Am 23.10.2013 22:57, schrieb Viktor Dukhovni: > On Tue, Oct 22, 2013 at 06:07:49AM +0000, Viktor Dukhovni wrote: > > Follow-up, comments after a brief email discussion with Paul Wouters > of RedHat:
thank you so much for that! >> * Firstly, client TLS extensions are not possible when the client starts >> with an SSLv2 compatible SSL HELLO. So the list of supported curves >> is not sent by clients that are backwards compatible with SSLv2 (though >> of course by now SSLv2 should be disabled in most clients). > > This is still an issue, but nobody should enable SSLv2, so perhaps > breakage when you do is tolerable. RedHat could disable client-side > ECDH ciphers for SSL connections for which SSLv2 is enabled. understood >> * Secondly, the OpenSSL server API does not expose the client's >> supported EC curves to the server application which is expected >> to configure the EECDH curve. Thus the extension from RFC 4492 >> is almost never used, most servers choose the EECDH curve blindly. > > While OpenSSL does not currently allow the server's choice of curve > to adjust to client capabilities, it does in fact check whether > the server's curve is on the client's list, and if not, the OpenSSL > server code with disable ECDH cipher-suites. understood > The problem turns out to be that RedHat's patch did not prune the > list of curves advertised by the TLS client! They're going to > update the code to only advertise secp{256,384}r1, which will make > connections to gmx.de work again (but without EECDH) sounds good and thank you again to point this out so "we" can expect a fixed package soon and disable workarounds in the meantime "smtp_tls_policy_maps" works like a charme sooner or later i will have the whole postfix-documentatin in my configs :-) /etc/postfix/tls_policy gmx.de encrypt exclude=ECDH gmx.at encrypt exclude=ECDH gmx.net encrypt exclude=ECDH gmx.com encrypt exclude=ECDH