On Tue, Aug 01, 2017 at 01:59:54PM -0700, robg...@nospammail.net wrote: > > I strongly recommend against > > listing individual explicit cipher names. Later there will be > > better key exchange algorithms, better hashes, ... > > Yeah I noticed you used just 'CHACHA20', which I guess is the group name? > Or is that still just an abbreviated, explicit cipher name?
The name "CHACHA20" matches any ciphersuite that uses that stream cipher for the bulk crypto: $ /opt/openssl/1.1.0/bin/openssl ciphers -V CHACHA20 0xCC,0xA9 - ECDHE-ECDSA-CHACHA20-POLY1305 TLSv1.2 Kx=ECDH Au=ECDSA Enc=CHACHA20/POLY1305(256) Mac=AEAD 0xCC,0xA8 - ECDHE-RSA-CHACHA20-POLY1305 TLSv1.2 Kx=ECDH Au=RSA Enc=CHACHA20/POLY1305(256) Mac=AEAD 0xCC,0xAA - DHE-RSA-CHACHA20-POLY1305 TLSv1.2 Kx=DH Au=RSA Enc=CHACHA20/POLY1305(256) Mac=AEAD 0xCC,0xAE - RSA-PSK-CHACHA20-POLY1305 TLSv1.2 Kx=RSAPSK Au=RSA Enc=CHACHA20/POLY1305(256) Mac=AEAD 0xCC,0xAD - DHE-PSK-CHACHA20-POLY1305 TLSv1.2 Kx=DHEPSK Au=PSK Enc=CHACHA20/POLY1305(256) Mac=AEAD 0xCC,0xAC - ECDHE-PSK-CHACHA20-POLY1305 TLSv1.2 Kx=ECDHEPSK Au=PSK Enc=CHACHA20/POLY1305(256) Mac=AEAD 0xCC,0xAB - PSK-CHACHA20-POLY1305 TLSv1.2 Kx=PSK Au=PSK Enc=CHACHA20/POLY1305(256) Mac=AEAD The four PSK variants can't be used by most TLS applications (including Postfix), so in practice CHACHA20 means just the first three. > I've been using the full/explicit cipher name so far because I havent > found the right doc that lists the group name (CHACHA20) that includes > it. https://www.openssl.org/docs/man1.1.0/apps/ciphers.html > > I recommend an empty setting here. Tastes great, less filling. > > Ok. So if the docs say > > Specify "smtp_tls_CApath = /path/to/system_CA_directory" to use > ONLY the system-supplied default Certification Authority > certificates. If that's what you want. > > Specify "tls_append_default_CA = no" to prevent Postfix from > appending the system-supplied default CAs and trusting third-party > certificates. If that's what you want. > and I set > > smtp_tls_CApath = > tls_append_default_CA = no > > Then it > > won't ONLY use sys default CA certs No, it will trust no CAs at all. A pox on all their houses. As for "tls_append_default_CA = no". These have been the default setting for ages. $ postconf -d smtp_tls_CApath tls_append_default_CA smtp_tls_CApath = tls_append_default_CA = no > So what exactly IS it gonna do? Not trust any CAs. When you want to authenticate some peer, use the "tafile" feature of the policy table to specify a sensible list of trust-anchors for that peer. Enabling the system-default cert store will only make sense in the context of SMTP STS, if/when Postfix has support for that. Sadly, the large providers (Google, Yahoo, Microsoft, ...) have difficulties combining DNSSEC with their load-balancing infrastructure, so they are pushing STS, with all its flaws, but arguably better than nothing... -- Viktor.