On Thu, Feb 29, 2024 at 06:36:09AM -0500, Scott Hollenbeck wrote:

> Sorry, context is important. This server needs to pass a Payment Card
> Industry (PCI) compliance scan. Their definition of weak: "key lengths of
> less than 112 bits, or else use the 3DES encryption suite". Opportunistic
> TLS is NOT a goal.

Many of The anon-DH ciphers are quite strong by that metric, they use
AES-128 or AES-256.

> > What do you consider weak?
> 
> All of the anonymous Diffie-Hellman suites with an "F" score. How can
> eliminate the following:

Who's assigning the "F" scores?  Do they in fact line up with the PCI
requirements?  As explained in:

    https://www.postfix.org/TLS_README.html#client_tls_limits
    https://datatracker.ietf.org/doc/html/rfc7672#section-8.2

there is nothing wrong with leaving anon-DH ciphers enabled on servers.
They can however be disabled to comply to with clueless auditors by
setting:

    smtpd_tls_exclude_ciphers = aNULL

or (if applicable only with mandatory TLS):

    smtpd_tls_mandatory_exclude_ciphers = aNULL
    
-- 
    Viktor.
_______________________________________________
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org

Reply via email to