Unterschiede
Hier werden die Unterschiede zwischen zwei Versionen angezeigt.
centos:mail_c7:postfix3_5 [14.02.2019 21:51. ] – [eMail-Verkehr] django | centos:mail_c7:postfix3_5 [18.11.2024 19:13. ] (aktuell) – Externe Bearbeitung 127.0.0.1 | ||
---|---|---|---|
Zeile 537: | Zeile 537: | ||
<file perl / | <file perl / | ||
# Liste eines Zertifikatsbundles ausgeben. | # Liste eines Zertifikatsbundles ausgeben. | ||
- | # Django <django@mailserver.guru> (c) 2019 | + | # Django <django@nausch.org> (c) 2019 |
# | # | ||
$file = shift; | $file = shift; | ||
Zeile 565: | Zeile 565: | ||
subject= /O=CAcert Inc./ | subject= /O=CAcert Inc./ | ||
- | ==== CA Vetrauensmodell | + | ==== CA Vertrauensmodell |
{{page> | {{page> | ||
Zeile 1897: | Zeile 1897: | ||
<file bash edh_keygen># | <file bash edh_keygen># | ||
# Script zum Erstellen der Diffie Hellman Schlüssel | # Script zum Erstellen der Diffie Hellman Schlüssel | ||
- | # Django <django@mailserver.guru> (c) 2019 | + | # Django <django@nausch.org> (c) 2019 |
cd / | cd / | ||
umask 022 | umask 022 | ||
Zeile 3603: | Zeile 3603: | ||
==== TLS-Verkehrsstatistik ==== | ==== TLS-Verkehrsstatistik ==== | ||
- | Bei bedarf | + | Bei Bedarf |
=== ankommender TLS-Verkehr === | === ankommender TLS-Verkehr === | ||
- | # grep 'TLS connection established from' / | + | Wieviele verschlüsselte Verbindungen unser MTA angenommen hat, verrät uns ein Blick in das Maillog. Dort suchen wir nach den entsprechenden Zeilen mit z.B. mit folgender Abfrage. |
- | < | + | # egrep "TLS connection established from.*with cipher" |
- | | + | | sort | uniq -c | sort -nr |
+ | < | ||
+ | 9578 TLSv1 | ||
+ | 868 TLSv1.1 | ||
+ | </ | ||
+ | |||
+ | Eine Aufstellung der unterschiedlichen Protokolle mit den verwendeten Ciphern ermitteln wir mit folgendem Befehl: | ||
+ | |||
+ | # egrep "TLS connection established from.*with cipher" | ||
+ | | sort | uniq -c | sort -nr | ||
+ | |||
+ | < | ||
+ | | ||
+ | 10705 TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 | ||
+ | 6914 TLSv1 with cipher DHE-RSA-AES256-SHA | ||
+ | 5540 TLSv1.2 with cipher ECDHE-ECDSA-AES256-SHA384 | ||
+ | 1265 TLSv1 with cipher ECDHE-RSA-AES256-SHA | ||
+ | 765 TLSv1 with cipher ECDHE-ECDSA-AES256-SHA | ||
+ | 666 TLSv1.2 with cipher AES256-GCM-SHA384 | ||
+ | 421 TLSv1.2 with cipher DHE-RSA-AES256-SHA256 | ||
+ | 400 TLSv1.2 with cipher ECDHE-RSA-AES256-SHA | ||
+ | 379 TLSv1.1 with cipher ECDHE-RSA-AES256-SHA | ||
+ | 167 TLSv1.1 with cipher ECDHE-ECDSA-AES256-SHA | ||
+ | 121 TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 | ||
+ | 105 TLSv1.2 with cipher AES256-SHA256 | ||
+ | 105 TLSv1.2 with cipher AES256-SHA | ||
+ | 103 TLSv1.2 with cipher AES128-GCM-SHA256 | ||
+ | 102 TLSv1.2 with cipher AES128-SHA256 | ||
+ | 102 TLSv1.2 with cipher AES128-SHA | ||
+ | 102 TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 | ||
+ | 101 TLSv1.2 with cipher ECDHE-RSA-AES128-SHA | ||
+ | 101 TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 | ||
+ | 101 TLSv1.2 with cipher DHE-RSA-CAMELLIA256-SHA | ||
+ | 101 TLSv1.2 with cipher DHE-RSA-CAMELLIA128-SHA | ||
+ | 100 TLSv1.2 with cipher DHE-RSA-AES256-SHA | ||
+ | 100 TLSv1.2 with cipher DHE-RSA-AES128-SHA256 | ||
+ | 100 TLSv1.2 with cipher DHE-RSA-AES128-SHA | ||
+ | 100 TLSv1.2 with cipher DHE-RSA-AES128-GCM-SHA256 | ||
+ | 99 TLSv1.1 with cipher AES256-SHA | ||
+ | 99 TLSv1 with cipher AES256-SHA | ||
+ | 93 TLSv1 with cipher AES128-SHA | ||
+ | 92 TLSv1.2 with cipher CAMELLIA256-SHA | ||
+ | 92 TLSv1.2 with cipher ECDHE-ECDSA-AES256-SHA | ||
+ | 89 TLSv1.2 with cipher CAMELLIA128-SHA | ||
+ | 89 TLSv1.1 with cipher AES128-SHA | ||
+ | 88 TLSv1 with cipher ECDHE-RSA-AES128-SHA | ||
+ | 88 TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA | ||
+ | 86 TLSv1 with cipher DHE-RSA-CAMELLIA128-SHA | ||
+ | 52 TLSv1 with cipher DHE-RSA-AES128-SHA | ||
+ | 50 TLSv1 with cipher CAMELLIA256-SHA | ||
+ | 47 TLSv1 with cipher CAMELLIA128-SHA | ||
+ | 23 TLSv1.2 with cipher ECDHE-ECDSA-AES128-SHA256 | ||
+ | 21 TLSv1.2 with cipher ECDHE-ECDSA-AES128-SHA | ||
+ | 19 TLSv1.2 with cipher ECDHE-ECDSA-AES128-GCM-SHA256 | ||
+ | 17 TLSv1.1 with cipher ECDHE-RSA-AES128-SHA | ||
+ | 17 TLSv1.1 with cipher DHE-RSA-CAMELLIA256-SHA | ||
+ | 17 TLSv1.1 with cipher DHE-RSA-CAMELLIA128-SHA | ||
+ | 17 TLSv1.1 with cipher DHE-RSA-AES256-SHA | ||
+ | 17 TLSv1.1 with cipher DHE-RSA-AES128-SHA | ||
+ | 17 TLSv1.1 with cipher CAMELLIA256-SHA | ||
+ | 17 TLSv1.1 with cipher CAMELLIA128-SHA | ||
+ | 16 TLSv1 with cipher ECDHE-ECDSA-AES128-SHA | ||
+ | 15 TLSv1.1 with cipher ECDHE-ECDSA-AES128-SHA</ | ||
=== ausgehender TLS-Verkehr === | === ausgehender TLS-Verkehr === | ||
+ | Wollen wir wissen wieviele TLS gesichete Verbindungen unser Mailserver zu anderen aufbaut können wir dies wie folgt abrufen | ||
# grep 'TLS connection established to' / | # grep 'TLS connection established to' / | ||
- | < | + | < |
- | 3323 TLSv1.1 | + | |
- | 396939 | + | Wollen wir wissen welche Cipher bei den unterschiedlichen Protokollen verwendet wurden, fragen wir dies mit folgendem Befehl ab: |
+ | # egrep "TLS connection established to.*with cipher" | ||
+ | | sort | uniq -c | sort -nr | ||
+ | < | ||
+ | | ||
+ | 1337 TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 | ||
+ | 679 TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 | ||
+ | 423 TLSv1.2 with cipher DHE-RSA-AES256-SHA256 | ||
+ | 21 TLSv1.2 | ||
=== graphische Übersicht des TLS-Clientverkehrs === | === graphische Übersicht des TLS-Clientverkehrs === |