If this is one of those frequently re-asked questions, my apologies in advance, and pointers would be appreciated, but anyway:

SMTP mail does opportunistic TLS. A session starts on a plain TCP connection to port 25, then after a command or two the client says STARTTLS, the server says something like "220 go ahead", then they do the TLS handshake on the existing TCP connection and the rest of the session is encrypted.

Someone suggested that a mail sevrver could use QUIC, but I don't see how that could work. I suppose hypothetically when it sees the STARTTLS it could drop the TCP connection and continue over UDP, but without extra mechanism there'd be no way to tell what client UDP port number the session was supposed to use. Am I missing something? Does anything upgrade existing sessions to encrypted QUIC?

There is a variety of mail submission that does the TLS handshake at the beginning of the session which I suppose could start over QUIC, but that is something else.

TIA,
John Levine, [email protected], Taughannock Networks, Trumansburg NY
Please consider the environment before reading this e-mail. https://jl.ly

Reply via email to