Tighten TLS - usage of specific ssl_ec-curve

Martin martin_dovecot at sg3.yourweb.de
Thu Apr 14 17:55:11 UTC 2016


Hi folks, at first: thanks very much for the great piece of software!

I have a proposal to tighten the TLS security: enable the usage of a specific ec-curve in the 10-ssl.conf, e.g.

	ssl_ec-curve = secp384r1


Reason: I use a 384 bit EC server key, but dovecot uses "only" a prime256v1 curve.


Keygen was:
f=dovecot; openssl ecparam -name secp384r1 -genkey -out $f.key 
openssl req -new -x509 -key $f.key -out ${f}.crt -days 2000 -sha512


Server check gives:
prio  ciphersuite                    protocols  pfs                 curves
1     ECDHE-ECDSA-AES128-GCM-SHA256  TLSv1.2    ECDH,P-256,256bits  prime256v1
2     ECDHE-ECDSA-AES128-SHA256      TLSv1.2    ECDH,P-256,256bits  prime256v1
3     ECDHE-ECDSA-AES128-SHA         TLSv1.2    ECDH,P-256,256bits  prime256v1
4     ECDHE-ECDSA-AES256-GCM-SHA384  TLSv1.2    ECDH,P-256,256bits  prime256v1
5     ECDHE-ECDSA-AES256-SHA384      TLSv1.2    ECDH,P-256,256bits  prime256v1
6     ECDHE-ECDSA-AES256-SHA         TLSv1.2    ECDH,P-256,256bits  prime256v1

Certificate: UNTRUSTED, 384 bit, ecdsa-with-SHA512 signature



$ sudo nano /etc/dovecot/conf.d/10-ssl.conf
ssl = required
ssl_protocols = !SSlv2 !SSLv3 TLSv1.2
ssl_cipher_list = EECDH+AES128+AESGCM:EECDH+AES256+AESGCM:EECDH+AES128+SHA256:EECDH+AES256+SHA384:EECDH+AES128+SHA:EECDH+AES256+SHA
ssl_prefer_server_ciphers = yes
ssl_key = </etc/dovecot/dovecot.key
ssl_cert = </etc/dovecot/dovecot.crt


OS is arch linux.

Thanks very much,
Martin



More information about the dovecot mailing list