On Wed, May 13, 2026 at 11:24:51PM -0700, Doug Hardie wrote:

> mail.pem is a copy of fullchain.pem

Well, if it is a faithful copy, the problem is on the sender's end.
Your certificate chain (assuming you have just one, without additional
chains via SNI or additional chains with RSA, ...).

    # With the Fedora 43 trust anchor file

    $ posttls-finger -c -Lsummary -F /etc/pki/tls/cert.pem -lsecure 
"[mail.sermon-archive.info]"
    posttls-finger: Verified TLS connection established
        to mail.sermon-archive.info[47.181.130.121]:25:
        TLSv1.3 with
        cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
        key-exchange x25519
        server-signature ECDSA (prime256v1)
        server-digest SHA256

Perhaps one of your domain's MX records have a different name than the
DNS name in the certificate and the sender is misguidedly (or do you
have MTA-STS?) trying to "verify" the certificate?

    $ openssl x509 -in /tmp/chain.pem -noout -ext subjectAltName
    X509v3 Subject Alternative Name:
        DNS:mail.sermon-archive.info

It is also possible that the sending system supports only RSA, and ECDSA
is not sufficiently ancient for news of its broad deployment to have
reached that server's operator...

[ Maybe they botched customising the supported signature algorithms in
  an effort to turn off SHA-224? :-) ]

-- 
    Viktor.  🇺🇦 Слава Україні!
_______________________________________________
Postfix-users mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to