From e8b63c0bbc74f9744c4beb72fd3316ec4a647072 Mon Sep 17 00:00:00 2001 From: KiekerJan Date: Sat, 29 Mar 2025 15:54:47 +0100 Subject: [PATCH 1/5] update ssl according to updated mozilla guidelines, add DHE finite-fields according to RFC 7919 --- conf/dh4096.pem | 13 +++++++++++++ conf/nginx-ssl.conf | 4 ++-- setup/mail-dovecot.sh | 10 +++++----- setup/mail-postfix.sh | 22 +++++++++++----------- setup/ssl.sh | 12 +++++------- setup/web.sh | 2 +- 6 files changed, 37 insertions(+), 26 deletions(-) create mode 100644 conf/dh4096.pem diff --git a/conf/dh4096.pem b/conf/dh4096.pem new file mode 100644 index 00000000..3cf0fcbc --- /dev/null +++ b/conf/dh4096.pem @@ -0,0 +1,13 @@ +-----BEGIN DH PARAMETERS----- +MIICCAKCAgEA//////////+t+FRYortKmq/cViAnPTzx2LnFg84tNpWp4TZBFGQz ++8yTnc4kmz75fS/jY2MMddj2gbICrsRhetPfHtXV/WVhJDP1H18GbtCFY2VVPe0a +87VXE15/V8k1mE8McODmi3fipona8+/och3xWKE2rec1MKzKT0g6eXq8CrGCsyT7 +YdEIqUuyyOP7uWrat2DX9GgdT0Kj3jlN9K5W7edjcrsZCwenyO4KbXCeAvzhzffi +7MA0BM0oNC9hkXL+nOmFg/+OTxIy7vKBg8P+OxtMb61zO7X8vC7CIAXFjvGDfRaD +ssbzSibBsu/6iGtCOGEfz9zeNVs7ZRkDW7w09N75nAI4YbRvydbmyQd62R0mkff3 +7lmMsPrBhtkcrv4TCYUTknC0EwyTvEN5RPT9RFLi103TZPLiHnH1S/9croKrnJ32 +nuhtK8UiNjoNq8Uhl5sN6todv5pC1cRITgq80Gv6U93vPBsg7j/VnXwl5B0rZp4e +8W5vUsMWTfT7eTDp5OWIV7asfV9C1p9tGHdjzx1VA0AEh/VbpX4xzHpxNciG77Qx +iu1qHgEtnmgyqQdgCpGBMMRtx3j5ca0AOAkpmaMzy4t6Gh25PXFAADwqTs6p+Y0K +zAqCkc3OyX3Pjsm1Wn+IpGtNtahR9EGC4caKAH5eZV9q//////////8CAQI= +-----END DH PARAMETERS----- diff --git a/conf/nginx-ssl.conf b/conf/nginx-ssl.conf index 621973df..0638962d 100644 --- a/conf/nginx-ssl.conf +++ b/conf/nginx-ssl.conf @@ -1,8 +1,8 @@ # We track the Mozilla "intermediate" compatibility TLS recommendations. # Note that these settings are repeated in the SMTP and IMAP configuration. # ssl_protocols has moved to nginx.conf in bionic, check there for enabled protocols. -ssl_ciphers ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384; -ssl_dhparam STORAGE_ROOT/ssl/dh2048.pem; +ssl_ciphers ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:DHE-RSA-CHACHA20-POLY1305; +ssl_dhparam STORAGE_ROOT/ssl/dh4096.pem; # as recommended by http://nginx.org/en/docs/http/configuring_https_servers.html ssl_session_cache shared:SSL:50m; diff --git a/setup/mail-dovecot.sh b/setup/mail-dovecot.sh index 06504862..37f609e6 100755 --- a/setup/mail-dovecot.sh +++ b/setup/mail-dovecot.sh @@ -104,17 +104,17 @@ tools/editconf.py /etc/dovecot/conf.d/10-auth.conf \ "auth_mechanisms=plain login" # Enable SSL, specify the location of the SSL certificate and private key files. -# Use Mozilla's "Intermediate" recommendations at https://ssl-config.mozilla.org/#server=dovecot&server-version=2.2.33&config=intermediate&openssl-version=1.1.1, +# Use Mozilla's "Intermediate" recommendations at https://ssl-config.mozilla.org/#server=dovecot&version=2.3.16&config=intermediate&openssl=3.0.2&guideline=5.7, # except that the current version of Dovecot does not have a TLSv1.3 setting, so we only use TLSv1.2. tools/editconf.py /etc/dovecot/conf.d/10-ssl.conf \ ssl=required \ "ssl_cert=<$STORAGE_ROOT/ssl/ssl_certificate.pem" \ "ssl_key=<$STORAGE_ROOT/ssl/ssl_private_key.pem" \ "ssl_min_protocol=TLSv1.2" \ - "ssl_cipher_list=ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384" \ - "ssl_prefer_server_ciphers=no" \ - "ssl_dh_parameters_length=2048" \ - "ssl_dh=<$STORAGE_ROOT/ssl/dh2048.pem" + "ssl_cipher_list=ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:DHE-RSA-CHACHA20-POLY1305" \ + "ssl_curve_list=X25519:prime256v1:secp384r1" \ + "ssl_prefer_server_ciphers=yes" \ + "ssl_dh=<$STORAGE_ROOT/ssl/dh4096.pem" # Disable in-the-clear IMAP/POP because there is no reason for a user to transmit # login credentials outside of an encrypted connection. Only the over-TLS versions diff --git a/setup/mail-postfix.sh b/setup/mail-postfix.sh index 5a4c7fec..a0e377a4 100755 --- a/setup/mail-postfix.sh +++ b/setup/mail-postfix.sh @@ -128,31 +128,31 @@ sed -i "s/PUBLIC_IP/$PUBLIC_IP/" /etc/postfix/outgoing_mail_header_filters # encryption. On ports 465 and 587 it is mandatory (see above). Shared and non-shared settings are # given here. Shared settings include: # * Require TLS before a user is allowed to authenticate. -# * Set the path to the server TLS certificate and 2048-bit DH parameters for old DH ciphers. +# * Set the path to the server TLS certificate and 4096-bit DH parameters for old DH ciphers. # For port 25 only: # * Disable extremely old versions of TLS and extremely unsafe ciphers, but some mail servers out in # the world are very far behind and if we disable too much, they may not be able to use TLS and # won't fall back to cleartext. So we don't disable too much. smtpd_tls_exclude_ciphers applies to # both port 25 and port 587, but because we override the cipher list for both, it probably isn't used. -# Use Mozilla's "Old" recommendations at https://ssl-config.mozilla.org/#server=postfix&server-version=3.3.0&config=old&openssl-version=1.1.1 +# Use Mozilla's "Old" recommendations at https://ssl-config.mozilla.org/#server=postfix&version=3.6.4&config=old&openssl=3.0.2&guideline=5.7 tools/editconf.py /etc/postfix/main.cf \ smtpd_tls_security_level=may\ smtpd_tls_auth_only=yes \ smtpd_tls_cert_file="$STORAGE_ROOT/ssl/ssl_certificate.pem" \ smtpd_tls_key_file="$STORAGE_ROOT/ssl/ssl_private_key.pem" \ - smtpd_tls_dh1024_param_file="$STORAGE_ROOT/ssl/dh2048.pem" \ - smtpd_tls_protocols="!SSLv2,!SSLv3" \ + smtpd_tls_dh1024_param_file="$STORAGE_ROOT/ssl/dh4096.pem" \ + smtpd_tls_protocols=">=TLSv1" \ smtpd_tls_ciphers=medium \ - tls_medium_cipherlist=ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES256-SHA256:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA \ + tls_medium_cipherlist="@SECLEVEL=0:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES256-SHA256:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA" \ smtpd_tls_exclude_ciphers=aNULL,RC4 \ - tls_preempt_cipherlist=no \ + tls_preempt_cipherlist=yes \ smtpd_tls_received_header=yes # For ports 465/587 (via the 'mandatory' settings): -# * Use Mozilla's "Intermediate" TLS recommendations from https://ssl-config.mozilla.org/#server=postfix&server-version=3.3.0&config=intermediate&openssl-version=1.1.1 +# * Use Mozilla's "Intermediate" TLS recommendations from https://ssl-config.mozilla.org/#server=postfix&version=3.6.4&config=intermediate&openssl=3.0.2&guideline=5.7 # using and overriding the "high" cipher list so we don't conflict with the more permissive settings for port 25. tools/editconf.py /etc/postfix/main.cf \ - smtpd_tls_mandatory_protocols="!SSLv2,!SSLv3,!TLSv1,!TLSv1.1" \ + smtpd_tls_mandatory_protocols=">=TLSv1.2" \ smtpd_tls_mandatory_ciphers=high \ tls_high_cipherlist=ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384 \ smtpd_tls_mandatory_exclude_ciphers=aNULL,DES,3DES,MD5,DES+MD5,RC4 @@ -177,7 +177,7 @@ tools/editconf.py /etc/postfix/main.cf \ # accept whatever SSL certificate the remote end provides. Opportunistic TLS # protects against passive easvesdropping (but not man-in-the-middle attacks). # Since we'd rather have poor encryption than none at all, we use Mozilla's -# "Old" recommendations at https://ssl-config.mozilla.org/#server=postfix&server-version=3.3.0&config=old&openssl-version=1.1.1 +# "Old" recommendations at https://ssl-config.mozilla.org/#server=postfix&version=3.6.4&config=old&openssl=3.0.2&guideline=5.7 # for opportunistic encryption but "Intermediate" recommendations when DANE # is used (see next and above). The cipher lists are set above. @@ -193,12 +193,12 @@ tools/editconf.py /etc/postfix/main.cf \ # even if we don't know if it's to the right party, than to not encrypt at all. Instead we'll # now see notices about trusted certs. The CA file is provided by the package `ca-certificates`. tools/editconf.py /etc/postfix/main.cf \ - smtp_tls_protocols=\!SSLv2,\!SSLv3 \ + smtp_tls_protocols=">=TLSv1" \ smtp_tls_ciphers=medium \ smtp_tls_exclude_ciphers=aNULL,RC4 \ smtp_tls_security_level=dane \ smtp_dns_support_level=dnssec \ - smtp_tls_mandatory_protocols="!SSLv2,!SSLv3,!TLSv1,!TLSv1.1" \ + smtp_tls_mandatory_protocols=">=TLSv1.2" \ smtp_tls_mandatory_ciphers=high \ smtp_tls_CAfile=/etc/ssl/certs/ca-certificates.crt \ smtp_tls_loglevel=2 diff --git a/setup/ssl.sh b/setup/ssl.sh index 0aa9b136..5d40ab5a 100755 --- a/setup/ssl.sh +++ b/setup/ssl.sh @@ -28,7 +28,7 @@ source /etc/mailinabox.conf # load global vars if [ ! -f /usr/bin/openssl ] \ || [ ! -f "$STORAGE_ROOT/ssl/ssl_private_key.pem" ] \ || [ ! -f "$STORAGE_ROOT/ssl/ssl_certificate.pem" ] \ - || [ ! -f "$STORAGE_ROOT/ssl/dh2048.pem" ]; then + || [ ! -f "$STORAGE_ROOT/ssl/dh4096.pem" ]; then echo "Creating initial SSL certificate and perfect forward secrecy Diffie-Hellman parameters..." fi @@ -90,12 +90,10 @@ if [ ! -f "$STORAGE_ROOT/ssl/ssl_certificate.pem" ]; then ln -s "$CERT" "$STORAGE_ROOT/ssl/ssl_certificate.pem" fi -# Generate some Diffie-Hellman cipher bits. -# openssl's default bit length for this is 1024 bits, but we'll create -# 2048 bits of bits per the latest recommendations. -if [ ! -f "$STORAGE_ROOT/ssl/dh2048.pem" ]; then - openssl dhparam -out "$STORAGE_ROOT/ssl/dh2048.pem" 2048 -fi +# We no longer generate Diffie-Hellman cipher bits. Following rfc7919 we use +# a predefined finite field group, in this case ffdhe4096 from +# https://raw.githubusercontent.com/internetstandards/dhe_groups/master/ffdhe4096.pem +cp -f conf/dh4096.pem $STORAGE_ROOT/ssl/ # Cleanup expired SSL certificates from $STORAGE_ROOT/ssl daily cat > /etc/cron.daily/mailinabox-ssl-cleanup << EOF; diff --git a/setup/web.sh b/setup/web.sh index 3aafcd88..fbdcd605 100755 --- a/setup/web.sh +++ b/setup/web.sh @@ -40,7 +40,7 @@ sed "s#STORAGE_ROOT#$STORAGE_ROOT#" \ # we're going up to 128. # # Drop TLSv1.0, TLSv1.1, following the Mozilla "Intermediate" recommendations -# at https://ssl-config.mozilla.org/#server=nginx&server-version=1.17.0&config=intermediate&openssl-version=1.1.1. +# at https://ssl-config.mozilla.org/#server=nginx&version=1.18.0&config=intermediate&openssl=3.0.2&guideline=5.7. tools/editconf.py /etc/nginx/nginx.conf -s \ server_names_hash_bucket_size="128;" \ ssl_protocols="TLSv1.2 TLSv1.3;" From e88f7c350b0d7b7e3a81a5c50abe50f6036a971e Mon Sep 17 00:00:00 2001 From: KiekerJan Date: Sat, 29 Mar 2025 16:22:25 +0100 Subject: [PATCH 2/5] remove unsafe ciphers according to internet.nl --- setup/mail-postfix.sh | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/setup/mail-postfix.sh b/setup/mail-postfix.sh index a0e377a4..6678fd70 100755 --- a/setup/mail-postfix.sh +++ b/setup/mail-postfix.sh @@ -144,7 +144,7 @@ tools/editconf.py /etc/postfix/main.cf \ smtpd_tls_protocols=">=TLSv1" \ smtpd_tls_ciphers=medium \ tls_medium_cipherlist="@SECLEVEL=0:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES256-SHA256:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA" \ - smtpd_tls_exclude_ciphers=aNULL,RC4 \ + smtpd_tls_exclude_ciphers="aNULL CAMELLIA AES256-GCM-SHA384 AES128-GCM-SHA256 AES256-SHA256 AES128-SHA256 AES256-SHA AES128-SHA" \ tls_preempt_cipherlist=yes \ smtpd_tls_received_header=yes @@ -155,7 +155,7 @@ tools/editconf.py /etc/postfix/main.cf \ smtpd_tls_mandatory_protocols=">=TLSv1.2" \ smtpd_tls_mandatory_ciphers=high \ tls_high_cipherlist=ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384 \ - smtpd_tls_mandatory_exclude_ciphers=aNULL,DES,3DES,MD5,DES+MD5,RC4 + smtpd_tls_mandatory_exclude_ciphers="aNULL CAMELLIA AES256-GCM-SHA384 AES128-GCM-SHA256 AES256-SHA256 AES128-SHA256 AES256-SHA AES128-SHA" # Prevent non-authenticated users from sending mail that requires being # relayed elsewhere. We don't want to be an "open relay". On outbound From 0179c790c40eecb7e1fdfe9adbe74bf194c848da Mon Sep 17 00:00:00 2001 From: KiekerJan Date: Sat, 29 Mar 2025 17:05:25 +0100 Subject: [PATCH 3/5] update tls settings --- setup/mail-postfix.sh | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/setup/mail-postfix.sh b/setup/mail-postfix.sh index 6678fd70..67e11088 100755 --- a/setup/mail-postfix.sh +++ b/setup/mail-postfix.sh @@ -144,7 +144,7 @@ tools/editconf.py /etc/postfix/main.cf \ smtpd_tls_protocols=">=TLSv1" \ smtpd_tls_ciphers=medium \ tls_medium_cipherlist="@SECLEVEL=0:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES256-SHA256:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA" \ - smtpd_tls_exclude_ciphers="aNULL CAMELLIA AES256-GCM-SHA384 AES128-GCM-SHA256 AES256-SHA256 AES128-SHA256 AES256-SHA AES128-SHA" \ + smtpd_tls_exclude_ciphers="aNULL RC4" \ tls_preempt_cipherlist=yes \ smtpd_tls_received_header=yes @@ -155,7 +155,7 @@ tools/editconf.py /etc/postfix/main.cf \ smtpd_tls_mandatory_protocols=">=TLSv1.2" \ smtpd_tls_mandatory_ciphers=high \ tls_high_cipherlist=ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384 \ - smtpd_tls_mandatory_exclude_ciphers="aNULL CAMELLIA AES256-GCM-SHA384 AES128-GCM-SHA256 AES256-SHA256 AES128-SHA256 AES256-SHA AES128-SHA" + smtpd_tls_mandatory_exclude_ciphers="aNULL DES 3DES MD5 DES+MD5 RC4 CAMELLIA" # Prevent non-authenticated users from sending mail that requires being # relayed elsewhere. We don't want to be an "open relay". On outbound From 8c42e1c3a6d4f64d9d087ed17557b77ed0bc66c3 Mon Sep 17 00:00:00 2001 From: KiekerJan Date: Sat, 29 Mar 2025 17:11:35 +0100 Subject: [PATCH 4/5] don't use cyphers that use RSA for key exchange --- setup/mail-postfix.sh | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/setup/mail-postfix.sh b/setup/mail-postfix.sh index 67e11088..7014f2e9 100755 --- a/setup/mail-postfix.sh +++ b/setup/mail-postfix.sh @@ -144,7 +144,7 @@ tools/editconf.py /etc/postfix/main.cf \ smtpd_tls_protocols=">=TLSv1" \ smtpd_tls_ciphers=medium \ tls_medium_cipherlist="@SECLEVEL=0:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES256-SHA256:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA" \ - smtpd_tls_exclude_ciphers="aNULL RC4" \ + smtpd_tls_exclude_ciphers="MD5, DES, ADH, RC4, PSD, SRP, 3DES, eNULL, aNULL, CAMELLIA, kRSA" \ tls_preempt_cipherlist=yes \ smtpd_tls_received_header=yes @@ -155,7 +155,6 @@ tools/editconf.py /etc/postfix/main.cf \ smtpd_tls_mandatory_protocols=">=TLSv1.2" \ smtpd_tls_mandatory_ciphers=high \ tls_high_cipherlist=ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384 \ - smtpd_tls_mandatory_exclude_ciphers="aNULL DES 3DES MD5 DES+MD5 RC4 CAMELLIA" # Prevent non-authenticated users from sending mail that requires being # relayed elsewhere. We don't want to be an "open relay". On outbound From 5d839dbb93aca9e2eb5679ebc0e93aeb491ca6ad Mon Sep 17 00:00:00 2001 From: KiekerJan Date: Sat, 29 Mar 2025 17:27:56 +0100 Subject: [PATCH 5/5] update comment --- setup/mail-postfix.sh | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/setup/mail-postfix.sh b/setup/mail-postfix.sh index 7014f2e9..579263aa 100755 --- a/setup/mail-postfix.sh +++ b/setup/mail-postfix.sh @@ -132,8 +132,7 @@ sed -i "s/PUBLIC_IP/$PUBLIC_IP/" /etc/postfix/outgoing_mail_header_filters # For port 25 only: # * Disable extremely old versions of TLS and extremely unsafe ciphers, but some mail servers out in # the world are very far behind and if we disable too much, they may not be able to use TLS and -# won't fall back to cleartext. So we don't disable too much. smtpd_tls_exclude_ciphers applies to -# both port 25 and port 587, but because we override the cipher list for both, it probably isn't used. +# won't fall back to cleartext. So we don't disable too much. # Use Mozilla's "Old" recommendations at https://ssl-config.mozilla.org/#server=postfix&version=3.6.4&config=old&openssl=3.0.2&guideline=5.7 tools/editconf.py /etc/postfix/main.cf \ smtpd_tls_security_level=may\