For weeks, trying to find out how to get Letsencrypt to update my 2048 to 4096 key with Virtualmin on one of my servers. Not successful at the moment and hopefully someone in this forum can help me out. I have been posting at Virtualmin, but it seems to be an issue with Letencrypt.
The error I get from test id the following:
Verdict:
At least one of your mail servers supports insufficiently secure parameters for Diffie-Hellman key exchange.
This issue doesn't have anything to do with TLS certificates in general and Let's Encrypt in particular.
Your SMTP daemon seems to be Postfix. I don't have any experience with Virtualmin and how (or if) it configures Postfix, you may need to configure it yourself. Consult with this document, especially the parts about FFDHE Server support.
If you have shell access to the SMTP server system, you may generate a bigger Diffi-Helman group with the openssl dhparam command.
In my system it is the following, but that is distribution specific:
I'm not familiar with mail client compatibility, but you might want to consider disabling DH(E) cipher suits entirely in favor of ECDHE, the EC variant. This, as DH(E) is very, very slow..
root@yr-design:~# openssl dhparam -out /etc/pki/tls/certs/dhparams.pem 4096
Can't open /etc/pki/tls/certs/dhparams.pem for writing, No such file or directory
140329455351104:error:02001002:system library:fopen:No such file or directory:../crypto/bio/bss_file.c:69:fopen('/etc/pki/tls/certs/dhparams.pem','w')
140329455351104:error:2006D080:BIO routines:BIO_new_file:no such file:../crypto/bio/bss_file.c:76:
root@yr-design:~#
If this "insufficient" message came from internet.nl or a similar validator, it will not be satisfied with a random 3072- or 4096-bit DH group, but expects one of the standard RFC 7919 FFDHE groups (preferably ffdhe3072).