On Mon, Jan 25, 2021 at 10:38:46PM +0100, Jörg Backschues wrote:

> # TLS
> tls_high_cipherlist = 
> ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305

Limiting the ciphers to just:

    ECDHE-ECDSA-AES256-GCM-SHA384
    ECDHE-RSA-AES256-GCM-SHA384
    ECDHE-ECDSA-AES128-GCM-SHA256
    ECDHE-RSA-AES128-GCM-SHA256
    ECDHE-ECDSA-CHACHA20-POLY1305
    ECDHE-RSA-CHACHA20-POLY1305

is a terrible idea, the net effect of this attempt to increase security,
is to reduce security, by forcing all email to peers that don't do ECDHE
to be sent in the clear.  Since your mail server is doing *opportunistic*
TLS (<https://tools.ietf.org/html/rfc7435>), it is willing to use the
weakest cipher of all, namely cleartext.  Therefore, configuring highly
restrictive cipherlists is just wrong.  Keep reading RFC7435 until
you've lost the urge to dial security up to 11.

Real security results from raising the ceiling (offering stronger
options), not the floor (remove everything but the strongest options).

Yes, ultimately one should also *gradually* raise the floor to eliminate
just the truly obsolete features that are no longer used by anyone, but
this needs to be done with care, and mostly just by leaving it to the
underlying libraries (i.e. OpenSSL) to drop support for obsolete cruft.

Postfix has sensible defaults for the low level cipher lists.  Resist
the temptation to "improve" them.

-- 
    Viktor.

Reply via email to