Hi,

On Thu, Dec 8, 2022 at 2:17 AM Matus UHLAR - fantomas <uh...@fantomas.sk>
wrote:

> On 07.12.22 12:28, Alex wrote:
> >smtp_tls_security_level = may
> >smtpd_tls_security_level = may
> >smtp_tls_mandatory_protocols    = !SSLv2,!SSLv3,!TLSv1,!TLSv1.1
> >smtp_tls_protocols              = !SSLv2,!SSLv3,!TLSv1,!TLSv1.1
>
> so, you don't enforce TLS on a server-server communication (correct), but
> you disable tlsv1 and tlsv1.1 protocols.
>
> This means, if you communicate with older server supporting up to TLS 1.1
> or
> 1.0, communication will be unencrypted.
>
> This does not make much sense - tls1.0 is better than plaintext.
>

I think I assumed there was a vulnerability, like there is with SSLv3, that
lead me to disable it.

I've now changed it to just:

smtpd_tls_mandatory_protocols   = >=TLSv1.0

Can I also ask if it's a security risk from an information disclosure
perspective to have multiple domains on the same letsencrypt cert? Each
postfix instance I have configured processes mail for a number of different
domains, so it's possible a user could ascertain info about those other
clients by querying the cert directly. It certainly makes it easier for me
to maintain the certs, but wanted to consider at what cost to privacy or
the disclosure of that info.

Reply via email to