possible to reach hardenize's requirements?

2019-04-12 Thread micah anderson
The site https://hardenize.com provides relatively decent Email reports, along with other reports. It checks a number of things including certs, MTA-STS, TLS-RPT, DANE, SPF, DMARC, and then also TLS. These are all good checks and recommendations, with the exception of the TLS one, I do not see ho

Re: possible to reach hardenize's requirements?

2019-04-12 Thread micah anderson
micah anderson writes: > 2. Server suite preferences: they break down each preferred cipher > selection for each TLS verison, and are unhappy about the cipher suite > configuration being suboptimal, specifically that the forward secrecy > ciphers (ECDHE or DHE) and authenticated encryption (GCM o

Re: possible to reach hardenize's requirements?

2019-04-12 Thread Scott Kitterman
On Friday, April 12, 2019 10:46:50 AM micah anderson wrote: > The site https://hardenize.com provides relatively decent Email reports, > along with other reports. It checks a number of things including certs, > MTA-STS, TLS-RPT, DANE, SPF, DMARC, and then also TLS. These are all > good checks and r

Re: possible to reach hardenize's requirements?

2019-04-12 Thread Per Thorsheim
Den 12/04/2019 17:09, skrev Scott Kitterman: On Friday, April 12, 2019 10:46:50 AM micah anderson wrote: The site https://hardenize.com provides relatively decent Email reports, along with other reports. It checks a number of things including certs, MTA-STS, TLS-RPT, DANE, SPF, DMARC, and then a

Re: possible to reach hardenize's requirements?

2019-04-12 Thread Viktor Dukhovni
> On Apr 12, 2019, at 10:46 AM, micah anderson wrote: > > I know that 'hardening postfix' threads have been posted here a number > of times, I've read them and I understand the recommendations if you > want to continue delivering and accepting email from the internet. What > I'm trying to find ou

Re: possible to reach hardenize's requirements?

2019-04-12 Thread @lbutlr
On 12 Apr 2019, at 08:46, micah anderson wrote: > he site https://hardenize.com provides relatively decent Email reports, > along with other reports. It checks a number of things including certs, > MTA-STS, TLS-RPT, DANE, SPF, DMARC, and then also TLS. These are all > good checks and recommendatio

Re: possible to reach hardenize's requirements?

2019-04-12 Thread micah anderson
Viktor Dukhovni writes: >> On Apr 12, 2019, at 10:46 AM, micah anderson wrote: >> >> I know that 'hardening postfix' threads have been posted here a number >> of times, I've read them and I understand the recommendations if you >> want to continue delivering and accepting email from the interne

Re: possible to reach hardenize's requirements?

2019-04-12 Thread micah anderson
Scott Kitterman writes: > On Friday, April 12, 2019 10:46:50 AM micah anderson wrote: >> The site https://hardenize.com provides relatively decent Email reports, >> along with other reports. It checks a number of things including certs, >> MTA-STS, TLS-RPT, DANE, SPF, DMARC, and then also TLS. Th

Re: possible to reach hardenize's requirements?

2019-04-12 Thread micah anderson
"@lbutlr" writes: > On 12 Apr 2019, at 08:46, micah anderson wrote: >> he site https://hardenize.com provides relatively decent Email reports, >> along with other reports. It checks a number of things including certs, >> MTA-STS, TLS-RPT, DANE, SPF, DMARC, and then also TLS. These are all >> goo

Re: possible to reach hardenize's requirements?

2019-04-12 Thread Viktor Dukhovni
> On Apr 12, 2019, at 11:47 AM, @lbutlr wrote: > > I'm not impressed. It complains that STARTTLS is not available on my server. > It is true it is not available on port 25, ut is available on port 587 where > it should be. Frankly, best practice nowadays is to also have STARTTLS on port 25. Pe

Re: possible to reach hardenize's requirements?

2019-04-12 Thread Bill Cole
On 12 Apr 2019, at 11:47, @lbutlr wrote: On 12 Apr 2019, at 08:46, micah anderson wrote: he site https://hardenize.com provides relatively decent Email reports, along with other reports. It checks a number of things including certs, MTA-STS, TLS-RPT, DANE, SPF, DMARC, and then also TLS. Thes

Re: possible to reach hardenize's requirements?

2019-04-12 Thread Wietse Venema
Viktor Dukhovni: > > On Apr 12, 2019, at 11:47 AM, @lbutlr wrote: > > > > I'm not impressed. It complains that STARTTLS is not available on my > > server. It is true it is not available on port 25, ut is available on port > > 587 where it should be. > > Frankly, best practice nowadays is to al

Re: possible to reach hardenize's requirements?

2019-04-12 Thread Viktor Dukhovni
On Fri, Apr 12, 2019 at 12:34:16PM -0400, micah anderson wrote: > > Any reasonably recent version of OpenSSL will by default favour stronger > > ciphers, including listing ciphers that do forward-secrecy above the rest. > > For example, with OpenSSL 1.0.2 I get: > > Indeed, you are right, if I si

Re: possible to reach hardenize's requirements?

2019-04-12 Thread Viktor Dukhovni
On Fri, Apr 12, 2019 at 12:58:48PM -0400, Wietse Venema wrote: > Viktor Dukhovni: > > > On Apr 12, 2019, at 11:47 AM, @lbutlr wrote: > > > > > > I'm not impressed. It complains that STARTTLS is not available on my > > > server. It is true it is not available on port 25, ut is available on > >

Re: possible to reach hardenize's requirements?

2019-04-12 Thread @lbutlr
> On 12 Apr 2019, at 10:42, micah anderson wrote: > > "@lbutlr" writes: > >> On 12 Apr 2019, at 08:46, micah anderson wrote: >>> he site https://hardenize.com provides relatively decent Email reports, >>> along with other reports. It checks a number of things including certs, >>> MTA-STS, T

Re: possible to reach hardenize's requirements?

2019-04-12 Thread Ralph Seichter
* micah anderson: > I do think that it might be more 'clear' if they said something like > "if you set p=reject, you are likely to have 90% of the mail you send > getting spam foldered or rejected". I use dedicated domains without DMARC policies for mailing lists. For my other domains, I use p=qu

Re: possible to reach hardenize's requirements?

2019-04-12 Thread Ralph Seichter
Hm. Hardenize tells me "Email TLS ... not implemented or disabled", which I don't quite understand, given the following settings: smtpd_tls_ask_ccert = yes smtpd_tls_auth_only = yes smtpd_tls_fingerprint_digest = sha256 smtpd_tls_dh512_param_file = /etc/ssl/private/dh512.pem smtpd_tls_dh

Re: possible to reach hardenize's requirements?

2019-04-12 Thread Viktor Dukhovni
On Fri, Apr 12, 2019 at 11:57:09PM +0200, Ralph Seichter wrote: > Hm. Hardenize tells me "Email TLS ... not implemented or disabled", > which I don't quite understand, given the following settings: > > smtpd_tls_ask_ccert = yes > smtpd_tls_auth_only = yes > smtpd_tls_fingerprint_digest = sh

Re: Current ideas on DKIM signing ?

2019-04-12 Thread Andrey Repin
Greetings, André Rodier! >>> Hello Laura, >>> >>> I am using OpenDKIM on Debian Stretch, no issue at all. >>> >>> One explanation might be the standard has not changed since 2015, so >>> neither the binaries. If a major or even a minor change rise in the >>> standard, I am sure the binaries will b

Re: possible to reach hardenize's requirements?

2019-04-12 Thread Dominic Raferd
On 12/04/2019 19:36, @lbutlr wrote: On 12 Apr 2019, at 10:42, micah anderson wrote: "@lbutlr" writes: On 12 Apr 2019, at 08:46, micah anderson wrote: he site https://hardenize.com provides relatively decent Email reports, along with other reports. It checks a number of things including c