| You disable cleartext SMTP as well?

The rationale here is that by accepting provenly insecure protocols, one provides an illusion of security, which is potentially more dangerous than transparently refuse, and fall back to plaintext delivery to preserve the functionality (which can create an incentive to upgrade from probably obsolete and unsupported software).

Moreover, mandatory TLS on public SMTP servers is prohibited as of now according to the RFC (you still MUST provide the option to fall back on plaintext delivery in case of TLS handshake failure on a public SMTP server), depreciation TLS older than 1.2 is recommended by RFC 8314 (and you CAN and SHOULD disable them).

"As soon as practicable, MSPs currently supporting Secure Sockets Layer (SSL) 2.x, SSL 3.0, or TLS 1.0 SHOULD transition their users to TLS 1.1 or later and discontinue support for those earlier versions of SSL and TLS." - RFC 8314

--
Best Regards,
Daniel Ryšlink
System Administrator

Dial Telecom a. s.
Křižíkova 36a/237
186 00 Praha 3, Česká Republika
Tel.:+420.226204627
daniel.rysl...@dialtelecom.cz
-----------------------------------------------
www.dialtelecom.cz
Dial Telecom, a.s.
Jednoduše se připojte
-----------------------------------------------

On 25-Oct-18 07:48, Bastian Blank wrote:
On Wed, Oct 24, 2018 at 04:44:19PM -0600, @lbutlr wrote:
On Oct 24, 2018, at 09:19, Benny Pedersen <m...@junc.eu> wrote:
do not disable tlsv1
I couldn’t disagree more. TLSv1.2 has been out for a decade and there is no 
reason to be running v1 or v1.1. At all.
You disable cleartext SMTP as well?

Bastian


Reply via email to