Hello Bill,
you could as well just turn off encryption. If you don´t care to whom you 
disclose information, why not allow anyone to read it?
Are you also not using a trusted certificate or even no certificate for your 
public web site?
Seriously, I know this is discussion 10+ years. Is it better to encrypt 
communication to a communication partner without authentication or not? Since 
authentication today is easy, I think (or hope) that discussion is irrelevant...

All,
do we agree, that Email authentication requires two steps...
* DNSSEC
* trustworthy certificates (either truested root or DANE) and validation
... unless we want to resort to manually configuring trust (obviously entries 
in /etc/hosts are less likely to be manipulated by an attacker)?
And the dependency on DNSSEC is because of the indirection caused by MX, as 
otherwise - like in https - we can just validate the certificate against the 
user specified domain.
Moreover with Email we cannot assume a user to make the decision as in a 
browser certificate validation failure use case.

Thanks,
Joachim


-----Ursprüngliche Nachricht-----
Von: owner-postfix-us...@postfix.org <owner-postfix-us...@postfix.org> Im 
Auftrag von Bill Cole
Gesendet: Monday, 10 January 2022 01:29
An: Postfix users <postfix-users@postfix.org>
Betreff: Re: TLS enforcement options?

On 2022-01-09 at 19:08:56 UTC-0500 (Sun, 9 Jan 2022 19:08:56 -0500) Brett 
Dikeman <brett.dike...@gmail.com> is rumored to have said:

> The effort of setting up LetsEncrypt is offset by the long-term 
> benefit of automatically updated certificates, IMHO.

It's even easier to automate self-signed certificate regeneration. 
Anyone who uses self-signed certificates can just drop the command to generate 
a self-signed certificate into a cron job.

--
Bill Cole
b...@scconsult.com or billc...@apache.org (AKA @grumpybozo and many 
*@billmail.scconsult.com addresses) Not Currently Available For Hire

Reply via email to