作为对Logjam的回应,我想证明我已经强化了我的服务。我知道 DH 参数必须至少为 2048 位并且是自生成的。但我无法找到一种方法来实际检查除 HTTPS 站点之外的其他内容。(我可以在这里做)我也想检查我的其他受 SSL 保护的服务:
- 邮件(Postfix 和 Dovecot)
 - SSH
 - VPN
 - 任何其他
 
我openssl s_client -starttls smtp -crlf -connect localhost:25做到了,但结果是:
CONNECTED(00000003) depth=3 C = SE, O = ME, OU = Also ME, CN = Me again verify error:num=19:self signed certificate in certificate chain
verify return:0 Server certificate
-SNIPED SOME VALUES-
--- SSL handshake has read 6118 bytes and written 466 bytes
--- New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES256-GCM-SHA384 Server public key is 2048 bit Secure Renegotiation IS supported Compression:
NONE Expansion: NONE SSL-Session:
    Protocol  : TLSv1.2
    Cipher    : ECDHE-RSA-AES256-GCM-SHA384
    Session-ID: 6EAA8A5B22E8C18E9D0E78A0B08447C8449E9B9543601BC53F57CB2059597754
    Session-ID-ctx: 
    Master-Key: <MASTERKEY>
    Key-Arg   : None
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    Start Time: 1432213909
    Timeout   : 300 (sec)
    Verify return code: 19 (self signed certificate in certificate chain)
--- 250 DSN
如何测试 DH 参数?我应该注意什么才能知道我是否处于危险之中?