On 10/20/2011 8:40 AM, Jan-Frode Myklebust wrote:
> I'm considering if I should enable opportunistic TLS on our smtp
> gateways.

Good idea.  Opportunistic TLS is good for preventing eavesdropping.


> Our gateways are known by several DNS names, so I think it
> will be difficult to use certificates signed by a "reputable" CA. 

Opportunistic TLS is about encryption, not authentication.  The name
used -- especially with a self-signed cert -- doesn't matter very much.

At any rate, it's usually a mistake to use multiple names for an MX.
 There is no requirement nor (technical) expectation that an MX will
use the same domain as the recipient.


> do other mailservers behave if we enable smtpd_tls_security_level=may
> and offer self signed certs with possibly wrong name compared to what
> the MX-records are pointing to ? 

Should be fine.



  -- Noel Jones

Reply via email to