-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support MTA Strict Transport Security (MTA-STS) #1388
Comments
👍 |
hey, interested in taking a stab at this, and also giving users the option to enable TLSRPT! will try to get something working this wknd. |
I see changelog entry about mta-sts and had some reading :O |
@jookk MTA-STS won't be activated unless HTTPS certificates are present, so you should be fine. |
MTA-STS is a new IETF standard that enables sending downgrade-resistant email over SMTP by piggybacking on the browser Certificate Authority model. Implementing this standard for Mail-in-a-Box would ostensibly mitigate downgrade-to-plaintext attacks on MiaB servers.
IETF standard: https://datatracker.ietf.org/doc/draft-ietf-uta-mta-sts/
Validator: https://aykevl.nl/apps/mta-sts/
The steps for MTA-STS implementation are summarized on the above validator page.
The text was updated successfully, but these errors were encountered: