Hello Oli,
Good start, but there is room for much more coolness. Using
obsoleted encryption is kind of uncool ;).
Yep, there probably is. If we can get these mailers talking securely
we can always settle on a good default way of doing it.
Me and my fidonet uplink are using binkps with TLS 1.3 for
quite some time now. Beat that! :-P
This is the openssl command I use that you gave me a month or three
ago for the node line..
-pipe "openssl s_client -quiet -alpn binkp -connect *H:*I"
Does that give you a TLS 1.3 session? Is that a good default?
-pipe "openssl s_client -quiet -alpn binkp -connect *H:*I"
Does that give you a TLS 1.3 session? Is that a good default?
That depends on your openssl version and if the remote binkps server supports it. You can test it if you omit the -quiet parameter, like
$ openssl s_client -alpn binkp -connect trmb.ca:24553
(just use it on the command line)
Me and my fidonet uplink are using binkps with TLS 1.3 for
quite some time now. Beat that! :-P
New, TLSv1.2, Cipher is ECDHE-RSA-AES256-GCM-SHA384
Server public key is 2048 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
Protocol : TLSv1.2
Cipher : ECDHE-RSA-AES256-GCM-SHA384
[...]
It seems your TLS reverse proxy and/or your openssl version doesn't support TLS 1.3. What software are you using / which Linux distro?
There is also the -tls1_3 parameter, that enforces TLS 1.3 (if it is
not available, the handshake fails)
$ openssl s_client -alpn binkp -tls1_3 -connect trmb.ca:24553
CONNECTED(00000003)
1996050448:error:1409442E:SSL routines:ssl3_read_bytes:tlsv1 alert protocol
version:../ssl/record/rec_layer_s3.c:1544:SSL alert number 70
[...]
New, TLSv1.2, Cipher is ECDHE-RSA-AES256-GCM-SHA384
Server public key is 2048 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
Protocol : TLSv1.2
Cipher : ECDHE-RSA-AES256-GCM-SHA384
[...]
It seems your TLS reverse proxy and/or your openssl version
doesn't support TLS 1.3. What software are you using / which
Linux distro?
Hmm.. This tls stuff is happening on my BBS linode running Debian 10.
There is also the -tls1_3 parameter, that enforces TLS 1.3 (if
it is not available, the handshake fails)
$ openssl s_client -alpn binkp -tls1_3 -connect trmb.ca:24553
CONNECTED(00000003)
1996050448:error:1409442E:SSL routines:ssl3_read_bytes:tlsv1
alert protocol
version:../ssl/record/rec_layer_s3.c:1544:SSL alert number 70
[...]
I suspect that it is failing at nginx. It might be that I can add
options to nginx's config. What I have in there is likely a bare
minimum.
Sysop: | Keyop |
---|---|
Location: | Huddersfield, West Yorkshire, UK |
Users: | 409 |
Nodes: | 16 (2 / 14) |
Uptime: | 63:25:11 |
Calls: | 8,575 |
Calls today: | 5 |
Files: | 13,225 |
Messages: | 5,930,465 |