On Sun, May 24, 2015 at 08:00:30PM +0200, DTNX Postmaster wrote:
> Assuming you are talking about the MSA (submission) and not MTA to MTA
> traffic, you can cover the vast majority of the scenarios with the
> following cipher selection string;
>
> EECDH+AES128:EECDH+AES256:EDH+AES128+SHA:RSA+AES+SHA:RSA+3DES:!DSS
Avoid overly explicit cipher selection strings. The good news is
that these are explicitly discouraged in Postfix documentation.
As I said before, it suffices to set:
# Optionally, add !SSLv3 if desired
smtpd_tls_protocols = !SSLv2
smtpd_tls_ciphers = medium
smtpd_tls_exclude_ciphers = aKRB5
# Optionally, add !SSLv3 if desired
smtp_tls_protocols = !SSLv2
smtp_tls_ciphers = medium
smtp_tls_exclude_ciphers = aKRB5
If you need to interoperate with Exchange 2003 SMTP servers, then
on the sending Postfix set the client cipher exclusions to:
smtp_tls_exclude_ciphers =
#
# Disable shared-secret, obsolete and exotic ciphersuites
#
SRP, PSK, MD5, aKRB5, aDSS, aECDH, aDH
#
# Also disable little used block ciphers,
# leaving just AES, CAMELLIA, RC4 and 3DES.
# (in the future also ChaCha20)
#
SEED, IDEA, RC2, RC5
--
Viktor.