RE: Opportunistic TLS vs. plain

2014-06-21 Thread Marius Gologan
ught calling Mr. Gates for support, even if I paid him. Marius. -Original Message- From: owner-postfix-us...@postfix.org [mailto:owner-postfix-us...@postfix.org] On Behalf Of grantksupp...@operamail.com Sent: Sunday, June 22, 2014 12:03 AM To: postfix-users@postfix.org Subject: Re: Oppo

Re: Opportunistic TLS vs. plain

2014-06-21 Thread Wietse Venema
grantksupp...@operamail.com: > Viktor, > > > Your server is fine. Google is using RC4 outbound, and it is their > > responsibility to improve that, not yours. > > Thanks, for the pointers. That's cleared up & understood now. > > On Sat, Jun 21, 2014, at 01:35 PM, Wietse Venema wrote: > > Inste

Re: Opportunistic TLS vs. plain

2014-06-21 Thread grantksupport
Viktor, > Your server is fine. Google is using RC4 outbound, and it is their > responsibility to improve that, not yours. Thanks, for the pointers. That's cleared up & understood now. On Sat, Jun 21, 2014, at 01:35 PM, Wietse Venema wrote: > Instead of tinkering with carefully-chosen Postfix d

Re: Opportunistic TLS vs. plain

2014-06-21 Thread Wietse Venema
grantksupp...@operamail.com: > > > On Sat, Jun 21, 2014, at 11:41 AM, Viktor Dukhovni wrote: > > I repeat, these aren't the droids you're looking for. > > ok, no longer looking for those droids. > > returning to why I started looking for them in the 1st place, trying to > understand/control the

Re: Opportunistic TLS vs. plain

2014-06-21 Thread Viktor Dukhovni
On Sat, Jun 21, 2014 at 01:13:35PM -0700, grantksupp...@operamail.com wrote: > looking at headers of mail sent FROM my my postfix server TO my gmail > account > > Received: from mx.grantkX.com (mx.grantkX.com. > [##.##.##.##]) > by mx.google.com with ESMTPS id >

Re: Opportunistic TLS vs. plain

2014-06-21 Thread grantksupport
On Sat, Jun 21, 2014, at 11:41 AM, Viktor Dukhovni wrote: > I repeat, these aren't the droids you're looking for. ok, no longer looking for those droids. returning to why I started looking for them in the 1st place, trying to understand/control the strength of encryption to/from my server, maki

Re: Opportunistic TLS vs. plain

2014-06-21 Thread Viktor Dukhovni
On Sat, Jun 21, 2014 at 10:49:17AM -0700, grantksupp...@operamail.com wrote: > > See also: > > > > http://www.postfix.org/FORWARD_SECRECY_README.html > > Right. That's one of the specific documents I'd already referenced as > having read in my OP. It's thorough, and to me, confusing. Whic

Re: Opportunistic TLS vs. plain

2014-06-21 Thread grantksupport
hi On Sat, Jun 21, 2014, at 10:36 AM, Viktor Dukhovni wrote: > The *default* Postfix TLS cipherlist settings are chosen with care. > Best pracice is to leave them as-is. > > See also: > > http://www.postfix.org/FORWARD_SECRECY_README.html Right. That's one of the specific documents I'd alr

Re: Opportunistic TLS vs. plain

2014-06-21 Thread Viktor Dukhovni
On Sat, Jun 21, 2014 at 10:26:41AM -0700, grantksupp...@operamail.com wrote: > I think I see the variety of options, and understand some of the > pitfalls, as discussed, but TBH am a bit lost as to what the 'best > practices' *recommendation* for the cipher list to use is? specifically > for a PFS

Re: Opportunistic TLS vs. plain

2014-06-21 Thread grantksupport
On Sat, Jun 21, 2014, at 10:07 AM, Viktor Dukhovni wrote: > > During a security audit, it was determined that the MX supported what > > the auditors called "weak" ciphers and protocols (SSLv3, TLSv1.0, > > RC4-MD5, anonymous ciphers and so on). The auditors demanded that we > > disable all those -

Re: Opportunistic TLS vs. plain

2014-06-21 Thread Viktor Dukhovni
On Sat, Jun 21, 2014 at 01:11:04PM +0200, Stefan Foerster wrote: > During a security audit, it was determined that the MX supported what > the auditors called "weak" ciphers and protocols (SSLv3, TLSv1.0, > RC4-MD5, anonymous ciphers and so on). The auditors demanded that we > disable all those -

Re: Opportunistic TLS vs. plain

2014-06-21 Thread Martin Vegter
> On 06/21/2014 01:11 PM, Stefan Foerster wrote: > > our current situation is as follows: > > 1. Public MX, very low incoming volume, "smtpd_tls_security_level = may" > 2. Senders aren't known beforehand, i.e. no previous business relationship. > 3. Senders' IT usually doesn't support DANE. > 4. I

Re: Opportunistic TLS vs. plain

2014-06-21 Thread Jose Borges Ferreira
On Sat, Jun 21, 2014 at 12:45 PM, Stefan Foerster wrote: > While I certainly share your view on this - though I would have worded > it less strongly - my question still stands: Does anyone have real world > data to share (e.g. "we disabled ciphers X, Y and Z and then N percent > of clients failed

Re: Opportunistic TLS vs. plain

2014-06-21 Thread Jose Borges Ferreira
On Sat, Jun 21, 2014 at 12:21 PM, li...@rhsoft.net wrote: > > > Am 21.06.2014 13:11, schrieb Stefan Foerster: >> our current situation is as follows: >> >> 1. Public MX, very low incoming volume, "smtpd_tls_security_level = may" >> 2. Senders aren't known beforehand, i.e. no previous business rela

Re: Opportunistic TLS vs. plain

2014-06-21 Thread Stefan Foerster
* "li...@rhsoft.net" : > Am 21.06.2014 13:11, schrieb Stefan Foerster: > > Could someone share experience with or point me to some kind of "best > > practices" regarding opportunistic TLS, or explain the reasoning for > > banning "weak" ciphers/protocols on a public MX? (again, not talking > > abou

Re: Opportunistic TLS vs. plain

2014-06-21 Thread li...@rhsoft.net
Am 21.06.2014 13:11, schrieb Stefan Foerster: > our current situation is as follows: > > 1. Public MX, very low incoming volume, "smtpd_tls_security_level = may" > 2. Senders aren't known beforehand, i.e. no previous business relationship. > 3. Senders' IT usually doesn't support DANE. > 4. Inco