> The name "CHACHA20" matches any ciphersuite that uses that stream
> cipher for the bulk crypto:

Sounds like a group.

>     $ /opt/openssl/1.1.0/bin/openssl ciphers -V CHACHA20

Ok so 'documented' by openssl directly, nothing Postfix specific.

>             0xCC,0xA9 - ECDHE-ECDSA-CHACHA20-POLY1305 TLSv1.2 Kx=ECDH     
> Au=ECDSA Enc=CHACHA20/POLY1305(256) Mac=AEAD
>             0xCC,0xA8 - ECDHE-RSA-CHACHA20-POLY1305 TLSv1.2 Kx=ECDH     
> Au=RSA  Enc=CHACHA20/POLY1305(256) Mac=AEAD
>             0xCC,0xAA - DHE-RSA-CHACHA20-POLY1305 TLSv1.2 Kx=DH       Au=RSA  
> Enc=CHACHA20/POLY1305(256) Mac=AEAD
...
> The four PSK variants can't be used by most TLS applications
> (including Postfix), so in practice CHACHA20 means just the first
> three.

And subgroups?  If for any group of ciphers to be used in Postfix I want to 
only ever use EC ciphers, so eg "in practice" here, only the 1st two?  Some 
shorthand for "EC only"?

I never really checked.  Is crypto for Postfix always/only provided by OpenSSL? 
 So naming for cipherlists, and related shorthand, is OpenSSL-specific and so 
we look to OpenSSL for the docs?  Or is that set at a standards level and 
naming is consistent across Postfix, Openssl and all other crypto?

> >     Specify "smtp_tls_CApath = /path/to/system_CA_directory" to use
> >     ONLY the system-supplied default Certification Authority
> >     certificates.
...
> > Then it
> > 
> >     won't ONLY use sys default CA certs
> 
> No, it will trust no CAs at all.  A pox on all their houses.

Ok. That makes more sense.

That's not what I got from reading that section.  It read to me like if you 
don't specify it it doesn't ONLY use ... 

>  As for "tls_append_default_CA = no". These have been the default
> setting for ages.

Sure.  I don't actually set it explicitly on my setup.  Like you say it's the 
default.

>     $ postconf -d smtp_tls_CApath tls_append_default_CA
>     smtp_tls_CApath =
>     tls_append_default_CA = no
> 
> > So what exactly IS it gonna do?
> 
> Not trust any CAs.  When you want to authenticate some peer, use
> the "tafile" feature of the policy table to specify a sensible list
> of trust-anchors for that peer.

Ok.

> Enabling the system-default cert store will only make sense in the
> context of SMTP STS, if/when Postfix has support for that.  Sadly,
> the large providers (Google, Yahoo, Microsoft, ...) have difficulties
> combining DNSSEC with their load-balancing infrastructure, so they
> are pushing STS, with all its flaws, but arguably better than
> nothing...

SMTP STS hadn't even heard of yet.  DNSSEC is on my todo list.

Reply via email to