On Sat, Oct 01, 2022 at 08:19:41PM -0600, Shawn Heisey wrote:

> These numbers suggest that most full connections are in fact using TLS.  

More precisely, most attempts at STARTTLS succeed.  Neither set of
numbers counts connections whether STARTTLS was not even attempted.

> Here is the log from two connections that were made using TLS where it
> was aborted without trying to transfer mail, and the disconnect log
> doesn't have starttls in it:
> 
> ----------------
> Sep 25 00:05:26 bilbo postfix/smtps/smtpd[492903]: connect from 
> unknown[170.205.161.87]
> Sep 25 00:05:27 bilbo postfix/smtps/smtpd[492903]: Anonymous TLS 
> connection established from unknown[170.205.161.87]: TLSv1.2
>   with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)

Not surprising, since this is the "smtps" *wrapper mode*, TLS-on-connect
service, which does not use STARTTLS, because it is SMTP inside TLS,
rather than SMTP inside STARTTLS inside SMTP.

> Sep 25 00:05:31 bilbo postfix/smtps/smtpd[492903]: warning: 
> unknown[170.205.161.87]: SASL PLAIN authentication failed:

The client is probably trying to brute force passwords.

> I leave it to you to decide whether the omission of any info about TLS 
> in the disconnect log for this type of connection constitutes a bug.

The use of TLS is implicit here, "smtps" always performs TLS before
any SMTP commands can happen.

> The config I was aiming for should not allow authentication on anything 
> other than port 587,

Actually, it is also clearly allowed on port 465, which is the port used
for "smtps".  The client tries to guess a password, and the guess fails.

> so even if somehow they have the right password, it shouldn't allow
> the connection.

Actually, they'd likely succeed.

> I do have it listening on port 465, hopefully I got the config right
> so that does not allow authentication.  I think I also disabled TLS
> below 1.2 on port 587.

What would be the use of "465" if SASL authentication is not allowed?
It is should be configured essentially the same way (modulo wrapper
mode, and the service name) as port 587.

> I may be in the minority using a "real" cert (from LE).

Minority or not, these are fairly common, though of course not
universal.

> Mostly offtopic but interesting to me:  Right after those logs, mail.log 
> contains a message about a failed TLS connection to dovecot on one of 
> the imap ports.  For dovecot, I am refusing connections with TLS below 1.2:
> 
> Sep 25 00:07:45 bilbo dovecot: imap-login: Disconnected: Connection 
> closed: SSL_accept() failed: error:14209102:SSL 
> routines:tls_early_post_process_client_hello:unsupported protocol (no 
> auth attempts in 3 secs): user=<>, rip=205.210.31.140, lip=172.31.8.104, 
> TLS handshaking: SSL_accept() failed: error:14209102:SSL 
> routines:tls_early_post_process_client_hello:unsupported protocol, 
> session=<x8XLOnrp39PN0h+M>

The connection was from:

    NetRange:       205.210.31.0 - 205.210.31.255
    CIDR:           205.210.31.0/24
    NetName:        PAN-22
    Organization:   Palo Alto Networks, Inc (PAN-22)

I would not expect TLS version scans from them, but perhaps they too
carry out TLS feature studies where they look for support for legacy
TLS versions.

-- 
    Viktor.

Reply via email to