On Tue, Jan 21, 2025 at 05:16:29PM -0500, Wietse Venema via Postfix-users wrote:

> >    [root@host /]# postconf -n | grep tls
> >    milter_rcpt_macros = i {rcpt_addr} {rcpt_host} {rcpt_mailer} 
> > {tls_version}
> >    smtp_tls_CAfile = /etc/pki/tls/certs/ca-bundle.crt
> >    smtp_tls_CApath = /etc/pki/tls/certs
> >    smtp_tls_security_level = may
> >    smtpd_tls_cert_file = /etc/letsencrypt/live/example.com/fullchain.pem
> >    smtpd_tls_key_file = /etc/letsencrypt/live/example.com/privkey.pem
> >    smtpd_tls_security_level = may

Nothing in the Postfix config, but do note that on RedHat / Fedora
systems there's also "crypto policy" that cranks up security to 11 to
protect users against fairly exotic threats, so you end up with
cleartext instead of reasonably, but not maximally secure TLS.

> 
> I just wanted to make sure that you weren't cranking up security to 11.
> 
> Assuming that your certificate and key are good, I speculate that
> the client wants to use a different type of certificate. There are
> howtos to configure the Postfix SMTP server with both RSA and ECDSA
> certs from letsencrypt.

The message was "no shared cipher", so perhaps the client supported only
SHA1-based TLS 1.0 ciphers, but the server had SHA1 turned off by crypto
policy, or the client wanted RC4, ...

This is of course assuming a legitimate client and not a Shodan survey
probe testing the TLS stack for stuff that should be turned off.

-- 
    Viktor.
_______________________________________________
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org

Reply via email to