What services will not function for what users? This is very important to know and to understand, before making this change.It's important to note that some services will not function for certain users if you remove support for TLSv1.0.
All services will remain running, but they won't be accessible by users running older software applications. The following quotes from an analyst explains this further:What services will not function for what users? This is very important to know and to understand, before making this change.
We had a prior ticket last week about Trustwave asking for TLSv1 to be disabled. When it is disabled, older operating systems and clients quit working. This is beyond the browsers. Services such as IMAP and POP (Doeveot) and SMTP (exim) cease working in Windows 7 under Outlook 2007 and 2010. Those same services can quit working on Max OS X Mountain Lion and earlier. Basically, if you go down this path, it is likely email services will break for many users. TLS v1.0 is actually required for STARTTLS on some systems.
As such, please be aware that services will break and there is nothing cPanel can do to get those older operating systems and clients to work. It will be the responsibility of the operating system provider or application to fix those services or the clients to update.
Thank you.I would highly discourage disabling TLSv1 and only using TLSv1.1 and TLSv1.2 for any services related to email. Web services will cause some browsers to be unable to work, but modern browsers do support TLSv1.1 and TLSv1.2. The same cannot be said for email clients and older operating systems.
I've seen one report where changing the "TLS Cipher Suite" in "WHM Home » Service Configuration » FTP Server Configuration" to "!SSLv3" only allows TLSv1.2.I'm still struggling to get my FTP server to pass the scan. I've tried several different cipher suites that are supposed to pass. Unfortunately, I don't think I can force Pure-FTPd to use TLSv1.1 or TLSv1.2. If TLS is enabled, then Pure-FTPd automatically accepts TLSv1.0 connections. Can anyone confirm?
Disregard. This breaks email. Still trying to figure one out that doesn't break FTP, email, or web access.This one should work:
EECDH+ECDSA+AESGCM:EECDH+aRSA+AESGCM:EECDH+ECDSA+SHA384:EECDH+ECDSA+SHA256:EECDH+aRSA+SHA384:EECDH+aRSA+SHA256:EECDH+aRSA+RC4:EECDH:EDH+aRSA:RC4:!aNULL:!eNULL:!LOW:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!RC4
Make sure you are using -SSLv2 -SSLv3 for protocols
It does appear that removing TLSv1 from dovecot breaks Outlook. It appears to work on newer devices and operating systems, but Outlook 2007 will not work. I'm still testing other versions. Technically we have until June 2016 to remove TLSv1, so we have time.Disregard. This breaks email. Still trying to figure one out that doesn't break FTP, email, or web access.
Still an issue with RC4. Can't connect even over TLS from my email clients. If I remove !RC4, I can connect to POP and SMTP again. Really have no idea how to get around this at this point.
SSL Cipher Suite: ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!3DES:!MD5:!PSK
Still an issue with RC4. Can't connect even over TLS from my email clients. If I remove !RC4, I can connect to POP and SMTP again. Really have no idea how to get around this at this point.
Any suggestions for courier, this one still breaks it?Testing.....
Dovecot
AES128+EECDH:AES128+EDH
This configuration does break Outlook 2007.
Yes, for Dovecot or Courier, both will break Outlook 2007 as it doesn't support TLSv1.1. There is no way we can support Outlook 2007 or Microsoft XP and be PCI-DSS 3.1 complaint! On the Apache side, we can't support anything lower than Windows 7, with the service pack and IE 11. I'm telling you this is ugly.Any suggestions for courier, this one still breaks it?
I haven't submitted it yet. Seems like the plan is fairly simple. I don't see too much resistance from them. They are not PCI-DSS 3.1 complaint either! I'll be submitting in the next day or so.Also, did they accept your mitigation plan on this one?
I had no users report issues with anything other than 2007. What operating system and version is your openssl. It has to support TLSv1.1 or TLSv1.2 or no one can connect.I'm trying with office 2013 and 365 on win 7_64 pro and ultimate, and it's breaking those as well. Looking through msdn to see if there is a fix or workaround for this. I think trustwave really jumped the gun on this one.
CENTOS 6.6 x86_64, OpenSSL 1.0.1e-fipsI had no users report issues with anything other than 2007. What operating system and version is your openssl. It has to support TLSv1.1 or TLSv1.2 or no one can connect.