On 2021 Jul 29, 10:01, Viktor Dukhovni wrote:
> 
> 
> > On 29 Jul 2021, at 8:17 am, raf <post...@raf.org> wrote:
> > 
> > The Rhenus email did say:
> > 
> >  "...must be sent with the TLS 1.2 protocol or higher.
> >  Any mail received without fulfilling this condition
> >  will be rejected by our server."
> > 
> > That second sentence sounds to me like a definite
> > statement that an SMTP connection that doesn't initiate
> > STARTTLS will not be able to send email. At least, I
> > can't see how else to interpret those words.
> 
> The simplest thing they could do is just disable TLS 1.0.
> This would also comply with some brain in neutral audit.
> 
> My money is on brain in neutral, as opposed to a carefully
> considered risk assessment in which they've concluded that
> they only receive legitimate email from TLS-1.2-capable
> senders.  I may be wrong in this case, but my "b[ae]tting
> average" would generally be quite high in general.
> 
> So expect a poorly thought out simple TLS policy, rather
> than a carefully considered comprehensive policy.

Hello, to follow up on this issue regarding Rhenus.com and TLS 1.2,
I confirm that mail flow to them without using the STARTTLS verb in the
SMTP transaction, is working fine. So it looks like plain text SMTP is
still allowed by their publicly-referenced SMTP servers.

So at first sight it looks like Viktor's interpretation of Rhenus'
communication was right.

However, upon further inspection, it appears that the publicly-referenced
SMTP servers of Rhenus.com are still supporting TLS 1.0, which could be
read as they not following through with their original notice of only
supporting TLS 1.2 in SMTP from August 1st onwards.


If, from a TLS 1.0-only host I run this command, I get this:

$ openssl s_client -connect mx-in2.de.rhenus.com:25 -starttls smtp
(...snip...)
fnyzu7HSqPgBNKe6kmjaWNFZOdfopGvl7wEjU84NsL8y3rZ3gYm5WGtyw92ryWLj
pWIMifIkDTXFMOivRPW2p+29gkXBhl3mGlLlBGrmpKr8yjRfvDZDXi8SzHsMPECX
tTS3eAqF8viudEmzB7OqRyyICi3wlH8em7hOVwsPpxU=
-----END CERTIFICATE-----
subject=/CN=*.de.rhenus.com
issuer=/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=Thawte TLS RSA CA G1
---
No client certificate CA names sent
---
SSL handshake has read 4658 bytes and written 478 bytes
---
New, TLSv1/SSLv3, Cipher is DHE-RSA-AES128-SHA
Server public key is 2048 bit
SSL-Session:
    Protocol  : TLSv1
    Cipher    : DHE-RSA-AES128-SHA
    Session-ID: B047DEA0C1366F7D150DA86F0FB28E04FA41F7E54CE70391E8EFE2F864BDB80E
    Session-ID-ctx:
    Master-Key: 
3517C702197323871960E7819DC37A576F80A4FB11A80C6EC2F71B8D9256B4BF799C6509DA7DCD26D3EAE033FAAE2A34
    Key-Arg   : None
    Start Time: 1628863962
    Timeout   : 300 (sec)
    Verify return code: 19 (self signed certificate in certificate chain)
---
220 mx-in2.de.rhenus.com ESMTP
421 Exceeded allowable connection time, disconnecting.
closed

---> Which means they are still supporting TLS 1.0 in SMTP.


And if I issue that same command from a TLS 1.2-supporting host, I get:

$ openssl s_client -connect mx-in2.de.rhenus.com:25 -starttls smtp
(...snip...)
fnyzu7HSqPgBNKe6kmjaWNFZOdfopGvl7wEjU84NsL8y3rZ3gYm5WGtyw92ryWLj
pWIMifIkDTXFMOivRPW2p+29gkXBhl3mGlLlBGrmpKr8yjRfvDZDXi8SzHsMPECX
tTS3eAqF8viudEmzB7OqRyyICi3wlH8em7hOVwsPpxU=
-----END CERTIFICATE-----
subject=CN = *.de.rhenus.com
issuer=C = US, O = DigiCert Inc, OU = www.digicert.com, CN = Thawte TLS RSA CA 
G1
---
No client certificate CA names sent
Peer signing digest: SHA512
Peer signature type: RSA
Server Temp Key: ECDH, P-256, 256 bits
---
SSL handshake has read 4485 bytes and written 481 bytes
Verification: OK
---
New, TLSv1.2, Cipher is ECDHE-RSA-AES128-GCM-SHA256
Server public key is 2048 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
    Protocol  : TLSv1.2
    Cipher    : ECDHE-RSA-AES128-GCM-SHA256
    Session-ID: FB20C4A6328728D31B5BEB618879C67F33C9BFA8BF51CFC686D3B5EEEBFF51A7
    Session-ID-ctx:
    Master-Key: 
CC8AA3D2CCEB7F7873CC6C8252210216E93CD74F55F6E0AFCC5FAAB81C707AADEADC0D07AC17F94ACE546D264CD260D2
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    TLS session ticket lifetime hint: 300 (seconds)
    TLS session ticket:
    0000 - 61 d1 9e cc d6 ab 6a 48-e9 ba f9 1c b2 1a 57 05   a.....jH......W.
    0010 - ce 9f e4 f8 d7 42 48 52-2e 55 ff 1b ee d7 6b a9   .....BHR.U....k.
    0020 - fa 2d 41 a6 8a f3 a5 70-5e ef 0d 1c f9 93 8a de   .-A....p^.......
    0030 - f7 ed 04 b4 d2 34 b3 e3-65 bd 82 c4 03 cb 69 c1   .....4..e.....i.
    0040 - fc 3f 3d 33 17 6f 59 b6-82 ac 77 f3 c1 6c 9e 68   .?=3.oY...w..l.h
    0050 - d6 1e 73 e9 76 24 3a 18-40 00 6d 97 0b 86 95 9b   ..s.v$:.@.m.....
    0060 - 20 a4 f6 d0 2a d1 ed 17-9f 78 5c 7c 2b 04 89 3b    ...*....x\|+..;
    0070 - dc ea 6d d5 d9 28 52 67-35 11 43 2e 51 f4 f5 0f   ..m..(Rg5.C.Q...
    0080 - 36 4e 89 8a 81 79 8c f1-50 c0 dd ec aa 66 26 ec   6N...y..P....f&.
    0090 - fa de 54 3c 1a fe 05 68-12 2c ae 17 6a f0 20 2b   ..T<...h.,..j. +
    00a0 - d2 ba 0a 9a a8 c8 a6 18-65 69 19 f3 46 7e c5 9f   ........ei..F~..
    00b0 - 0e 07 0e 7c 39 05 15 2d-24 18 5d ce 81 63 a6 40   ...|9..-$.]..c.@
    00c0 - 32 e0 1f 72 3a 9a 9d a8-44 fc 02 d8 e9 cf 67 02   2..r:...D.....g.
    Start Time: 1628863075
    Timeout   : 7200 (sec)
    Verify return code: 0 (ok)
    Extended master secret: no
---
250 STARTTLS
421 Exceeded allowable connection time, disconnecting.
closed

---> Which means they also support TLS 1.2 in SMTP.


Perhaps they re-evaluated their decision and are keeping TLS 1.0 for
SMTP? Who knows!

Regards,


-- 
Josh Good

Reply via email to