<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title><![CDATA[iRedMail — Missing ciphers after migration]]></title>
		<link>https://forum.iredmail.org/topic20324-missing-ciphers-after-migration.html</link>
		<atom:link href="https://forum.iredmail.org/feed-rss-topic20324.xml" rel="self" type="application/rss+xml" />
		<description><![CDATA[The most recent posts in Missing ciphers after migration.]]></description>
		<lastBuildDate>Fri, 29 Mar 2024 02:39:46 +0000</lastBuildDate>
		<generator>PunBB</generator>
		<item>
			<title><![CDATA[Re: Missing ciphers after migration]]></title>
			<link>https://forum.iredmail.org/post88504.html#p88504</link>
			<description><![CDATA[<p>Thanks for sharing. <img src="https://forum.iredmail.org/img/smilies/smile.png" width="15" height="15" alt="smile" /></p>]]></description>
			<author><![CDATA[null@example.com (ZhangHuangbin)]]></author>
			<pubDate>Fri, 29 Mar 2024 02:39:46 +0000</pubDate>
			<guid>https://forum.iredmail.org/post88504.html#p88504</guid>
		</item>
		<item>
			<title><![CDATA[Re: Missing ciphers after migration]]></title>
			<link>https://forum.iredmail.org/post88337.html#p88337</link>
			<description><![CDATA[<p>Actually, Zhang, I think I found the issue and I wouldn&#039;t be surprised if other people didn&#039;t eventually run into the same problem.</p><p>I use certbot to generate Let&#039;s Encrypt certificates. After certbot version 2.0.0 the default key type changed from RSA to ECDSA. When I change the key type I am warned that unless you support very old HTTPS clients you should use ECDSA.</p><p>I have never had an issue with the certificates using ECDSA until I used them for SMTP, IMAP, and POP, because we do, unfortunately, support older clients.</p><p>I have tested generating RSA keys with certbot v2+ and used them on another iredmail server and the ciphers listed by ssl-enum-ciphers includes RSA, so I think it was the LE certificate all along.</p><p>Unfortunately due to rate limiting I cannot really know for sure if this resolves the issue on the server I&#039;m having the problem with but I&#039;ll report back in a few days with the answer, but I am fairly certain this is the issue.</p><p>Anyone using certbot v2+ needs to be aware that their certificates might break compatibility with older devices, despite openssl, postfix, and dovecot configuration.</p>]]></description>
			<author><![CDATA[null@example.com (bradford)]]></author>
			<pubDate>Thu, 29 Feb 2024 17:48:12 +0000</pubDate>
			<guid>https://forum.iredmail.org/post88337.html#p88337</guid>
		</item>
		<item>
			<title><![CDATA[Re: Missing ciphers after migration]]></title>
			<link>https://forum.iredmail.org/post88332.html#p88332</link>
			<description><![CDATA[<p>Try not to disable TLSv1 and TLSv1 in Postfix parameters:<br /></p><div class="codebox"><pre><code>grep &#039;TLSv1&#039; /etc/postfix/main.cf</code></pre></div>]]></description>
			<author><![CDATA[null@example.com (ZhangHuangbin)]]></author>
			<pubDate>Thu, 29 Feb 2024 08:35:44 +0000</pubDate>
			<guid>https://forum.iredmail.org/post88332.html#p88332</guid>
		</item>
		<item>
			<title><![CDATA[Missing ciphers after migration]]></title>
			<link>https://forum.iredmail.org/post88331.html#p88331</link>
			<description><![CDATA[<p>==== REQUIRED BASIC INFO OF YOUR IREDMAIL SERVER ====<br />- iRedMail version (check /etc/iredmail-release): 1.6.8 MARIADB<br />- Deployed with downloadable installer<br />- Linux/BSD distribution name and version: Rocky Linux 8 amd64<br />- Store mail accounts in which backend (LDAP/MySQL/PGSQL): MySQL<br />- Web server (Apache or Nginx): Nginx<br />- Manage mail accounts with iRedAdmin-Pro: Yes<br />- [IMPORTANT] Related original log or error message is required if you&#039;re experiencing an issue.<br />====</p><p>I recently did a migration from centos 7 running iredmail 1.6.8 to rocky 8, same version iredmail. After installation available ciphers looked normal, after migration I have a limited number of ciphers. Legacy devices like copy machines and printers can no longer connect to the new iredmail deployment.</p><div class="codebox"><pre><code>Feb 28 19:43:42 mail postfix/submission/smtpd[4925]: SSL_accept error from printer.example.com[10.13.2.57]: -1
Feb 28 19:43:42 mail postfix/submission/smtpd[4925]: warning: TLS library problem: error:1417A0C1:SSL routines:tls_post_process_client_hello:no shared cipher:ssl/statem/statem_srvr.c:2285:</code></pre></div><p>I&#039;ve went over postfix configuration and cannot find a configuration causing this behavior. I&#039;ve checked openssl ciphers using the value from tls_medium_cipherlist and subtracted smtpd_tls_exclude_ciphers and the list is much longer than what I actually get when I run the service and check with nmap ssl-enum-ciphers.</p><p>I have all ECDHE ECDSA but I do not have any DHE or RSA which I think is what the legacy devices need.</p><p>After the migration and a lot of reading, testing, poking, I decided openssl must be broken and I did the migration again... after a fresh install, postfix configured the same way, I checked ciphers with nmap ssl-enum-ciphers and it looked good. So I completed the migration and BOOM, the problem is back.</p><p>Can you think of any other configuration outside of postfix that would cause the issue that I&#039;m describing? OpenSSL supports many ciphers, postfix is configured to use many ciphers, but doesn&#039;t?</p><p>My main.cf</p><div class="codebox"><pre><code>smtpd_tls_ciphers = medium
tls_medium_cipherlist = aNULL:-aNULL:HIGH:MEDIUM:+RC4:@STRENGTH
smtpd_tls_exclude_ciphers = aNULL, eNULL, EXPORT, DES, 3DES, RC4, MD5, PSK, aECDH, KRB5-DE5, CBC3-SHA</code></pre></div><p>So with the above I check the ciphers:<br /></p><div class="codebox"><pre><code>openssl ciphers -v &#039;aNULL:-aNULL:HIGH:MEDIUM:+RC4:@STRENGTH:!aNULL:!eNULL:!EXPORT:!DES:!3DES:!RC4:!MD5:!PSK:!aECDH:!KRB5-DE5:!CBC3-SHA&#039; \
  | awk &#039;/TLSv/{ print $1 }&#039; \
  | sort</code></pre></div><p>I get this list:</p><div class="codebox"><pre><code>AES128-CCM
AES128-CCM8
AES128-GCM-SHA256
AES128-SHA256
AES256-CCM
AES256-CCM8
AES256-GCM-SHA384
AES256-SHA256
ARIA128-GCM-SHA256
ARIA256-GCM-SHA384
CAMELLIA128-SHA256
CAMELLIA256-SHA256
DHE-DSS-AES128-GCM-SHA256
DHE-DSS-AES128-SHA256
DHE-DSS-AES256-GCM-SHA384
DHE-DSS-AES256-SHA256
DHE-DSS-ARIA128-GCM-SHA256
DHE-DSS-ARIA256-GCM-SHA384
DHE-DSS-CAMELLIA128-SHA256
DHE-DSS-CAMELLIA256-SHA256
DHE-RSA-AES128-CCM
DHE-RSA-AES128-CCM8
DHE-RSA-AES128-GCM-SHA256
DHE-RSA-AES128-SHA256
DHE-RSA-AES256-CCM
DHE-RSA-AES256-CCM8
DHE-RSA-AES256-GCM-SHA384
DHE-RSA-AES256-SHA256
DHE-RSA-ARIA128-GCM-SHA256
DHE-RSA-ARIA256-GCM-SHA384
DHE-RSA-CAMELLIA128-SHA256
DHE-RSA-CAMELLIA256-SHA256
DHE-RSA-CHACHA20-POLY1305
ECDHE-ARIA128-GCM-SHA256
ECDHE-ARIA256-GCM-SHA384
ECDHE-ECDSA-AES128-CCM
ECDHE-ECDSA-AES128-CCM8
ECDHE-ECDSA-AES128-GCM-SHA256
ECDHE-ECDSA-AES128-SHA
ECDHE-ECDSA-AES128-SHA256
ECDHE-ECDSA-AES256-CCM
ECDHE-ECDSA-AES256-CCM8
ECDHE-ECDSA-AES256-GCM-SHA384
ECDHE-ECDSA-AES256-SHA
ECDHE-ECDSA-AES256-SHA384
ECDHE-ECDSA-ARIA128-GCM-SHA256
ECDHE-ECDSA-ARIA256-GCM-SHA384
ECDHE-ECDSA-CAMELLIA128-SHA256
ECDHE-ECDSA-CAMELLIA256-SHA384
ECDHE-ECDSA-CHACHA20-POLY1305
ECDHE-RSA-AES128-GCM-SHA256
ECDHE-RSA-AES128-SHA
ECDHE-RSA-AES128-SHA256
ECDHE-RSA-AES256-GCM-SHA384
ECDHE-RSA-AES256-SHA
ECDHE-RSA-AES256-SHA384
ECDHE-RSA-CAMELLIA128-SHA256
ECDHE-RSA-CAMELLIA256-SHA384
ECDHE-RSA-CHACHA20-POLY1305
TLS_AES_128_CCM_SHA256
TLS_AES_128_GCM_SHA256
TLS_AES_256_GCM_SHA384
TLS_CHACHA20_POLY1305_SHA256</code></pre></div><p>But this is what I see on 465, 587:</p><div class="codebox"><pre><code>PORT    STATE SERVICE  VERSION
465/tcp open  ssl/smtp Postfix smtpd
| ssl-enum-ciphers: 
|   TLSv1.2: 
|     ciphers: 
|       TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
|       TLS_ECDHE_ECDSA_WITH_AES_128_CCM (secp256r1) - A
|       TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 (secp256r1) - A
|       TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
|       TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
|       TLS_ECDHE_ECDSA_WITH_AES_256_CCM (secp256r1) - A
|       TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8 (secp256r1) - A
|       TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
|       TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256 (secp256r1) - A
|       TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384 (secp256r1) - A
|       TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
|       TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
|       TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|     compressors: 
|       NULL
|     cipher preference: client
|   TLSv1.3: 
|     ciphers: 
|       TLS_AKE_WITH_AES_128_CCM_SHA256 (ecdh_x25519) - A
|       TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|       TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
|       TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|     cipher preference: client
|_  least strength: A</code></pre></div><p>Now, I should mention I also see this same behavior with dovecot, and nginx. It doesn&#039;t seem to be an issue with any specific service or configuration. Could iRedAdmin-Pro SQL have anything to do with it? It&#039;s one of the components I install last in the migration.</p>]]></description>
			<author><![CDATA[null@example.com (bradford)]]></author>
			<pubDate>Thu, 29 Feb 2024 05:30:56 +0000</pubDate>
			<guid>https://forum.iredmail.org/post88331.html#p88331</guid>
		</item>
	</channel>
</rss>
