On Sat, Oct 13, 2018 at 12:12:21PM -0400, Bill Cole wrote:
> 2. As TLSv1.0 is increasingly abandoned by both TLS implementations and
> in operational configurations, novel vulnerabilities in the old protocol
> are more likely to remain covert and hence highly useful, especially if
> they are less painful to exploit than BEAST or POODLE.
That's all nice in theory, but if I disabled TLS 1.0, I'd have some
issues receiving messages from this list and the krbdev list. My
logs since Sep 27 show non-trivial TLSv1 message counts:
190 cloud9.net
22 mit.edu
...
As yet, I see no compelling reason to disable TLS 1.0 in SMTP. What
you can and should now disable is SSLv2 and SSLv3, which Postfix
now disables by default.
--
Viktor.