skip to main content
RFC3207: SMTP Service Extension for Secure SMTP over Transport Layer Security2002 RFC
Bibliometrics
Skip Abstract Section
Abstract

This document describes an extension to the SMTP (Simple Mail Transfer Protocol) service that allows an SMTP server and client to use TLS (Transport Layer Security) to provide private, authenticated communication over the Internet. This gives SMTP agents the ability to protect some or all of their communications from eavesdroppers and attackers.

RFC Downloads

Cited By

  1. Nosyk Y, Korczyński M, Lone Q, Skwarek M, Jonglez B and Duda A (2023). The Closed Resolver Project: Measuring the Deployment of Inbound Source Address Validation, IEEE/ACM Transactions on Networking, 31:6, (2589-2603), Online publication date: 1-Dec-2023.
  2. ACM
    Tasopoulos G, Dimopoulos C, Fournaris A, Zhao R, Sakzad A and Steinfeld R Energy Consumption Evaluation of Post-Quantum TLS 1.3 for Resource-Constrained Embedded Devices Proceedings of the 20th ACM International Conference on Computing Frontiers, (366-374)
  3. ACM
    Sikeridis D, Huntley S, Ott D and Devetsikiotis M Intermediate certificate suppression in post-quantum TLS Proceedings of the 18th International Conference on emerging Networking EXperiments and Technologies, (35-42)
  4. ACM
    Liu E, Akiwate G, Jonker M, Mirian A, Savage S and Voelker G Who's got your mail? Proceedings of the 21st ACM Internet Measurement Conference, (122-136)
  5. ACM
    Sikeridis D, Kampanakis P and Devetsikiotis M Assessing the overhead of post-quantum cryptography in TLS 1.3 and SSH Proceedings of the 16th International Conference on emerging Networking EXperiments and Technologies, (149-156)
  6. Lee H, Girish A, Van Rijswijk-Deij R, Kwon T and Chung T A longitudinal and comprehensive study of the DANE ecosystem in email Proceedings of the 29th USENIX Conference on Security Symposium, (613-630)
  7. ACM
    Chung T, van Rijswijk-Deij R, Choffnes D, Levin D, Maggs B, Mislove A and Wilson C Understanding the role of registrars in DNSSEC deployment Proceedings of the 2017 Internet Measurement Conference, (369-383)
  8. Chi A, Cochran R, Nesfield M, Reiter M and Sturton C A system to verify network behavior of known cryptographic clients Proceedings of the 14th USENIX Conference on Networked Systems Design and Implementation, (177-195)
  9. ACM
    Durumeric Z, Adrian D, Mirian A, Kasten J, Bursztein E, Lidzborski N, Thomas K, Eranti V, Bailey M and Halderman J Neither Snow Nor Rain Nor MITM... Proceedings of the 2015 Internet Measurement Conference, (27-39)
  10. ACM
    Kaushik S, Wijesekera D and Ammann P BPEL orchestration of secure webmail Proceedings of the 3rd ACM workshop on Secure web services, (85-94)
  11. Adida B, Chau D, Hohenberger S and Rivest R Lightweight email signatures (extended abstract) Proceedings of the 5th international conference on Security and Cryptography for Networks, (288-302)
  12. Manabe D, Kimura S and Ebihara Y A compression method designed for SMTP over TLS Proceedings of the 2006 international conference on Information Networking: advances in Data Communications and Wireless Networks, (803-812)
Contributors

Recommendations