My test Exchange Server with Exchange 2013 on Windows Server 2012 R2, I was able to achieve an A rating from SSLLabs by disabling SSL 3.0, removing RC4 ciphers, and enabling AEAD encryption . This is nearly as good as one can achieve at this time.
Disable support for SSL 3.0 on the server:
Remove RC4 Ciphers:
Ciphers available on Windows Server 2012 R2:
The following cipher suites supports AEAD encryption on Windows Server 2012 R2:
To enable the required encryption, download IISCrypto from Nartac software. I had to enable the following Ciphers:
Then move them to the top of the Ciphers list.
SSLLabs message: This server supports weak Diffie-Hellman (DH) key exchange parameters. Grade capped to B.
To fix it, you can increase the DHE key size to 2048 adding the registry key below:
Using this setting you will have a AEAD cipher that is not classified as “weak” and SSLLabs will give you an A Grade.
See the status of your Exchange Environment:
Get-OabVirtualDirectory | fl server, Name, ExternalURL, InternalURL, *auth*
Get-WebServicesVirtualDirectory | fl server, Name,ExternalURL, InternalURL, *auth*
Get-EcpVirtualDirectory | fl server, Name, ExternalURL, InternalURL, *auth*
Get-ActiveSyncVirtualDirectory | fl server, Name, ExternalURL, InternalURL, *auth*
Get-OutlookAnywhere | fl server, Name, *hostname*, *auth*
Get-OwaVirtualDirectory | fl server, Name, ExternalURL, InternalURL, *auth*
Get-ClientAccessService | fl Name,OutlookAnywhereEnabled, AutodiscoverServiceInternalUri
Get-ExchangeCertificate | fl FriendlyName, Subject, CertificateDomains, Thumbprint, Services, Issuer, *not*
Get-MapiVirtualDirectory | fl server, Name,ExternalURL,InternalURL, *auth*
Get-ClientAccessArray | fl
Verify the current State of the Server Components
A first overview over the current State of all Server Components can be displayed in the Exchange PowerShell with the
Get-ServerComponentState –Identity <ServerID> cmdlet:
Get-ServerComponentState –Identity email
Open relay is a very bad thing for messaging servers on the Internet. Messaging servers that are accidentally or intentionally configured as open relays allow mail from any source to be transparently re-routed through the open relay server. This behavior masks the original source of the messages, and makes it look like the mail originated from the open relay server. Open relay servers are eagerly sought out and used by spammers, so you never want your messaging servers to be configured for open relay.
Continue reading “Exchange 2013 Open Relay fix”