On Thu, Nov 20, 2008 at 08:56:04AM +0000, Mark Watts wrote:

> I did wonder what the difference between ADH-AES256-SHA and AES256-SHA was.
> Both still result in an encrypted connection though, right?

    $ openssl ciphers -v ADH-AES256-SHA:AES256-SHA
    ADH-AES256-SHA          SSLv3 Kx=DH       Au=None Enc=AES(256)  Mac=SHA1
    AES256-SHA              SSLv3 Kx=RSA      Au=RSA  Enc=AES(256)  Mac=SHA1

It would be to call a cipher suite an AES256 cipher-suite if no encryption
took place. Both if the above SSLv3 (thus also TLS 1.x) cipher-suites
use AES256 for data encryption, and SHA1 for message integrity.

"Encryption" is not a synonym for "security", when SSL is used to encrypt,
but not to authenticate, you are protected from passive-eavedropping
(wiretap) attacks, but not from active man-in-the-middle attacks. If you
want to know the the peer on the other end of the encrypted channel is
the one you intended to communicate with, you need to authenticate that
peer, which is where certificate checks enter the discussion.

The first cipher has no authentication mechanism in the SSL handshake,
so you get encryption only, no authentication. The second cipher makes
authentication "possible", but you can still (and typically do) ignore the
peer certificate. So in practice the two ciphers offer the same security,
provided you are not going to reject unauthenticated connections when
sending email to the domain in question.

-- 
        Viktor.

Disclaimer: off-list followups get on-list replies or get ignored.
Please do not ignore the "Reply-To" header.

To unsubscribe from the postfix-users list, visit
http://www.postfix.org/lists.html or click the link below:
<mailto:[EMAIL PROTECTED]>

If my response solves your problem, the best way to thank me is to not
send an "it worked, thanks" follow-up. If you must respond, please put
"It worked, thanks" in the "Subject" so I can delete these quickly.

Reply via email to