ietf
[Top] [All Lists]

Re: IETF mail server and SSLv3

2016-03-01 07:39:53
Viktor Dukhovni wrote:

Solarus <solarus(_at_)ultrawaves(_dot_)fr> wrote:

SSLv2 is no longer used or seen by MTA, so we can reasonably drop
it's support.  But cleartext is still more used than SSLv3, so why
would you drop SSLv3 support before forbidding cleartext inbound
and outbound your MTA ?

As I mentioned upthread, SSLv3 is also no longer used.  It makes
to not carry around useless baggage that increases the attack
surface and looks bad in audits.  No additional traffic is
protected by enabling SSLv3, the SSLv3-only MTAs are gone from
the public Internet (O.K. a negligible number may remain, but
this is no longer worth the penalty of keeping SSLv3 around).


This looks like an exxageration of what is not even a problem.


The issue was not about newly adding SSLv3 support to IETF mail
servers ("new baggage"), but about leaving something enabled that
_is_already_there_, has been there for quite a while, and does not
hurt the slightest bit.

You should know pretty well that there is provably ZERO additional
attack surface.  The SSLv3 handshake protocol protection ensures
that two TLS peers will always use TLS when both ends support it.

In the face of active attackers (man-in-the-middle), the attack
will succeed even with TLSv1.2 on both links client<->MitM<->server
due to the complete lack of authentication in SMTP with TLS.


"Looking bad in audits" is due to sending the wrong message and
obviously bogus audit checklists.  It would be preferable to get
the bogus audit checklists fixed, rather than creating an illusion
of security that provably doesn't exist here.

Even the (last) PCI 3.1 compliance standard got it correct in that
pretty much all of the alleged "vulnerabilities" known for SSLv3
and TLSv1.0 are non-practical for most programmatic SSLv3-protected
communication.  And when performing mutual cert-based authentication
the alleged weaknesses become pretty much irrelevant.


-Martin

<Prev in Thread] Current Thread [Next in Thread>