- Sponsor
-
Notifications
You must be signed in to change notification settings - Fork 837
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
TLS1.1 should now be OPT-IN instead of OPT-OUT #1077
Comments
AFAIK:
My understanding is also that the vast majority of software that supports TLS v1.1 also supports TLS v1.2, so I probably can safely disable TLS v1.1 by default. Are you aware of any TLS v1.1 vulnerabilities that I did not list above or any info that suggests my understanding is incorrect? I'm leaning towards disabling TLS v1.1 no matter what, but if you have a link to some official docs that provide a "deprecate TLS v1.1 by such-and-such a date", that would be super helpful in that it would allow me to point anyone who complains to some official docs. (When I disabled TLS v1.0 and SSL v3.0, I got some angry emails... let me tell you). |
Hi Jeffrey, All of the major players have already switched to opt-in by default: IETF: https://tools.ietf.org/id/draft-ietf-tls-oldversions-deprecate-06.html#rfc.section.5 Chrome: https://www.chromestatus.com/feature/5759116003770368 MS Edge: https://blogs.windows.com/msedgedev/2020/03/31/tls-1-0-tls-1-1-schedule-update-edge-ie11/ As you know, you'll get those angry emails no matter what so it might as well be for securing their environment :) ha |
Thanks! |
Currently as of v2.9.0 MailKit default supports TLS1.1 and above. The default should now be to default to TLS1.2 and above and OPT-IN to unsecure TLS versions.
TLS1.1 is now obsolete and deprecated and has the same major vulns. as TLS1.0 (POODLE, Heartbleed, etc.). TLS1.1 only added one mitigation from TLS1.0 (cipher-block chaining attacks).
As you know, if it's working most users won't take the time to OPT-OUT via
SslProtocols
- but this is dangerous considering what passes through email and the MITM attacks that can take place.Thank you for the work on MailKit & MimeKit!
The text was updated successfully, but these errors were encountered: