mirror of
https://github.com/foxcpp/maddy.git
synced 2025-04-05 22:17:39 +03:00
Having it in the same directory as the source code makes it simplier to keep in sync with the source code itself.
124 lines
3.1 KiB
Markdown
124 lines
3.1 KiB
Markdown
maddy-tls(5) "maddy mail server" "maddy reference documentation"
|
|
|
|
; TITLE Advanced TLS configuration
|
|
|
|
# TLS server configuration
|
|
|
|
You can specify other TLS-related options in a configuration block for 'tls'
|
|
directive:
|
|
|
|
```
|
|
tls cert.pem cert.pem {
|
|
protocols tls1.2 tls1.3
|
|
curve X25519
|
|
ciphers ...
|
|
}
|
|
```
|
|
|
|
*Syntax*: ++
|
|
protocols _min_version_ _max_version_ ++
|
|
protocols _version_ ++
|
|
*Default*: tls1.0 tls1.3
|
|
|
|
Minimum/maximum accepted TLS version. If only one value is specified, it will
|
|
be the only one usable version.
|
|
|
|
Valid values are: tls1.0, tls1.1, tls1.2, tls1.3
|
|
|
|
*Syntax*: ciphers _ciphers..._ ++
|
|
*Default*: Go version-defined set of 'secure ciphers', ordered by hardware
|
|
performance
|
|
|
|
List of supported cipher suites, in preference order. Not used with TLS 1.3.
|
|
|
|
Valid values:
|
|
|
|
- RSA-WITH-RC4128-SHA
|
|
- RSA-WITH-3DES-EDE-CBC-SHA
|
|
- RSA-WITH-AES128-CBC-SHA
|
|
- RSA-WITH-AES256-CBC-SHA
|
|
- RSA-WITH-AES128-CBC-SHA256
|
|
- RSA-WITH-AES128-GCM-SHA256
|
|
- RSA-WITH-AES256-GCM-SHA384
|
|
- ECDHE-ECDSA-WITH-RC4128-SHA
|
|
- ECDHE-ECDSA-WITH-AES128-CBC-SHA
|
|
- ECDHE-ECDSA-WITH-AES256-CBC-SHA
|
|
- ECDHE-RSA-WITH-RC4128-SHA
|
|
- ECDHE-RSA-WITH-3DES-EDE-CBC-SHA
|
|
- ECDHE-RSA-WITH-AES128-CBC-SHA
|
|
- ECDHE-RSA-WITH-AES256-CBC-SHA
|
|
- ECDHE-ECDSA-WITH-AES128-CBC-SHA256
|
|
- ECDHE-RSA-WITH-AES128-CBC-SHA256
|
|
- ECDHE-RSA-WITH-AES128-GCM-SHA256
|
|
- ECDHE-ECDSA-WITH-AES128-GCM-SHA256
|
|
- ECDHE-RSA-WITH-AES256-GCM-SHA384
|
|
- ECDHE-ECDSA-WITH-AES256-GCM-SHA384
|
|
- ECDHE-RSA-WITH-CHACHA20-POLY1305
|
|
- ECDHE-ECDSA-WITH-CHACHA20-POLY1305
|
|
|
|
*Syntax*: curve _curves..._ ++
|
|
*Default*: defined by Go version
|
|
|
|
The elliptic curves that will be used in an ECDHE handshake, in preference
|
|
order.
|
|
|
|
Valid values: p256, p384, p521, X25519.
|
|
|
|
# TLS client configuration
|
|
|
|
tls_client directive allows to customize behavior of TLS client implementation,
|
|
notably adjusting minimal and maximal TLS versions and allowed cipher suites,
|
|
enabling TLS client authentication.
|
|
|
|
```
|
|
tls_client {
|
|
protocols tls1.2 tls1.3
|
|
ciphers ...
|
|
curve X25519
|
|
root_ca /etc/ssl/cert.pem
|
|
|
|
cert /etc/ssl/private/maddy-client.pem
|
|
key /etc/ssl/private/maddy-client.pem
|
|
}
|
|
```
|
|
|
|
*Syntax*: ++
|
|
protocols _min_version_ _max_version_ ++
|
|
protocols _version_ ++
|
|
*Default*: tls1.0 tls1.3
|
|
|
|
Minimum/maximum accepted TLS version. If only one value is specified, it will
|
|
be the only one usable version.
|
|
|
|
Valid values are: tls1.0, tls1.1, tls1.2, tls1.3
|
|
|
|
*Syntax*: ciphers _ciphers..._ ++
|
|
*Default*: Go version-defined set of 'secure ciphers', ordered by hardware
|
|
performance
|
|
|
|
List of supported cipher suites, in preference order. Not used with TLS 1.3.
|
|
|
|
See TLS server configuration for list of supported values.
|
|
|
|
*Syntax*: curve _curves..._ ++
|
|
*Default*: defined by Go version
|
|
|
|
The elliptic curves that will be used in an ECDHE handshake, in preference
|
|
order.
|
|
|
|
Valid values: p256, p384, p521, X25519.
|
|
|
|
*Syntax*: root_ca _paths..._ ++
|
|
*Default*: system CA pool
|
|
|
|
List of files with PEM-encoded CA certificates to use when verifying
|
|
server certificates.
|
|
|
|
*Syntax*: ++
|
|
cert _cert_path_ ++
|
|
key _key_path_ ++
|
|
*Default*: not specified
|
|
|
|
Present the specified certificate when server requests a client certificate.
|
|
Files should use PEM format. Both directives should be specified.
|
|
|