On 12 Oct 2018, at 23:04, Peter wrote:

Issue #1 the use of TLSv1.0.  Unless I'm mistaken the only actual
vulnerability to TLSv1.0 is BEAST, which can be (and likely is)
mitigated client-side, so if your version of openssl mitigates BEAST
then TLSv1.0 should actually be safe to use as a client. Using it as a server will depend on whether or not the connecting client has mitigated
BEAST.

There's also POODLE in some TLS implementations and a weaker set of ciphersuites.

Both known 'name' attacks on TLSv1.0 are logistically challenging to mount and unlikely to ever be aimed at SMTP+TLS traffic and so are a negligible risk, but that overlooks some significant issues:

1. If an implementation can't do better than TLSv1.0, it is old and ill-maintained and has a substantial risk of having unknown or lesser-known vulnerabilities that can't be mitigated by a lenient partner running the latest and greatest implementation.

2. As TLSv1.0 is increasingly abandoned by both TLS implementations and in operational configurations, novel vulnerabilities in the old protocol are more likely to remain covert and hence highly useful, especially if they are less painful to exploit than BEAST or POODLE.

--
Bill Cole

Reply via email to