On Sat, May 23, 2015 at 08:01:15AM -0700, Grant wrote:
> Currently I have the following in main.cf:
>
> smtp_tls_exclude_ciphers = aNULL
> smtpd_tls_exclude_ciphers = aNULL
This is unnecessary.
> According to weakdh.org/sysadmin.html, I should have this:
Some clueless people post cargo-cult nonsense on topics they don't
understand. Ignore most of their advice, Postfix has fairly sensible
default settings, although we'll probably be adjusting the TLS
settings a bit soon, to disable EXPORT and LOW by default, they
are no longer legitimately used in practice.
Thus I would set:
smtp_tls_ciphers = medium
smtpd_tls_ciphers = medium
> smtpd_tls_exclude_ciphers = aNULL, eNULL, EXPORT, DES, RC4, MD5, PSK,
> aECDH, EDH-DSS-DES-CBC3-SHA, EDH-RSA-DES-CDC3-SHA, KRB5-DE5, CBC3-SHA
And not most of these, just "aKRB5" is good to disable. The Kerberos
ciphers in TLS are obsolete, and will be removed from OpenSSL in
upcoming releases. If you O/S vendor enables KRB5 support in OpenSSL
(I never do when I build OpenSSL), then consider:
smtp_tls_exclude_ciphers = aKRB5
smtpd_tls_exclude_ciphers = aKRB5
> Should I use the same dhparams.pem file that I use for nginx, or
> generate a new one for postfix?
http://www.postfix.org/FORWARD_SECRECY_README.html#quick-start
May as well have separate dhparam files, then no need to worry
about compatibility between browsers and SMTP clients.
--
Viktor.