On Apr 20, 2011, at 3:47 AM, lst_ho...@kwsoft.de wrote:

> Zitat von Noel Jones <njo...@megan.vbhcs.org>:
> 
>> On 4/19/2011 6:31 PM, jeffrey j donovan wrote:
>>> 
>>> On Apr 19, 2011, at 11:00 AM, lst_ho...@kwsoft.de wrote:
>>> 
>>>> Zitat von jeffrey j donovan<dono...@beth.k12.pa.us>:
>>>> 
>>>>> Greetings
>>>>> 
>>>>> I need some user opinions on obtaining certificates. Free or purchase ?
>>>>> 
>>>>> I have a bank of relays and imap servers running in my intranet. We have 
>>>>> been using self signed certs for ever, but I am thinking that a Free " 
>>>>> comodo " style cert may work in this case.  But I know absolutely nothing 
>>>>> about these in use with email, and I am really confused about the 
>>>>> different certificate types. what i should use, and where to get them.
>>>>> good bad indifferent , is there a better way ?
>>>>> 
>>>>> systems im looking at
>>>>> 
>>>>> primary mx
>>>>> primary dns
>>>>> 
>>>>> relays (1,2,3)
>>>>> imap/pop (1,2,3,4,) webmail/apache
>>>>> 
>>>>> my primary concern is the smtp relays I have setup for external 
>>>>> authentication. any advise would be helpful
>>>> 
>>>> With self-signed the users are bothered to decide if they like to trust 
>>>> your certs, and most of the time are not able to make a well founded 
>>>> decision.
>>>> So you should strive to use certificates which are known to the clients 
>>>> used by your userbase at the points your users connecting to your service. 
>>>> This will include
>>>> - IMAP-TLS/SSL
>>>> - POP3-TLS/SSL
>>>> - HTTPS
>>>> - SMTP-Submission with TLS
>>>> 
>>>> The downside of not using self-signed certificates is the need for 
>>>> replacing the certificates at end of validity which is rather short 
>>>> compared to what is possible when self-signing.
>>>> 
>>>> You may have a look here for "well-known" cheap certificates
>>>> 
>>>> http://www.startssl.com
>>>> 
>>>> or here for certificates from a community root-CA
>>>> 
>>>> http://www.cacert.org
>>>> 
>>>> Regards
>>>> 
>>>> Andreas
>>>> 
>>>> 
>>> thanks for the reply,
>>> 
>>> do I need one cert for each host or can I use the same across the domain?
>>> -j
>> 
>> 
>> The certificate is tied to the hostname used.  Each host with end-user 
>> clients connecting to them via SSL protected smtps/submission, IMAP, POP3, 
>> or https will need its own certificate, or if you have lots of hosts a 
>> wildcard certificate that covers the whole domain.
> 
> Most server certificates are available with alternative names eg. multiple 
> server names in one certificate, so you might use one certificate/key for 
> multiple servers. I'm not sure if wildcard certificates are well established 
> by standards.
> 
>> For typical internet MTA to MTA opportunistic TLS, a self signed certificate 
>> (or a valid certificate for the wrong hostname) will do fine, since these 
>> aren't verified.
>> 
>> You only need "real" certificates if you have clients connecting that expect 
>> a verified certificate -- typically customers submitting or fetching mail, 
>> or you run a web server on the same host.
> 
> Yupp, as said at the points your users are connecting "recognized" 
> certificates should be used.
> 
> Regards
> 
> Andreas
> 

Thank you Andreas and Noel, you have been very informative.
-j

Reply via email to