On Wed, Aug 19, 2015 at 12:09:13PM +0200, L.P.H. van Belle wrote:

> Try it like this, there is no need for combining the certificates. 

Actually, there is.  It avoids the need to worry about the CApath,
which can then be left empty.

> if [ -d /etc/ssl/private ]; then
>     mkdir -p /etc/ssl/private
>     chmod 710 /etc/ssl/private
> fi

The DH parameters are public data, no need for "private".

> # Postfix enabled
> postconf -e "smtp_tls_mandatory_exclude_ciphers = aNULL, eNULL, EXPORT, DES, 
> RC4, MD5, PSK, aECDH, EDH-DSS-DES-CBC3-SHA, EDH-RSA-DES-CDC3-SHA, KRB5-DE5, 
> CBC3-SHA"
> postconf -e "smtpd_tls_mandatory_exclude_ciphers = aNULL, eNULL, EXPORT, DES, 
> RC4, MD5, PSK, aECDH, EDH-DSS-DES-CBC3-SHA, EDH-RSA-DES-CDC3-SHA, KRB5-DE5, 
> CBC3-SHA"

There's no need to exclude aNULL, it is disabled automatically as
necessary.  Also DES and EXPORT are already excluded from "medium".
This is not a well thought out list of exclusions.  A few of the
above don't even exist (to be excluded).

No cargo-cult settings please.

> postconf -e "smtpd_tls_dh512_param_file = /etc/ssl/private/dhparams512.pem"
> postconf -e "smtpd_tls_dh1024_param_file = /etc/ssl/private/dhparams1024.pem"

The recommended non-export DH parameters use 2048-bit primes these
days.  See

    http://www.postfix.org/FORWARD_SECRECY_README.html#server_fs
    http://www.postfix.org/FORWARD_SECRECY_README.html#quick-start

-- 
        Viktor.

Reply via email to