Viktor,

On Wed, Nov 7, 2018, at 12:03 AM, Viktor Dukhovni wrote:
> Check your logs for evidence of TLS <= 1.2 ciphers

Doing the quick check you mentioned, first for my messy 'test' server, results 
are just

        11 TLS_AES_256_GCM_SHA384

Those log messages, for me, are all generated on internal connections, e.g.,

        /var/log/postfix/postfix.log:Nov  4 15:21:45 mx 
postfix/postscreen-internal/smtpd[15675]: Anonymous TLS connection established 
from mx.example.com[XX.XX.XX.XX]: TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 
(256/256 bits)

IIUC (?), 'something' in my current config, is enabling that internal use of 
the TLS_AES_256_GCM_SHA384 cipher ... and, if I were to disable 
'keyEncipherment' and generate/use new certs, I'd likely drop to cleartext?

Here, atm,

        cat master.cf
                [mx.example.com]:25  inet  n  -  n  -  1  postscreen
                 -o postscreen_tls_security_level=may
                 -o smtpd_service_name=postscreen-internal
                 ...

                postscreen-internal  pass  -  -  n  -  -  smtpd
                 -o syslog_name=postfix/postscreen-internal
                 -o smtpd_tls_security_level=may
                 ...

and

        cat main.cf
                ...
                smtp_tls_mandatory_protocols     = !SSLv2, !SSLv3
                smtpd_tls_mandatory_protocols    = !SSLv2, !SSLv3
                tlsproxy_tls_protocols           = $smtpd_tls_protocols
                tlsproxy_tls_mandatory_protocols = 
$smtpd_tls_mandatory_protocols
                smtp_tls_protocols               = !SSLv2, !SSLv3
                smtpd_tls_protocols              = !SSLv2, !SSLv3
                lmtp_tls_protocols               = !SSLv2, !SSLv3
                lmtp_tls_mandatory_protocols     = !SSLv2, !SSLv3
                smtpd_tls_eecdh_grade = auto
                tls_eecdh_auto_curves = X25519 X448 secp384r1 prime256v1 
secp521r1
                tls_preempt_cipherlist = yes

                tls_high_cipherlist   = 
!PSK:!aDSS:!MD5:!kECDH:!kDH:!RC2:!RC5:!IDEA:!SEED!CAMELLIA:AEAD:-AEAD:CHACHA20:-CHACHA20:aNULL:-aNULL:HIGH:@STRENGTH
                tls_medium_cipherlist = 
!PSK:!aDSS:!MD5:!kECDH:!kDH:!RC2:!RC5:!IDEA:!SEED!CAMELLIA:AEAD:-AEAD:CHACHA20:-CHACHA20:aNULL:-aNULL:HIGH:MEDIUM:@STRENGTH

                smtpd_tls_mandatory_ciphers = medium
                smtpd_tls_ciphers           = medium
                smtpd_tls_mandatory_exclude_ciphers =  aNULL
                smtpd_tls_exclude_ciphers           = EXPORT, LOW, RC4, eNULL, 
NULL
                tlsproxy_tls_mandatory_exclude_ciphers = 
$smtpd_tls_mandatory_exclude_ciphers
                ...


If, in fact, I need to NOT use the "non-PFS RSA key transport", even for that 
internal transport, would I need to specifically, additionally exclude a 
particular cipher/protocol here?

Or is it simply not an issue, and unaffected, for this internal transport?

For that matter, is it possible to specifically limit that internal transport 
to a specific, efficient but secure, cipher?

I suspect it all needs a modernizing clean-up, since, admittedly, it's a bit 
long-in-the-tooth ...

Reply via email to