>Is this the stock OpenSSL for your system, or your own build?

There's just one OpenSSL library installed on the system, the stock
version supplied by the OS's package manager.

$ ldd <postfix executable> | grep ssl
        libssl.so.1.1 => /usr/lib/x86_64-linux-gnu/libssl.so.1.1 
(0x00007f13e45fe000)

$ strings /usr/lib/x86_64-linux-gnu/libssl.so.1.1 | grep 'OpenSSL'
        OpenSSL 1.1.1d  10 Sep 2019

>What OS are you running?

On Wed, May 13, 2020 at 06:03:42PM -0700, Alexander Vasarab wrote:
Debian GNU/Linux 10 (buster aka stable).

Yesterday, I bumped libssl1.1 to the version available in the testing
distribution, which is 1.1.1g, and noticed no change in the faulty
behavior. Now I'm back to stable's 1.1.1d.

On 13.05.20 21:32, Viktor Dukhovni wrote:
At this point it becomes interesting what Debian-specific changes there
may be in OpenSSL 1.1.1.  Perhaps Kurt Roeckx (I believe he's on this
list), might comment.  The behaviour you're reporting exhibits issues
below Postfix.

Are any other Debian users seeing similar issues?

none so far on those few debian 10 systems I checked.

Can't that be kind of sender verification where the SMTP client doesn't
cleanly close TLS connection?

shouldn't we focus on failed client connections?

--
Matus UHLAR - fantomas, uh...@fantomas.sk ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
We are but packets in the Internet of life (userfriendly.org)

Reply via email to