@net_gremlin besides I did use X.509-based auth decades ago.

@hcf @case2tv @dans_root @earthnewstech

Net Gremlin 🚴🏻 🐧 🇩🇪 🇪🇺 (@[email protected])

@[email protected] @[email protected] @[email protected] @[email protected] @[email protected] That's definitly wrong. IMAP/SMTP AuthN is also possible by e.g. mTLS (aka client certificates).

mastodon.ip6.li

@deepjoy
Yes, I participated in two projects funded by #NLnet
First, #CAcert (I was on the board from 2012 to 2016, most recently as Vice President). Then, from 2016 until its unfortunate discontinuation in 2022, I worked on the #WPIA project, again as Vice President and also as Managing Director.

I have to say that the email server actually requires the least work of all.
I use the #MailCow Suite @doncow , and a lot of it is already automated, and the individual components work together seamlessly.
My mail server "serves" almost the entire family network, as well as 4 small businesses and a handful of clubs. So, about 10 or 12 "main domains", and around 20 or 25 alias domains.

IP reputation hasn't worried me much either; I've only had one blacklisting issue in the last five years, but the hosting provider resolved it within a few hours. And of course, you have to ensure that #DKIM, #DMARC, #SPF etc. work together correctly. Then it becomes quite easy.
So I'd say things have gotten easier since I started #selfhosting e-Mail years ago. (#mDaemon was my first hosting suite for e-Mail).

Edit: I should also mention that I run an email setup with a primary mail server and a backup mail server.

@yunohost @nlnet

Bạn mới tự host và gặp khó khăn khi cài cert CA tùy chỉnh trên Android? Hãy bật chế độ nhà phát triển, vào Cài đặt > Bảo mật > Cài đặt chứng chỉ và thêm cert người dùng. Đối với Firefox, bật “Allow user certificates” trong “about:config”. Đảm bảo tên miền (appname.homelab) được trỏ đúng qua hosts hoặc DNS của Tailscale và kiểm tra ngày hết hạn cert. #selfhosted #Android #CACert #Tailscale #Caddy #Vietnam #tựhost #bảo_mật 🚀

https://www.reddit.com/r/selfhosted/comments/1q66i7n/ca_certificates_on

@publicvoit You are right that its so important to have encryption. Given the established ways of running https (with CAs) solutions like #LetsEncrypt were the most straight forward ones. It helped establishing things like #ACME and shorter cert-lifetimes.
Too bad projects like #CACert failed to really establish.
I would have hoped rolling out self-signed certs with #DNSSEC validation would have been considered by browsers as an additional and viable solution completely avoiding CA-hierarchies.

Die #Vermüllung des #Internet|s mit #AIslop wäre dadurch bekämpfbar indem konsequent reale Menschen in den Fokus gestellt werden.

https://www.youtube.com/watch?v=cGmVehWBdHI&t=1206s

KI: Der Tod des Internets | Doku HD | ARTE

YouTube

@fluepke Nutze die schon seit Jahren. Hatte nicht mitbekommen, dass das Angebot eingestellt wird. Scheinbar geringe Verbreitung und Akzeptanz.

Es bleibt, als komplett kostenlose Community-CA nach dem Web-of-Trust-Prinzip, aktuell wohl nur https://cacert.org/

#cacert

@jwildeboer @mynacol
Great. What do the entries look like that accept #letsencrypt and #CAcert.org for S/MIME certificates and disallow all others?

@alios no, but besides #OpenPGP there are compatible interpretations like enc that just work!

GitHub - life4/enc: 🔑🔒 A modern and friendly CLI alternative to GnuPG: generate and download keys, encrypt, decrypt, and sign text and files, and more.

🔑🔒 A modern and friendly CLI alternative to GnuPG: generate and download keys, encrypt, decrypt, and sign text and files, and more. - life4/enc

GitHub

This topic has been occupying my brain cycles for quite some time now. It's already so deep down that I spontaneously sing "I am CA" to the Village People's YMCA song :) So it's time to share with you all and get more input. (CA is Certification Authority in x.509 lingo, I'll explain it all in my blog series :) (Why didn't #cacert think about this many years ago? Damn ;)

#nerdcert

@qbi ja, #CACert und woanders.

Mehr kann ich dazu nicht sagen außer dass ich auf #PGP-basertes #2FA umstelle...