On Mon, Jul 20, 2020 at 09:51:38PM -0300, Leonardo Rodrigues wrote: > I have already tweaked smtpd_tls_mandatory_protocols and > smtpd_tls_protocols to "!SSLv2, !SSLv3" but TLSv1 simply doesn't work.
Postfix does not set a minimum TLS protocol version, it just disables the versions specified with '!' prefixes in smtpd_tls_protocols. However, your system-wide OpenSSL configuration file: http://postfix.1071664.n5.nabble.com/problem-connecting-with-android-device-tp106848p106863.html or a vendor change to the OpenSSL library may result a minimum protocol version "behind Postfix's back". > While googling for the error > > found a proposed patch on > https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873334 to "overrides > default TLSv1.2" ... and after applying and recompiled postfix 3.5.4, > TLSv1 worked immediately with the config i was running (no config > problem after all). That's for recent Debian versions, where the system-wide openssl.cnf file indeed configures a floor of TLSv1.2, but then Debian have also patched their Postfix package to clear the minimum version. If CentOS 8 requires a default floor of TLS 1.2, and have not patched Postfix to relax that system-default constraint, then you're stuck with TLS >= 1.2 until a suitable work-around is made available in their Postfix package. > So it seems we really have a TLSv1.2 minimum hardcoded anywhere. Is > it on the postfix sources? Is it CentOS 8? Is it possible to change > that, via config or compile options, without patching the sources? Postfix has no such hard-coded default. It is in the system libraries and/or configuration files. -- VIktor.