2018
DOI: 10.17487/rfc8314
|View full text |Cite
|
Sign up to set email alerts
|

Cleartext Considered Obsolete: Use of Transport Layer Security (TLS) for Email Submission and Access

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 16 publications
0
6
0
Order By: Relevance
“…It is emphasised that RFC 7817 [19] does not apply to MTA-to-MTA communications. That is, as per RFC 8314 [5] [29] is a mechanism that binds certificates to domain names. That is, rather than depending on Certification Authorities (CA), DANE relies on DNSSEC for publishing public keys and certificates for use during TLS handshake.…”
Section: B Email Security Standardsmentioning
confidence: 99%
See 1 more Smart Citation
“…It is emphasised that RFC 7817 [19] does not apply to MTA-to-MTA communications. That is, as per RFC 8314 [5] [29] is a mechanism that binds certificates to domain names. That is, rather than depending on Certification Authorities (CA), DANE relies on DNSSEC for publishing public keys and certificates for use during TLS handshake.…”
Section: B Email Security Standardsmentioning
confidence: 99%
“…This situation directly affects the communication link between an end-user and the corresponding SMTP server as well as that among SMTP servers, which is the focus of this work. For end-user to email server communications, RFC 8314 [5] deprecates the use of cleartext. In addition, end-users can rely on the OpenPGP [6] and S/MIME [7] standards to achieve the aforementioned security goals in an end-to-end fashion.…”
Section: Introductionmentioning
confidence: 99%
“…It is further recommended that the connection between the client and MSA be secured using TLS [RFC5246] [RFC8314], associated with the full range of protective measures described in Section 5.2.…”
Section: Sending Via Smtpmentioning
confidence: 99%
“…Establishing a connection with the server over TCP and authenticating to a mailbox with a username and password sent without encryption is not recommended. IMAP clients should connect to servers using TLS [RFC5246] [RFC8314], which should be associated with the full range of applicable protective measures described in Section 5.2.…”
Section: Receiving Via Imapmentioning
confidence: 99%
See 1 more Smart Citation