> On 4/12/2011 2:17 AM, email builder wrote:

> >>> Am  I correct to  infer that both smtp(d)_tls_CAfile settings only serve
> >>> a   purpose when you want to verify client/server certificates?
> >>> If  that's  the case, why does the example at the bottom of  TLS_README
> >>> use both the  CAfile settings with only  opportunistic encryption?
> >>
> >> This reduces log  noise,  and improves the audit trail.
> >
> > Hmm, OK, not to imply these things  are not important, but are these the
> > only reasons you'd have a CAfile or  CApath?
> 
> With opportunistic TLS you don't gain any extra security by 
> verifying the remote cert.  This is what makes self-signed 
> certificates adequate for opportunistic TLS.
> 
> >
> >>> Our  system seems to work  without any CAfile/CApath settings under
> >>  opportunistic
> >>
> >>> encryption both  incoming and  outgoing. Is there a performance or 
security
> >>> difference   between using them or not?
> >>
> >> You should probably throw in  a few trusted  root CAs.
> >
> > 1) Is there a place to get a file  with the usual suspects already in it?
> 
> Most OS's have a package of common  root certs available.  For 
> example, FreeBSD provides the  security/ca_root_nss port.
> 
> >
> > 2) Does postfix add new CAs to it  when it sees a new one from a client?
> 
> No.  The CA file/path is a  trust list.  It would be 
> inappropriate for a program to add trust  automatically.
> 
> > 3) Does it make much difference between CApath or  CAfile?  I suppose
> > using CApath only makes sense if the answer to  question 2 is "yes"?  (File
> > probably sufficient if it is static and  not that big)
> 
> Performance may be better with CApath for a large number of 
> certificates, but mostly this is about how the certs are 
> bundled for  you.

Thank you and Victor.

Reply via email to