On Tue, May 20, 2014 at 02:25:49PM +0200, Thomas Leuxner wrote:

> In any case you miserably failed to elaborate how to mitigate
> the issue other than stating 'revert the change'.

Without defending the tone of that advice, I'd like to affirm its
technical content.  Receiving MTAs should not disable SSLv3, they
gain nothing by doing so, all that happens is that clients that
are only capable of SSLv3 are forced to send in the clear.

Even sending MTAs should not disable SSLv3, since it is possible
and normal to send all relevant TLSv1 and later extensions in SSLv3
HELLO messages (provided the client also offers to negotiate
TLSv1 or greater), they just get ignored by SSLv3-only servers.

Opportunistic TLS is sometimes counter-intuitive, attempting to
make it stronger by removing weaker features actually makes it
weaker.  Don't give in to the urge to tweak TLS settings, they
are largely fine as they are.

In an upcoming Postfix 2.12 snapshot, I will change the definition
of tls_export_cipherlist to by default exclude "EXPORT" and "LOW"
ciphers, you can achieve the same effect now by setting:

    smtp_tls_exclude_ciphers = EXPORT, LOW
    smtpd_tls_exclude_ciphers = EXPORT, LOW

The reason this is safe, is that fortunately there are no longer
any systems that are not capable of using one of the stronger
ciphersuites, at least RC4-128 or 3DES.

Most other "hardening" configuration changes are likely to reduce,
rather than improve SMTP transport security.

-- 
        Viktor.

Reply via email to