/TLS). Anyway back in 1998 they decided to revoke that and go with STARTTLS on 587 which of course is susceptible to downgrade attacks. Since then though providers like Gmail and others still did [SMTPS](https://en.wikipedia.org/wiki/SMTPS) on 465 despite IANA re-assigning the port. Now that [RFC 8314](https://tools.ietf.org/html/rfc8314) exists port 465 should be offered for SMTPS. I observed 3 categories of providers, ones which do STARTTLS only(❌), ones which offer SMTPS(✔️) and ones which use some other secure method of connection(✔️). **[SMTPS](https://en.wikipedia.org/wiki/SMTPS) Support ✔️** * https://kb.mailbox.org/display/BMBOKBEN/Setup+other+e-mail+clients+manually * https://mailfence.com/en/faq.jsp * https://posteo.de/en/help/how-do-i-set-up-posteo-in-an-email-client-pop3-imap-and-smtp * https://help.runbox.com/connection-encryption-ssl-tls-starttls/ - they need to update their documentation as this is not strictly correct anymore since [RFC 8314 - January 2018](https://tools.ietf.org/html/rfc8314#section-7.3) * [SSL POP3 / SMTP Generic Configuration Options](https://www.neomailbox.com/support/install-guides/ssl-pop3-smtp/generic) - many of their guides [result in 404](https://www.neomailbox.com/support/install-guides/) > Port 465 was only officially designated a secured port for mail submission ([SMTPS](https://en.wikipedia.org/wiki/SMTPS)) for a short period, and it is now considered a “legacy” port. Although many email programs and email services (like Runbox) support mail submission on port 465 using TLS/SSL, it is not officially designated for that any longer, and so sometimes compatibility may be an issue or you may find it referred to as a “legacy” port. **STARTTLS Only ❌** * https://howto.disroot.org/en/email/email-clients * https://kb.kolabnow.com/documentation/generic-imap-client-setup-guide * https://support.startmail.com/index.php?/Knowledgebase/Article/View/751/0/server-addresses **Some other secure method ✔️** * https://protonmail.com/bridge - you use SMTP to a local piece of software which does the remote connection - or use their app. * https://tutanota.uservoice.com/knowledgebase/articles/470761-can-i-retrieve-my-tutanota-emails-via-imap-to-anot - must have their app IMAP/SMTP(S) not supported and [won't be added](https://tutanota.uservoice.com/forums/237921-general/suggestions/6895110-external-imap-pop3-connection).
ghost commented 2018-12-01 06:29:24 +00:00 (Migrated from github.com)

Another requirement we should add is an intent to deprecate and reject the use of TLS 1.0 and 1.1 in accordance to the current draft https://datatracker.ietf.org/doc/draft-ietf-tls-oldversions-deprecate that date should be no later than March 2020 or when that draft turns into an RFC (whichever comes first). That draft will be following the history of RFC6176 and RFC7568.

It should be noted at this point both gmail.com and outlook.com only allow TLS 1.2 for many of their relays.

Google also only allow the use of TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 while Outlook only allow the use of TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, both being really good options, it is interesting to see them not allow many other ciphers in the TLS 1.2 suite.

On a side note, this is how it looks from the client submission side of things. I doubt any email servers would be running on software that is 7+ years old that are internet facing. That would be utterly irresponsible as none of that stack would be supported. Old antiquated systems would likely transmit to a modern relay before exiting the network and entering the wider Internet.

Browser support

Vendor TLS 1.0 Removal TLS 1.1 Removal
Apple March 2020 March 2020
Google January 2020 January 2020
Microsoft first half of 2020 first half of 2020
Mozilla March 2020 March 2020
PCI-DSS 30 June 2018 Not specified - though they prefer 1.2

Google has a specific criteria for the suite preferences which I think we should also adopt:
Hardenize does currently check for this.

  • TLS 1.2 or later.
  • An ECDHE- and AEAD-based cipher suite. AEAD-based cipher suites are those using AES-GCM or ChaCha20-Poly1305. ECDHE_RSA_WITH_AES_128_GCM_SHA256 is the recommended option for most sites.
  • The server signature should use SHA-2. Note this is not the signature in the certificate, made by the CA. Rather, it is the signature made by the server itself, using its private key.

All servers must also have a Server Suite Preference of TLS 1.2 or later defined.

Marketshare research

Looking at users that cannot do TLS 1.2 connections:

The University of Warwick in Coventry has disabled these protocols and provide some information about impact:

Some global statistics:

Another requirement we should add is an intent to deprecate and reject the use of TLS 1.0 and 1.1 in accordance to the current draft https://datatracker.ietf.org/doc/draft-ietf-tls-oldversions-deprecate that date should be no later than March 2020 or when that draft turns into an RFC (whichever comes first). That draft will be following the history of [RFC6176](https://tools.ietf.org/html/rfc6176) and [RFC7568](https://tools.ietf.org/html/rfc7568). It should be noted at this point both [gmail.com](https://www.hardenize.com/report/gmail.com/1548174015#email_tls) and [outlook.com](https://www.hardenize.com/report/outlook.com/1548556254#email_tls) only allow TLS 1.2 for many of their relays. Google also only allow the use of `TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256` while Outlook only allow the use of `TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384`, both being really good options, it is interesting to see them not allow many other ciphers in the TLS 1.2 suite. On a side note, this is how it looks from the client submission side of things. I doubt any email servers would be running on software that is 7+ years old that are internet facing. That would be utterly irresponsible as none of that stack would be supported. Old antiquated systems would likely transmit to a modern relay before exiting the network and entering the wider Internet. # Browser support | Vendor | TLS 1.0 Removal | TLS 1.1 Removal | |:---------:|:------------------:|:------------------:| | [Apple](https://webkit.org/blog/8462/deprecation-of-legacy-tls-1-0-and-1-1-versions) | March 2020 | March 2020 | | [Google](https://security.googleblog.com/2018/10/modernizing-transport-security.html) | January 2020 | January 2020 | | [Microsoft](https://blogs.windows.com/msedgedev/2018/10/15/modernizing-tls-edge-ie11) | first half of 2020 | first half of 2020 | | [Mozilla](https://blog.mozilla.org/security/2018/10/15/removing-old-versions-of-tls) | March 2020 | March 2020 | | [PCI-DSS](https://blog.pcisecuritystandards.org/are-you-ready-for-30-june-2018-sayin-goodbye-to-ssl-early-tls) | 30 June 2018 | Not specified - though they prefer 1.2 | Google has a specific criteria for the suite preferences which I think we should also adopt: Hardenize does currently check for this. * TLS 1.2 or later. * An ECDHE- and AEAD-based cipher suite. AEAD-based cipher suites are those using AES-GCM or ChaCha20-Poly1305. ECDHE_RSA_WITH_AES_128_GCM_SHA256 is the recommended option for most sites. * The server signature should use SHA-2. Note this is not the signature in the certificate, made by the CA. Rather, it is the signature made by the server itself, using its private key. All servers must also have a **Server Suite Preference** of TLS 1.2 or later defined. # Marketshare research Looking at users that cannot do TLS 1.2 connections: * [Android users below 4.4 October 31, 2013](https://en.wikipedia.org/wiki/Android_version_history#Android_4.4_KitKat_(API_19)) * [How out of date are Android devices?](https://danluu.com/android-updates/) * [Google Play services discontinuing updates for API levels 14 and 15](https://android-developers.googleblog.com/2018/12/google-play-services-discontinuing.html) The Android Ice Cream Sandwich (ICS) platform is seven years old and the active device count has been below 1% for some time. * [Windows users before Vista](https://blogs.msdn.microsoft.com/kaushal/2011/10/02/support-for-ssltls-protocols-on-windows/) * [iOS below version 5](https://developer.apple.com/library/archive/technotes/tn2287/_index.html) that means devices [older than 2012](https://en.wikipedia.org/wiki/IOS_5#Updates) * [MacOSX users below 10.10 October 16, 2014](https://en.wikipedia.org/wiki/MacOS_version_history#Version_10.10:_%22Yosemite%22) The University of Warwick in Coventry has disabled these protocols and provide some information about impact: * [Impact of disabled TLS 1.0 and 1.1 connections on Mac users](https://warwick.ac.uk/services/its/servicessupport/web/sign-on/help/tls1-eol/mac/) * [Impact of disabled TLS 1.0 and 1.1 connections on iOS devices](https://warwick.ac.uk/services/its/servicessupport/web/sign-on/help/tls1-eol/ios/) Some global statistics: * [Mobile & Tablet iOS Version Market Share Worldwide](http://gs.statcounter.com/os-version-market-share/ios/mobile-tablet/worldwide) * [Desktop macOS Version Market Share Worldwide](http://gs.statcounter.com/os-version-market-share/macos/desktop/worldwide) * [Desktop Windows Version Market Share Worldwide](http://gs.statcounter.com/os-version-market-share/windows/desktop/worldwide) * [Mobile & Tablet Android Version Market Share Worldwide](http://gs.statcounter.com/os-version-market-share/android/mobile-tablet/worldwide) * [Net MarketShare - Operating System Share by Version](https://www.netmarketshare.com/operating-system-market-share.aspx?options=%7B%22filter%22%3A%7B%22%24or%22%3A%5B%7B%22deviceType%22%3A%7B%22%24in%22%3A%5B%22Mobile%22%5D%7D%7D%2C%7B%22deviceType%22%3A%7B%22%24in%22%3A%5B%22Desktop%2Flaptop%22%5D%7D%7D%2C%7B%22deviceType%22%3A%7B%22%24in%22%3A%5B%22Tablet%22%5D%7D%7D%5D%7D%2C%22dateLabel%22%3A%22Trend%22%2C%22attributes%22%3A%22share%22%2C%22group%22%3A%22platformVersion%22%2C%22sort%22%3A%7B%22share%22%3A-1%7D%2C%22id%22%3A%22platformsMobileVersions%22%2C%22dateInterval%22%3A%22Monthly%22%2C%22dateStart%22%3A%222018-01%22%2C%22dateEnd%22%3A%222018-12%22%2C%22segments%22%3A%22-1000%22%2C%22tableOrder%22%3A%5B%5B2%2C%22desc%22%5D%5D%2C%22pageLength%22%3A50%7D) * [W3 Counter](https://www.w3counter.com/globalstats.php)
ghost commented 2018-12-06 14:36:50 +00:00 (Migrated from github.com)

I'm going to update the Great/Good category to say that a DMARC policy must be included but may be not enforced ie p may be none, quarantine or reject. One of the providers has pointed out to me this causes issues with mailing lists.

https://dmarc.org/wiki/FAQ#Is_there_special_handling_required_to_receive_DMARC_email_from_mailing_lists.3F

We may decide once arc-spec is finalized and turned into a RFC to revisit this.

https://en.wikipedia.org/wiki/Authenticated_Received_Chain
https://datatracker.ietf.org/doc/draft-ietf-dmarc-arc-protocol/

I'm going to update the Great/Good category to say that a DMARC policy **must be included** but may be not enforced ie `p` may be `none`, `quarantine` or `reject`. One of the providers has pointed out to me this causes issues with mailing lists. https://dmarc.org/wiki/FAQ#Is_there_special_handling_required_to_receive_DMARC_email_from_mailing_lists.3F We may decide once [arc-spec](http://arc-spec.org) is finalized and turned into a RFC to revisit this. https://en.wikipedia.org/wiki/Authenticated_Received_Chain https://datatracker.ietf.org/doc/draft-ietf-dmarc-arc-protocol/
ghost commented 2019-01-22 13:33:09 +00:00 (Migrated from github.com)
Provider (link on Hardenize) Response (Email/Ticket) DNSSEC CAA TLS Errors MTA-STS TLS-RPT DANE DANE (Custom) DKIM DKIM (Custom) DMARC Server Suite Pref. SMTPS Support Date for Deprecate TLSv1.0 & TLS 1.1
mailbox.org ✔️ ✔️ ✔️ ✔️ ✔️ ✔️ ✔️ ✔️ ✔️ ✔️ ✔️[1] Able to be changed by customer for their domains ✔️ ✔️ ✔️ (disabled on web)
soverin.net ✔️ ✔️ ✔️ ✔️ ✔️ ✔️ ✔️ ✔️ ✔️ Yes ✔️ ✔️ ✔️ Yes ✔️ (disabled on web)
protonmail.com ✔️ ✔️ ✔️ ✔️ ✔️ ✔️ ✔️ ✔️ Yes ✔️ ✔️ ✔️ ✔️
tutanota.com ✔️ ✔️ https://github.com/tutao/tutanota/issues/898 ✔️ https://github.com/tutao/tutanota/issues/461 https://github.com/tutao/tutanota/issues/899 ✔️ ✔️ ✔️ ✔️ ✔️ ✔️ ✔️[2] ✔️ (disabled on web)
disroot.org ✔️ ✔️ [6] ✔️ ✔️ ✔️ ✔️ ✔️ ✔️ ✔️[1] ✔️ ✔️
posteo.de ✔️ ✔️ ✔️ ✔️ ✔️ ✔️ ✔️ No ✔️ ✔️ Yes ✔️[1] ✔️ ✔️ ✔️
mailfence.com ✔️ ✔️ ✔️ ✔️ ✔️ ✔️ ✔️ ✔️ ✔️ ✔️ (disabled on web)
runbox.com ✔️ [3] ✔️ ✔️ ✔️ ✔️[1] ✔️ ✔️
startmail.com ✔️ ✔️ ✔️ ✔️ ✔️ ✔️ [7][8] ✔️ ✔️ ✔️[1] ✔️ ✔️ ✔️ (disabled on web)
kolabnow.com ✔️ ✔️ ✔️ ✔️ ✔️ ✔️ Yes, signed as kolabnow.com ✔️ ✔️ ✔️
neomailbox.com ✔️ [5] ✔️

(Custom = means custom domain support)

[1] Rule exists, not enforced
[2] Custom software: https://tutanota.com/faq/#imap
[3] Reconfigure server to use forward secrecy and authenticated encryption
[5] Poor configuration, even allows for SSLv3 connections! Many bad, or broken ciphers supported!
[6] Waiting on support from Key-Systems
[7] Waiting on support from NS1 verification
[8] Respected on outgoing messages only

| Provider (link on Hardenize) | Response (Email/Ticket) | [DNSSEC](https://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions) | [CAA](https://tools.ietf.org/html/rfc6844) | TLS Errors | [MTA-STS](https://tools.ietf.org/html/rfc8461) | [TLS-RPT](https://tools.ietf.org/html/rfc8460) | [DANE](https://en.wikipedia.org/wiki/DNS-based_Authentication_of_Named_Entities) | [DANE](https://en.wikipedia.org/wiki/DNS-based_Authentication_of_Named_Entities) (Custom) | [DKIM](https://en.wikipedia.org/wiki/DKIM) | [DKIM](https://en.wikipedia.org/wiki/DKIM) (Custom) | [DMARC](https://en.wikipedia.org/wiki/DMARC) | Server Suite Pref. | [SMTPS](https://en.wikipedia.org/wiki/SMTPS) Support | Date for [Deprecate TLSv1.0 & TLS 1.1](https://datatracker.ietf.org/doc/draft-ietf-tls-oldversions-deprecate/) | |------------------------------------------------------------------------------|-------------------------|--------------------------------------------------------------------------------|------------------------------------------------|------------|------------------------------------------------|------------------------------------------------|----------------------------------------------------------------------------------|-------------------------------------------------------------------------------------------|--------------------------------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------|-------------------------------------------------------------|--------------------|------------------------------------------------------|----------------------------------------------------------------------------------------------------------------| | [mailbox.org](https://www.hardenize.com/report/mailbox.org/1548406006) | ✔️ | ✔️ | ✔️ | ✔️ | ✔️ | ✔️ | ✔️ | ✔️ | ✔️ | ✔️ | ✔️[1] Able to be changed by customer for their domains | ✔️ | ✔️ | ✔️ (disabled on web) | | [soverin.net](https://www.hardenize.com/report/soverin.net/1567012502) | ✔️ | ✔️ | ✔️ | ✔️ | ✔️ | ✔️ | ✔️ | ❓ | ✔️ | ✔️ [Yes](https://support.soverin.net/hc/en-us/articles/360000213874-Setup-DKIM) | ✔️ | ✔️ | ✔️ [Yes](https://support.soverin.net/hc/en-us/articles/115004811974-Setup-your-personal-email-address) | ✔️ (disabled on web) | | [protonmail.com](https://www.hardenize.com/report/protonmail.com/1548406051) | ✔️ | ✔️ | ✔️ | ✔️ | ✔️ | ✔️ | ✔️ | ❓ | ✔️ | [Yes](https://protonmail.com/support/knowledge-base/anti-spoofing/) | ✔️ | ✔️ | ✔️ | ✔️ | | [tutanota.com](https://www.hardenize.com/report/tutanota.com/1548406067) | ✔️ | ✔️ | ❌ https://github.com/tutao/tutanota/issues/898 | ✔️ | ❌ https://github.com/tutao/tutanota/issues/461 | ❌ https://github.com/tutao/tutanota/issues/899 | ✔️ | ✔️ | ✔️ | ✔️ | ✔️ | ✔️ | ✔️[2] | ✔️ (disabled on web) | | [disroot.org](https://www.hardenize.com/report/disroot.org/1548406172) | ✔️ | ✔️ | ❌[6] | ✔️ | ✔️ | ✔️ | ✔️ | | ✔️ | ✔️ | ✔️[1] | ✔️ | ✔️ | ❌ | | [posteo.de](https://www.hardenize.com/report/posteo.de/1548406216) | ✔️ | ✔️ | ✔️ | ✔️ | ✔️ | ✔️ | ✔️ | ❌ [No](https://posteo.de/en/site/faq#owndomains) | ✔️ | ✔️ [Yes](https://posteo.de/site/postmaster) | ✔️[1] | ✔️ | ✔️ | ✔️ | | [mailfence.com](https://www.hardenize.com/report/mailfence.com/1548406299) | ✔️ | ❌ | ✔️ | ✔️ | ✔️| ✔️ | ❌ | | ✔️ | | ✔️ | ✔️ | ✔️ | ✔️ (disabled on web) | | [runbox.com](https://www.hardenize.com/report/runbox.com/1548406352) | ✔️ | ❌ | ❌ | ❌[3] | ✔️ | ❌ | ❌ | | ✔️ | ✔️ | ✔️[1] | ❌ | ✔️ | ✔️ | | [startmail.com](https://www.hardenize.com/report/startmail.com/1548406362) | ✔️ | ✔️ | ✔️ | ✔️ | ✔️ | ✔️ | ❌ [7][8] | | ✔️ | ✔️ | ✔️[1] | ✔️ | ✔️ | ✔️ (disabled on web) | | [kolabnow.com](https://www.hardenize.com/report/kolabnow.com/1548406365) | ✔️ | ✔️ | ✔️ | ✔️ | ❌ | ❌ | ✔️ | | ✔️ | [Yes](https://kb.kolabnow.com/faq/do-you-support-dkim), signed [as kolabnow.com](https://blogs.kolabnow.com/2017/10/09/a-stricter-dmarc-policy-part-ii) | ✔️ | ✔️ | ❌ | ✔️ | | [neomailbox.com](https://www.hardenize.com/report/neomailbox.com/1548419015) | ✔️ | ❌ | ❌ | ❌[5] | ❌ | ❌ | ❌ | ❌ | ❌ | ❌ | ❌ | ❌ | ✔️ | | (Custom = means custom domain support) [1] Rule exists, not enforced [2] Custom software: https://tutanota.com/faq/#imap [3] Reconfigure server to use forward secrecy and authenticated encryption [5] Poor configuration, even allows for SSLv3 connections! Many bad, or broken ciphers supported! [6] Waiting on support from [Key-Systems](https://www.key-systems.net) [7] Waiting on support from [NS1](https://ns1.com) verification [8] Respected on outgoing messages only
lucassz commented 2019-03-29 04:04:37 +00:00 (Migrated from github.com)

@tya99

I really appreciate the effort put into compiling this! Would it be possible to add client-side encryption to the table?

@tya99 I really appreciate the effort put into compiling this! Would it be possible to add client-side encryption to the table?
ghost commented 2019-03-29 04:35:09 +00:00 (Migrated from github.com)

@tya99

I really appreciate the effort put into compiling this! Would it be possible to add client-side encryption to the table?

Do you mean end-to-end encryption like PGP?

The reason this is not added is because no provider "stops" you from using PGP.

I do recognize some decide to handle that server-side but that comes at the cost of giving those providers your private keys, and all the public keys in your keyring which really defeats the purpose of end-to-end encryption. I discussed this in the bottom of https://github.com/privacytoolsIO/privacytools.io/issues/603#issuecomment-440197954.

I don't feel we should penalize providers who refer users to installing a mail client that provides pgp encryption as opposed to offering it themselves.

The latter part of that message refers to legislation such as the Assistance and Access Bill that recently came into force in Australia. The specific part which is explained rather nicely in this article.

  • Technical Assistance Notices (TAN), which are compulsory notices for a "designated communication provider" to use an interception capability they already have;
  • Technical Capability Notices (TCN), which are compulsory notices for a designated communication provider to build a new interception capability, so that it can meet subsequent Technical Assistance Notices; and
  • Technical Assistance Requests (TAR), which are "voluntary" requests, but which have been described by experts as the most dangerous of the three because there was less oversight, at least in the original version of the law.

While we don't recommend any providers "in Australia" as they are a member of the Five Eyes it is only a matter of time until other countries follow suit and try to do something similar. If you look around the world, Europe included there has been a clear increase in adoption of authoritarianism.

If the provider has no ability to decrypt your messages because they do not hold the private keys, cannot serve up malicious code to steal them, then there's basically nothing they can do to "comply" with one of these orders. Hopefully this will stop/slow further degradation and chipping away at civil liberties if it will all be for nought anyway.

It would also seem that the security services are keen to exploit key distribution ie the GCHQ's "ghost participant" idea. https://www.justsecurity.org/62114/give-ghost-backdoor/

> @tya99 > > I really appreciate the effort put into compiling this! Would it be possible to add client-side encryption to the table? Do you mean end-to-end encryption like PGP? The reason this is not added is because no provider "stops" you from using PGP. I do recognize some decide to handle that server-side but that comes at the cost of giving those providers your private keys, and all the public keys in your keyring which really defeats the purpose of end-to-end encryption. I discussed this in the bottom of https://github.com/privacytoolsIO/privacytools.io/issues/603#issuecomment-440197954. I don't feel we should penalize providers who refer users to installing a mail client that provides pgp encryption as opposed to offering it themselves. The latter part of that message refers to legislation such as the [Assistance and Access Bill](https://en.wikipedia.org/wiki/Mass_surveillance_in_Australia#Assistance_and_Access_Bill) that recently came into force in Australia. The specific part which is explained rather nicely in [this article](https://www.zdnet.com/article/whats-actually-in-australias-encryption-laws-everything-you-need-to-know/). > - Technical Assistance Notices (TAN), which are compulsory notices for a "designated communication provider" to use an interception capability they already have; > - Technical Capability Notices (TCN), which are compulsory notices for a designated communication provider to build a new interception capability, so that it can meet subsequent Technical Assistance Notices; and > - Technical Assistance Requests (TAR), which are "voluntary" requests, but which have been [described by experts](https://www.zdnet.com/article/australias-anti-encryption-law-will-merely-relocate-the-backdoors-expert/) as the most dangerous of the three because there was less oversight, at least in the original version of the law. While we don't recommend any providers "in Australia" as they are a member of the [Five Eyes](https://en.wikipedia.org/wiki/Five_Eyes) it is only a matter of time until other countries follow suit and try to do something similar. If you look around the world, Europe included there has been a clear increase in adoption of [authoritarianism](https://en.wikipedia.org/wiki/Authoritarianism). If the provider has **no** ability to decrypt your messages because they do **not** hold the private keys, cannot serve up malicious code to steal them, then there's basically nothing they can do to "comply" with one of these orders. Hopefully this will stop/slow further degradation and chipping away at civil liberties if it will all be for nought anyway. It would also seem that the security services are keen to exploit key distribution ie the GCHQ's "ghost participant" idea. https://www.justsecurity.org/62114/give-ghost-backdoor/
lucassz commented 2019-03-31 23:31:34 +00:00 (Migrated from github.com)

@tya99 Thank you for the reply, I should have been more specific. There are at least two different features that are useful, neither of which involve the vendor controlling the private key.

  • Encrypting non-encrypted messages' content with the user's public key and then storing them in that form. Obviously, it's not possible to verify that the email provider actually deleted the unencrypted version, but having the feature is far better than not having it. Mailbox.org is an example of a provider with this feature.
  • Fully encrypting all emails' metadata, content, etc. with the user's public key, again claiming not to store the unencrypted version. I believe that Tutanota and ProtonMail both do this.

I do not agree that any of these things would be discouraging one from using client-side encryption as any other client-side PGP can clearly be used on top of it. The Mailbox.org feature seems particularly nonintrusive and useful.

@tya99 Thank you for the reply, I should have been more specific. There are at least two different features that are useful, neither of which involve the vendor controlling the private key. - Encrypting non-encrypted messages' content with the user's public key and then storing them in that form. Obviously, it's not possible to verify that the email provider actually deleted the unencrypted version, but having the feature is far better than not having it. Mailbox.org is an example of a provider with this feature. - Fully encrypting all emails' metadata, content, etc. with the user's public key, again claiming not to store the unencrypted version. I believe that Tutanota and ProtonMail both do this. I do not agree that any of these things would be discouraging one from using client-side encryption as any other client-side PGP can clearly be used on top of it. The Mailbox.org feature seems particularly nonintrusive and useful.
ghost commented 2019-04-04 15:52:00 +00:00 (Migrated from github.com)
  • Encrypting non-encrypted messages' content with the user's public key and then storing them in that form. Obviously, it's not possible to verify that the email provider actually deleted the unencrypted version, but having the feature is far better than not having it. Mailbox.org is an example of a provider with this feature.

Mailbox is the only one which has that option. They also have an option to email @secure.mailbox.org. When someone emails this alias TLS is mandatory. If the remote server is unable to initiate a TLS connection Mailbox won't let it fallover to an unencrypted connection.

  • Fully encrypting all emails' metadata, content, etc. with the user's public key, again claiming not to store the unencrypted version. I believe that Tutanota and ProtonMail both do this.

ProtonMail has their custom bridge software which encrypts the mail before it is sent to the ProtonMail. It is only for paying customers.

Tutanota simply doesn't allow IMAP/SMTP and forces you to use their app, or use webmail. This would bother me if I wanted to make an cold storage backup. You can never really know if a provider is going to just "cease to exist".

Unfortunately there is no RFC besides RFC4880. The smaller providers don't provide this kind of encryption because it requires engineering specialized software which is expensive. I don't believe this is a good course at all and anything we recommend really should be an RFC. I do understand the source for Tutanota and parts of ProtonMail are open, but without being standardized and being heavily integrated with their other product it is unlikely anyone will adopt it.

These providers are marketing this software as a reason why you should pick them exclusively. The purpose of this research isn't to provide those providers with more customers. I believe that is dangerous and makes them a higher value target by state adversaries as it centralizes email. I think a better approach would be an engineered standard like what FastMail has done with JMAP or ARC.

At the moment Mailbox, Posteo and Disroot all support DANE, MTA-STS and TLS-RPT and would certainly be my top picks.

I would like to see Tutanota and ProtonMail at least support these. Tutanota only does DANE, which means that when you send email/receive email from Gmail/Outlook users it won't be able to make use of MTA-STS. As mentioned in this link in my original post, a provider really needs to do both.

At the end of this I will be providing a transparency score. Some providers have been very forthcoming with information, while others have been silent or provided nothing but the regular customer service "thank you for your inquiry, but we cannot provide any more information" spiel.

> - Encrypting non-encrypted messages' content with the user's public key and then storing them in that form. Obviously, it's not possible to verify that the email provider actually deleted the unencrypted version, but having the feature is far better than not having it. Mailbox.org is an example of a provider with this feature. Mailbox is the only one which has that option. They [also have an option](https://mailbox.org/en/security) to email @secure.mailbox.org. When someone emails this alias TLS is mandatory. If the remote server is unable to initiate a TLS connection Mailbox won't let it fallover to an unencrypted connection. > - Fully encrypting all emails' metadata, content, etc. with the user's public key, again claiming not to store the unencrypted version. I believe that Tutanota and ProtonMail both do this. ProtonMail has their custom [bridge software](https://protonmail.com/bridge) which encrypts the mail before it is sent to the ProtonMail. It is only for paying customers. Tutanota simply doesn't allow IMAP/SMTP and forces you to use their app, or use webmail. This would bother me if I wanted to make an cold storage backup. You can never really know if a provider is going to just "cease to exist". Unfortunately there is no RFC besides [RFC4880](https://tools.ietf.org/html/rfc4880). The smaller providers don't provide this kind of encryption because it requires engineering specialized software which is expensive. I don't believe this is a good course at all and anything we recommend really should be an RFC. I do understand the source for Tutanota and parts of ProtonMail are open, but without being standardized and being heavily integrated with their other product it is unlikely anyone will adopt it. These providers are marketing this software as a reason why you should pick them exclusively. The purpose of this research isn't to provide those providers with more customers. I believe that is dangerous and makes them a higher value target by state adversaries as it centralizes email. I think a better approach would be an engineered standard like what FastMail has done with [JMAP](https://jmap.io) or [ARC](http://arc-spec.org). At the moment Mailbox, Posteo and Disroot all support [DANE](https://en.wikipedia.org/wiki/DNS-based_Authentication_of_Named_Entities), [MTA-STS](https://tools.ietf.org/html/rfc8461) and [TLS-RPT](https://tools.ietf.org/html/rfc8460) and would certainly be my top picks. I would like to see Tutanota and ProtonMail at least support these. Tutanota only does DANE, which means that when you send email/receive email from Gmail/Outlook users it won't be able to make use of [MTA-STS](https://tools.ietf.org/html/rfc8461). As mentioned in [this link](https://uhxy.com/technology/2018/01/21/DANE-vs-MTA-STS.html) in my original post, a provider really needs to do both. At the end of this I will be providing a transparency score. Some providers have been very forthcoming with information, while others have been silent or provided nothing but the regular customer service "thank you for your inquiry, but we cannot provide any more information" spiel.
ghost commented 2019-04-05 14:19:14 +00:00 (Migrated from github.com)

This was also an interesting read https://www.ctrl.blog/entry/protonmail-vs-mailbox

This was also an interesting read https://www.ctrl.blog/entry/protonmail-vs-mailbox
blacklight447 commented 2019-08-28 15:55:08 +00:00 (Migrated from github.com)

We have been talking to overhaul the email page and ad an criteria list like we did with the vpn page, this would most likely solve the issue.

We have been talking to overhaul the email page and ad an criteria list like we did with the vpn page, this would most likely solve the issue.
ghost commented 2019-08-28 17:22:11 +00:00 (Migrated from github.com)

We have been talking to overhaul the email page and ad an criteria list like we did with the vpn page, this would most likely solve the issue.

Yes, I have just updated the table to include Soverin, they look to be a fairly good provider across the board from what I can see. Also it seems Protonmail has now deployed MTA-STS and TLS-RPT so that's good too.

> We have been talking to overhaul the email page and ad an criteria list like we did with the vpn page, this would most likely solve the issue. Yes, I have just updated the table to include Soverin, they look to be a fairly good provider across the board from what I can see. Also it seems Protonmail has now deployed MTA-STS and TLS-RPT so that's good too.
ghost commented 2019-09-06 22:29:15 +00:00 (Migrated from github.com)

We may decide once arc-spec is finalized and turned into a RFC to revisit this.

https://en.wikipedia.org/wiki/Authenticated_Received_Chain
https://datatracker.ietf.org/doc/draft-ietf-dmarc-arc-protocol/

It should be noted this now became finalized as of July 2019: https://tools.ietf.org/html/rfc8617

I think from now on we will start to see providers adopting this especially as Google is doing verification for their users.

> We may decide once [arc-spec](http://arc-spec.org) is finalized and turned into a RFC to revisit this. > > https://en.wikipedia.org/wiki/Authenticated_Received_Chain > https://datatracker.ietf.org/doc/draft-ietf-dmarc-arc-protocol/ It should be noted this now became finalized as of July 2019: https://tools.ietf.org/html/rfc8617 I think from now on we will start to see providers adopting this especially as Google is doing verification for their users.
ghost commented 2019-09-08 02:05:54 +00:00 (Migrated from github.com)

Updated, looks like proton mail is now fully compliant with our best category. We've got quite a few now in there (5 providers).

Updated, looks like proton mail is now fully compliant with our best category. We've got quite a few now in there (5 providers).
ghost commented 2019-09-09 17:25:32 +00:00 (Migrated from github.com)

@blacklight447-ptio @JonahAragon I like what you've done with the VPN section.

I think we should wait until March 2020 (in line with TLS 1.0 and 1.1 deprecation in main browsers) before publishing as that is a tentative date I told providers we would look at revising that section. Protonmail only recently upgraded their services, so it's possible others may follow suite soon too.

I am going to request an update from the mail providers and let them know we're thinking of shortening the list (like the VPN list) to just the ones which are now compliant. At the time of writing this number now stands at 5 different providers.

I am thinking we might add a bonus badge for providers that support JMAP now that the standards have been published RFC 8620 and RFC 8621.

Currently there's not much in the way of client support although I expect that to change now that the standards are finalized. K-9 has said that they are looking at implementing support soon https://github.com/k9mail/k-9/issues/3272#issuecomment-528326161 and hopefully Thunderbird will too https://bugzilla.mozilla.org/show_bug.cgi?id=1322991. I am quite curious myself how well JMAP support would work with ProtonMail's bridge, particularly in regard to the bandwidth usage.

Unfortunately nobody except for Fastmail supports JMAP and they operate in and from a FVEY country.

The The Authenticated Received Chain (ARC) Protocol also has gone into RFC status as RFC 8617. Many more providers have announced support for that, currently Google and Fastmail do verification for it. So we may provide an additional reward badge for providers that support this in the future too.

@blacklight447-ptio @JonahAragon I like what you've done with the VPN section. I think we should wait until [March 2020 (in line with TLS 1.0 and 1.1 deprecation in main browsers)](https://github.com/privacytoolsIO/privacytools.io/issues/603#issuecomment-443403963) before publishing as that is a tentative date I told providers we would look at revising that section. Protonmail only recently upgraded their services, so it's possible others may follow suite soon too. I am going to request an update from the mail providers and let them know we're thinking of shortening the list (like the VPN list) to just the ones which are now compliant. At the time of writing this number now stands at 5 different providers. I am thinking we might add a bonus badge for providers that support [JMAP](https://jmap.io/) now that the standards have been published [RFC 8620](https://tools.ietf.org/html/rfc8620) and [RFC 8621](https://tools.ietf.org/html/rfc8621). - https://fastmail.blog/2019/08/16/jmap-new-email-open-standard/ - https://www.atmail.com/blog/how-does-jmap-make-email-better/ - https://unencumberedbyfacts.com/2019/01/24/jmap-its-like-imap-but-not-really/ - https://fastmail.blog/2018/12/27/jmap-is-on-the-home-straight/ - https://mailarchive.ietf.org/arch/msg/imapext/wFxgIvlfweBFlgcDDZf9la6j8lg - https://fastmail.blog/2015/12/23/the-jmap-momentum-builds/ Currently there's not much in the way of [client support](https://jmap.io/software.html) although I expect that to change now that the standards are finalized. K-9 has said that they are looking at implementing support soon https://github.com/k9mail/k-9/issues/3272#issuecomment-528326161 and hopefully Thunderbird will too https://bugzilla.mozilla.org/show_bug.cgi?id=1322991. I am quite curious myself how well JMAP support would work with ProtonMail's bridge, particularly in regard to the bandwidth usage. Unfortunately nobody except for [Fastmail](https://www.fastmail.com/) supports JMAP and they operate in and from a [FVEY country](https://en.wikipedia.org/wiki/Five_Eyes). The [The Authenticated Received Chain (ARC) Protocol](http://arc-spec.org/) also has gone into RFC status as [RFC 8617](https://tools.ietf.org/html/rfc8617). Many more providers have announced support for that, currently Google and Fastmail do verification for it. So we may provide an additional reward badge for providers that support this in the future too.
blacklight447 commented 2019-09-09 17:27:18 +00:00 (Migrated from github.com)

@tya99 would you perhaps want to collaborate with us on a PR for the mail section overhaul?

@tya99 would you perhaps want to collaborate with us on a PR for the mail section overhaul?
ghost commented 2019-09-09 17:27:43 +00:00 (Migrated from github.com)

@tya99 would you perhaps want to collaborate with us on a PR for the mail section overhaul?

sure, seeing as I've done all the research/contact.

> @tya99 would you perhaps want to collaborate with us on a PR for the mail section overhaul? sure, seeing as I've done all the research/contact.
blacklight447 commented 2019-09-09 17:31:54 +00:00 (Migrated from github.com)

@tya99 excellent, I just wanted to make sure, as we can't go on expecting everyone to worm with/for us just because they open well informed issues :). In any case I'm glad that you want to help out.

@tya99 excellent, I just wanted to make sure, as we can't go on expecting everyone to worm with/for us just because they open well informed issues :). In any case I'm glad that you want to help out.
ghost commented 2019-10-05 11:43:05 +00:00 (Migrated from github.com)

@tya99 would you perhaps want to collaborate with us on a PR for the mail section overhaul?

sure, seeing as I've done all the research/contact.

@dngray will be handling this from here on out.

> > @tya99 would you perhaps want to collaborate with us on a PR for the mail section overhaul? > > sure, seeing as I've done all the research/contact. @dngray will be handling this from here on out.
This repo is archived. You cannot comment on issues.
No Milestone
No Assignees
1 Participants
Due Date
The due date is invalid or out of range. Please use the format 'yyyy-mm-dd'.

No due date set.

Dependencies

No dependencies set.

Reference: privacyguides/privacytools.io#603
No description provided.