On 19 Jul 2015, at 17:53, Viktor Dukhovni <postfix-us...@dukhovni.org> wrote:

>> The primary reason is that the tail for versions of Postfix running on 
>> versions of OpenSSL older than 1.1 will be very long, easily 5-10 
>> years, even if all vendors stick with the new defaults.
> 
> I'm worried more about early adopters of systems with OpenSSL 1.1
> running into friction, than I am about the long-tail.
> 
> Thus the proposal to *only* drop RC4 from "DEFAULT", but not move
> it to "LOW".  However, if RC4 will largely disappear from SMTP by
> mid 2016, then perhaps a change to "LOW" will be less disruptive
> than I fear.

Data given is purely the SMTP *client*, by the way; outgoing traffic to servers 
elsewhere. For incoming traffic, I see one (1) RC4-SHA connection over that 
entire 90-day period, and that was spam from a compromised server, something 
that looks like a CommuniGate Pro installation that should also support better 
but has defaults that are quite dated.

The 'qq.com' sending relays negotiate 'DHE-RSA-AES128-SHA' for incoming traffic 
because we preempt the cipher list.

Also, it looks like several Exchange servers have been upgraded in this 90-day 
period. I did not see this before because I was specifically grepping for RC4, 
and the results vary, but most of them have better options available than RC4, 
like 'ECDHE-RSA-AES128-SHA', even the cipher order still prefers it. Disabling 
RC4 would actually improve the cipher negotiated for those.

So, out of 11 Exchange servers that still negotiated RC4 over the past 90 days, 
only four (4) actually remain that have a TLS profile that looks like this;

==
  * TLSV1_2 Cipher Suites:
      Server rejected all cipher suites.

  * TLSV1_1 Cipher Suites:
      Server rejected all cipher suites.

  * TLSV1 Cipher Suites:
      Preferred:                       
                 RC4-MD5                128 bits
      Accepted:                        
                 RC4-SHA                128 bits
                 RC4-MD5                128 bits
                 DES-CBC3-SHA           112 bits
                 DES-CBC-SHA            56 bits
                 EXP-RC4-MD5            40 bits
                 EXP-RC2-CBC-MD5        40 bits
==

Out of those four, only one is more than one connection over those 90 days. 
That one is in active use, a client for an important customer, and it looks 
like it'll do 'DES-CBC3-SHA' just fine if we disable RC4 for outgoing mail.

The other seven now have better defaults (one jumped to TLSv1.2 with cipher 
ECDHE-RSA-AES256-SHA384) or will negotiate an AES cipher of some kind if RC4 is 
disabled.

I suspect that the change to 'LOW' would not even be a blip on the radar for 
most deployments. Push that through, and add a note to the README, I'd say :-)

YMMV, etcetera ... moar dataz plz!

Mvg,
Joni

Reply via email to