On Fri, 2020-06-12 at 09:11 +0200, Fourhundred Thecat wrote:
>  > On 2020-06-12 08:57, Jeroen Geilman wrote:
> > -  too many errors after .* from .*
> > -  warning: non-SMTP command from .*
> > 
> > While these do indicate badly-behaved clients, there is no reason
> > to assume evil intent.

The senior citizen that inadvertendly drove faster than the allowed
speed limit had no evil intent, but they still got a speeding ticket.


> - reject: RCPT from .* Recipient address rejected: User unknown in
> > local recipient table; .*'
> > 
> > This rejection is per-recipient; blocking this *client* because
> > they mis-typed a single address means you /will/ reject valid email
> > later on.
> 
> OK, I see. But I am blocking for 1 hour only anyway.

That is very reasonable.  A civil society does not send all citizens
that have driven a bit above limit to prison.  For mild offenders the
sentence is a small ticket.  For more serious and repeat offenders,
there are temporary license suspensions, and only for the worst
offenders there are life-suspensions and sometimes jail.

Intent is still not part of the equation, and this is by design: 
Proving intent (subjective!) is extremely difficult.  In civil
societies, we do not want to make the mistake of jailing innocent
people, which is why to find intent (and thus criminal guilt), the
standard of proof is "beyond reasonable doubt" (i.e. 100%), much higher
than the standard to find strict liability (responsibility based on
objective facts only, which is the case of the misconfigured client).

Strict liability is easy to find at trial than criminal guilt, but
carries much lighter sentences.

Eventually, your one-hour blocked client will learn from the rejection,
or will be rightfully excluded from the network.

On the other hand, tolerating these bad-behaved clients is a slippery
slope.  If drivers get away with 10Km/h above limit, next week they
will try 15Km/h and next month 20Km/h until there is no limit at all. 
But what was the purpose of the limit in the first place?

Sadly, after the twitterization of language, we are witnessing also the
twitterization of decision-making.  Centuries of wisdom are lost to the
analphabetism of incompetents-in-chief that condense accusation, trial,
verdict and sentencing into one tweet.


> And why can't legitimate client use reasonable ciphers?

This is exactly the question to answer.  Reasonable depends on context
and evolves over time.  Maybe 50 years ago it was reasonable to
tolerate drinking and driving.  Today we know better.  Maybe 40 years
ago encryption was difficult to implement, and even nowadays there may
be reasons not to.  Some banks are sending alerts unencrypted, for
scalability reasons.


> I think my settings are not so strict. I believe am using
> recommendations from this mailing list:
> 
> smtpd_tls_ciphers                   = medium
> smtpd_tls_protocols                 = !SSLv2, !SSLv3
> smtpd_tls_mandatory_protocols       = !SSLv2, !SSLv3


Depends on the sensitivity of the transmitted/received information and your 
overall protection strategy.

If the information is encrypted with PGP or S/MIME, the choice of TLS becomes 
much less critical.

The test I recommend:  if you are not comfortable putting the information on 
the back of a postcard, use PGP, and make sure that you are comfortable putting 
the PGP-chiphercode on the back of a postcard.

With that out of the way, the choice of encryption is much less critical.  
Have a look at https://ssl-tools.net/mailservers

Generally, weak encryption is better than no encryption.  !SSLv2 is
very sensible because SSLv2 is so bad that it can be used to attack RSA
keys and sites with the same name even if they are on entirely
different servers.  https://drownattack.com/  

If SSLv2 is used, An attacker could use a couple of seemingly innocent 
encrypted packets to/from the SMTP server to gain access to the private key and 
attack anything else that is protected by that key.  What were those GET 
requests again?

SSLv3 is "only" weak when used with SMTP.  The POODLE vulnerability is specific 
to HTTP.  May or may not have been applied against SMTP.
https://en.wikipedia.org/wiki/POODLE

You will have to balance your choice for compatibility with your 
correspondents, and there is no absolute right or wrong answer.  Sometimes no 
encryption is better than bad encryption.

HTH
--
Yuval Levy, JD, MBA, CFA
Ontario-licensed lawyer


Reply via email to