On Mon, Jul 20, 2020 at 09:51:38PM -0300, Leonardo Rodrigues wrote:

> I have already tweaked smtpd_tls_mandatory_protocols and 
> smtpd_tls_protocols to "!SSLv2, !SSLv3" but TLSv1 simply doesn't work.

Postfix does not set a minimum TLS protocol version, it just disables
the versions specified with '!' prefixes in smtpd_tls_protocols.

However, your system-wide OpenSSL configuration file:

    
http://postfix.1071664.n5.nabble.com/problem-connecting-with-android-device-tp106848p106863.html

or a vendor change to the OpenSSL library may result a minimum protocol
version "behind Postfix's back".

>  While googling for the error
>
>      found a proposed patch on 
> https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873334 to "overrides 
> default TLSv1.2" ... and after applying and recompiled postfix 3.5.4, 
> TLSv1 worked immediately with the config i was running (no config 
> problem after all).

That's for recent Debian versions, where the system-wide openssl.cnf
file indeed configures a floor of TLSv1.2, but then Debian have also
patched their Postfix package to clear the minimum version.

If CentOS 8 requires a default floor of TLS 1.2, and have not patched
Postfix to relax that system-default constraint, then you're stuck
with TLS >= 1.2 until a suitable work-around is made available in
their Postfix package.

> So it seems we really have a TLSv1.2 minimum hardcoded anywhere. Is 
> it on the postfix sources? Is it CentOS 8? Is it possible to change 
> that, via config or compile options, without patching the sources?

Postfix has no such hard-coded default.  It is in the system libraries
and/or configuration files.

-- 
    VIktor.

Reply via email to