* Viktor Dukhovni <postfix-users@postfix.org>: > Does this happen consistently, or intermittently?
consistently > Can you reproduce this with: > > openssl s_client \ > -cipher $(postconf -xh tls_export_cipher_list) \ > -sslv2 \ > -starttls smtp -connect mail.vex.net:25 # openssl s_client \ -cipher $(postconf -xh tls_export_cipher_list) \ -sslv2 \ -starttls smtp -connect mail.vex.net:25 postconf: warning: tls_export_cipher_list: unknown parameter error setting cipher list 8599:error:1410D0B9:SSL routines:SSL_CTX_set_cipher_list:no cipher match:ssl_lib.c:1218: > Can you report the output of "openssl version -a"? # openssl version -a OpenSSL 0.9.8o 01 Jun 2010 built on: Mon Feb 11 21:27:58 UTC 2013 platform: debian-i386-i686/cmov options: bn(64,32) md2(int) rc4(idx,int) des(ptr,risc1,16,long) blowfish(idx) compiler: gcc -fPIC -DOPENSSL_PIC -DZLIB -DOPENSSL_THREADS -D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -DL_ENDIAN -DTERMIO -O3 -march=i686 -Wa,--noexecstack -g -Wall -DOPENSSL_BN_ASM_PART_WORDS -DOPENSSL_IA32_SSE2 -DSHA1_ASM -DMD5_ASM -DRMD160_ASM -DAES_ASM OPENSSLDIR: "/usr/lib/ssl" > And any non-default postconf settings that tweak SSL protocol or cipher > selection. root@albatross:~# postconf -n |grep ssl smtpd_tls_CAfile = /etc/ssl/certs/ca-certificates.crt smtpd_tls_cert_file = /etc/ssl/certs/mail.python.org.pem smtpd_tls_key_file = /etc/ssl/private/mail.python.org.key.pem root@albatross:~# postconf -n |grep tls smtp_tls_loglevel = 1 smtp_tls_policy_maps = cdb:/etc/postfix/tls-policy smtp_tls_security_level = may smtp_tls_session_cache_database = btree:/var/lib/postfix/smtp_tls_sessions smtpd_sasl_tls_security_options = noanonymous smtpd_tls_CAfile = /etc/ssl/certs/ca-certificates.crt smtpd_tls_ask_ccert = no smtpd_tls_cert_file = /etc/ssl/certs/mail.python.org.pem smtpd_tls_dh1024_param_file = /etc/postfix/dh_1024.pem smtpd_tls_dh512_param_file = /etc/postfix/dh_512.pem smtpd_tls_key_file = /etc/ssl/private/mail.python.org.key.pem smtpd_tls_loglevel = 1 smtpd_tls_received_header = yes smtpd_tls_security_level = may smtpd_tls_session_cache_database = btree:/var/lib/postfix/smtpd_tls_sessions > If you capture a full packet dump and apply wireshark, it may shed > light on the handshake details. The client thinks the TLS finished > message has the wrong length, this feels like a problematic > interaction with TLSv1.2, but you're running 1.0.0x I think, which > has no TLSv1.2 support... > > -- > Viktor. -- [*] sys4 AG http://sys4.de, +49 (89) 30 90 46 64 Franziskanerstraße 15, 81669 München Sitz der Gesellschaft: München, Amtsgericht München: HRB 199263 Vorstand: Patrick Ben Koetter, Axel von der Ohe, Marc Schiffbauer Aufsichtsratsvorsitzender: Florian Kirstein