Jaroslaw Rafa wrote in
 <20230318203334.ga31...@rafa.eu.org>:
 |Dnia 18.03.2023 o godz. 21:08:17 Steffen Nurpmeso via Postfix-users pisze:
 |> I still have no problems with
 |> 
 |>   smtpd_tls_mandatory_protocols = >=TLSv1.2
 |>   smtpd_tls_protocols = $smtpd_tls_mandatory_protocols
 |>   # super modern, forward secrecy TLSv1.2 / TLSv1.3 selection..
 |>   tls_high_cipherlist = EECDH+AESGCM:EECDH+AES256:EDH+AESGCM:CHACHA20
 |>   smtpd_tls_mandatory_ciphers = high
 |> 
 |> Neither for lighttpd nor for postfix.
 |
 |First, we should not mix HTTP(S) with SMTP, these are two completely
 |different things. While as strict TLS security as possible in the web
 |browsing is essential (think about various highly private data you are
 |transmitting eg. when doing online shopping or banking), it has much less

Eh, no.  I do not do either.  (Granted i use PayPal one, two times
a month, but my bank account is not online-enabled.)
I _never_ shopped online.  This destroys local pharmacies, shops,
small (hopefully) good jobs that sometimes exist for centuries.
Western world cities have become faceless culture-free concrete
djungles with McDonald's smell for kilometres.  No.

 |meaning in email, due to nature of TLS in email being opportunistic, that
 |means, if servers can't negotiate TLS connection, they fall back to
 |plaintext (unencrypted), because mail must be delivered anyway.
 |
 |As mail can go through various intermediate servers over which you have no
 |control, and can be stored on them for a period of time over which you have
 |no control, if anything highly sensitive is sent via email, it should be
 |end-to-end encrypted anyway, using applications like gpg or similar, \
 |and not
 |rely on transport encryption.
 |
 |Second, most web browsers nowadays (as well as mail clients) support TLS
 |v1.2 since long time, so it's of course very little probability that \
 |someone
 |who uses so outdated browser that it doesn't support TLS v1.2 will try to
 |access your website, *and*: a) either that person will complain to you, or
 |b) you will notice it in your httpd logs.

Sorry i do not understand a word.  Long time TLSv1.2, yes.

 |Third, there are still quite a few mail *servers* that don't support TLS
 |v1.2. In that case, they will fall back to plaintext when sending mail to
 |your server. Do you analyze your logs for such cases?

I have looked once i switched.  I noted a rush of lower
connections once i posted the above last.  Even the GNU server now
uses more modern things, as it gets through.  I do not know one.

 |When I occasionally browse my Postfix logs, I notice one particular server
 |(from which I receive mail quite often) that can negotiate only TLS v1
 |connection with my server. So if I would require TLS>=1.2 on my server, \
 |that
 |server would fall back to plaintext to send mail to me. I think that TLS v1
 |is still better security than no encryption at all ;)

For _me_ it works in practice and there is no fallout.  I get
anything i need / expect.  If you have to take care for some elder
servers then this is surely a problem you have to solve,
especially if it is your business.

In general people update OpenSSL / crypto library of choice, aka
install their distribution's security updates, in which case all
is well out of the box (and likely would be for some years).

The only problem i currently have is

  Mar 18 22:24:53 postfix/smtpd[26025]: warning: run-time library vs. 
compile-time header version mismatch: OpenSSL 3.1.0 may not be compatible with 
OpenSSL 3.0.0

i hope AlpineLinux recompiles some OpenSSL-linked software so we
get rid of that.


--steffen
|
|Der Kragenbaer,                The moon bear,
|der holt sich munter           he cheerfully and one by one
|einen nach dem anderen runter  wa.ks himself off
|(By Robert Gernhardt)
_______________________________________________
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org

Reply via email to