micah <mi...@riseup.net> writes:

> Viktor Dukhovni <postfix-us...@dukhovni.org> writes:
>
>> On Wed, Oct 02, 2013 at 03:39:06PM -0400, Micah Anderson wrote:
>>
>>> From my understanding of the way postfix currently operates, there is no
>>> smtpd/stmp TLS setting that can be set that would provide a
>>> configuration that would result in a more 'hardened' configuration,
>>> without causing interoperability problems. If I am wrong, I'm very
>>> interested in knowing where.
>>
>> You get no benefit from hardening the Postfix SMTP server on port
>> 25 (tighter mandatory parameters on the submission port may work
>> for some).  This has little to do with Postfix and everything to
>> do with the fact that SMTP servers accept messages from total
>> strangers (many of the clients don't support TLS at all).
>
> Regarding tighter mandatory parameters on the submission port - any idea
> what these could reasonably be? For example, if I disable SSLv2/v3 am I
> going to cut off Outlook users? 
>
> It would be nice if we had a good survey of clients that are still out
> there.
>
> I looked at some of my logs and found the following from a small sample
> over the last day:
>
> # zgrep 'TLS connection' /var/log/postfix.log* |grep 'TLS connection'|awk 
> '{print $12, $15}' |sort | uniq -c |sort -nr
>  301849 TLSv1 DHE-RSA-AES256-SHA
>  109117 TLSv1 AES128-SHA
>   30032 TLSv1 RC4-SHA
>   14446 SSLv3 DHE-RSA-AES256-SHA
>    2532 TLSv1 AES256-SHA
>    1552 TLSv1 DHE-RSA-AES128-SHA
>     424 SSLv3 AES256-SHA
>     178 SSLv3 DHE-RSA-AES128-SHA
>      69 TLSv1 DES-CBC3-SHA
>      26 SSLv3 AES128-SHA
>      18 SSLv3 DES-CBC3-SHA
>      17 SSLv3 RC4-SHA
Ups, this machine is not yet on openssl1.0 yet, so these results are
somewhat useless. I'll have to get better ones from a newer machine.

micah

Reply via email to