messy hodge-podge

can't argue

the sensible recipe would be:

always makes sense, once you see it.
frequently _not_ where i first land. sigh.

                https://ssl-config.mozilla.org/
some ill-conceived guide that recommends a specific list ciphers.
that comment about that source is ... unexpected.  but , notable advice.

Nobody has those stats

fair enough.

Broadly speaking you'll see some combinations of:

     - AES-GCM at 256 or 128 bits
     - ECDHE with X25519 or P-256
     - DHE with some random server-selected group
     - P-256 ECDSA certs
     - 2048-bit RSA certs


But there's no good reason to attempt to optimise the cipherlist.
Leave the defaults be.
typically where i end up after each attempt to get a better handle on all this 
-- w.r.t. smtp.

tbh in this case, it's less about 'optimizing', and more trying to use "bad, old, 
outdated, weak, etc" client TLS cipher usage as a filtering mechanism.
yes, there's an assumption that no 'white hat' that i care to receive mail from would use 
"bad, old, outdated, weak, etc" ciphers ... which is likely an unfortunately, 
bad assumption.

as least getting the PQC up was seemingly straightforward; now to wait to see 
any usage ...

cheers.
_______________________________________________
Postfix-users mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to