Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Mailserver TLS version statistics? #1355

Open
thorsheim opened this issue Mar 23, 2024 · 2 comments
Open

Mailserver TLS version statistics? #1355

thorsheim opened this issue Mar 23, 2024 · 2 comments

Comments

@thorsheim
Copy link

It would be very useful to see some aggregated statistics for TLS versions supported by tested mailservers. Statistics from the past 7-14-30 days or more. This would be beneficial especially for mailserver admins on which versions to support, and when to stop 1.0/1.1 support (in particular). Adding cipher suites to that would make it even better.

@bwbroersma
Copy link
Collaborator

Interesting idea we also had, it would be better to have general statistics (like caniuse has for browsers), since only bench marking against the tested sites might be skewed. Statistics could be gathered by checking all MX records of the Tranco list.

We proposed the Best Current Practice (BCP) 195 to the NCSC-NL TLS guideline revision, the BCP 195 includes:

Microsoft Online Exchange and Outook.com currently only support TLS v1.2. Based on RFC 8996 and the current deployment of TLS v1.2+ it feels save to drop TLS v1.0 and v1.1 on STARTTLS, but of course it's best to first check the percentage of TLS v1.0 and v1.1 traffic on the specific MX first.

@Seirdy
Copy link

Seirdy commented Apr 20, 2024

This would do a lot to inform the decision to disable TLSv1.0 and TLSv1.1. I and many others still would rather not disable them, as it can mean not receiving emails for job offers, rent updates, school transcripts, etc. Knowing adoption levels are above a very high threshold might convince more people.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

No branches or pull requests

3 participants