On Tue, Jun 17, 2014 at 08:39:38PM +0200, Per Thorsheim wrote:
> Sounds good, look forward to see it finalised. Blogged this today:
> https://starttls.info/blog/from-zero-to-hero-in-no-time/
>
> ACLU, EFF and many others are now actively promoting starttls
> deployment, as you may have seen from the past few weeks with lots of
> services announcing support and implementing it quickly. Next step, if
> I'm not completly wrong, is to get TLDs to use DNSSEC if they haven't
> got it already, then deploy it for your own domains, and then hopefully
> your DANE TLS proposal.
>
> I really hope that will catch on and be deployed faster than we've
> waited for RFC3207.
Thanks for fighting the good fight. In the mean-time, any chance
you could stop fix the misleading TLS support scores starttls.info
issues to soundly configured MTAs?
* For SMTP, self-signed certificates are as good as CA issued
certificates. The hostname in the certificate is irrelevant.
* For SMTP servers support for anon-DH cipher-suites is a feature,
not a bug.
* For opportunistic TLS, even the weakest ciphers are fine,
provided strong ones are preferred when offered.
Almost every score-lowering observation leading to 43.5% D for
dukhovni.org is wrong.
--
Viktor.