Viktor

On Wed, Nov 7, 2018, at 8:34 AM, Viktor Dukhovni wrote:
> ...

Thx for the clarifications!

> That's TLS 1.3, which as I mentioned is a different beast.  It
> always does PFS, and never RSA key exchange, but this is not reflected
> in the cipher name, because the ciphers no longer specify the key
> exchange method.

ah!  missed/misunderstood that completely!

Re: this particular, *internal* connection,

/var/log/postfix/postfix.log:Nov  4 15:21:45 mx 
postfix/postscreen-internal/smtpd[15675]: Anonymous TLS connection established 
from mx.example.com[XX.XX.XX.XX]: TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 
(256/256 bits)

i.e., 'between' *my* external/postscreen listener instance and *my* 
internal/after-postscreen smtpd instance, does it make any particular 
difference/improvement to explicitly change/limit that cipher to a single, 
mandatory choice?  given that it *IS* tls1.3 with PFS, my inclination is simply 
... leave it be.

> No, you just did not read my post carefully enough... :-)

yeah, yeah, we've been OVER that already.  wouldn't be the *1st* time! ;-)

( in my own "defense" 'careful reading' does not _necessarily_ always equate to 
'correct understanding' :-) )

> The TLS 1.3 connections are out of scope and can be ignored.

Got it.

> Outbound, I still see a handful of kRSA connections to sites that
> don't have PFS turned on:
> 
>    6 omgi.iij.ad.jp   AES128-GCM-SHA256
>    1 nibbler.inwx.net AES256-GCM-SHA384
> 
> and it is the *server* operator's job to define the appropriate
> policy for their own keys/certs.  So I would not at this time suggest
> any similar exclusion for the SMTP client.
> 
> Keep in mind that TLS in SMTP is still predominantly opportunistic,
> and generally even less than perfect encryption is still better
> than none.

Yep.  That message is certainly clear enough. And a good reminder, nonetheless, 
of the assumptions about TLS usage in SMTP 'vs' in webserver.
<rant>Even though, TBH, I've 'had it' with lazy AND sloppy server admins, and 
would LIKE to erase them from my server interactions.  I don't mind broken -- I 
do my own fair share of that! -- as long as you're at least 'trying' to keep 
current/secure.</rant>

Reply via email to