On 4/12/2011 2:17 AM, email builder wrote:
Am I correct to infer that both smtp(d)_tls_CAfile settings only serve
a purpose when you want to verify client/server certificates?
If that's the case, why does the example at the bottom of TLS_README
use both the CAfile settings with only opportunistic encryption?
This reduces log noise, and improves the audit trail.
Hmm, OK, not to imply these things are not important, but are these the
only reasons you'd have a CAfile or CApath?
With opportunistic TLS you don't gain any extra security by
verifying the remote cert. This is what makes self-signed
certificates adequate for opportunistic TLS.
Our system seems to work without any CAfile/CApath settings under
opportunistic
encryption both incoming and outgoing. Is there a performance or security
difference between using them or not?
You should probably throw in a few trusted root CAs.
1) Is there a place to get a file with the usual suspects already in it?
Most OS's have a package of common root certs available. For
example, FreeBSD provides the security/ca_root_nss port.
2) Does postfix add new CAs to it when it sees a new one from a client?
No. The CA file/path is a trust list. It would be
inappropriate for a program to add trust automatically.
3) Does it make much difference between CApath or CAfile? I suppose
using CApath only makes sense if the answer to question 2 is "yes"? (File
probably sufficient if it is static and not that big)
Performance may be better with CApath for a large number of
certificates, but mostly this is about how the certs are
bundled for you.
-- Noel Jones