On Wed, Jun 15, 2022 at 12:33:52AM +0200, Steffen Nurpmeso wrote:

> Viktor Dukhovni wrote in
>  <yqjsazq++7ftu...@straasha.imrryr.org>:
>  |On Wed, Jun 15, 2022 at 12:07:25AM +0530, P V Anthony wrote:
>  |> On 13/6/2022 4:31 pm, Wietse Venema wrote:
>  ...
>  |Two comments on your server setup:
>  |
>  |    * The server certificate is 4096 bit RSA.  This is needlessly turgid.
> 
> The FreeBSD handbook recommendet 4096 RSA keys about twenty years
> ago, stating that likely would be secure until 2030, and most
> FreeBSD developers had such keys by then.
> This was PGP, but the path was set for me.

It may be fashionable, but it is entirely pointless, and sometimes
counterproductive.  Someone who can break 2048-bit RSA can generate
certificates ostensibly issued by a majority of WebPKI CAs, and can also
forge DNSSEC root and e.g. .COM zone signatures.  Stronger certificates
get you nowheere.

>  |        subject=C = US, O = Internet Security Research Group, CN = \
>  |        ISRG Root X1
>  |        issuer=O = Digital Signature Trust Co., CN = DST Root CA X3
>  |
>  |      You may have better luck by configuring "certbot" or similar to
>  |      build a chain that avoids the ISRG -> DST cross cert.
> 
> Interesting; all of OpenBSD, FreeBSD and i have this one in the
> chain, too.

This is only needed to support old Android phones that no longer get
updates.  Few of these are legitimate port 25 mail clients.

-- 
    Viktor.

Reply via email to