Bug 1885530
Summary: | postfix: Usage of smtp_tls_policy_maps decreases TLS encryption from TLSv1.2 to TLSv1.0 (and weakens cipher drastically) | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Robert Scheck <redhat-bugzilla> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED NOTABUG | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | unspecified | ||
Version: | unspecified | CC: | jskarvad, robert.scheck, tcullum |
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | x86_64 | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2021-10-28 05:09:26 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Robert Scheck
2020-10-06 09:59:37 UTC
Cross-filed case 02770036 at the Red Hat customer portal. It's not related to the smtp_tls_policy_maps, but to the defaults for the mandatory "TLS security level", i.e. if the smtp_tls_security_level is set to the "encrypt", the result will be the same even without the smtp_tls_policy_maps. The defaults can be overridden in the /etc/postfix/main.cf configuration file, e.g.: smtp_tls_mandatory_protocols = !SSLv2, !SSLv3, !TLSv1, !TLSv1.1 It's because DEF_SMTP_TLS_PROTO and DEF_SMTP_TLS_MAND_PROTO differs in the sources, I think it shouldn't differ. The following is in the vanilla sources: #define DEF_SMTP_TLS_PROTO "!SSLv2" #define DEF_SMTP_TLS_MAND_PROTO "SSLv3, TLSv1" Both defaults aren't good according to today's standards, but I think we shouldn't change the defaults for the product near the end of the Maintenance Support 2. Just documenting it should be enough. The workaround is unfortunately not suitable for the (common) situation to allow opportunistic TLS >= v1.0 for general outbound e-mail while using additionally mandatory TLS via smtp_tls_policy_maps for specific targets where the target requests at least TLSv1.2. (In reply to Robert Scheck from comment #5) > The workaround is unfortunately not suitable for the (common) situation to > allow opportunistic TLS >= v1.0 for general outbound e-mail while using > additionally mandatory TLS via smtp_tls_policy_maps for specific targets > where the target requests at least TLSv1.2. Could you please elaborate? AFAIK there is 'smtp_tls_protocols' configuration option for the opportunistic TLS and 'smtp_tls_mandatory_protocols' for the mandatory TLS, i.e. both defaults should be overridable. Unfortunately, real-world scenarios are more complex as the tiny specific reproducer above. The 'smtp_tls_mandatory_protocols = !SSLv2, !SSLv3, !TLSv1, !TLSv1.1' only works, if all mandatory TLS destinations (there are multiple) provide TLSv1.2 support. If this issue really gets a documentation-only thing, then the preferred solution should be to document to set 'smtp_tls_mandatory_protocols = !SSLv2' in order to match a) the defaults of RHEL 7 and because b) it's a less invasive configuration change that still leads to the same result. My personal preference is however 's/#define DEF_SMTP_TLS_MAND_PROTO "SSLv3, TLSv1"/#define DEF_SMTP_TLS_MAND_PROTO "!SSLv2"/' in the source code to do the right thing with a Postfix RPM package update by default. |