On Sat, Feb 07, 2015 at 10:18:11PM -0700, LuKreme wrote:

>  # postconf -n | grep _tls_
> smtp_tls_security_level = may
> smtpd_tls_cert_file = /etc/ssl/certs/postfix.pem

Fine so far.

> smtpd_tls_ciphers = high

This is too "high" for opportunistic TLS.  Anything more than
"medium" is too restrictive for opportunistic TLS on port 25.

On the submission port (587) you can be more strict.

> # is smtp_tls_exclude needed?
> smtpd_tls_exclude_ciphers = aNULL, DES, 3DES, MD5, DES+MD5, RC4

The defaults are fine.  Why do you feel compelled to "tune" these?

> smtpd_tls_loglevel = 2

Too verbose.  Stick with "1"

> smtpd_tls_protocols = TLSv1, !SSLv2, !SSLv3

Why exclude TLSv1.1 and TLSv1.2?  See the documentation.
The default is fine, but if you must tweak, exclude just
"SSLv2".

    smtpd_tls_protocols = !SSLv2

On the submission port (587) you can be more strict.

> smtpd_tls_session_cache_database = btree:$data_directory/smtpd_sessions

Mostly unnecessary with Postfix 2.10 or later which supports session
tickets instead.

> smtpd_tls_session_cache_timeout = 1800s

No reason to reduce this from the default.

>  # openssl s_client -connect 127.0.0.1:993

Postfix does not do IMAP, that's Dovecot or similar.

-- 
        Viktor.

Reply via email to