|
|
@ -50,7 +50,7 @@ smtpd_authorized_xclient_hosts={{ POD_ADDRESS_RANGE or SUBNET }}
|
|
|
|
# General TLS configuration
|
|
|
|
# General TLS configuration
|
|
|
|
tls_high_cipherlist = EDH+CAMELLIA:EDH+aRSA:EECDH+aRSA+AESGCM:EECDH+aRSA+SHA256:EECDH:+CAMELLIA128:+AES128:+SSLv3:!aNULL:!eNULL:!LOW:!3DES:!MD5:!EXP:!PSK:!DSS:!RC4:!SEED:!IDEA:!ECDSA:kEDH:CAMELLIA128-SHA:AES128-SHA
|
|
|
|
tls_high_cipherlist = EDH+CAMELLIA:EDH+aRSA:EECDH+aRSA+AESGCM:EECDH+aRSA+SHA256:EECDH:+CAMELLIA128:+AES128:+SSLv3:!aNULL:!eNULL:!LOW:!3DES:!MD5:!EXP:!PSK:!DSS:!RC4:!SEED:!IDEA:!ECDSA:kEDH:CAMELLIA128-SHA:AES128-SHA
|
|
|
|
tls_preempt_cipherlist = yes
|
|
|
|
tls_preempt_cipherlist = yes
|
|
|
|
tls_ssl_options = NO_COMPRESSION
|
|
|
|
tls_ssl_options = NO_COMPRESSION, NO_TICKET
|
|
|
|
|
|
|
|
|
|
|
|
# By default, outgoing TLS is more flexible because
|
|
|
|
# By default, outgoing TLS is more flexible because
|
|
|
|
# 1. not all receiving servers will support TLS,
|
|
|
|
# 1. not all receiving servers will support TLS,
|
|
|
@ -58,7 +58,8 @@ tls_ssl_options = NO_COMPRESSION
|
|
|
|
smtp_tls_security_level = {{ OUTBOUND_TLS_LEVEL|default('may') }}
|
|
|
|
smtp_tls_security_level = {{ OUTBOUND_TLS_LEVEL|default('may') }}
|
|
|
|
smtp_tls_mandatory_protocols = !SSLv2, !SSLv3
|
|
|
|
smtp_tls_mandatory_protocols = !SSLv2, !SSLv3
|
|
|
|
smtp_tls_protocols =!SSLv2,!SSLv3
|
|
|
|
smtp_tls_protocols =!SSLv2,!SSLv3
|
|
|
|
smtp_tls_session_cache_database = lmdb:${data_directory}/smtp_scache
|
|
|
|
smtp_tls_session_cache_database = lmdb:/dev/shm/postfix/smtp_scache
|
|
|
|
|
|
|
|
smtpd_tls_session_cache_database = lmdb:/dev/shm/postfix/smtpd_scache
|
|
|
|
|
|
|
|
|
|
|
|
###############
|
|
|
|
###############
|
|
|
|
# Virtual
|
|
|
|
# Virtual
|
|
|
|