> On Dec 2, 2017, at 12:08 PM, Maarten <mailingli...@feedmebits.nl> wrote:
> 
> I setup my postfix mailserver a while ago with tls settings from:
> 
> http://www.postfix.org/TLS_README.html
> 
> http://www.postfix.org/FORWARD_SECRECY_README.html
> 
> I don't know much about TLS settings so I used the settings which seemed be 
> important in the documentation.
> 
> When scanning my server with: https://www.hardenize.com 

Such caution is appropriate, some similar scanners are created by crypto
zealots who don't understand opportunistic TLS, and give frankly useless
or stupid recommendations.  See:

    https://tools.ietf.org/html/rfc7435

for a more pragmatic and generally more effective mindset.

> I got some results that need improvement:
> 
> - Server doesn't enforce cipher suite preferences: Servers that don't enforce 
> cipher suite preferences select the first cipher suite they support from the 
> list provided by clients. This approach doesn't guarantee that best-possible 
> cipher suite is negotiated.

This makes little difference.  And who's to say the server knows better than the
client.  Both are MTAs.

> -  Weak key exchange detected: his server uses key exchange parameters that 
> are
> weak.  When using the ephemeral Diffie-Hellman key exchange (DHE), parameters
> below 2048 bits are considered insecure. For sufficient security, use 2048-bit
> parameters. It is generally not advisable to use stronger key exchange because
> there is a measurable performance penalty and there is no meaningful increase
> in security. A well-configured TLS server should generally prefer the faster
> ECDHE key exchange anyway.

The FORWARD_SECRECY_README tutorial also recommends 2048-bit DHE parameters.
See there for details.


> - Reconfigure server to use forward secrecy and authenticated encryption:

This is wrong, what this site calls "authenticated encryption" (actually
AEAD) is actually rather more fragile than CBC with HMAC, relying on
non-reuse of "nonces" that can be difficult to achieve.  The various
attacks on CBC are browser-specific and have been addressed via the
"encrypt-then-mac" extension in modern TLS 1.2 stacks.  If both sides
support TLS 1.2 with encrypt-then-mac, you're likely safer than with
the more fashionable AEAD.

> Even though this server supports TLS 1.2, the cipher suite configuration is
> suboptimal. We recommend that you reconfigure the server so that the cipher
> suites providing forward secrecy (ECDHE or DHE in the name, in this order of
> preference) and authenticated encryption (GCM or CHACHA20 in the name) are
> at the top. The server must also be configured to select the best-available
> suite.

The Postfix cipher order is just fine.

> So I was wondering what are the recommended TLS settings for a postfix 
> mailserver
> now days? And what settings do I need to improve these points pointed out by 
> this
> scan?

Use the Postfix defaults, but configure 2048-bit DHE if your Postfix is older
than 3.1.  Starting with 3.1 the default built-in DHE parameters use a 2048-bit
prime.  You can of course still generate your own, for a bit of extra diversity
even with Postfix >= 3.1.

-- 
        Viktor.

Reply via email to