diff --git a/security.md b/security.md index a196441f..a56df082 100644 --- a/security.md +++ b/security.md @@ -80,7 +80,7 @@ The first step in resolving the destination server for an email address is perfo ### Encryption -The box (along with the vast majority of mail servers) uses [opportunistic encryption](https://en.wikipedia.org/wiki/Opportunistic_encryption), meaning the mail is encrypted in transit and protected from passive eavesdropping, but it is not protected from an active man-in-the-middle attack. Modern encryption settings will be used to the extent the recipient server supports them. ([source](setup/mail-postfix.sh)) +The box (along with the vast majority of mail servers) uses [opportunistic encryption](https://en.wikipedia.org/wiki/Opportunistic_encryption), meaning the mail is encrypted in transit and protected from passive eavesdropping, but it is not protected from an active man-in-the-middle attack. Modern encryption settings (TLSv1 and later, no RC4) will be used to the extent the recipient server supports them. ([source](setup/mail-postfix.sh)) ### DANE diff --git a/setup/mail-postfix.sh b/setup/mail-postfix.sh index 96d2971a..f9457519 100755 --- a/setup/mail-postfix.sh +++ b/setup/mail-postfix.sh @@ -159,6 +159,9 @@ tools/editconf.py /etc/postfix/main.cf \ # even if we don't know if it's to the right party, than to not encrypt at all. Instead we'll # now see notices about trusted certs. The CA file is provided by the package `ca-certificates`. tools/editconf.py /etc/postfix/main.cf \ + smtp_tls_protocols=\!SSLv2,\!SSLv3 \ + smtp_tls_ciphers=medium \ + smtp_tls_exclude_ciphers=aNULL,RC4 \ smtp_tls_security_level=dane \ smtp_dns_support_level=dnssec \ smtp_tls_CAfile=/etc/ssl/certs/ca-certificates.crt \