On Thu, Feb 05, 2015 at 10:23:10PM +0100, li...@rhsoft.net wrote:

> Am 05.02.2015 um 22:00 schrieb SW:
> >smtpd_tls_exclude_ciphers = aNULL, eNULL, DES, 3DES, MD5, DES+MD5, RC4
> 
> disable DES *and* RC4 is pure nonsense because it leads in some servers not
> able to send mail to you at all and way more fall back to plain as needed
Yes, I would not disable 3DES, it has held up fairly well, and even
RC4 is largely good enough for opportunsitic TLS.  Once you disable
MD5, (which is fine in practice) there's no need to disable DES+MD5.

The eNULL ciphers are disabled by default, and there no need to
disable aNULL on servers, you just lose information that way (you
no longer know which clients manifestly ignore your certificate,
which they still do even if one is forced down their throat).

So a more rational setting along these lines would be:

    smtpd_tls_exclude_ciphers = LOW, EXPORT, MD5

which is sensible largely because it is pointless (no clients use
these), but it looks better to auditors.

-- 
        Viktor.

Reply via email to