Thanks a lot, that was a great answer - the most is clear now. Just a few
things to clarify.

As much I understood, if I set the `*_security_level` to `may` then the
`*_mandatory_ciphers` option is not even considered. Since the the mandatory
is for mandatory TLS and we set opportunistic TLS with `may`. So I think it
wont hurt to just let them on high, just to be sure?
On the other hand the options for the smtp(d)_tls_ciphers are according to
the README by default `export` but I think that medium should work out for
me.

Also can you somehow comment on how the list in smtp(d)_tls_exclude_ciphers
came to be? For those I used e.g. I know that RC4 is vulnerable to BEAST
attacks and SSL is also still insecure, similar to the other two. But for
those you list I kind of cant make up an explanation. I've looked up that
for some Microsoft Exchange Server with the corrupted 3DES there is only KC4
possible so even when I don't really like it I will let RC4 pass.

Additionally can I somehow tell in which cases the mail would not be sent
and in which it will just go back to plain text? That depends on the "how"
TLS fails like you said would an explanation for that be possible? I talked
to my boss and it is the biggest priority that everything very secure as
long the trade-off is not too big. So it is fine if I can only talk to about
95% of the server *AS LONG* I get a clear indication that the transfer
failed because no secure connection was possible. So a side question is
whether such applications like Thunderbird will make a clear indication when
sending the message was not possible?
For those who only support plain text I'm ok with it being plain text (since
there is nothing I can do). Basically I want to use crypto wherever I can
and be sure that the best possible connection method is taken. With the
`*_security_level` at `may` can I really be 100% sure that the best possible
is taken? The way that my boss told me it felt like if there ever is a
problem with the security - since usually very confidential data is sent - I
will get a problem and a ratio of 95% acceptance is ok I understood.

Best Regards,
Akimiya



--
View this message in context: 
http://postfix.1071664.n5.nabble.com/What-is-a-good-and-very-secure-configuration-for-public-postfix-server-nowadays-tp76918p76956.html
Sent from the Postfix Users mailing list archive at Nabble.com.

Reply via email to