On 25 May 2015, at 13:23, Viktor Dukhovni <postfix-us...@dukhovni.org> wrote:

> On Mon, May 25, 2015 at 10:36:24AM +0200, DTNX Postmaster wrote:
> 
>> I am talking about the MSA here, Viktor, not MTA to MTA traffic. That's 
>> what the previous poster was asking about;
> 
> My advice stands.  Avoid overly explicit cipher lists.  Go with
> broad categories, with some exclusions as necessary.
> 
> The main thing that's changed since Postfix default settings were
> put in place is that it is no longer necessary or advisavle to
> support "export" or "low" ciphersuites.   We'll likely disable
> "export" and "low" by default in Postfix 3.1 (subject to a suitable
> compatibility control).
> 
> -- 
>       Viktor.

No, not for submission, where clients will submit their authentication 
details, allowing them to bypass most of the restrictions that are in 
place for MTA to MTA communication.

Especially older clients have less than optimal cipher selections if 
you leave the choice to the connecting software, whereas deliberately 
specifying a fairly strict set of ciphers and enforcing the cipher 
order leads to better behaviour.

There is no reason to let Outlook Express on Windows XP prefer RC4 over 
3DES, for example. But that's what Schannel clients on XP/2003 will do 
if you let them, and I bet it isn't the only older toolkit that does 
this.

For the MSA, be overly specific. Enforce cipher order. Enforce 
STARTTLS, make sure there is no plain text fallback.

If you think you might still need RC4, add 'RC4-SHA' at the end of the 
list, then monitor your logs for actual usage. There's a pretty big 
chance you'll be able to disable it altogether, followed by 3DES at a 
later date, when the need arises.

Mvg,
Joni

Reply via email to