STARTTLS is opportunistic and doesn't protect against active
Man-in-the-Middle. In case of TLS problems it falls back to plain text.

To protect against passive Man-in-the-Middle, there is no actual
difference between the self-signed certificate and certificate from
recognized CA, so, except may be very few unsignificant implementors,
all peers accept self-signed certificates for STARTTLS (unless DANE or
SMTP STS are used).



25.07.2017 17:51, Jonathan Leist пишет:
> Hello,
>
> We're looking to implement inbound TLS on machines that are only used
> to send mail and receive bounces, and I was wondering if anyone has
> encountered problems using a self-signed cert for that purpose. It
> seems like it would be easier to implement on a larger scale than
> would CA-signed certs—and using the self-signed cert worked fine in
> tests—but we also obviously don't want to do anything that would
> prevent us from receiving bounces. 
>
> Thanks for your time. 
>
> --
> Jonathan
>
>
> _______________________________________________
> mailop mailing list
> mailop@mailop.org
> https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop


-- 
Vladimir Dubrovin
@Mail.Ru

_______________________________________________
mailop mailing list
mailop@mailop.org
https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop

Reply via email to