in pfx 3.10.7

for external, received mail, in main.cf, i've

        ...
        smtp_dns_support_level = dnssec
        smtp_host_lookup       = dns
        ...
        smtpd_tls_chain_files =
            ${var_ssldir}/${var_mydom}/priv.ec.key,
            ${var_ssldir}/${var_mydom}/fullchain.ec.crt.pem,
            ${var_ssldir}/${var_mydom}/priv.rsa.key,
            ${var_ssldir}/${var_mydom}/fullchain.rsa.crt.pem
        ...

. the certs -- both EC and RSA -- are LetsEncrypt standard issue.

works as intended; dane checks are good.

for internal, between local pfx instances i setup specific relay, using 
self-signed certs issued by own/local CA

e.g.

  -o smtp_tls_security_level=encrypt
  -o smtp_tls_wrappermode=yes
  -o 
smtp_tls_chain_files=${var_ssldir}/int/int.mx.example.com.client.EC.key.pem,${var_ssldir}/int/int.mx.example.com.client.EC.crt.pem
  -o smtp_tls_policy_maps=${def_db_type}:${cfg_dir}/relay_tls_policy
  -o smtp_tls_fingerprint_digest=sha256

where, to date, it's EC only.
again, works as intended.

i've set up a new (test) CA instance -- to come up to speed on PQC usage.
the CA's root/intermediate are PQC algo signed.
client/server certs, issued from that CA, are now available in 'four flavors': 
RSA, EC, Ed25519, PQC.

internally, PQC is now used for local-only/internal self-signed ssl.  so far so 
good with web & ssh.

iiuc, PQC for public-facing LE & DNSSEC in general is early-days,

        https://www.ietf.org/archive/id/draft-sheth-pqc-dnssec-strategy-00.html

what part does/can PQC yet play 'in' Postfix?

too early for public-facing 'smtpd_tls_chain_files', i assume?
what about internal use between non-public-facing/internal pfx instances?

my impression is -- leave any/all public-facing pfx crypto alone/as-is for now, 
but that internal relays might be ok ... ?
_______________________________________________
Postfix-users mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to