* "li...@rhsoft.net" <li...@rhsoft.net>:
> Am 21.06.2014 13:11, schrieb Stefan Foerster:
> > Could someone share experience with or point me to some kind of "best
> > practices" regarding opportunistic TLS, or explain the reasoning for
> > banning "weak" ciphers/protocols on a public MX? (again, not talking
> > about a MSA, or a third party that we have ties with, which would allow
> > us to nail down protocols/ciphers with TLS policy maps)
> 
> fire the clueless auditor not in the position to demand anything while
> lacking basics himself and not able to make a difference between
> HTTP and SMTP - what such people not understand is that HTTPS
> don't fall back to plaintext - SMTP does

While I certainly share your view on this - though I would have worded
it less strongly - my question still stands: Does anyone have real world
data to share (e.g. "we disabled ciphers X, Y and Z and then N percent
of clients failed back to plain"), or a pointer to some (semi-)official
documentation, scientific papers or the like about this?


Cheers
Stefan

Reply via email to