On Wed, Mar 02, 2016 at 10:22:12PM -0700, Richard B. Pyne wrote:
> I've added all but the forward secrecy part on my email server running
> postfix 2.10.1 (the latest in the CentOS7 repository), and
> test.drownattack.com still reports vulnerability on port 25. Any help will
> be greatly appreciated.
The data at that site is cached from prior scans:
https://test.drownattack.com/
This tool uses data collected during February 2016. It does
not immediately update as servers patch.
> smtp_tls_ciphers = medium
> smtp_tls_exclude_ciphers = EXPORT, LOW, MD5, aDSS, kECDHe, kECDHr, kDHd,
> kDHr, SEED, IDEA, RC2
> smtp_tls_mandatory_protocols = !SSLv2, !SSLv3
> smtp_tls_protocols = !SSLv2, !SSLv3
These look good.
> smtpd_tls_ciphers = medium
> smtpd_tls_exclude_ciphers = EXPORT, LOW, MD5, SEED, IDEA, RC2
> smtpd_tls_mandatory_protocols = !SSLv2, !SSLv3
> smtpd_tls_protocols = !SSLv2, !SSLv3
As do these. You're all set. But also upgrade to either of OpenSSL
1.0.2g or 1.0.1s, or whatever your O/S ships for backported fixes.
Consider removing any of the above that happen to be default settings
for your Postfix version as reported by "postconf -d".
--
Viktor.