Re: Mitigating DROWN

2016-03-11 Thread John A @ KLaM
Thanks, I will keep 3DES for now. My dentist does not have to worry, it was a transcription error.

Re: Mitigating DROWN

2016-03-11 Thread Viktor Dukhovni
On Fri, Mar 11, 2016 at 10:27:17AM -0500, John A @ KLaM wrote: > As a result of following various - how tos, warnings, notices etc., I > currentky exclude from both smtp & smtpd > > aNULL, DES, 3DES, MD5, RC2. RC4, > RC5, IDEA, SRP, PSK, aDDS, kECDhe, > kECDhr, kDHd, kDHr, SEED,

Re: Mitigating DROWN

2016-03-11 Thread John A @ KLaM
As yhe result of following various - how tos, warnings, notices etc., I currentky exclude from both smtp & smtpd "aNULL, DES, 3DES, MD5, RC2. RC4. RC5, IDEA, SRP, PSK, aDDS, kECDhe, kECDhr, kDHd, kDHr, SEED, IDEA, LOW, EXPORT" Is this list reasonable and/or accurate.

Re: Mitigating DROWN

2016-03-10 Thread Viktor Dukhovni
On Thu, Mar 10, 2016 at 04:40:37PM -0600, Blake Hudson wrote: > >>>smtpd_tls_exclude_ciphers = > >>>EXPORT, LOW, MD5, SEED, IDEA, RC2 > >>> smtp_tls_exclude_ciphers = > >>>EXPORT, LOW, MD5, aDSS, kECDHe, kECDHr, kDHd, kDHr, SEED, IDEA, RC2 > >With opportunistic TLS one should be

Re: Mitigating DROWN

2016-03-10 Thread Blake Hudson
Viktor Dukhovni wrote on 3/10/2016 11:57 AM: On Thu, Mar 10, 2016 at 05:22:22AM -0700, @lbutlr wrote: smtpd_tls_exclude_ciphers = EXPORT, LOW, MD5, SEED, IDEA, RC2 smtp_tls_exclude_ciphers = EXPORT, LOW, MD5, aDSS, kECDHe, kECDHr, kDHd, kDHr, SEED, IDEA, RC2 With opportunis

Re: Mitigating DROWN

2016-03-10 Thread Viktor Dukhovni
On Thu, Mar 10, 2016 at 05:22:22AM -0700, @lbutlr wrote: > > smtpd_tls_exclude_ciphers = > >EXPORT, LOW, MD5, SEED, IDEA, RC2 > > smtp_tls_exclude_ciphers = > >EXPORT, LOW, MD5, aDSS, kECDHe, kECDHr, kDHd, kDHr, SEED, IDEA, RC2 With opportunistic TLS one should be somewhat cauti

Re: Mitigating DROWN

2016-03-10 Thread Joan AymĂ 
El 10/03/16 a les 13:22, @lbutlr ha escrit: > smtpd_tls_exclude_ciphers = aNULL, DES, 3DES, MD5, DES+MD5, RC4, LOW, EXPORT > smtp_tls_exclude_ciphers = MD5, aDSS, SRP, PSK, aECDH, aDH, SEED, IDEA, RC2, > RC5 I have set this on my postfix: smtp_tls_exclude_ciphers = MEDIUM, LOW, aNULL, eNULL, SE

Re: Mitigating DROWN

2016-03-10 Thread @lbutlr
On Tue Mar 01 2016 10:16:51 Viktor Dukhovni said: > > smtpd_tls_exclude_ciphers = >EXPORT, LOW, MD5, SEED, IDEA, RC2 > smtp_tls_exclude_ciphers = >EXPORT, LOW, MD5, aDSS, kECDHe, kECDHr, kDHd, kDHr, SEED, IDEA, RC2 I have smtpd_tls_exclude_ciphers = aNULL, DES, 3DES, MD5

Re: Mitigating DROWN

2016-03-09 Thread Marc Patermann
Am 03.03.2016 um 19:29 Uhr schrieb Viktor Dukhovni: Postfix 2.6 and later, with the recommended settings is sufficient, but it is recommended that you also deploy OpenSSL 1.0.1s or 1.0.2g, or your O/S vendor's "equivalent" update. It is sadly common to selectively backport fixes without changing

Re: Mitigating DROWN

2016-03-03 Thread Viktor Dukhovni
On Thu, Mar 03, 2016 at 05:14:30PM +0100, Marc Patermann wrote: > Am 01.03.2016 um 18:16 Uhr schrieb Viktor Dukhovni: > > >Some of the servers that expose TLS to cross-protocol DROWN attacks > >via SSLv2 are MTAs running Postfix. If you're using an older > >Postfix release (released prior to July

Re: Mitigating DROWN

2016-03-03 Thread Viktor Dukhovni
On Thu, Mar 03, 2016 at 09:03:55AM -0600, Blake Hudson wrote: > Viktor Dukhovni wrote on 3/1/2016 11:16 AM: > ># Suggested, not strictly needed: > ># > >smtpd_tls_exclude_ciphers = > > EXPORT, LOW, MD5, SEED, IDEA, RC2 > >smtp_tls_exclude_ciphers = > > EXPORT, LOW,

Re: Mitigating DROWN

2016-03-03 Thread Marc Patermann
Viktor, Am 01.03.2016 um 18:16 Uhr schrieb Viktor Dukhovni: Some of the servers that expose TLS to cross-protocol DROWN attacks via SSLv2 are MTAs running Postfix. If you're using an older Postfix release (released prior to July 20 2015), or you've explicitly configured TLS settings that may ha

Re: Mitigating DROWN

2016-03-03 Thread John Allen
Is the following reasonable and/or acceptable, and a better question - will it work? smtp_dns_support_level = dnssec smtp_tls_security_level = dane smtp_tls_ciphers = medium smtp_tls_exclude_ciphers = EXPORT, LOW, IDEA, 3DES, MD5, SRP, PSK, aDSS, kECDHe, kECDhr, kDHd, kDHr, SEED, IDEA, RC2, RC5

Re: Mitigating DROWN

2016-03-03 Thread Blake Hudson
Viktor Dukhovni wrote on 3/1/2016 11:16 AM: # Suggested, not strictly needed: # smtpd_tls_exclude_ciphers = EXPORT, LOW, MD5, SEED, IDEA, RC2 smtp_tls_exclude_ciphers = EXPORT, LOW, MD5, aDSS, kECDHe, kECDHr, kDHd, kDHr, SEED, IDEA, RC2 I noticed your exclude

Re: Mitigating DROWN

2016-03-02 Thread Viktor Dukhovni
On Wed, Mar 02, 2016 at 10:22:12PM -0700, Richard B. Pyne wrote: > I've added all but the forward secrecy part on my email server running > postfix 2.10.1 (the latest in the CentOS7 repository), and > test.drownattack.com still reports vulnerability on port 25. Any help will > be greatly appreciat

Re: Mitigating DROWN

2016-03-02 Thread Richard B. Pyne
I've added all but the forward secrecy part on my email server running postfix 2.10.1 (the latest in the CentOS7 repository), and test.drownattack.com still reports vulnerability on port 25. Any help will be greatly appreciated. postconf -nf alias_database = hash:/etc/aliases alias_maps = has

Mitigating DROWN

2016-03-01 Thread Viktor Dukhovni
Some of the servers that expose TLS to cross-protocol DROWN attacks via SSLv2 are MTAs running Postfix. If you're using an older Postfix release (released prior to July 20 2015), or you've explicitly configured TLS settings that may have enabled SSLv2, please update your configuration as suggeste