On Thu, Jul 11, 2013 at 07:28:19PM -0300, Hugo Osvaldo Barrera wrote:
> >
> >   * TLS perfect forward secrecy with ecdhe
> 
> I'm slightly ignorant on this topic, so let me ask to be sure.
> Do we need to *do* anything for PFS to work, (like use a specific type
> of key?), or should it work out-of-the-box with any TLS key type?
> 

You don't need to do anything on the OpenSMTPD side except build and run
the code on a machine that has a recent OpenSSL with support for ECDH.

You can check that it works by doing:

$ openssl s_client -host yourmailhost -port 25 -starttls smtp

and searching for the line:

    "New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES256-GCM-SHA384"
                                 ^^^^^

Now, all you need is a client that will negotiate that.
To verify, simply send yourself a mail and check the headers:

Received: from desktop.poolp.org (89-156-140-4.rev.numericable.fr 
[89.156.140.4]);
        by poolp.org (OpenSMTPD) with ESMTPSA id ebf56aec;
                                       vvvvv
        TLS version=TLSv1/SSLv3 cipher=ECDHE-RSA-AES256-SHA bits=256 verify=NO;
                                       ^^^^^
        for <[email protected]>;
        Fri, 12 Jul 2013 08:37:50 +0200 (CEST)
Message-ID: <[email protected]>
Date: Fri, 12 Jul 2013 08:37:50 +0200
From: Gilles Chehade <[email protected]>
User-Agent: Mozilla/5.0 (X11; OpenBSD amd64; rv:17.0) Gecko/20130628 
Thunderbird/17.0.7


-- 
Gilles Chehade

https://www.poolp.org                                          @poolpOrg

-- 
You received this email because you are subscribed to mailing list: 
[email protected]
To unsubscribe, send mail with subject:
        [[email protected]] unregister

Reply via email to