tls-report | This repository contains tools to build the TLS | TLS library

 by   kirei Perl Version: Current License: Non-SPDX

kandi X-RAY | tls-report Summary

kandi X-RAY | tls-report Summary

tls-report is a Perl library typically used in Security, TLS applications. tls-report has no bugs, it has no vulnerabilities and it has low support. However tls-report has a Non-SPDX License. You can download it from GitHub.

This repository contains tools to build the "TLS in Sweden" website.
Support
    Quality
      Security
        License
          Reuse

            kandi-support Support

              tls-report has a low active ecosystem.
              It has 24 star(s) with 10 fork(s). There are 6 watchers for this library.
              OutlinedDot
              It had no major release in the last 6 months.
              There are 2 open issues and 11 have been closed. On average issues are closed in 2 days. There are no pull requests.
              It has a neutral sentiment in the developer community.
              The latest version of tls-report is current.

            kandi-Quality Quality

              tls-report has no bugs reported.

            kandi-Security Security

              tls-report has no vulnerabilities reported, and its dependent libraries have no vulnerabilities reported.

            kandi-License License

              tls-report has a Non-SPDX License.
              Non-SPDX licenses can be open source with a non SPDX compliant license, or non open source licenses, and you need to review them closely before use.

            kandi-Reuse Reuse

              tls-report releases are not available. You will need to build from source code and install.
              Installation instructions are not available. Examples and code snippets are available.

            Top functions reviewed by kandi - BETA

            kandi's functional review helps you automatically verify the functionalities of the libraries and avoid rework.
            Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of tls-report
            Get all kandi verified functions for this library.

            tls-report Key Features

            No Key Features are available at this moment for tls-report.

            tls-report Examples and Code Snippets

            No Code Snippets are available at this moment for tls-report.

            Community Discussions

            QUESTION

            When an e-mail message fails MTA-STS checks, it must not be delivered; will the sender be informed about the delivery failure? When?
            Asked 2021-May-12 at 09:47
            Short:

            When an e-mail message about to be send fails MTA-STS checks, it must not be delivered by design; will the sender be informed about the delivery failure? When?

            Long & Background info:

            When implementing mta-sts on custom domains to enforce the use of TLS connections, misconfigurations of the mta-sts.txt policy file (or a smtp-server not supporting TLS connections) will result in e-mail not being delivered as an enforced policy will require TLS connections to deliver the e-mail.

            Via TLS-reporting the domain holder - not the sender - could be informed about any problems, provided TLS reporting is set-up to a different domain or tool that notifies on a different address than the domain in question.

            My question is about any senders of e-mail messages. In a testcase with policy file mentioning incorrect mx records, no e-mails are delivered (as expected), but the test sender did not receive any messages about delivery problems (yet).

            Is this expected behaviour? Or will the sender be informed after a number hours? If so, how many hours? - I ask because a delivery failure and NDR (non-delivery-reports) are usually returned instantly.

            If a user misspelled an e-mail address or the receving server is down, the sender is informed about the trouble and can take action. Sometimes even the "delivery is delayed" is announced; not failed yet, but not delivered either.

            I get the impression that the sender is not informed that a message is not delivered and is "silently blackholed / discarded". To be clear: that the message is not delivered is expected behaviour in this test case.

            Spec: https://tools.ietf.org/html/rfc8461

            ...

            ANSWER

            Answered 2021-May-12 at 09:47

            After running some testcases, I have experienced the following:

            (This was done by a Outlook.com smtp server.)

            Testcase C
            • MTA-STS: Deliberately incorrect, but existing third-party mx server in mta-sts file.
            • DNS: Correct mx server.

            The sender was informed about the delivery failure after 24 hours.

            It was explained in my local language what was going on; here information highlights:

            1. That the message could was not delivered.
            2. That it was tried multiple times to deliver.
            3. But that the cause was being unable to connect to the remote server.
            4. Advise was given to contact the recipient by phone to ask the recipient to inform the postmaster about the error.
            5. It was even suggested that the problem could most likely only be solved by the postmaster.
            6. (A link was provided but that wasn't really helpful. Additionally the technical bounce message was visible among it the technical words "failed MTA-STS validation").
            Testcase B
            • MTA-STS: Correct and desired mx in mta-sts file.
            • DNS: Deliberately set to incorrect mx server, existing server though.

            After 24 hours I received an error back. Confusingly the message state that the address did not exists in the target domain. Though this is true, it shouldn't have gotten this far. However, when reviewing the technical part the outlook-sending server mentioned 'failed mta-sts errors validation'. So the technical part contained the correct mta-sts validation error, but the human/user readable part only mentioned that the target address did not exist in the target server.

            I guess if the address doesn't exists, any mta-sts errors are "less important" to report to the end-user. The user was advised to re-type and resend the e-mail and verify if the address with the recipient (phone was mentioned). However, even if the user followed the instructions, the next e-mail wouldn't have been delivered either, but that is beyond this testcase.

            Testcase A
            • MTA-STS: Correct mx in mta-sts file.
            • DNS: Fake MX corrects.

            After 24 hours I received an error back. The cause for not being able to deliver the message was being unable to resolve the domain location of the recipient. (Undesired result, but logical, mx were referring to nothing.)

            The technical part of the message mentioned 'DNS query failed'. Nothing of mta-sts was mentioned.

            Testcase Z (weird one)
            • MTA-STS: Correct mx in mta-sts file.
            • DNS: Incorrect but existing mx records; a cname referring to the same IP of the correct mx server (which shouldn't matter because mta-sts should compare cert with cname.)

            The results, unexpected:

            • One email got delivered somewhere between that 24 time-window.
            • One email failed due to mta-sts validation error.

            Temporary downtime of webserver might have been a factor, though that shouldn't have mattered. - Cannot explain.

            Conclusion

            I took a while to find the correct testcase as you can see. But Testcase C describes the desired behaviour. Yes, the sender is informed, after 24 hours with outlook.com as smtp-server. The user is informed in clear language. That being said, I do have an additional opinion about the timing here, mentioned below.

            Limitations

            Staying with the facts: I did not perform a testcase with a server trying unencrypted connections. Testcase C puts the ball into the the recipient's postmaster's court, I would be curious to see where the ball (the 'todo') would be placed, in the case of unencrypted attempts, as that cannot be solved by the recipient but must be solved by the sender or sender's postmaster.

            I also did not test multiple smtp servers.

            Further thoughts

            That being said, MTA-STS-validation needs to be supported by the sender SMTP (correct me in comments if I am wrong*), so if a server is so old it tries do deliver an e-mail over non-encrypted connection, it will most likely not support MTA-STS so it will not validate the MTA-STS policy and simply deliver the e-mail unprotected. * Found confirmation here, from paragraph "There is a standard...")

            If somebody tries to redirect some incoming e-mail by dns-poisoning, a modern smtp-server will not deliver the e-mail to an incorrect destination. So it protects against evil doing, not against legacy.

            Opinion

            I think the feedback delay of 24 hours is too long. Testcase C reports 11 retry attempts within that 24 hour window. Though I appreciate the system not giving up, I would argue that it might be in the interest of the sender to inform him of at least a non-regular delivery.

            Source https://stackoverflow.com/questions/67440531

            Community Discussions, Code Snippets contain sources that include Stack Exchange Network

            Vulnerabilities

            No vulnerabilities reported

            Install tls-report

            You can download it from GitHub.

            Support

            For any new features, suggestions and bugs create an issue on GitHub. If you have any questions check and ask questions on community page Stack Overflow .
            Find more information at:

            Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items

            Find more libraries
            CLONE
          • HTTPS

            https://github.com/kirei/tls-report.git

          • CLI

            gh repo clone kirei/tls-report

          • sshUrl

            git@github.com:kirei/tls-report.git

          • Stay Updated

            Subscribe to our newsletter for trending solutions and developer bootcamps

            Agree to Sign up and Terms & Conditions

            Share this Page

            share link

            Explore Related Topics

            Consider Popular TLS Libraries

            mkcert

            by FiloSottile

            v2rayN

            by 2dust

            acme.sh

            by acmesh-official

            nginxconfig.io

            by digitalocean

            v2ray

            by 233boy

            Try Top Libraries by kirei

            catt

            by kireiPerl

            fpdns

            by kireiPerl

            flashboot

            by kireiShell

            hass-chargeamps

            by kireiPython

            sha2wordlist

            by kireiC