Am 15.10.2014 um 23:06 schrieb Robert Schetterer:
Am 15.10.2014 um 22:44 schrieb A. Schulze:
Viktor Dukhovni:
POODLE is not an SMTP attack. No need to panic. Disabling SSL
3.0 may feel good, but the net effect is slightly negative, since
you'll now use cleartext with SSLv3-only SMTP peers.
to calculate the damage, count:
< inbound >
# grep 'TLS connection established from' /var/log/mail | sed -e
's/^.*\]\: //' -e 's/ with cipher.*//' | sort | uniq -c
< outbound >
# grep 'TLS connection established to' /var/log/mail | sed -e
's/^.*\]:25\: //' -e 's/ with cipher.*//' | sort | uniq -c
Andreas
doesnt look loosing much here
4 SSLv3
22353 TLSv1
2 SSLv3
17664 TLSv1
________________________________________
inbound MX
101 SSLv3
14550 TLSv1
616 TLSv1.1
7306 TLSv1.2
________________________________________
submission server
1 SSLv3
10828 TLSv1
2 TLSv1.1
29928 TLSv1.2
while i doubt SSLv3 + ECDHE
Oct 3 23:43:21 mail postfix/smtps/smtpd[30237]: Anonymous TLS
connection established from unknown[93.120.27.62]: SSLv3 with cipher
ECDHE-RSA-AES256-SHA (256/256 bits)
________________________________________
only incoming connections (logwatch don't like 2.11 outgoing logging)
that is the user where i know Outlook 2003 on Windows 7
Anonymous TLS connection established from ****: TLSv1 with cipher
ECDHE-RSA-AES256-SHA (256/256 bits)
on the other hand *that* is Outlook 2003 on Windows XP
Anonymous TLS connection established from ****: TLSv1 with cipher
DES-CBC3-SHA (168/168 bits)
but when i change the dovecot config below and add :!SSLv3 it no longer
connects to POP3S/IMAPS and the main difference here is that it don't
support STARTLS but 993/995 which could point out some bug in Outlook
ssl_cipher_list =
ECDHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES128-SHA256:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA:AES256-SHA:DHE-RSA-CAMELLIA128-SHA:DHE-RSA-CAMELLIA256-SHA:CAMELLIA128-SHA:CAMELLIA256-SHA:ECDHE-RSA-DES-CBC3-SHA:DES-CBC3-SHA:!SSLv2
ssl_prefer_server_ciphers = yes