Hi, 

i think this has something todo with smtpd_tls_fingerprint_digest: 

smtpd_tls_fingerprint_digest = ${{$compatibility_level} <level {3.6} ? {md5} : 
{sha256}} 

since you have 3.5 its using md5, try to set this value to sha256 

best regards 
Matthias 


Von: "Taco de Wolff via Postfix-users" <postfix-users@postfix.org> 
An: "postfix-users" <postfix-users@postfix.org> 
Gesendet: Montag, 22. Januar 2024 15:44:40 
Betreff: [pfx] Enabling TLS1.3 and allow sending over SMTPS/465 

Hi, 

Two questions really, one is that I can't enable TLS1.3 whatever I try. Running 
CentOS8 with OpenSSL v1.1.1k-FIPS and Postfix v3.5.8, I confirm that TLS1.3 
ciphers are available: 

# openssl version 
OpenSSL 1.1.1k FIPS 25 Mar 2021 

# postconf -T compile-version 
OpenSSL 1.1.1k FIPS 25 Mar 2021 

# postconf -T run-version 
OpenSSL 1.1.1k FIPS 25 Mar 2021 

# openssl ciphers -v 
TLS_AES_256_GCM_SHA384 TLSv1.3 Kx=any Au=any Enc=AESGCM(256) Mac=AEAD 
TLS_AES_128_GCM_SHA256 TLSv1.3 Kx=any Au=any Enc=AESGCM(128) Mac=AEAD 
etc. 

Relevant configuration for port 465 (implicit TLS): 
# postconf 
smtpd_tls_cert_file = /path/to/crt 
smtpd_tls_ciphers = medium 
smtpd_tls_exclude_ciphers = 
smtpd_tls_key_file = /path/to/key 
smtpd_tls_mandatory_ciphers = medium 
smtpd_tls_mandatory_exclude_ciphers = 
smtpd_tls_mandatory_protocols = !SSLv2, !SSLv3, !TLSv1, !TLSv1.1 
smtpd_tls_protocols = !SSLv2, !SSLv3, !TLSv1, !TLSv1.1 
tls_medium_cipherlist = 
TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:DHE-RSA-CHACHA20-POLY1305
 
smtpd_tls_security_level = encrypt 
smtpd_tls_wrappermode = yes 

Trying to connect using TLS1.3 on a client that supports both TLS1.3 
ciphersuites, I get: 
$ openssl s_client -connect server.hostname:465 -tls1_3 
Connecting to [IPADDRESS] 
CONNECTED(00000003) 
40879BE5F97F0000:error:0A00042E:SSL routines:ssl3_read_bytes:tlsv1 alert 
protocol version:ssl/record/rec_layer_s3.c:861:SSL alert number 70 

Has this something to do with FIPS mode? I don't think so because the ciphers 
show up in OpenSSL. Why is TLS1.3 not getting enabled? 


Second question came up while fixing a blocked outbound port 25 with my ISP. 
I've noticed that mail gets sent to DANE enabled servers, I suppose because it 
uses port 587 using STARTTLS. I wonder if postfix allows sending mail over the 
recommended implicit TLS port 465 between mail servers? The documentation isn't 
very clear on the distinction between (implicit) TLS and STARTTLS, but setting 
smtp_tls_wrappermode=yes would force using implicit TLS (right?), while I want 
to use opportunistic implicit TLS (with fallback to STARTTLS, it's better than 
nothing) which can be enforced by DANE enabled servers. 

Kind regards, 
Taco de Wolff 

_______________________________________________ 
Postfix-users mailing list -- postfix-users@postfix.org 
To unsubscribe send an email to postfix-users-le...@postfix.org 
_______________________________________________
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org

Reply via email to