[prev in list] [next in list] [prev in thread] [next in thread] 

List:       postfix-users
Subject:    Re: SMTP TLS delivery fallback
From:       Viktor Dukhovni <postfix-users () dukhovni ! org>
Date:       2020-08-19 16:08:43
Message-ID: 20200819160843.GE86346 () straasha ! imrryr ! org
[Download RAW message or body]

On Thu, Aug 20, 2020 at 01:33:16AM +1000, Nikolai Lusan wrote:

> Personally I have:
> 
> smtp_tls_security_level = may
> smtpd_tls_security_level = may
> smtp_tls_note_starttls_offer = yes

The last one one is redundant, unless you also have a policy table with
security level set to "none" for some destinatons.

> smtpd_tls_protocols = !SSLv2, !SSLv3 !TLSv1 !TLSv1.1 TLSv1.2 TLSv1.3
> smtp_tls_mandatory_protocols = !SSLv2, !SSLv3 TLSv1.2 TLSv1.3

It is best to NOT list the inclusions, instead, list only the
exclusions.  With Postfix 3.6, the preferred syntax will be:

    smtp_tls_protocols = >=TLSv1.2
    smtp_tls_mandatory_protocols = >=TLSv1.2

Which is a lower-bound, you can alternatively/also set an upper bound,
for example:

    smtp_tls_protocols = >=TLSv1, <=TLSv1.2
    smtp_tls_mandatory_protocols = >=TLSv1.2, <=TLSv1.3

> smtpd_tls_mandatory_exclude_ciphers = MD5, DES, ADH, KDH, SEED, aNULL, RC4, PSD, \
> SRP, 3DES, RC2, aDSS, IDEA, kECDH, eNULL smtpd_tls_exclude_ciphers = MD5, DES, ADH, \
> KDH, SEED, aNULL, RC4,PSD, SRP, 3DES, RC2, aDSS, IDEA, kECDH, eNULL

This looks somewhat cargo-culted, in particular:

    - There was IIRC never any set of "PSD" ciphers, perhaps you meant "PSK"?

    - There was never any set of "KDH" ciphers, you likely meant "kDH",
      to go along with "kECDH", both are indeed deprecated, and by
      default no longer enabled in OpenSSL 1.1.1.

    - Why are you disabling aNULL?  Generally, when Postfix does
      opportunistic TLS (security level "may" or "encrypt"), the aNULL
      (i.e. ADH + AECDH) ciphers are left enabled.

    - Why are you disabling ADH?  It is a strict subset of aNULL.

    - There is no need to exclue "eNULL" (twice!), that exclusion is built-in.

> tls_high_cipherlist = \
> EDH+CAMELLIA:EDH+aRSA:EECDH+aRSA+AESGCM:EECDH+aRSA+SHA384:EECDH+aRSA+SHA256:EECDH:+C \
> AMELLIA256:+AES256:!CAMELLIA128:!AES128:!SSLv3:!aNULL:!eNULL:!LOW:!3DES:!MD5:!EXP:!P \
> SK:!DSS:!RC4:!SEED:!ECDSA:CAMELLIA256-SHA:AES256-SHA:!CAMELLIA128-SHA:!AES128-SHA

This is not a good idea.  Go with the defaults.

-- 
    Viktor.


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic