On Thu, Mar 05, 2020 at 09:08:43PM +0100, ratatouille wrote:

> Don't know why TLSv1 is still offered on our servers running

Probably because you're not changing the configuration in the right
place.  Double-check that you're configuring the correct Postfix
instance (if using multiple instances) and that there are no
master.cf overrides that trump the main.cf settings.

> smtpd_tls_mandatory_protocols = !SSLv2, !SSLv3, !TLSv1
> smtpd_tls_protocols = !SSLv2, !SSLv3, !TLSv1

It is not yet a good idea to disable TLSv1 in SMTP.  But if you must
degrade[1] your SMTP security for some clients to make sure that all the
check boxes come out green, then the above should be enough, provided it
is set in the right place.  I can confirm that bitclusive.de still
supports TLSv1:

    $ posttls-finger -c -Lsummary -p TLSv1 bitclusive.de
    posttls-finger: Verified TLS connection established to 
smtp.bitclusive.de[2a03:4000:33:430:d423:c2ff:fe3d:b540]:25: TLSv1 with cipher 
ECDHE-RSA-AES256-SHA (256/256 bits)

    $ posttls-finger -c -Lsummary -o inet_protocols=ipv4 -p TLSv1 bitclusive.de
    posttls-finger: Verified TLS connection established to 
smtp.bitclusive.de[92.60.38.182]:25: TLSv1 with cipher ECDHE-RSA-AES256-SHA 
(256/256 bits)

Other than test TLS connections, do you still legitimate inbound email
in your logs (looking over a week or more of logs) delivered with TLSv1?

If not, then perhaps disabling TLSv1 will be harmless, but if you do,
perhaps prod the senders to upgrade first, before you prevent them
from establishing TLS connections to your MTA.

-- 
    Viktor.

[1] Some clients forced to send in clear text, because they don't do
TLSv1.2.

Reply via email to