On Fri, May 15, 2020 at 10:09:18PM +0200, Roland Freikamp wrote: > > > smtp_tls_ciphers = medium > > > smtp_tls_exclude_ciphers = aNULL,eNULL,CAMELLIA > > > smtp_tls_mandatory_ciphers = medium > > > tls_preempt_cipherlist = yes > > > > Before asking for help, try removing those settings. > I've removed them; it did not change anything. > > The debug-log now says: > > postfix/smtpd[12259]: connect from ...[...] > postfix/smtpd[12259]: setting up TLS connection from ...[...] > postfix/smtpd[12259]: ...[...]: TLS cipher list > "aNULL:-aNULL:HIGH:MEDIUM:+RC4:@STRENGTH" > postfix/smtpd[12259]: SSL_accept:before SSL initialization > postfix/smtpd[12259]: SSL_accept:before SSL initialization > postfix/smtpd[12259]: SSL3 alert write:fatal:handshake failure > postfix/smtpd[12259]: SSL_accept:error in error > postfix/smtpd[12259]: SSL_accept error from ...[...]: -1 > postfix/smtpd[12259]: warning: TLS library problem: error:1417A0C1:SSL > routines:tls_post_process_client_hello:no shared > cipher:ssl/statem/statem_srvr.c:2282: > postfix/smtpd[12259]: lost connection after STARTTLS from ...[...] > postfix/smtpd[12259]: disconnect from ...[...] ehlo=1 starttls=0/1 > commands=1/2 > > Does that mean that the other server only supports SSL3?
No. > Or could it be that my certificate is ECDSA, but the other server > maybe only supports RSA? That's quite plausible, and would have been my guess even before you mentioned this. For interop, you need an RSA cert, and then you can *also* have an ECDSA cert. It gets even more fun with DANE "3 1 1", when you then need multiple TLSA RRs matching each chain, and multiple versions of each during key rollover. -- Viktor.