You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
[[ -n "$STARTTLS_PROTOCOL" ]] && set_grade_cap "T" "STARTTLS is prone to MITM downgrade attacks. A secure TLS upgrade can only be ensured client-side. You should use TLS only (=implicit TLS) rather than STARTTLS as per RFC 8314, for other than SMTP and SIEVE"
22937
+
[[ -n "$STARTTLS_PROTOCOL" ]] && set_grade_cap "T" "STARTTLS is prone to MITM downgrade attacks. A secure TLS upgrade can only be ensured client-side. As per RFC 8314 you should use implicit TLS rather than STARTTLS. For SMTP (port 25) and SIEVE this is not possible."
22938
22938
22939
22939
# TL;DR: STARTTLS connections are inherently insecure. A MITM can always intercept the connection, unless the client checks e.g. the
22940
-
# certificate accordingly. A secure STARTTLS client is the key but we can't test for it. For other than SMTP and SIEVE (there's no implicit TLS port)
22941
-
# you should use implicit TLS as per RFC 8314. Especially e-mail transfer via port 25 is broken and amendments so far are duct tape.
22940
+
# certificate accordingly. A secure STARTTLS client is the key but we can't test for it. Especially e-mail transfer via port 25 is broken
22941
+
# as message delivery is still more important than security. Amendments like DANE and MTA-STS are duct tape and depend on the client.
22942
22942
22943
22943
# Explanation: There are active MitM attacks possible when using STARTTLS like https://github.com/tintinweb/striptls or
22944
22944
# https://github.com/libcrack/starttlsstrip. It depends on the client only whether it can detect such downgrade attack.
22945
22945
# As some SMTP servers are still misconfigured with wrong certificates it's is still common practice for SMTP client MTAs to
22946
22946
# accept those wrong certificates -- delivering e-mails is more important. There is an e-mail submission port 587 but a mail server
22947
22947
# cannot just switch to it and continue to receive mail from everyone. Even if you advertise this via SRV record (RFC 6186).
22948
22948
# TLSA Records/DANE and MTA-STS (RFC-8461) on the server side can help too,
22949
+
#
22950
+
# For other than SMTP on port 25 and port 587 and SIEVE (there's no implicit TLS port) you should use implicit TLS as per RFC 8314.
22951
+
# Instead of port 587 (STARTTLS) implicit TLS on port 465 should be considered.
22949
22952
22950
22953
pr_bold " Rating specs"; out " (not complete) "; outln "SSL Labs's 'SSL Server Rating Guide' (version 2009q from 2020-01-30)"
0 commit comments