> On 10 Jan 2022, at 10:07 pm, Joachim Lindenberg 
> <postfix-us...@lindenberg.one> wrote:
> 
> thanks for the insights. Based on my experience, the mail domain is almost 
> never in the SANs of a certificate, not even with self-hosted domains like 
> mine. In other words, secure is likely to cause a lot more manual 
> configuration than verify.
> I´d definitely appreciate if mail.cloud9.net could update their configuration 
> as then I could get rid of some exceptions, and others would not have to 
> think about it when moving forward w.r.t. security.

Unless they also implement DNSSEC+DANE, there is no security advantage
to an "authenticated" connection to an insecurely obtained name.

Both "encrypt" and "verify" resist passive monitoring, and both are
vulnerable to active (MiTM) attacks.  So I don't think there's much
point in security theatre around "veriable" certificates for unverified
names.

-- 
        Viktor.

Reply via email to