-
-
Notifications
You must be signed in to change notification settings - Fork 50
Expose new tlsMode and tlsVerify options for connecting to the mail submission agent
#134
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
BrunoBernardino
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks @ntninja this looks very good, but I don't want to ship a breaking change (especially so soon after one), can we come up with a way where that's not necessary?
Additionally, there's no need to change the .env.sample file; email is only used for signup or MFA, nothing else, and I don't plan to use it for anything else.
The only thing, I can think of is adding an additional value to For bewCloud 4.x Sounds good enough?
The previous comment is wrong though: These variables do not (with or without this patch) enable signup email verification or multi-factor authentication via email. Instead these variables have previously (and still do with this patch) only provided the authentication information when connecting the Mail Submission Agent. Not providing any authentication information is a better default than sending I forgot to mention this, but without this patch connecting to the Mail Submission Agent is currently broken. This is because nodemailer will attempt |
I might be missing something, but why can't we not allow
I suppose you can change |
Because The proposed mechanism is for “auto” (the new recommended value mentioned in sample config) to mean “immediate TLS on port 465, required StartTLS otherwise”, with the default The |
So would this be OK then? #SMTP_USERNAME="" # optional, if you want to use signup email verification or multi-factor with an email service requiring authentication
#SMTP_PASSWORD="" # optional, if you want to use signup email verification or multi-factor with an email service requiring authentication |
e759611 to
471a182
Compare
|
@BrunoBernardino: Commit 471a182 implements the legacy compatibility behaviour for |
471a182 to
fd83ead
Compare
BrunoBernardino
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is looking great and very close! I have a few minor tweaks and a slight refactor request!
fd83ead to
d880c3a
Compare
…il submission agent
d880c3a to
f680e8d
Compare
|
@BrunoBernardino: Should hopefully be OK now |
BrunoBernardino
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Almost there, I just have a couple more suggestions and questions! Thank you for your patience!
…n 465 to prevent breaking change
f680e8d to
428b5a1
Compare
|
Fixed the multi-line comment |
BrunoBernardino
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for the changes!
|
This is live in v3.3.0! |
Replaces #125.
Exposes all the cursed security options I’ve in the past or present seen mail servers require.
This is a slightly breaking change: If the mail server does not support any encryption, one has to now explicitly set
email.tlsModeto"none", as the mail client will now refuse to automatically do an insecure downgrade to plaintext if StartTLS is not offered.