Steffen Nurpmeso skrev den 2023-01-07 19:35:
Matus UHLAR - fantomas wrote in
 <Y7l7qS2IF/mxz...@fantomas.sk>:
 ...
 |one
 |can disable aDH by adding it to smtp_tls_mandatory_exclude_ciphers.

Just last week with the new lighttpd update i followed his
maintainer by doing (the EDH+AESGCM is _my_ addition, blame _me_
for that, it adds four combinations):

  # super modern, forward secrecy TLSv1.2 / TLSv1.3 selection..
  tls_high_cipherlist = EECDH+AESGCM:EECDH+AES256:EDH+AESGCM:CHACHA20
  smtpd_tls_mandatory_ciphers = high
  smtpd_tls_mandatory_exclude_ciphers = TLSv1

For long (many, many months) i have

  smtpd_tls_mandatory_protocols = >=TLSv1.2
  smtpd_tls_protocols = $smtpd_tls_mandatory_protocols

All this transported to other (client etc) via such var
assignments.
I have no fallout after two days (in which i had bitten the
bullet and really read through the logs; yet; i also presumed he
did some careful investigation before being that rigid, so).

Received: by kent.sdaoden.eu (Postfix, from userid 1000)
        id 25D02B4B1E; Sat,  7 Jan 2023 19:35:21 +0100 (CET)
Date: Sat, 07 Jan 2023 19:35:21 +0100
Author: Steffen Nurpmeso <stef...@sdaoden.eu>
From: Steffen Nurpmeso <stef...@sdaoden.eu>

you are not using postfix imho when it make "RCVD_ILLEGAL_IP Received: contains illegal IP address" in spamassassin test

Reply via email to