On Tue, Mar 02, 2010 at 04:04:29PM -0500, Alex wrote:
> >> It's not
> >> possible to figure out which ciphers are offered to TLS clients on my
> >> server?
> >
> > It is possible, but you will most likely shoot yourself in the foot if
> > you try to use this information to adjust Postfix settings.
> >
> > The Postfix defaults are chosen carefully, and act a barrier between
> > shotgun and foot. What real problem are you trying to solve.
>
> Well, I'm now really just trying to better understand what it all
> means. I'm sure to think I could do a better job than postfix itself
> would be a mistake.
Postfix selects sensibly strong protocols and ciphers for opportunistic
and mandatory TLS respectively.
> Where did postfix get the information to make its decision?
The documentation is in TLS_README.html
The OpenSSL library implements a (powerful, but fragile) cipher selection
language. Postfix uses the OpenSSL cipher selection language with care to
implement less flexible, but more robust/intuitive cipher "grade" levels
and selects the grade automatically based on the destination policy.
> I don't
> see how it put together that chain of encryption and authentication to
> build the tunnel.
Avoiding all temptation to tweak the underlying SSL details and work
with the higher level Postfix interface:
http://www.postfix.org/TLS_README.html#client_tls_limits
http://www.postfix.org/TLS_README.html#client_tls_levels
http://www.postfix.org/TLS_README.html#client_tls_may
http://www.postfix.org/TLS_README.html#client_tls_encrypt
http://www.postfix.org/TLS_README.html#client_tls_secure
http://www.postfix.org/TLS_README.html#client_tls_policy
--
Viktor.
P.S. Morgan Stanley is looking for a New York City based, Senior Unix
system/email administrator to architect and sustain our perimeter email
environment. If you are interested, please drop me a note.