On Wed, Aug 21, 2013 at 10:44:40PM +0200, Sebastian Wiesinger wrote:

> I just did, here is the PCAP:
> 
> http://www.karotte.org/smtp-gmx.pcap

The client sends an "internal error" alert.  It is not clear what
problem it is encountering.  The server elects:

    Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (0xc009)

and the client purports to support the curve in the server certificate.
I don't have the expertise to try to debug the server's key exchange
message, but it it is typically secp256r1 aka prime256v1, which the
client purports to support.

> > There are no known practical attacks on 256-bit EC keys and 384-bit
> > EC is slower.  AES-128 with EC-256 is sufficiently secure for SMTP
> > TLS.  Though I expect that if the sender has trouble with 384-bit
> > EC, they'll have trouble with EC in general.
> 
> I found no real guidance in regards to EC so I chose a higher one.

It may be overkill, but it should work.  I am afraid the best path
forward is for GMX to debug this with their client software.

-- 
        Viktor.

Reply via email to