At least one of your mail servers supports insufficiently secure parameters for Diffie-Hellman key exchange.

BenWinter

New Member
Dec 7, 2022
1
0
1
Hello,

I am trying to harden our TLS version and ciphers due to the following errors:

Verdict:​

At least one of your mail servers supports one or more ciphers that have a phase out status, because they are known to be fragile and are at risk of becoming insufficiently secure.
Mail server (MX)First found affected cipherStatus
*.AES128-SHAphase out

Verdict:​

At least one of your mail servers supports insufficiently secure parameters for Diffie-Hellman key exchange.
Mail server (MX)Affected parametersSecurity level
*DH-2048insufficient

How can i disable these ?

Regards,
 
I am trying to harden our TLS version and ciphers due to the following errors:
Can make sense - but keep in mind that SMTP uses opportunistic TLS - meaning if a sending server does only support weak ciphers and there is no overlap the traffic will go through as plaintext (instead of weakly encrypted).

On the other hand at some point it might make sense to get rid of really old ciphers

In any case the configuration needs to be done for postfix - see the reference documentation:
https://www.postfix.org/TLS_README.html#server_cipher

to make changes to PMG's postfix config use the templateing system:
https://pmg.proxmox.com/pmg-docs/pmg-admin-guide.html#pmgconfig_template_engine

I hope this helps!
 

About

The Proxmox community has been around for many years and offers help and support for Proxmox VE, Proxmox Backup Server, and Proxmox Mail Gateway.
We think our community is one of the best thanks to people like you!

Get your subscription!

The Proxmox team works very hard to make sure you are running the best software and getting stable updates and security enhancements, as well as quick enterprise support. Tens of thousands of happy customers have a Proxmox subscription. Get yours easily in our online shop.

Buy now!