On 7/23/20 1:24 AM, Seymour J Metz wrote:
But what, someone may ask, if the realy connects to a box that doesn't support TLS 1.2? The same thing as if the traffic from CSSMTP were unencrypted, and not the concern of the z/OS staff unless the relay is also running on z/OS.

What happens to email if CSSMTP (AT-TLS) is configured to *require* encryption and the receiving system doesn't support encryption?

I presume that CSSMTP will fail to send the email b/c of the lack of encryption.

What happens to these unsent emails?

Does an error get sent back to the sending application?

Do the unsent messages pile up in a spool somewhere?

Even at ~90% support for encryption, that's one in ten emails that can't be sent via encrypted channels. What happens to that 10% that can't be sent with encryption? Also, I don't believe the ~90% figure. I believe it to be somewhere between 60% and 70% and that there is a geographic influence to the number.

I agree that requiring encryption is perfectly reasonable. I think that requiring TLS 1.2 is a laudable goal.

But I also think it would be negligent to fail to have a plan for email that can't be sent via encrypted channels.

What happens to the email that CSSMTP (AT-TLS) wants to send if the receiving system has an expired certificate and thus fails validation? This is a fairly common short lived oops.

Also, I was not questioning the merit of TLS. I was simply inquiring if the requirement was for encryption, which can be accomplished multiple ways, or if it was for TLS specifically.



--
Grant. . . .
unix || die

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to