作为对Logjam的回应,我想证明我已经强化了我的服务。我知道 DH 参数必须至少为 2048 位并且是自生成的。但我无法找到一种方法来实际检查除 HTTPS 站点之外的其他内容。(我可以在这里做)我也想检查我的其他受 SSL 保护的服务:
- 邮件(Postfix 和 Dovecot)
- SSH
- VPN
- 任何其他
我openssl s_client -starttls smtp -crlf -connect localhost:25
做到了,但结果是:
CONNECTED(00000003) depth=3 C = SE, O = ME, OU = Also ME, CN = Me again verify error:num=19:self signed certificate in certificate chain
verify return:0 Server certificate
-SNIPED SOME VALUES-
--- SSL handshake has read 6118 bytes and written 466 bytes
--- New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES256-GCM-SHA384 Server public key is 2048 bit Secure Renegotiation IS supported Compression:
NONE Expansion: NONE SSL-Session:
Protocol : TLSv1.2
Cipher : ECDHE-RSA-AES256-GCM-SHA384
Session-ID: 6EAA8A5B22E8C18E9D0E78A0B08447C8449E9B9543601BC53F57CB2059597754
Session-ID-ctx:
Master-Key: <MASTERKEY>
Key-Arg : None
PSK identity: None
PSK identity hint: None
SRP username: None
Start Time: 1432213909
Timeout : 300 (sec)
Verify return code: 19 (self signed certificate in certificate chain)
--- 250 DSN
如何测试 DH 参数?我应该注意什么才能知道我是否处于危险之中?