The site weakdh.org explains how to fix postfix against the weak Diffie-Hellman attack called "logjam".
But don't I have to fix courier too? Or do I have to migrate to dovecot to be logjam-safe?
The site weakdh.org explains how to fix postfix against the weak Diffie-Hellman attack called "logjam".
But don't I have to fix courier too? Or do I have to migrate to dovecot to be logjam-safe?
I found this blog post that explains it quite well.
To speed this up, first check, if you already have good parameters in
/etc/ssl/certs/dhparams.pem
check withif so copy them into
/etc/courier/dhparams.pem
withotherwise generate with
Courrier version 4.15 removes the TLS_DHCERTFILE parameter from imap, and pop3d configuration files. DH parameters, and DH parameters only, get read from the new TLS_DHPARAMS file (and the other functionaly of TLS_DHCERTFILE, for DSA certificates, is merged into TLS_CERTFILE). After upgrading, run the mkdhparams script to create a new TLS_DHPARAMS file.
So check your installed version with
If you have at least Version 4.15, now edit
/etc/courier/imapd-ssl
and setrestart courier-imap-ssl:
check the connection with openssl version 1.0.2a.
When using courier, you need to make sure that Diffie-Hellman parameters in
/etc/courier/dhparams.pem
are generated with more than the default 768 bit. I guess 2048 or 4096 bit should do.Instead of using
mkdhparams
to generatedhparams.pem
(with just 768 bit by default!) you could do it that way:Here's some info (in German) and some further reading about how to mitigate the Logjam-attack on Courier-MTA.