Hello world,

our current situation is as follows:

1. Public MX, very low incoming volume, "smtpd_tls_security_level = may"
2. Senders aren't known beforehand, i.e. no previous business relationship.
3. Senders' IT usually doesn't support DANE.
4. Incoming mail is considered highly(!) valuable to business.

During a security audit, it was determined that the MX supported what
the auditors called "weak" ciphers and protocols (SSLv3, TLSv1.0,
RC4-MD5, anonymous ciphers and so on). The auditors demanded that we
disable all those - not considering the fact that our Postifx _did_
assing a higher priority to "more secure" ciphers.

Not surprisingly, a lot of sending systems failed back to plain text
after we pushed the change to production.

Could someone share experience with or point me to some kind of "best
practices" regarding opportunistic TLS, or explain the reasoning for
banning "weak" ciphers/protocols on a public MX? (again, not talking
about a MSA, or a third party that we have ties with, which would allow
us to nail down protocols/ciphers with TLS policy maps)


Thanks
Stefan

Reply via email to