> You may want to use this tool on your mail server(so it picks up the
> same openssl version) to check what cyphers the mil server accepts:
> https://testssl.sh/



I'm not sure how this would help. The problem occurs with them trying to
send mail to us. I know what ciphers we offer, what I don't know is what
they don't like about our cipher list. Sure I can use this script to
connect back to them to see what they're incoming servers accept, but we
don't have a problem with that, it's only when they connect to us that
they bail out with the "Certificate rejected over TLS" error.


Also based on what I've heard from others, they're quite happy to
connect to other servers with a secure TLSv1.2 cipher, one that we
actually offer. So why are they failing to use that cipher when
connecting to us? The client gets to choose, so the only thing I can
think of is they're trying to connect with a weaker cipher first, seeing
we accept, and then aborting any attempt to send us email at all. Sounds
very strange.


Hmmm, "Certificate rejected"... that doesn't sound like a cipher error
either does it. Of course, you never can be sure with error messages,
though I wonder if they just don't like wildcard certificates or
something like that?


More likely, there's some subtle protocol level incompatibility going on
somewhere that's going to be painful to debug.


Rob Mueller

r...@fastmail.fm


_______________________________________________
mailop mailing list
mailop@mailop.org
https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop

Reply via email to