On Sun, Jul 26, 2015 at 08:58:52AM +0200, Moritz Schmitt wrote: > Thanks a lot for your very helpful reply! > > I implemented all the changes you suggested and now it works. My late > reply is due to the fact that I needed to wait for another mail from > outlook.com to see if everything works. > > What I find a little odd about outlook.com's behavior is that if it > isn't able to establish a TLS connection to my server, that it doesn't > retry an unencrypted connection. So in a sense they are treating my > 'opportunistic TLS' as 'mandatory TLS'.
I am glad to hear that the recommended configuration tweaks worked. This suggests that the problem analysis was very likely correct. According to my outlook.com/microsoft contacts [Bcc'd], the expected behaviour is cleartext retries. I don't know why that did not happen for your domain. In any case, I am still optimistic that it will be possible to improve the opportunistic TLS support on the outlook.com side. I don't think it makes sense to switch from TLS to cleartext just becase the TLS crypto parameters were not "secure enough". Surely cleartext is not more secure than somewhat dated crypto algorithms! That said, dated algorithms need not be supported in perpetuity, rather with opportunistic TLS we support them while they are still required for interoperability with a sufficient number of peers. Once better options are nearly universally available, and disabling the deprecated algorithms causes no significant uptick in cleartext use, then the deprecated algorithms can be disabled. In the case of "export" ciphersuites, as a result of "logjam" it is possible to downgrade security even for clients that don't support "export" ciphers. Thus, just recently, Postfix 3.0.2 and the other supported stable releases were all updated to by default no longer use "export" ciphers, SSLv2, SSLv3, or single-DES. None of these are believed to be needed to interoperate with a non-negligible number of mail servers on the public Internet. Sites that still need (say SSLv3) can reenable that as needed. On the other hand, systems that only support RC4 are still somewhat common. Though RC4 is deprecated, it is (for now) premature to refuse TLS with such systems. Not that when using unauthenticated opportunistic TLS, SMTP clients ignore inability to authenticate server certificates (untrusted chains and "wrong" subject names are tolerated). It then makes little sense to insist that no deprecated algorithms are used in the ignored certificates. Therefore, in unauthenticated opportunistic TLS, *all* certificate "problems" should be ignored. The threat model is passive-monitoring not active attack. Encrypt if at all possible, regardless of any certificate chain defects. https://tools.ietf.org/html/draft-ietf-dane-smtp-with-dane-19#section-1.3 If for a particular destination, authentication is employed, *then* make sure the certificate can be adequately trusted (but signature algorithms in self-signed "root" certificates should still be ignored). Thanks for the follow-up message, good luck. -- Viktor.