Displaying 20 results from an estimated 141 matches for "eecdh".
Did you mean:
ecdh
2013 Oct 15
0
"Perfect Forward Secrecy" on Redhat/Fedora
...ny hours:
https://bugzilla.redhat.com/show_bug.cgi?id=1019390
https://bugzilla.redhat.com/show_bug.cgi?id=319901#c108
______________________________
recent dovecot with also support older clients but
perfer best possible encryption for modern ones
ssl_prefer_server_ciphers = yes
ssl_cipher_list =
EECDH+ECDSA+AESGCM:EECDH+aRSA+AESGCM:EECDH+ECDSA+SHA384:EECDH+ECDSA+SHA256:EECDH+aRSA+SHA384:EECDH+aRSA+SHA256:EECDH+aRSA+RC4:EECDH:EDH+aRSA:RC4:!aNULL:!eNULL:!LOW:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SSLv2:@STRENGTH
______________________________
the same for Apache:
SSLHonorCipherOrder On
SSLCipherSuite
E...
2015 Feb 06
2
TLS config check
...tials:
dovecot --version: 2.2.15
/usr/local/etc/dovecot/conf.d/10-ssl.conf:
ssl = required
ssl_cert =
</usr/local/openssl/certs/mail.domain.com.chained.dovecot.ecdsa.crt
ssl_key = </usr/local/openssl/certs/mail.domain.com.ecdsa.key
ssl_protocols = !SSLv2 !SSLv3
ssl_cipher_list =
HIGH:EECDH+ECDSA+AESGCM:EECDH+aRSA+AESGCM:EECDH+ECDSA+SHA384:EECDH+ECDSA+SHA256:EECDH+aRSA+SHA384:EECDH+aRSA+SHA256:EECDH:EDH+aRSA:ECDHE-RSA-AES256-SHA:+DHE-RSA-AES256-SHA:!AES256-SHA256:!AES256-GCM-SHA384:!CAMELLIA256-SHA:!AES128:!CAMELLIA128:!aNULL:!eNULL:!LOW:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!RC4:!SEED:+AES2...
2017 Apr 26
3
Apache + SSL: default configuration rated "C" by Qualys Labs
...//wiki.mozilla.org/Security/Server_Side_TLS
I'm not 100% on any differences in ciphers available, but I don't
think there should be much difference between EL7 and Fedora.
This config gets my an A+ rating on the sslabs test:
SSLEngine on
SSLProtocol all -SSLv2 -SSLv3
SSLCipherSuite "EECDH+aRSA+AESGCM EECDH+aRSA+SHA384 EECDH+aRSA+SHA256
EECDH+aRSA+RC4 EECDH EDH+aRSA !aNULL !eNULL !LOW !MEDIUM !SEED !3DES
!CAMELLIA !MD5 !EXP !PSK !SRP !DSS !RC4"
<IfModule mod_headers.c>
Header always set Strict-Transport-Security "max-age=15768000;
includeSubDomains; preload&quo...
2018 Dec 19
1
How to configure Dovecot to disable NIST's curves and still rertain EECDH?
...;s not an easy feat to do anyway so I
don't want to depend on implementations that say they are actually doing
it the right way. Frankly I can't be bothered to keep up with that.
There are better curves TODAY, so yes I intend to use them if I can find
a way. Otherwise, I'll just keep EECDH disabled.
I have EDH now, and I've not yet run into a client that doesn't support
it. I want EECDH, but I won't use it without safe curves. I'm
confident that EECDH with safe curves and a second choice of EDH will
support any clients that are worth using. OpenSSL supports X2551...
2018 Dec 19
1
How to configure Dovecot to disable NIST's curves and still rertain EECDH?
...general distrust of NIST's curves and any of their other
cryptographic primitives after the Dual EC DRBG debacle.
>From what I can tell, the following will prevent the use of NIST's
curves (along with other dangerous primitives) in Dovecot, but this is
accomplished by simply disabling EECDH entirely.
ssl_cipher_list = HIGH:!DSS:!EECDH:!ECDH:!SHA1:!aNULL:!eNULL:@STRENGTH
This should still retain forward secrecy through the use of EDH, but
this doesn't leave much in the way of allowable algorithms on my server:
$ openssl ciphers -V
'HIGH:!DSS:!EECDH:!ECDH:!SHA1:!aNULL:!eNULL:...
2017 Jul 13
5
passwd-file, getting invalid uid 0
...r =
}
user = $default_internal_user
vsz_limit = 18446744073709551615 B
}
service tcpwrap {
unix_listener login/tcpwrap {
group = $default_login_user
mode = 0600
user = $default_login_user
}
}
ssl_cert = </home/ler/letsencrypt-home/lerctr.org/fullchain.cer
ssl_cipher_list = EECDH+ECDSA+AESGCM:EECDH+aRSA+AESGCM:EECDH+ECDSA+SHA384:EECDH+ECDSA+SHA256:EECDH+aRSA+SHA384:EECDH+aRSA+SHA256:EECDH+AESGCM:EECDH:EDH+AESGCM:EDH+aRSA:HIGH:!MEDIUM:!LOW:!aNULL:!eNULL:!LOW:!RC4:!MD5:!EXP:!PSK:!SRP:!DSS
ssl_key = # hidden, use -P to show it
ssl_protocols = !SSLv2 !SSLv3
userdb {
args = /...
2017 Dec 25
2
Sieve 0.5.0/Dovecot 2.3.0
...unix_listener stats-writer {
group = mail
mode = 0660
user =
}
}
service tcpwrap {
unix_listener login/tcpwrap {
group = $default_login_user
mode = 0600
user = $default_login_user
}
}
ssl_cert = </home/ler/letsencrypt-home/lerctr.org/fullchain.cer
ssl_cipher_list = EECDH+ECDSA+AESGCM:EECDH+aRSA+AESGCM:EECDH+ECDSA+SHA384:EECDH+ECDSA+SHA256:EECDH+aRSA+SHA384:EECDH+aRSA+SHA256:EECDH+AESGCM:EECDH:EDH+AESGCM:EDH+aRSA:HIGH:!MEDIUM:!LOW:!aNULL:!eNULL:!LOW:!RC4:!MD5:!EXP:!PSK:!SRP:!DSS
ssl_dh = # hidden, use -P to show it
ssl_key = # hidden, use -P to show it
userdb {...
2017 Dec 25
3
Sieve 0.5.0/Dovecot 2.3.0
...service tcpwrap {
> > unix_listener login/tcpwrap {
> > group = $default_login_user
> > mode = 0600
> > user = $default_login_user
> > }
> > }
> > ssl_cert = </home/ler/letsencrypt-home/lerctr.org/fullchain.cer
> > ssl_cipher_list = EECDH+ECDSA+AESGCM:EECDH+aRSA+AESGCM:EECDH+ECDSA+SHA384:EECDH+ECDSA+SHA256:EECDH+aRSA+SHA384:EECDH+aRSA+SHA256:EECDH+AESGCM:EECDH:EDH+AESGCM:EDH+aRSA:HIGH:!MEDIUM:!LOW:!aNULL:!eNULL:!LOW:!RC4:!MD5:!EXP:!PSK:!SRP:!DSS
> > ssl_dh = # hidden, use -P to show it
> > ssl_key = # hidden, use -P to...
2017 Nov 09
2
Sieve global path?
...ssl = yes
? }
}
service quota-warning {
? executable = script /usr/local/bin/overquota.sh
? group = vmail
? unix_listener quota-warning {
??? group = vmail
??? user = vmail
? }
? user = vmail
}
ssl = required
ssl_cert = </etc/letsencrypt/live/mydomain.com/fullchain.pem
ssl_cipher_list =
EECDH+ECDSA+AESGCM:EECDH+aRSA+AESGCM:EECDH+ECDSA+SHA384:EECDH+ECDSA+SHA256:EECDH+aRSA+SHA384:EECDH+aRSA+SHA256:EECDH+aRSA+RC4:EECDH:EDH+aRSA:!aNULL:!eNULL:!LOW:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!RC4
ssl_key = </etc/letsencrypt/live/mydomain.com/privkey.pem
ssl_prefer_server_ciphers = yes
ssl_protocols =...
2014 Jun 15
3
Thunderbird bug, anyone else have seen it?
...me/url-handlers/EDH+aRSA/command": `+' is an invalid
character in key/directory names
Bad key or directory name:
"/desktop/gnome/url-handlers/EDH+aRSA/command": `+' is an invalid
character in key/directory names
Bad key or directory name:
"/desktop/gnome/url-handlers/EECDH+aRSA+AESGCM/command": `+' is an
invalid character in key/directory names
Bad key or directory name:
"/desktop/gnome/url-handlers/EECDH+aRSA+AESGCM/command": `+' is an
invalid character in key/directory names
Bad key or directory name:
"/desktop/gnome/url-handlers/EEC...
2019 Sep 08
1
Subscribe to a fileinto :create mailbox?
...nix_listener stats-writer {
group = mail
mode = 0666
user =
}
}
service tcpwrap {
unix_listener login/tcpwrap {
group = $default_login_user
mode = 0600
user = $default_login_user
}
}
ssl_cert = </home/ler/letsencrypt-home/*.lerctr.org/fullchain.cer
ssl_cipher_list =
EECDH+ECDSA+AESGCM:EECDH+aRSA+AESGCM:EECDH+ECDSA+SHA384:EECDH+ECDSA+SHA256:EECDH+aRSA+SHA384:EECDH+aRSA+SHA256:EECDH+AESGCM:EECDH:EDH+AESGCM:EDH+aRSA:HIGH:!MEDIUM:!LOW:!aNULL:!eNULL:!LOW:!RC4:!MD5:!EXP:!PSK:!SRP:!DSS
ssl_dh = # hidden, use -P to show it
ssl_key = # hidden, use -P to show it
userdb {
ar...
2015 Feb 06
0
TLS config check
...ecot/conf.d/10-ssl.conf:
>
> ssl = required
>
> ssl_cert =
> </usr/local/openssl/certs/mail.domain.com.chained.dovecot.ecdsa.crt
>
> ssl_key = </usr/local/openssl/certs/mail.domain.com.ecdsa.key
>
> ssl_protocols = !SSLv2 !SSLv3
>
> ssl_cipher_list =
>
HIGH:EECDH+ECDSA+AESGCM:EECDH+aRSA+AESGCM:EECDH+ECDSA+SHA384:EECDH+ECDSA+SHA256:EECDH+aRSA+SHA384:EECDH+aRSA+SHA256:EECDH:EDH+aRSA:ECDHE-RSA-AES256-SHA:+DHE-RSA-AES256-SHA:!AES256-SHA256:!AES256-GCM-SHA384:!CAMELLIA256-SHA:!AES128:!CAMELLIA128:!aNULL:!eNULL:!LOW:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!RC4:!SEED:+AES2...
2017 Jun 05
0
2nd try: Thunderbird "Empty Trash" causes inconsistent IMAP session state?
...e/Dovecot/sys/etc/dovecot/imap.passwd
driver = passwd-file
}
plugin {
fts = lucene
fts_lucene = whitespace_chars=@.
zlib_save = lz4
zlib_save_level = 6
}
protocols = imap
ssl = required
ssl_cert = </raid/data/module/Dovecot/sys/etc/ssl/certs/dovecot-rsa-cert.pem
ssl_cipher_list =
EECDH+ECDSA+AESGCM:EECDH+aRSA+AESGCM:EECDH+ECDSA+SHA384:EECDH+ECDSA+SHA256:EECDH+aRSA+SHA384:EECDH+aRSA+SHA256:EECDH+aRSA+RC4:EECDH:EDH+aRSA:!aNULL:!eNULL:!LOW:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!RC4
ssl_dh_parameters_length = 2048
ssl_key = # hidden, use -P to show it
ssl_key_password = # hidden, use -P t...
2017 Jul 18
1
passwd-file, getting invalid uid 0
...ce tcpwrap {
> > unix_listener login/tcpwrap {
> > group = $default_login_user
> > mode = 0600
> > user = $default_login_user
> > }
> > }
> > ssl_cert = </home/ler/letsencrypt-home/lerctr.org/fullchain.cer
> > ssl_cipher_list =
> EECDH+ECDSA+AESGCM:EECDH+aRSA+AESGCM:EECDH+ECDSA+SHA384:
> > EECDH+ECDSA+SHA256:EECDH+aRSA+SHA384:EECDH+aRSA+SHA256:
> > EECDH+AESGCM:EECDH:EDH+AESGCM:EDH+aRSA:HIGH:!MEDIUM:!LOW:!
> > aNULL:!eNULL:!LOW:!RC4:!MD5:!EXP:!PSK:!SRP:!DSS
> > ssl_key = # hidden, use -P to show it
> &...
2014 Sep 15
1
migration from cyrus with dsync sieve problem
...l/postfix/private/auth {
mode = 0666
}
}
service imap-login {
inet_listener imap {
port = 143
}
inet_listener imaps {
port = 993
ssl = yes
}
}
service lmtp {
user = vmail
}
ssl = required
ssl_cert = </etc/pki/tls/certs/imap.mydomain.com.crt
ssl_cipher_list = EECDH+ECDSA+AESGCM EECDH+aRSA+AESGCM
EECDH+ECDSA+SHA384 EECDH+ECDSA+SHA256 EECDH+aRSA+SHA384
EECDH+aRSA+SHA256 EECDH+aRSA+AES EECDH+aRSA+RC4 EECDH EDH+aRSA RC4
!aNULL !eNULL !LOW !3DES !MD5 !EXP !PSK !SRP !DSS
ssl_dh_parameters_length = 2048
ssl_key = </etc/pki/tls/private/imap.mydomain.com.pem
ssl...
2013 Oct 18
2
patch for ssl_prefer_server_ciphers in dovecot 2.1
Dear all,
I tried to do a backport of 'ssl_prefer_server_ciphers'
(http://hg.dovecot.org/dovecot-2.2/rev/897484f45a87/) to Dovecot 2.1
(namely the Debian version of Dovecot) and wanted to ask if there is any
chance to integrate this feature into Dovecot 2.1 'upstream' as well.
As the code structure changed quite a bit, I am not sure if my patch is
complete. I tested it with pop3s
2017 Jul 18
1
passwd-file, getting invalid uid 0
...gt; service tcpwrap {
> unix_listener login/tcpwrap {
> group = $default_login_user
> mode = 0600
> user = $default_login_user
> }
> }
> ssl_cert = </home/ler/letsencrypt-home/lerctr.org/fullchain.cer
> ssl_cipher_list = EECDH+ECDSA+AESGCM:EECDH+aRSA+AESGCM:EECDH+ECDSA+SHA384:EECDH+ECDSA+SHA256:EECDH+aRSA+SHA384:EECDH+aRSA+SHA256:EECDH+AESGCM:EECDH:EDH+AESGCM:EDH+aRSA:HIGH:!MEDIUM:!LOW:!aNULL:!eNULL:!LOW:!RC4:!MD5:!EXP:!PSK:!SRP:!DSS
> ssl_key = # hidden, use -P to show it
> ssl_protocols = !SSLv2 !SSLv3
&...
2017 Mar 02
3
welcome plugin
Hello,
Is anyone using the welcome plugin? I'm trying to utilize it to send a
message when a user first logs in to the system, containing important
information for them to know. The plugin loads, I don't have a
configuration problem, but the message never gets sent.
What can I provide to more easily troubleshoot this?
Thanks.
Dave.
2017 Dec 14
0
Panic: file imap-client.c: line 1204 (client_handle_input): assertion failed: (o_stream_is_corked(client->output))
...db_imapc_port=993
driver = imap
}
postmaster_address = postmaster at charite.de
protocols = imap
service auth {
inet_listener {
address = 127.0.0.1
port = 12345
}
}
ssl = required
ssl_ca = </etc/ssl/certs/ca-certificates.crt
ssl_cert = </etc/dovecot/dovecot.pem
ssl_cipher_list = EECDH+ECDSA+AESGCM:EECDH+aRSA+AESGCM:EECDH+ECDSA+SHA384:EECDH+ECDSA+SHA256:EECDH+aRSA+SHA384:EECDH+aRSA+SHA256:EECDH+aRSA+RC4:EECDH:EDH+aRSA:!aNULL:!eNULL:!LOW:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!RC4
ssl_client_ca_file = /etc/ssl/certs/ca-certificates.crt
ssl_dh = # hidden, use -P to show it
ssl_key = # hi...
2017 Jun 05
2
2nd try: Thunderbird "Empty Trash" causes inconsistent IMAP session state?
On 05.06.2017 11:02, awl1 wrote:
> Resending - any ideas why I might get "IMAP session state is inconsistent" whenever emtyping the trash in Thunderbird?
>
> Thanks,
> Andreas
>
>
> Am 31.05.2017 um 00:02 schrieb awl1:
>> All,
>>
>> having successfully compiled and set up Dovecot 2.2.29.1 on my Thecus NAS as a newbie without any further hassle,