Firefox does not speak MTA, so you are talking about a completely
different problem. MTA is oportunistic TLS, web is required TLS.
Are equivalencies a bad thing though? I'm talking about a general
acceptance of the idea that a user should not be given a false sense of
security by being presented with confirmation of a secure connection
when it isn't secure. I shouldn't have to hold back from using similar
situations in illustrations simply because they're not a 1:1 match in
irrelevant ways. The relevancy as pointed out in my words remains,
stripping end users from any connection to the technical details of a
mail server is to be completely ignorant of the exceptional growth of
individual mail server administrators who need guidance and rely on a
sane industry to perform sane activities around them. Telling them "no"
when it isn't sane to tell them yes is sane behavior. If it isn't, then
telling any end user anywhere at any time using any application "no"
instead of "You have a secure connection" under any any every
circumstance including ones in which the connection is in fact not
secure, would be equally as insane regardless of their choice in
protocol.
The government wire tapping the upstream provider to catch your packets
isn't going to say "Oh this is SMTP, I'm not supposed to touch it."
There's no universal bro code to leave SMTP alone and only spy on HTTP
activity.
On 2022-08-03 16:02, Bastian Blank via mailop wrote:
On Wed, Aug 03, 2022 at 03:05:43PM -0500, Jarland Donnell via mailop
wrote:
> You clearly see what TLS version and what ciphers were used. So you know
> if
> it was "secure" in your opinion or not.
I don't understand why Firefox did this:
https://hacks.mozilla.org/2019/05/tls-1-0-and-1-1-removal-update/
Firefox does not speak MTA, so you are talking about a completely
different problem. MTA is oportunistic TLS, web is required TLS.
Bastian
_______________________________________________
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop