accessing smtp server with weak dh encryption?

Hi, I use the u of t smtp servers for outgoing mail from my laptop, including some automated mails that I send out. Postfix's sendmail will no longer complete the TLS handshake with the server, because the U of T server hasn't been updated to fix the logjam attack (still using a 512kb temporary key). Current thunderbird breaks, too, though if I use an old version I can still get mail out. Does anyone know if there's any way to instruct postfix (or is it maybe openssl) to violate protocol and permit me to interact with this server? I know there are security risks but I'm kind of screwed if I can't send out mail. Thanks, matt

| From: Matt Price <moptop99@gmail.com> | I use the u of t smtp servers for outgoing mail from my laptop, including | some automated mails that I send out. Postfix's sendmail will no longer | complete the TLS handshake with the server, because the U of T server | hasn't been updated to fix the logjam attack (still using a 512kb temporary | key). 512kb is a very long key :-) Temporary key? You mean the key generated by the DH exchange? The normal term is "ephemeral". I don't understand U of T's email systems. I connect to the Department of Computer Science servers sometimes. I think that they are run by DCS. There was a big fight last year or so in which the university outsourced email to google (I think; horrible for privacy). Are you talking to a departmental server or a university-wide server? In any case, they should be easily shamed into upgrading.

On 30/06/15 10:32 PM, D. Hugh Redelmeier wrote:
[...] I don't understand U of T's email systems. I connect to the Department of Computer Science servers sometimes. I think that they are run by DCS. There was a big fight last year or so in which the university outsourced email to google (I think; horrible for privacy). Are you talking to a departmental server or a university-wide server?
In any case, they should be easily shamed into upgrading.
DCS runs their own systems for CS students, and occasionally for engineers: http://www.cdf.toronto.edu/ This is very different and totally separate from the general systems that U of T runs. About 4 or 5 years back, U of T deprecated their only UTORmail system, which they ran internally, for "UTMail+", which is Microsoft. They were forcing people to migrate, first students, then clubs, not sure if/when staff accounts were forced over. On 2015-06-30 2:17pm, Matt Price wrote:
Does anyone know if there's any way to instruct postfix (or is it maybe openssl) to violate protocol and permit me to interact with this server? I know there are security risks but I'm kind of screwed if I can't send out mail.
I use the UTMail+ IMAP/SMTP servers with no problem from Icedove/Thunderbird... and I've been doing this for a decade, through the transition from UTORmail to UTMail+... though I've never tried from Postfix. With UTMail+, my SMTP server is pod51008.outlook.com (or something like that). With UTORmail, it was smtp.utoronto.ca or something with extra numbers. (I never used CDF SMTP... I just had my CDF account forward mail to my UTORmail account...) I guess it would help to know what system (or SMTP server) in particular you're using?

Matt Price a écrit profondement: | I use the u of t smtp servers for outgoing mail from my laptop, including | some automated mails that I send out. Postfix's sendmail will no longer | complete the TLS handshake with the server, because the U of T server | hasn't been updated to fix the logjam attack (still using a 512kb temporary | key). Current thunderbird breaks, too, though if I use an old version I | can still get mail out.
| Does anyone know if there's any way to instruct postfix (or is it maybe | openssl) to violate protocol and permit me to interact with this server? I | know there are security risks but I'm kind of screwed if I can't send out | mail. I had outbound problems, some very similar to yours If all else fails, you don't have to actually be a spammer (and I'm not) but "SendGrid" will punch your ticket for free if you send less than 400 emails a day. They seem able to send anything to anybody with access to the disposition of the email if you should need it. Looking at inbound headers too, I notice a couple of well known reputable companies using SendGrid. https://sendgrid.com/ -- Bill Henderson
participants (4)
-
Blaise Alleyne
-
D. Hugh Redelmeier
-
Matt Price
-
slackrat@free.fr