Am 24.12.2013 17:33, schrieb Viktor Dukhovni:
> On Tue, Dec 24, 2013 at 11:16:50AM +0100, li...@rhsoft.net wrote:
> 
>>> The symptom would be that your certificate chain is not verifiable,
>>> verify error:num=7:certificate signature failure
>>
>> Thank you for that.
>>
>> Am I right that this does not break opportunistic TLS at a whole
>> for such destinations?
> 
> With clients using OpenSSL, probably not.  I can't say how other
> clients will react to certificates with unsupported digest agorithms.
> Perhaps in some cases they try to instantiate the digest algorithm
> and fail to connect.  You'd need to test with Microsoft Exchange
> 2003, various vendor appliances, ...

thanks for feedback and understood

maybe my position is somehow easier because the MX is a barracuda
appliance and so there is only outgoing opportunistic TLS

maybe a good idea to consider using the wildcard-certificate
with SHA2 for outgoing messages and order a 3072/SHA1 for the
MX and use the wildcard for all other services

at the same time i consider ignore TLS breakage for a minority because
i expect falling back to unencrypted but at the same time recent
systems talk to each other with state-of-the-art certificates

that's a really interesting topic at all....

>> In that case I would still go with RSA 3072 / SHA256 for severar reasons
>>
>> * recent distributions ship OpenSSL 1.0.0 or 1.0.1
> 
> Yes, but some servers continue to be used for a decade or more.
> 
>> * RHEL5: openssl-0.9.8e-26.el5_9.1 with backports
> 
> I don't know what RedHat backported to 0.9.8e, with 0.9.8 vendors
> generally backported critical fixes only, you'd need to test whether
> the SHA2 enablement in SSL was one of these backports

i try to test this in 2014 before decide how the new SSL cert will look like

Reply via email to