On Sun, May 25, 2025 at 07:46:00PM +0000, Slavko via Exim-users wrote:

> >But there are no weaknesses in TLS v1.0 or v1.1 relative to v1.2 and
> >1.3 that are relevant to SMTP sessions.
> 
> Yes, i read that multiple times from various sources, but to decide
> properly, we have to ask (and answer) what is TLS version first.

Actually, that's not particularly significant for SMTP.  Disabling these
is an exercise in principled attack-surface reduction, predicated on the
idea that these are no longer required in a non-neglible subset of
connections.

> As example, from mentioned RFC TLS 1.0 makes mandatory to
> implement the TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA,
> without it that is not TLS 1.0,

This is grossly misleading, this MTI cipher for TLS 1.0 were an
interoperability baseline ~20+ years ago, but at this point it
is unused, and there's no expectation that it is still required,
you can enable TLS 1.0 and expect clients to use AES.


> it can only look as it. Do you really consider 3DES with CBC and SHA1
> as secure nowadays?

There are no known practical attacks on 3DES (112-bit keys) and SHA1
(HMAC) in TLS in the context of SMTP.  There are some browser-specific
issues with CBC ciphers because TLS did MAC-then-encrypt rather than
encrypt-then-MAC, but these required scripting many connectiosn to
possibly leak cookie information.  These attacks don't apply to SMTP.

The SHA1 collision attacks don't apply to TLS, for that you'd need
a 2nd-preimage attacks, which is not even yet known for MD5.

> I will more believe to OpenSSL devs, from 3.0 migration guide:
> 
>   The security strength of SHA1 and MD5 based signatures in TLS
>   has been reduced. This results in SSL 3, TLS 1.0, TLS 1.1 and
>   DTLS 1.0 no longer working at the default security level of 1 and
>   instead requires security level 0

This is a reasonable choice for the *generic* application, which is
not doing opportunistic TLS, and possibly shares some of the browser
attack surfaces.  It is less compelling for SMTP, but with the passage
of time, as noted above, the impact of dropping support for TLS 1.0/1.1
is becoming insignificant...

So you perhaps (using suitable Exim settings) include "@SECLEVEL=1"
in your cipherlist, or perhaps (if supported) set the protocol floor
to TLSv1.2.  Or leave well enough alone, there's no *compelling* reason
to worry about "sexy" cryptographic attacks, it is the boring attacks
(bugs, misconfiguration, supply-chain breaks...) you should worry about.

-- 
    Viktor.

-- 
## subscription configuration (requires account):
##   https://lists.exim.org/mailman3/postorius/lists/exim-users.lists.exim.org/
## unsubscribe (doesn't require an account):
##   exim-users-unsubscr...@lists.exim.org
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/

Reply via email to