On Sat, Jun 20, 2015 at 11:33:00AM -0500, Frank Bulk wrote:
> http://www.circleid.com/posts/20150620_logjam_openssl_and_email_deliverabili
> ty/
> 
> FYI, just a heads up.

OpenSSL now rejects handshakes using DH parameters shorter than 768 bits
as a countermeasure against the Logjam attack (CVE-2015-4000). At least
Debian and Ubuntu is enforcing stricter DH handling with their current
Openssl version.
Consequently, depending on their configuration, some mail servers are
unable to talk to MX servers which do not offer a key of sufficient
length.

On some MTAs, like Sendmail, such mails are starving in the mail queue
because there is no fall-back to some unencrypted mode ...
We have a lot outgoing mail traffic hitting weak MX servers. With
exception entries like "Try_TLS:<MAILSERVERNAME> NO" for access-db we
circumvent the problem on occasion.
Serveral sites has been informed about this issue ... however,
it takes some time to fix all these server. ;)

Already referenced in the post above, but again: see https://weakdh.org/
and https://lists.debian.org/debian-security-announce/2015/msg00182.html

R's,
Johann K.


_______________________________________________
mailop mailing list
mailop@mailop.org
http://chilli.nosignal.org/mailman/listinfo/mailop

Reply via email to