for websites it seems that, for all practical purposes, ecc ssl certs are all 
that's needed anymore

cref e.g. comments at

        
https://www.thesslstore.com/blog/you-should-be-using-ecc-for-your-ssl-tls-certificates/
        
        " ... All modern Operating Systems and Browsers support ECC ..."

for my sites, i don't care about failing service to those using old browsers.

does the same hold true for smtp(d)?

in postfix, i've had for the longest time overrides in my main.cf,

        smtpd_tls_eckey_file  = /etc/ssl/postfix/privkey_ec.pem
        smtpd_tls_eccert_file = /etc/ssl/postfix/fullchain.ec.crt.pem
        smtpd_tls_key_file    = /etc/ssl/postfix/privkey_rsa.pem
        smtpd_tls_cert_file   = /etc/ssl/postfix/fullchain.rsa.crt.pem

with letsencrypt happily renewing both the ecc & rsa algo certs,

as a 1st test i removed

        smtpd_tls_eckey_file  = /etc/ssl/postfix/privkey_ec.pem
        smtpd_tls_eccert_file = /etc/ssl/postfix/fullchain.ec.crt.pem
-       smtpd_tls_key_file    = /etc/ssl/postfix/privkey_rsa.pem
-       smtpd_tls_cert_file   = /etc/ssl/postfix/fullchain.rsa.crt.pem

which iiuc drop back to 'empty' defaults of

        postconf -d smtpd_tls_key_file smtpd_tls_cert_file
                smtpd_tls_key_file = $smtpd_tls_cert_file
                smtpd_tls_cert_file =

and, have seen no immediately adverse effects in mail flow.  far from robust 
testing at this point ...

i don't have any idea of what the stats are; thought best to ask -- as for 
mail, it's still arguably hit-and-miss for deliverability with disabling 'older 
tech' ciphers, etc., depending on your service case.

is it safe/recommended to not bother with the rsa certs anymore?

Reply via email to