Re: Are sha1 & TLSv1 fully deprecated wrt mail, and time to block them?

2018-10-15 Thread curtis
October 15 2018 11:19 AM, "Kris Deugau"  wrote:
> Laura Smith wrote:
> 
>> Honestly, you are most likely wasting your time on that point because all 
>> that you are likely to
>> get back is a page of waffle saying "blah blah blah ... security reasons... 
>> blah blah blah"
>>> I know this because a sysadmin ex-colleague was having problems creating 
>>> accounts with a FinCo
>> using delimiters (e.g. nam...@example.com). FinCo's filters were rejecting 
>> this because it was
>> "invalid".
>>> Said individual wrote a carefully worded long letter to C-suite execs at 
>>> FinCo, also taking the
>> time to attach copies of RFCs referred to in the letter so they would not 
>> have to look them up.
>>> A couple of weeks later, a reply arrived in the post ... "blah blah blah 
>>> ... security reasons...
>> blah blah blah... we know better... blah blah blah"
>>> So the moral of this story is, unless you have friends working for FinCo, 
>>> don't bother trying to
>> engage them on how they could improve client service by fixing their IT 
>> infrastructure. They are
>> unlikely to listen.
> 
> When I come across a site that won't accept a "foo+bar" username part for the 
> email, I roll my eyes
> and use "foo_bar" instead. Thanks Wietse, for adding support for multiple 
> different characters in
> recipient_delimiter!
> 
> (I used to do this anyway when my personal server was running sendmail, but 
> there I had to add yet
> another entry in virtusertable each time.)
> 
> Of course, sometimes you don't find out that "foo+bar" isn't supported until 
> you notice curious
> lack of email from the site... since their form doesn't validate as tightly 
> as their mail system.
> Or sometimes the login page is the picky one.
> 
> -kgd


Looks to me like something that wants to be escaped.  I'm thinking that if it's 
a scripting language trying to accept the connection, it might see the plus 
sign and try to do math on it.  After all amavisd is written in Perl.  

--cjm


Re: Are sha1 & TLSv1 fully deprecated wrt mail, and time to block them?

2018-10-15 Thread Kris Deugau

Laura Smith wrote:

Honestly, you are most likely wasting your time on that point because all that you are 
likely to get back is a page of waffle saying "blah blah blah ... security 
reasons... blah blah blah"

I know this because a sysadmin ex-colleague was having problems creating accounts with a 
FinCo using delimiters (e.g. nam...@example.com).   FinCo's filters were rejecting this 
because it was "invalid".

Said individual wrote a carefully worded long letter to C-suite execs at FinCo, 
also taking the time to attach copies of RFCs referred to in the letter so they 
would not have to look them up.

A couple of weeks later, a reply arrived in the post ... "blah blah blah ... 
security reasons... blah blah blah... we know better... blah blah blah"

So the moral of this story is, unless you have friends working for FinCo, don't 
bother trying to engage them on how they could improve client service by fixing 
their IT infrastructure. They are unlikely to listen.


When I come across a site that won't accept a "foo+bar" username part 
for the email, I roll my eyes and use "foo_bar" instead.  Thanks Wietse, 
for adding support for multiple different characters in recipient_delimiter!


(I used to do this anyway when my personal server was running sendmail, 
but there I had to add yet another entry in virtusertable each time.)


Of course, sometimes you don't find out that "foo+bar" isn't supported 
until you notice curious lack of email from the site...  since their 
form doesn't validate as tightly as their mail system.  Or sometimes the 
login page is the picky one.


-kgd


Re: Are sha1 & TLSv1 fully deprecated wrt mail, and time to block them?

2018-10-13 Thread pg151



On Sat, Oct 13, 2018, at 10:41 AM, Viktor Dukhovni wrote:
> As yet, I see no compelling reason to disable TLS 1.0 in SMTP. 

Noted.

> What you can and should now disable is SSLv2 and SSLv3, which Postfix
> now disables by default.

Already done.

Ironically, FinCo's online 'security/privacy' missive crows about their 
commitment to ensuring "Email Security", their commitment to protecting their 
websites with "SSL3", and that users should look for "SSL Secured (128 Bit)." 
in their cert info.

Sigh. Whatchagonnado?


Re: Are sha1 & TLSv1 fully deprecated wrt mail, and time to block them?

2018-10-13 Thread Viktor Dukhovni
On Sat, Oct 13, 2018 at 12:12:21PM -0400, Bill Cole wrote:

> 2. As TLSv1.0 is increasingly abandoned by both TLS implementations and 
> in operational configurations, novel vulnerabilities in the old protocol 
> are more likely to remain covert and hence highly useful, especially if 
> they are less painful to exploit than BEAST or POODLE.

That's all nice in theory, but if I disabled TLS 1.0, I'd have some
issues receiving messages from this list and the krbdev list.  My
logs since Sep 27 show non-trivial TLSv1 message counts:

  190 cloud9.net
   22 mit.edu
  ...

As yet, I see no compelling reason to disable TLS 1.0 in SMTP.  What
you can and should now disable is SSLv2 and SSLv3, which Postfix
now disables by default.

--
Viktor.


Re: Are sha1 & TLSv1 fully deprecated wrt mail, and time to block them?

2018-10-13 Thread Bill Cole

On 12 Oct 2018, at 23:04, Peter wrote:


Issue #1 the use of TLSv1.0.  Unless I'm mistaken the only actual
vulnerability to TLSv1.0 is BEAST, which can be (and likely is)
mitigated client-side, so if your version of openssl mitigates BEAST
then TLSv1.0 should actually be safe to use as a client.  Using it as 
a
server will depend on whether or not the connecting client has 
mitigated

BEAST.


There's also POODLE in some TLS implementations and a weaker set of 
ciphersuites.


Both known 'name' attacks on TLSv1.0 are logistically challenging to 
mount and unlikely to ever be aimed at SMTP+TLS traffic and so are a 
negligible risk, but that overlooks some significant issues:


1. If an implementation can't do better than TLSv1.0, it is old and 
ill-maintained and has a substantial risk of having unknown or 
lesser-known vulnerabilities that can't be mitigated by a lenient 
partner running the latest and greatest implementation.


2. As TLSv1.0 is increasingly abandoned by both TLS implementations and 
in operational configurations, novel vulnerabilities in the old protocol 
are more likely to remain covert and hence highly useful, especially if 
they are less painful to exploit than BEAST or POODLE.


--
Bill Cole


Re: Are sha1 & TLSv1 fully deprecated wrt mail, and time to block them?

2018-10-13 Thread Christian Kivalo



On October 13, 2018 5:32:54 PM GMT+02:00, Gary  wrote:
>
>https://support.google.com/mail/answer/81126?hl=en
>
>Look at "authenticate your mail" in the above link. Gmail required 1024
>bits. Google market dominance makes it a defacto standard. 

They require to use at least 1024 bits keys for dkim signatures, more bits are 
good and accepted. 
-- 
Christian Kivalo


Re: Are sha1 & TLSv1 fully deprecated wrt mail, and time to block them?

2018-10-13 Thread pg151
On Sat, Oct 13, 2018, at 8:32 AM, Gary wrote:
> Look at "authenticate your mail" in the above link. Gmail required 1024 
> bits. Google market dominance makes it a defacto standard. 

In this case, yes, that's a helpful reference to point folks at.

Generally, I don't accept/agree in the slightest that _because_ Google (or 
Facebook, Microsoft, Apple, etc etc) 'does it' it's necessarily correct, good, 
or even close to implying a 'standard'.

At best, it makes it 'currently used a lot' ...

For mail/security, I place _much_ more weight on what's done in/by Postfix & 
Openssl projects.


Re: Are sha1 & TLSv1 fully deprecated wrt mail, and time to block them?

2018-10-13 Thread Bill Cole

On 13 Oct 2018, at 0:33, Bill Cole wrote:

 TLSv1.0 with decent ciphers is unequivocally better than cleartext 
transport, and most people do not have email worth the effort of 
cracking TLSv1.0 to anyone capable of doing so.


CLARIFYING:

There's nothing (yet) known that makes all implementations and useful 
configurations of TLSv1.0 vulnerable to a sufficiently motivated, 
skilled, and resourced attacker. The risk is that if you choose to 
support TLSv1.0 to accommodate bozos, you may find yourself forced to 
accommodate vulnerable implementations and configurations (e.g. CBC mode 
ciphers, vulnerable types of renegotiation) and forego some stronger 
ciphersuites for TLSv1.0 sessions. Every TLSv1.0 session isn't 
vulnerable today, maybe none that you allow are, and maybe recorded 
sessions won't be any more vulnerable in a decade. However, a session 
using TLSv1.3 with a stronger ciphersuite than TLSv1.0 supports carries 
a lower risk in those 'maybes.'


--
Bill Cole


Re: Are sha1 & TLSv1 fully deprecated wrt mail, and time to block them?

2018-10-13 Thread Gary

https://support.google.com/mail/answer/81126?hl=en

Look at "authenticate your mail" in the above link. Gmail required 1024 bits. 
Google market dominance makes it a defacto standard. 

  Original Message  
From: pg...@dev-mail.net
Sent: October 13, 2018 7:40 AM
To: postfix-users@postfix.org
Subject: Re: Are sha1 & TLSv1 fully deprecated wrt mail, and time to block them?

I appreciate the comments on this.

Boils down to:

> ... moral of this story is 

in no particular order,

**    'Best/current Practice' _is_ better than sha1/dkim & TLSv1
**    FinCo's lazy & sloppy, not worth rejecting, but I can flag & watch
**    I've checked my ~12 month logs; FinCo represents ~ 95% of accepted/legit 
mail that's both sha1/dkim & TLSv1
**    I'll send one letter to FinCo's CIO/CSO offices.  I expect no change, but 
it'll make me 'feel better'.
**    I've confirmed that < 1024 bit sigs are not accepted at all 
**    for now, my TLS policy stays at ="may"

and get back to more useful work.

thanks all.

Re: Are sha1 & TLSv1 fully deprecated wrt mail, and time to block them?

2018-10-13 Thread pg151
I appreciate the comments on this.

Boils down to:

> ... moral of this story is 

in no particular order,

 **'Best/current Practice' _is_ better than sha1/dkim & TLSv1
 **FinCo's lazy & sloppy, not worth rejecting, but I can flag & watch
 **I've checked my ~12 month logs; FinCo represents ~ 95% of accepted/legit 
mail that's both sha1/dkim & TLSv1
 **I'll send one letter to FinCo's CIO/CSO offices.  I expect no change, 
but it'll make me 'feel better'.
 **I've confirmed that < 1024 bit sigs are not accepted at all 
 **for now, my TLS policy stays at ="may"

and get back to more useful work.

thanks all.



Re: Are sha1 & TLSv1 fully deprecated wrt mail, and time to block them?

2018-10-13 Thread Laura Smith


On Saturday, October 13, 2018 2:02 AM,  wrote:

> My suspicion is that this is NOT rising to "nuke the basatards" >smtp 
> response, and that I should figure out how to get the >attention of the right 
> persons (NOT 'customer service') at FinCo. >TBH, how to make that contact is 
> beyond me; public shaming on >Twitter might be an option ;-)


Honestly, you are most likely wasting your time on that point because all that 
you are likely to get back is a page of waffle saying "blah blah blah ... 
security reasons... blah blah blah"

I know this because a sysadmin ex-colleague was having problems creating 
accounts with a FinCo using delimiters (e.g. nam...@example.com).   FinCo's 
filters were rejecting this because it was "invalid".

Said individual wrote a carefully worded long letter to C-suite execs at FinCo, 
also taking the time to attach copies of RFCs referred to in the letter so they 
would not have to look them up.

A couple of weeks later, a reply arrived in the post ... "blah blah blah ... 
security reasons... blah blah blah... we know better... blah blah blah"

So the moral of this story is, unless you have friends working for FinCo, don't 
bother trying to engage them on how they could improve client service by fixing 
their IT infrastructure. They are unlikely to listen.




Re: Are sha1 & TLSv1 fully deprecated wrt mail, and time to block them?

2018-10-12 Thread Scott Kitterman
On Friday, October 12, 2018 06:02:40 PM pg...@dev-mail.net wrote:
> > RFC 8301 removes rsa-sha1 from DKIM, so "FinCo" isn't wrong to consider
> > the signature invalid.  It's a bit aggressive for my taste, be it's the
> > receivers call.  The most I might do is ignore the signature.  It's
> > definitely not a reason to block the message.
> 
> Thanks for the relevant rfc.
> 
> I tend to agree.
> 
> I may have been unlcear -- it's my server receiving emails from the errant
> FinCo, dkim-signed with sha1 sigs.  So up to me to determine if they are
> 'putting clients at risk' by being lazy about their security, and blocking
> their messages.
> 
> Simply, IMO, FinCo's admins are being lazy/sloppy.  They _should_ know & do
> better.  (This really is a BIG organization; personally, I'd be embarrassed
> ...)
> 
> My suspicion is that this is NOT rising to "nuke the basatards" smtp
> response, and that I should figure out how to get the attention of the
> right persons (NOT 'customer service') at FinCo.  TBH, how to make that
> contact is beyond me; public shaming on Twitter might be an option ;-)
> 
> That's for DKIM.

To amplify a bit:

RFC 8301 changed two security properties relative to DKIM:

1.  Removed rsa-sha1 from the algorithm set (later replaced by Ed25519-sha256 
in another RFC).

2.  Bumped the minimum acceptable RSA key sized to 1024 bits (with 2048 
recommended).

The latter change is operationally much more important today (it's at least 5 
years late).  Not accepting DKIM signatures based on RSA keys < 1024 bits is 
something everyone should be doing and there are risks in not doing so.

The removal of rsa-sha1 was done ahead of it being broken for this use case 
(on the theory it's better disuse in advance of the need to panic over it).

Scott K


Re: Are sha1 & TLSv1 fully deprecated wrt mail, and time to block them?

2018-10-12 Thread Bill Cole

On 12 Oct 2018, at 21:02, pg...@dev-mail.net wrote:


Same question remains, and I suspect with a similar answer, re: TLSv1.


There's no reason for negotiating a TLSv1.0 session with a partner 
capable of doing better other than being lazy, cheap, and/or generally 
careless.


There are much better reasons to accept TLSv1.0 sessions from partners 
incapable of doing anything better. If you are not willing to refuse 
attempts to pass mail unencrypted and lose mail as a result, TLSv1.0 may 
be your only option to get mail from some senders. TLSv1.0 with decent 
ciphers is unequivocally better than cleartext transport, and most 
people do not have email worth the effort of cracking TLSv1.0 to anyone 
capable of doing so.


So, while FinCo definitely should be doing better, you probably wouldn't 
be doing anyone a service by refusing to accommodate their incompetence.


--
Bill Cole
b...@scconsult.com or billc...@apache.org
(AKA @grumpybozo and many *@billmail.scconsult.com addresses)
Currently Seeking Steadier Work: https://linkedin.com/in/billcole


Re: Are sha1 & TLSv1 fully deprecated wrt mail, and time to block them?

2018-10-12 Thread Peter
On 13/10/18 14:02, pg...@dev-mail.net wrote:
> I may have been unlcear -- it's my server receiving emails from the
> errant FinCo, dkim-signed with sha1 sigs.  So up to me to determine
> if they are 'putting clients at risk' by being lazy about their
> security, and blocking their messages.
You're presenting two different issues here, let's look at each one
separately:

Issue #1 the use of TLSv1.0.  Unless I'm mistaken the only actual
vulnerability to TLSv1.0 is BEAST, which can be (and likely is)
mitigated client-side, so if your version of openssl mitigates BEAST
then TLSv1.0 should actually be safe to use as a client.  Using it as a
server will depend on whether or not the connecting client has mitigated
BEAST.

That said, when making public connections on port 25, the recommended
setting for smtp[d]_tls_security_level is "may", because if you set it
to enforce there are still a number of servers that do not support
encryption at all that you will not be able to communicate with.  So if
you were to limit TLS connections to TLSv1.2 and higher then a TLSv1.0
connection will simply fall back to plain text, and then you're left
with no encryption at all, so ask yourself which is better, broken
encryption, or no encryption and you will see that it's probably best to
go ahead and accept TLSv1.0 connections, even from a financial institution.

As for SHA1, that is a different matter.  Do you accept a DKIM sig
signed with SHA1 or not?  Personally I would just accept it and not
worry about it, but if you're concerned then there are a couple of
options.  You can treat it as unsigned, and accumulate a SPAM score
appropriately, or perhaps you can go part way in-between and give it a
lesser SPAM score than an unsigned message but still give it something.

Anyways, at the end of the day the choice is up to you, and it comes
down to two things to consider:

Is it worth blocking mail from a financial institution in order to gain
marginally better security?

What is the likely hood that a spammer is going to try to brute-force an
SHA1 hash collision in order to send out SPAM?

Good Luck,


Peter


Re: Are sha1 & TLSv1 fully deprecated wrt mail, and time to block them?

2018-10-12 Thread pg151



> RFC 8301 removes rsa-sha1 from DKIM, so "FinCo" isn't wrong to consider 
> the signature invalid.  It's a bit aggressive for my taste, be it's the 
> receivers call.  The most I might do is ignore the signature.  It's 
> definitely not a reason to block the message.

Thanks for the relevant rfc.

I tend to agree.

I may have been unlcear -- it's my server receiving emails from the errant 
FinCo, dkim-signed with sha1 sigs.  So up to me to determine if they are 
'putting clients at risk' by being lazy about their security, and blocking 
their messages.

Simply, IMO, FinCo's admins are being lazy/sloppy.  They _should_ know & do 
better.  (This really is a BIG organization; personally, I'd be embarrassed ...)

My suspicion is that this is NOT rising to "nuke the basatards" smtp response, 
and that I should figure out how to get the attention of the right persons (NOT 
'customer service') at FinCo.  TBH, how to make that contact is beyond me; 
public shaming on Twitter might be an option ;-)

That's for DKIM.

Same question remains, and I suspect with a similar answer, re: TLSv1.



Re: Are sha1 & TLSv1 fully deprecated wrt mail, and time to block them?

2018-10-12 Thread Scott Kitterman



On October 13, 2018 12:06:03 AM UTC, pg...@dev-mail.net wrote:
>1st, this is -- for me -- a postix/mail-RELATED security question.  But
>if it's too general, I'm happy to take it elsewhere; suggestions as to
>the appropriate forum, if not here, are welcome.
>
>A 'major financial institution', call 'em "FinCo", sends email to users
>on my server that arrives with 'invalid' dkim sig,
>
>   dkim=invalid (unsupported algorithm rsa-sha1, 1024-bit rsa key sha1)
>   Fri Oct 12 16:18:05 2018 authentication_milter_mx[7045]  
>   header.d=FINCO.com header.i=@FINCO.com header.b=xx
>   Fri Oct 12 16:18:05 2018 authentication_milter_mx[7045]  
>header.a=rsa-sha1 header.s=mail-dkim;
>
>and negotiates TLSv1
>
>   postfix/postscreen-internal/smtpd[52027]: Anonymous TLS connection
>established from mta11.FINCO.com[xx.xx.xx.xx]: TLSv1 with cipher
>DHE-RSA-AES256-SHA (256/256 bits)
>
>I know that, generally, uses of TLSv1 & sha1 are, at least,
>fish-slap-worthy -- if not downright fully deprecated.
>
>What I don't know is if, in current practice, either is a concern --
>from viewpoint of general security, standards compliance, etc -- for
>*MAIL* security.  Namely, DKIM sig and TLS negotation.
>
>   What *IS* the current recommendation on these?
>
>   IS it time, yet, to block TLSv1 negotation &/or sha1-signed DKIM sigs
>in mail flow?
>
>Applying blanket blocks for either, in Postfix setup, is trivial
>enough.  Just a question for me of wheter it's "safe", or "sensical",
>to do it.

RFC 8301 removes rsa-sha1 from DKIM, so "FinCo" isn't wrong to consider the 
signature invalid.  It's a bit aggressive for my taste, be it's the receivers 
call.  The most I might do is ignore the signature.  It's definitely not a 
reason to block the message.

Scott K