Am 07.02.2014 15:32, schrieb KT Walrus:
> I found this list:
> 
> |ECDH+AESGCM:DH+AESGCM:ECDH+AES256:DH+AES256:ECDH+AES128:DH+AES:ECDH+3DES:DH+3DES:RSA+AESGCM:RSA+AES:RSA+3DES:!aNULL:!MD5:!DSS
> |
> 
> |on this page:|
> |
> |
> https://hynek.me/articles/hardening-your-web-servers-ssl-ciphers/
> 
> I think I’m going to just go with his recommendations (and bookmark him for 
> any future changes) since he seems to
> be on top of this issue.

that's in general fine but it prefers AES-256 which is bad for some reasons:

* there is currently no benefit, the opposite is true
* according to http://www.nsa.gov/business/programs/elliptic_curve.shtml you 
would
  need a 15360 Bit RSA-Key while for AES-128 a 3072 RSA is suitable
* AES-128 is around 20% faster than AES-256
* https://www.schneier.com/blog/archives/2009/07/another_new_aes.html
  The attack exploits the fact that the key schedule for 256-bit version
  is pretty lousy -- something we pointed out in our 2000 paper -- but
  doesn't extend to AES with a 128-bit key

i spent many many hours for decide my cipher-string below and the result
was order ciphers exactly in the most secure and most performance
wise way and make sure give each client the best option

currently TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 is the best supported and
most secure cipher, Firefox 27 / Chrome as example support it and where
ever you can you should brefer AES-GCM instead AES-CBC

TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 is not widely supported

yes, i am aware that we talk about e-mail and not http, but finally the cipher
support is practically the same, except thunderbird still does not use AES-GCM
but given that Firefox is using the same crypto-layer (NSS) which supports
AES-GCM-128 *but not* AES-GCM-256 the last recent feature only needs to be
"exported" to thunderbird which happens in the near future

> On Feb 7, 2014, at 4:31 AM, Reindl Harald <h.rei...@thelounge.net 
> <mailto:h.rei...@thelounge.net>> wrote:
> 
>>
>>
>> Am 07.02.2014 03:37, schrieb KT Walrus:
>>> I’m trying to set up SSL/TLS IMAP connections.
>>>
>>> What is the recommended cipher list to set tls_ciphers in dbmail.conf?
>>>
>>> I copied a cipher list from some random example I found on the web, and it 
>>> does work, but I don’t really
>>> understand what is the best list to use
>>
>> in that case honestly you better don't touch defaults because your changes 
>> will
>> most likely never get reviwed while defaults may change to better ones
>> no idea if dbmail implements SSLHonorCipherOrder because i have dovecot in 
>> front
>>
>> ECDHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES128-SHA256:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA:AES256-SHA:DHE-RSA-CAMELLIA128-SHA:DHE-RSA-CAMELLIA256-SHA:CAMELLIA128-SHA:CAMELLIA256-SHA:ECDHE-RSA-DES-CBC3-SHA:DES-CBC3-SHA:!SSLv2
>>
>> the above list works on Apache and Dovecot leading to the following cipher 
>> order
>> and yes you want to perfer AES-128 because your RSA key most likely is even 
>> too
>> small for AES-128 which needs 3072 Bit and there are existing theoretical 
>> attacks
>> against AES-256 not affecting AES-128
>>
>> https://www.ssllabs.com/ssltest/ on a webserver
>> Cipher Suites (SSL 3+ suites in server-preferred order, then SSL 2 suites 
>> where used)
>> TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (0xc02f) ECDH 256 bits (eq. 3072 bits 
>> RSA) FS 128
>> TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (0xc030) ECDH 256 bits (eq. 3072 bits 
>> RSA) FS 256
>> TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (0x9e) DH 4096 bits (p: 512, g: 1, Ys: 
>> 512) FS 128
>> TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (0x9f) DH 4096 bits (p: 512, g: 1, Ys: 
>> 512) FS 256
>> TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (0xc027) ECDH 256 bits (eq. 3072 bits 
>> RSA) FS 128
>> TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (0xc028) ECDH 256 bits (eq. 3072 bits 
>> RSA) FS 256
>> TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (0xc013) ECDH 256 bits (eq. 3072 bits 
>> RSA) FS 128
>> TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (0xc014) ECDH 256 bits (eq. 3072 bits 
>> RSA) FS 256
>> TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (0x67) DH 4096 bits (p: 512, g: 1, Ys: 
>> 512) FS 128
>> TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (0x6b) DH 4096 bits (p: 512, g: 1, Ys: 
>> 512) FS 256
>> TLS_DHE_RSA_WITH_AES_128_CBC_SHA (0x33) DH 4096 bits (p: 512, g: 1, Ys: 512) 
>> FS 128
>> TLS_DHE_RSA_WITH_AES_256_CBC_SHA (0x39) DH 4096 bits (p: 512, g: 1, Ys: 512) 
>> FS 256
>> TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (0x45) DH 4096 bits (p: 512, g: 1, Ys: 
>> 512) FS 128
>> TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (0x88) DH 4096 bits (p: 512, g: 1, Ys: 
>> 512) FS 256
>> TLS_RSA_WITH_AES_128_GCM_SHA256 (0x9c) 128
>> TLS_RSA_WITH_AES_256_GCM_SHA384 (0x9d) 256
>> TLS_RSA_WITH_AES_128_CBC_SHA (0x2f) 128
>> TLS_RSA_WITH_AES_256_CBC_SHA (0x35) 256
>> TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (0x41) 128
>> TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (0x84) 256
>> TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (0xc012) ECDH 256 bits (eq. 3072 bits 
>> RSA) FS 112
>> TLS_RSA_WITH_3DES_EDE_CBC_SHA (0xa)

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
DBmail mailing list
DBmail@dbmail.org
http://mailman.fastxs.nl/cgi-bin/mailman/listinfo/dbmail

Reply via email to