On 2025/04/07 10:43, Mark Milhollan via mailop wrote:
> On Mon, 7 Apr 2025, Viktor Dukhovni wrote:
> > On Mon, Apr 07, 2025 at 12:47:33PM -0400, Bill Cole via mailop wrote:
> > > On 2025-04-07 at 09:38:56 UTC-0400 (Mon, 7 Apr 2025 06:38:56 -0700 (PDT))
> > > Mark Milhollan via mailop <lists-mai...@milhollan.com>
> > > is rumored to have said:
> 
> > > > Mainly it is for browsers but that would force some senders to go along
> > > > if their receivers began rejecting expired certificates
> > > 
> > > It is exceedingly rare for senders to use *any* certificate in a SMTP TLS
> > > session.
> > 
> > The OP is suggesting that servers would need to set short expiration
> > times even on self-signed certs,
> 
> I did have senders and receivers swapped though.  I.e., some senders (SMTP
> clients) might refuse to deliver messages to receivers (SMTP servers) that
> are using a certificate that is expired or has too much validity (per CA/B).
> 
> This might, in effect, force those receivers to present a more normal
> certificate which if it must happen every 30-ish days almost requires the
> use of automation.

If they're doing certificate validation in the first place (not that
common for email, but it does happen): yes, expired certs are quite
likely to result in failure.

CA/B requirements are more involved in whether a CA's certificate
gets added to various root certificate programmes or not - it's not
impossible that some software might check this, but it's definitely
not the usual case in libraries implementing TLS, and it would hard to
be foresee a situation where someone is allowing self-signed certs
but also enforcing CA/B validity constraints. (And for CA-signed
certificates, it's mostly irrelevant because the CAs won't be
issuing them beyond the requirements anyway, assuming they want to
stay in the various root stores).

_______________________________________________
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

Reply via email to