Peter Lebbing <pe...@digitalbrains.com> wrote:

>On 23/11/16 10:53, Andrew Gallagher wrote:
>> If the message is being automatically decrypted at the MTA then it
>> provides no more security than TLS.
>
>I could concur with this statement if we amend it a little: when two
>MTA's are explicitly configured as TLS peers. They have to abort the
>mail exchange when TLS can't be negotiated and when the certificate is
>not as expected. "Expected" can mean: DN checking, issuer checking,
>fingerprint checking, perhaps CRL checking.
>
>There are many problems preventing succesful TLS on SMTP. It's trivial
>to downgrade, and certificates are only checked whether they are valid
>in the general sense, not even the DN is checked. I could MITM a
>connection to mail.example.org, present a valid certificate for
>mail.digitalbrains.com, and the peer would accept it even though it
>isn't valid *for mail.example.org*. Basically, it only works for passive
>adversaries.
>
>But since the OpenPGP-protected mail payload would also require explicit
>configuration, I don't think it is actually a disadvantage of TLS in
>this case...
>
>I'm not completely sure the "explicitly configured TLS" doesn't have a
>snag somewhere that complicates stuff more, though... I vaguely remember
>something like that from a presentation...

Pardon me when I disgress too much from the original problem, but my
system carries a TLS certificate database of all external servers it
ever contacted, and, based on the certificate's fingerprint, you can
choose from that list which host connections you allow.

Kind regards

Caro

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to