If you have clients using macOS 10.11 El Capitan, they will not be able to connect to MIAB 0.44.
macOS 10.11 has TLS 1.2 support, but (annoyingly) Apple Mail 9.3 (the version in that OS) does not, and MIAB 0.44 is configured to only use 1.2 and 1.3.
I solved this by re-enabling TLSv1 in both postfix and dovecot. I wish I didn’t have to, but my users win, and the hardware they are on won’t run a later macOS…
For email (in contrast to the web), the consensus seems to be that any encryption is better than none, even if it’s RC4 in TLSv1. For example, even in MIAB 0.44, postfix allows client-side cipher suite ordering. The general effect of turning up the settings is that more email will be delivered unencrypted. This is also why MTA-STS is kind of important, especially if you have TLSv1.3, as its downgrade protection would provide considerable added value in an otherwise poor crypto environment.
Oh, I wouldn’t dream of blaming you! I’m all for increasing security settings wherever possible. Apple really dropped the ball in this old version of Apple Mail. The rest of macOS 10.11 had perfectly reasonable TLS1.2 support; it’s just mail that’s junky! There’s a good Apple Discussions thread on it.
I ended up having to add a DES cipher suite back into the mix, and permit TLS1.0 again in both postfix and dovecot. The thought of it makes me feel kind of icky…
As I said, the hardware they have will not run macOS later than 10.11, so it’s not possible to upgrade, and Apple have not fixed this issue retrospectively.
It seems that not only does Apple Mail not have support for TLLSv1.2, it also lacks support for decent cipher suites, so you’re stuck with enabling DES ciphers.
FWIW, for the past few days I’ve been experimenting with using the latest Roundcube (I normally never use the webmail client).
It looks and works great on mobile and desktop plus I still get notifications.
When the issue is strictly a device default mail client, the browser may still be updated. In this case, webmail is at least one other option.
Personally, I don’t find downgrade of client-to-server acceptable in the same way as server-to-server downgrade (even plain text). The admin on the other side of the server-to-server connection may understand perfectly what they are doing (e.g., forum topic reply notifcation), but client-to-server will be all the things (e.g., login credentials. OTPs, etc.).
I was a bit slow upgrading to 0.44. I had one iOS device that cannot go higher than iOS 9.3.6 and seem to be running into the same TLS problem after upgrading to 0.44. iOS 9.3.6 is the correlating iOS version to macOS 10.11. Both were released Sept 2015. Not a big deal for me as we rarely use this device but just wanted to get this info in here for anyone else that may come across it.