* Viktor Dukhovni <postfix-us...@dukhovni.org> [2013-08-20 16:51]:
> > I found the problem... In addition to my normal certificate, I had an
> > EC certificate.
> > 
> > smtpd_tls_eccert_file=/etc/postfix/certs/cacert-karotte-ec.crt
> 
> Though I think OpenSSL will generally detect attempts to configure
> a public key (certificate) without a matching private key, you
> should check that the private key and certificate match:

Hi,

yes I checked and they are matching.

> If you're willing to test briefly with the EC certificate re-enabled,
> it would be helpful to capture a full packet capture tcpdump (aka
> pcap) file with a failed delivery from gmx.de/web.de.  Viewing this
> with "wireshark" will show exactly where in the handshake the problem
> ocurred and may shed some light on the reason.

I just did, here is the PCAP:

http://www.karotte.org/smtp-gmx.pcap

> There are no known practical attacks on 256-bit EC keys and 384-bit
> EC is slower.  AES-128 with EC-256 is sufficiently secure for SMTP
> TLS.  Though I expect that if the sender has trouble with 384-bit
> EC, they'll have trouble with EC in general.

I found no real guidance in regards to EC so I chose a higher one.

Regards

Sebastian

-- 
GPG Key: 0x93A0B9CE (F4F6 B1A3 866B 26E9 450A  9D82 58A2 D94A 93A0 B9CE)
'Are you Death?' ... IT'S THE SCYTHE, ISN'T IT? PEOPLE ALWAYS NOTICE THE SCYTHE.
            -- Terry Pratchett, The Fifth Elephant

Reply via email to