On 30.07.2018 22:29, Aki Tuomi wrote:
On 30 July 2018 at 21:42 J Doe <gene...@nativemethods.com> wrote:



On Jul 29, 2018, at 6:02 PM, Alexander Dalloz <ad+li...@uni-x.org> wrote:

Am 29.07.2018 um 21:02 schrieb J Doe:
Hello,
I have a question regarding SSL/TLS settings for Dovecot version 2.2.22.
In: 10-ssl.conf there are two parameters:
     ssl_protocols
     ssl_cipher_list
ssl_protocols is commented with “SSL protocol to use” and ssl_cipher_list is 
commented with “SSL ciphers to use”.
If I want to disable SSLv3, for example, do I need to use both parameters or 
will disabling SSLv3 ciphers in
ssl_cipher_list do the same thing ?
So is:
     ssl_cipher_list = !SSLv3
…equivalent to:
     ssl_protocols = !SSLv3
     ssl_cipher_list = !SSLv3

No. SSLv3 is not a cipher but a protocol.

"ssl_protocols = !SSLv2 !SSLv3" is what you want to specify.

For ciphers you could define by ssl_cipher_list see "openssl ciphers -v”
Hi Alexander and list,

I think there may be a discrepancy in the documentation.

On the wiki on the “Dovecot SSL Configuration” page [1] under the section “SSL 
security settings” it says:

     ssl_cipher_list = ALL:!LOW:!SSLv2:!EXP:!aNULL

In the conf.d/10-ssl.conf it states:

     # SSL protocols to use
     #ssl_protocols = !SSLv2

     # SSL ciphers to use
     #ssl_cipher_list = ALL:!LOW:!SSLv2:!EXP:!aNULL

My new question is:

     1. Are the SSL/TLS protocols to use and/or exclude specified in 
“ssl_protocols”, “ssl_cipher_list” or both ?

You can use SSLv2 ciphers with TLSv1.2 protocol, if enabled. ssl protocol 
defines which protocol(s) to support. ssl_cipher_list defines which cipher(s) 
to support. They are not the same thing.

Aki

I personally used https://www.ssllabs.com/ssltest/analyze.html when I set up my server to get green across the board for the web server and then used the same ciphers for Dovecot and confirmed the result with https://github.com/drwetter/testssl.sh

ssl_min_protocol = TLSv1 # New in Dovecot 2.3 iirc.
ssl_cipher_list = "EECDH+ECDSA+AESGCM EECDH+aRSA+AESGCM EECDH+ECDSA+SHA384 EECDH+ECDSA+SHA256 EECDH+aRSA+SHA384 EECDH+aRSA+SHA256 EECDH+aRSA+RC4 EECDH EDH+aRSA RC4 !aNULL !eNULL !LOW !3DES !MD5 !EXP !PSK !SRP !DSS !RC4 !SEED"
ssl_prefer_server_ciphers = yes

Good luck,
Reio

Reply via email to