Thanks you very much!
Very informative!

On 2017-11-23 16:03, Mel Pilgrim wrote:
> On 2017-11-23 01:30, Jonathan Sélea wrote:
>> Hi,
>>
>> I did struggle alot to understand and deploy a secure cipher list that
>> https://hardenize.com and https://ssl-tool.net would not complain on, so
>> I came up with this:
>>
>> smtpd_tls_protocols = !SSLv2 !SSLv3
>> smtpd_tls_mandatory_protocols = !SSLv2 !SSLv3
>> smtp_tls_protocols = !SSLv2 !SSLv3
>> smtp_tls_mandatory_protocols = !SSLv2 !SSLv3
>> lmtp_tls_protocols = !SSLv2 !SSLv3
>> lmtp_tls_mandatory_protocols = !SSLv2 !SSLv3
>> smtpd_tls_mandatory_ciphers=high
>> tls_high_cipherlist=EDH+CAMELLIA:EDH+aRSA:EECDH+aRSA+AESGCM:EECDH+aRSA+SHA384:EECDH+aRSA+SHA256:EECDH:+CAMELLIA256:+AES256:+CAMELLIA128:+AES128:+SSLv3:AES256-SHA:CAMELLIA128-SHA:AES128-SHA
>>
>> smtpd_tls_exclude_ciphers = aNULL, eNULL, EXPORT, DES, RC4, MD5, PSK,
>> aECDH, EDH-DSS-DES-CBC3-SHA, EDH-RSA-DES-CDC3-SHA, KRB5-DE5, CBC3-SHA,
>> CAMELLIA, SEED, 3DES, AES128-GCM-SHA256, AES256-GCM-SHA384,
>> AES128-SHA256, AES256-SHA256, AES256-SHA, AES128-SHA
>> smtpd_tls_eecdh_grade=ultra
>> tls_preempt_cipherlist = yes
>> tls_eecdh_strong_curve = prime256v1
>> tls_eecdh_ultra_curve = secp384r1
>>
>> My question is, can I improve  this futher or do you guys/girls have any
>> opinion regarding this?
>> I am grateful for all comments, tips or other suggestions :)
>
> For your public facing ports, the point is to provide an encrypted
> channel as often as possible. Public SMTP is effectively anonymous, so
> forcing high grade encryption is counterproductive.  I do suggest setting
>
> *_ciphers = high
>
> because the default of "medium" includes RC4 and 3DES, and I believe
> actively eradicating those from the wild is necessary and good.  I
> maintain some statistics about opportunistic STARTTLS and the last
> time I saw mandatory RC4 was 2015.  I have yet to see mandatory 3DES.
>
> The other thing is to set is
>
> *_protocols = !SSLv2, !SSLv3, TLSv1, TLSv1.1, TLSv1.2
>
> because some SSL libraries won't enable TLSv1.2 unless you explicitly
> tell it to do so.
>
> For internal SMTP, I have to deal with PCI and other infosec
> "standards", so the crypto used already requires regular review.  I
> also get to control the SMTP talker population, so I use
> certificate-based authentication with the following:
>
> *_tls_ciphers = !aNULL:AES256+kEECDH
> *_tls_protocols = !SSLv2, !SSLv3, !TLSv1, !TLSv1.1, TLSv1.2
>
> In a heterogenous network, particularly one with mobile devices or
> Window/MacOS that aren't on current release, you will need to relax
> the cipherspec to something like '!aNULL:AES+kEECDH:AES+kEDH:+SHA1'
> and enable TLSv1 and TLSv1.1.


Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

Reply via email to