Grant Taylor asks:
>What happens to email if CSSMTP (AT-TLS) is configured
>to *require* encryption and the receiving system doesn't
>support encryption?

Fundamentally the same thing(s) that happen when the network connection is 
down or too slow (times out), for whatever reasons. Network encryption is 
part and parcel of the network path. This class of failures must already 
be catered for. In this case, Len Sasso's organization is mandating TLS 
1.2+, and I agree with Shmuel Metz who wrote:
>If management has decreed that all SMTP traffic be encrypted,
>then barring a configuration error the relay will accept
>encrypted traffic.

Moreover, it's entirely possible that your attitude would only increase 
relay administrators' burdens, the people who currently have to manage, 
support, monitor, and audit the e-mail traffic from the one and only 
system still transmitting over an unencrypted connection, a connection 
modality they'd very much like to retire as quickly as possible. You know, 
that "old, obsolete mainframe" that you're actively arguing should 
actually be as old and obsolete as you can possibly force it to be. (TLS 
is *really* not new.) Or it's entirely possible that the relay 
administrators aren't inclined or equipped to provide even mediocre 
service levels for unencrypted connections, or even that there's a lone 
dedicated relay gathering dust in a wiring closet somewhere to support 
this one unencrypted connection, a relay that nobody left in the 
organization even understands or really knows about, that isn't backed up 
or DR protected, that still runs on a 10 Mbps Ethernet segment that 
miraculously hasn't been disconnected yet. Hence the unencrypted 
connection is MORE prone to failure, not less. All very possible, even 
predictable and likely. And I haven't even gotten to the regulatory issues 
and penalties.

Conceivably you could also reduce or eliminate your personal security 
authentication failure planning and handling (hopefully automated) 
responsibilities if you effectively disable your SAF security provider, 
such as RACF. Then those few pesky authentication and authorization 
rejections wouldn't occur, and everyone could just go to the pub and stay 
there (or whatever). That's the logical consequence of your argument, 
isn't it? I don't think you've got a strong argument.

Sorry to be blunt here, but I feel compelled to offer my personal view (as 
always). My colleagues (and I mean that word expansively, in and out of 
IBM) work really hard to deliver and support truly cutting edge 
capabilities, including downright amazing security capabilities, in/for 
this unique and indispensable platform. And this community, overall, often 
works really hard to put these capabilities into practice, in many cases 
literally to keep civilization functioning. Then there are a few people 
who manage a few of these systems, and...well, let's all strive to do 
better, OK?

[Why am I expecting a minor Twitter storm now? :-)]

- - - - - - - - - -
Timothy Sipples
I.T. Architect Executive
Digital Asset & Other Industry Solutions
IBM Z & LinuxONE
- - - - - - - - - -
E-Mail: sipp...@sg.ibm.com

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to