If you're soliciting client "certificates" and any associated access> checks 
are (wisely) keyed by a digest of just the public key (rather
than the full certificate), consider also setting:

     smtpd_tls_enable_rpk = yes

Which would reduce bload in the client-to-server direction for any
ML-DSA client public keys.

sigh.  that's _another_ one i've managed to be completely unaware of.

        https://www.postfix.org/postconf.5.html#smtp_tls_enable_rpk

it's now on my read-up list.  thx o/

You're welcome, good luck.  With PQC, keep in mind that you're
volunteering to be a guineapig for as yet unproven new technology.
...
might be valuable experience to have under your belt, but isn't
especially beneficial at present.

( sure.  though, in several verticals it's already an issue in meetings; rarely rational 
or justified, atm, but it's definitely already a latest "bright-n-shiny" 
object).

i generally try to wrap my head-around scope/effort/gotchas re: what will be 
expected here eventually.
often as that ... 'test subject' ... on my own boxes.

staff very much prefer i suffer first ;-)

_______________________________________________
Postfix-users mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to