Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Well, use DNSSEC and add a new field in the DNS (e.g. CRYPTINFO = FORCE-HTTPS, FORCE-SMTPS). That would take time to spread, yes, but it would be a perfect solution for a lot of "prevent MITM downgrade" issues.


Yes, it would take a long time to spread considering there's a whopping 388 domains out there using DNSSSEC for SMTP, the majority of them run by neckbeards and not commerical email services.

    388 	Zones have deployed TLSA for SMTP with STARTTLS (Port 587)
I don't expect this to catch on, ever.

http://secspider.verisignlabs.com/stats.html




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: