On Thu, Oct 30, 2025 at 02:10:20PM -0400, pgnd via Postfix-users wrote:

> starting with this slicing of what i typically think of as mostly-modern ssl 
> strings
> 
>       _INCL_STR='ECDH@STRENGTH:EECDH@STRENGTH:HIGH:!aNULL:!eNULL:!MD5:!RC4'

This is a messy hodge-podge that is unlikely to be what one might
sensibly want.  If, for TLS 1.[012], you want HIGH grade non-DSS ciphers
without RSA kexchange, and with ECDHE listed first, the sensible recipe
would be:

    !aDSS:!kRSA:HIGH+kECDHE:-HIGH+kECDHE:HIGH

Giving the below, because adding and then removing a subset of the
ciphers before ultimately addign all the supported ones, resulting
in the temporarily removed ciphers being listed first.

    $ openssl ciphers -s -tls1_2 -v '!aDSS:!kRSA:HIGH+kECDHE:-HIGH+kECDHE:HIGH'
    ECDHE-ECDSA-AES256-GCM-SHA384  TLSv1.2 Kx=ECDH     Au=ECDSA Enc=AESGCM(256) 
           Mac=AEAD
    ECDHE-RSA-AES256-GCM-SHA384    TLSv1.2 Kx=ECDH     Au=RSA   Enc=AESGCM(256) 
           Mac=AEAD
    ECDHE-ECDSA-CHACHA20-POLY1305  TLSv1.2 Kx=ECDH     Au=ECDSA 
Enc=CHACHA20/POLY1305(256) Mac=AEAD
    ECDHE-RSA-CHACHA20-POLY1305    TLSv1.2 Kx=ECDH     Au=RSA   
Enc=CHACHA20/POLY1305(256) Mac=AEAD
    ECDHE-ECDSA-AES256-CCM         TLSv1.2 Kx=ECDH     Au=ECDSA Enc=AESCCM(256) 
           Mac=AEAD
    ECDHE-ECDSA-ARIA256-GCM-SHA384 TLSv1.2 Kx=ECDH     Au=ECDSA 
Enc=ARIAGCM(256)           Mac=AEAD
    ECDHE-ARIA256-GCM-SHA384       TLSv1.2 Kx=ECDH     Au=RSA   
Enc=ARIAGCM(256)           Mac=AEAD
    ECDHE-ECDSA-AES128-GCM-SHA256  TLSv1.2 Kx=ECDH     Au=ECDSA Enc=AESGCM(128) 
           Mac=AEAD
    ECDHE-RSA-AES128-GCM-SHA256    TLSv1.2 Kx=ECDH     Au=RSA   Enc=AESGCM(128) 
           Mac=AEAD
    ECDHE-ECDSA-AES128-CCM         TLSv1.2 Kx=ECDH     Au=ECDSA Enc=AESCCM(128) 
           Mac=AEAD
    ECDHE-ECDSA-ARIA128-GCM-SHA256 TLSv1.2 Kx=ECDH     Au=ECDSA 
Enc=ARIAGCM(128)           Mac=AEAD
    ECDHE-ARIA128-GCM-SHA256       TLSv1.2 Kx=ECDH     Au=RSA   
Enc=ARIAGCM(128)           Mac=AEAD
    ECDHE-ECDSA-AES256-SHA384      TLSv1.2 Kx=ECDH     Au=ECDSA Enc=AES(256)    
           Mac=SHA384
    ECDHE-RSA-AES256-SHA384        TLSv1.2 Kx=ECDH     Au=RSA   Enc=AES(256)    
           Mac=SHA384
    ECDHE-ECDSA-CAMELLIA256-SHA384 TLSv1.2 Kx=ECDH     Au=ECDSA 
Enc=Camellia(256)          Mac=SHA384
    ECDHE-RSA-CAMELLIA256-SHA384   TLSv1.2 Kx=ECDH     Au=RSA   
Enc=Camellia(256)          Mac=SHA384
    ECDHE-ECDSA-AES128-SHA256      TLSv1.2 Kx=ECDH     Au=ECDSA Enc=AES(128)    
           Mac=SHA256
    ECDHE-RSA-AES128-SHA256        TLSv1.2 Kx=ECDH     Au=RSA   Enc=AES(128)    
           Mac=SHA256
    ECDHE-ECDSA-CAMELLIA128-SHA256 TLSv1.2 Kx=ECDH     Au=ECDSA 
Enc=Camellia(128)          Mac=SHA256
    ECDHE-RSA-CAMELLIA128-SHA256   TLSv1.2 Kx=ECDH     Au=RSA   
Enc=Camellia(128)          Mac=SHA256
    ECDHE-ECDSA-AES256-SHA         TLSv1   Kx=ECDH     Au=ECDSA Enc=AES(256)    
           Mac=SHA1
    ECDHE-RSA-AES256-SHA           TLSv1   Kx=ECDH     Au=RSA   Enc=AES(256)    
           Mac=SHA1
    ECDHE-ECDSA-AES128-SHA         TLSv1   Kx=ECDH     Au=ECDSA Enc=AES(128)    
           Mac=SHA1
    ECDHE-RSA-AES128-SHA           TLSv1   Kx=ECDH     Au=RSA   Enc=AES(128)    
           Mac=SHA1
    DHE-RSA-AES256-GCM-SHA384      TLSv1.2 Kx=DH       Au=RSA   Enc=AESGCM(256) 
           Mac=AEAD
    DHE-RSA-CHACHA20-POLY1305      TLSv1.2 Kx=DH       Au=RSA   
Enc=CHACHA20/POLY1305(256) Mac=AEAD
    DHE-RSA-AES256-CCM             TLSv1.2 Kx=DH       Au=RSA   Enc=AESCCM(256) 
           Mac=AEAD
    DHE-RSA-ARIA256-GCM-SHA384     TLSv1.2 Kx=DH       Au=RSA   
Enc=ARIAGCM(256)           Mac=AEAD
    DHE-RSA-AES128-GCM-SHA256      TLSv1.2 Kx=DH       Au=RSA   Enc=AESGCM(128) 
           Mac=AEAD
    DHE-RSA-AES128-CCM             TLSv1.2 Kx=DH       Au=RSA   Enc=AESCCM(128) 
           Mac=AEAD
    DHE-RSA-ARIA128-GCM-SHA256     TLSv1.2 Kx=DH       Au=RSA   
Enc=ARIAGCM(128)           Mac=AEAD
    DHE-RSA-AES256-SHA256          TLSv1.2 Kx=DH       Au=RSA   Enc=AES(256)    
           Mac=SHA256
    DHE-RSA-CAMELLIA256-SHA256     TLSv1.2 Kx=DH       Au=RSA   
Enc=Camellia(256)          Mac=SHA256
    DHE-RSA-AES128-SHA256          TLSv1.2 Kx=DH       Au=RSA   Enc=AES(128)    
           Mac=SHA256
    DHE-RSA-CAMELLIA128-SHA256     TLSv1.2 Kx=DH       Au=RSA   
Enc=Camellia(128)          Mac=SHA256
    DHE-RSA-AES256-SHA             SSLv3   Kx=DH       Au=RSA   Enc=AES(256)    
           Mac=SHA1
    DHE-RSA-CAMELLIA256-SHA        SSLv3   Kx=DH       Au=RSA   
Enc=Camellia(256)          Mac=SHA1
    DHE-RSA-AES128-SHA             SSLv3   Kx=DH       Au=RSA   Enc=AES(128)    
           Mac=SHA1
    DHE-RSA-CAMELLIA128-SHA        SSLv3   Kx=DH       Au=RSA   
Enc=Camellia(128)          Mac=SHA1

Most users can disable RSA key exchange without running into any servers
that suport only that.  As for TLS 1.3 cipher strings, it is best to
leave those at their default values.

>       Postfix 3.10.5, OpenSSL 3.5.0, intermediate config
>               
> https://ssl-config.mozilla.org/#server=postfix&version=3.10.5&config=intermediate&openssl=3.5.0&guideline=5.7
> 
> recommended postfix CipherString consists of

DO NOT make the mistake of following some ill-conceived guide that
recommends a specific list ciphers.

> for smtp, i'm trying to get a sense for what are the current real
> world stats for sane acceptance/rejection rates.

Nobody has those stats, they're vary a lot from sender to sender based
on who they send mail to and what their client settings are.

Broadly speaking you'll see some combinations of:

    - AES-GCM at 256 or 128 bits
    - ECDHE with X25519 or P-256
    - DHE with some random server-selected group
    - P-256 ECDSA certs
    - 2048-bit RSA certs

But there's no good reason to attempt to optimise the cipherlist.
Leave the defaults be.

-- 
    Viktor.  🇺🇦 Слава Україні!
_______________________________________________
Postfix-users mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to