Thanks Claus - the option did work, so I'll go with the patch.

-John



On Thu, Sep 12, 2013 at 3:54 PM, Claus Assmann <ca+openbsd_m...@esmtp.org>wrote:

> On Thu, Sep 12, 2013, John Hynes wrote:
>
> > openssl s_client -starttls smtp -connect mail.dean.edu:25
> >
> > ...from any of my OpenBSD 5.3 hosts, I get the same response:
>
> > CONNECTED(00000003)
> > 12556912661392:error:140790E5:SSL routines:SSL23_WRITE:ssl handshake
> > failure:/usr/src/lib/libssl/ssl/../src/ssl/s23_lib.c:177:
>
> Add -no_tls1_2 to your call.
>
> If that works, add some options to sendmail to make SSL_OP_NO_TLSv1_2
> available:
>
> diff -ru sendmail-8.14.7/sendmail/readcf.c
> sendmail-8.14.7-new/sendmail/readcf.c
> --- sendmail-8.14.7/sendmail/readcf.c   2013-03-15 17:54:12.000000000 +0000
> +++ sendmail-8.14.7-new/sendmail/readcf.c       2013-06-24
> 14:26:01.000000000 +0100
> @@ -2303,13 +2303,16 @@
>         long            sslopt_bits;    /* bits to set/clear */
>  } SSL_Option[] =
>  {
> -/* these are turned on by default */
> +/* Bugs (and some others) are turned on by default */
>  #ifdef SSL_OP_MICROSOFT_SESS_ID_BUG
>         { "SSL_OP_MICROSOFT_SESS_ID_BUG",
> SSL_OP_MICROSOFT_SESS_ID_BUG    },
>  #endif
>  #ifdef SSL_OP_NETSCAPE_CHALLENGE_BUG
>         { "SSL_OP_NETSCAPE_CHALLENGE_BUG",
>  SSL_OP_NETSCAPE_CHALLENGE_BUG   },
>  #endif
> +#ifdef SSL_OP_LEGACY_SERVER_CONNECT
> +       { "SSL_OP_LEGACY_SERVER_CONNECT",
> SSL_OP_LEGACY_SERVER_CONNECT    },
> +#endif
>  #ifdef SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG
>         { "SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG",
>  SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG },
>  #endif
> @@ -2346,9 +2349,18 @@
>  #ifdef SSL_OP_NO_TICKET
>         { "SSL_OP_NO_TICKET",   SSL_OP_NO_TICKET        },
>  #endif
> +#ifdef SSL_OP_CISCO_ANYCONNECT
> +       { "SSL_OP_CISCO_ANYCONNECT",    SSL_OP_CISCO_ANYCONNECT },
> +#endif
>  #ifdef SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION
>         { "SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION",
>  SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION   },
>  #endif
> +#ifdef SSL_OP_NO_COMPRESSION
> +       { "SSL_OP_NO_COMPRESSION",      SSL_OP_NO_COMPRESSION   },
> +#endif
> +#ifdef SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION
> +       { "SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION",
> SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION        },
> +#endif
>  #ifdef SSL_OP_SINGLE_ECDH_USE
>         { "SSL_OP_SINGLE_ECDH_USE",     SSL_OP_SINGLE_ECDH_USE  },
>  #endif
> @@ -2373,6 +2385,12 @@
>  #ifdef SSL_OP_NO_TLSv1
>         { "SSL_OP_NO_TLSv1",    SSL_OP_NO_TLSv1 },
>  #endif
> +#ifdef SSL_OP_NO_TLSv1_2
> +       { "SSL_OP_NO_TLSv1_2",  SSL_OP_NO_TLSv1_2       },
> +#endif
> +#ifdef SSL_OP_NO_TLSv1_1
> +       { "SSL_OP_NO_TLSv1_1",  SSL_OP_NO_TLSv1_1       },
> +#endif
>  #ifdef SSL_OP_PKCS1_CHECK_1
>         { "SSL_OP_PKCS1_CHECK_1",       SSL_OP_PKCS1_CHECK_1    },
>  #endif
> @@ -2385,6 +2403,9 @@
>  #ifdef SSL_OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG
>         { "SSL_OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG",
> SSL_OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG  },
>  #endif
> +#ifdef SSL_OP_CRYPTOPRO_TLSEXT_BUG
> +       { "SSL_OP_CRYPTOPRO_TLSEXT_BUG",
>  SSL_OP_CRYPTOPRO_TLSEXT_BUG     },
> +#endif
>         { NULL,         0               }
>  };
>  #endif /* STARTTLS && _FFR_TLS_1 */

Reply via email to