On Mon, May 25, 2015 at 05:31:31PM +0200, DTNX Postmaster wrote:
> Except that the 'tls_medium_cipherlist' setting defaults to
> 'aNULL:-aNULL:ALL:!EXPORT:!LOW:+RC4:@STRENGTH', and thus leaves
> anonymous ciphers enabled for your MSA.
Which is a feature, not a bug.
> As well as PSK, DSS, SEED, SRP,
> and quite a few other ciphers very few people will need for client
> authentication, making the list of ciphers to exclude longer than an
> explicit cipherlist.
Which do no harm on the receiving side. None of PSK, SRP or DSS
are enabled without suitable server key material anyway. Simplicity
of configuration trumps OCD precision.
> Turning on 'tls_preempt_cipherlist' for that cipherlist means that
> you're explicitly preferring a chunk of those anonymous ciphers over
> the better options available. Oh, so add 'aNULL' to the exclusion list
> as well, right?
No. If the client sends aDH ciphers in the handshake, let it. You learn
which clients are not verifying your server certificate:
https://tools.ietf.org/html/draft-ietf-dane-smtp-with-dane-17#section-8.2
> Plus the "Wait, is the Postfix 'medium' not the same as the 'MEDIUM' I
> am reading about in the OpenSSL docs?"
No it is not the same. It is actually "at least MEDIUM" and thus
includes HIGH.
> It makes verifying which ciphers are actually active on the MSA harder
> for the average user, because there's no easy way for them to test what
> they can expect.
It makes it unnecessary for users to obsess over which ciphers they are
using.
> They have to assemble several bits to generate the
> active list, or test a running configuration to be certain.
None of this is wise or necessary.
> And no, not everyone gives the wrong recommendations ;-)
The wrong advice vastly outnumbers the right and is cargo-culted
by many.
--
Viktor.