On 07/27/2017 01:44 PM, Dave Warren wrote:
>>
>> "Even if it were generally possible to determine a secure server name,
>> the SMTP client would still need to verify that the server's
>> certificate chain is issued by a trusted CA (a trust anchor). 
>>
> 
> I've never understood why this is a special challenge in the SMTP world,
> it's generally a solved problem for HTTPS, XMPP, and various other
> protocols.
> 

The practical reason is that unencrypted SMTP has to work if you want to
be able to communicate with the world. So, adding a second more-secure
channel *in addition to* the existing unsecured channel doesn't really
gain you anything. If someone connects to me and I don't like his CA, he
can fall back to plain text and I have to allow it (because of the
bajillions of people who don't do TLS over SMTP at all).

Doing TLS but without a trust chain is a nice compromise that lets us
encrypt the channel opportunistically, and doesn't discourage the
participants who would otherwise be put off by the trust chain issues.

This differs from e.g. HTTP in that a website can unilaterally make a
decision to go HTTPS-only and be fine, but your mail server can't
unilaterally decide that it will only accept mail from people with a
certificate that you approve of.

_______________________________________________
mailop mailing list
mailop@mailop.org
https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop

Reply via email to