On 2025-05-23 02:49, Peter Corlett via mailop wrote:
On Fri, May 23, 2025 at 01:11:52AM -0700, Chris via mailop wrote:
On 2025-05-22 20:56, Marco Moock via mailop wrote:
[...]
587 does not use implicit TLS, it can use STARTTLS optional.

Correct.

Umm. That *may/can* be true. But as a rule it's chosen specifically
for use with TLS. I just performed a check to see if we've overlooked
anything using 587 and it's appears others have the same understanding.

Cloudflare, for example:
---QUOTE
Originally, the Simple Mail Transfer Protocol (SMTP) used port 25.
Today, SMTP should instead use port 587 — this is the port for encrypted
email transmissions using SMTP Secure (SMTPS).

Port 465 is also used sometimes for SMTPS. However, this is an outdated
implementation and port 587 should be used if possible. Finally, some email
service providers also support SMTP on port 2525 as a backup in case these
other ports are blocked by a network provider or a firewall.
QUOTE---

Cloudflare is not the relevant standards body, IETF is. Whoever wrote that
is technically wrong, which is not entirely surprised as this is quite a
confusing state of affairs. However, this also looks like user-level rather
than implementor-level documentation and the important takeaway is that mail
submissions should be encrypted, and that port 587 is the best choice.

The use of port 587 is described in RFC 6409 and "Updated by:" RFC 8314.

In particular from RFC 6409:

   Port 587 is reserved for email message submission as specified in this
   document. Messages received on this port are defined to be submissions.
   The protocol used is ESMTP [SMTP-MTA], with additional restrictions or
   allowances as specified here.

ESMTP, i.e. regular port 25 traffic, does not use implicit TLS, but can
optionally use STARTTLS. And so does traffic on port 587. Anything using
implicit TLS on port 587 is standards-violating and broken.

The "restrictions or allowances" concern themselves with authn/authz, fixing
up submitted messages etc. The RFC doesn't have much to say about TLS apart
from saying that submission servers "MAY" -- not even "SHOULD"! -- support
the STARTTLS extension, and also that it is "especially useful for message
submission".

RFC 8314 is that it reassigns port 465 from regular SMTP with implicit TLS
(which basically nobody used for that purpose except perhaps spammers and
other miscreants) to submission with implicit TLS. There is a corresponding
rename of the service (see /etc/services) from "smtps" to "submissions".

The authors of RFC 8314 clearly want to eventually completely replace
STARTTLS on 587 with implicit TLS on 465, but GLWT given the plethora of
MUAs and general resistance to change, so 587 isn't going away any time
soon. There are still plain HTTP sites on port 80, after all. But it also
has this to say:

   [...] As a result, clients and servers SHOULD implement both STARTTLS on
   port 587 and Implicit TLS on port 465 for this transition period.

Which is pretty clear.

I think 587 is always assumed to be encrypted. :)

Assumption is the mother of all cock-ups.
You said it, brother! I stand (rightfully) corrected. :)
IMHD It was 2 am. my time, and I was too tired to grok the appropriate RFC's. :{
I'll know better next time. ;)
Thanks for taking the time to produce the appropriate info.

The initial stages of the protocol
negotiation are not encrypted, and unless the server admin actually bothers
to test it periodically, it's merely an unverified aspiration that their
users' passwords and emails are properly end-to-end encrypted.

_______________________________________________
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

Attachment: 0xE512722F.asc
Description: application/pgp-keys

_______________________________________________
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

Reply via email to