Thanks both Allen and Dirk :)The ciphers should be supported by many server because thoose are used by TLS1.0 to 1.2. So I think they should be fine. I hope :) I did not get some real criticism yet about some stupid ciphers so I consider my current one OK.
Regarding Allen's suggestion about PGP/GPG. I already use s/MIME as you probably can see in email clients like Thunderbird, Outlook and Evolution.
/J On 11/23/2017 02:15 PM, Dirk Stöcker wrote:
On Thu, 23 Nov 2017, Jonathan Sélea wrote:I did struggle alot to understand and deploy a secure cipher list that https://hardenize.com and https://ssl-tool.net would not complain on, so I came up with this:smtpd_tls_protocols = !SSLv2 !SSLv3 smtpd_tls_mandatory_protocols = !SSLv2 !SSLv3 smtp_tls_protocols = !SSLv2 !SSLv3 smtp_tls_mandatory_protocols = !SSLv2 !SSLv3 lmtp_tls_protocols = !SSLv2 !SSLv3 lmtp_tls_mandatory_protocols = !SSLv2 !SSLv3 smtpd_tls_mandatory_ciphers=hightls_high_cipherlist=EDH+CAMELLIA:EDH+aRSA:EECDH+aRSA+AESGCM:EECDH+aRSA+SHA384:EECDH+aRSA+SHA256:EECDH:+CAMELLIA256:+AES256:+CAMELLIA128:+AES128:+SSLv3:AES256-SHA:CAMELLIA128-SHA:AES128-SHA smtpd_tls_exclude_ciphers = aNULL, eNULL, EXPORT, DES, RC4, MD5, PSK, aECDH, EDH-DSS-DES-CBC3-SHA, EDH-RSA-DES-CDC3-SHA, KRB5-DE5, CBC3-SHA, CAMELLIA, SEED, 3DES, AES128-GCM-SHA256, AES256-GCM-SHA384, AES128-SHA256, AES256-SHA256, AES256-SHA, AES128-SHAsmtpd_tls_eecdh_grade=ultra tls_preempt_cipherlist = yes tls_eecdh_strong_curve = prime256v1 tls_eecdh_ultra_curve = secp384r1My question is, can I improve this futher or do you guys/girls have any opinion regarding this?I am grateful for all comments, tips or other suggestions :)Nothing gets older faster that cipher specifications. Usually it is the best to use a recent version of the SSL libraries and don't change the specs. The defaults incorporate the most recent developments.If SSLv2, SSLv3 and RC4 are still supported by default on your system instead of tuning the specs an update of the software is recommended.P.S. You always need to keep in mind that you will fallback to plaintext, so a bad cipher is (usually) better than none.Ciao
smime.p7s
Description: S/MIME Cryptographic Signature