Solved

Encryption for e-mail local delivery

Posted on 2016-10-09
1
44 Views
Last Modified: 2016-10-10
Hello!

I understand well what happens when SMTP server, say Postfix contacts remote SMTP server to send or receive mail. The connection could (and should) be encrypted, certain ports must be used and the certificate must be valid and accepted by all parties.
But when it comes to the local e-mail delivery for me it's a grey area. Ok, let's say if we're talking about receiving mail and Postfix already got it from the remote server. Then we have MDA (like Courier) that takes the mail from Postfix and gives it to a MUA (like Thunderbird Mail, for example). I'm talking about one physical machine and one user session. What the purpose of the encryption if it all happens inside and no third party could be present? And if it's the case of the same computer and the same user, then does the validity of the cert play any role for e-mail delivery process from Postfix via Courier to Thunderbird Mail?
0
Comment
Question by:papa kota
1 Comment
 
LVL 37

Accepted Solution

by:
ArneLovius earned 500 total points
ID: 41836763
The delivery of mail over the internet can happen within STARTTLS

the MTA (Postfix/Sendmail/QMAIL) does not encrypt mail in this scenario, the mail is sent in plain text, but the communication between the mail servers that carries the email is encrypted.

After delivery from the remote MTA, the email exists on the server in a plain text form. The email is not "sent" to Courier-IMAP, or the MUA such as Thunderbird, but rather Thunderbird connects to courier (hopefully over IMAPS) which then opens the "mailbox" effectively "proxying" access to the mailbox, again the connection is in plaintext, with the communication encrypted with IMAPS.

IMAP/IMAPS and SMTP/SMTP STARTTLS have a similar relationship to HTTP/HTTPS

If Postfix, Courier-IMAP and Thunderbird are all of the same single user machine connecting over localhost, then the IMAPS certificate is less of an issue as sniffing the traffic across a network is no longer possible, but it still should be used in case somebody is able to run a a packet sniffer on the computer.

If you have a public certificate for SMTP STARTTLS, then I would usually use the same certificate for IMAPS
0

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Resolve Outlook connectivity issues after moving mailbox to new Exchange 2016 server
The new Gmail Phishing Scam going around is surprising even the savviest of users with its sophisticated techniques.
In this video we show how to create a Contact in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.: First we need to log into the Exchange Admin Center. Navigate to the Recipients >> Contact ta…
In this Micro Video tutorial you will learn the basics about Database Availability Groups and How to configure one using a live Exchange Server Environment. The video tutorial explains the basics of the Exchange server Database Availability grou…

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question