On Mon, Oct 21, 2013 at 09:43:50PM +0200, li...@rhsoft.net wrote: > postfix/smtp[7411]: warning: TLS library problem: > 7411:error:100AE081:elliptic curve > routines:EC_GROUP_new_by_curve_name:unknown group:ec_curve.c:316 > > maybe relevant to "only ECC NIST Suite B curves support"? > postfix was compiled against exactly this openssl build > as far as i can see fallback to unecrypted connection > > http://koji.fedoraproject.org/koji/buildinfo?buildID=471781 > * Wed Oct 16 2013 Tom?? Mr?z <tm...@redhat.com> 1.0.1e-28 > - only ECC NIST Suite B curves support > - drop -fips subpackage > > * Mon Oct 14 2013 Tom Callaway <s...@fedoraproject.org> > - 1.0.1e-27 > - resolve bugzilla 319901 (phew! only took 6 years & 9 days)
Until recently, there was no ECC support in RedHat (and Fedora) OpenSSL packages. It seems that a few weeks ago they finally enabled ECC, but could not resist the urge to cripple it a bit. :-) Instead of improving the world by finally supporting EC, they've made things worse! Previously clients negotiated something other than EECDH key exchange, now they negotiate it and fail! Sorry to say so, but the RedHat engineers need adult supervision. What site was your SMTP client connecting to? IIRC Suite B supports prime256v1 (aka secp256r1) and secp384r1. Perhaps the SMTP server decided to live on the bleeding edge with "secp521r1". An Exim server with GnuTLS? A Postfix administrator who did not believe my advice? tls_eecdh_strong_curve (default: prime256v1) The elliptic curve used by the Postfix SMTP server for sensibly strong ephemeral ECDH key exchange. This curve is used by the Postfix SMTP server when "smtpd_tls_eecdh_grade = strong". The phrase "sensibly strong" means approximately 128-bit security based on best known attacks. The selected curve must be implemented by OpenSSL (as reported by ecparam(1) with the "-list_curves" option) and be one of the curves listed in Section 5.1.1 of RFC 4492. You should not generally change this setting. tls_eecdh_ultra_curve (default: secp384r1) The elliptic curve used by the Postfix SMTP server for maximally strong ephemeral ECDH key exchange. This curve is used by the Postfix SMTP server when "smtpd_tls_eecdh_grade = ultra". The phrase "maximally strong" means approximately 192-bit security based on best known attacks. This additional strength comes at a significant computational cost, most users should instead set "smtpd_tls_eecdh_grade = strong". The selected curve must be implemented by OpenSSL (as reported by ecparam(1) with the "-list_curves" option) and be one of the curves listed in Section 5.1.1 of RFC 4492. You should not generally change this setting. On an "improved" RedHat system you may be better off with kEECDH ciphers disabled on the client side: smtp_tls_exclude_ciphers = kEECDH -- Viktor.