On Wed, Jun 15, 2022 at 12:33:52AM +0200, Steffen Nurpmeso wrote: > Viktor Dukhovni wrote in > <yqjsazq++7ftu...@straasha.imrryr.org>: > |On Wed, Jun 15, 2022 at 12:07:25AM +0530, P V Anthony wrote: > |> On 13/6/2022 4:31 pm, Wietse Venema wrote: > ... > |Two comments on your server setup: > | > | * The server certificate is 4096 bit RSA. This is needlessly turgid. > > The FreeBSD handbook recommendet 4096 RSA keys about twenty years > ago, stating that likely would be secure until 2030, and most > FreeBSD developers had such keys by then. > This was PGP, but the path was set for me.
It may be fashionable, but it is entirely pointless, and sometimes counterproductive. Someone who can break 2048-bit RSA can generate certificates ostensibly issued by a majority of WebPKI CAs, and can also forge DNSSEC root and e.g. .COM zone signatures. Stronger certificates get you nowheere. > | subject=C = US, O = Internet Security Research Group, CN = \ > | ISRG Root X1 > | issuer=O = Digital Signature Trust Co., CN = DST Root CA X3 > | > | You may have better luck by configuring "certbot" or similar to > | build a chain that avoids the ISRG -> DST cross cert. > > Interesting; all of OpenBSD, FreeBSD and i have this one in the > chain, too. This is only needed to support old Android phones that no longer get updates. Few of these are legitimate port 25 mail clients. -- Viktor.