On Sun, Nov 30, 2014 at 07:00:15PM -0500, Robert Moskowitz wrote:

> >I am not suggesting you do this, but since you asked...
>
> As so often, Viktor, you get right to the 'key' point.  Yes, why bother.  Is
> it any faster if it has a lot of root CA files to check against?

The performance cost is not an issue.

With CApath, the performance is largely idpendent of the number of
CAs, until you start trusting more than ~65,000 CAs at which point
there is a negligible logarithmic cost due to collisions of the
32-bit hashed issuer DNs.

> So leave it alone.  Just another interesting message happening. Nothing
> REALLY interesting, move along...

Correct.  In 2.13 (or whatever number we assign to the release
after next), we may add a forensically useful (even if not a
proactive defense) way to employ trusted CAs to "try" to authenticate
SMTP servers.  You'll know that some connections happened to be
protected, and would need to employ log analysis to look for
anomalies indicative of MiTM attack in order to take advantage of
such forensic evidence.

-- 
        Viktor.

Reply via email to