On Sat, 02 Aug 2014, Viktor Dukhovni wrote:
> > } Aug 1 09:59:59 s_local@eugeni postfix/smtp[22481]: Untrusted TLS
> > connection established to mx02.posteo.de[89.146.194.165]:25: TLSv1.2 with
> > cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)
>
> For what recipient domains. You need to find the immediately subsequent
>
> postfix/smtp[22481]: <queue-id>: to=<...>, relay=..., dsn=...
>
> log entry to determine which domain's mail was routed to posteo.de's
> MX host.
Right, that explains it, thanks:
The untrusted instances I looked at came from a whole mix of posteo.$TLD
(for TLD in is, ru, net), none of which are secure. Delivering to a
posteo.de recipient yielded the verified connects.
> > If having one nameserver return SERVFAIL can induce this behavior, then this
> > seems like a potential downgrading vector that could be abused.
>
> Correlation does not imply causation. A false premise, yields false
> conclusion.
Good thing it was guarded with a conditional :)
Cheers,
Peter
--
| .''`. ** Debian **
Peter Palfrader | : :' : The universal
http://www.palfrader.org/ | `. `' Operating System
| `- http://www.debian.org/