On Fri, Jun 06, 2025 at 09:37:27AM +0200, Cyborg via Exim-users wrote:

> Exim returns:
> 
> TLS session: (SSL_connect): error:0A00018A:SSL routines::dh key too small
> 
> when connecting with s_client to that server, a wired connection is
> established:

Which specific server?

> New, TLSv1.2, Cipher is AES256-GCM-SHA384
> Server public key is 2048 bit
> Secure Renegotiation IS supported
> Compression: NONE
> Expansion: NONE

Did you actually connect to the same TCP endpoint (IP and port)?

> TLS 1.3 Cipher, but TLS 1.2 protocol => should not even work, but it does in
> s_client.

Actually, that's a TLS 1.2 cipher:

    $ openssl ciphers -s -tls1_2 -v AES256-GCM-SHA384
    AES256-GCM-SHA384              TLSv1.2 Kx=RSA      Au=RSA   Enc=AESGCM(256) 
           Mac=AEAD

that uses deprecated RSA key exchange, instead of DHE or ECDHE.  It is
not clear how you ended up negotiating this cipher, because the default
preference order has it well below the usual PFS (DHE/ECDHE) ciphers:

    $ openssl ciphers -s -tls1_2 -v DEFAULT
    ECDHE-ECDSA-AES256-GCM-SHA384  TLSv1.2 Kx=ECDH     Au=ECDSA Enc=AESGCM(256) 
           Mac=AEAD
    ECDHE-RSA-AES256-GCM-SHA384    TLSv1.2 Kx=ECDH     Au=RSA   Enc=AESGCM(256) 
           Mac=AEAD
    DHE-RSA-AES256-GCM-SHA384      TLSv1.2 Kx=DH       Au=RSA   Enc=AESGCM(256) 
           Mac=AEAD
    ECDHE-ECDSA-CHACHA20-POLY1305  TLSv1.2 Kx=ECDH     Au=ECDSA 
Enc=CHACHA20/POLY1305(256) Mac=AEAD
    ECDHE-RSA-CHACHA20-POLY1305    TLSv1.2 Kx=ECDH     Au=RSA   
Enc=CHACHA20/POLY1305(256) Mac=AEAD
    DHE-RSA-CHACHA20-POLY1305      TLSv1.2 Kx=DH       Au=RSA   
Enc=CHACHA20/POLY1305(256) Mac=AEAD
    ECDHE-ECDSA-AES128-GCM-SHA256  TLSv1.2 Kx=ECDH     Au=ECDSA Enc=AESGCM(128) 
           Mac=AEAD
    ECDHE-RSA-AES128-GCM-SHA256    TLSv1.2 Kx=ECDH     Au=RSA   Enc=AESGCM(128) 
           Mac=AEAD
    DHE-RSA-AES128-GCM-SHA256      TLSv1.2 Kx=DH       Au=RSA   Enc=AESGCM(128) 
           Mac=AEAD
    ECDHE-ECDSA-AES256-SHA384      TLSv1.2 Kx=ECDH     Au=ECDSA Enc=AES(256)    
           Mac=SHA384
    ECDHE-RSA-AES256-SHA384        TLSv1.2 Kx=ECDH     Au=RSA   Enc=AES(256)    
           Mac=SHA384
    DHE-RSA-AES256-SHA256          TLSv1.2 Kx=DH       Au=RSA   Enc=AES(256)    
           Mac=SHA256
    ECDHE-ECDSA-AES128-SHA256      TLSv1.2 Kx=ECDH     Au=ECDSA Enc=AES(128)    
           Mac=SHA256
    ECDHE-RSA-AES128-SHA256        TLSv1.2 Kx=ECDH     Au=RSA   Enc=AES(128)    
           Mac=SHA256
    DHE-RSA-AES128-SHA256          TLSv1.2 Kx=DH       Au=RSA   Enc=AES(128)    
           Mac=SHA256
    ECDHE-ECDSA-AES256-SHA         TLSv1   Kx=ECDH     Au=ECDSA Enc=AES(256)    
           Mac=SHA1
    ECDHE-RSA-AES256-SHA           TLSv1   Kx=ECDH     Au=RSA   Enc=AES(256)    
           Mac=SHA1
    DHE-RSA-AES256-SHA             SSLv3   Kx=DH       Au=RSA   Enc=AES(256)    
           Mac=SHA1
    ECDHE-ECDSA-AES128-SHA         TLSv1   Kx=ECDH     Au=ECDSA Enc=AES(128)    
           Mac=SHA1
    ECDHE-RSA-AES128-SHA           TLSv1   Kx=ECDH     Au=RSA   Enc=AES(128)    
           Mac=SHA1
    DHE-RSA-AES128-SHA             SSLv3   Kx=DH       Au=RSA   Enc=AES(128)    
           Mac=SHA1
    AES256-GCM-SHA384              TLSv1.2 Kx=RSA      Au=RSA   Enc=AESGCM(256) 
           Mac=AEAD
    AES128-GCM-SHA256              TLSv1.2 Kx=RSA      Au=RSA   Enc=AESGCM(128) 
           Mac=AEAD
    AES256-SHA256                  TLSv1.2 Kx=RSA      Au=RSA   Enc=AES(256)    
           Mac=SHA256
    AES128-SHA256                  TLSv1.2 Kx=RSA      Au=RSA   Enc=AES(128)    
           Mac=SHA256
    AES256-SHA                     SSLv3   Kx=RSA      Au=RSA   Enc=AES(256)    
           Mac=SHA1
    AES128-SHA                     SSLv3   Kx=RSA      Au=RSA   Enc=AES(128)    
           Mac=SHA1

Given the server's DHE group is seen too weak by Exim, one can surmise
the server supports DHE ciphers, and I'd expect s_client to also
negotiate a DHE cipher rather than one based on RSA key exchange.
Without the server name posted, it is difficult to say more.


> Which settings are given to openssl by exim, that the connection does not
> accept the tls 1.3 cipher in the tls 1.2 protocol?

This is not a TLS 1.3 cipher.

-- 
    Viktor.

-- 
## subscription configuration (requires account):
##   https://lists.exim.org/mailman3/postorius/lists/exim-users.lists.exim.org/
## unsubscribe (doesn't require an account):
##   exim-users-unsubscr...@lists.exim.org
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/

Reply via email to