Le 13/09/2013 23:26, Viktor Dukhovni a écrit :
On Fri, Sep 13, 2013 at 11:03:22PM +0200, Mathieu R. wrote:

>There is generally more information in the log than this when the
>TLS handshake fails.  DO NOT over-summarize the logs.

Sep 13 22:58:40 effraie01 postfix/smtpd[22230]: SSL_accept error
from ng4.bullet.mail.bf1.yahoo.com[98.139.164.99] lost connection
Sep 13 22:58:40 effraie01 postfix/smtpd[22230]: lost connection
after STARTTLS from ng4.bullet.mail.bf1.yahoo.com[98.139.164.99]
Sep 13 22:58:40 effraie01 postfix/smtpd[22230]: disconnect from
ng4.bullet.mail.bf1.yahoo.com[98.139.164.99]

I can [not] find anything more about this in my logs.

If your traffic volume is not too heavy, you can temporarily raise
the Postfix SMTP server TLS log level to "2":

        smtpd_tls_loglevel = 2

this will show more details of the TLS handshake.

not very much more :

Sep 13 23:33:09 effraie01 postfix/smtpd[25221]: connect from ng4.bullet.mail.bf1.yahoo.com[98.139.164.99] Sep 13 23:33:44 effraie01 postfix/smtpd[25221]: SSL_accept error from ng4.bullet.mail.bf1.yahoo.com[98.139.164.99] lost connection Sep 13 23:33:44 effraie01 postfix/smtpd[25221]: lost connection after STARTTLS from ng4.bullet.mail.bf1.yahoo.com[98.139.164.99] Sep 13 23:33:44 effraie01 postfix/smtpd[25221]: disconnect from ng4.bullet.mail.bf1.yahoo.com[98.139.164.99]



>Record a full packet PCAP file containing a session from a Yahoo
>host. Filter this capture file to contain full packets from exactly
>one TCP session.  Run that through wireshark, see where in the TLS
>handshake the problem starts. Make the full capture available (post
>a URL, ...).

http://bazar.effraie.org/yahoo1.pcap (i personally do not understand anything from this...)

thank a lot for you help

--
Mathieu R.

Reply via email to