All,
One of the EFA servers I look after is for a company that has to have a PCI Compliance scan.  I've had the results back and it's failing on the following against the EFA server:
The	remote	host	supports	the	use	of	a	block	cipher	with	64-bit	blocks	in	one	or more	cipher	suites.	It	is,	therefore,	affected	by	a	vulnerability,	known	as SWEET32,	due	to	the	use	of	weak	64-bit	block	ciphers.	However, SecurityMetrics	has	not	checked	for	such	a	mitigation.	See	also	: https://sweet32.info	https://www.openssl.org/blog/blog/2016/08/24/sweet32/ Resolution: Reconfigure	the	affected	application,	if	possible,	to	avoid	use	of	all	64-bit	block ciphers.	Alternatively,	place	limitations	on	the	number	of	requests	that	are allowed	to	be	processed	over	the	same	TLS	connection	to	mitigate	this vulnerability. Data	Received: List	of	64-bit	block	cipher	suites	supported	by	the	remote	server	:	Medium Strength	Ciphers	(>	64-bit	and	<	112-bit	key)	TLSv1	EDH-RSA-DES-CBC3-SHA
Resolution: Reconfigure	the	affected	application,	if	possible,	to	avoid	use	of	all	64-bit	block ciphers.	Alternatively,	place	limitations	on	the	number	of	requests	that	are allowed	to	be	processed	over	the	same	TLS	connection	to	mitigate	this vulnerability. Data	Received: List	of	64-bit	block	cipher	suites	supported	by	the	remote	server	:	Medium Strength	Ciphers	(>	64-bit	and	<	112-bit	key)	TLSv1	EDH-RSA-DES-CBC3-SHA
CVSS 5.00 FAIL
Port 25
Protocol TCP
Service smtp
Title SSL	64-bit	Block	Size	Cipher	Suites	Supported	(SWEET32)
Kx=DH	Au=RSA	Enc=3DES-CBC(168)	Mac=SHA1	ECDHE-RSA-DES-CBC3-SHA Kx=ECDH	Au=RSA	Enc=3DES-CBC(168)	Mac=SHA1	DES-CBC3-SHA	Kx=RSA Au=RSA	Enc=3DES-CBC(168)	Mac=SHA1	High	Strength	Ciphers	(>=	112-bit key)	TLSv1	IDEA-CBC-SHA	Kx=RSA	Au=RSA	Enc=IDEA-CBC(128)	Mac=SHA1 The	fields	above	are	:	{OpenSSL	ciphername}	Kx={key	exchange}	Au= {authentication}	Enc={symmetric	encryption	method}	Mac={message authentication	code}	{export	flag}
SSL	Medium	Strength	Cipher	Suites	Supported
Data	Received: Here	is	the	list	of	medium	strength	SSL	ciphers	supported	by	the	remote server	:	Medium	Strength	Ciphers	(>	64-bit	and	<	112-bit	key)	TLSv1	EDH-RSADES-CBC3-SHA	Kx=DH	Au=RSA	Enc=3DES-CBC(168)	Mac=SHA1	ECDHE-RSADES-CBC3-SHA	Kx=ECDH	Au=RSA	Enc=3DES-CBC(168)	Mac=SHA1	DES-CBC3SHA	Kx=RSA	Au=RSA	Enc=3DES-CBC(168)	Mac=SHA1	The	fields	above	are	: {OpenSSL	ciphername}	Kx={key	exchange}	Au={authentication}	Enc= {symmetric	encryption	method}	Mac={message	authentication	code}	{export flag}
Any ideas on how to fix these issues?!
Regards
			
			
									
						
										
						PCI Compliance Scan results
- shawniverson
- Posts: 3783
- Joined: 13 Jan 2014 23:30
- Location: Indianapolis, Indiana USA
- Contact:
Re: PCI Compliance Scan results
Take a look at /etc/postfix/main.cf
Change this to medium or high and reload postfix 
Looks like we need to bring this up a bit by default.
			
			
									
						
										
						Code: Select all
smtpd_tls_ciphers = low

Looks like we need to bring this up a bit by default.
Re: PCI Compliance Scan results
Thanks Shawn, I'll add that and see if it helps.
I'm also after disabling TLS v1.0 and RC4. I did disable TLS v1.0 and some mails stopped coming through as it failed on a TLS handshake.
RC4 I have added as:
to my main.cf.
			
			
									
						
										
						I'm also after disabling TLS v1.0 and RC4. I did disable TLS v1.0 and some mails stopped coming through as it failed on a TLS handshake.
RC4 I have added as:
Code: Select all
smtpd_tls_exclude_ciphers = RC4, aNULL
smtp_tls_exclude_ciphers = RC4, aNULL
- shawniverson
- Posts: 3783
- Joined: 13 Jan 2014 23:30
- Location: Indianapolis, Indiana USA
- Contact:
Re: PCI Compliance Scan results
That's the rub with increasing your encryption with SMTP.
Many servers out there are not as far along with their email security, so if the remote server does not support higher levels of encryption, the connection will most certainly fail.
It is arguable whether increasing the encryption strength of SMTP is worth the loss of delivery, since many systems continue to send and receive email with no encryption at all or fall back to not using it if TLS negotiation fails.
It has been a slow process just to drop SSL in the email community.
			
			
									
						
										
						Many servers out there are not as far along with their email security, so if the remote server does not support higher levels of encryption, the connection will most certainly fail.
It is arguable whether increasing the encryption strength of SMTP is worth the loss of delivery, since many systems continue to send and receive email with no encryption at all or fall back to not using it if TLS negotiation fails.
It has been a slow process just to drop SSL in the email community.
Re: PCI Compliance Scan results
I noticed one of the domains we force TLS to and from had changed their TLS settings to high, and mail was not being delivered, it was OK on low.
On analyzing the MTA logs, it was found we was getting an error similar to below.
postfix/smtp[<pid>]: warning: TLS library problem:
error:1407741A: SSL routines:
SSL23_GET_SERVER_HELLO:tlsv1 alert decode error:
s23_clnt.c:762:
I know their device was a Cisco Iron port smtp appliance.
I did found the articles below at the time.
https://rt.openssl.org/Ticket/Display.h ... pass=guest
http://postfix.1071664.n5.nabble.com/Op ... 66873.html
May help.
			
			
									
						
										
						On analyzing the MTA logs, it was found we was getting an error similar to below.
postfix/smtp[<pid>]: warning: TLS library problem:
error:1407741A: SSL routines:
SSL23_GET_SERVER_HELLO:tlsv1 alert decode error:
s23_clnt.c:762:
I know their device was a Cisco Iron port smtp appliance.
I did found the articles below at the time.
https://rt.openssl.org/Ticket/Display.h ... pass=guest
http://postfix.1071664.n5.nabble.com/Op ... 66873.html
May help.
Re: PCI Compliance Scan results
thewomble - thanks for the links, I'll take a read when I get a moment.
I've also noticed that the mail server I am delivering messages too is rejecting them (it's an Exchange 2010 server) if I disable TLS 1.0. After some reading, it seems you can install support for later versions of TLS on Exchange 2010 (SP3 RU9) which I am going to try.
			
			
									
						
										
						I've also noticed that the mail server I am delivering messages too is rejecting them (it's an Exchange 2010 server) if I disable TLS 1.0. After some reading, it seems you can install support for later versions of TLS on Exchange 2010 (SP3 RU9) which I am going to try.
Re: PCI Compliance Scan results
Here is some thought.  I don't have the PCI requirement, but certainly have an interest in being secure.  
Edit the Postfix configuration file:
vi /etc/postfix/main.cf
Change this line:tls_medium_cipherlist = ECDSA+AESGCM:ECDH+AESGCM:DH+AESGCM:ECDSA+AES:ECDH+AES:DH+AES:ECDH+3DES:DH+3DES:RSA+AESGCM:RSA+AES:RSA+3DES:!aNULL:!MD5:!DSS
To:
tls_medium_cipherlist = ECDSA+AESGCM:ECDH+AESGCM:DH+AESGCM:ECDSA+AES:ECDH+AES:DH+AES:RSA+AESGCM:RSA+AES:!3DES:!aNULL:!MD5:!DSS
Explicity add these lines:
smtpd_tls_exclude_ciphers = 3DES, DES, RC4, MD5, aDSS, kDHE
smtp_tls_exclude_ciphers = 3DES, DES, RC4, MD5, aDSS, kDHE
Save the file. Restart postfix systemctl restart postfix.
By default, the /etc/httpd/conf.d/ssl.conf should already have this setting. If not, change it
SSLCipherSuite ECDSA+AESGCM:ECDH+AESGCM:ECDSA+AES:ECDH+AES:RSA+AESGCM:RSA+AES:!aNULL:!MD5:!DSS:!3DES:!EXP
This setting already turns off the 3DES ciphers
Again, make backups and restart.
			
			
									
						
										
						Edit the Postfix configuration file:
vi /etc/postfix/main.cf
Change this line:tls_medium_cipherlist = ECDSA+AESGCM:ECDH+AESGCM:DH+AESGCM:ECDSA+AES:ECDH+AES:DH+AES:ECDH+3DES:DH+3DES:RSA+AESGCM:RSA+AES:RSA+3DES:!aNULL:!MD5:!DSS
To:
tls_medium_cipherlist = ECDSA+AESGCM:ECDH+AESGCM:DH+AESGCM:ECDSA+AES:ECDH+AES:DH+AES:RSA+AESGCM:RSA+AES:!3DES:!aNULL:!MD5:!DSS
Explicity add these lines:
smtpd_tls_exclude_ciphers = 3DES, DES, RC4, MD5, aDSS, kDHE
smtp_tls_exclude_ciphers = 3DES, DES, RC4, MD5, aDSS, kDHE
Save the file. Restart postfix systemctl restart postfix.
By default, the /etc/httpd/conf.d/ssl.conf should already have this setting. If not, change it
SSLCipherSuite ECDSA+AESGCM:ECDH+AESGCM:ECDSA+AES:ECDH+AES:RSA+AESGCM:RSA+AES:!aNULL:!MD5:!DSS:!3DES:!EXP
This setting already turns off the 3DES ciphers
Again, make backups and restart.

