Am 26.06.2012 20:04, schrieb Daniel L. Miller:
> After a recent Ubuntu server upgrade, the packaged versions of Postfix -
> using Ubuntu's "Precise" version, as well as the "security", "updates",
> and "backports" repositories - Postfix's TLS is broken with the known
> SSL version issue:
> 
> warning: TLS library problem: 4425:error:1408F10B:SSL
> routines:SSL3_GET_RECORD:wrong version number:s3_pkt.c:340:
> 
> I've tried a couple different main.cf settings, including:
> smtpd_tls_mandatory_protocols = !SSLv2, !SSLv3
> 
> but the only option that has given me temporary functionality is:
> smtpd_tls_security_level=none
> 
> Is there a way I can restore TLS functionality via configuration? Or is
> an updated Postfix, possibly a self-compiled version, my only option?

have you read
http://www.postfix.org/TLS_README.html ?


in quantal

http://packages.ubuntu.com/search?keywords=postfix&searchon=names&suite=quantal&section=all

postfix is
2.9.3-2: amd64 i386

there should be a lot of tls fixes

ftp://ftp.fu-berlin.de/unix/mail/postfix/official/postfix-2.9.3.HISTORY

i.e
--snip
20120422

        Bit-rot: OpenSSL 1.0.1 introduces new protocols. Update the
        known TLS protocol list so that protocols can be turned off
        selectively to work around implementation bugs.  Based on
        a patch by Victor Duchovni.  Files: proto/TLS_README.html,
        proto/postconf.proto, tls/tls.h, tls/tls_misc.c, tls/tls_client.c,
        tls/tls_server.c.
--snip



recompile it on oneric or wait till backport

there was a thread
http://comments.gmane.org/gmane.mail.postfix.user/229196

--snip
That will be a solution for Postfix 2.10.

Meanwhile, for earlier Postfix releases, how much of the problem
can be solved by changing from:

    mumble_tls_mandatory_protocols = SSLv3, TLSv1

(i.e. the current default) to:

    mumble_tls_mandatory_protocols = !SSLv2

I don't mind that the older Postfix versions would not be able to
turn on/off protocols that didn't exist at the time Postfix was
released.

        Wietse
--snipend

http://www.postfix.org/postconf.5.html

--snip

smtp_tls_mandatory_protocols (default: !SSLv2)

    List of SSL/TLS protocols that the Postfix SMTP client will use with
mandatory TLS encryption. In main.cf the values are separated by
whitespace, commas or colons. In the policy table "protocols" attribute
(see smtp_tls_policy_maps) the only valid separator is colon. An empty
value means allow all protocols. The valid protocol names, (see
SSL_get_version(3)), are "SSLv2", "SSLv3" and "TLSv1".

    Note: As of OpenSSL 1.0.1 two new protocols are defined, "TLSv1.1"
and "TLSv1.2". If an older Postfix version is linked against OpenSSL
1.0.1 or later, these, or any other new protocol versions, are
unconditionally enabled.

    With Postfix ≥ 2.5 the parameter syntax is expanded to support
protocol exclusions. One can now explicitly exclude SSLv2 by setting
"smtp_tls_mandatory_protocols = !SSLv2". To exclude both SSLv2 and SSLv3
set "smtp_tls_mandatory_protocols = !SSLv2, !SSLv3". Listing the
protocols to include, rather than protocols to exclude, is supported,
but not recommended. The exclusion form more closely matches the
behaviour when the OpenSSL library is newer than Postfix.

    Since SSL version 2 has known protocol weaknesses and is now
deprecated, the default setting excludes "SSLv2". This means that by
default, SSL version 2 will not be used at the "encrypt" security level
and higher.

    See the documentation of the smtp_tls_policy_maps parameter and
TLS_README for more information about security levels.

    Example:

    # Preferred form with Postfix ≥ 2.5:
    smtp_tls_mandatory_protocols = !SSLv2, !SSLv3
    # Alternative form.
    smtp_tls_mandatory_protocols = TLSv1

--snipend

but i am not really up2date with this issue

but i am sure others are and will answer
-- 
Best Regards
MfG Robert Schetterer


Reply via email to