In message <sEaDDsBq$
VjhFwTs@jhall_nospamxx.co.uk>, John Hall
<
john_...@jhall.co.uk> writes
>>A suggestion I have seen is, instead of the options line, to substitute
>>
>>options = NO_SSLv2
>>options = NO_SSLv3
>>options = NO_TLSv1
>>options = NO_TLSv1.1
>>sslVersion = TLSv1.2
>>
>>I suspect the sslversion line is the important one. I have not tried
>>this myself. I update my version of stunnel periodically to get the
>>latest fixes.
>
>That's interesting. I don't have the sslVersion = TLSv1.2 line myself,
>and so far the email server that I use hasn't complained. I wonder if I
>should add it in case one day in the not too distant furure they start
>requiring it.
As I said in the original post, I was alerted to it by an email from
Microsoft, as I use Outlook365 (from Namesco) as my email server. It
didn't mention the POP3 downloads but did say that my SMTP client was
using either TLS 1.0 or 1.1
"We're making some changes to Direct Routing SIP interface.
On January 3rd 2022, to provide the best-in-class encryption to our
customers, we will begin retiring Transport Layer Security (TLS)
versions 1.0 and 1.1 and begin obligating TLS1.2 usage for the Direct
Routing SIP interface.
•The move to TLS 1.2 is to ensure that our service is secure by
default and in alignment with the rest of Microsoft 365 services as
previously communicated (MC126199 in Dec 2017, MC128929 in Feb 2018,
MC186827 in July 2019, MC218794 in July 2020, MC240160 in February 2021,
and MC292797 in October 2021).
You are receiving this message because our reporting indicates that your
organization is still connecting using SMTP Auth client submission via
smtp.office365.com with TLS1.0 or TLS1.1 to connect to Exchange Online.
--
John