On Thu, Jan 02, 2020 at 06:35:17PM +0100, Bastian Blank wrote:

> On Thu, Jan 02, 2020 at 12:16:33PM -0500, James B. Byrne wrote:
> > Our revised cipher list is:
>
> Don't, as long as you don't enforce encryption as well.
> Don't use mail to transport payment data, so PCI is not applicable.

The above sounds quite reasonable to me.

On Thu, Jan 02, 2020 at 12:16:33PM -0500, James B. Byrne wrote:

> Jan  2 11:32:20 mx31 postfix-p25/smtpd[55167]: connect from
> rockmx03.rockwool.com[195.191.109.227]
> Jan  2 11:32:20 mx31 postfix-p25/smtpd[55167]: SSL_accept error from
> rockmx03.rockwool.com[195.191.109.227]: -1

That seems to suggest that the client disconnected in the middle of the
TLS handshake, leaving no usable SSL-layer error reason.

> When I connect to the sender I see this:

There's little reason to expect to learn much by connecting to the
sending domain's MX hosts.

> New, TLSv1.0, Cipher is ECDHE-RSA-AES256-SHA

The only think that's perhaps relevant is that TLSv1 was used
and not TLSv1.2, suggesting a rather dated inbound stack.

> 250 CHUNKING

The server runs Windows.

> We recently were forced by our PCI compliance audit to change our
> permissible ciphers.

It should be possible in many cases to talk some sense into the
auditors.  Was STARTTLS from the senders in question working before
the changes?

> # postconf | grep tls | grep cipher

[ Next time, "postconf -n" please. ]

> smtp_tls_ciphers = high
> smtp_tls_exclude_ciphers = MD5, aDSS, SRP, PSK, aECDH, aDH, SEED, IDEA, RC2, 
> RC4, RC5, DES, 3DES
> smtp_tls_mandatory_ciphers = high

These don't affect inbound mail.

> smtpd_tls_ciphers = high
> smtpd_tls_mandatory_ciphers = high
> smtpd_tls_exclude_ciphers = aNULL, eNULL, EXPORT, DES, RC4, MD5, PSK,
>    aECDH, EDH-DSS-DES-CBC3-SHA, EDH-RSA-DES-CBC3-SHA, KRB5-DES, CBC3-SHA

The cipher exclusions above look rather haphazard.  Saner would be:

    smtpd_tls_exclude_ciphers = MD5, aDSS, kECDH, kDH, 3DES, RC4, SEED, IDEA, 
RC2, RC5

What protocol versions do you have enabled?  More likely the issue is
that you've disabled TLS 1.0.

> I would appreciate any guidance as to how to correct this issue
> without running afoul of the PCI DSS.

Leave TLS 1.0 enabled for now, it is adequately secure for opportunistic
TLS in SMTP.

-- 
    Viktor.

Reply via email to