Am 17.11.2013 23:36, schrieb Fedor Brunner:
> Please increase the size of Diffie-Hellman parameters in
> http://www.postfix.org/TLS_README.html
> You recommend 1024 bit DH parameters, but for long term protection,
> these parameters are too short.
> 
> During ephemeral Diffie-Hellman (EDH) key exchange a temporary key is
> generated from DH parameters. This temporary key is used for encryption
> of the communication and the server public RSA key is used ONLY for
> signing of this temporary key and NOT for encryption of the
> communication. If you use DH parameters shorter than you RSA key, you
> are weakening your encryption.
> 
> https://wiki.openssl.org/index.php/Diffie_Hellman
> https://wiki.openssl.org/index.php/Diffie-Hellman_parameters
> 
> 
> If you are interested in more technical information about key sizes I
> highly recommend:
> 
> http://www.keylength.com/en/compare/
> 
> Yearly Report on Algorithms and Keysizes (2012), D.SPA.20 Rev. 1.0,
> ICT-2007-216676 ECRYPT II, 09/2012.
> 
> Recommendation for Key Management, Special Publication 800-57 Part 1
> Rev. 3, NIST, 07/2012

that's all fine but breaks interoperability leading in opportunistic mode
which is needed on the MTA side to let clients fall back to *unencrypted*
connections - so you may consider what is better - 1024 bit or no
encryption at all

you can do that on a webserver but not on a MTA

Reply via email to