Thus far, 4096 bit encryption hasn't been an issue. When I see email without 
encryption, it is because their service doesn't offer it. Telus (Canada) being 
a prime example.  

  Original Message  
From: Alice Wonder
Sent: Friday, November 11, 2016 11:01 AM
To: postfix-users@postfix.org
Subject: Re: bits of encryption

On 11/11/2016 03:21 AM, li...@lazygranch.com wrote:
> So is this level of encryption something openssl sets up? ‎That is where do I 
> set the parameter?
>
> Original Message
> From: Sven Schwedas
> Sent: Friday, November 11, 2016 3:15 AM
> To: li...@lazygranch.com; postfix-users@postfix.org
> Subject: Re: bits of encryption
>
> On 2016-11-11 12:08, li...@lazygranch.com wrote:
>> That does explain a lot, but why when I "talk to myself" (send myself email)
>> do I get a lower grade (less bits) of encryption than when another server is
>> sending mail? Is there some parameter I need to set in postfix?‎
>
> Which particular algorithm gets chosen is usually up to the TLS client
> (which can be another server connecting to yours): At the start of the
> connection, client and server tell each other what ciphers they support,
> and the client picks one.
>
> There's pros and cons to 128 bit and 256 bit ciphers (128 bit is good
> enough and faster; 256 bit has more safety margin against *some* attacks
> – but not all), some programs prefer one or the other. You'll have to
> look up whether you can tell your particular client software to prefer
> 256 bit ciphers, if you want to.

Mozilla products often prefer 128-bit AES rather than 256-bit because of 
concerns that 256-bit may make certain types of timing attacks easier. 
The same may be true of other cipher suites.

With hardware AES the timing argument is probably moot, but I know out 
of all my processors, only my xeon has hardware AES - my i3 (now dead) 
did not and the i5 and i7 processors in my laptops do not. Mobile 
platforms also do not. So the timing paranoia may be real for a lot of 
users. Also a lot of servers still use mcrypt which doesn't use hardware 
AES even when available, so those servers *may* be safer with AES 128.

But anyway - I don't know that the timing attack argument is really 
valid, but that's allegedly why some software prefers AES 128 over AES 256.

It's unlikely AES 128 will be broken anytime soon, but timing attacks 
can happen without breaking the actual encryption itself.

Personally I just make sure to configure the server to only offer modern 
ciphers without known issues and don't care that much which the client 
picks from the whitelist.

For private key RSA 4096 probably shouldn't be used btw, a some clients 
can't deal with RSA > 2048 and if you really need stronger than RSA 2048 
than an ECDSA certificate is more efficient (but some older clients also 
don't work with it)

For mail servers I just use RSA 2048 as it works with just about 
everything and won't be cracked until long after the cert has expired 
and I've rotated the keys anyway.

But I'm just a guy on the Internet, so feel free to come to your own 
conclusions.

Reply via email to