Jan,

No, I have not.

Viktor suggested my webapp was at fault. I submitted a bug to the
middleware provider to see if they can isolate it but if there are other
apps with the same issue, it makes me wonder if there's something we can
change server side (postfix) to fix it.

You've renewed my interest. I'll poke a little  more to see if I can
figure it out.



Thanks,
Steffan

---------------------------------------------------------------
T E L  6 0 2 . 7 9 3 . 0 0 1 4 | F A X  6 0 2 . 9 7 1 . 1 6 9 4
Steffan A. Cline                        stef...@execuchoice.net
http://www.ExecuChoice.net                 Phoenix, Arizona USA
                  
---------------------------------------------------------------






On 12/7/14, 10:02 AM, "Jan Kowalski" <baken...@cock.li> wrote:

>Dnia , o godz. 
>"Steffan A. Cline" <stef...@hldns.com> napisaƂ(a):
>
>Hi,
>
>have you resolved this problem yet?
>
>I reproduce it when I connect via either imap or smtp from claws-mail
>linked against gnutls 3.3.10-1 to a postfix server with dovecot sasl
>enabled.
>
>In my case it is caused by my dovecot configuration, namely:
>
>ssl_protocols = !SSLv2 !SSLv3
>ssl_cipher_list = HIGH:!LOW:!SSLv2:!SSLv3:!EXP:!aNULL
>
>According to [1]:
>
>> It seems that following poodle many sites incorrectly banned SSL 3.0
>> record packet versions. Since gnutls uses an SSL 3.0 record to
>> advertise TLS 1.2, they are effectively banning it even if it doesn't
>> advertise SSL 3.0.
>
>After removing SSLv3 from ssl_cipher_list the client connected
>successfully. I'm not really sure though if it is a proper workaround
>or am I opening a possible attack vector; I will be carrying out more
>tests next weekend. However, I don't think it's necessary for gnutls to
>behave this way, NSS works fine in either configuration.
>
>[1]:
>http://lists.gnutls.org/pipermail/gnutls-help/2014-November/003673.html
>


Reply via email to