[ Kurt, I don't know whether you've been following this thread, but the
  OP's system is exhibiting rather unexpected TLS session termination
  with "out of the blue" SSL_R_SHUTDOWN_WHILE_IN_INIT errors, even though
  I see no opportunity for Postfix to attempt to tear down the session,
  indeed Postfix is trying to read the next command after "RCPT TO", so
  as far as the SMTP server was concerned the session was live when the
  error was unexpectedly reported.

  
http://postfix.1071664.n5.nabble.com/quot-SSL-Shutdown-shutdown-while-in-init-quot-while-sending-and-receiving-td105822.html
]

On Wed, May 13, 2020 at 06:03:42PM -0700, Alexander Vasarab wrote:

> >Is this the stock OpenSSL for your system, or your own build?
> 
> There's just one OpenSSL library installed on the system, the stock
> version supplied by the OS's package manager.
> 
> $ ldd <postfix executable> | grep ssl
>       libssl.so.1.1 => /usr/lib/x86_64-linux-gnu/libssl.so.1.1 
> (0x00007f13e45fe000)
> 
> $ strings /usr/lib/x86_64-linux-gnu/libssl.so.1.1 | grep 'OpenSSL'
>       OpenSSL 1.1.1d  10 Sep 2019
> 
> >What OS are you running?
> 
> Debian GNU/Linux 10 (buster aka stable).
> 
> Yesterday, I bumped libssl1.1 to the version available in the testing
> distribution, which is 1.1.1g, and noticed no change in the faulty
> behavior. Now I'm back to stable's 1.1.1d.

At this point it becomes interesting what Debian-specific changes there
may be in OpenSSL 1.1.1.  Perhaps Kurt Roeckx (I believe he's on this
list), might comment.  The behaviour you're reporting exhibits issues
below Postfix.

Are any other Debian users seeing similar issues?

-- 
    Viktor.

Reply via email to