Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

TLS1.1 should now be OPT-IN instead of OPT-OUT #1077

Closed
user8446 opened this issue Sep 18, 2020 · 3 comments
Closed

TLS1.1 should now be OPT-IN instead of OPT-OUT #1077

user8446 opened this issue Sep 18, 2020 · 3 comments
Labels
enhancement New feature or request

Comments

@user8446
Copy link

user8446 commented Sep 18, 2020

Currently as of v2.9.0 MailKit default supports TLS1.1 and above. The default should now be to default to TLS1.2 and above and OPT-IN to unsecure TLS versions.

TLS1.1 is now obsolete and deprecated and has the same major vulns. as TLS1.0 (POODLE, Heartbleed, etc.). TLS1.1 only added one mitigation from TLS1.0 (cipher-block chaining attacks).

As you know, if it's working most users won't take the time to OPT-OUT via SslProtocols - but this is dangerous considering what passes through email and the MITM attacks that can take place.

Thank you for the work on MailKit & MimeKit!

@jstedfast
Copy link
Owner

AFAIK:

  • HEARTBLEED was a vulnerability that only affected the OpenSSL implementation. GnuTLS, for example, was not vulnerable.
  • POODLE was a vulnerability in the protocol itself (not implementation dependent) and did affect SSL v3.0.
  • BEAST was the cipher block chaining vulnerability that you are probably thinking of and it only affected TLS v1.0.
  • CRIME was a TLS vulnerability in the compression algorithm negotiation and affected TLS v1.0, v1.1, and v1.2 but I think it's something that has been worked around by all of the major software implementations.

My understanding is also that the vast majority of software that supports TLS v1.1 also supports TLS v1.2, so I probably can safely disable TLS v1.1 by default.

Are you aware of any TLS v1.1 vulnerabilities that I did not list above or any info that suggests my understanding is incorrect?

I'm leaning towards disabling TLS v1.1 no matter what, but if you have a link to some official docs that provide a "deprecate TLS v1.1 by such-and-such a date", that would be super helpful in that it would allow me to point anyone who complains to some official docs. (When I disabled TLS v1.0 and SSL v3.0, I got some angry emails... let me tell you).

@jstedfast
Copy link
Owner

Thanks!

jstedfast added a commit that referenced this issue Sep 23, 2020
@jstedfast jstedfast added the enhancement New feature or request label Sep 23, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

2 participants