David Mehler:

Second question, in the doveconf -n there's reference to my ssl_cipher
am I  using current tls ciphers that support pfs?


ssl_cipher_list = ALL:!LOW:!SSLv3:!SSLv2:!EXP:!aNULL

some non pfs cipher would be still active. check yourself:
# openssl ciphers -v 'ALL:!LOW:!SSLv3:!SSLv2:!EXP:!aNULL' | grep -v DH

you disable the SSLv3 *cipher list* here. That's may be not the expected result.
The *cipher list* SSLv3 is also used by TLSv1+ *protocols*.
I suggest reading (again?) https://bettercrypto.org/static/applied-crypto-hardening.pdf

ssl_protocols = TLSv1 !SSLv3 !SSLv2
that disable SSLv2, SSLv3 but would also disable TLSv1.1 and TLSv1.2 your ssl library may support otherwise.

better:
ssl_protocols = !SSLv3 !SSLv2

finally you could use the service provided by ssllabs.com to scan your host.
It's a little bit tricky. ssllabs allow only to scan on port 443
So you may configure your host for imaps ( not imap + STARTTLS ) on port 443
and use ssllabs.com. But that require you do not run a regular HTTPS webserver on the same host.

Andreas

Reply via email to