On 10/12/25 11:59 AM, Andrew C Aitchison via mailop wrote:
What would we need in order for SMTP TLS client certificates to have a useful place in authenticating the sender ?

Please clarify who / what "the sender" is.

1) The person that strung together the words in the body of the email? (author?)

2) The person that put those words into email form and submitted to an MTA? (sender in RFC 822 header sense?)

3) The system connected to the receiving MTA? (other side of the SMTP connection)

I'm not trying to be pedantic here, but I think it makes a difference.

My personal use case is #3, authenticating the remote connected MTA (or MSA) that's sending the message to my receiving MTA.

Specifically I already have to have, and have to protect, a public certificate and private key for my hosts that I must keep secure. So re-using those credentials for multiple things as opposed to needing to secure additional credentials has some value to me.

This is especially true when the IP address may change and can't be used as a form of authentication.

I don't think that a hop-by-hop security mechanism in and of itself can vouch for #1 nor #2. At least not without a LOT more complications somewhat akin to some of the complications with RPKI for BGP trying to vouch for the path.



--
Grant. . . .
unix || die
_______________________________________________
mailop mailing list
[email protected]
https://list.mailop.org/listinfo/mailop

Reply via email to