On Thu, Jan 14, 2016 at 12:06:43PM -0500, Curtis Villamizar wrote:

> /usr/local/sbin/postconf -c /etc/postfix -n | grep tls
> 
> smtp_tls_cert_file = /etc/postfix/cert.pem
> smtp_tls_key_file = /etc/postfix/key.pem

    Usually best to not configure client certificates.

> smtp_tls_ciphers = high

    Usually best to leave this at "medium".  This is opportunistic
    TLS, and if high fails, you'll send cleartext, which is NOT
    stronger than medium.

> smtp_tls_exclude_ciphers = aNULL MD5 DES

    Mostly harmless, but not ideal.  Instead try:

        smtp_tls_exclude_ciphers =
            MD5, SRP, PSK, aDSS, kECDH, kDH, SEED, IDEA, RC2, RC5

> smtp_tls_mandatory_protocols = !SSLv2 !SSLv3 !TLSv1.1

    This is a terrible idea, it results in unconditional use of
    TLS 1.0 (the hole in that list).  If you really want to force
    TLSv1.2, then you must also disable TLSv1

> smtp_tls_protocols = !SSLv2 !SSLv3 !TLSv1.1

    This is worse, your opportunistic TLS is constrained to
    TLSv1.

> smtpd_tls_ask_ccert = yes

    To you do anything with client certs?  If not, don't request
    them.

> smtpd_tls_cert_file = /etc/postfix/cert.pem
> smtpd_tls_key_file = /etc/postfix/key.pem

    What kind of key is that?  RSA or ECDSA?  Can you
    post the output of: 

    openssl x509 -in /etc/postfix/cert.pem -noout -text | egrep -v ':.*:.*:'

> smtpd_tls_ciphers = high

    This is a bad idea, leave it at medium.

> smtpd_tls_exclude_ciphers = aNULL MD5 DES

    This is not needed.

> smtpd_tls_loglevel = 2

    Level 1 is just right, 2 is too much.

> smtpd_tls_mandatory_ciphers = high
> smtpd_tls_mandatory_protocols = !SSLv2 !SSLv3 !TLSv1.1

    Less harmful on servers, but what do you have against TLSv1.1?
    It is not worse than TLSv1, in fact somewhat better.  Choose
    one of:

    smtpd_tls_mandatory_protocols = !SSLv2 !SSLv3
    smtpd_tls_mandatory_protocols = !SSLv2 !SSLv3 !TLSv1 !TLSv1.1

> smtpd_tls_protocols = !SSLv2 !SSLv3 !TLSv1.1

    For opportunistic TLS leave TLSv1, TLSv1.1 and TLSv1.2 enabled.

        smtpd_tls_protocols = !SSLv2 !SSLv3

    you're changing too many carefully chosen default settings,
    and doing more harm than good.

> smtpd_tls_session_cache_timeout = 300

   Longer is better, especially with Postfix 2.11+ and session
   tickets.  Let the default stand.

> tls_dane_digest_agility = on
> tls_dane_digests = sha512 sha256
> tls_dane_trust_anchor_digest_enable = yes
> tls_wildcard_matches_multiple_labels = yes

    These are defaults, don't force them on explicitly.

> tls_disable_workarounds = 0xFFFFFFFF

    Are you sure that's a good idea?  This is opportunistic TLS.

> tls_preempt_cipherlist = yes
> tls_ssl_options = NO_COMPRESSION

    These are fine.



> /usr/local/bin/openssl version -a
> 
> OpenSSL 1.0.2e 3 Dec 2015

OK.

> mta1 (secondary MX)
> 
> OpenSSL 1.0.2d 9 Jul 2015

Upgrade this one perhaps.

-- 
        Viktor.

Reply via email to