On Wed, Jul 28, 2021 at 04:39:39PM +0200, Josh Good 
<postfix.2016...@naleco.com> wrote:

> Hello everybody.
> 
> I've been made aware of this communication recently received at some
> site whose email is managed on-premises (i.e., not outsourced to any
> big mailbox provider in the "cloud"):
> 
> > From: Rhenus Logistics <no_re...@es.rhenus.com> 
> > Sent: 30 June 2021 17:05
> > To: [omitted]
> > Subject: Email con TLS inferior a 1.2 / Email with TLS less than 1.2
> >  
> > Good Afternoon,
> > We inform you that due to Rhenus security policies, as of 08/01/2021
> > receiving of emails that do not comply with version 1.2 of the TLS 
> > protocol will be restricted.
> > All emails sent in particular to the domain @es.rhenus.com and in 
> > general to any Rhenus domain @*.rhenus.com must be sent with the TLS 
> > 1.2 protocol or higher.
> > Any mail received without fulfilling this condition will be rejected 
> > by our server.
> > Please forward this message to your IT department for consideration 
> > and action.
> > If you have any questions, please head over your Rhenus contact
> >  
> > IT //SERVICES
> 
> The above could mean that starting 08/01/2021 their TLS support will
> only support TLS 1.2 (and not any earlier TLS version) with their
> inbound SMTP servers remaining configured in "opportunistic TLS" mode
> --- or it could be read as if they will enable "smtpd_enforce_tls = yes"
> (or "smtpd_tls_security_level = encrypt") in their inbound SMTP servers
> (I don't know if they are using Postfix, but you get what I mean).
> 
> If the case is the second one, is that a current trend? Has rfc2487
> been obsoleted and mandatory TLS is now considered "industry standard"
> in publicly-referenced SMTP server?
> 
> I've tried to contact Rhenus IT Services to inquire about this, but my
> phone calls haven't gone through. So I thought I may as well ask this
> list if this a single case or the "new normal"...
> 
> Regards,
> 
> -- 
> Josh Good

Hi,

RFC2487 has been obsoleted, but only because it's been
replaced by RFC3207, and then further updated by
RFC7817. It hasn't gone away. It's just been updated.

Disabling plaintext/STARTTLS SMTP would be courageous. :-)
On my little personal mail server, 75% of incoming
connections to port 25 are plaintext. Only 25% use
STARTTLS (by definition). Disabling STARTTLS would
be a disaster, and stop all incoming mail.

Of my incoming TLS connections, almost none of them are
TLSv1.0 and none are TLSv1.1. It the past month, the
numbers are:

  TLSv1.0 6
  TLSv1.1 0
  TLSv1.2 21902
  TLSv1.3 4334

And the TLSv1.0 connections were all attempts at spam.
Disabling TLSv1.0 and TLSv1.1 is probably mostly
harmless, and they have been deprecated (RFC8996). At
least, nobody will lose their job for disabling TLSv1.0
and TLSv1.1. :-)

But the known flaws have been mitigated, so it doesn't
actually matter (yet). But if any other flaw is
discovered, I wouldn't expect it to be fixed. So
leaving TLSv1.0 active means accepting the
responsibility of keeping an eye out for the next flaw
to be published, and disabling it then.

I'm sure that Rhenus will still use STARTTLS on port
25. They'll just require STARTTLS to be used and
they'll only support TLSv1.2+. The only alternative
would be to close port 25, use port 465 (TLS-only)
instead, and hope that all mail servers that want to
send them email try to use port 465. But that's not
going to happen.

cheers,
raf

Reply via email to