In message <20160122213312.gk25...@mournblade.imrryr.org> Viktor Dukhovni writes: > On Fri, Jan 22, 2016 at 03:14:22PM -0500, Curtis Villamizar wrote: > > > You might > > also want to report that the keys they use are less than LOW security > > but that might be a feature. > > You're mistaken. These ciphers are HIGH. > > > Note that none of the ciphers used by comcast.net support even low > > strength and forward secrecy. > > You're mistaken. > > > So for me falling that far back to encoding in 56 bit DES and a SHA1 > > MAC seems a bit too far backwards to go (back to SSLv3 days). > > You're mistaken. > > -- > Viktor.
Viktor, Yes. I rechecked. I was mistaken. These four are high and offer forward secrecy. DHE-RSA-AES128-SHA DHE-DSS-AES128-SHA DHE-RSA-AES256-SHA DHE-DSS-AES256-SHA Due to the naming used: Cipher Suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA (0x0033) Cipher Suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA (0x0032) Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA (0x002f) Cipher Suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA (0x0039) Cipher Suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA (0x0038) Cipher Suite: TLS_RSA_WITH_AES_256_CBC_SHA (0x0035) Cipher Suite: TLS_RSA_WITH_RC4_128_SHA (0x0005) Cipher Suite: TLS_RSA_WITH_RC4_128_MD5 (0x0004) I did a few openssl ciphers commands and greps for CBC-SHA and CBC3-SHA and got the wrong ones based on the naming. I redid this with openssl ciphers -V and used to hex codes. The last two are MEDIUM. The other six are HIGH. Four offer forward secrecy, the ones starting the DHE. My understanding is that RC4 has multiple proven vulnerabilities so not using the last two is justified. SHA1 should be avoided, but admitedly no one would bother with the computational load needed for a SHA1 attack on our opportunistic TLS email, particularly no spammer trying to find a relay to use. You did not respond to the rest of the email. Any comments on the rest of it? So for now I'll stick with what I have as it is not a problem otherwise and add: smtpd_discard_ehlo_keyword_address_maps = cidr:/etc/postfix/no-tls-for-you no-tls-for-you: 69.252.207.0/24 starttls 96.114.154.0/24 starttls 69.252.76.0/24 starttls 76.96.68.0/24 starttls 2001:558:fe16:19::/64 starttls 2001:558:fe21:29::/64 starttls That covers the comcast.net mail servers according to https://postmaster.comcast.net/outbound-mail-servers.html In reviewing the logs very few non-spammer domains seem to be failing. The most concerning non-spammer is cloud9.net. I'm still considering keeping the primary MX with the same sort of key and using either no TLS or a weaker key on the secondary MX. I'll also run tcpdump on the cloud9.net addresses and run it through tshark and see what the problem is there. If it is simply that they don't use ECDSA or AESGCM, but they do offer something reasonable, then I'll consider creating an alternate key. Otherwise I'll just add them to the cidr file. I hope someone at cloud9.net is reading this (they do host the postfix mailing lists), but if not I'll send off-list email. Either way I'll continue to watch the logs (or cron will) for 'SSL_accept error' lines (fail) and for 'Trusted TLS connection from' (trusted) or 'TLS connection established from' (anon or untrusted). Having a strict primary MX and a weak secondary allows me to do this logging without dropping mail. Note that smtpd_tls_ask_ccert does no damage as the client key is accepted as untrusted and then AUTH is not offered but relay to my MDAs still happens [...] Ammending the above, now knowing that the comcast.net keys are high. I might just add a longish RSA key as a solution for comcast.net but keeping high in place. That might also solve the cloud9.net and one or two others that are non-spammers and currently fail and fall back to the secondary MX. [aside: Perhaps ECDSA-AES256-GCM-SHA384 was a bit too much for email. It seems to not upset HTTPS and browsers. OTOH- TLSA/DANE support in browsers is non-existant without plugins but available for email.] Thanks again. Curtis