Hello,

Not sure if this will help with anything, but about a year back I was
having issues getting my at the time s7 phone to connect to postfix.
The solution was to determine that the connecting key was an ed-384
bit key. At that time android only supported ed-256 keys so I had to
redo my key and it worked. I've now got an s20 so don't know if this
information is still valid.

Hth
Dave.


On 12/18/21, Matthias Andree <matthias.and...@gmx.de> wrote:
> Am 15.12.21 um 23:35 schrieb Benny Pedersen:
>> On 2021-12-15 23:04, raf wrote:
>>
>>>> How could I get an Android client and a Postfix server work together
>>>> please?
>>
>>> It's just a guess, but maybe the problem is ECDSA.
>>> If you add an RSA key as well, it might work.
>>> Does that sound plausible?
>>
>> or simply try smtps if submission fails on android
>>
>> i use aquamail on android with succes smtps / imaps (ssl not tls)
>
> Benny,
>
> Please do not confuse protocol versions with how TLS
> handshake/negotiation is introduced.
>
> SSL is the obsolete and unsafe predecessor to TLS but that or the TLS
> version has NOTHING to do with
> whether you either: use dedicated SSL-wrapped = TLS-wrapped = Implicit
> TLS ports for TCP,
> or: start a vulnerable clear-text connection that starts at application
> level, then proceeds through STARTTLS or STLS to negotiate TLS,
> and when many applications forget to reset their state[1 below]
>
> Standing recommendations are to use TLS v1.2 or newer. Obsolete clients
> may want to talk TLS v1.1 or v1.0 though but should be upgraded or
> phased out.
>
> If you want to make a distinction between negotiation, i. e., whether
> the TCP session starts with TLS handshake right away (called "Implicit
> TLS" or "TLS-wrapped on dedicated "...s" ports smtps/imaps/pop3s on
> 465/993/995) or cleartext initial conversation that negotiates TLS
> in-band (STARTTLS for SMTP and IMAP, STLS for POP3 on ports 25/587, 143,
> 110, respectively), then make that clear. Anything else is coincidental
> and adds to the confusion.
>
> Thank you.
>
> [1] After the Poddebniak et al. paper&presentation earlier this year,
> Implicit TLS would get my preference, it is also cleaner and does not
> mix application and security layers in ways that require special attention.
> https://www.usenix.org/conference/usenixsecurity21/presentation/poddebniak
>
>

Reply via email to