On Fri, May 15, 2020 at 10:09:18PM +0200, Roland Freikamp wrote:

> > > smtp_tls_ciphers = medium
> > > smtp_tls_exclude_ciphers = aNULL,eNULL,CAMELLIA
> > > smtp_tls_mandatory_ciphers = medium
> > > tls_preempt_cipherlist = yes
> > 
> > Before asking for help, try removing those settings.
> I've removed them; it did not change anything.
> 
> The debug-log now says:
> 
> postfix/smtpd[12259]: connect from ...[...]
> postfix/smtpd[12259]: setting up TLS connection from ...[...]
> postfix/smtpd[12259]: ...[...]: TLS cipher list 
> "aNULL:-aNULL:HIGH:MEDIUM:+RC4:@STRENGTH"
> postfix/smtpd[12259]: SSL_accept:before SSL initialization
> postfix/smtpd[12259]: SSL_accept:before SSL initialization
> postfix/smtpd[12259]: SSL3 alert write:fatal:handshake failure
> postfix/smtpd[12259]: SSL_accept:error in error
> postfix/smtpd[12259]: SSL_accept error from ...[...]: -1
> postfix/smtpd[12259]: warning: TLS library problem: error:1417A0C1:SSL 
> routines:tls_post_process_client_hello:no shared 
> cipher:ssl/statem/statem_srvr.c:2282:
> postfix/smtpd[12259]: lost connection after STARTTLS from ...[...]
> postfix/smtpd[12259]: disconnect from ...[...] ehlo=1 starttls=0/1 
> commands=1/2
> 
> Does that mean that the other server only supports SSL3?

No.

> Or could it be that my certificate is ECDSA, but the other server
> maybe only supports RSA?

That's quite plausible, and would have been my guess even before you
mentioned this.  For interop, you need an RSA cert, and then you can
*also* have an ECDSA cert.  It gets even more fun with DANE "3 1 1",
when you then need multiple TLSA RRs matching each chain, and multiple
versions of each during key rollover.

-- 
    Viktor.

Reply via email to