One of the things I find interesting here is that the question is whether to disable the protocol version. We’re not limited to just enable/disable for those versions to get the attention of the sender (assuming they’d even notice if they were going clear-text). A receiver could also impact them by limiting the number of messages per session, tarpit the sessions, number of messages per $time-period, or place the messages in the spam folder, etc. Could we name-and-shame for larger entities? Or report them to some entity that tracks security compliance?
-- Alex Brotman Sr. Engineer, Anti-Abuse & Messaging Policy Comcast From: mailop <mailop-boun...@mailop.org> On Behalf Of Sidsel Jensen via mailop Sent: Wednesday, August 3, 2022 6:34 AM To: <mailop@mailop.org> <mailop@mailop.org> Subject: [EXTERNAL] [mailop] Disabling TLS 1.0 and 1.1 for MTA to MTA communication Hi MailOps We were having a discussion on the possibility to disable TLS 1.0 and 1.1 for MTA to MTA communication, and based on the numbers we've seen so far, it doesn't look that far fetched. What's the common consensus in the mail community about this currently? It's already been disabled for our customers towards fx. imap and smtp, and we all agree those pesky old versions should be phased out, sooner rather than later, but have you also disabled it for MTA to MTA communication as well or are you still considering it? And what scenarios are currently holding you back? And what about PLAIN - do you still allow that as the fallback option or are you also considering disabling that? I'm looking forward to read your replies :-) Kind Regards, Sidsel Jensen Architect of Deliverability and Abuse @ Open-Xchange
_______________________________________________ mailop mailing list mailop@mailop.org https://list.mailop.org/listinfo/mailop