On Tue, 22 Sep 2020, Viktor Dukhovni wrote:

On Tue, Sep 22, 2020 at 04:37:55PM +0200, Markus E. wrote:

You might find another one in your logs now. :-)

You're welcome! :)


   $ posttls-finger -g HIGH -o tls_high_cipherlist='DEFAULT:!aECDSA' -p 
'!TLSv1.3' mars.unx.se
   posttls-finger: Connected to mx.unx.se[2600:3c04::f03c:91ff:feea:d4d]:25
   posttls-finger: < 220 phobos.unx.se ESMTP
   posttls-finger: > EHLO amnesiac
   posttls-finger: < 250-phobos.unx.se
   posttls-finger: < 250-PIPELINING
   posttls-finger: < 250-SIZE 10240000
   posttls-finger: < 250-ETRN
   posttls-finger: < 250-STARTTLS
   posttls-finger: < 250-ENHANCEDSTATUSCODES
   posttls-finger: < 250-8BITMIME
   posttls-finger: < 250 CHUNKING
   posttls-finger: > STARTTLS
   posttls-finger: < 220 2.0.0 Ready to start TLS
   posttls-finger: SSL_connect error to 
mx.unx.se[2600:3c04::f03c:91ff:feea:d4d]:25: -1
   posttls-finger: warning: TLS library problem: error:14094410:SSL 
routines:ssl3_read_bytes:sslv3 alert handshake 
failure:ssl/record/rec_layer_s3.c:1544:SSL alert number 40:

I'm running Postfix 3.6-20200830 compiled with openssl-1.1.1g.  Using
Let's Encrypt certificate.

Specifically, an ECDSA P-256 certificate, but some systems don't (yet?)
support ECDSA.  You'd need an additional RSA certificate to interoperate
with their sending MTA's limited STARTTLS cipher/protocol repertoire.

Oh, yes, you are right!


The combination of a rather ancient, poorly interoperable, TLS stack
(TLSv1 only or preferred, no ECDSA support) with an inability to retry
without STARTTLS makes their SMTP servers rather brittle.  One might
reasonably take the view that the problem is theirs to solve.

The host in question, which also happens to run the DMARC mailing list,
uses Sendmail 8.14.5 released 9 years ago, according to their headers.

I'll stick to my ecdsa cert. :)

Thank you for your explanation!

-me

Reply via email to