Just for the records: With Version 5.0.0 and the new option "tls-dhparams-file" everything works great, TLS uses the strong cipher suites now! Thank you :-)
2013-09-10 Marc Gregel <m...@gregel.net>: > Looking forward to the Update :-) > > > 2013/9/10 Sam Clippinger <s...@silence.org> > >> I think you're exactly right -- I'll need to add another TLS option to >> spamdyke to accept the DH parameters and pass them to OpenSSL with the >> callback. I'll have to figure out how to test it as well... >> >> Thanks for finding that link, I don't think I would have even looked at a >> function with "tmp" in its name! >> >> -- Sam Clippinger >> >> >> >> >> On Sep 9, 2013, at 3:34 AM, Marc Gregel wrote: >> >> Hi Sam, >> >> is it possible that the problem is because of missing "dh keys"? >> I think (!) spamdyke don't use or call something like this here: >> http://www.openssl.org/docs/ssl/SSL_CTX_set_tmp_dh_callback.html - read >> the 'notes' part >> so cipher with EDHE:DE won't work. >> >> My server/openssl is fine because the orginal qmail-tls works with cipher >> EDHE_DH"! So the problem is the tls handling of spamdyke?! >> >> >> 2013/9/8 Sam Clippinger <s...@silence.org> >> >>> Hmmm... I think you may be beyond the edge of my expertise, but I'll >>> certainly try to help if I can. spamdyke uses the OpenSSL library to >>> handle SSL and TLS, so anything that works with OpenSSL on the command line >>> should work with spamdyke as well. The option "tls-cipher-list" serves the >>> same function as the "-cipher" option to "openssl". spamdyke just takes >>> the text it's given and passes it to the SSL_CTX_set_cipher_list() function >>> in the OpenSSL library before the connection is established. The ciphers >>> you give should be ones listed when you run "openssl ciphers" from the >>> command line, I'm not sure how it handles abbreviations. >>> >>> It's possible the problem is actually within openssl's SMTP client. If >>> it's not starting the SMTP connection and asking for TLS correctly, the >>> client could be sending encrypted text while the server is still in >>> plaintext mode or vice-versa. That would yield some strange error messages >>> on both sides. >>> >>> I think I would suggest configuring spamdyke on port 465 with >>> "tls-level" set to "smtps" and the "tls-cipher-list" option set to your >>> specific ciphers. Then use this command to connect and test (substitute >>> your ciphers as appropriate): >>> openssl s_client -quiet -cipher "EXP-RC4-MD5" -connect localhost:465 >>> If it connects and you see the "220" greeting banner, it's working. If >>> you see an "alert handshake failure", you've probably selected a cipher the >>> server doesn't support. >>> >>> -- Sam Clippinger >>> >>> >>> >>> >>> On Sep 7, 2013, at 3:18 PM, Marc Gregel wrote: >>> >>> Hi :-) >>> >>> These days where the NSA is watching us I decided to make my server as >>> secure as possible. >>> For qmail it means to use TLS with strong encryption - openssl with "- >>> ciphers "EDHS:DE" for example. >>> >>> The original QMAIL without spamdyke works fine: >>> openssl s_client -starttls smtp -connect localhost:25 >>> shows me this: >>> Protocol : TLSv1.2 >>> Cipher : DHE-RSA-AES256-GCM-SHA384 >>> Great! >>> >>> Now I enable spamdyke and test it again... >>> Protocol : TLSv1.2 >>> Cipher : AES256-GCM-SHA384 >>> >>> Ok, not that good... maybe just a wrong cipher list? So I specified it a >>> little bit more (works fine with qmail only): >>> openssl s_client -starttls smtp -connect localhost:25 -cipher 'DH' >>> >>> Ups, an error: >>> CONNECTED(00000003) >>> 139820346807976:error:14077410:SSL routines:SSL23_GET_SERVER_HELLO:sslv3 >>> alert handshake failure:s23_clnt.c:741: >>> >>> I already tried to add "dhparam" to the qmail servercert >>> (mentioned here >>> http://permalink.gmane.org/gmane.mail.spam.spamdyke.user/3226 ) >>> but that didnt't change anything... >>> >>> >>> I also tested with "tls-cipher-list" param at the conf file - same error. >>> And at the maillog this: >>> A protocol or library failure occurred, error:140E6118:lib(20):func( >>> 230):reason(280) >>> >>> Is it possible that there's a bug in spamdyke with strong encryption? >>> >>> Thanks for your help, >>> Marc >>> _______________________________________________ >>> spamdyke-users mailing list >>> spamdyke-users@spamdyke.org >>> http://www.spamdyke.org/mailman/listinfo/spamdyke-users >>> >>> >>> >>> _______________________________________________ >>> spamdyke-users mailing list >>> spamdyke-users@spamdyke.org >>> http://www.spamdyke.org/mailman/listinfo/spamdyke-users >>> >>> >> _______________________________________________ >> spamdyke-users mailing list >> spamdyke-users@spamdyke.org >> http://www.spamdyke.org/mailman/listinfo/spamdyke-users >> >> >> >> _______________________________________________ >> spamdyke-users mailing list >> spamdyke-users@spamdyke.org >> http://www.spamdyke.org/mailman/listinfo/spamdyke-users >> >> >
_______________________________________________ spamdyke-users mailing list spamdyke-users@spamdyke.org http://www.spamdyke.org/mailman/listinfo/spamdyke-users