> 2024-11-08T16:14:09.034570+01:00 mail postfix/submissions/smtpd[107564]: 
> connect from unknown[192.168.1.1]
> 2024-11-08T16:14:09.040936+01:00 mail postfix/submissions/smtpd[107564]: 
> SSL_accept error from unknown[192.168.1.1]: -1
> 2024-11-08T16:14:09.042051+01:00 mail postfix/submissions/smtpd[107564]: 
> warning: TLS library problem: error:0A0000C1:SSL routines::no shared 
> cipher:../ssl/statem/statem_srvr.c:2220:
> 2024-11-08T16:14:09.043133+01:00 mail postfix/submissions/smtpd[107564]: lost 
> connection after CONNECT from unknown[192.168.1.1]
> 2024-11-08T16:14:09.043723+01:00 mail postfix/submissions/smtpd[107564]: 
> disconnect from unknown[192.168.1.1] commands=0/0
> 
> Can anyone tell me what this means?
> 

You were talking about a scanner in your original mail.

It's possible that its firmware (ssl library) is too old to know
about modern ciphers and it might take some effort to get postfix
to accept those. RedHat has already disabled SHA1 for example
(you would need to enable a legacy policy for that) and other
distributions might have made compile time changes.

In case your scanner is local to your postfix network, enryption
might not be mandatory. You could add another submission service
to master.cf and bind it to a separate local ip where you don't
enforce tls for submission with sasl.

Another option is to redesign a part of your network and connect
scanner and postfix via routable ips (no NAT). That way you
don't need sasl and can accept the scanner's ip for relay.
This approach requires an additional firewall though in order
to replace the basic protection that NAT provides.

Moreover those devices can be security risks due to lacking
software updates. It is a good idea to limit the amount of mails
they can send and monitor the log for anomalies.

Best regards,
Gerald

_______________________________________________
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org

Reply via email to