On 24 May 2015, at 18:09, CSS <c...@morefoo.com> wrote:

>>> I thought I saw that listed on this forum earlier this year.
>> 
>> Don't believe all the nonsense posted on the Internet.
> 
> Related to the previous paragraph, I know that when I fiddle with
> SSL settings on a web server, I can easily dig up information on
> exactly what OS/browser combinations Ill be denying service to (so
> far, XP + IE6).  Having that confidence in knowing what possible
> visitors Im denying is nice.
> 
> Is there any good reference for MTAs and MUAs out there?  Im
> thinking of something like the matrix Qualsys shows in their test
> results.
> 
> Whoever started this thread, thanks.  Its always been a little fuzzy
> to me where OpenSSL and Postfix meet and decide which parameters are
> set by default (or arent available).
> 
> Any future plans to incorporate other SSL libraries?

Assuming you are talking about the MSA (submission) and not MTA to MTA 
traffic, you can cover the vast majority of the scenarios with the 
following cipher selection string;

EECDH+AES128:EECDH+AES256:EDH+AES128+SHA:RSA+AES+SHA:RSA+3DES:!DSS

Test this with 'openssl ciphers -v' to see the actual cipher selection 
you get, as it varies with older pre-1.0 OpenSSL versions. On Ubuntu 
Trusty, with a RSA certificate, this will give you the following list;

==
ECDHE-RSA-AES128-GCM-SHA256 TLSv1.2 Kx=ECDH     Au=RSA  Enc=AESGCM(128) Mac=AEAD
ECDHE-RSA-AES128-SHA256 TLSv1.2 Kx=ECDH     Au=RSA  Enc=AES(128)  Mac=SHA256
ECDHE-RSA-AES128-SHA    SSLv3 Kx=ECDH     Au=RSA  Enc=AES(128)  Mac=SHA1
ECDHE-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH     Au=RSA  Enc=AESGCM(256) Mac=AEAD
ECDHE-RSA-AES256-SHA384 TLSv1.2 Kx=ECDH     Au=RSA  Enc=AES(256)  Mac=SHA384
ECDHE-RSA-AES256-SHA    SSLv3 Kx=ECDH     Au=RSA  Enc=AES(256)  Mac=SHA1
DHE-RSA-AES128-SHA      SSLv3 Kx=DH       Au=RSA  Enc=AES(128)  Mac=SHA1
AES256-SHA              SSLv3 Kx=RSA      Au=RSA  Enc=AES(256)  Mac=SHA1
AES128-SHA              SSLv3 Kx=RSA      Au=RSA  Enc=AES(128)  Mac=SHA1
DES-CBC3-SHA            SSLv3 Kx=RSA      Au=RSA  Enc=3DES(168) Mac=SHA1
==

Make sure you have the following active for your MSA;

smtpd_tls_loglevel = 1
tls_preempt_cipherlist = yes

Monitor your logs, for example with a script like this;

==
zgrep -h 'postfix/smtpd\[.* connection established from .* with cipher' * \
        | sed 's/^.* connection established from .*\]: //' | sort \
        | uniq -c | sort -r -n
==

This will give you a list most to least used ciphers in use, associated 
protocol, bit strength etc. Saved over time, you can monitor which 
ciphers are actually in use, what the impact will be if you want/need 
to disable an older cipher, and so on.

Based on your actual usage profile, which is much better data than a 
generic list of what clients might support, IMHO. And it can be traced 
back to a connecting IP address, the authenticated account, etc.

HTH,
Joni

Reply via email to