Hi,
I can no longer connect to Dovecot (IMAP). The connection is terminated
by Dovecot after Client Helo.
My server:
Dovecot 2.3.3
Debian buster/sid
Architecture: ppc
My problems started in late August after upgrading Dovecot.
SSL settings:
ssl_dh = </etc/ssl/dh2048.pem
ssl_min_protocol = TLSv1.2
ssl_cipher_list =
ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256
ssl_prefer_server_ciphers = yes
Client:
OS Android 6.0.1
Aquamail
Log from Dovecot:
Sep 15 23:19:02 debian2 dovecot: imap-login: Debug: SSL: where=0x10,
ret=1: before SSL initialization
Sep 15 23:19:02 debian2 dovecot: imap-login: Debug: SSL: where=0x2001,
ret=1: before SSL initialization
Sep 15 23:19:02 debian2 dovecot: imap-login: Debug: SSL: where=0x2002,
ret=-1: before SSL initialization
Sep 15 23:19:02 debian2 dovecot: imap-login: Debug: SSL: where=0x2001,
ret=1: before SSL initialization
Sep 15 23:19:02 debian2 dovecot: imap-login: Debug: SSL alert:
where=0x4008, ret=598: fatal unknown
Sep 15 23:19:02 debian2 dovecot: imap-login: Debug: SSL: where=0x2002,
ret=-1: error
Sep 15 23:19:02 debian2 dovecot: imap-login: Debug: SSL error:
SSL_accept() failed: error:14209175:SSL
routines:tls_early_post_process_client_hello:inappropriate fallback
Sep 15 23:19:02 debian2 dovecot: imap-login: Debug: SSL error:
SSL_accept() syscall failed: Invalid argument
Sep 15 23:19:02 debian2 dovecot: imap-login: Disconnected (no auth
attempts in 0 secs): user=<>, rip=XXX.XXX.XXX.XXX,
lip=XXX.XXX.XXX.XXX,TLS handshaking: SSL_accept() syscall failed:
Invalid argument, session=<XXXXXXXXXXX>
Log from client (Aquamail) is a bit longer (see attachment).
I have also listened to the communication using Wireshark. The last
piece of communication is Client Helo. After the client sends Client
Helo, there is no reply from Dovecot and the server closes the
communication.
This is the Client Helo, in the "structured view" iin Wireshark:
|Secure Sockets Layer TLSv1 Record Layer: Handshake Protocol: Client
Hello Content Type: Handshake (22) Version: TLS 1.0
(0x0301) Length: 176 Handshake Protocol: Client Hello
Handshake Type: Client Hello (1) Length: 172
Version: TLS 1.2 (0x0303) Random:
2b7af5ba92040f081a5a3621e9d9cbab2d50b829b7fe755f... Session
ID Length: 0 Cipher Suites Length: 62 Cipher
Suites (31 suites) Cipher Suite:
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (0xc030) Cipher
Suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (0xc02f)
Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (0xc02c)
Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (0xc02b)
Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
(0x009f) Cipher Suite:
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (0x009e) Cipher
Suite: TLS_RSA_WITH_AES_256_GCM_SHA384 (0x009d) Cipher
Suite: TLS_RSA_WITH_AES_128_GCM_SHA256 (0x009c) Cipher
Suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (0xc028)
Cipher Suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (0xc014)
Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (0xc024)
Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (0xc00a)
Cipher Suite: TLS_RSA_WITH_AES_256_CBC_SHA256 (0x003d)
Cipher Suite: TLS_RSA_WITH_AES_256_CBC_SHA (0x0035)
Cipher Suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (0xc027)
Cipher Suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
(0xc013) Cipher Suite:
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (0xc023) Cipher
Suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (0xc009)
Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA256 (0x003c)
Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA (0x002f)
Cipher Suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (0x006b)
Cipher Suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA (0x0039)
Cipher Suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (0x0067)
Cipher Suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA (0x0033)
Cipher Suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA (0xc011)
Cipher Suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA (0xc007)
Cipher Suite: TLS_RSA_WITH_RC4_128_SHA (0x0005)
Cipher Suite: TLS_RSA_WITH_RC4_128_MD5 (0x0004) Cipher
Suite: TLS_RSA_WITH_3DES_EDE_CBC_SHA (0x000a) Cipher
Suite: TLS_EMPTY_RENEGOTIATION_INFO_SCSV (0x00ff) Cipher
Suite: TLS_FALLBACK_SCSV (0x5600) Compression Methods
Length: 1 Compression Methods (1 method)
Extensions Length: 69 Extension: server_name (len=17)
Extension: extended_master_secret (len=0) Extension:
signature_algorithms (len=22) Type: signature_algorithms
(13) Length: 22 Signature Hash
Algorithms Length: 20 Signature Hash Algorithms (10
algorithms) Signature Algorithm: rsa_pkcs1_sha512
(0x0601) Signature Algorithm: ecdsa_secp521r1_sha512
(0x0603) Signature Algorithm: rsa_pkcs1_sha384
(0x0501) Signature Algorithm: ecdsa_secp384r1_sha384
(0x0503) Signature Algorithm: rsa_pkcs1_sha256
(0x0401) Signature Algorithm: ecdsa_secp256r1_sha256
(0x0403) Signature Algorithm: SHA224 RSA (0x0301)
Signature Algorithm: SHA224 ECDSA (0x0303)
Signature Algorithm: rsa_pkcs1_sha1 (0x0201)
Signature Algorithm: ecdsa_sha1 (0x0203) |
|What I tried: |
* |change all possible settings in Dovecot (ssl_min_protocol,
ssl_cipher_list ...)|
* |change certificate I use|
|I also got in touch with the developer of Aquamail (see our discussion
here: https://www.aqua-mail.com/forum/index.php?topic=6824.0 ).|
|The developer was able to reproduce the handshake error. We believe
that the problem is that Dovecot rejects ClientHello as long as it is
wrapped in the TLSv1 Record Layer (see the second lilne in the Wireshark
log). According to the developer, Dovecot should accept Client Helo
wrapped in the TLSv1 Record Layer.|
|Thank you very much for your help. Best regards VB |
2018.09.15 23:27:57.268 +0200 [EXEC.2652] Executing task
[org.kman.AquaMail.mail.imap.ImapTask_Sync@4988403, u =
content://org.kman.AquaMail.data/accounts/2, t = 86965199, a =
[org.kman.AquaMail.mail.MailAccount@1206fe7: id = 2, username = XXXXXXX, email
= x...@xxxxxx.xxx, name = x...@xxxxxx.xxx]] on Executor_Network#0
2018.09.15 23:27:57.269 +0200 [EXEC.2652] Executing task
[org.kman.AquaMail.mail.imap.ImapTask_Sync@4988403, u =
content://org.kman.AquaMail.data/accounts/2, t = 86965199, a =
[org.kman.AquaMail.mail.MailAccount@1206fe7: id = 2, username = XXXXXXX, email
= x...@xxxxxx.xxx, name = x...@xxxxxx.xxx]]
2018.09.15 23:27:57.270 +0200 [MDATR.2652] Using WiFi sync policy values
2018.09.15 23:27:57.270 +0200 [SYNC.2652] SyncPolicy: mSyncByCount = 100,
mCommandBatchSize = 25
2018.09.15 23:27:57.271 +0200 [LOCKS.2652] acquire for 2,
[org.kman.AquaMail.mail.imap.ImapTask_Sync@4988403, u =
content://org.kman.AquaMail.data/accounts/2, t = 86965199, a =
[org.kman.AquaMail.mail.MailAccount@1206fe7: id = 2, username = XXXXXXX, email
= x...@xxxxxx.xxx, name = x...@xxxxxx.xxx]] on thread =
Thread[Executor_Network#0,5,main], tid = 2652, thash = 02c90ff4
2018.09.15 23:27:57.272 +0200 [LOCKS.2652] AccountSyncLock after pass:
Active: 1
Index = 0, lock = org.kman.AquaMail.core.AccountSyncLock$b@2c38e98, accountId =
2, thread = Thread[Executor_Network#0,5,main], tid = 2652, thash = 02c90ff4,
since = 2018-09-15 23:27:57:272
Queue: 0
2018.09.15 23:27:57.272 +0200 [NETWRK.2652] Request for connection
content://org.kman.AquaMail.data/accounts/2/in to [XXXXXX.XXX:143, tlsStrict,
login = 0, pass = true, cert = false]
2018.09.15 23:27:57.273 +0200 [POWER.2652] >>>>> Acquiring wake lock for
MailConnectionManager
2018.09.15 23:27:57.273 +0200 [POWER.2652] Acquired wake lock flag
0x01000000, result 0x05000000
2018.09.15 23:27:57.273 +0200 LockManager ... Wake lock already held
2018.09.15 23:27:57.274 +0200 [NETWRK.2652] Semaphore acquire for
[XXXXXX.XXX:143, tlsStrict, login = 0, pass = true, cert = false]
2018.09.15 23:27:57.274 +0200 [NETWRK.2652] Connecting to [XXXXXX.XXX:143,
tlsStrict, login = 0, pass = true, cert = false]
2018.09.15 23:27:57.274 +0200 [NETWRK.2652] Resolving address for XXXXXX.XXX
2018.09.15 23:27:57.280 +0200 [CONCTR.1] Service state change: uri:
content://org.kman.AquaMail.data/accounts/2/out/231588601, what: 160, aux =
0x1234abcd
2018.09.15 23:27:57.281 +0200 AccountListShard Send state: uri:
content://org.kman.AquaMail.data/accounts/2/out/231588601, what: 160, aux =
0x1234abcd
2018.09.15 23:27:57.281 +0200 [CONCTR.1] Service state change: uri:
content://org.kman.AquaMail.data/accounts/2/out/231588601, what: 160, aux =
0x1234abcd
2018.09.15 23:27:57.282 +0200 [CONCTR.1] Service state change: uri:
content://org.kman.AquaMail.data/accounts/2/out/231588601, what: 161, aux =
0x001a
2018.09.15 23:27:57.282 +0200 AccountListShard Send state: uri:
content://org.kman.AquaMail.data/accounts/2/out/231588601, what: 161, aux =
0x001a
2018.09.15 23:27:57.283 +0200 [CONCTR.1] Service state change: uri:
content://org.kman.AquaMail.data/accounts/2/out/231588601, what: 161, aux =
0x001a
2018.09.15 23:27:57.283 +0200 AsyncDataLoaderImpl Submit
org.kman.AquaMail.data.AsyncDataLoader@274dc81 item
org.kman.AquaMail.view.d$c@44636f1
2018.09.15 23:27:57.283 +0200 AsyncDataLoaderWorker_CONTACTS Submit
org.kman.AquaMail.data.AsyncDataLoader@274dc81 item
org.kman.AquaMail.view.d$c@44636f1
2018.09.15 23:27:57.285 +0200 AsyncDataLoaderWorker_CONTACTS Loading
org.kman.AquaMail.view.d$c@44636f1
2018.09.15 23:27:57.288 +0200 AsyncDataLoaderWorker_CONTACTS Loading
org.kman.AquaMail.view.d$c@44636f1 took 3 ms
2018.09.15 23:27:57.298 +0200 AsyncDataLoaderImpl Delivering
org.kman.AquaMail.data.AsyncDataLoader@274dc81 item
org.kman.AquaMail.view.d$c@44636f1
2018.09.15 23:27:57.354 +0200 [NETWRK.2652] IPv4: XXXXXX.XXX/XXX.XXX.XXX.XXX
2018.09.15 23:27:57.355 +0200 [NETWRK.2652] Trying:
XXXXXX.XXX/XXX.XXX.XXX.XXX:143
2018.09.15 23:27:57.373 +0200 [NETWRK.2652] Socket connection completed
2018.09.15 23:27:57.374 +0200 [NETWRK.2652] Connection to [XXXXXX.XXX:143,
tlsStrict, login = 0, pass = true, cert = false] completed:
XXXXXX.XXX/XXX.XXX.XXX.XXX:143, time = 0.10 sec
2018.09.15 23:27:57.374 +0200 [NETWRK.2652] Buffer sizes: 524288 send,
1132800 receive
2018.09.15 23:27:57.449 +0200 [IMAP_RAW.2652] Data is <124>:
* OK [CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE LITERAL+
STARTTLS LOGINDISABLED] Dovecot (Debian) ready.
2018.09.15 23:27:57.449 +0200 [IMAP.2652] Server greeting: * OK
[CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE LITERAL+ STARTTLS
LOGINDISABLED] Dovecot (Debian) ready.
2018.09.15 23:27:57.450 +0200 [IMAP.2652] Server is Dovecot
2018.09.15 23:27:57.450 +0200 [NETWRK.2652] Semaphore release for
[XXXXXX.XXX:143, tlsStrict, login = 0, pass = true, cert = false]
2018.09.15 23:27:57.451 +0200 [IMAP.2652] Sending: kman1 CAPABILITY
2018.09.15 23:27:57.455 +0200 [IMAP_RAW.2652] Data is <171>:
* CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE LITERAL+ STARTTLS
LOGINDISABLED
kman1 OK Pre-login capabilities listed, post-login capabilities have more.
2018.09.15 23:27:57.455 +0200 [IMAP_RAW.2652] Line: * CAPABILITY IMAP4rev1
SASL-IR LOGIN-REFERRALS ID ENABLE IDLE LITERAL+ STARTTLS LOGINDISABLED
2018.09.15 23:27:57.456 +0200 [IMAP.2652] Pre-login capabilities:
CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE LITERAL+ STARTTLS
LOGINDISABLED
2018.09.15 23:27:57.456 +0200 [IMAP_RAW.2652] Line: kman1 OK Pre-login
capabilities listed, post-login capabilities have more.
2018.09.15 23:27:57.456 +0200 [IMAP.2652] Result for kman1: 0 Pre-login
capabilities listed, post-login capabilities have more., traffic: 171 read, 18
write
2018.09.15 23:27:57.456 +0200 [IMAP.2652] Sending: kman2 STARTTLS
2018.09.15 23:27:57.459 +0200 [IMAP_RAW.2652] Data is <37>:
kman2 OK Begin TLS negotiation now.
2018.09.15 23:27:57.460 +0200 [IMAP_RAW.2652] Line: kman2 OK Begin TLS
negotiation now.
2018.09.15 23:27:57.460 +0200 [IMAP.2652] Result for kman2: 0 Begin TLS
negotiation now., traffic: 37 read, 16 write
2018.09.15 23:27:57.475 +0200 [NETWRK.2652] Request for startTls
content://org.kman.AquaMail.data/accounts/2/in to [XXXXXX.XXX:143, tlsStrict,
login = 0, pass = true, cert = false]
2018.09.15 23:27:57.475 +0200 [NETWRK.2652] Semaphore acquire for
[XXXXXX.XXX:143, tlsStrict, login = 0, pass = true, cert = false]
2018.09.15 23:27:57.475 +0200 [NETWRK.2652] Reconnecting to
[XXXXXX.XXX:143, tlsStrict, login = 0, pass = true, cert = false]
2018.09.15 23:27:57.476 +0200 [NETWRK.2652] Using strict SSL/STARTTLS
factory
2018.09.15 23:27:57.476 +0200 SSLHardening Setting SSL ciphers:
[TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384,
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_256_GCM_SHA384,
TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384,
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384,
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA256,
TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA256,
TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256,
TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256,
TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_RC4_128_SHA,
TLS_ECDHE_ECDSA_WITH_RC4_128_SHA, TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA,
TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA, TLS_PSK_WITH_AES_256_CBC_SHA,
TLS_PSK_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_RC4_128_SHA,
TLS_PSK_WITH_RC4_128_SHA, SSL_RSA_WITH_RC4_128_MD5,
SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV,
TLS_FALLBACK_SCSV]
2018.09.15 23:27:57.476 +0200 SSLHardening Setting SSL protocols:
[TLSv1.2, TLSv1.1, TLSv1]
2018.09.15 23:27:57.490 +0200 [NETWRK.2652] Closing socket SSL socket over
Socket[unconnected]
2018.09.15 23:27:57.490 +0200 [NETWRK.2652] Semaphore release for
[XXXXXX.XXX:143, tlsStrict, login = 0, pass = true, cert = false]
2018.09.15 23:27:57.494 +0200 [NETWRK.2652] ***** ERROR: Unable to
reconnect to [XXXXXX.XXX:143, tlsStrict, login = 0, pass = true, cert = false]
javax.net.ssl.SSLHandshakeException: Connection closed by peer
at com.android.org.conscrypt.NativeCrypto.SSL_do_handshake(Native
Method)
at
com.android.org.conscrypt.OpenSSLSocketImpl.startHandshake(OpenSSLSocketImpl.java:324)
at
com.android.org.conscrypt.OpenSSLSocketImpl.waitForHandshake(OpenSSLSocketImpl.java:629)
at
com.android.org.conscrypt.OpenSSLSocketImpl.getInputStream(OpenSSLSocketImpl.java:591)
at org.kman.AquaMail.net.h.a(SourceFile:301)
at org.kman.AquaMail.net.e.a(SourceFile:364)
at org.kman.AquaMail.mail.imap.ImapTask.a(SourceFile:57)
at org.kman.AquaMail.mail.imap.ImapTask_ConnectLogin.ac(SourceFile:106)
at org.kman.AquaMail.mail.imap.ImapTask_Sync.a(SourceFile:123)
at org.kman.AquaMail.core.k.a(SourceFile:77)
at org.kman.AquaMail.core.l$b.run(SourceFile:621)
at java.lang.Thread.run(Thread.java:818)
Last data:
kman2 STARTTLS
Result for kman2: 0 Begin TLS negotiation now.
Thread: Thread[Executor_Network#0,5,main], id: 2652
2018.09.15 23:27:57.495 +0200 [POWER.2652] >>>>> Releasing wake lock for
MailConnectionManager
2018.09.15 23:27:57.500 +0200 [POWER.2652] Released wake lock flag
0x01000000, result 0x04000000
2018.09.15 23:27:57.501 +0200 MailStateWatcher Service state change
uri: content://org.kman.AquaMail.data/accounts/2, what: 121, aux = 0xffffffff
2018.09.15 23:27:57.527 +0200 KeepAliveService Facade: stop
2018.09.15 23:27:57.527 +0200 MailStateWatcher Removed default
notificaiton
2018.09.15 23:27:57.528 +0200 MailStateWatcher Showing account error
notification, acct x...@xxxxxx.xxx, id 0x1000002, message Trvalé síťové chyby
příchozího serveru
2018.09.15 23:27:57.542 +0200 KeepAliveService
gNotificationManager.cancel
2018.09.15 23:27:57.550 +0200 KeepAliveService onDestroy
2018.09.15 23:27:57.613 +0200 [TASKS.2652] ***** ERROR: IOException caught
in processTask for [org.kman.AquaMail.mail.imap.ImapTask_Sync@4988403, u =
content://org.kman.AquaMail.data/accounts/2, t = 86965199, a =
[org.kman.AquaMail.mail.MailAccount@1206fe7: id = 2, username = XXXXXXX, email
= x...@xxxxxx.xxx, name = x...@xxxxxx.xxx]]
javax.net.ssl.SSLHandshakeException: Connection closed by peer
at com.android.org.conscrypt.NativeCrypto.SSL_do_handshake(Native
Method)
at
com.android.org.conscrypt.OpenSSLSocketImpl.startHandshake(OpenSSLSocketImpl.java:324)
at
com.android.org.conscrypt.OpenSSLSocketImpl.waitForHandshake(OpenSSLSocketImpl.java:629)
at
com.android.org.conscrypt.OpenSSLSocketImpl.getInputStream(OpenSSLSocketImpl.java:591)
at org.kman.AquaMail.net.h.a(SourceFile:301)
at org.kman.AquaMail.net.e.a(SourceFile:364)
at org.kman.AquaMail.mail.imap.ImapTask.a(SourceFile:57)
at org.kman.AquaMail.mail.imap.ImapTask_ConnectLogin.ac(SourceFile:106)
at org.kman.AquaMail.mail.imap.ImapTask_Sync.a(SourceFile:123)
at org.kman.AquaMail.core.k.a(SourceFile:77)
at org.kman.AquaMail.core.l$b.run(SourceFile:621)
at java.lang.Thread.run(Thread.java:818)
Last data:
kman2 STARTTLS
Result for kman2: 0 Begin TLS negotiation now.
Thread: Thread[Executor_Network#0,5,main], id: 2652
2018.09.15 23:27:57.613 +0200 [NETWRK.2652] Aborting the connection
[content://org.kman.AquaMail.data/accounts/2/in, not conn]