On Sun, Feb 23, 2014 at 12:38:26PM -0500, Wietse Venema wrote:

> Applied to Postfix 2.8 and onwards.

Thanks.  Returning to the OP's question, disabling anonymous
cipher-suites will no substantially help to (after the fact) detect
MITM attacks.  All the attacker has to do is present some other
certificate from some trusted CA.

Without name checks (which don't apply for opportunistic connections)
the difference between "Trusted" and "Untrusted" is not in fact
that the former indicates absense of a man-in-the-middle.  Rather,
with "Trusted" you can potentially enable a "secure-channel" for
later connections (tls policy table, ...) and get MITM protection,
for future connections (provided you don't trust any "rogue" CAs).

-- 
        Viktor.

Reply via email to