On 14 May 2021, at 21:53, Eric Germann via mailop wrote:

For the STARTTLS cert I’m using LetsEncrypt.  DANE is also in place.

The TLS certificate checker at https://esmtp.email/tools/tls/ returns a Sectigo certificate which otherwise matches mail.semperen.com and www.mail.semperen.com on port 25. This is what a compliant MTA-STS implementation would do (and is part of what https://esmtp.email/tools/mta-sts/ does.

My question is what could be the cause of the failure?

1.      Certificate validation error in the certificate chain

The certificate chain I am seeing is unusual (to me) because it is presenting two separate signature paths, likely due to the rebranding of Comodo/Sectigo.

```
$ ccheck chain --starttls smtp.semperen.com:25
* spec smtp.semperen.com:25
  TLS version: TLS-1.2
  Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
  [chain 0]
    [cert 0.0]
      Subject: CN=smtp.semperen.com
Issuer: CN=Sectigo RSA Domain Validation Secure Server CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GB
      Serial: 22691099081371953397362798816794149806
Dates: 2020-10-23 00:00:00 +0000 UTC to 2021-10-23 23:59:59 +0000 UTC
      Signature Algorithm: SHA256-RSA
      CA: false
        DNS: smtp.semperen.com
        DNS: www.smtp.semperen.com
    [cert 0.1]
Subject: CN=Sectigo RSA Domain Validation Secure Server CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GB Issuer: CN=USERTrust RSA Certification Authority,O=The USERTRUST Network,L=Jersey City,ST=New Jersey,C=US
      Serial: 166627644428940058458651716034439089575
Dates: 2018-11-02 00:00:00 +0000 UTC to 2030-12-31 23:59:59 +0000 UTC
      Signature Algorithm: SHA384-RSA
      CA: true
    [cert 0.2]
Subject: CN=USERTrust RSA Certification Authority,O=The USERTRUST Network,L=Jersey City,ST=New Jersey,C=US Issuer: CN=USERTrust RSA Certification Authority,O=The USERTRUST Network,L=Jersey City,ST=New Jersey,C=US
      Serial: 2645093764781058787591871645665788717
Dates: 2010-02-01 00:00:00 +0000 UTC to 2038-01-18 23:59:59 +0000 UTC
      Signature Algorithm: SHA384-RSA
      CA: true
  [chain 1]
    [cert 1.0]
      Subject: CN=smtp.semperen.com
Issuer: CN=Sectigo RSA Domain Validation Secure Server CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GB
      Serial: 22691099081371953397362798816794149806
Dates: 2020-10-23 00:00:00 +0000 UTC to 2021-10-23 23:59:59 +0000 UTC
      Signature Algorithm: SHA256-RSA
      CA: false
        DNS: smtp.semperen.com
        DNS: www.smtp.semperen.com
    [cert 1.1]
Subject: CN=Sectigo RSA Domain Validation Secure Server CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GB Issuer: CN=USERTrust RSA Certification Authority,O=The USERTRUST Network,L=Jersey City,ST=New Jersey,C=US
      Serial: 166627644428940058458651716034439089575
Dates: 2018-11-02 00:00:00 +0000 UTC to 2030-12-31 23:59:59 +0000 UTC
      Signature Algorithm: SHA384-RSA
      CA: true
    [cert 1.2]
Subject: CN=USERTrust RSA Certification Authority,O=The USERTRUST Network,L=Jersey City,ST=New Jersey,C=US Issuer: CN=AAA Certificate Services,O=Comodo CA Limited,L=Salford,ST=Greater Manchester,C=GB
      Serial: 76359301477803385872276235234032301461
Dates: 2019-03-12 00:00:00 +0000 UTC to 2028-12-31 23:59:59 +0000 UTC
      Signature Algorithm: SHA384-RSA
      CA: true
    [cert 1.3]
Subject: CN=AAA Certificate Services,O=Comodo CA Limited,L=Salford,ST=Greater Manchester,C=GB Issuer: CN=AAA Certificate Services,O=Comodo CA Limited,L=Salford,ST=Greater Manchester,C=GB
      Serial: 1
Dates: 2004-01-01 00:00:00 +0000 UTC to 2028-12-31 23:59:59 +0000 UTC
      Signature Algorithm: SHA1-RSA
      CA: true
```

I would give this a try with an LE certificate. I use that myself to send email to Gmail with no issues. Note that you will need to add a new TLSA record.

2.      No reverse DNS for the IPv6 address

The host is in AWS and has a PTR for IPv4 setup correctly. Not sure if you can do a PTR for IPv6 in AWS

I have been able to do it with no issues in the past via the same form you use for IPv4 rDNS/SMTP unblocking. That said, I wouldn't think this is a factor when in the scenario you describe, Gmail will be _sending_ to semperen.com.

Mail is delivered successfully to and from gmail. DMARC and DKIM and SPF and ARC all pass.

I think you will find that without rDNS for your IPv6, your MTA is either trying first with IPv4 or retrying over IPv4 after failing with IPv6 due to no rDNS. This is easy to check in the corresponding `Received` header.

Hope this helps

-lem
_______________________________________________
mailop mailing list
[email protected]
https://list.mailop.org/listinfo/mailop

Reply via email to