-----BEGIN PGP SIGNED MESSAGE-----
Hash: RIPEMD160

Folks, sorry this isn't threading: I subscribed to this list to post
after being pointed by Viktor at:

  http://archives.neohapsis.com/archives/postfix/2013-09/0003.html
  http://archives.neohapsis.com/archives/postfix/2013-09/0015.html

For interop and to counter accidental misinformation, I'll clarify some
Exim points here.  If anyone wants any further guidance for Exim, I
suggest that exim-users is the place to start, and that postfix-users
only be used for interop debugging on this particular issue if the list
veterans are happy with that.  I'll try to hang around for a few days
for any follow-up (but am "rather busy" right now, so replies won't be
prompt).

  https://lists.exim.org/mailman/listinfo/exim-users

Exim does not itself set a minimum length of 2048 bits for EDH; *if*
Exim is built against GnuTLS (instead of OpenSSL), then the GnuTLS
defaults will, by default, be applied to connections.  As the GnuTLS
library is rebuilt on newer versions, new default values chosen by
GnuTLS will apply to Exim: rather than impose cryptographic policy, we
prefer/try to accept the policy from the library as defaults, and
provide configuration options to let the site operator override.

The only place Exim chooses a value which might match 2048 relating to
DH is when generating fresh server-side parameters, as the default size
to generate, if not told otherwise; the actual value is:
  gnutls_sec_param_to_pk_bits(GNUTLS_PK_DH, GNUTLS_SEC_PARAM_NORMAL)
but clamped down to a maximum of 2236, to avoid interop issues with NSS
clients such as Thunderbird, because until fairly recently NSS did not
support larger sizes and would hard-error.

Assuming an Exim version of at least 4.80, then the Exim option
tls_require_ciphers is interpreted, for GnuTLS, as a Priority String;
those are documented at:

  http://gnutls.org/manual/html_node/Priority-Strings.html

Note that Exim has tls_require_ciphers both as a main section
configuration option, applying to Exim-as-server, and as an option on
SMTP Transports, applying to Exim-as-client.

It's been a while since I touched the GnuTLS integration and I don't
currently have time to test/experiment and confirm, but I believe that
overriding the GnuTLS library defaults to tell it "Weak" should be
sufficient to get Exim happy to talk with smaller DH values.

More documentation on Exim's TLS handling can be found at:

  
http://www.exim.org/exim-html-current/doc/html/spec_html/ch-encrypted_smtp_connections_using_tlsssl.html

Regards,
- -Phil, p...@exim.org and one of the last two people to touch the GnuTLS
       and OpenSSL integration in Exim
-----BEGIN PGP SIGNATURE-----

iEYEAREDAAYFAlIju5oACgkQQDBDFTkDY39HkwCeObzhmF7IxL4XuCB9mfCNoKxs
hbEAoJVh15uHfpDnl2siOcJv9/QXqv9O
=e03D
-----END PGP SIGNATURE-----

Reply via email to