Re: Postfix and POODLE

2014-11-11 Thread Lars Heide
Am 10.11.2014 um 16:23 schrieb Viktor Dukhovni: > On Mon, Nov 10, 2014 at 09:28:17AM +0100, Lars Heide wrote: > >>> Was there a prior connection shortly before that where the handshake >>> failed for some other reason? >> >> No, there is no prior connection according to our logs, which is >> strang

Re: Postfix and POODLE

2014-11-10 Thread Viktor Dukhovni
On Mon, Nov 10, 2014 at 09:28:17AM +0100, Lars Heide wrote: > > Was there a prior connection shortly before that where the handshake > > failed for some other reason? > > No, there is no prior connection according to our logs, which is > strange, now that you mention it. A possible cause is that

Re: Postfix and POODLE

2014-11-10 Thread Lars Heide
Am 07.11.2014 um 16:00 schrieb Viktor Dukhovni: > > Was there a prior connection shortly before that where the handshake > failed for some other reason? No, there is no prior connection according to our logs, which is strange, now that you mention it. > >> They use Kerio Connect 8.4.0 RC 1. Accord

Re: Postfix and POODLE

2014-11-07 Thread Viktor Dukhovni
On Fri, Nov 07, 2014 at 10:17:40AM +0100, Lars Heide wrote: > > Please post more detailed logging for this. Was this logged by > > your postfix/smtpd SMTP server or by the postfix/smtp SMTP client? > > Any idea what software the other end was using? ... > > Logged by postfix SMTP server (I redac

Re: Postfix and POODLE

2014-11-07 Thread Lars Heide
Am 06.11.2014 um 17:00 schrieb Wietse Venema: > Otherwise, Postfix will use plaintext when the server does not > announce STARTTLS, or when the server announces STARTTLS but TLS > does not work for any reason. Thank you, that (together with Victors answer below) answers my questions. > There curr

Re: Postfix and POODLE

2014-11-06 Thread Wietse Venema
Lars Heide: > But lets disregard POODLE for the moment, does postfix handle > "inappropriate fallback" errors in any way, or does it also fall > back to unencrypted traffic? If you configure "mandatory" TLS, Postfix will not use plaintext. Otherwise, Postfix will use plaintext when the server does

Re: Postfix and POODLE

2014-11-06 Thread Viktor Dukhovni
On Thu, Nov 06, 2014 at 03:08:47PM +0100, Lars Heide wrote: > does anybody know how postfix handles a detected MITM attack based on > POODLE? POODLE, SSL 3.0 and more generally the "TLS_FALLBACK_SCSV" have nothing to do with how Postfix handles TLS errors. There is not, need not, and will not be

Re: Postfix and POODLE

2014-11-06 Thread Lars Heide
The specific POODLE attack is only an example that applies to web-connections, referencing it is therefore misleading, but the underlying flaw affects all SSLv3 traffic AFAIK. The paper by google ( https://www.openssl.org/~bodo/ssl-poodle.pdf ) states: "we discuss how attackers can [..] break the

Re: Postfix and POODLE

2014-11-06 Thread li...@rhsoft.net
Am 06.11.2014 um 15:08 schrieb Lars Heide: does anybody know how postfix handles a detected MITM attack based on POODLE? it don't need to - read how it works and than imagine how it should be possible to inject and execute javascript into the connection in case of SMTP

Postfix and POODLE

2014-11-06 Thread Lars Heide
Hi, does anybody know how postfix handles a detected MITM attack based on POODLE? With the advent of the POODLE vulnerability, the implementation of TLS_FALLBACK_SCSV in OpenSSL happened in order to mitigate MITM. In case that an inappropriate fallback is detected, the SSL library throws an erro