Hello world, our current situation is as follows:
1. Public MX, very low incoming volume, "smtpd_tls_security_level = may" 2. Senders aren't known beforehand, i.e. no previous business relationship. 3. Senders' IT usually doesn't support DANE. 4. Incoming mail is considered highly(!) valuable to business. During a security audit, it was determined that the MX supported what the auditors called "weak" ciphers and protocols (SSLv3, TLSv1.0, RC4-MD5, anonymous ciphers and so on). The auditors demanded that we disable all those - not considering the fact that our Postifx _did_ assing a higher priority to "more secure" ciphers. Not surprisingly, a lot of sending systems failed back to plain text after we pushed the change to production. Could someone share experience with or point me to some kind of "best practices" regarding opportunistic TLS, or explain the reasoning for banning "weak" ciphers/protocols on a public MX? (again, not talking about a MSA, or a third party that we have ties with, which would allow us to nail down protocols/ciphers with TLS policy maps) Thanks Stefan