Re: Forward Secrecy in the Postfix SMTP Client

2015-08-09 Thread Mike
On 8/9/2015 12:48 PM, Viktor Dukhovni wrote: > On Sun, Aug 09, 2015 at 12:42:00PM -0400, Mike wrote: > >> On this page: >> http://www.postfix.org/FORWARD_SECRECY_README.html#client_fs >> >> There is: >> >> Once the parameters are in place, update main.cf as follows: >> >> /etc/postfix/main.cf

Re: Forward Secrecy in the Postfix SMTP Client

2015-08-09 Thread Viktor Dukhovni
On Sun, Aug 09, 2015 at 12:42:00PM -0400, Mike wrote: > On this page: > http://www.postfix.org/FORWARD_SECRECY_README.html#client_fs > > There is: > > Once the parameters are in place, update main.cf as follows: > > /etc/postfix/main.cf: > smtpd_tls_dh1024_param_file = ${config_dir

Forward Secrecy in the Postfix SMTP Client

2015-08-09 Thread Mike
On this page: http://www.postfix.org/FORWARD_SECRECY_README.html#client_fs There is: Once the parameters are in place, update main.cf as follows: /etc/postfix/main.cf: smtpd_tls_dh1024_param_file = ${config_directory}/dh2048.pem smtpd_tls_dh512_param_file = ${config_dire

Re: New "TLS Forward Secrecy" document

2014-01-05 Thread Wietse Venema
micah: > I completely agree, however it seems we do not agree with the matching > names should be. That is precisely why I write this message. The postfix > parameter names and documentation should adopt the standardized names > that openssl is changing to. As it is written now, the postfix TLS We

Re: New "TLS Forward Secrecy" document

2014-01-05 Thread micah
rameters and > documentation. I completely agree, however it seems we do not agree with the matching names should be. That is precisely why I write this message. The postfix parameter names and documentation should adopt the standardized names that openssl is changing to. As it is written now, t

Re: New "TLS Forward Secrecy" document

2014-01-05 Thread Viktor Dukhovni
On Sun, Jan 05, 2014 at 06:31:46PM -0500, micah wrote: > > Given cipherlist class names: > > > > kEECDH - cipher suites that support Ephemeral ECDH key exchange > > kEDH- cipher suites that support Ephemeral DH key exchange > > I'm sorry, but I have no idea what "cipherlist class nam

Re: New "TLS Forward Secrecy" document

2014-01-05 Thread micah
Hi Viktor, Thanks for the reply. Viktor Dukhovni writes: > On Thu, Jan 02, 2014 at 06:03:40PM -0500, micah wrote: > >> I notice that you are using OpenSSL's private terminology (EDH and >> EECDH) instead of the standard terminology (DHE and ECDHE). > > Given cipherlist class names: > > k

Re: New "TLS Forward Secrecy" document

2014-01-02 Thread Viktor Dukhovni
On Thu, Jan 02, 2014 at 06:03:40PM -0500, micah wrote: > I notice that you are using OpenSSL's private terminology (EDH and > EECDH) instead of the standard terminology (DHE and ECDHE). Given cipherlist class names: kEECDH - cipher suites that support Ephemeral ECDH key exchange

Re: New "TLS Forward Secrecy" document

2014-01-02 Thread micah
Wietse Venema writes: > Postfix has supported forward secrecy for TLS since version 2.2 > when the TLS patch was adopted into Postfix. Things have changed a > lot since then, both in TLS and in the real world. > > Viktor wrote up a FORWARD_SECRECY_README that summarizes the Po

Re: Forward secrecy

2013-12-23 Thread Viktor Dukhovni
On Mon, Dec 23, 2013 at 09:45:45PM +0100, Andreas Schulze wrote: > I read up to the bottom. I find the Untrusted/Trusted/Verified explanation > very useful. Good. > But I'm still unsure about what an SMTP client could do > to change a remote servers state from Trusted to Verified. If you must-h

Re: Forward secrecy

2013-12-23 Thread Wietse Venema
Andreas Schulze: > Am 23.12.2013 13:13 schrieb Wietse Venema: > > Please check out the updated text at > > http://www.porcupine.org/postfix-mirror/FORWARD_SECRECY_README.html#quick-start > > > > This clarifies what is/isn't optional and why one might want to > > make some change. Only those who w

Re: Forward secrecy

2013-12-23 Thread Andreas Schulze
Am 23.12.2013 13:13 schrieb Wietse Venema: > Please check out the updated text at > http://www.porcupine.org/postfix-mirror/FORWARD_SECRECY_README.html#quick-start > > This clarifies what is/isn't optional and why one might want to > make some change. Only those who want the gory details should >

Re: Forward secrecy

2013-12-23 Thread Wietse Venema
Tom Hendrikx: > So it doesn't have to be more technical or advanced. There were some > connections between dots missing in the higher level picture. Please check out the updated text at http://www.porcupine.org/postfix-mirror/FORWARD_SECRECY_README.html#quick-start This clarifies what is/isn't op

Re: Forward secrecy

2013-12-23 Thread Tom Hendrikx
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 23-12-13 18:40, Wietse Venema wrote: > Viktor Dukhovni: >> On Mon, Dec 23, 2013 at 05:49:40PM +0100, Tom Hendrikx wrote: >> I am still fixing it for clarity, but it should be accurate. Feedback is welcome. >>> >>> After reading,

Re: Forward secrecy

2013-12-23 Thread Tom Hendrikx
> >> After reading, I'm having some questions. > > s/reading/skimming/ :-) > >> The document states that forward secrecy is supported by default >> on recent postfix installs. However, the quick-start still has >> some settings that apparently need tw

Re: Forward secrecy

2013-12-23 Thread Wietse Venema
Viktor Dukhovni: > On Mon, Dec 23, 2013 at 05:49:40PM +0100, Tom Hendrikx wrote: > > > > I am still fixing it for clarity, but it should be accurate. > > > Feedback is welcome. > > > > > > > After reading, I'm having some questions. > > s/reading/skimming/ :-) In this section, the commands tha

Re: Forward secrecy

2013-12-23 Thread Viktor Dukhovni
On Mon, Dec 23, 2013 at 05:49:40PM +0100, Tom Hendrikx wrote: > > I am still fixing it for clarity, but it should be accurate. > > Feedback is welcome. > > > > After reading, I'm having some questions. s/reading/skimming/ :-) > The document states that forward

Re: Forward secrecy

2013-12-23 Thread Wietse Venema
erent ciphers and keys) > as far as visible from the logged information. > > But since forward secrecy is supported by default, what does it help > to specify these params, and re-generate them once in a while? I've no Note: greater security against "pre-computation

Re: Forward secrecy

2013-12-23 Thread Tom Hendrikx
curve parameters for >> perfect forward secrecy. I've read >> http://www.postfix.org/TLS_README.html -- Postfix documentation >> is exceptional by the way -- are there any guides for DHE? > > There is a work-in-progress document on forward secrecy that > covers both

Re: Forward secrecy

2013-12-23 Thread nanotek
On 24/12/2013 3:19 AM, Viktor Dukhovni wrote: On Tue, Dec 24, 2013 at 03:00:37AM +1100, nanotek wrote: We obviously don't know which is stronger against hypothetical unpublished attacks, EDH at 2048-bits or the P-256 curve. Feel free to roll the dice. Against publically known attacks P-256 is

Re: Forward secrecy (was: Certificate Error)

2013-12-23 Thread Viktor Dukhovni
On Tue, Dec 24, 2013 at 03:00:37AM +1100, nanotek wrote: > >We obviously don't know which is stronger against hypothetical > >unpublished attacks, EDH at 2048-bits or the P-256 curve. Feel > >free to roll the dice. Against publically known attacks P-256 is > >both more secure and more computatio

RE: Forward secrecy (was: Certificate Error)

2013-12-23 Thread nanotek
ading into this as I just upgraded to OpenSSL 1.0.1e (FreeBSD base system still installs 0.9.8y). I thought v1.x supported SHA256 cipher suites. Thanks for making me aware, Viktor. and make use of some Diffie-Hellman ephemeral elliptic curve parameters for perfect forward secrecy. This is ena

Re: Forward secrecy

2013-12-23 Thread nanotek
On 24/12/2013 1:40 AM, Wietse Venema wrote: nanotek: Still, might be a good time to create my own CA and upgrade to 4096 bit keys/certificates using SHA512 algorithms and make use of some Diffie-Hellman ephemeral elliptic curve parameters for perfect forward secrecy. I've read

Forward secrecy (was: Certificate Error)

2013-12-23 Thread Wietse Venema
nanotek: > Still, might be a good time to create my own CA and upgrade to 4096 bit > keys/certificates using SHA512 algorithms and make use of some > Diffie-Hellman ephemeral elliptic curve parameters for perfect forward > secrecy. I've read http://www.postfix.org/TLS_READM

Re: New "TLS Forward Secrecy" document

2013-12-19 Thread Titanus Eramius
On Wed, 18 Dec 2013 15:15:34 -0500 (EST) wie...@porcupine.org (Wietse Venema) wrote: > Postfix has supported forward secrecy for TLS since version 2.2 > when the TLS patch was adopted into Postfix. Things have changed a > lot since then, both in TLS and in the real world. > > Vi

New "TLS Forward Secrecy" document

2013-12-18 Thread Wietse Venema
Postfix has supported forward secrecy for TLS since version 2.2 when the TLS patch was adopted into Postfix. Things have changed a lot since then, both in TLS and in the real world. Viktor wrote up a FORWARD_SECRECY_README that summarizes the Postfix side of things all in one place. Available