On Sat, Nov 17, 2012 at 02:07:17PM -0500, thorso...@lavabit.com wrote:

> > No, you don't need a dedicated root CA to sign a you server
> > certificate, your server certificate can just be self-signed, this
> > was covered quite a few messages ago, when you first started asking
> > about TLS.
> 
> >         openssl req -new -x509 ...
> 
> > generates a self-signed certificate, you can just use that.
> 
> Could you provide the entire command? OpenSSL has many options; I
> don't want to forget something.

This will write a new 1280-bit RSA key and the corresponding
self-signed certificate with server name "mail.example.com" valid
for ~10 years to the file /etc/postfix/smtpd.pem, which you can
use as the server certificate (and implicitly key) file:

  # : as root
  # cd /etc/postfix
  # tmp=$(mktemp smtpd.pem.XXXXXX)
  # openssl req -x509 -new -newkey rsa:1280 -nodes -keyout /dev/stdout \
        -days $((365 * 10)) -subj "/CN=mail.example.com" > $tmp
  # chmod 0600 $tmp
  # mv $tmp smtpd.pem

> Are you trying to say that I can use the above instead of all commands
> from this [0] guide?

The guide is immaterial, it addresses a more general use case in
which having a CA is useful.

> > To enable EDH ciphers on the server side, see:
> 
> >         http://www.postfix.org/TLS_README.html#server_cipher
> 
> Will it be safe to use RSA for some time (several months)? (I don't
> have enough time to dive into EDH world right now.)

You're not in a position to understand the answer to this question
(which misses the point to a good degree). Bottom line:

    - Use the above recipe for a sufficiently safe 1280-bit cert.
    - Add the settings at the above URL to your main.cf to also
      enable EDH and EECDH key exchange. With sufficiently recent
      Postfix versions compiled against OpenSSL 1.0, the EECDH
      setting is a default, but for EDH support you should
      generate EDH parameter files as documented.

Over and out.

-- 
        Viktor.

Reply via email to