[Ach] Suggested Postfix config allows some weak ciphers - please review

christian mock cm at coretec.at
Sat May 3 12:53:45 CEST 2014


On Sat, May 03, 2014 at 09:37:10AM +0100, Thomas Preissler wrote:
> Hello,
> 
> I had a go at your recommended Postfix settings. I am on Debian Wheezy,
> Postfix 2.9.6-2.
> 
> When testing these settings with https://starttls.info/, I get the
> following report:
> 
>   Key exchange
>   Anonymous Diffie-Hellman is accepted. This is suspectible to
>   Man-in-the-Middle attacks.
> 
>   Cipher
>   Weakest accepted cipher: 0.

I think the grading used by starttls.info is sub-optimal[0]. 

The issue is that nobody verifies certificates with opportunistic SMTP
encryption[citation needed], which in turn means there is no security
against MITM anyways.

After all, it is *opportunistic* encryption, and whatever you do to
limit the choices would increase the risk of connections falling back
to good old plain text.

A quick analysis of my log files says:

63% of incoming and 84% of outgoing TLS connections are of the
anonymous DH variant.

Of the outgoing connections, only 10% are ones where a certificate
could be verified.

Disabling RC4 ciphers would lose 3% of the incoming and 0.04% of
outgoing TLS connections.

tl;dr: there's a reason the settings in the paper are what they are.

cm.

-- 
Christian Mock                          Wiedner Hauptstr. 15
Senior Security Engineer                1040 Wien
CoreTEC IT Security Solutions GmbH      +43-1-5037273
FN 214709 z

.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.
CoreTEC: Web Application Audit - Damit so etwas nicht passiert!

http://heise.de/-1260559

.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.



More information about the Ach mailing list