[Info-vax] "SEND MAIL" doesn't send mail, mail stays in queue
Stephen Hoffman
seaohveh at hoffmanlabs.invalid
Thu Jan 25 15:20:00 EST 2018
On 2018-01-25 06:11:44 +0000, Phillip Helbig (undress to reply said:
> In article <p4batu$usj$1 at dont-email.me>, Stephen Hoffman
> <seaohveh at hoffmanlabs.invalid> writes:
>
>>>>> Why not receive it on VMS?
>>>>
>>>> Sure.
>>>>
>>>> If you're willing to post your usernames and passwords to the whole
>>>> Internet. Because that's what remote mail clients will do, when
>>>> accessing OpenVMS.
>>>
>>> If you send an email to me, where is a username or password involved?
>>
>> I'll ignore the lack of STARTTLS support here, but that's a whole
>> 'nother issue.
>>
>>> Passwords for sending email to VMS? I'm confused.
>>
>> Mail clients use credentials to access mail servers. If you decided
>> to hook up that iPad to that OpenVMS server for instance, you'd have to
>> use an insecure connection.
>
> OK. But if I log into VMS (from a terminal, or in DECwindows, or from
> outside via SSH) and read email with VMS MAIL, there are no passwords
> involved related to mail. Similarly if someone sends me an email. Of
> course, if you want to read email stored on VMS with some sort of POP
> client or whatever (with which I have no experience) then that is
> something different.
Hence my "remote mail clients" reference.
Few folks are interested in having to establish a VPN nor to use
command line access via ssh to access mail. Not when existing clients
allow direct access, and not when the OpenVMS native command-line
client can't deal with MIME encoded messages without added effort and
an external MIME tool. Which means that most folks running a mail
server seek to enable and use remote access via TLS-protected IMAP and
TLS-protected ESMTP. Neither of which is available with TCP/IP
Services.
Various clients that have been ported to OpenVMS — Seahorse and
Communicator, for example — also use the network (remote) path to
access the mail server.
Once the updated VSI TCPIP stack is available, it'd be appropriate for
VSI to disable unencrypted POP and IMAP access by default. Along with
other insecure protocols and tools. While we're migrating to the new
stack, might as well move (most) folks toward more security. But then
there's more than a little "fun" here getting the rest of certificate
authentication to work on OpenVMS, and getting certificate chains
configured and available, too.
--
Pure Personal Opinion | HoffmanLabs LLC
More information about the Info-vax
mailing list