Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Future transition to IETF MTA-MTA security standards and supporting DEEP #33

Open
azet opened this issue Apr 29, 2016 · 1 comment
Open

Comments

@azet
Copy link
Collaborator

azet commented Apr 29, 2016

Hi,

There's currently a lot of work being done within UTA ("Utilising TLS in applications" - https://datatracker.ietf.org/wg/uta/documents) regarding mail security.

Strong contenders are:

  • SMTP-STS (to be splitted into multiple documents)
  • DEEP (MUA-MTA)

These standards are being actively worked on and aren't finished yet. They will be by around end of the year. Once they are RFCs and implemented in software, we should support these. Hence: we need to start thinking now about how we transition users from our current approach to these new security standards once they're deployment-ready.

I'm looking for comments, especially from @pde as he's intimately familiar with Certbot.

Aaron

@azet azet self-assigned this Apr 29, 2016
@azet azet changed the title Transitioning to IETF MTA-MTA and supporting DEEP standards Transitioning to IETF MTA-MTA security standards and supporting DEEP Apr 29, 2016
@azet azet changed the title Transitioning to IETF MTA-MTA security standards and supporting DEEP Future transition to IETF MTA-MTA security standards and supporting DEEP Apr 29, 2016
@azet azet added the mta-sts label Apr 30, 2016
@sydneyli
Copy link
Contributor

sydneyli commented Nov 3, 2018

There's a great comment by @jgillula on #88 about what we think re: transitioning to MTA-STS support.

Once they are RFCs and implemented in software, we should support these.

Although they're RFCs now, they're not yet implemented in software, with no clear timelines from major email providers and no strong commitments from Postfix or Exim either.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants