On 2025-04-07 at 12:59:52 UTC-0400 (Tue, 8 Apr 2025 02:59:52 +1000)
Viktor Dukhovni via mailop <mailop@mailop.org>
is rumored to have said:

On Mon, Apr 07, 2025 at 12:47:33PM -0400, Bill Cole via mailop wrote:
On 2025-04-07 at 09:38:56 UTC-0400 (Mon, 7 Apr 2025 06:38:56 -0700 (PDT))
Mark Milhollan via mailop <lists-mai...@milhollan.com>
is rumored to have said:

Mainly it is for browsers but that would force some senders to go along
if their receivers began rejecting expired certificates

It is exceedingly rare for senders to use *any* certificate in a SMTP TLS
session. Very few servers request them and they are not needed for
encrypting traffic.

The OP is suggesting that servers would need to set short expiration
times even on self-signed certs, ... Some sort of server cert is almost
always required to use TLS with SMTP,

Please re-read what I wrote. I think you *misread* "senders" as "servers."

Of course servers need certs. Clients (SENDERS) do not. I feel certain that you know this and have said it frequently here in the past...


use of anonymous ciphers (TLS <= 1.2),
or raw public keys (RFC7250) is relatively rare (Postfix to Postfix when
TLS 1.3 is not supported would be the bulk of anon-TLS traffic).

In Postfix, with DANE "3 1 [12]" records and OpenSSL 3.2 or later, raw
public keys are used, and the certificate is replaced by just the
enclosed public key, any expiration date is then never communicated
to the client.

--
    Viktor.
_______________________________________________
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


--
 Bill Cole
 b...@scconsult.com or billc...@apache.org
(AKA @grumpybozo@toad.social and many *@billmail.scconsult.com addresses)
 Not Currently Available For Hire
_______________________________________________
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

Reply via email to