Re: Outbound opportunistic TLS by default?

2019-10-21 Thread Wietse Venema
micah anderson: > Wietse Venema writes: > > > micah anderson: > >> Eray Aslan writes: > >> > >> > On Wed, Dec 19, 2018 at 02:36:50PM -0500, Viktor Dukhovni wrote: > >> >> If there are no objections, I can change the default to "may" when > >> >> TLS is compiled in. > >> > > >> > No objections f

Re: Outbound opportunistic TLS by default?

2019-10-21 Thread micah anderson
Wietse Venema writes: > micah anderson: >> Eray Aslan writes: >> >> > On Wed, Dec 19, 2018 at 02:36:50PM -0500, Viktor Dukhovni wrote: >> >> If there are no objections, I can change the default to "may" when >> >> TLS is compiled in. >> > >> > No objections for setting smtp_tls_security_level.

Re: Outbound opportunistic TLS by default?

2019-10-17 Thread Wietse Venema
micah anderson: > Eray Aslan writes: > > > On Wed, Dec 19, 2018 at 02:36:50PM -0500, Viktor Dukhovni wrote: > >> If there are no objections, I can change the default to "may" when > >> TLS is compiled in. > > > > No objections for setting smtp_tls_security_level. Thanks for your > > effort. > >

Re: Outbound opportunistic TLS by default?

2019-10-17 Thread micah anderson
Eray Aslan writes: > On Wed, Dec 19, 2018 at 02:36:50PM -0500, Viktor Dukhovni wrote: >> If there are no objections, I can change the default to "may" when >> TLS is compiled in. > > No objections for setting smtp_tls_security_level. Thanks for your > effort. I just wanted to circle back to thi

Re: Outbound opportunistic TLS by default?

2018-12-21 Thread Bill Cole
On 19 Dec 2018, at 14:36, Viktor Dukhovni wrote: If there are no objections, I can change the default to "may" when TLS is compiled in. But how else will Postfix troubleshooters make themselves look like geniuses with 10 seconds of "work?" (Not An Actual Objection... I wholeheartedly applau

Re: Outbound opportunistic TLS by default?

2018-12-20 Thread Andrey Repin
r since the >> original. > I did not see a clear consensus for or against a compile-time > conditional default "may" for "smtp_tls_security_level": > #ifdef USE_TLS > #define DEF_SMTP_TLS_LEVEL "may" > #else > #define DEF_SMTP_TLS_

Re: Outbound opportunistic TLS by default?

2018-12-20 Thread Eray Aslan
On Wed, Dec 19, 2018 at 02:36:50PM -0500, Viktor Dukhovni wrote: > If there are no objections, I can change the default to "may" when > TLS is compiled in. No objections for setting smtp_tls_security_level. Thanks for your effort. -- Eray

Re: Outbound opportunistic TLS by default?

2018-12-19 Thread Wietse Venema
micah anderson: > What happens now when someone builds without TLS support and then > enables some TLS option? It seems like the same thing should happen > here. I don't care what happens now. I want to avoid sending plaintext mail when Postfix is configured to require TLS, and someone forgets to

Re: Outbound opportunistic TLS by default?

2018-12-19 Thread Viktor Dukhovni
support, and Postfix configuration a) > enables opportunistic TLS or b) Postfix configuration requires TLS? Perhaps we should honour the configured (main.cf or per-destination) security level, and thus, with TLS support not compiled in: * A main.cf security level > "none" generates

Re: Outbound opportunistic TLS by default?

2018-12-19 Thread micah anderson
itly. >> > > >> > > Or, whether there are Postfix package maintainers in the same boat: >> > > too busy to add code to enable opportunistic TLS in the client at >> > > package install time, but would be happy to see it happen upstream. >> > >&

Re: Outbound opportunistic TLS by default?

2018-12-19 Thread micah anderson
y_level" setting in their main.cf >> > file. >> > >> > * Would not mind to see TLS turned on as a side-effect of a future >> > upgrade, but can't find the activation energy to do it explicitly. >> > >> > Or, whether there are Postfix package ma

Re: Outbound opportunistic TLS by default?

2018-12-19 Thread Wietse Venema
_level" setting in their main.cf > > > file. > > > > > > * Would not mind to see TLS turned on as a side-effect of a future > > > upgrade, but can't find the activation energy to do it explicitly. > > > > > > Or, whether there are Postfi

Re: Outbound opportunistic TLS by default?

2018-12-19 Thread Viktor Dukhovni
fix, but rather the content of the initial "main.cf" file when the package is first installed. A package can not only enable outbound opportunistic TLS, but perhaps also (given sufficient understanding of the platform) enable DANE when there's a validating local resolver, and generate

Re: Outbound opportunistic TLS by default?

2018-12-19 Thread Viktor Dukhovni
> > * Would not mind to see TLS turned on as a side-effect of a future > > upgrade, but can't find the activation energy to do it explicitly. > > > > Or, whether there are Postfix package maintainers in the same boat: > > too busy to add code to enable oppor

Re: Outbound opportunistic TLS by default?

2018-12-19 Thread Scott Kitterman
ity_level": > > #ifdef USE_TLS > #define DEF_SMTP_TLS_LEVEL "may" > #else > #define DEF_SMTP_TLS_LEVEL "" > #endif > > which would default to enable outbound opportunistic TLS whever TLS > support is compiled in. Since this last came up

Re: Outbound opportunistic TLS by default?

2018-12-19 Thread Viktor Dukhovni
e the > original. I did not see a clear consensus for or against a compile-time conditional default "may" for "smtp_tls_security_level": #ifdef USE_TLS #define DEF_SMTP_TLS_LEVEL "may" #else #define DEF_SMTP_TLS_LEVEL "" #endif which woul

Re: Outbound opportunistic TLS by default?

2018-12-19 Thread micah anderson
micah writes: > Viktor Dukhovni writes: > >>> On Dec 6, 2017, at 8:08 PM, micah wrote: >>> >>> Is there any reason why postfix, when compiled with TLS, can simply set >>> the default to 'may'? >> >> This is easy enough to implement, the only complication is >> that the documentation would need

Re: Question about disabling SSLv2 and SSLv3 and Opportunistic TLS

2018-05-31 Thread Wietse Venema
Viktor Dukhovni: > > > > On May 31, 2018, at 8:04 AM, Dirk St?cker wrote: > > > > Even after years of UNIX experience there are commands and syntaxes I've > > newer seen before. That <(...) is surely helpful elsewhere, when I can > > remember it... > > It is of course a "bashism" and not a P

Re: Question about disabling SSLv2 and SSLv3 and Opportunistic TLS

2018-05-31 Thread Viktor Dukhovni
> On May 31, 2018, at 8:04 AM, Dirk Stöcker wrote: > > Even after years of UNIX experience there are commands and syntaxes I've > newer seen before. That <(...) is surely helpful elsewhere, when I can > remember it... It is of course a "bashism" and not a POSIX-shell feature, so you won't f

Re: Question about disabling SSLv2 and SSLv3 and Opportunistic TLS

2018-05-31 Thread Dirk Stöcker
On Tue, 29 May 2018, Wietse Venema wrote: This is a task which I need something to change a vendor supplied main.cf into the better understandable minimum configuration which does not contain legacy settings. Could "postconf" get a new "-N" paramater for that maybe ;-) My Postfix cycles are c

Re: Question about disabling SSLv2 and SSLv3 and Opportunistic TLS

2018-05-29 Thread Wietse Venema
@lbutlr: > I do have one question that I've never noticed before. The settings for = > mydomain and myhostname show that they are at the default values. Where = > is postfix getting the defaults for this and does it mean the settings = > really aren't needed unless your hostname is, for some reason

Re: [Postfix] Re: [Postfix] Re: [Postfix] Re: Question about disabling SSLv2 and SSLv3 and Opportunistic TLS

2018-05-29 Thread Jim P.
On Tue, 2018-05-29 at 13:57 -0400, Viktor Dukhovni wrote: > > On May 29, 2018, at 1:54 PM, Jim P. wrote: > > > > It's more of a language "feature".  This works: > > > > LANG=C comm -1 -2 <(postconf -n) <(postconf -d) > > > > this doesn't: > > > > LANG=en_US comm -1 -2 <(postconf -n) <(postconf

Re: [Postfix] Question about disabling SSLv2 and SSLv3 and Opportunistic TLS

2018-05-29 Thread @lbutlr
On 29 May 2018, at 11:57, Viktor Dukhovni wrote: > The collation rules for "en_US" are abominable. I always set: > > LC_CTYPE=en_US.UTF-8 LANG=C Yep, strongly agree with this. I foolishly had LANG=en_US some time back thinking it was sensible. It is not. Everything breaks.

Re: [Postfix] Re: [Postfix] Re: Question about disabling SSLv2 and SSLv3 and Opportunistic TLS

2018-05-29 Thread Viktor Dukhovni
> On May 29, 2018, at 1:54 PM, Jim P. wrote: > > It's more of a language "feature". This works: > > LANG=C comm -1 -2 <(postconf -n) <(postconf -d) > > this doesn't: > > LANG=en_US comm -1 -2 <(postconf -n) <(postconf -d) The collation rules for "en_US" are abominable. I always set: L

Re: [Postfix] Re: [Postfix] Re: Question about disabling SSLv2 and SSLv3 and Opportunistic TLS

2018-05-29 Thread Jim P.
On Tue, 2018-05-29 at 13:32 -0400, Viktor Dukhovni wrote: > > On May 29, 2018, at 12:28 PM, Jim P. wrote: > > > > FWIW, I had to use this: > > > > comm -1 -2 <(postconf -n|sort) <(postconf -d|sort) > > That'd only be needed if you have a funny collation locale. > Try: > >  env -i "PATH=$PA

Re: [Postfix] Re: Question about disabling SSLv2 and SSLv3 and Opportunistic TLS

2018-05-29 Thread Viktor Dukhovni
> On May 29, 2018, at 12:28 PM, Jim P. wrote: > > FWIW, I had to use this: > > comm -1 -2 <(postconf -n|sort) <(postconf -d|sort) That'd only be needed if you have a funny collation locale. Try: env -i "PATH=$PATH" LANG=C LC_COLLATE=C bash -c ' comm -1 -2 <(postconf -n) <(post

Re: [Postfix] Re: Question about disabling SSLv2 and SSLv3 and Opportunistic TLS

2018-05-29 Thread Jim P.
On Tue, 2018-05-29 at 10:49 +0200, Stefan Förster wrote: > * Dirk Stöcker : > > On Mon, 28 May 2018, Viktor Dukhovni wrote: > > > > > > It might be useful, but probably not, to have a version of > > > > postconf -n that showed the default value along sinde the > > > > changed value: > > > > > > j

Re: Question about disabling SSLv2 and SSLv3 and Opportunistic TLS

2018-05-29 Thread @lbutlr
On 2018-05-29 (02:35 MDT), Dirk Stöcker wrote: > > Do you maybe also have a command to show only changed parameters? This is doable, but it takes a bit more processing than a single line. Basically, a shell script that parses the output of join <(postconf -n) <(postconf -d | sed 's/=/(default

Re: Question about disabling SSLv2 and SSLv3 and Opportunistic TLS

2018-05-29 Thread Wietse Venema
Dirk St?cker: > On Mon, 28 May 2018, Viktor Dukhovni wrote: > > >> It might be useful, but probably not, to have a version of postconf -n > >> that showed the default value along sinde the changed value: > > > > join <(postconf -n) <(postconf -d | sed 's/=/(default:/; s/$/)/') > > Do you maybe a

Re: Question about disabling SSLv2 and SSLv3 and Opportunistic TLS

2018-05-29 Thread Stefan Förster
* Dirk Stöcker : On Mon, 28 May 2018, Viktor Dukhovni wrote: It might be useful, but probably not, to have a version of postconf -n that showed the default value along sinde the changed value: join <(postconf -n) <(postconf -d | sed 's/=/(default:/; s/$/)/') Do you maybe also have a comman

Re: Question about disabling SSLv2 and SSLv3 and Opportunistic TLS

2018-05-29 Thread Dirk Stöcker
On Mon, 28 May 2018, Viktor Dukhovni wrote: It might be useful, but probably not, to have a version of postconf -n that showed the default value along sinde the changed value: join <(postconf -n) <(postconf -d | sed 's/=/(default:/; s/$/)/') Do you maybe also have a command to show only cha

Re: Question about disabling SSLv2 and SSLv3 and Opportunistic TLS

2018-05-28 Thread @lbutlr
On 2018-05-28 (11:26 MDT), Viktor Dukhovni wrote: > > join <(postconf -n) <(postconf -d | sed 's/=/(default:/; s/$/)/') That's nifty! -- "you'd think you could trust a horde of hungarian barbarians"

Re: Question about disabling SSLv2 and SSLv3 and Opportunistic TLS

2018-05-28 Thread Viktor Dukhovni
> On May 28, 2018, at 1:26 PM, Viktor Dukhovni > wrote: > > join <(postconf -n) <(postconf -d | sed 's/=/(default:/; s/$/)/') I should mention that this is "bash" syntax. Other shells require temp files. On at least some FreeBSD systems bash by default does not assume the existence of /dev

Re: Question about disabling SSLv2 and SSLv3 and Opportunistic TLS

2018-05-28 Thread Viktor Dukhovni
> On May 28, 2018, at 11:35 AM, @lbutlr wrote: > > It might be useful, but probably not, to have a version of postconf -n that > showed the default value along sinde the changed value: join <(postconf -n) <(postconf -d | sed 's/=/(default:/; s/$/)/') -- Viktor.

Re: Question about disabling SSLv2 and SSLv3 and Opportunistic TLS

2018-05-28 Thread @lbutlr
On 26 May 2018, at 12:59, Benny Pedersen wrote: > just kidding, i would like to see main.cf smaller, so postconf -n gives more > settings as default from -d > > as it is now setting is more or less random default from main.cf > > keep main.cf minimal is good sense I’m not sure what you mean, t

Re: Question about disabling SSLv2 and SSLv3 and Opportunistic TLS

2018-05-26 Thread Benny Pedersen
/dev/rob0 skrev den 2018-05-26 18:59: Just a thought. This particular misunderstanding is pretty common. Of course "instead of actual settings" should be a clue. It might help if the OP tells us what he was thinking when reading that passage about "-d". Reading too fast? postconf -d output

Re: Question about disabling SSLv2 and SSLv3 and Opportunistic TLS

2018-05-26 Thread Sean Son
On Sat, May 26, 2018 at 12:56 PM, Viktor Dukhovni < postfix-us...@dukhovni.org> wrote: > > > > On May 26, 2018, at 8:30 AM, Sean Son > wrote: > > > > Also, if I set smtpd_tls_ciphers" and/or "smtp_tls_ciphers" to "high" , > won'

Re: Question about disabling SSLv2 and SSLv3 and Opportunistic TLS

2018-05-26 Thread @lbutlr
On 2018-05-26 (10:59 MDT), /dev/rob0 wrote: > Perhaps this could be reworded to be less confusing? Since "-d" > doesn't look at main.cf, s/main.cf/"Postfix internal"/? I dunno, I think "Print main.cf default parameter settings instead of actual settings." is very clear. -- We will fight for

Re: Question about disabling SSLv2 and SSLv3 and Opportunistic TLS

2018-05-26 Thread /dev/rob0
On Sat, May 26, 2018 at 01:11:00PM -0400, Viktor Dukhovni wrote: > > On May 26, 2018, at 12:59 PM, /dev/rob0 wrote: > > > >> Man postconf: > >> -d Print main.cf default parameter settings instead of > >> actual settings. Specify -df to fold long lines > >> fo

Re: Question about disabling SSLv2 and SSLv3 and Opportunistic TLS

2018-05-26 Thread Viktor Dukhovni
> On May 26, 2018, at 12:59 PM, /dev/rob0 wrote: > >> Man postconf: >> -d Print main.cf default parameter settings instead of >> actual settings. Specify -df to fold long lines >> for human readability (Postfix 2.9 and later). > > Perhaps this could be rew

Re: Question about disabling SSLv2 and SSLv3 and Opportunistic TLS

2018-05-26 Thread /dev/rob0
On Sat, May 26, 2018 at 06:51:33AM -0600, @lbutlr wrote: > On 26 May 2018, at 06:30, Sean Son > wrote: > > postconf -d | egrep '^[^ ]*mtpd?_tls.*_protocols' . but it still > > shows me the old settings > > > The output of postconf -d will never change. > > Man postconf: >-d Print

Re: Question about disabling SSLv2 and SSLv3 and Opportunistic TLS

2018-05-26 Thread Viktor Dukhovni
> On May 26, 2018, at 8:30 AM, Sean Son > wrote: > > Also, if I set smtpd_tls_ciphers" and/or "smtp_tls_ciphers" to "high" , won't > that conflict with opportunistic TLS. Only for senders that don't support any of the modern ciphersuites

Re: Question about disabling SSLv2 and SSLv3 and Opportunistic TLS

2018-05-26 Thread @lbutlr
On 26 May 2018, at 06:30, Sean Son wrote: > postconf -d | egrep '^[^ ]*mtpd?_tls.*_protocols' . but it still shows me > the old settings The output of postconf -d will never change. Man postconf: -d Print main.cf default parameter settings instead of actual set- ti

Re: Question about disabling SSLv2 and SSLv3 and Opportunistic TLS

2018-05-26 Thread Sean Son
se two issues. Any suggestions on what > I should do to fix them with out breaking opportunistic TLS is greatly > appreciated! > > Change the settings to the posted Postfix 3.0+ defaults. > As for the medium ciphers. Set "smtpd_tls_ciphers" and/or > "smtp_tls_ci

Re: Question about disabling SSLv2 and SSLv3 and Opportunistic TLS

2018-05-21 Thread Viktor Dukhovni
t; i was informed by our security team that my postfix server has SSL Version 2 > and 3 protocol detected and SSL Medium Strength Cipher suites supported. I am > supposed to fix those two issues. Any suggestions on what I should do to > fix them with out breaking opportunistic TLS is gr

Re: Question about disabling SSLv2 and SSLv3 and Opportunistic TLS

2018-05-21 Thread Sean Son
On Mon, May 21, 2018 at 2:08 PM, Viktor Dukhovni wrote: > > > > On May 21, 2018, at 1:16 PM, Sean Son > wrote: > > > > Hello all > > > > I have opportunistic TLS (offering STARTLS) configured in my main.cf > file. I have been tasked to disable S

Re: Question about disabling SSLv2 and SSLv3 and Opportunistic TLS

2018-05-21 Thread Viktor Dukhovni
> On May 21, 2018, at 1:16 PM, Sean Son > wrote: > > Hello all > > I have opportunistic TLS (offering STARTLS) configured in my main.cf file. > I have been tasked to disable SSLv2 and SSLv3 as well as disable medium > strength ciphers (to use high strength one

Re: Question about disabling SSLv2 and SSLv3 and Opportunistic TLS

2018-05-21 Thread Bill Cole
On 21 May 2018, at 13:16 (-0400), Sean Son wrote: Hello all I have opportunistic TLS (offering STARTLS) configured in my main.cf file. I have been tasked to disable SSLv2 and SSLv3 as well as disable medium strength ciphers (to use high strength ones instead) in my postfix server. If I

Question about disabling SSLv2 and SSLv3 and Opportunistic TLS

2018-05-21 Thread Sean Son
Hello all I have opportunistic TLS (offering STARTLS) configured in my main.cf file. I have been tasked to disable SSLv2 and SSLv3 as well as disable medium strength ciphers (to use high strength ones instead) in my postfix server. If I was to add the following to my main.cf

Re: Outbound opportunistic TLS by default?

2017-12-09 Thread micah
Viktor Dukhovni writes: >> On Dec 6, 2017, at 8:08 PM, micah wrote: >> >> Is there any reason why postfix, when compiled with TLS, can simply set >> the default to 'may'? > > This is easy enough to implement, the only complication is > that the documentation would need to explain the variable >

Re: Outbound opportunistic TLS by default?

2017-12-07 Thread Eray Aslan
On Wed, Dec 06, 2017 at 05:22:19PM -0600, Noel Jones wrote: > I was thinking "make install" rather than "make upgrade" is a good > enough indicator of first time install. Deciding if TLS is available > might be trickier. Source based distros like Gentoo make install to a seperate destination dir a

Re: Outbound opportunistic TLS by default?

2017-12-06 Thread Viktor Dukhovni
> On Dec 6, 2017, at 8:08 PM, micah wrote: > > Is there any reason why postfix, when compiled with TLS, can simply set > the default to 'may'? This is easy enough to implement, the only complication is that the documentation would need to explain the variable default. > If it is compiled with

Re: Outbound opportunistic TLS by default?

2017-12-06 Thread micah
Wietse Venema writes: > Noel Jones: >> On 12/6/2017 1:39 PM, Viktor Dukhovni wrote: >> > >> > As for changing the default, I am not opposed, perhaps given the >> > changes in the SMTP ecosystem since 2014: >> > >> > https://transparencyreport.google.com/safer-email/overview?encrypt_in=end:15125

Re: Outbound opportunistic TLS by default?

2017-12-06 Thread Noel Jones
On 12/6/2017 3:24 PM, Wietse Venema wrote: > > How would one recognize 'first-time' installation? If that helps > only the tiny minority of sites that install Postfix from source,then > it does not seem to be a good target. Better to get the vendors to > run those commands instead. > > Wiet

Re: Outbound opportunistic TLS by default?

2017-12-06 Thread Wietse Venema
Noel Jones: > On 12/6/2017 1:39 PM, Viktor Dukhovni wrote: > > > > As for changing the default, I am not opposed, perhaps given the > > changes in the SMTP ecosystem since 2014: > > > > https://transparencyreport.google.com/safer-email/overview?encrypt_in=end:151251840;series:inbound;start:13

Re: Outbound opportunistic TLS by default?

2017-12-06 Thread Noel Jones
On 12/6/2017 1:39 PM, Viktor Dukhovni wrote: > > As for changing the default, I am not opposed, perhaps given the > changes in the SMTP ecosystem since 2014: > > https://transparencyreport.google.com/safer-email/overview?encrypt_in=end:151251840;series:inbound;start:138853440&lu=encrypt_i

Outbound opportunistic TLS by default?

2017-12-06 Thread Viktor Dukhovni
> On Dec 6, 2017, at 2:27 PM, micah wrote: > > I'm sorry, I meant 'smtp_tls_security_level = may' - not > smtpd_tls_security_level. > > You are correct that smtpd_tls_security_level would need a certificate, > but 'smtp_tls_security_level' does not, and as an opportunistic mode, it > is design

Re: Message not retransmitted immediately after opportunistic TLS handshake failure

2017-06-23 Thread Viktor Dukhovni
On Fri, Jun 23, 2017 at 01:48:29AM +, Nik Kostaras wrote: > Is there any value making this check optional with the use of a > configuration parameter, to specify the expected minimum timeout (0 to > disable the timeout check)? I think that a brief delay for the tiny fraction of sites that mis

RE: Message not retransmitted immediately after opportunistic TLS handshake failure

2017-06-22 Thread Nik Kostaras
e not retransmitted immediately after opportunistic TLS handshake failure On Thu, Jun 22, 2017 at 06:14:08PM +, Nik Kostaras wrote: > In one of my tests I'm configuring Postfix client (smtp) to use > opportunistic TLS with TLSv1.2 protocol only Don't do that. See RFC7435.

Re: Message not retransmitted immediately after opportunistic TLS handshake failure

2017-06-22 Thread Claus Assmann
On Fri, Jun 23, 2017, Viktor Dukhovni wrote: > Some MTAs (say Sendmail) don't downgrade to cleartext at all when > the peer purports to support STARTTLS. Postfix gives the remote Just FYI: in sendmail 8.16 it's an option: To automatically handle TLS interoperability problems for outgoin

Re: Message not retransmitted immediately after opportunistic TLS handshake failure

2017-06-22 Thread Viktor Dukhovni
On Thu, Jun 22, 2017 at 06:14:08PM +, Nik Kostaras wrote: > In one of my tests I'm configuring Postfix client (smtp) to use > opportunistic TLS with TLSv1.2 protocol only Don't do that. See RFC7435. Raising the floor on acceptable cryptographic parameters often lowers se

Re: Message not retransmitted immediately after opportunistic TLS handshake failure

2017-06-22 Thread Wietse Venema
Nik Kostaras: > Jun 22 17:30:26 postfix-outbound/smtp[27125]: 3wtnBB3Jr7z1Q67T: > to=, relay=10.44.43.1[10.44.43.1]:25, delay=0.08, > delays=0.02/0.03/0.03/0, dsn=4.7.5, status=deferred (Cannot start TLS: > handshake failure) > > It reaches > if (PLAINTEXT_FALLBACK_OK_AFTER_STARTTLS_FAILURE

RE: Message not retransmitted immediately after opportunistic TLS handshake failure

2017-06-22 Thread Nik Kostaras
FTER_STARTTLS_FAILURE. Nik -Original Message- From: owner-postfix-us...@postfix.org [mailto:owner-postfix-us...@postfix.org] On Behalf Of Wietse Venema Sent: 22 June 2017 20:17 To: Postfix users Subject: Re: Message not retransmitted immediately after opportunistic TLS handshake failure Nik Ko

Re: Message not retransmitted immediately after opportunistic TLS handshake failure

2017-06-22 Thread Wietse Venema
Nik Kostaras: > As expected the TLS handshake fails, but Postfix moves the message > to deferred queue rather than retrying immediately in plaintext. What is the error message? The kind of error determines whether or not Postfix will immediately fall back to plaintext immediately. The Postfix vers

Message not retransmitted immediately after opportunistic TLS handshake failure

2017-06-22 Thread Nik Kostaras
Hi all, In one of my tests I'm configuring Postfix client (smtp) to use opportunistic TLS with TLSv1.2 protocol only and the next MTA (server side) to use opportunistic TLS with TLSv1.1 only, to see the behaviour of Postfix after a failed handshake. As expected the TLS handshake fails

Broken opportunistic TLS senders (was: Another yahoo problem)

2017-03-30 Thread Viktor Dukhovni
On Thu, Mar 30, 2017 at 02:54:09PM +0200, Benny Pedersen wrote: > Levente Birta skrev den 2017-03-30 14:27: > > > Mar 30 13:48:16 wsrv postfix/tlsproxy[34871]: CONNECT from > > [98.137.64.231]:33591 > > Mar 30 13:48:16 wsrv postfix/tlsproxy[34871]: warning: TLS library > > problem: error:14094416

Re: selective disable of smtpd opportunistic TLS

2016-01-22 Thread Curtis Villamizar
o is justified. SHA1 should be avoided, but admitedly no one would bother with the computational load needed for a SHA1 attack on our opportunistic TLS email, particularly no spammer trying to find a relay to use. You did not respond to the rest of the email. Any comments o

Re: selective disable of smtpd opportunistic TLS

2016-01-22 Thread Viktor Dukhovni
On Fri, Jan 22, 2016 at 03:14:22PM -0500, Curtis Villamizar wrote: > You might > also want to report that the keys they use are less than LOW security > but that might be a feature. You're mistaken. These ciphers are HIGH. > Note that none of the ciphers used by comcast.net support even low > s

Re: selective disable of smtpd opportunistic TLS

2016-01-22 Thread Curtis Villamizar
comcast, then please report that. You might also want to report that the keys they use are less than LOW security but that might be a feature. Please also ask when opportunistic TLS was enabled. Note that none of the ciphers used by comcast.net support even low strength and forward secrecy. cat

Re: selective disable of smtpd opportunistic TLS

2016-01-21 Thread Viktor Dukhovni
On Thu, Jan 21, 2016 at 10:55:19PM -0500, Curtis Villamizar wrote: > It took a while to get a dumpfile. My tcpdump command only covered a > subset of comcast.net mailhosts. > > This has a failed TLS negotiation and a few packets from a next > attempt. The log entry below covers this first conne

Re: selective disable of smtpd opportunistic TLS

2016-01-21 Thread Curtis Villamizar
In message <20160115235712.gn...@mournblade.imrryr.org> Viktor Dukhovni writes: > > On Fri, Jan 15, 2016 at 06:47:38PM -0500, Curtis Villamizar wrote: > > > Viktor, > > > > If you are still interested below is a tcpdump. > > > > If not interested, please just delete. > > I was looking for a

Re: selective disable of smtpd opportunistic TLS

2016-01-15 Thread Curtis Villamizar
In message <20160115235712.gn...@mournblade.imrryr.org> Viktor Dukhovni writes: > > On Fri, Jan 15, 2016 at 06:47:38PM -0500, Curtis Villamizar wrote: > > > Viktor, > > > > If you are still interested below is a tcpdump. > > > > If not interested, please just delete. > > I was looking for a

Re: selective disable of smtpd opportunistic TLS

2016-01-15 Thread Viktor Dukhovni
On Fri, Jan 15, 2016 at 06:47:38PM -0500, Curtis Villamizar wrote: > Viktor, > > If you are still interested below is a tcpdump. > > If not interested, please just delete. I was looking for a binary PCAP file, not an ASCII decode. Yes, it would be good to know whether Comcast was having ECDSA

Re: selective disable of smtpd opportunistic TLS

2016-01-15 Thread Curtis Villamizar
In message <88031027-d5b8-4f48-947d-294302fac...@dukhovni.org> Viktor Dukhovni writes: > Post a PCAP file of a single failed TLS handshake. I know the person > at comcast in charge of their email transport security. I can probably > get them to fix it once we nail down the problem, assuming it

Re: selective disable of smtpd opportunistic TLS

2016-01-15 Thread Curtis Villamizar
In message <20160115051749.gl...@mournblade.imrryr.org> Viktor Dukhovni writes: > On Thu, Jan 14, 2016 at 11:54:13PM -0500, Curtis Villamizar wrote: > > > > > > > smtp_tls_ciphers = high > > > > > > > > > > Usually best to leav

Re: selective disable of smtpd opportunistic TLS

2016-01-14 Thread Viktor Dukhovni
On Thu, Jan 14, 2016 at 11:54:13PM -0500, Curtis Villamizar wrote: > > > > > smtp_tls_ciphers = high > > > > > > > > Usually best to leave this at "medium". This is opportunistic > > > > TLS, and if high fails, you

Re: selective disable of smtpd opportunistic TLS

2016-01-14 Thread Curtis Villamizar
> On Thu, Jan 14, 2016 at 03:53:23PM -0500, Curtis Villamizar wrote: > > > > > smtp_tls_ciphers = high > > > > > > Usually best to leave this at "medium". This is opportunistic > > > TLS, and if high fails, you'll send cl

Re: TLSv1.0 (was Re: selective disable of smtpd opportunistic TLS)

2016-01-14 Thread Curtis Villamizar
In message <20160114200215.gj...@mournblade.imrryr.org> Viktor Dukhovni writes: > On Thu, Jan 14, 2016 at 02:07:07PM -0500, Curtis Villamizar wrote: > > > In message > > Curtis Villamizar writes: > > > > > btw - I just added "!TLSv1.0" to get only TLSv1.2. I wasn't sure I > > > could specif

Re: selective disable of smtpd opportunistic TLS

2016-01-14 Thread Viktor Dukhovni
On Thu, Jan 14, 2016 at 03:53:23PM -0500, Curtis Villamizar wrote: > > > smtp_tls_ciphers = high > > > > Usually best to leave this at "medium". This is opportunistic > > TLS, and if high fails, you'll send cleartext, which is NOT > >

Re: selective disable of smtpd opportunistic TLS

2016-01-14 Thread Curtis Villamizar
m > > smtp_tls_key_file = /etc/postfix/key.pem > > Usually best to not configure client certificates. > > > smtp_tls_ciphers = high > > Usually best to leave this at "medium". This is opportunistic > TLS, and if high fails, you'll send clea

Re: TLSv1.0 (was Re: selective disable of smtpd opportunistic TLS)

2016-01-14 Thread Viktor Dukhovni
On Thu, Jan 14, 2016 at 02:07:07PM -0500, Curtis Villamizar wrote: > In message > Curtis Villamizar writes: > > > btw - I just added "!TLSv1.0" to get only TLSv1.2. I wasn't sure I > > could specify !TLSv1.0 so I just tried it. Who said the correct name is "TLSv1.0"? http://www.postfix.o

TLSv1.0 (was Re: selective disable of smtpd opportunistic TLS)

2016-01-14 Thread Curtis Villamizar
In message Curtis Villamizar writes: > btw - I just added "!TLSv1.0" to get only TLSv1.2. I wasn't sure I > could specify !TLSv1.0 so I just tried it. > > Curtis oops that didn't work. Curtis

Re: selective disable of smtpd opportunistic TLS

2016-01-14 Thread Viktor Dukhovni
_ciphers = high Usually best to leave this at "medium". This is opportunistic TLS, and if high fails, you'll send cleartext, which is NOT stronger than medium. > smtp_tls_exclude_ciphers = aNULL MD5 DES Mostly harmless, but not ideal. Instead try:

Re: selective disable of smtpd opportunistic TLS

2016-01-14 Thread Curtis Villamizar
In message <88031027-d5b8-4f48-947d-294302fac...@dukhovni.org> Viktor Dukhovni writes: > > > On Jan 13, 2016, at 8:52 PM, Curtis Villamizar > > wrote: > > > > The logs revealed something about the nature of the problem. A few of > > these sort of messages were found. > > > > Jan 13 17:08:22 m

Re: selective disable of smtpd opportunistic TLS

2016-01-13 Thread Curtis Villamizar
In message <3pgpvv0nvczj...@spike.porcupine.org> Wietse Venema writes: > Curtis Villamizar: > > What I'd like to do is set smtpd_tls_security_level back to "may" and > > then somehow set it to "none" if the EHLO domain is comcast.net (oops > > the secret is out). > > > > I see we have smtp_tls_p

Re: selective disable of smtpd opportunistic TLS

2016-01-13 Thread Viktor Dukhovni
> On Jan 13, 2016, at 8:52 PM, Curtis Villamizar > wrote: > > The logs revealed something about the nature of the problem. A few of > these sort of messages were found. > > Jan 13 17:08:22 mta3 postfix/smtpd[15958]: > warning: TLS library problem: > error:1408A0C1:SSL > routines:ssl3_ge

Re: selective disable of smtpd opportunistic TLS

2016-01-13 Thread Wietse Venema
Curtis Villamizar: > What I'd like to do is set smtpd_tls_security_level back to "may" and > then somehow set it to "none" if the EHLO domain is comcast.net (oops > the secret is out). > > I see we have smtp_tls_policy_maps, but no smtpd_tls_policy_maps. Use this to suppress the STARTTLS announce

selective disable of smtpd opportunistic TLS

2016-01-13 Thread Curtis Villamizar
I turned on opportunistic TLS last summer I think. All was fine for a long time. btw - I'm currently running the FreeBSD postfix-current-3.0.20151003,4 port but previously used 2.8. Somewhat recently someone with a residential cable provider account complained that he got mail from me but

RE: Opportunistic TLS vs. plain

2014-06-21 Thread Marius Gologan
ught calling Mr. Gates for support, even if I paid him. Marius. -Original Message- From: owner-postfix-us...@postfix.org [mailto:owner-postfix-us...@postfix.org] On Behalf Of grantksupp...@operamail.com Sent: Sunday, June 22, 2014 12:03 AM To: postfix-users@postfix.org Subject: Re: Oppo

Re: Opportunistic TLS vs. plain

2014-06-21 Thread Wietse Venema
grantksupp...@operamail.com: > Viktor, > > > Your server is fine. Google is using RC4 outbound, and it is their > > responsibility to improve that, not yours. > > Thanks, for the pointers. That's cleared up & understood now. > > On Sat, Jun 21, 2014, at 01:35 PM, Wietse Venema wrote: > > Inste

Re: Opportunistic TLS vs. plain

2014-06-21 Thread grantksupport
Viktor, > Your server is fine. Google is using RC4 outbound, and it is their > responsibility to improve that, not yours. Thanks, for the pointers. That's cleared up & understood now. On Sat, Jun 21, 2014, at 01:35 PM, Wietse Venema wrote: > Instead of tinkering with carefully-chosen Postfix d

Re: Opportunistic TLS vs. plain

2014-06-21 Thread Wietse Venema
grantksupp...@operamail.com: > > > On Sat, Jun 21, 2014, at 11:41 AM, Viktor Dukhovni wrote: > > I repeat, these aren't the droids you're looking for. > > ok, no longer looking for those droids. > > returning to why I started looking for them in the 1st place, trying to > understand/control the

Re: Opportunistic TLS vs. plain

2014-06-21 Thread Viktor Dukhovni
On Sat, Jun 21, 2014 at 01:13:35PM -0700, grantksupp...@operamail.com wrote: > looking at headers of mail sent FROM my my postfix server TO my gmail > account > > Received: from mx.grantkX.com (mx.grantkX.com. > [##.##.##.##]) > by mx.google.com with ESMTPS id >

Re: Opportunistic TLS vs. plain

2014-06-21 Thread grantksupport
On Sat, Jun 21, 2014, at 11:41 AM, Viktor Dukhovni wrote: > I repeat, these aren't the droids you're looking for. ok, no longer looking for those droids. returning to why I started looking for them in the 1st place, trying to understand/control the strength of encryption to/from my server, maki

Re: Opportunistic TLS vs. plain

2014-06-21 Thread Viktor Dukhovni
s to move on to other things to improve. These aren't the droids you're looking for. > "It is likely safe to set "smtp_tls_ciphers = medium" if you wish to > disable the obsolete "export" and "low" grade ciphers even with > opportunistic TLS.&qu

Re: Opportunistic TLS vs. plain

2014-06-21 Thread grantksupport
umentation lists that list? > Best pracice is to leave them as-is. Yet, that same page states: "It is likely safe to set "smtp_tls_ciphers = medium" if you wish to disable the obsolete "export" and "low" grade ciphers even with opportunistic TLS.&

Re: Opportunistic TLS vs. plain

2014-06-21 Thread Viktor Dukhovni
On Sat, Jun 21, 2014 at 10:26:41AM -0700, grantksupp...@operamail.com wrote: > I think I see the variety of options, and understand some of the > pitfalls, as discussed, but TBH am a bit lost as to what the 'best > practices' *recommendation* for the cipher list to use is? specifically > for a PFS

Re: Opportunistic TLS vs. plain

2014-06-21 Thread grantksupport
On Sat, Jun 21, 2014, at 10:07 AM, Viktor Dukhovni wrote: > > During a security audit, it was determined that the MX supported what > > the auditors called "weak" ciphers and protocols (SSLv3, TLSv1.0, > > RC4-MD5, anonymous ciphers and so on). The auditors demanded that we > > disable all those -

Re: Opportunistic TLS vs. plain

2014-06-21 Thread Viktor Dukhovni
On Sat, Jun 21, 2014 at 01:11:04PM +0200, Stefan Foerster wrote: > During a security audit, it was determined that the MX supported what > the auditors called "weak" ciphers and protocols (SSLv3, TLSv1.0, > RC4-MD5, anonymous ciphers and so on). The auditors demanded that we > disable all those -

Re: Opportunistic TLS vs. plain

2014-06-21 Thread Martin Vegter
> On 06/21/2014 01:11 PM, Stefan Foerster wrote: > > our current situation is as follows: > > 1. Public MX, very low incoming volume, "smtpd_tls_security_level = may" > 2. Senders aren't known beforehand, i.e. no previous business relationship. > 3. Senders' IT usually doesn't support DANE. > 4. I

  1   2   >