--- Forwarded from Steffen Nurpmeso <stef...@sdaoden.eu> ---
Date: Sun, 19 Mar 2023 00:06:13 +0100
Author: Steffen Nurpmeso <stef...@sdaoden.eu>
From: Steffen Nurpmeso <stef...@sdaoden.eu>
To: Peter <pe...@pajamian.dhs.org>
Subject: Re: [pfx] Re: Allow TLSv1 only for internal senders
Message-ID: <20230318230613.c9hc0%stef...@sdaoden.eu>
OpenPGP: id=EE19E1C1F2F7054F8D3954D8308964B51883A0DD; 
url=https://ftp.sdaoden.eu/steffen.asc; preference=signencrypt

Peter wrote in
 <29591811-f04e-b667-d5df-3e3223e7d...@pajamian.dhs.org>:
 |On 19/03/23 09:08, Steffen Nurpmeso via Postfix-users wrote:
 |> I still have no problems with
 |> 
 |>    smtpd_tls_mandatory_protocols = >=TLSv1.2
 |
 |This is fine, so long as you don't have a user that can't support at 
 |least TLSv1.2 that needs to use submission.

Submission via VPN (without starttls / TLS).

 |>    smtpd_tls_protocols = $smtpd_tls_mandatory_protocols
 |
 |This will simply result in clients that can't support at least TLSv1.2 
 |connecting in plain text instead.  So rather than having (arguably not 
 |so) poor encryption for those client you would rather have no encryption 
 |at all?  This does not make any sense.

There is none.  I have looked, there is only a single server of
value, and it does not even try starttls.  (And he won the USENIX
Flame award.)

 |>    # super modern, forward secrecy TLSv1.2 / TLSv1.3 selection..
 |>    tls_high_cipherlist = EECDH+AESGCM:EECDH+AES256:EDH+AESGCM:CHACHA20
 |
 |I would avoid messing with this setting unless you really understand 
 |what you are doing, and even then it's not a very good idea.  You could 
 |end up causing some clients to be unable to establish a connection or on 
 |the flip side you could inadvertently be enabling a cipher that ends up 
 |becoming vulnerable in the future unless you stay on top of this setting 
 |and remove it from the list.  Note that the default for this setting is 
 |taken from openssl so when a vulnerability does get found in a cipher 
 |you will get an update to openssl from your OS vendor which will remove 
 |that cipher from the list, unless you do something like override it like 
 |you are doing above.
 |
 |>    smtpd_tls_mandatory_ciphers = high
 |
 |This is fine.

--steffen
|
|Der Kragenbaer,                The moon bear,
|der holt sich munter           he cheerfully and one by one
|einen nach dem anderen runter  wa.ks himself off
|(By Robert Gernhardt)

 -- End forward <20230318230613.c9hc0%stef...@sdaoden.eu>

--steffen
|
|Der Kragenbaer,                The moon bear,
|der holt sich munter           he cheerfully and one by one
|einen nach dem anderen runter  wa.ks himself off
|(By Robert Gernhardt)
_______________________________________________
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org

Reply via email to