Dňa 23. októbra 2023 10:26:57 UTC používateľ Jaroslaw Rafa via mailop 
<mailop@mailop.org> napísal:

>However, all this discussion is hardly related to email, as - as many have
>noted - there's hardly any certificate checking at all between MTAs.

Do you want to tell, that MUAs communications are not part of email?

Do our MTAs works only for self and mails ends nowhere or they
provides transport channel for end users and thus end users are
what matter? Or all your users still authentificate and sends/reads
own mails over plaintext and TLS is important only in MTA-MTA?

As someone other pointed, MUAs doesn't do DANE, nor SCT, nor
anything extra to check certs. AFAIK support of SCRAM+ auth is
not common (if any). In other words, that XMPP incident is fully
applicable to email and it is possible to intercept your users
connections and one can only very little to do, to avoid that.

Mary: the server authentication is required part of TLS, thus  that
was success break of TLS. As with the chain, the TLS is only as
secure as its individual parts are...

Yes, it is nothing new, and yes, the server's auth was success due
valid (but rogue) certificate. That cert was issued due MiTM, that
is known problem too, but then it can be insufficience in ACME (or
PKI), but anyway it shows as can be TLS breaked.

AFAIK in the TLS 1.3 significantly reduced amount of cipher suites
(beside other), thus it significantly reduces possibility to use of
weak ciphers, or opposite, increases encryption security. But the
TLS is (or should be) not only about encryption. The question, which
comes into my mind is, if ommiting other parts of TLS was not
intended...

regards


-- 
Slavko
https://www.slavino.sk/
_______________________________________________
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

Reply via email to