Hi All, Issue: There is one host to whom I can't send mail from either of my relays (both OpenBSD 5.3, sendmail). It always fails the TLS handshake. If I attempt to debug it by hand by running:
openssl s_client -starttls smtp -connect mail.dean.edu:25 ...from any of my OpenBSD 5.3 hosts, I get the same response: CONNECTED(00000003) 12556912661392:error:140790E5:SSL routines:SSL23_WRITE:ssl handshake failure:/usr/src/lib/libssl/ssl/../src/ssl/s23_lib.c:177: --- no peer certificate available --- No client certificate CA names sent --- SSL handshake has read 338 bytes and written 326 bytes --- New, (NONE), Cipher is (NONE) Secure Renegotiation IS NOT supported Compression: NONE Expansion: NONE --- ...but from any of my other hosts (mixed bag of Linuxes): CONNECTED(00000003) depth=1 C = US, ST = California, L = Sunnyvale, O = Fortinet, OU = Certificate Authority, CN = FortiGate CA, emailAddress = supp...@fortinet.com verify error:num=19:self signed certificate in certificate chain verify return:0 --- Certificate chain 0 s:/C=US/ST=Massachusetts/L=Franklin/O=Dean College/CN=webmail.dean.edu i:/C=US/ST=California/L=Sunnyvale/O=Fortinet/OU=Certificate Authority/CN=FortiGate CA/emailAddress=supp...@fortinet.com 1 s:/C=US/ST=California/L=Sunnyvale/O=Fortinet/OU=Certificate Authority/CN=FortiGate CA/emailAddress=supp...@fortinet.com i:/C=US/ST=California/L=Sunnyvale/O=Fortinet/OU=Certificate Authority/CN=FortiGate CA/emailAddress=supp...@fortinet.com --- Server certificate -----BEGIN CERTIFICATE----- MIIDjDCCAnSgAwIBAgISESHvr+edbC0VkIDSTvgg5q0iMA0GCSqGSIb3DQEBBQUA MIGlMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTESMBAGA1UEBxMJ U3Vubnl2YWxlMREwDwYDVQQKEwhGb3J0aW5ldDEeMBwGA1UECxMVQ2VydGlmaWNh dGUgQXV0aG9yaXR5MRUwEwYDVQQDEwxGb3J0aUdhdGUgQ0ExIzAhBgkqhkiG9w0B CQEWFHN1cHBvcnRAZm9ydGluZXQuY29tMB4XDTEzMDYxOTE4MzAwMloXDTE0MDgw MzA0NTk1OFowajELMAkGA1UEBhMCVVMxFjAUBgNVBAgTDU1hc3NhY2h1c2V0dHMx ETAPBgNVBAcTCEZyYW5rbGluMRUwEwYDVQQKEwxEZWFuIENvbGxlZ2UxGTAXBgNV BAMMEHdlYm1haWwuZGVhbi5lZHUwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGB AMTP/1vE9zK2TUqxnoaZsDaee0f6zxC2jRwXdWDr2Pz6GQJqAbasRPSF7KEdGzyp tlSkidT4Y+9HbT2WeggrMZ6QVV4MtfsFvWMcHT6VXEqSaTcaHzBraZubxQVsGTGk IdZHMV6YTM2NOPGAPh8GAqM4oJNrxw/yEYKN1IjptclZAgMBAAGjdDByMHAGA1Ud EQRpMGeCEHdlYm1haWwuZGVhbi5lZHWCFWF1dG9kaXNjb3Zlci5kZWFuLmVkdYIN bWFpbC5kZWFuLmVkdYIMb3dhLmRlYW4uZWR1ghJmb3J0aW1haWwuZGVhbi5lZHWC C2NsaWVudGFycmF5MA0GCSqGSIb3DQEBBQUAA4IBAQB3ctDaDjtMC+k9ULdwpvu6 llkZdLJtjL9jX8qKFFaELA04tEqeSVp39Rmn/Sc4eeBG0pIAtknoH7MMmilodpb0 OVmwk7vcdZvTyE+fcvre8QL7tFQsP2p52YcNad04n3dppgQj1fIR0C9JckLFydRQ 2+Y6SFfMxC85us2I2b+lL8C5XGMjB9imuGRjVcBPdCfh7KVppDys8ODkC7DeouJ9 rXreZMWHZTzGaRQqa5PH71pu5n9vTXP9qx3Dydy50e3REYch3uKwFBFW++UYkzC4 qMudRtn00ZsBlR271OsonpcY4a/Sb3JUbLLKW7/AmgiTJdjxUXL2WJR6FSEd1zTm -----END CERTIFICATE----- subject=/C=US/ST=Massachusetts/L=Franklin/O=Dean College/CN=webmail.dean.edu issuer=/C=US/ST=California/L=Sunnyvale/O=Fortinet/OU=Certificate Authority/CN=FortiGate CA/emailAddress=supp...@fortinet.com --- No client certificate CA names sent --- SSL handshake has read 2391 bytes and written 346 bytes --- New, TLSv1/SSLv3, Cipher is AES128-SHA Server public key is 1024 bit Secure Renegotiation IS NOT supported Compression: NONE Expansion: NONE SSL-Session: Protocol : TLSv1 Cipher : AES128-SHA Session-ID: C09FDBD50BB8E16824D92467006595AD44D0F8D69BF8E42D6B1796E0D30D9702 Session-ID-ctx: Master-Key: 9E637C513FF9612B01B745C6157378B76620676E24E6B2C9CEE728E55AA88936C5D166A16DD17772F0DB5CA2866A569E Key-Arg : None Krb5 Principal: None PSK identity: None PSK identity hint: None Start Time: 1379014880 Timeout : 300 (sec) Verify return code: 19 (self signed certificate in certificate chain) --- 250 HELP TLS from my OpenBSD relays works fine to any other host. For instance, picking another at random: CONNECTED(00000003) depth=2 C = SE, O = AddTrust AB, OU = AddTrust External TTP Network, CN = AddTrust External CA Root verify error:num=19:self signed certificate in certificate chain verify return:0 --- Certificate chain 0 s:/C=US/postalCode=97006/ST=OR/L=BEAVERTON/street=SUITE 100/street=20460 NW VON NEUMANN DRIVE/O=McAfee Inc./OU=Engineering/OU=Hosted by McAfee Inc./OU=PlatinumSSL Wildcard/CN=*.mxlogic.net i:/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO High-Assurance Secure Server CA 1 s:/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO High-Assurance Secure Server CA i:/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA Root 2 s:/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA Root i:/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA Root --- Server certificate -----BEGIN CERTIFICATE----- MIIF0zCCBLugAwIBAgIRAK0HXpo1cqJtwPtUcMZnzM0wDQYJKoZIhvcNAQEFBQAw gYkxCzAJBgNVBAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAO BgNVBAcTB1NhbGZvcmQxGjAYBgNVBAoTEUNPTU9ETyBDQSBMaW1pdGVkMS8wLQYD VQQDEyZDT01PRE8gSGlnaC1Bc3N1cmFuY2UgU2VjdXJlIFNlcnZlciBDQTAeFw0x MzAzMTMwMDAwMDBaFw0xNDAzMTMyMzU5NTlaMIH6MQswCQYDVQQGEwJVUzEOMAwG A1UEERMFOTcwMDYxCzAJBgNVBAgTAk9SMRIwEAYDVQQHEwlCRUFWRVJUT04xEjAQ BgNVBAkTCVNVSVRFIDEwMDEjMCEGA1UECRMaMjA0NjAgTlcgVk9OIE5FVU1BTk4g RFJJVkUxFDASBgNVBAoTC01jQWZlZSBJbmMuMRQwEgYDVQQLEwtFbmdpbmVlcmlu ZzEeMBwGA1UECxMVSG9zdGVkIGJ5IE1jQWZlZSBJbmMuMR0wGwYDVQQLExRQbGF0 aW51bVNTTCBXaWxkY2FyZDEWMBQGA1UEAxQNKi5teGxvZ2ljLm5ldDCCASIwDQYJ KoZIhvcNAQEBBQADggEPADCCAQoCggEBAKtvQh1N+N0oFYmCeMklSZn2ATDy4+du L1VKPlWnX/sIoS32GrfUcBS47dARmopzgQBgbMJwCVDJcijZlKZQz/pWP2Asqqdy 4zpfwPAURA7gI/kXydVBHMUUHV9JHa+1uyLHS4pbT4l58y2j77paLL7vTlhlCuAH 7r5gnTziZD3pVqRjxOTTCaAFcraLH6Zo82mypk43CHWT80iBp3+oYMTZDjHkb7BI xqPdGmFHgfDXRiET26sCPEcUqnk+3PyUM/5ApiyyTW50/pI6nqersg+S07sUR6C7 Vpvr51vYwJQv/gB6T6ot2OEKG1xCkFo153jPm51Ezh0YyilKjfxe16ECAwEAAaOC AcEwggG9MB8GA1UdIwQYMBaAFD/VtdDWRHlQShejm4xK3LiwImRrMB0GA1UdDgQW BBQOC+cfq6GG+6JIjVYXQveIG/SzXzAOBgNVHQ8BAf8EBAMCBaAwDAYDVR0TAQH/ BAIwADAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwUAYDVR0gBEkwRzA7 BgwrBgEEAbIxAQIBAwQwKzApBggrBgEFBQcCARYdaHR0cHM6Ly9zZWN1cmUuY29t b2RvLmNvbS9DUFMwCAYGZ4EMAQICME8GA1UdHwRIMEYwRKBCoECGPmh0dHA6Ly9j cmwuY29tb2RvY2EuY29tL0NPTU9ET0hpZ2gtQXNzdXJhbmNlU2VjdXJlU2VydmVy Q0EuY3JsMIGABggrBgEFBQcBAQR0MHIwSgYIKwYBBQUHMAKGPmh0dHA6Ly9jcnQu Y29tb2RvY2EuY29tL0NPTU9ET0hpZ2gtQXNzdXJhbmNlU2VjdXJlU2VydmVyQ0Eu Y3J0MCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5jb21vZG9jYS5jb20wGAYDVR0R BBEwD4INKi5teGxvZ2ljLm5ldDANBgkqhkiG9w0BAQUFAAOCAQEAhkJCWVNkdCD8 wH9hgJvOpjUWNTuDqKG+2Yh5Uz9KjOQeFdEZX/Alo/n30bgTbv5g5gzlK2BGUCKV L7B8JFq3vFHvIePo3hr1xcXpR3aKLF+3eDmGFDztBKyqU8DQYBmbNxZzWFvYA9ke ifX5mdWXFV2f6NJw2aGhu4ordoitLH+RtA2k75Q7TrHfIo56KjFuP20sWaRUGZ5Z uyF3yB/VIzptJJEop7oKDeKqUDmhNrXT4v/S9GODMPu8MXbrjHvVsGgnL63Um5Yz G2WJizEbmD0MOPUVbURa7pDX5KDGdXKkluskgPadTHDO32FnQN1wYxThsDEKJ2j9 BzeA92BWfQ== -----END CERTIFICATE----- subject=/C=US/postalCode=97006/ST=OR/L=BEAVERTON/street=SUITE 100/street=20460 NW VON NEUMANN DRIVE/O=McAfee Inc./OU=Engineering/OU=Hosted by McAfee Inc./OU=PlatinumSSL Wildcard/CN=*. mxlogic.net issuer=/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO High-Assurance Secure Server CA --- Acceptable client certificate CA names /C=US/O=RSA Data Security, Inc./OU=Secure Server Certification Authority --- SSL handshake has read 4412 bytes and written 664 bytes --- New, TLSv1/SSLv3, Cipher is AES256-SHA Server public key is 2048 bit Secure Renegotiation IS supported Compression: NONE Expansion: NONE SSL-Session: Protocol : TLSv1 Cipher : AES256-SHA Session-ID: 8AB594067EB15A6DF6A5D74E84E57AB8310B57A1F411E3AF9EB0084790CA6C13 Session-ID-ctx: Master-Key: 3DC8AA2C04E6106648E4950ECF850CF58687C8F3690A43DD0D8BCE57FC09C0059B9E857CA25905753232E23F277CA564 Key-Arg : None PSK identity: None PSK identity hint: None Start Time: 1379014966 Timeout : 300 (sec) Verify return code: 19 (self signed certificate in certificate chain) --- 250 PIPELINING I'm perplexed. Does anyone have any ideas? Thanks, -John