Thanks Matthias, great point. I was sure that should've fixed the problem
as it should indeed be SHA256. For some weird reason I still can't connect
with TLS1.3 though. Some additional information while trying to connect
from localhost with smtpd_log_level=2:

# cat /var/log/maillog
Jan 22 16:13:11 ares postfix/smtpd[24282]: initializing the server-side TLS
engine
Jan 22 16:13:11 ares postfix/smtpd[24282]: connect from localhost[::1]
Jan 22 16:13:11 ares postfix/smtpd[24282]: setting up TLS connection from
localhost[::1]
Jan 22 16:13:11 ares postfix/smtpd[24282]: localhost[::1]: TLS cipher list
"TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:DHE-RSA-CHACHA20-POLY1305"
Jan 22 16:13:11 ares postfix/smtpd[24282]: SSL_accept:before SSL
initialization
Jan 22 16:13:11 ares postfix/smtpd[24282]: SSL_accept:before SSL
initialization
Jan 22 16:13:11 ares postfix/smtpd[24282]: SSL3 alert write:fatal:protocol
version
Jan 22 16:13:11 ares postfix/smtpd[24282]: SSL_accept:error in error
Jan 22 16:13:11 ares postfix/smtpd[24282]: SSL_accept error from
localhost[::1]: -1
Jan 22 16:13:11 ares postfix/smtpd[24282]: warning: TLS library problem:
error:14209102:SSL routines:tls_early_post_process_client_hello:unsupported
protocol:ssl/statem/statem_srvr.c:1686:
Jan 22 16:13:11 ares postfix/smtpd[24282]: lost connection after STARTTLS
from localhost[::1]
Jan 22 16:13:11 ares postfix/smtpd[24282]: disconnect from localhost[::1]
ehlo=1 starttls=0/1 commands=1/2

Same happens for STARTTLS over port 587:
# openssl s_client -starttls smtp -crlf -tls1_3 -connect localhost:587
CONNECTED(00000003)
139770914207552:error:1409442E:SSL routines:ssl3_read_bytes:tlsv1 alert
protocol version:ssl/record/rec_layer_s3.c:1544:SSL alert number 70

Kind regards,
Taco de Wolff


On Mon, Jan 22, 2024 at 11:54 AM Matthias Schneider <
matthias.schnei...@rmail.de> wrote:

> Hi,
>
> i think this has something todo with smtpd_tls_fingerprint_digest:
>
> smtpd_tls_fingerprint_digest = ${{$compatibility_level} <level {3.6} ?
> {md5} : {sha256}}
>
> since you have 3.5 its using md5, try to set this value to sha256
>
> best regards
> Matthias
>
> ------------------------------
> *Von: *"Taco de Wolff via Postfix-users" <postfix-users@postfix.org>
> *An: *"postfix-users" <postfix-users@postfix.org>
> *Gesendet: *Montag, 22. Januar 2024 15:44:40
> *Betreff: *[pfx] Enabling TLS1.3 and allow sending over SMTPS/465
>
> Hi,
>
> Two questions really, one is that I can't enable TLS1.3 whatever I try.
> Running CentOS8 with OpenSSL v1.1.1k-FIPS and Postfix v3.5.8, I confirm
> that TLS1.3 ciphers are available:
>
> # openssl version
> OpenSSL 1.1.1k  FIPS 25 Mar 2021
>
> # postconf -T compile-version
> OpenSSL 1.1.1k  FIPS 25 Mar 2021
>
> # postconf -T run-version
> OpenSSL 1.1.1k  FIPS 25 Mar 2021
>
> # openssl ciphers -v
> TLS_AES_256_GCM_SHA384  TLSv1.3 Kx=any      Au=any  Enc=AESGCM(256)
> Mac=AEAD
> TLS_AES_128_GCM_SHA256  TLSv1.3 Kx=any      Au=any  Enc=AESGCM(128)
> Mac=AEAD
> etc.
>
> Relevant configuration for port 465 (implicit TLS):
> # postconf
> smtpd_tls_cert_file = /path/to/crt
> smtpd_tls_ciphers = medium
> smtpd_tls_exclude_ciphers =
> smtpd_tls_key_file = /path/to/key
> smtpd_tls_mandatory_ciphers = medium
> smtpd_tls_mandatory_exclude_ciphers =
> smtpd_tls_mandatory_protocols = !SSLv2, !SSLv3, !TLSv1, !TLSv1.1
> smtpd_tls_protocols = !SSLv2, !SSLv3, !TLSv1, !TLSv1.1
> tls_medium_cipherlist =
> TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:DHE-RSA-CHACHA20-POLY1305
> smtpd_tls_security_level = encrypt
> smtpd_tls_wrappermode = yes
>
> Trying to connect using TLS1.3 on a client that supports both TLS1.3
> ciphersuites, I get:
> $ openssl s_client -connect server.hostname:465 -tls1_3
> Connecting to [IPADDRESS]
> CONNECTED(00000003)
> 40879BE5F97F0000:error:0A00042E:SSL routines:ssl3_read_bytes:tlsv1 alert
> protocol version:ssl/record/rec_layer_s3.c:861:SSL alert number 70
>
> Has this something to do with FIPS mode? I don't think so because the
> ciphers show up in OpenSSL. Why is TLS1.3 not getting enabled?
>
>
> Second question came up while fixing a blocked outbound port 25 with my
> ISP. I've noticed that mail gets sent to DANE enabled servers, I suppose
> because it uses port 587 using STARTTLS. I wonder if postfix allows sending
> mail over the recommended implicit TLS port 465 between mail servers? The
> documentation isn't very clear on the distinction between (implicit) TLS
> and STARTTLS, but setting smtp_tls_wrappermode=yes would force using
> implicit TLS (right?), while I want to use opportunistic implicit TLS (with
> fallback to STARTTLS, it's better than nothing) which can be enforced by
> DANE enabled servers.
>
> Kind regards,
> Taco de Wolff
>
> _______________________________________________
> Postfix-users mailing list -- postfix-users@postfix.org
> To unsubscribe send an email to postfix-users-le...@postfix.org
>
_______________________________________________
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org

Reply via email to