From 53a1c70e7859b9b05f43444d5fe2bc7dac6f48ae Mon Sep 17 00:00:00 2001 From: Dennis Baaten Date: Wed, 31 Jul 2019 23:35:18 +0200 Subject: [PATCH] Update DANE-for-SMTP-how-to.md --- DANE-for-SMTP-how-to.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/DANE-for-SMTP-how-to.md b/DANE-for-SMTP-how-to.md index 11874b7..1608b4e 100644 --- a/DANE-for-SMTP-how-to.md +++ b/DANE-for-SMTP-how-to.md @@ -78,7 +78,7 @@ The illustration below shows two TLS capable e-mail servers without using DANE. The illustration below shows what happens when an attacker performs a man in the middle (MITM) attack and inserts its own certificate into the connection process. ![](dane-example-1-evilcert.png) -### Mail delivery: TLS with MITM using evil certificate +### Mail delivery: TLS with MITM stripping TLS The illustration below shows what happens when an attacker performs a man in the middle (MITM) attack and forces an unsecure connection by stripping the TLS capability from the receiving e-mail server. ![](dane-example-1-striptls.png)