Now, I made a strong Diffie-Hellman key exchange, ECDHE parameter encryption by implementing Postfix DNSSEC AND Dane
Reference Url: https://www.sidn.nl/en/news-and-blogs/hands-on-implementing-dane-in-postfix
Here is the Postfix Code:
smtp_tls_cert_file = /etc/pki/tls/certs/postfix-rsa.cert
smtp_tls_key_file = /etc/pki/tls/private/postfix-rsa.key
smtpd_tls_cert_file = /etc/pki/tls/certs/postfix-rsa.cert
smtpd_tls_eccert_file = /etc/pki/tls/certs/postfix-ecdsa.cert
smtpd_tls_key_file = /etc/pki/tls/private/postfix-rsa.key
smtpd_tls_eckey_file = /etc/pki/tls/private/postfix-ecdsa.key
smtpd_tls_security_level = encrypt
smtpd_sasl_auth_enable = yes
smtpd_tls_auth_only = yes
tls_ssl_options = NO_COMPRESSION, 0x40000000
tls_preempt_cipherlist = yes
smtpd_tls_protocols = !SSLv2, !SSLv3, !TLSv1, !TLSv1.1
smtpd_tls_mandatory_protocols = !SSLv2, !SSLv3, !TLSv1, !TLSv1.1
smtpd_tls_ciphers = high
smtpd_tls_mandatory_ciphers = high
smtpd_tls_exclude_ciphers =
EXP, LOW, MEDIUM,
aNULL, eNULL, SRP, PSK, kDH, DH, kRSA, DHE, DSS, RC4, DES, IDEA, SEED, ARIA, CAMELLIA, AESCCM8, 3DES,
ECDHE-ECDSA-AES256-SHA384, ECDHE-ECDSA-AES128-SHA256, ECDHE-RSA-AES256-SHA384, ECDHE-RSA-AES128-SHA256,
MD5, SHA
smtpd_tls_eecdh_grade = ultra
smtpd_tls_dh1024_param_file = /www/WebFiles/Postfix/BWA/dhparams4096.pem
smtpd_tls_loglevel = 1
smtpd_tls_session_cache_database = btree:/var/lib/postfix/smtpd_tls_session_cache
smtp_tls_note_starttls_offer = yes
smtp_tls_protocols = !SSLv2, !SSLv3, !TLSv1, !TLSv1.1
smtp_tls_mandatory_protocols = !SSLv2, !SSLv3, !TLSv1, !TLSv1.1
smtp_tls_ciphers = high
smtp_tls_mandatory_ciphers = high
smtp_tls_exclude_ciphers =
EXP, LOW, MEDIUM,
aNULL, eNULL, SRP, PSK, kDH, DH, kRSA, DHE, DSS, RC4, DES, IDEA, SEED, ARIA, CAMELLIA, AESCCM8, 3DES,
ECDHE-ECDSA-AES256-SHA384, ECDHE-ECDSA-AES128-SHA256, ECDHE-RSA-AES256-SHA384, ECDHE-RSA-AES128-SHA256,
MD5, SHA
smtp_tls_loglevel = 1
smtp_tls_session_cache_database = btree:/var/lib/postfix/smtp_tls_session_cache
# LMTP from your server to others
lmtp_tls_note_starttls_offer = yes
lmtp_tls_protocols = !SSLv2, !SSLv3, !TLSv1, !TLSv1.1
lmtp_tls_mandatory_protocols = !SSLv2, !SSLv3, !TLSv1, !TLSv1.1
lmtp_tls_ciphers = high
lmtp_tls_mandatory_ciphers = high
lmtp_tls_exclude_ciphers =
EXP, LOW, MEDIUM,
aNULL, eNULL, SRP, PSK, kDH, DH, kRSA, DHE, DSS, RC4, DES, IDEA, SEED, ARIA, CAMELLIA, AESCCM8, 3DES,
ECDHE-ECDSA-AES256-SHA384, ECDHE-ECDSA-AES128-SHA256, ECDHE-RSA-AES256-SHA384, ECDHE-RSA-AES128-SHA256,
MD5, SHA
lmtp_tls_loglevel = 1
lmtp_tls_session_cache_database = btree:/var/lib/postfix/lmtp_tls_session_cache
# validate DANE
smtpd_tls_received_header = yes
smtpd_tls_ask_ccert = yes
smtp_dns_support_level = dnssec
smtp_tls_security_level = dane