> Therefore, after "CHACHA20:-CHACHA20" the CHACHA20 ciphers are at
> the top of the enabled+unselected cipher stack.  And then after
> "aNULL:-aNULL" the "aNULL" ciphers are at the top of the stack.

That's what I it took.  I was thinking of it in a literal order, not 
necessarily a pop'd/push'd stack

Thanks.

> I am assuming you are now wiser

You know what they say about assumptions.

But, I hope so!

> how much you don't yet know about cipherlists... :-)

It LOOKS simple when you first look at in the docs.

> > So how DO you make sure that a specific cipher is ALWAYS used if it's 
> > available?
> 
> You list the preferred category first.

Which now makes more sense in stack-think.

> I strongly recommend against
> listing individual explicit cipher names.  Later there will be
> better key exchange algorithms, better hashes, ...

Yeah I noticed you used just 'CHACHA20', which I guess is the group name?  Or 
is that still just an abbreviated, explicit cipher name?

I've been using the full/explicit cipher name so far because I havent found the 
right doc that lists the group name (CHACHA20) that includes it.

> The best way to future-proof a non-default cipherlist is to use
> preferences for particular features

I do that already between internal machines.  

> and not hardcode specific individual ciphers.  Even better, let the library 
> maintainers
> construct a sensible cipherlist, and avoid being a crypto fashionista.
> :-)  Of course with paying cliets, they get what they ask and pay for if they 
> are not interested in advice on what to do.

Yep.   There's a bunch of clients in the customer chain.  They all agreed on 
project standards long before I got invovled.  We've got enough problems with 
the meat of the project without stirring their pot at this point on "just mail".

> > > Google is presenting a certificate that
> > > chains to a locally trusted CA.  You must have configuned a non-empty
> > > "smtp_tls_CAfile" or "smtp_tls_CApath".

> I recommend an empty setting here.  Tastes great, less filling.

Ok.  So if the docs say

        Specify "smtp_tls_CApath = /path/to/system_CA_directory" to use ONLY 
the system-supplied default Certification Authority certificates.

        Specify "tls_append_default_CA = no" to prevent Postfix from appending 
the system-supplied default CAs and trusting third-party certificates.

and I set

                smtp_tls_CApath =
                tls_append_default_CA = no

Then it

        won't ONLY use sys default CA certs
        will PREVENT appending sys default CA certs
        won't TRUST (and/or use?) 3rd party certs

So what exactly IS it gonna do?




 

Reply via email to