From 5fe83291abf526c7751397d0423548b81accad82 Mon Sep 17 00:00:00 2001 From: Dennis Baaten Date: Tue, 29 Oct 2019 14:55:23 +0100 Subject: [PATCH] typo --- DANE-for-SMTP-how-to.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/DANE-for-SMTP-how-to.md b/DANE-for-SMTP-how-to.md index ceffd07..40dd064 100644 --- a/DANE-for-SMTP-how-to.md +++ b/DANE-for-SMTP-how-to.md @@ -89,7 +89,7 @@ The risks of SMTP with opportunistic TLS can be mitigated by using DANE: In short: DANE allows sending mail servers to unconditionally require STARTTLS with a matching certificate chain. Otherwise, the sending mail server aborts the connection and tries another server or defers the message. Receiving servers with published TLSA records, are therefore no longer vulnerable to the afore mentioned man in the middle attacks. ## How about MTA-STS? -Internet.nl currently does not include MTA-STA in its tests. This paragraph explains why this is the case. +Internet.nl currently does not include MTA-STS in its tests. This paragraph explains why this is the case. First you need to understand that, as [explained on our website](https://en.internet.nl/faqs/report/), the selection and development of tests performed by internet.nl is primairily based on: * the [‘comply-or-explain’ list](https://www.forumstandaardisatie.nl/open-standaarden) of the Dutch Standardisation Forum which is mandatory for all Dutch government agencies;