On 05 Jan 2015, at 15:52, Viktor Dukhovni <postfix-us...@dukhovni.org> wrote:

> On Mon, Jan 05, 2015 at 03:10:49PM +0100, Matthias Schneider wrote:
> 
>> I noticed that many Exchange Servers nowadays have problems with TLS. Is
>> there a way to make a fallback to plain if there is a timeout on MAIL FROM?
> 
> Postfix 2.12 (almost released, but for now 2.12-20141228 is the
> latest snapshot) will by default retry in cleartext when TLS data
> transfer fails, in most cases after initially deferring the message.
> 
> http://permalink.gmane.org/gmane.mail.postfix.user/243401
> 
> http://archives.neohapsis.com/archives/postfix/2013-11/0121.html
> 
> https://www.ietf.org/mail-archive/web/tls/current/msg10471.html
> 
> You can configure your SMTP client with:
> 
>    -o tls_export_cipherlist=aNULL+AES128:aRSA+AES128:RC4-SHA:STRENGTH 
> 
> This selects a cipherlist that is something like:
> 
>    AECDH-AES128-SHA        SSLv3 Kx=ECDH       Au=None Enc=AES(128)  Mac=SHA1
>    ADH-AES128-GCM-SHA256   TLSv1.2 Kx=DH       Au=None Enc=AESGCM(128) 
> Mac=AEAD
>    ADH-AES128-SHA256       TLSv1.2 Kx=DH       Au=None Enc=AES(128)  
> Mac=SHA256
>    ADH-AES128-SHA          SSLv3 Kx=DH         Au=None Enc=AES(128)  Mac=SHA1
>    ECDHE-RSA-AES128-GCM-SHA256 TLSv1.2 Kx=ECDH Au=RSA  Enc=AESGCM(128) 
> Mac=AEAD
>    ECDHE-RSA-AES128-SHA256 TLSv1.2 Kx=ECDH     Au=RSA  Enc=AES(128)  
> Mac=SHA256
>    ECDHE-RSA-AES128-SHA    SSLv3 Kx=ECDH       Au=RSA  Enc=AES(128)  Mac=SHA1
>    SRP-RSA-AES-128-CBC-SHA SSLv3 Kx=SRP        Au=RSA  Enc=AES(128)  Mac=SHA1
>    DHE-RSA-AES128-GCM-SHA256 TLSv1.2 Kx=DH     Au=RSA  Enc=AESGCM(128) 
> Mac=AEAD
>    DHE-RSA-AES128-SHA256   TLSv1.2 Kx=DH       Au=RSA  Enc=AES(128)  
> Mac=SHA256
>    DHE-RSA-AES128-SHA      SSLv3 Kx=DH         Au=RSA  Enc=AES(128)  Mac=SHA1
>    AES128-GCM-SHA256       TLSv1.2 Kx=RSA      Au=RSA  Enc=AESGCM(128) 
> Mac=AEAD
>    AES128-SHA256           TLSv1.2 Kx=RSA      Au=RSA  Enc=AES(128)  
> Mac=SHA256
>    AES128-SHA              SSLv3 Kx=RSA        Au=RSA  Enc=AES(128)  Mac=SHA1
>    RC4-SHA                 SSLv3 Kx=RSA        Au=RSA  Enc=RC4(128)  Mac=SHA1
> 
> With RC4-SHA early enough for the 11-year old Microsoft Exchange
> servers.

Sadly, older Exchange servers (2003 at least) will favour 3DES over RC4 
for TLS connections, IIRC.

I don't have the fix we used on hand, as our oldest supported Exchange 
version is 2010 these days, but we had an override of some sort that 
required forcing 'DES-CBC3-SHA' for that specific box.

You can specify that as 'DES-CBC3-SHA', or select with something like 
this;

==
$ openssl ciphers -v 'RSA+3DES'
DES-CBC3-SHA            SSLv3 Kx=RSA      Au=RSA  Enc=3DES(168) Mac=SHA1
==

HTH,
Joni

Reply via email to