On Sat, Aug 12, 2023 at 09:47:57AM -0400, pgnd via Postfix-users wrote:

>       postconf mail_version
>               mail_version = 3.8.1

As background, the RELEASE_NOTES for 3.8 mention:

    - Postfix default settings now exclude the following deprecated or
      unused ciphers (SEED, IDEA, 3DES, RC2, RC4, RC5), digest (MD5),
      key exchange algorithms (DH, ECDH), and public key algorithm
      (DSS).

> postfix/psint/smtpd[27820]:
>    esa.hc2802-61.iphmx.com[139.138.32.157]: TLS cipher list
>   
> "aNULL:-aNULL:HIGH:MEDIUM:!SEED:!IDEA:!3DES:!RC2:!RC4:!RC5:!kDH:!kECDH:!aDSS:!MD5:+RC4:@STRENGTH:!aNULL"

Which is most of the above, but you also disable aNULL, which though
unrelated to the problem, is counter-productive.  Let the checklists
give you a lower score for this, they're all wrong:

    https://datatracker.ietf.org/doc/html/rfc7672#section-8.2

> Handshake type: 01 (Client Hello)
> Length: 00 00 9c (156)
> Version: 03 03 (TLS 1.2)
> Random: 7fbaca0fba3b79079e6a72e14386d52b89659fa1756b243e2b84673ad8faa72a
> Session ID length:  00 (0)
> Cipher Suites length: 00 2e (46)
>  0xC0,0x30 1 ECDHE-RSA-AES256-GCM-SHA384 Au=RSA
>  0xC0,0x28 2 ECDHE-RSA-AES256-SHA384 Au=RSA
>  0xC0,0x14 3 ECDHE-RSA-AES256-SHA Au=RSA
>  0x00,0x9F 4 DHE-RSA-AES256-GCM-SHA384 Au=RSA
>  0x00,0x6B 5 DHE-RSA-AES256-SHA256 Au=RSA
>  0x00,0x39 6 DHE-RSA-AES256-SHA Au=RSA
>  0x01,0x88 7 ???
>  0x00,0x9D 8 AES256-GCM-SHA384 Au=RSA
>  0x00,0x3D 9 AES256-SHA256 Au=RSA
>  0x00,0x35 10 AES256-SHA Au=RSA
>  0x00,0x84 11 CAMELLIA256-SHA Au=RSA
>  0xC0,0x2F 12 ECDHE-RSA-AES128-GCM-SHA256 Au=RSA
>  0xC0,0x27 13 ECDHE-RSA-AES128-SHA256 Au=RSA
>  0xC0,0x12 14 ECDHE-RSA-DES-CBC3-SHA Au=RSA
>  0x00,0x9E 15 DHE-RSA-AES128-GCM-SHA256 Au=RSA
>  0x00,0x67 16 DHE-RSA-AES128-SHA256 Au=RSA
>  0x00,0x33 17 DHE-RSA-AES128-SHA Au=RSA
>  0x00,0x45 18 DHE-RSA-CAMELLIA128-SHA Au=RSA
>  0x00,0x9C 19 AES128-GCM-SHA256 Au=RSA
>  0x00,0x3C 20 AES128-SHA256 Au=RSA
>  0x00,0x2F 21 AES128-SHA Au=RSA
>  0x00,0x40 22 DHE-DSS-AES128-SHA256 Au=DSS
>  0x00,0xFF 23 TLS_EMPTY_RENEGOTIATION_INFO_SCSV
> ...

All the ciphersuites offered except one (DSS) are RSA.

> i've been dialing up logging, and dialing down sec levels, trying to
> figure out what specific cipher from  the sender's server is causing
> the problem, not being offered/found, etc.

Less verbose logging, and a PCAP capture of an attempted TLS handshake
would have been more useful.  My money is on an ECDSA server
certificate, which is still a bit too "exotic" for some older SMTP
clients.

> currently / so far, this server's config is
> 
>  $ postconf -n | grep -i tls | grep -i cipher
>  smtp_tls_exclude_ciphers = EXP, LOW, MEDIUM, aNULL, eNULL, SRP, PSK,
>    kDH, DH, kRSA, DHE, DSS, RC4, DES, IDEA, SEED, ARIA, CAMELLIA,
>    AESCCM8, 3DES, ECDHE-ECDSA-AES256-SHA384,
>    ECDHE-ECDSA-AES128-SHA256, ECDHE-RSA-AES256-SHA384,
>    ECDHE-RSA-AES128-SHA256, MD5, SHA

Though not relevant for the SMTP server, just stick with the defaults,
the above hodge-podge just leads to more email going out in the clear.

-- 
    Viktor.

P.S. I don't see where the '!aNULL' came from.  Do you have
"smtpd_tls_ask_ccert = yes" in master.cf?  Or some other reason why
anonymous DH ciphers would have been excluded?
_______________________________________________
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org

Reply via email to