> On Apr 13, 2017, at 11:28 AM, Zbyszek Żółkiewski <t...@onefellow.com> wrote:
> 
> all looks good except _outgoing_ mail that still uses 
> ECDHE-RSA-AES128-GCM-SHA256. Incoming mail is using 
> ECDHE-ECDSA-AES256-GCM-SHA384 and clients as well are using 
> ECDHE-ECDSA-AES256-GCM-SHA384.
> 
> so where is problem ? settings are:
> 
> smtp_tls_ciphers = high
> smtp_tls_mandatory_ciphers = high
> smtpd_tls_ciphers = high
> smtpd_tls_mandatory_ciphers = high
> tls_high_cipherlist = 
> ECDSA:AESGCM:aNULL:-aNULL:ALL:!EXPORT:!LOW:!MEDIUM:+RC4:@STRENGTH

Please stop.

In trying to make your server "more secure" you're making it less secure.
See https://tools.ietf.org/html/rfc7435 for why.

The reason outgoing mail is not using ECDSA is that almost nobody has configured
ECDSA certificates along with their RSA certificates on their MX hosts.  No 
matter
how fancy your SMTP client configuration the server won't suddenly acquire an 
ECDSA
key-pair.

The fewer changes you make to the Postfix TLS cipher settings, the more likely
you're to have a reasonably secure and interoperable configuration.

It is at this time not unreasonable to set "tls_preempt_cipherlist = yes" if
some of your SMTP clients have "poor" cipher preferences.

You can also exclude some truly obsolete ciphers via:

    smtp_tls_exclude_ciphers = MD5, aDSS, kECDH, kDH, SEED, IDEA, RC2, RC5

which makes for a more compact TLS ClientHello.  This is generally not
needed.  Some of these exclusions might happen by default in a future
Postfix release.  The MD5, kDH and kECDH ciphers are largely gone from
OpenSSL 1.1.0 and later.  Only the eNULL MD5 cipher remains:

    $ openssl ciphers -v MD5:kDH:kECDH
    NULL-MD5                SSLv3 Kx=RSA      Au=RSA  Enc=None      Mac=MD5

-- 
        Viktor.

Reply via email to