[pfx] Re: identifying sender failing ssl/tls cipher (ECDSA server certificate???)

2023-08-14 Thread Viktor Dukhovni via Postfix-users
On Sat, Aug 12, 2023 at 12:53:35PM -0400, Viktor Dukhovni wrote: > > Length: 00 00 9c (156) > > ... > > 0x01,0x88 7 ??? > > ... > > 0xC0,0x12 14 ECDHE-RSA-DES-CBC3-SHA Au=RSA > > ... > > 0x00,0x40 22 DHE-DSS-AES128-SHA256 Au=DSS > > ... > > All the ciphersuites offered except one (DSS) are

[pfx] Re: identifying sender failing ssl/tls cipher (ECDSA server certificate???)

2023-08-12 Thread pgnd via Postfix-users
Consider (after carefully reading over the docs explaining the required ordering of the content) switching to consolidated preferred syntax: smtpd_tls_chain_files = >> This feature is available in Postfix 3.4 and later. that one snuck by me :-/ convenient, tho, thx! No tool.

[pfx] Re: identifying sender failing ssl/tls cipher (ECDSA server certificate???)

2023-08-12 Thread Viktor Dukhovni via Postfix-users
On Sat, Aug 12, 2023 at 02:03:56PM -0400, Viktor Dukhovni via Postfix-users wrote: > > checking further > > > > grep smtpd_tls main.cf | grep file > > smtpd_tls_dh1024_param_file=${config_directory}/dh4096.pem > > smtpd_tls_eckey_file = > >

[pfx] Re: identifying sender failing ssl/tls cipher (ECDSA server certificate???)

2023-08-12 Thread Viktor Dukhovni via Postfix-users
On Sat, Aug 12, 2023 at 02:27:14PM -0400, pgnd wrote: > >> Handshake type: 01 (Client Hello) > >> Length: 00 00 9c (156) > > > One thing I failed to mention is that length of 156 is rather unexpected > > ... > > And there's also that mysterious 0x01,0x88 cipher, which is not listed > > in the

[pfx] Re: identifying sender failing ssl/tls cipher (ECDSA server certificate???)

2023-08-12 Thread pgnd via Postfix-users
That'd then be the file to analyse: # tshark -nr /tmp/tls.pcap -V ssl thx for the ez tutorial after the key file cleanup, ... Untrusted TLS connection established from esa.hc2802-61.iphmx.com[68.232.155.227]: TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 ... This

[pfx] Re: identifying sender failing ssl/tls cipher (ECDSA server certificate???)

2023-08-12 Thread Viktor Dukhovni via Postfix-users
On Sat, Aug 12, 2023 at 12:53:35PM -0400, Viktor Dukhovni via Postfix-users wrote: > > Handshake type: 01 (Client Hello) > > Length: 00 00 9c (156) One thing I failed to mention is that length of 156 is rather unexpected here, because the containing TLS record layer header promised a length of

[pfx] Re: identifying sender failing ssl/tls cipher (ECDSA server certificate???)

2023-08-12 Thread Viktor Dukhovni via Postfix-users
On Sat, Aug 12, 2023 at 01:35:11PM -0400, pgnd wrote: > > https://datatracker.ietf.org/doc/html/rfc7672#section-8.2 > > I've no idea in this case why aNULL is explicitly ref'd; for my own > configs I don't call it out, rather stick with the default See the final comment in this message. >

[pfx] Re: identifying sender failing ssl/tls cipher (ECDSA server certificate???)

2023-08-12 Thread Viktor Dukhovni via Postfix-users
On Sat, Aug 12, 2023 at 01:42:04PM -0400, pgnd wrote: > after the key file cleanup, > > ... > Untrusted TLS connection established from > esa.hc2802-61.iphmx.com[68.232.155.227]: TLSv1.2 with cipher > ECDHE-RSA-AES128-GCM-SHA256 > ... > > seems, in fact, EC-ready That's ECDHE key

[pfx] Re: identifying sender failing ssl/tls cipher (ECDSA server certificate???)

2023-08-12 Thread pgnd via Postfix-users
one'd hope that banks and hospitals might be a bit more up-to-date on their end. after the key file cleanup, ... Untrusted TLS connection established from esa.hc2802-61.iphmx.com[68.232.155.227]: TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 ... seems, in fact, EC-ready

[pfx] Re: identifying sender failing ssl/tls cipher (ECDSA server certificate???)

2023-08-12 Thread pgnd via Postfix-users
As background, the RELEASE_NOTES for 3.8 mention:...>> postfix/psint/smtpd[27820]: esa.hc2802-61.iphmx.com[139.138.32.157]: TLS cipher list "aNULL:-aNULL:HIGH:MEDIUM:!SEED:!IDEA:!3DES:!RC2:!RC4:!RC5:!kDH:!kECDH:!aDSS:!MD5:+RC4:@STRENGTH:!aNULL" yep Which is most of the above, but

[pfx] Re: identifying sender failing ssl/tls cipher (ECDSA server certificate???)

2023-08-12 Thread Viktor Dukhovni via Postfix-users
On Sat, Aug 12, 2023 at 09:47:57AM -0400, pgnd via Postfix-users wrote: > postconf mail_version > mail_version = 3.8.1 As background, the RELEASE_NOTES for 3.8 mention: - Postfix default settings now exclude the following deprecated or unused ciphers (SEED, IDEA,

[pfx] Re: identifying sender failing ssl/tls cipher ?

2023-08-12 Thread pgnd via Postfix-users
why? not my own server/config Can you explain how each of these is better than the Postfix defaults? all but two _are_ at defaults postconf -n | grep -i tls | grep -i cipher | sort @D smtpd_tls_ciphers = medium @D smtpd_tls_exclude_ciphers = @D

[pfx] Re: identifying sender failing ssl/tls cipher ?

2023-08-12 Thread Bastian Blank via Postfix-users
On Sat, Aug 12, 2023 at 09:47:57AM -0400, pgnd via Postfix-users wrote: > postconf -n | grep -i tls | grep -i cipher > smtp_tls_ciphers = medium > smtp_tls_exclude_ciphers = EXP, LOW, MEDIUM, aNULL, eNULL, SRP, > PSK, kDH, DH, kRSA, DHE, DSS, RC4, DES, IDEA,

[pfx] Re: identifying sender failing ssl/tls cipher ?

2023-08-12 Thread Bill Cole via Postfix-users
On 2023-08-12 at 09:47:57 UTC-0400 (Sat, 12 Aug 2023 09:47:57 -0400) pgnd via Postfix-users is rumored to have said:  in postconf mail_version mail_version = 3.8.1 i just caught the following TLS error in postfix logs, 2023-08-12T09:33:07.064713-04:00 cmx0024