Rocksolid Light

News from da outaworlds

mail  files  register  groups  login

Message-ID:  

Give him an evasive answer.


comp / comp.mail.sendmail / Re: OpenSSL 3.4.x supported?

SubjectAuthor
* OpenSSL 3.4.x supported?AMM
+* Re: OpenSSL 3.4.x supported?Claus Aßmann
|`* Re: OpenSSL 3.4.x supported?AMM
| `* Re: OpenSSL 3.4.x supported?Claus Aßmann
|  +* Re: OpenSSL 3.4.x supported?Grant Taylor
|  |`* Re: OpenSSL 3.4.x supported?Claus Aßmann
|  | `- Re: OpenSSL 3.4.x supported?Grant Taylor
|  `* Re: OpenSSL 3.4.x supported?AMM
|   +- Re: OpenSSL 3.4.x supported?Bjørn Mork
|   `- Re: OpenSSL 3.4.x supported?Claus Aßmann
`- Re: OpenSSL 3.4.x supported?HQuest

1
Subject: OpenSSL 3.4.x supported?
From: AMM
Newsgroups: comp.mail.sendmail
Organization: A noiseless patient Spider
Date: Sat, 28 Dec 2024 04:20 UTC
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: anon.amish@gmail.com (AMM)
Newsgroups: comp.mail.sendmail
Subject: OpenSSL 3.4.x supported?
Date: Sat, 28 Dec 2024 09:50:14 +0530
Organization: A noiseless patient Spider
Lines: 19
Message-ID: <vknu9u$4th9$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Sat, 28 Dec 2024 05:20:14 +0100 (CET)
Injection-Info: dont-email.me; posting-host="83c83ff09af82a842540b391bcd2d669";
logging-data="161321"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19BTGVMQXQmjyTuENBlBRB73VgPo8WHZn8="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:1TVzygxOUZhfcVKMwD30nNriJpY=
Content-Language: en-US
View all headers

Hello

I remember that when sendmail 8.18.1 was released in January 2024,
"officially" it supported only OpenSSL 3.0.x (from 3 series).

And there was some issue with OpenSSL 3.1.x and a bug reported was also
filed with OpenSSL. I can not recall what the issue was. I just faintly
remember it.

So just wanted to know, if this is still the case? Is the OpenSSL bug
resolved?

Or can sendmail be used with OpenSSL 3.4.x series safely now?

Please inform.

Thank you

AMM.

Subject: Re: OpenSSL 3.4.x supported?
From: Claus Aßmann
Newsgroups: comp.mail.sendmail
Organization: MGT Consulting
Date: Sat, 28 Dec 2024 05:35 UTC
References: 1
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!news.quux.org!weretis.net!feeder9.news.weretis.net!news.misty.com!.POSTED.veps.esmtp.org!not-for-mail
From: INVALID_NO_CC_REMOVE_IF_YOU_DO_NOT_POST_ml+sendmail(-no-copies-please)@esmtp.org (Claus Aßmann)
Newsgroups: comp.mail.sendmail
Subject: Re: OpenSSL 3.4.x supported?
Date: Sat, 28 Dec 2024 00:35:39 -0500 (EST)
Organization: MGT Consulting
Sender: <ml+sendmail(-no-copies-please)@esmtp.org>
Message-ID: <vko2nb$99d$1@news.misty.com>
References: <vknu9u$4th9$1@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 8bit
Injection-Date: Sat, 28 Dec 2024 05:35:39 -0000 (UTC)
Injection-Info: news.misty.com; posting-host="veps.esmtp.org:155.138.203.148";
logging-data="9517"; mail-complaints-to="abuse@misty.com"
Mail-Copies-To: never
X-Newsreader: trn 4.0-test77 (Sep 1, 2010)
Originator: ca@x2.esmtp.org (Claus Assmann)
View all headers

AMM wrote:

> And there was some issue with OpenSSL 3.1.x and a bug reported was also
> filed with OpenSSL. I can not recall what the issue was. I just faintly

Do you mean
"there is a double-free bug in 3.2.0 related to DANE"
See the openssl-users mailing list or
https://github.com/openssl/openssl/pull/22821

> So just wanted to know, if this is still the case? Is the OpenSSL bug
> resolved?

The bug was resolved.

> Or can sendmail be used with OpenSSL 3.4.x series safely now?

No idea - why don't you give it a try and report back?

--
Note: please read the netiquette before posting. I will almost never
reply to top-postings which include a full copy of the previous
article(s) at the end because it's annoying, shows that the poster
is too lazy to trim his article, and it's wasting the time of all readers.

Subject: Re: OpenSSL 3.4.x supported?
From: HQuest
Newsgroups: comp.mail.sendmail
Organization: novaBBS
Date: Sat, 28 Dec 2024 13:46 UTC
References: 1
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!news.quux.org!news.nk.ca!rocksolid2!i2pn2.org!.POSTED!not-for-mail
From: hquest@hquest.pro.br (HQuest)
Newsgroups: comp.mail.sendmail
Subject: Re: OpenSSL 3.4.x supported?
Date: Sat, 28 Dec 2024 13:46:57 +0000
Organization: novaBBS
Message-ID: <020b825bda9bdfed2e218a9f2570e629@www.novabbs.com>
References: <vknu9u$4th9$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Info: i2pn2.org;
logging-data="865106"; mail-complaints-to="usenet@i2pn2.org";
posting-account="gSdnz2tQQMpN18WMM4rt2FtJBW7lWv7DL3bXcApLdlA";
User-Agent: Rocksolid Light
X-Rslight-Posting-User: 1932cd5cdfc4939182d2446462275a239b9d79e0
X-Rslight-Site: $2y$10$Bn7No.aYGC.Mg7uZZ7xzleZ2a2XtB/yDfJXG.sUEIo/3V2lQnoT1q
X-Spam-Checker-Version: SpamAssassin 4.0.0
View all headers

Works like a champ with 3.4. I was just too lazy to recompile it after
OpenSSL 3.3.

# sendmail-version
Version 8.18.1
Compiled with: ALLOW_255 DANE HAVE_SSL_CTX_dane_enable MAX_TLSA_RR=64
DNSMAP IPV6_FULL LOG MAP_REGEX MATCHGECOS MILTER
MIME7TO8
MIME8TO7 NAMED_BIND NETINET NETINET6 NETUNIX NEWDB=4.8
NIS
PIPELINING SASLv2 SCANF SOCKETMAP STARTTLS TCPWRAPPERS
TLS_EC
TLS_VRFY_PER_CTX USERDB USE_EAI XDEBUG
OS Defines: ADDRCONFIG_IS_BROKEN DNSSEC_TEST HASFCHOWN HASFCHMOD
HASGETDTABLESIZE HAS_GETHOSTBYNAME2 HASINITGROUPS
HASLSTAT
HASNICE HASRANDOM HASRRESVPORT HASSETREGID HASSETREUID
HASSETRLIMIT HASSETSID HASSETVBUF HASURANDOMDEV
HASSTRERROR
HASUNAME HASUNSETENV HASWAITPID IDENTPROTO
NEEDSGETIPNODE
REQUIRES_DIR_FSYNC SFS_VFS USE_DOUBLE_FORK
USE_SIGLONGJMP
Kernel symbols: /boot/vmlinux
Conf file: /etc/mail/submit.cf (default for MSP)
Conf file: /etc/mail/sendmail.cf (default for MTA)
Pid file: /var/run/sendmail.pid (default)
libsm Defines: SM_CONF_LONGLONG SM_CONF_MEMCHR SM_CONF_MSG SM_CONF_SEM
SM_CONF_SIGSETJMP SM_CONF_SHM SM_CONF_SSIZE_T
SM_CONF_STDBOOL_H
SM_CONF_STDDEF_H SM_CONF_SYS_CDEFS_H SM_CONF_UID_GID
DO_NOT_USE_STRCPY SM_HEAP_CHECK SM_OS=sm_os_linux
SM_VA_STD
FFR Defines: _FFR_MTA_STS _FFR_TLS_ALTNAMES _FFR_LOGASIS=1
_FFR_M_ONLY_IPV4
OpenSSL: compiled 0x30300000
OpenSSL: linked 0x30400000

Subject: Re: OpenSSL 3.4.x supported?
From: AMM
Newsgroups: comp.mail.sendmail
Organization: A noiseless patient Spider
Date: Mon, 6 Jan 2025 06:21 UTC
References: 1 2
Path: news.eternal-september.org!eternal-september.org!.POSTED!not-for-mail
From: anon.amish@gmail.com (AMM)
Newsgroups: comp.mail.sendmail
Subject: Re: OpenSSL 3.4.x supported?
Date: Mon, 6 Jan 2025 11:51:31 +0530
Organization: A noiseless patient Spider
Lines: 47
Message-ID: <vlfspb$1g6rm$1@dont-email.me>
References: <vknu9u$4th9$1@dont-email.me> <vko2nb$99d$1@news.misty.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Mon, 06 Jan 2025 07:21:33 +0100 (CET)
Injection-Info: dont-email.me; posting-host="9afea14e0545b0fb5a52087b4bf28d7d";
logging-data="1579894"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+HlUp4AMBcTbUv2HzpyXoj4EQ5sMhMsCI="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:E9kliTnIBbd4WN9OyUQywHXmY7I=
Content-Language: en-US
In-Reply-To: <vko2nb$99d$1@news.misty.com>
View all headers

On 28/12/24 11:05 am, Claus Aßmann wrote:
> AMM wrote:
>
>> And there was some issue with OpenSSL 3.1.x and a bug reported was also
>> filed with OpenSSL. I can not recall what the issue was. I just faintly
>
> Do you mean
> "there is a double-free bug in 3.2.0 related to DANE"
> See the openssl-users mailing list or
> https://github.com/openssl/openssl/pull/22821
>
> The bug was resolved.

Yes that's the one.

>
>> Or can sendmail be used with OpenSSL 3.4.x series safely now?
>
> No idea - why don't you give it a try and report back?

I took the risk and put it (8.18.1) on production server.

All seems to work fine from 2 days. (touchwood)

However I am concerned about this new line in sendmail.cf file.

EOPENSSL_CONF=/etc/mail/sendmail.ossl

In my case this file does not exist.

From 8.18.1 RELEASE NOTES:

Note: OpenSSL 3 loads by default an openssl.cnf file from a location
specified in the library which may cause unwanted behaviour in sendmail.
Hence sendmail sets the environment variable OPENSSL_CONF to
/etc/mail/sendmail.ossl to override the default.

It is not clear what unwanted behaviour can occur if OpenSSL defaults
are used? Didn't sendmail use OpenSSL defaults, earlier too?

Ideally, what setting should be mentioned in /etc/mail/sendmail.ossl?

Thank you

AMM.

Subject: Re: OpenSSL 3.4.x supported?
From: Claus Aßmann
Newsgroups: comp.mail.sendmail
Organization: MGT Consulting
Date: Mon, 6 Jan 2025 16:18 UTC
References: 1 2 3
Path: news.eternal-september.org!eternal-september.org!feeder3.eternal-september.org!news.quux.org!weretis.net!feeder9.news.weretis.net!news.misty.com!.POSTED.veps.esmtp.org!not-for-mail
From: INVALID_NO_CC_REMOVE_IF_YOU_DO_NOT_POST_ml+sendmail(-no-copies-please)@esmtp.org (Claus Aßmann)
Newsgroups: comp.mail.sendmail
Subject: Re: OpenSSL 3.4.x supported?
Date: Mon, 6 Jan 2025 11:18:17 -0500 (EST)
Organization: MGT Consulting
Sender: <ml+sendmail(-no-copies-please)@esmtp.org>
Message-ID: <vlgvo9$k4g$1@news.misty.com>
References: <vknu9u$4th9$1@dont-email.me> <vko2nb$99d$1@news.misty.com> <vlfspb$1g6rm$1@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 8bit
Injection-Date: Mon, 6 Jan 2025 16:18:17 -0000 (UTC)
Injection-Info: news.misty.com; posting-host="veps.esmtp.org:155.138.203.148";
logging-data="20624"; mail-complaints-to="abuse@misty.com"
Mail-Copies-To: never
X-Newsreader: trn 4.0-test77 (Sep 1, 2010)
Originator: ca@x2.esmtp.org (Claus Assmann)
View all headers

AMM wrote:

> EOPENSSL_CONF=/etc/mail/sendmail.ossl

> In my case this file does not exist.

That's the entire idea - as the release notes entry explains:

> Note: OpenSSL 3 loads by default an openssl.cnf file from a location
> specified in the library which may cause unwanted behaviour in sendmail.

> It is not clear what unwanted behaviour can occur if OpenSSL defaults
> are used?

Check the OpenSSL config file / documentation, e.g., wrt
"security level".

> Didn't sendmail use OpenSSL defaults, earlier too?

sendmail never explicitly use{s,d} OpenSSL config files.

> Ideally, what setting should be mentioned in /etc/mail/sendmail.ossl?

None.

--
Note: please read the netiquette before posting. I will almost never
reply to top-postings which include a full copy of the previous
article(s) at the end because it's annoying, shows that the poster
is too lazy to trim his article, and it's wasting the time of all readers.

Subject: Re: OpenSSL 3.4.x supported?
From: Grant Taylor
Newsgroups: comp.mail.sendmail
Organization: TNet Consulting
Date: Tue, 7 Jan 2025 00:31 UTC
References: 1 2 3 4
Path: news.eternal-september.org!eternal-september.org!feeder3.eternal-september.org!tncsrv06.tnetconsulting.net!tncsrv09.home.tnetconsulting.net!.POSTED.omega.home.tnetconsulting.net!not-for-mail
From: gtaylor@tnetconsulting.net (Grant Taylor)
Newsgroups: comp.mail.sendmail
Subject: Re: OpenSSL 3.4.x supported?
Date: Mon, 6 Jan 2025 18:31:40 -0600
Organization: TNet Consulting
Message-ID: <vlhslc$rr3$1@tncsrv09.home.tnetconsulting.net>
References: <vknu9u$4th9$1@dont-email.me> <vko2nb$99d$1@news.misty.com>
<vlfspb$1g6rm$1@dont-email.me> <vlgvo9$k4g$1@news.misty.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Tue, 7 Jan 2025 00:31:40 -0000 (UTC)
Injection-Info: tncsrv09.home.tnetconsulting.net; posting-host="omega.home.tnetconsulting.net:198.18.1.11";
logging-data="28515"; mail-complaints-to="newsmaster@tnetconsulting.net"
User-Agent: Mozilla Thunderbird
Content-Language: en-US
In-Reply-To: <vlgvo9$k4g$1@news.misty.com>
View all headers

On 1/6/25 10:18, Claus Aßmann wrote:
> sendmail never explicitly use{s,d} OpenSSL config files.

Doesn't that mean that Sendmail would be using the defaults in the
OpenSSL on the system?

Which would mean that if the defaults compiled into OpenSSL change, then
Sendmail's behavior might also unexpectedly change.

The thing that comes to mind is the OpenSSL team changing what ciphers /
algorithms / key lengths / etc. are set as the default in the compiled
library.

> None.

If you ever run into a situation where the default changes in a way that
you don't like, you could add / change an entry in the OpenSSL config
file that Sendmail uses thus overriding the then changed default
compiled into the new OpenSSL library.

Networkers call this "nailing the thing a specific way" so that they
aren't surprised if -> when the default changes.

Both OpenSSL and OpenSSH are notorious for chasing security and dropping
legacy things much faster than other things. - I recently had an
OpenSSH update break support for ciphers / algorithms used on old
systems I manage. I had to change how OpenSSH behaved to get back into
the old systems.

--
Grant. . . .

Subject: Re: OpenSSL 3.4.x supported?
From: Claus Aßmann
Newsgroups: comp.mail.sendmail
Organization: MGT Consulting
Date: Tue, 7 Jan 2025 06:28 UTC
References: 1 2 3 4
Path: news.eternal-september.org!eternal-september.org!feeder3.eternal-september.org!news.quux.org!weretis.net!feeder9.news.weretis.net!news.misty.com!.POSTED.veps.esmtp.org!not-for-mail
From: INVALID_NO_CC_REMOVE_IF_YOU_DO_NOT_POST_ml+sendmail(-no-copies-please)@esmtp.org (Claus Aßmann)
Newsgroups: comp.mail.sendmail
Subject: Re: OpenSSL 3.4.x supported?
Date: Tue, 7 Jan 2025 01:28:38 -0500 (EST)
Organization: MGT Consulting
Sender: <ml+sendmail(-no-copies-please)@esmtp.org>
Message-ID: <vlihim$gin$1@news.misty.com>
References: <vknu9u$4th9$1@dont-email.me> <vlfspb$1g6rm$1@dont-email.me> <vlgvo9$k4g$1@news.misty.com> <vlhslc$rr3$1@tncsrv09.home.tnetconsulting.net>
Mime-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 8bit
Injection-Date: Tue, 7 Jan 2025 06:28:38 -0000 (UTC)
Injection-Info: news.misty.com; posting-host="veps.esmtp.org:155.138.203.148";
logging-data="16983"; mail-complaints-to="abuse@misty.com"
Mail-Copies-To: never
X-Newsreader: trn 4.0-test77 (Sep 1, 2010)
Originator: ca@x2.esmtp.org (Claus Assmann)
View all headers

Grant Taylor wrote:

> Which would mean that if the defaults compiled into OpenSSL change, then
> Sendmail's behavior might also unexpectedly change.

If you use different code, then you get different behaviour.
Hence it might be a good idea to read the "change log"
(and hope that all relevant changes are properly documented).

> The thing that comes to mind is the OpenSSL team changing what ciphers /
> algorithms / key lengths / etc. are set as the default in the compiled
> library.

Let's hope the RFCs are followed - after all, this is about
interoperability.

Subject: Re: OpenSSL 3.4.x supported?
From: Grant Taylor
Newsgroups: comp.mail.sendmail
Organization: TNet Consulting
Date: Tue, 7 Jan 2025 22:50 UTC
References: 1 2 3 4 5
Path: news.eternal-september.org!eternal-september.org!feeder3.eternal-september.org!tncsrv06.tnetconsulting.net!tncsrv09.home.tnetconsulting.net!.POSTED.omega.home.tnetconsulting.net!not-for-mail
From: gtaylor@tnetconsulting.net (Grant Taylor)
Newsgroups: comp.mail.sendmail
Subject: Re: OpenSSL 3.4.x supported?
Date: Tue, 7 Jan 2025 16:50:25 -0600
Organization: TNet Consulting
Message-ID: <vlkb3h$mc0$1@tncsrv09.home.tnetconsulting.net>
References: <vknu9u$4th9$1@dont-email.me> <vlfspb$1g6rm$1@dont-email.me>
<vlgvo9$k4g$1@news.misty.com> <vlhslc$rr3$1@tncsrv09.home.tnetconsulting.net>
<vlihim$gin$1@news.misty.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Tue, 7 Jan 2025 22:50:25 -0000 (UTC)
Injection-Info: tncsrv09.home.tnetconsulting.net; posting-host="omega.home.tnetconsulting.net:198.18.1.11";
logging-data="22912"; mail-complaints-to="newsmaster@tnetconsulting.net"
User-Agent: Mozilla Thunderbird
Content-Language: en-US
In-Reply-To: <vlihim$gin$1@news.misty.com>
View all headers

On 1/7/25 00:28, Claus Aßmann wrote:
> Let's hope the RFCs are followed - after all, this is about
> interoperability.

Sadly, I suspect that the OpenSSL and OpenSSH developers are some of the
first to violate /old/ RFCs by not including what they deem to be
deprecated. Thus new won't interoperate with old equipment.

Take a look at the following:

Link - OpenSSH: Legacy Options
- https://www.openssh.com/legacy.html

There are ciphers that used to be enabled that have been disabled in the
default / complied in configuration (as in /etc/ssh/sshd.conf) that can
be re-enabled with a config file.

I've seen similar with OpenSSL.

So old RFCs are willfully and wantonly violated in the name of security
progress.

I don't blame the OpenSSL / OpenSSH developers for what they are doing.
I do dislike what they are doing when it comes to still supporting retro
things.

I just experienced a problem where I had to alter a compile time option
for OpenSSH (client) to be able to log into an old Fibre Channel switch
and ancient Unix server. It changed in a point minor point release.

Things are constantly moving forward. So sometimes it's best to
*EXPLICITLY* specify what you want a given program to do. E.g. the
value in the EOPENSSL_CONF file. ;-)

--
Grant. . . .

Subject: Re: OpenSSL 3.4.x supported?
From: AMM
Newsgroups: comp.mail.sendmail
Organization: A noiseless patient Spider
Date: Wed, 8 Jan 2025 08:39 UTC
References: 1 2 3 4
Path: news.eternal-september.org!eternal-september.org!.POSTED!not-for-mail
From: anon.amish@gmail.com (AMM)
Newsgroups: comp.mail.sendmail
Subject: Re: OpenSSL 3.4.x supported?
Date: Wed, 8 Jan 2025 14:09:28 +0530
Organization: A noiseless patient Spider
Lines: 43
Message-ID: <vlldk0$2msmi$1@dont-email.me>
References: <vknu9u$4th9$1@dont-email.me> <vko2nb$99d$1@news.misty.com>
<vlfspb$1g6rm$1@dont-email.me> <vlgvo9$k4g$1@news.misty.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Wed, 08 Jan 2025 09:39:29 +0100 (CET)
Injection-Info: dont-email.me; posting-host="6cc6d0214091747ad99805ca8ba099ae";
logging-data="2847442"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19elpMz6kSzvYfyeaVzBQSS8WrkiD1ZSc4="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:3829mFBV+tHYMoJ2n8hPP2TGnEE=
Content-Language: en-US
In-Reply-To: <vlgvo9$k4g$1@news.misty.com>
View all headers

On 06/01/25 9:48 pm, Claus Aßmann wrote:
> AMM wrote:
>
>> EOPENSSL_CONF=/etc/mail/sendmail.ossl
>
>> In my case this file does not exist.
>
> That's the entire idea - as the release notes entry explains:
>
>> Note: OpenSSL 3 loads by default an openssl.cnf file from a location
>> specified in the library which may cause unwanted behaviour in sendmail.
>
>> It is not clear what unwanted behaviour can occur if OpenSSL defaults
>> are used?
>
> Check the OpenSSL config file / documentation, e.g., wrt
> "security level".

Thank you for your response. However, it is still not clear what
unwanted behaviour can occur? If you can explain, then please do.

>
>> Didn't sendmail use OpenSSL defaults, earlier too?
>
> sendmail never explicitly use{s,d} OpenSSL config files.
>
>> Ideally, what setting should be mentioned in /etc/mail/sendmail.ossl?

Currently I have this in sendmail.mc file: (using from few years)

dnl # recommended from https://weakdh.org/sysadmin.html
LOCAL_CONFIG
O
CipherList=ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:AES:CAMELLIA:DES-CBC3-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!aECDH:!EDH-DSS-DES-CBC3-SHA:!EDH-RSA-DES-CBC3-SHA:!KRB5-DES-CBC3-SHA
O DHParameters=/etc/ssl/dhparams.pem
O ServerSSLOptions=+SSL_OP_CIPHER_SERVER_PREFERENCE

Hopefully this is what is sufficient.

Regards

AMM.

Subject: Re: OpenSSL 3.4.x supported?
From: Bjørn Mork
Newsgroups: comp.mail.sendmail
Organization: m
Date: Wed, 8 Jan 2025 12:52 UTC
References: 1 2 3 4 5
Path: news.eternal-september.org!eternal-september.org!.POSTED!not-for-mail
From: bjorn@mork.no (Bjørn Mork)
Newsgroups: comp.mail.sendmail
Subject: Re: OpenSSL 3.4.x supported?
Date: Wed, 08 Jan 2025 13:52:04 +0100
Organization: m
Lines: 13
Message-ID: <87o70hqxhn.fsf@miraculix.mork.no>
References: <vknu9u$4th9$1@dont-email.me> <vko2nb$99d$1@news.misty.com>
<vlfspb$1g6rm$1@dont-email.me> <vlgvo9$k4g$1@news.misty.com>
<vlldk0$2msmi$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 8bit
Injection-Date: Wed, 08 Jan 2025 13:52:05 +0100 (CET)
Injection-Info: dont-email.me; posting-host="051d3de4a0a99d8b976749a9e3c48162";
logging-data="2934286"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/ei86ybnSWLA5eFB24kflh"
User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/28.2 (gnu/linux)
Cancel-Lock: sha1:QBFCfX/cXtqYBh3t9XUAl9SvLBk=
sha1:/EgCoK8TRlT9YybxiOhdZ7EEhqQ=
View all headers

AMM <anon.amish@gmail.com> writes:

> LOCAL_CONFIG
> O
> CipherList=ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:AES:CAMELLIA:DES-CBC3-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!aECDH:!EDH-DSS-DES-CBC3-SHA:!EDH-RSA-DES-CBC3-SHA:!KRB5-DES-CBC3-SHA
> O DHParameters=/etc/ssl/dhparams.pem
> O ServerSSLOptions=+SSL_OP_CIPHER_SERVER_PREFERENCE

Doesn't matter, I guess. But you can also set those options by defining
confCIPHER_LIST, confDH_PARAMETERS and confSERVER_SSL_OPTIONS

Bjørn

Subject: Re: OpenSSL 3.4.x supported?
From: Claus Aßmann
Newsgroups: comp.mail.sendmail
Organization: MGT Consulting
Date: Wed, 8 Jan 2025 17:00 UTC
References: 1 2 3 4
Path: news.eternal-september.org!eternal-september.org!feeder3.eternal-september.org!news.quux.org!weretis.net!feeder9.news.weretis.net!news.misty.com!.POSTED.veps.esmtp.org!not-for-mail
From: INVALID_NO_CC_REMOVE_IF_YOU_DO_NOT_POST_ml+sendmail(-no-copies-please)@esmtp.org (Claus Aßmann)
Newsgroups: comp.mail.sendmail
Subject: Re: OpenSSL 3.4.x supported?
Date: Wed, 8 Jan 2025 12:00:16 -0500 (EST)
Organization: MGT Consulting
Sender: <ml+sendmail(-no-copies-please)@esmtp.org>
Message-ID: <vlmav0$443$1@news.misty.com>
References: <vknu9u$4th9$1@dont-email.me> <vlfspb$1g6rm$1@dont-email.me> <vlgvo9$k4g$1@news.misty.com> <vlldk0$2msmi$1@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 8bit
Injection-Date: Wed, 8 Jan 2025 17:00:16 -0000 (UTC)
Injection-Info: news.misty.com; posting-host="veps.esmtp.org:155.138.203.148";
logging-data="4227"; mail-complaints-to="abuse@misty.com"
Mail-Copies-To: never
X-Newsreader: trn 4.0-test77 (Sep 1, 2010)
Originator: ca@x2.esmtp.org (Claus Assmann)
View all headers

AMM wrote:

> > Check the OpenSSL config file / documentation, e.g., wrt
> > "security level".

> Thank you for your response. However, it is still not clear what
> unwanted behaviour can occur? If you can explain, then please do.

Quoting the release notes:
* The default SSL/TLS security level has been changed from 1 to 2. RSA,
DSA and DH keys of 1024 bits and above and less than 2048 bits and ECC keys
of 160 bits and above and less than 224 bits were previously accepted by
default but are now no longer allowed. By default TLS compression was
already disabled in previous OpenSSL versions. At security level 2 it cannot
be enabled.

This might be useful for other applications, but not for SMTP
- it may break using STARTTLS with other MTAs.

> Currently I have this in sendmail.mc file: (using from few years)

> CipherList= ...

Why do you have that list?
"What's the problem you are trying to solve?"

BTW: Setting CipherList has NO effect when using TLSv1.3
(OpenSSL).

--
Note: please read the netiquette before posting. I will almost never
reply to top-postings which include a full copy of the previous
article(s) at the end because it's annoying, shows that the poster
is too lazy to trim his article, and it's wasting the time of all readers.

1

rocksolid light 0.9.8
clearnet tor