Hi,

After upgrade from 3.10.0-1 -> 3.12.1-1 using ArchLinux AUR build[2] STARTTLS on port 143 
stopped to work. Using openssl I see "This TLS version forbids renegotiation."

Current openssl version on Arch is 3.6.0.

changelog.md[1]:

"Client-initiated renegotiation is disabled by default. To allow it, use the 
-client_renegotiation option, the SSL_OP_ALLOW_CLIENT_RENEGOTIATION flag, or the 
"ClientRenegotiation" config parameter as appropriate."

Output from openssl test:

[zork@serenity ~]$ openssl s_client -starttls imap -crlf -connect 'zork.pl:143'
Connecting to 178.32.202.57
CONNECTED(00000003)
Didn't find STARTTLS in server response, trying anyway...
80BBE3D7E87F0000:error:0A00010B:SSL routines:tls_validate_record_header:wrong 
version number:ssl/record/methods/tlsany_meth.c:84:
---
no peer certificate available
---
No client certificate CA names sent
Negotiated TLS1.3 group: <NULL>
---
SSL handshake has read 1253 bytes and written 1566 bytes
Verification: OK
---
New, (NONE), Cipher is (NONE)
Protocol: TLSv1.3
This TLS version forbids renegotiation.
Compression: NONE
Expansion: NONE
No ALPN negotiated
Early data was not sent
Verify return code: 0 (ok)


And for TLS 1.2:

[zork@serenity ~]$ openssl s_client -starttls imap -crlf -connect 'zork.pl:143' 
-tls1_2
Connecting to 178.32.202.57
CONNECTED(00000003)
Didn't find STARTTLS in server response, trying anyway...
802BB19E427F0000:error:0A00010B:SSL routines:tls_validate_record_header:wrong 
version number:ssl/record/methods/tlsany_meth.c:84:
---
no peer certificate available
---
No client certificate CA names sent
---
SSL handshake has read 1253 bytes and written 233 bytes
Verification: OK
---
New, (NONE), Cipher is (NONE)
Protocol: TLSv1.2
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
    Protocol  : TLSv1.2
    Cipher    : 0000
    Session-ID:
    Session-ID-ctx:
    Master-Key:
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    Start Time: 1761042230
    Timeout   : 7200 (sec)
    Verify return code: 0 (ok)
    Extended master secret: no
---


I am not sure what to do now. Is imap:143 + STARTTLS now considered insecure? 
should I reconfigure all mail clients to use imaps instead or imap+STARTTLS?
This is very small setup and I do not need to support STARTTLS on port 143.

Regards,
Łukasz

[1] https://github.com/openssl/openssl/blob/master/CHANGES.md#openssl-36
[2] https://aur.archlinux.org/packages/cyrus-imapd

------------------------------------------
Cyrus: Info
Permalink: 
https://cyrus.topicbox.com/groups/info/T9f9fafc2924fb12a-M0e6c76239926ba381b049dbf
Delivery options: https://cyrus.topicbox.com/groups/info/subscription

Reply via email to