Mark Constable wrote:
> If the MTA's local delivery agent handled the encryption,
> using a public key supplied by and from the users homedir,
> it would eliminate any other user on the system from
> interferring with the messages. Sure, Google Mail engineers
> and hacked LDA's could intercept messages on contrived
> systems but, in general, once messages were encrypted
> then they would be safe from further prying.

Of course you can do that using maildrop/openssl, e.g.

if (/^X-Encryption-Required: Yes/)
        xfilter "openssl smime -encrypt certificate.pem"

Where certificate.pem is readable by the server and has
also been imported in the client. Well, "openssl smime"
leaves something to be desired, as it eliminates all
existing headers. In any case, the headers won't be
encrypted, therefore the privacy that the client may
enjoy is slightly below secure pop3: an intruder on the
server will still be able to enumerate all received
messages.












































-------------------------------------------------------------------------
Check out the new SourceForge.net Marketplace.
It's the best place to buy or sell services for
just about anything Open Source.
http://ad.doubleclick.net/clk;164216239;13503038;w?http://sf.net/marketplace
_______________________________________________
courier-users mailing list
[email protected]
Unsubscribe: https://lists.sourceforge.net/lists/listinfo/courier-users

Reply via email to