> On Jan 14, 2017, at 8:51 AM, Admin Beckspaced <ad...@beckspaced.com> wrote:
> 
> 2017-01-14T14:41:43.183704+01:00 cx20 postfix/smtpd[25337]: initializing the 
> server-side TLS engine
> 2017-01-14T14:41:43.195287+01:00 cx20 postfix/smtpd[25337]: connect from 
> mail.kommunalunternehmen.de[217.6.53.146]
> 2017-01-14T14:41:43.254888+01:00 cx20 postfix/smtpd[25337]: setting up TLS 
> connection from mail.kommunalunternehmen.de[217.6.53.146]
> 2017-01-14T14:41:43.255444+01:00 cx20 postfix/smtpd[25337]: 
> mail.kommunalunternehmen.de[217.6.53.146]: TLS cipher list 
> "aNULL:-aNULL:ALL:!EXPORT:!LOW:+RC4:@STRENGTH"
> 2017-01-14T14:41:43.257024+01:00 cx20 postfix/smtpd[25337]: 
> SSL_accept:before/accept initialization
> 2017-01-14T14:41:43.277843+01:00 cx20 postfix/smtpd[25337]: SSL_accept:SSLv3 
> read client hello A
> 2017-01-14T14:41:43.278453+01:00 cx20 postfix/smtpd[25337]: SSL_accept:SSLv3 
> write server hello A
> 2017-01-14T14:41:43.278829+01:00 cx20 postfix/smtpd[25337]: SSL_accept:SSLv3 
> write certificate A
> 2017-01-14T14:41:43.296343+01:00 cx20 postfix/smtpd[25337]: SSL_accept:SSLv3 
> write key exchange A
> 2017-01-14T14:41:43.297537+01:00 cx20 postfix/smtpd[25337]: SSL_accept:SSLv3 
> write server done A
> 2017-01-14T14:41:43.298112+01:00 cx20 postfix/smtpd[25337]: SSL_accept:SSLv3 
> flush data
> 2017-01-14T14:41:43.313040+01:00 cx20 postfix/smtpd[25337]: SSL_accept:error 
> in SSLv3 read client certificate A
> 2017-01-14T14:41:43.313611+01:00 cx20 postfix/smtpd[25337]: SSL_accept error 
> from mail.kommunalunternehmen.de[217.6.53.146]: Connection reset by peer
> 2017-01-14T14:41:43.313970+01:00 cx20 postfix/smtpd[25337]: lost connection 
> after STARTTLS from mail.kommunalunternehmen.de[217.6.53.146]
> 2017-01-14T14:41:43.314315+01:00 cx20 postfix/smtpd[25337]: disconnect from 
> mail.kommunalunternehmen.de[217.6.53.146]
> 
> I see: SSL_accept:error in SSLv3 read client certificate A
> 
> so does this mean that the other exchange server has a problem with their 
> certificate?

No, if your reported "postconf -n" output matches reality, then your server 
does not
solicit client certificates.  The "read client certificate A" state is 
misleading,
the server actually expects a client key exchange at that point.  A complete 
handshake
log without any client certs looks like:

Jan 14 19:21:48 mournblade postfix/smtpd[12682]: SSL_accept:before/accept 
initialization
Jan 14 19:21:48 mournblade postfix/smtpd[12682]: SSL_accept:SSLv3 read client 
hello A
Jan 14 19:21:48 mournblade postfix/smtpd[12682]: SSL_accept:SSLv3 write server 
hello A
Jan 14 19:21:48 mournblade postfix/smtpd[12682]: SSL_accept:SSLv3 write 
certificate A
Jan 14 19:21:48 mournblade postfix/smtpd[12682]: SSL_accept:SSLv3 write key 
exchange A
Jan 14 19:21:48 mournblade postfix/smtpd[12682]: SSL_accept:SSLv3 write server 
done A
Jan 14 19:21:48 mournblade postfix/smtpd[12682]: SSL_accept:SSLv3 flush data
Jan 14 19:21:48 mournblade postfix/smtpd[12682]: SSL_accept:SSLv3 read client 
certificate A
Jan 14 19:21:48 mournblade postfix/smtpd[12682]: SSL_accept:SSLv3 read client 
key exchange A
Jan 14 19:21:48 mournblade postfix/smtpd[12682]: SSL_accept:SSLv3 read 
certificate verify A
Jan 14 19:21:48 mournblade postfix/smtpd[12682]: SSL_accept:SSLv3 read finished 
A
Jan 14 19:21:48 mournblade postfix/smtpd[12682]: SSL_accept:SSLv3 write session 
ticket A
Jan 14 19:21:48 mournblade postfix/smtpd[12682]: SSL_accept:SSLv3 write change 
cipher spec A
Jan 14 19:21:48 mournblade postfix/smtpd[12682]: SSL_accept:SSLv3 write 
finished A
Jan 14 19:21:48 mournblade postfix/smtpd[12682]: SSL_accept:SSLv3 flush data

> Is the problem on the exchange server site? or is it my postfix server?

Perhaps your 4096-bit RSA certificate signed with SHA2-256 is too modern
for the client software in question.  With a PCAP file of a session, we
could see more data from the TLS server HELLO, perhaps that could yield
a clue, but logs from the sending client would be much more useful, since
it is the one deciding to not continue.

-- 
        Viktor.

Reply via email to