Solved

Encryption for e-mail local delivery

Posted on 2016-10-09
1
40 Views
Last Modified: 2016-10-10
Hello!

I understand well what happens when SMTP server, say Postfix contacts remote SMTP server to send or receive mail. The connection could (and should) be encrypted, certain ports must be used and the certificate must be valid and accepted by all parties.
But when it comes to the local e-mail delivery for me it's a grey area. Ok, let's say if we're talking about receiving mail and Postfix already got it from the remote server. Then we have MDA (like Courier) that takes the mail from Postfix and gives it to a MUA (like Thunderbird Mail, for example). I'm talking about one physical machine and one user session. What the purpose of the encryption if it all happens inside and no third party could be present? And if it's the case of the same computer and the same user, then does the validity of the cert play any role for e-mail delivery process from Postfix via Courier to Thunderbird Mail?
0
Comment
Question by:papa kota
1 Comment
 
LVL 36

Accepted Solution

by:
ArneLovius earned 500 total points
ID: 41836763
The delivery of mail over the internet can happen within STARTTLS

the MTA (Postfix/Sendmail/QMAIL) does not encrypt mail in this scenario, the mail is sent in plain text, but the communication between the mail servers that carries the email is encrypted.

After delivery from the remote MTA, the email exists on the server in a plain text form. The email is not "sent" to Courier-IMAP, or the MUA such as Thunderbird, but rather Thunderbird connects to courier (hopefully over IMAPS) which then opens the "mailbox" effectively "proxying" access to the mailbox, again the connection is in plaintext, with the communication encrypted with IMAPS.

IMAP/IMAPS and SMTP/SMTP STARTTLS have a similar relationship to HTTP/HTTPS

If Postfix, Courier-IMAP and Thunderbird are all of the same single user machine connecting over localhost, then the IMAPS certificate is less of an issue as sniffing the traffic across a network is no longer possible, but it still should be used in case somebody is able to run a a packet sniffer on the computer.

If you have a public certificate for SMTP STARTTLS, then I would usually use the same certificate for IMAPS
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Resolve DNS query failed errors for Exchange
This process describes the steps required to Import and Export data from and to .pst files using Exchange 2010. We can use these steps to export data from a user to a .pst file, import data back to the same or a different user, or even import data t…
Familiarize people with the process of utilizing SQL Server functions from within Microsoft Access. Microsoft Access is a very powerful client/server development tool. One of the SQL Server objects that you can interact with from within Microsoft Ac…
Familiarize people with the process of retrieving data from SQL Server using an Access pass-thru query. Microsoft Access is a very powerful client/server development tool. One of the ways that you can retrieve data from a SQL Server is by using a pa…

919 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now