I *think* the answer to this is that I am fine.

Last year I only used CA issued certificates.

This year, I am wanting to move to self-signed for SMTP and for infrastructure domains that are not intended for the public where DANE can validate. I am convinced DANE does a better job at validating a host is who it says it is than CA certs do.

I just updated one of my mail servers to self-signed. The signed certificate expires in few weeks so I can switch back if I did something wrong.

https://ssl-tools.net/mailservers/deviant.email

That gives a red flag for Unknown Authority. Which being self-signed it is, so I assume that red flag is meaningless?

I know most SMTP servers never bother with validating CA certificates, I have personally found many that even have hostname mismatch yet other SMTP servers still connect to them securely, so I think I am fine.

My other DANE enforcing mail servers did connect.

However is there a way to check that my self-signed cert "does things right" as far as what *should* be in a SMTP self-signed cert?

Reply via email to