Conversation

Looks like the only options for backing up a mailbox are offlineimap (a Python 2 tool that claims it's not under development anymore), imapfw (its replacement with last commit in 2017), and mbsync (a C tool). Is there really nothing better? I guess Python 2 > C, but =(
17
30
Replying to
What? Every public IMAP endpoint I ever used had WebPKI certificates. Half their docs are about using Gmail. And self-hosted setups should use free WebPKI certificates or their own roots, and likewise should require secure configuration by default, not be hung to dry.
1
1
The right way to use DANE is pinning keys. I don't think it makes much sense to use it to pin certificates. As a key pinning mechanism it's perfectly suited to be an additional security check and can live happily alongside Web PKI. CT is a nice check on registrars, not just CAs.
1
If you're thinking about DANE for HTTPS, yes PKIX-EE(1) is reasonably fit for purpose, if/when (some day) the browsers actually implement DANE. For SMTP, web PKI is not a good fit. See section 1.3 of RFC7672. MTA-STS is a kludge. WebPKI btw., is just as vulnerable to registrars
1
1
Show replies
Replying to and
Registrar is absolutely NOT a (new) threat with DANE. This is debunked FUD. With webpki 💩 certificates are issued based on unauthenticated DNS and have a strict superset of threats. CT equiv for DS delegations would be desirable tho.