On Sat, Oct 13, 2018 at 12:12:21PM -0400, Bill Cole wrote:

> 2. As TLSv1.0 is increasingly abandoned by both TLS implementations and 
> in operational configurations, novel vulnerabilities in the old protocol 
> are more likely to remain covert and hence highly useful, especially if 
> they are less painful to exploit than BEAST or POODLE.

That's all nice in theory, but if I disabled TLS 1.0, I'd have some
issues receiving messages from this list and the krbdev list.  My
logs since Sep 27 show non-trivial TLSv1 message counts:

  190 cloud9.net
   22 mit.edu
  ...

As yet, I see no compelling reason to disable TLS 1.0 in SMTP.  What
you can and should now disable is SSLv2 and SSLv3, which Postfix
now disables by default.

--
        Viktor.

Reply via email to