> On 10 Jan 2022, at 10:07 pm, Joachim Lindenberg
> <[email protected]> wrote:
>
> thanks for the insights. Based on my experience, the mail domain is almost
> never in the SANs of a certificate, not even with self-hosted domains like
> mine. In other words, secure is likely to cause a lot more manual
> configuration than verify.
> I´d definitely appreciate if mail.cloud9.net could update their configuration
> as then I could get rid of some exceptions, and others would not have to
> think about it when moving forward w.r.t. security.
Unless they also implement DNSSEC+DANE, there is no security advantage
to an "authenticated" connection to an insecurely obtained name.
Both "encrypt" and "verify" resist passive monitoring, and both are
vulnerable to active (MiTM) attacks. So I don't think there's much
point in security theatre around "veriable" certificates for unverified
names.
--
Viktor.