postfix-users@postfix.org wrote in
 <zfl9t9x_et9dq...@straasha.imrryr.org>:
 |On Mon, May 08, 2023 at 06:13:25PM -0400, Wietse Venema via Postfix-users \
 |wrote:
 |> We're thinking of adding a few new settings to the stable Postfix
 |> releases that allow Postfix to regain some control over crypto
 |> policies that do not necessarily improve matters for SMTP where
 |> the main result would be more plaintext communication.
 |
 |> With stable releases, it would not be approprriate to introduce a
 |> boatload of features, but plausible candidates are:
 |> 
 |>     tls_config_file = default | none(*) | /path/to/file
 |>         (*)only OpenSSL 1.1.b and later
 |
 |Minor correction, the base OpenSSL release that supports configuration
 |file overrides is "1.1.1b", rather than "1.1.b".
 |
 |- The minimum OpenSSL version supported by Postfix 3.6 and later is 1.1.1.
 |- The OpenSSL version in which RedHat started introducing strict crypto
 |  policies is OpenSSL 3.0.
 |
 |This means that:
 |
 |    - If you're still using OpenSSL 1.0.2 (with Postfix <= 3.5) you
 |      probably don't need to override the system-wide openssl.cnf file.
 |      Though it may be possible to use:
 |
 |        import_environment =
 |            ... default value from "postconf -d"...
 |            OPENSSL_CONF=/some/file
 |
 |      An empty file would be equivalent to "none".
 |
 |    - If you're using OpenSSL 1.1.1 or 1.1.1a, you also probably don't
 |      need to override the system-wide openssl.cnf file.  Same
 |      work-around as before, or set the application name, and add
 |      appropriate application settings in the system-wide file.
 |
 |    - If you're using OpenSSL 1.1.1b or later, and in particular 3.0
 |      or, especially on a RedHat or Fedora system, you may choose to
 |      override the system-wide configuration file or the application
 |      name.  Then, overly strict cryptographic policy will not result
 |      in unnecessary downgrades to cleartext in opportunistic TLS.
 |
 |We'll probably later have to extend support for tweaking additional
 |TLS-related settings through the "SSL_CONF" API, though that will have
 |the downside that non-expert users may end up cargo culting settings
 |that do more harm than good.  I'll try to discourage this as much

Lame argument, isn't it.  Just more settings, but in a generic way
that could be interchangeable in between servers if only all would
simply and only use that one.  (I immediately jumped that train
and also support specific [module] sections, how complicated and
under-documented that in effect is.  I liked the idea that you can
have it all in one OpenSSL configuration file, with a default
section and per-program sections.)
But CONF_ is not the same across implementations, and programs
continue to "bake their own bread rolls".  (lighttpd now uses it.)

Having said that, terrible how OpenSSL switched that (loading of
a config file) on and off by default, and how they added config
via OPENSSL_INIT_SETTINGS object.  Better set
OPENSSL_INIT_NO_LOAD_CONFIG and continue using
CONF_modules_load_file() explicitly (and exclusively) i thought.
Thanks.
Well it was a non-outstanding entry in a multi-thousand line
change log in between 1.1.1 and 3.0.0, so i seem to have missed
that.  Thanks again.

 |as possible, but the target audience will be those who know what
 |they are doing, or are following sound advice.
 |
 |One goal may be to make some of the crypto hardening conditional on the
 |TLS security level, which means different settings for different levels.
 |
 |Hopefully more on this as 3.9 snapshots evolve.

--steffen
|
|Der Kragenbaer,                The moon bear,
|der holt sich munter           he cheerfully and one by one
|einen nach dem anderen runter  wa.ks himself off
|(By Robert Gernhardt)
|~~
|..and in spring, hear David Leonard sing..
|
|The black bear,          The black bear,
|blithely holds his own   holds himself at leisure
|beating it, up and down  tossing over his ups and downs with pleasure
|~~
|Farewell, dear collar bear
_______________________________________________
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org

Reply via email to