Re: Regarding ciphers

2017-11-23 Thread Jonathan Sélea
Thanks you very much! Very informative! On 2017-11-23 16:03, Mel Pilgrim wrote: > On 2017-11-23 01:30, Jonathan Sélea wrote: >> Hi, >> >> I did struggle alot to understand and deploy a secure cipher list that >> https://hardenize.com and https://ssl-tool.net would not complain on, so >> I came up

Re: Regarding ciphers

2017-11-23 Thread Mel Pilgrim
On 2017-11-23 01:30, Jonathan Sélea wrote: Hi, I did struggle alot to understand and deploy a secure cipher list that https://hardenize.com and https://ssl-tool.net would not complain on, so I came up with this: smtpd_tls_protocols = !SSLv2 !SSLv3 smtpd_tls_mandatory_protocols = !SSLv2 !SSLv3 s

Re: Regarding ciphers

2017-11-23 Thread Jonathan Sélea
Thanks both Allen and Dirk :) The ciphers should be supported by many server because thoose are used by TLS1.0 to 1.2. So I think they should be fine. I hope :) I did not get some real criticism yet about some stupid ciphers so I consider my current one OK. Regarding Allen's suggestion about

Re: Regarding ciphers

2017-11-23 Thread Dirk Stöcker
On Thu, 23 Nov 2017, Jonathan Sélea wrote: I did struggle alot to understand and deploy a secure cipher list that https://hardenize.com and https://ssl-tool.net would not complain on, so I came up with this: smtpd_tls_protocols = !SSLv2 !SSLv3 smtpd_tls_mandatory_protocols = !SSLv2 !SSLv3 smt

Re: Regarding ciphers

2017-11-23 Thread Allen Coates
On 23/11/17 09:30, Jonathan Sélea wrote: > > My question is, can I improve  this futher or do you guys/girls have any > opinion regarding this? > I am grateful for all comments, tips or other suggestions :) > > / Jonathan > Thinking at a tangent, if your messages are particularly sensitive, y

Re: Regarding ciphers

2017-11-23 Thread Allen Coates
On 23/11/17 09:30, Jonathan Sélea wrote: > My question is, can I improve  this futher or do you guys/girls have any > opinion regarding this? > I am grateful for all comments, tips or other suggestions :) > > / Jonathan > If the remote host does not support the cyphers you deploy, then you ha