> On Dec 4, 2017, at 8:22 AM, Jonathan Sélea <jonat...@selea.se> wrote:
> 
> I recently stumbled upon hardinze too, and came up with this config that 
> makes the checks "all green".

Green per some poorly designed checklist is not necessarily better.

> smtpd_tls_protocols = !SSLv2 !SSLv3
> smtpd_tls_mandatory_protocols = !SSLv2 !SSLv3
> smtp_tls_protocols = !SSLv2 !SSLv3
> smtp_tls_mandatory_protocols = !SSLv2 !SSLv3
> lmtp_tls_protocols = !SSLv2 !SSLv3
> lmtp_tls_mandatory_protocols = !SSLv2 !SSLv3

These are fine and default in all supported Postfix versions.

> smtpd_tls_mandatory_ciphers=high

This may be counter-productive.  You're forcing peers that
only do RC4 to send in the clear instead.  Probably not a 
win, and with peers that can do HIGH ciphers, you get HIGH
anyway.  On the other hand support for only RC4 or 3DES
(now medium in some newer OpenSSL versions) is rare, most
peers will support AES, and yet "medium" is still a better
choice for opportunistic TLS.

> tls_high_cipherlist=EDH+CAMELLIA:EDH+aRSA:EECDH+aRSA+AESGCM:EECDH+aRSA+SHA384:EECDH+aRSA+SHA256:EECDH:+CAMELLIA256:+AES256:+CAMELLIA128:+AES128:+SSLv3:AES256-SHA:CAMELLIA128-SHA:AES128-SHA

Don't hand-order your ciphers.  Why CAMELLIA above AES for example?
And what happens when newer ciphers show up?

> smtpd_tls_exclude_ciphers = aNULL, eNULL, EXPORT, DES, RC4, MD5, PSK, aECDH, 
> EDH-DSS-DES-CBC3-SHA, EDH-RSA-DES-CDC3-SHA, KRB5-DE5, CBC3-SHA, CAMELLIA, 
> SEED, 3DES, AES128-GCM-SHA256, AES256-GCM-SHA384, AES128-SHA256, 
> AES256-SHA256, AES256-SHA, AES128-SHA

Excluding aNULL on a port 25 server is mostly counter-productive:

   https://tools.ietf.org/html/rfc7672#section-8.2

ditto with DES3 and RC4, just put them at the end.  Funny you put
CAMELLIA first on your cipher list, and then exclude it!  And
then exclude a bunch of strong AES ciphers.  This clearly makes the
point that such guides and efforts to get to "green" are a bad idea.

> smtpd_tls_eecdh_grade=ultra

Actually "auto" is a much better setting in Postfix versions that
support it.

> tls_preempt_cipherlist = yes

This is typically OK, though in your case, the client's settings
might be more sensible. :-(

> tls_eecdh_strong_curve = prime256v1
> tls_eecdh_ultra_curve = secp384r1

These are defaults.

> smtpd_tls_dh512_param_file = /etc/ssl/dh512_param.pem
> smtpd_tls_dh1024_param_file = /etc/ssl/dh2048_param.pem

This is fine, provided the names match the content.  Note that
with EXPORT ciphers disabled the 512-bit parameters will never
be used.

-- 
        Viktor.

Reply via email to