Viktor Dukhovni wrote:
> On Tue, Sep 16, 2014 at 12:00:33AM +1000, shm...@riseup.net wrote:
> 
>> Viktor Dukhovni wrote:
>>> On Mon, Sep 15, 2014 at 05:16:19PM +1000, shm...@riseup.net wrote:
>>>
>>>> if i have an EC mail server cert and if an MTA setup to send/receive
>>>> gives the following:
>>>
>>> Always configure at least some sort of RSA certificate along with
>>> any ECDSA certificates.  The RSA certificate can be self-signed.
>>> Many systems don't support ECDSA, and also don't enabled anonymous
>>> cipher suites, so they fail when no RSA certificate is offered.
>>
>> are you saying even if the RSA cert is self-signed, as long as the EC
>> cert is from a commercial CA (which it is) then RSA based ciphers will
>> still be negotiated?
> 
> No, I'm saying that clients that don't support ECDSA won't negotiate
> ECDSA, and that therefore you *also* need an RSA certificate.
> 
> Which public key algorithm is chosen depends on client preferences.
> Since almost nobody verifies SMTP server certificates, there is
> little reason to make any effort towards ensuring that the CA-issued
> ECDSA certificate is chosen in place of the self-signed RSA
> certificate.

why not ?
aren't EC algos more resistant to attacks, brute forcing & faster than
DHE, etc ?

> 
>> Is this process automated by postfix in that i simply need to
>> additionally specify
>>
>> smtp_tls_cert_file
>> smtp_tls_key_file
> 
> Client certificates are generally unnecessary, leave these empty.
> 
>> smtpd_tls_cert_file
>> smtpd_tls_key_file
> 
> Yes, enable both algorithms.  However, take a look at:
> 
> http://archives/neohapsis.com/archives/postfix/2014-05/thread.html#230

ok thx, good read after i thought i was going mad before seeing the /

> 
> you need to include all relevant issuing CAs with every certificate,
> thus even the self-signed RSA certificate file will need a copy of
> the ECDSA certificate's issuing authorities.
> 
>> Did you mean i should not allow anonymous cipher suites ?
>>
>> ie !aNULL:!eNULL:!ADH
> 
> I said nothing of the sort.
> 
>>>> postfix/smtpd[7060]: initializing the server-side TLS engine
>>>> postfix/smtpd[7060]: connect from medusa.blackops.org[208.69.40.157]
>>>> postfix/smtpd[7060]: warning: milter inet:127.0.0.1:10023: can't read
>>>> SMFIC_OPTNEG reply packet header: Connection timed out
>>>> postfix/smtpd[7060]: warning: milter inet:127.0.0.1:10023: read error in
>>>> initial handshake
>>>
>>> Also fix this.
>>
>> I've posted this to the greylist mailing list ages ago - nobody knows
> 
> Turn off the milter, it is not working.

im not sure how you'd know that
ive learnt to live with the error - all unseen and whitelisted MTA's are
handled by it fine

Reply via email to