Skip to content

Simon KRAMER

My feedback

12 results found

  1. 19 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    An error occurred while saving the comment
    Simon KRAMER commented  · 

    This is a very important issue, since (non-zero-knowledge) password-based security mechanisms (incl. password-based email client authentication) is very bad (password stored on the server, hopefully at least not in clear but hashed; weak and thus insecure passwords; and very often, email clients are configured to send the passwords even in clear to the email server!), and should urgently be replaced by more secure mechanisms, such as certificate-based client authentication (where no confidential information is stored on the server).

    See the following corresponding documentation and files for configuring such authentication in IMAP (email fetching, via Dovecot) and SMTP (email sending, via Postfix):

    documentation (server-side):
    https://doc.dovecot.org/2.3/configuration_manual/dovecot_ssl_configuration/#client-certificate-verification-authentication
    https://www.postfix.org/TLS_README.html#server_vrfy_client

    documentation (client-side, macOS):
    https://support.apple.com/de-de/guide/mail/cpmlprefsmtpserver/mac

    server files:
    /etc/dovecot/conf.d/11-plesk-security-ssl.conf
    /etc/postfix/main.cf

    The fact that Plesk is not prioritising this very important security issue is informative, but not of their professionalism (bad attitude towards the security of Plesk-customers).

    Best,
    SK

    Simon KRAMER supported this idea  · 
  2. 2 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    Simon KRAMER shared this idea  · 
  3. 64 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    Simon KRAMER supported this idea  · 
  4. 8 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    An error occurred while saving the comment
    Simon KRAMER commented  · 

    Please make it a priority, because:
    - https://scotthelme.co.uk/a-new-security-header-expect-ct/
    - security must be a priority by default (independently of user votes ;-)

    Simon KRAMER shared this idea  · 
  5. 9 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    Simon KRAMER supported this idea  · 
  6. 10 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    Simon KRAMER supported this idea  · 
  7. 19 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    Simon KRAMER supported this idea  · 
  8. 11 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    Thank you for your input! We will consider functionality to implement ability to set TLS as required for email connections in upcoming releases if it will be popular.

    Everyone, please continue voting for this feature if you consider it important.

    Please note that STARTSSL is a service of StartCom and there are issues with them to stay in CA role http://www.pcworld.com/article/3129725/certificate-policy-violations-force-reform-at-startcom-and-wosign.html so STARTSSL support will not be implemented in Plesk.


    ET

    Simon KRAMER supported this idea  · 
  9. 57 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    Simon KRAMER supported this idea  · 
  10. 39 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    Simon KRAMER supported this idea  · 
  11. 57 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    Simon KRAMER supported this idea  · 
  12. 9 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    Simon KRAMER supported this idea  · 

Feedback and Knowledge Base