On May 24, 2015, at 9:28 AM, Viktor Dukhovni <postfix-us...@dukhovni.org> wrote:

> On Sun, May 24, 2015 at 06:38:50AM -0400, Postfix User wrote:
> 
>>>     smtpd_tls_protocols = !SSLv2, !SSLv3
>>>     smtp_tls_protocols = !SSLv2, !SSLv3
>> 
>> Wouldn't the following be more secure:
>> 
>> smtpd_tls_protocols=!SSLv2, !SSLv3, !TLSv1, !TLSv1.1
>> smtpd_tls_protocols=!SSLv2, !SSLv3, !TLSv1, !TLSv1.1
> 
> No, these are less secure.  Bleeding edge security settings mean
> more email sent in the clear, or not delivered at all.

That is an excellent point.

> 
>> I thought I saw that listed on this forum earlier this year.
> 
> Don't believe all the nonsense posted on the Internet.

Related to the previous paragraph, I know that when I fiddle with
SSL settings on a web server, I can easily dig up information on
exactly what OS/browser combinations Ill be denying service to (so
far, XP + IE6).  Having that confidence in knowing what possible
visitors Im denying is nice.

Is there any good reference for MTAs and MUAs out there?  Im
thinking of something like the matrix Qualsys shows in their test
results.

Whoever started this thread, thanks.  Its always been a little fuzzy
to me where OpenSSL and Postfix meet and decide which parameters are
set by default (or arent available).

Any future plans to incorporate other SSL libraries?

Thanks,

Charles

> -- 
>       Viktor.

Reply via email to