Does anyone know how to put the chipher on high security?
You could edit the template for /etc/postfix/main.cf (the default template is in /var/lib/pmg/templates/main.cf.in, and you should override it by copying it to /etc/pmg/ and edit it there - check the admin guide https://www.proxmox.com/images/download/pmg/docs/pmg-admin-guide.pdf, and the postfix tls howto http://www.postfix.org/TLS_README.html ).
I believe, he is also looking for something like this: #132
Oh, and a) you should read the post with all information in it, b) you should use some more informal tests like hardenize.com or ssllabs.com (last only for websites), c) you should also consider (as well only for websites) observatory.mozilla.org and gtmetrix.com, e.g. DNSSEC is broken by design (as well) but more worse, it's also an threat vector as DNSSEC could be misused to multiple DNS DDoS amplitudes. DANE the same, broken by design and depends on DNSSEC. BREACH attack stated for my website shouldn't work as I have HSTS enabled and be on the preload list, IPv6 for mail server is currently no good idea, as there is less protection against spam with IPv6. I play around also with other broken by design techniques like SPF, DKIM and DMARC on my private test setup, so that are the results currently.
You could edit the template for /etc/postfix/main.cf (the default template is in /var/lib/pmg/templates/main.cf.in, and you should override it by copying it to /etc/pmg/ and edit it there - check the admin guide https://www.proxmox.com/images/download/pmg/docs/pmg-admin-guide.pdf, and the postfix tls howto http://www.postfix.org/TLS_README.html ).
We use essential cookies to make this site work, and optional cookies to enhance your experience.