I thought email was like a postcard. Is email with TLSv1.3 or 1.2 safe now?

Recently, an institution I have to deal with sent me a couple of things on email that were full of my personal information.

I was quite angry. I had always understood that email was as safe as a postcard. Even with SSL and such, there was every chance that one of those guys in a hoodie was sitting in a basement, copying it all for themselves. (Threat model = criminals; don't care about 3 letter agencies here).

I have made a formal complaint to the institution. But I did some reading and further looking and I am wondering, did I get that wrong? Some of their mail uses 1.3, but some of it 1.2.

TLSv1.3 seems - currently - to be really safe. So, that's more like an envelope with a wax seal.

TLSv1.2 - its not clear to me. There are lots of attacks, but I am not sure how much of them reflect email vulnerabilities (vs. websites).

I know my email service will accept up to 1.3 (in fact, I've just used their options to make it obligatory), but other people's emails might not. This is a vulnerable population, so not necessarily great hardware, regular updates, etc.

Its possible for the institution to send something out with the intention of using TLSv1.3, but then get busted down to lower protection by the recipient's email service? So the letter gets ripped open to a postcard again?

πŸ‘︎ 10
πŸ’¬︎
πŸ‘€︎ u/Whole_Engine_881
πŸ“…︎ Dec 11 2021
🚨︎ report
I need mod_ssl.so with OpenSSL 1.1.1 for TLSv1.3 in httpd 2.4.46 on centos 7

Hello I have compiled the last version of apache(httpd 2.4.46) and the installed the rpm generated in order to use TLSv1.3, but when I set the protocol in the virtual host the error is "invalid protocol", so I checked the a prerequisite of TLSv1.3 is openssl 1.1.1. The mod_ssl rpm was generated together with the httpd rpm, mod_ssl-2.4.46, and when I install it the file mod_ssl.so appears inside /etc/httpd/modules, but wthat I found is:

root@domain$ strings mod_ssl.so | egrep '^mod_ssl\/|^OpenSSL '

OpenSSL configuration command

OpenSSL 1.0.2k 26 Jan 2017

mod_ssl/2.4.46

OpenSSL 1.0.2k 26 Jan 2017

The openssl is not 1.1.1

On my machine:

[root@domain]# openssl version

OpenSSL 1.1.1c 28 May 2019

How can I fix? Thanks

πŸ‘︎ 24
πŸ’¬︎
πŸ‘€︎ u/Quollum
πŸ“…︎ Apr 28 2021
🚨︎ report
I have two networks I am able to look at wifi 2 and lan 6. All of the protocols that flow through wifi 2 are esp. But when I look at the packets from lan 6 I get everything in plain text through tcp and tlsv1.2. Also while I am sniffing lan6 which is my own network I cant connect to the internet.
πŸ‘︎ 4
πŸ’¬︎
πŸ“…︎ May 16 2021
🚨︎ report
FBI Release 2.6.0 - Removes TitleDB support & adds TLSv1.2 support github.com/Steveice10/FBI…
πŸ‘︎ 443
πŸ’¬︎
πŸ‘€︎ u/Static_Love
πŸ“…︎ Jan 02 2019
🚨︎ report
Please Enable TLSv1.3 In pfSense 2.5.0

Dear Developers/ Administrators,
Hello and I hope that you are doing well. I have not written you in a while and in the interim I have been enjoying your excellent pfSense 2.5.0 RC. Now - I have a question / request for you. I run Stubby ( DNS OVER TLS ) along with Unbound. pfSense 2.5.0 has OpenSSL 1.1.1 and since OpenSSL 1.1.1 there is included support for TLSv1.3 - with that being said - Is it possible to configure pfSense 2.5.0 so that TLSv1.3 is enabled in the kernel or whatever needs to be done to put TLSv1.3 in effect. See here : https://www.openssl.org/blog/blog/2017/05/04/tlsv1.3/ 1 and here : https://wiki.openssl.org/index.php/TLS1.3 - no rush or pressure - it is just that I am trying to be as safe and secure as possible.
Stubby supports TLSv1.3 as do many of the DNS PRIVACY SERVERS.

The most salient point from these articles is this point of reference
" In order to compile OpenSSL with TLSv1.3 support
you must use the β€œenable-tls1_3” option to β€œconfig” or β€œConfigure”

Anyway - thanks for all you do for all of us in what I fondly refer to as " The Community "
Peace and I am OUT !

πŸ‘︎ 13
πŸ’¬︎
πŸ‘€︎ u/directnupe
πŸ“…︎ Nov 13 2019
🚨︎ report
Been running into some TLSv1.2 Issues Lately
πŸ‘︎ 80
πŸ’¬︎
πŸ“…︎ Sep 17 2020
🚨︎ report
πŸ‘︎ 31
πŸ’¬︎
πŸ‘€︎ u/swankjesse
πŸ“…︎ Feb 09 2020
🚨︎ report
MultiUpdater updated to support TLSv1.2 github.com/LiquidFenrir/M…
πŸ‘︎ 213
πŸ’¬︎
πŸ‘€︎ u/BernardoGiordano
πŸ“…︎ Mar 06 2018
🚨︎ report
QRaken: a TLSv1.2 QR Code scanner and installer github.com/BernardoGiorda…
πŸ‘︎ 192
πŸ’¬︎
πŸ‘€︎ u/BernardoGiordano
πŸ“…︎ May 21 2018
🚨︎ report
TheFloW: No significant changes in 3.68 except for TLSv1.2 support twitter.com/theflow0/stat…
πŸ‘︎ 105
πŸ’¬︎
πŸ‘€︎ u/Chris_Highwind
πŸ“…︎ Apr 13 2018
🚨︎ report
Nginx - TLSv1.2 Only - A+ on Qualsys SSLtest

Just thought I'd share since it took me a bit to get my nginx config where I wanted it. This config should allow even Windows XP SP3 to connect if they are using Firefox or Chrome. I also generated 2048-bit DH params. This config is inside the server {} stanza.

ssl_protocols TLSv1.2;

ssl_prefer_server_ciphers on;

ssl_ciphers 'DHE-ECDSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES256-SHA';

add_header Strict-Transport-Security "max-age=31536000; " always;

ssl_dhparam /etc/nginx/ssl/dhparams.pem

πŸ‘︎ 3
πŸ’¬︎
πŸ‘€︎ u/amishengineer
πŸ“…︎ Nov 03 2019
🚨︎ report
A-PDF Automail - can it send using TLSv1.2?

Hi all.

I have been trying to contact A-PDF for a couple of months since their software stopped working for us. We use Office365 and as TLSv1.0 has been deprecated, Automail can no longer connect to the server to send emails (we get a message saying "SSL is not available on this server").

Does anyone have any ideas of a workaround?

If we have to get different software, I'm fine with that, but it would need to be able to take a folder of PDFs, read the contents, to find who the PDF should be sent to, lookup this reference in a CSV file to obtain an email address and password, password protect the PDF and then connect to O365 to send the email. The Email should be configurable to allow HTML and also allow mail merge so that we can put in [fields] to merge with names etc. I can find software that does part of this, but nothing that can do it all.

I'd be grateful of any help. We have tried sending them through outlook (the other option) but it force-creates the emails in plain text which then means the PDF attachment corrupts, and so we are currently having to manually change every email to HTML format before sending!!

Thanks in advance

πŸ‘︎ 4
πŸ’¬︎
πŸ‘€︎ u/buddhabanter
πŸ“…︎ Dec 10 2019
🚨︎ report
Apple ios and Yosemite mail app: no support for IMAP TLSv1.1/1.2, only last century's TLSv1.0 clift.org/fred/frustratio…
πŸ‘︎ 53
πŸ’¬︎
πŸ‘€︎ u/minektur
πŸ“…︎ Sep 10 2015
🚨︎ report
GitHub disallows non-TLSv1.2 connections over SSL

Check your libraries and software versions, as this may break anything not using TLSv1.2 to connect to GitHub over SSL like it did for me today with a build server running an older version of Ruby. https://githubengineering.com/crypto-removal-notice/

πŸ‘︎ 158
πŸ’¬︎
πŸ‘€︎ u/oncethewine
πŸ“…︎ Feb 23 2018
🚨︎ report
TLSv1.2 will become mandatory on Python.org in the future mail.python.org/pipermail…
πŸ‘︎ 30
πŸ’¬︎
πŸ‘€︎ u/donaldstufft
πŸ“…︎ Jan 10 2017
🚨︎ report
Foritgate matching TLSv1.2-1.3 traffic on random ports

Looking for some info/assistance. My fortigate is listing a lot of trffic as "TLSv1.2" or "TLSv1.3" but the ports are totally different everytime.

I can't seem to find any concrete info on what ports these should be operating over. I'm looking to lock down all my outbound ports, but if this is legit traffic the random ports will make this next to impossible.

It's logging the "Application name" as TLSv1.2.

Sample from logs:

Application Control Sensor default Application Name SSL_TLSv1.2 ID 41540 Category Network.Service Risk Control Action detected Protocol 6 Service tcp/5447

Application Control Sensor default Application Name SSL_TLSv1.2 ID 41540 Category Network.Service Risk Control Action detected Protocol 6 Service tcp/22790

Any info/links/assistance appreciated!

If i just lock down these ports and only allow 443/80 outbound, will this traffic just default back over 443?

πŸ‘︎ 3
πŸ’¬︎
πŸ‘€︎ u/shift-del-enter
πŸ“…︎ Oct 02 2019
🚨︎ report
Yes, Ruby 1.9 can support TLSv1.2! crftr.com/yes-ruby-1-9-ca…
πŸ‘︎ 6
πŸ’¬︎
πŸ‘€︎ u/mikefh
πŸ“…︎ Mar 12 2018
🚨︎ report
Status of TLSv1.1/1.2 Enablement and TLSv1.0 Disablement across VMware products kb.vmware.com/s/article/2…
πŸ‘︎ 27
πŸ’¬︎
πŸ‘€︎ u/biolabrat
πŸ“…︎ Dec 27 2017
🚨︎ report
A drop-in replacement for the Rust standard library TCP listener with TLSv1.2 enabled

Hello!

I'm a relatively new Rustacean (and also relatively new to Reddit; this account is old but I have barely used it at all), and I noticed that there was no easy to use library for setting up SSL/TLS encrypted connections, so I decided to write one.

It abstracts over a TCPListener and provides a drop-in* interface replacement with TLSv1.2 layered on top of the connection.

I'd appreciate any feedback on my code, and would super appreciate it if anybody would be willing to review the library to check that I've configured things right.

I'm loving Rust so far! :)

repo: https://github.com/Postage/caesar

* Some very small changes are required.

πŸ‘︎ 28
πŸ’¬︎
πŸ‘€︎ u/ArturoVM
πŸ“…︎ Mar 03 2016
🚨︎ report
Blind Girl Here. Give Me Your Best Blind Jokes!

Do your worst!

πŸ‘︎ 5k
πŸ’¬︎
πŸ‘€︎ u/Leckzsluthor
πŸ“…︎ Jan 02 2022
🚨︎ report
Dropped my best ever dad joke & no one was around to hear it

For context I'm a Refuse Driver (Garbage man) & today I was on food waste. After I'd tipped I was checking the wagon for any defects when I spotted a lone pea balanced on the lifts.

I said "hey look, an escaPEA"

No one near me but it didn't half make me laugh for a good hour or so!

Edit: I can't believe how much this has blown up. Thank you everyone I've had a blast reading through the replies πŸ˜‚

πŸ‘︎ 19k
πŸ’¬︎
πŸ‘€︎ u/Vegetable-Acadia
πŸ“…︎ Jan 11 2022
🚨︎ report
What starts with a W and ends with a T

It really does, I swear!

πŸ‘︎ 6k
πŸ’¬︎
πŸ‘€︎ u/PsychedeIic_Sheep
πŸ“…︎ Jan 13 2022
🚨︎ report
What is a a bisexual person doing when they’re not dating anybody?

They’re on standbi

πŸ‘︎ 11k
πŸ’¬︎
πŸ‘€︎ u/Toby-the-Cactus
πŸ“…︎ Jan 12 2022
🚨︎ report
Geddit? No? Only me?
πŸ‘︎ 6k
πŸ’¬︎
πŸ‘€︎ u/shampy311
πŸ“…︎ Dec 28 2021
🚨︎ report
I wanna hear your best airplane puns.

Pilot on me!!

πŸ‘︎ 3k
πŸ’¬︎
πŸ‘€︎ u/Paulie_Felice
πŸ“…︎ Jan 07 2022
🚨︎ report
E or ß?
πŸ‘︎ 9k
πŸ’¬︎
πŸ‘€︎ u/Amazekam
πŸ“…︎ Jan 03 2022
🚨︎ report
No spoilers
πŸ‘︎ 9k
πŸ’¬︎
πŸ‘€︎ u/Onfour
πŸ“…︎ Jan 06 2022
🚨︎ report
Covid problems
πŸ‘︎ 7k
πŸ’¬︎
πŸ‘€︎ u/theincrediblebou
πŸ“…︎ Jan 12 2022
🚨︎ report
These aren't dad jokes...

Dad jokes are supposed to be jokes you can tell a kid and they will understand it and find it funny.

This sub is mostly just NSFW puns now.

If it needs a NSFW tag it's not a dad joke. There should just be a NSFW puns subreddit for that.

Edit* I'm not replying any longer and turning off notifications but to all those that say "no one cares", there sure are a lot of you arguing about it. Maybe I'm wrong but you people don't need to be rude about it. If you really don't care, don't comment.

πŸ‘︎ 12k
πŸ’¬︎
πŸ‘€︎ u/Lance986
πŸ“…︎ Dec 15 2021
🚨︎ report
I had a vasectomy because I didn’t want any kids.

When I got home, they were still there.

πŸ‘︎ 10k
πŸ’¬︎
πŸ‘€︎ u/demotrek
πŸ“…︎ Jan 13 2022
🚨︎ report
Spi__
πŸ‘︎ 6k
πŸ’¬︎
πŸ‘€︎ u/Fast_Echidna_8520
πŸ“…︎ Jan 11 2022
🚨︎ report
What did 0 say to 8 ?

What did 0 say to 8 ?

" Nice Belt "

So What did 3 say to 8 ?

" Hey, you two stop making out "

πŸ‘︎ 9k
πŸ’¬︎
πŸ‘€︎ u/designjeevan
πŸ“…︎ Jan 03 2022
🚨︎ report
What do you call quesadillas you eat in the morning?

Buenosdillas

πŸ‘︎ 7k
πŸ’¬︎
πŸ‘€︎ u/FarronKeepSucks
πŸ“…︎ Jan 14 2022
🚨︎ report
I dislike karma whores who make posts that imply it's their cake day, simply for upvotes.

I won't be doing that today!

πŸ‘︎ 15k
πŸ’¬︎
πŸ‘€︎ u/djcarves
πŸ“…︎ Dec 27 2021
🚨︎ report
I need mod_ssl.so with OpenSSL 1.1.1 for TLSv1.3 in httpd 2.4.46 on centos 7

Hello I have compiled the last version of apache(httpd 2.4.46) and the installed the rpm generated in order to use TLSv1.3, but when I set the protocol in the virtual host the error is "invalid protocol", so I checked the a prerequisite of TLSv1.3 is openssl 1.1.1. The mod_ssl rpm was generated together with the httpd rpm, mod_ssl-2.4.46, and when I install it the file mod_ssl.so appears inside /etc/httpd/modules, but wthat I found is:

root@domain$ strings mod_ssl.so | egrep '^mod_ssl\/|^OpenSSL '

OpenSSL configuration command

OpenSSL 1.0.2k 26 Jan 2017

mod_ssl/2.4.46

OpenSSL 1.0.2k 26 Jan 2017

The openssl is not 1.1.1

On my machine:

[root@domain]# openssl version

OpenSSL 1.1.1c 28 May 2019

How can I fix? Thanks

πŸ‘︎ 2
πŸ’¬︎
πŸ‘€︎ u/Quollum
πŸ“…︎ Apr 28 2021
🚨︎ report
httpd 2.4.46 and SSLProtocol: Illegal protocol 'TLSv1.3'

Hello, I have upgraded apache on Centos 7 compiling the rpm, to use TLSv1.3, but I have this error and httpd fails to start. How can I fix? Openssl installed is 1.1.1

Thanks.

πŸ‘︎ 2
πŸ’¬︎
πŸ‘€︎ u/Quollum
πŸ“…︎ Apr 28 2021
🚨︎ report

Please note that this site uses cookies to personalise content and adverts, to provide social media features, and to analyse web traffic. Click here for more information.