<div dir="ltr"><div dir="ltr"><div dir="ltr"><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">In addition, it bypasses all the security folks have built around the<br>idea of blocking port 25 traffic from sources which should not be<br>operating as mail servers. Let's not make the network less secure in<br>the name of making it more so.</blockquote><div><br></div><div>I already addressed this issue in the "security considerations" section. </div><div><br></div><div>"Port 26 will be a secure alternative for Port 25. So Internet Service Providers are adviced to take precautions to prevent email spam abuse. They are advised to block port 26, if necessary."</div><div><br></div><div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">I'm not a fan over overloading semantic information in part of a<br>protocol where it doesn't belong, That's dug us in to a lot of deep<br>holes over the years. If you want to do this, seek a new DNS record<br>type or do like everybody else and create a TXT record to inform<br>internet peers of the availability of your new semantics for port 25.</blockquote><div><br></div><div>Yes, This suggestion came up on our discussions. </div></div></div></div></div><br><div class="gmail_quote"><div dir="ltr">On Sat, Jan 12, 2019 at 7:11 AM William Herrin <<a href="mailto:bill@herrin.us">bill@herrin.us</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">On Fri, Jan 11, 2019 at 4:22 PM Viruthagiri Thirumavalavan<br>
<<a href="mailto:giri@dombox.org" target="_blank">giri@dombox.org</a>> wrote:<br>
> What IETF Mailing list thinks? - "Implicit TLS doesn't offer any additional security than a downgrade protected STARTTLS. Let's not waste a port."<br>
<br>
In addition, it bypasses all the security folks have built around the<br>
idea of blocking port 25 traffic from sources which should not be<br>
operating as mail servers. Let's not make the network less secure in<br>
the name of making it more so.<br>
<br>
> e.g. <a href="http://mx1.example.com" rel="noreferrer" target="_blank">mx1.example.com</a> should be prefixed like <a href="http://smtps-mx1.example.com" rel="noreferrer" target="_blank">smtps-mx1.example.com</a>.<br>
<br>
I'm not a fan over overloading semantic information in part of a<br>
protocol where it doesn't belong, That's dug us in to a lot of deep<br>
holes over the years. If you want to do this, seek a new DNS record<br>
type or do like everybody else and create a TXT record to inform<br>
internet peers of the availability of your new semantics for port 25.<br>
<br>
Regards,<br>
Bill Herrin<br>
<br>
-- <br>
William Herrin ................ <a href="mailto:herrin@dirtside.com" target="_blank">herrin@dirtside.com</a> <a href="mailto:bill@herrin.us" target="_blank">bill@herrin.us</a><br>
Dirtside Systems ......... Web: <<a href="http://www.dirtside.com/" rel="noreferrer" target="_blank">http://www.dirtside.com/</a>><br>
</blockquote></div><br clear="all"><div><br></div>-- <br><div dir="ltr" class="gmail_signature"><div dir="ltr"><div><div dir="ltr"><div dir="ltr">Best Regards,<div><br><div>Viruthagiri Thirumavalavan</div><div><span style="font-size:12.8px">Dombox, Inc.</span><br></div></div></div></div></div></div></div>