On Wed, Jun 15, 2022 at 03:09:16PM -0400, Viktor Dukhovni wrote: > You can share the PCAP file with me off-list.
Thanks for the PCAP file. An immediate interesting feature is how the connection is terminated ("tcpdump" output edited to trim excess detail): 22:32:13.555416 1711 > 25: [S], seq 3405166426, win 65535, length 0 22:32:13.555449 25 > 1711: [S.], seq 1841506549, ack 3405166427, win 28960, length 0 22:32:13.742679 1711 > 25: [.], ack 1, win 2058, length 0 22:32:13.994238 25 > 1711: [P.], seq 1:39, ack 1, win 227, length 38: SMTP: 220 mail.ittech.com.sg ESMTP Postfix 22:32:14.182397 1711 > 25: [.], ack 39, win 2058, length 0 22:32:14.182736 1711 > 25: [P.], seq 1:24, ack 39, win 2058, length 23: SMTP: EHLO ansmtp.ariba.com 22:32:14.182767 25 > 1711: [.], ack 24, win 227, length 0 22:32:14.182917 25 > 1711: [P.], seq 39:194, ack 24, win 227, length 155: SMTP: 250-mail.ittech.com.sg 22:32:14.370857 1711 > 25: [.], ack 194, win 2056, length 0 22:32:14.371213 1711 > 25: [P.], seq 24:34, ack 194, win 2058, length 10: SMTP: STARTTLS 22:32:14.371276 25 > 1711: [P.], seq 194:224, ack 34, win 227, length 30: SMTP: 220 2.0.0 Ready to start TLS 22:32:14.559151 1711 > 25: [.], ack 224, win 2058, length 0 22:32:14.559877 1711 > 25: [P.], seq 34:233, ack 224, win 2058, length 199 22:32:14.561871 25 > 1711: [.], seq 224:1672, ack 233, win 235, length 1448 22:32:14.561873 25 > 1711: [.], seq 1672:3120, ack 233, win 235, length 1448 22:32:14.561912 25 > 1711: [P.], seq 3120:3355, ack 233, win 235, length 235 22:32:14.750425 1711 > 25: [R.], seq 233, ack 1672, win 235, length 0 As we'll see below, the the last three TCP segments from the server contain the TLS Server HELLO, the certificate message, the key exchange message and server HELLO DONE message. The client slams the door closed with "RST + ACK" and a sequence number acking receipt of just the first of the three frames. The RST is delayed by ~190ms, which is close to the RTT delay for earlier messages, so its origin does appear to be remote. [ Trimmed "tshark" decodes below signature ] The first frame contains the TLS Server Hello and only a portion of the server certificate message. I am guessing that the remote TLS stack does not process partial TLS records (waits for each record to arrive in full). So whatever the client TLS stack did not like was in the TLS Server Hello. The TLS Server Hello message does not look at all remarkable to me: Handshake Protocol: Server Hello Handshake Type: Server Hello (2) Length: 57 Version: TLS 1.2 (0x0303) Random: ... Session ID Length: 0 Cipher Suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (0xc030) Compression Method: null (0) Extensions Length: 17 Extension: renegotiation_info (len=1) Type: renegotiation_info (65281) Length: 1 Renegotiation Info extension Renegotiation info extension length: 0 Extension: ec_point_formats (len=4) Type: ec_point_formats (11) Length: 4 EC point formats Length: 3 Elliptic curves point formats (3) EC point format: uncompressed (0) EC point format: ansiX962_compressed_prime (1) EC point format: ansiX962_compressed_char2 (2) Extension: session_ticket (len=0) Type: session_ticket (35) Length: 0 Data (0 bytes) So it is far from clear what you could do to make this client happy. Perhaps some security middlebox near the client is misbehaving, or its TLS stack is broken beyond repair. Your best may be to disable STARTTLS for connections from this client: smtpd_discard_ehlo_keyword_address_maps = inline:{ { 216.109.104.12 = starttls } } If possible, reach out to the postmaster of the remote system or ask the receiving user for their contacts on the sending side. They may have some insight about what it is their software is unhappy about. -- Viktor. Transmission Control Protocol, Src Port: 1711, Dst Port: 25, Seq: 0, Len: 0 Source Port: 1711 Destination Port: 25 [TCP Segment Len: 0] Sequence Number: 0 (relative sequence number) [Next Sequence Number: 1 (relative sequence number)] Acknowledgment Number: 0 1010 .... = Header Length: 40 bytes (10) Flags: 0x002 (SYN) Transmission Control Protocol, Src Port: 25, Dst Port: 1711, Seq: 0, Ack: 1, Len: 0 Source Port: 25 Destination Port: 1711 [TCP Segment Len: 0] Sequence Number: 0 (relative sequence number) [Next Sequence Number: 1 (relative sequence number)] Acknowledgment Number: 1 (relative ack number) 1010 .... = Header Length: 40 bytes (10) Flags: 0x012 (SYN, ACK) Transmission Control Protocol, Src Port: 1711, Dst Port: 25, Seq: 1, Ack: 1, Len: 0 Source Port: 1711 Destination Port: 25 [TCP Segment Len: 0] Sequence Number: 1 (relative sequence number) [Next Sequence Number: 1 (relative sequence number)] Acknowledgment Number: 1 (relative ack number) 1000 .... = Header Length: 32 bytes (8) Flags: 0x010 (ACK) Transmission Control Protocol, Src Port: 25, Dst Port: 1711, Seq: 1, Ack: 1, Len: 38 Source Port: 25 Destination Port: 1711 [TCP Segment Len: 38] Sequence Number: 1 (relative sequence number) [Next Sequence Number: 39 (relative sequence number)] Acknowledgment Number: 1 (relative ack number) 1000 .... = Header Length: 32 bytes (8) Flags: 0x018 (PSH, ACK) 220 mail.ittech.com.sg ESMTP Postfix Transmission Control Protocol, Src Port: 1711, Dst Port: 25, Seq: 1, Ack: 39, Len: 0 Source Port: 1711 Destination Port: 25 [TCP Segment Len: 0] Sequence Number: 1 (relative sequence number) [Next Sequence Number: 1 (relative sequence number)] Acknowledgment Number: 39 (relative ack number) 1000 .... = Header Length: 32 bytes (8) Flags: 0x010 (ACK) Transmission Control Protocol, Src Port: 1711, Dst Port: 25, Seq: 1, Ack: 39, Len: 23 Source Port: 1711 Destination Port: 25 [TCP Segment Len: 23] Sequence Number: 1 (relative sequence number) [Next Sequence Number: 24 (relative sequence number)] Acknowledgment Number: 39 (relative ack number) 1000 .... = Header Length: 32 bytes (8) Flags: 0x018 (PSH, ACK) EHLO ansmtp.ariba.com Transmission Control Protocol, Src Port: 25, Dst Port: 1711, Seq: 39, Ack: 24, Len: 0 Source Port: 25 Destination Port: 1711 [TCP Segment Len: 0] Sequence Number: 39 (relative sequence number) [Next Sequence Number: 39 (relative sequence number)] Acknowledgment Number: 24 (relative ack number) 1000 .... = Header Length: 32 bytes (8) Flags: 0x010 (ACK) Transmission Control Protocol, Src Port: 25, Dst Port: 1711, Seq: 39, Ack: 24, Len: 155 Source Port: 25 Destination Port: 1711 [TCP Segment Len: 155] Sequence Number: 39 (relative sequence number) [Next Sequence Number: 194 (relative sequence number)] Acknowledgment Number: 24 (relative ack number) 1000 .... = Header Length: 32 bytes (8) Flags: 0x018 (PSH, ACK) 250-mail.ittech.com.sg 250-PIPELINING 250-SIZE 31457280 250-VRFY 250-ETRN 250-STARTTLS 250-ENHANCEDSTATUSCODES 250-8BITMIME 250-DSN 250 SMTPUTF8 Transmission Control Protocol, Src Port: 1711, Dst Port: 25, Seq: 24, Ack: 194, Len: 0 Source Port: 1711 Destination Port: 25 [TCP Segment Len: 0] Sequence Number: 24 (relative sequence number) [Next Sequence Number: 24 (relative sequence number)] Acknowledgment Number: 194 (relative ack number) 1000 .... = Header Length: 32 bytes (8) Flags: 0x010 (ACK) Transmission Control Protocol, Src Port: 1711, Dst Port: 25, Seq: 24, Ack: 194, Len: 10 Source Port: 1711 Destination Port: 25 [TCP Segment Len: 10] Sequence Number: 24 (relative sequence number) [Next Sequence Number: 34 (relative sequence number)] Acknowledgment Number: 194 (relative ack number) 1000 .... = Header Length: 32 bytes (8) Flags: 0x018 (PSH, ACK) STARTTLS Transmission Control Protocol, Src Port: 25, Dst Port: 1711, Seq: 194, Ack: 34, Len: 30 Source Port: 25 Destination Port: 1711 [TCP Segment Len: 30] Sequence Number: 194 (relative sequence number) [Next Sequence Number: 224 (relative sequence number)] Acknowledgment Number: 34 (relative ack number) 1000 .... = Header Length: 32 bytes (8) Flags: 0x018 (PSH, ACK) 220 2.0.0 Ready to start TLS Transmission Control Protocol, Src Port: 1711, Dst Port: 25, Seq: 34, Ack: 224, Len: 0 Source Port: 1711 Destination Port: 25 [TCP Segment Len: 0] Sequence Number: 34 (relative sequence number) [Next Sequence Number: 34 (relative sequence number)] Acknowledgment Number: 224 (relative ack number) 1000 .... = Header Length: 32 bytes (8) Flags: 0x010 (ACK) Transmission Control Protocol, Src Port: 1711, Dst Port: 25, Seq: 34, Ack: 224, Len: 199 Source Port: 1711 Destination Port: 25 [TCP Segment Len: 199] Sequence Number: 34 (relative sequence number) [Next Sequence Number: 233 (relative sequence number)] Acknowledgment Number: 224 (relative ack number) 1000 .... = Header Length: 32 bytes (8) Flags: 0x018 (PSH, ACK) Transport Layer Security TLSv1 Record Layer: Handshake Protocol: Client Hello Content Type: Handshake (22) Version: TLS 1.0 (0x0301) Length: 194 Handshake Protocol: Client Hello Handshake Type: Client Hello (1) Length: 190 Version: TLS 1.2 (0x0303) Random: ... Session ID Length: 0 Cipher Suites Length: 82 Cipher Suites (41 suites) Cipher Suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (0xc030) Cipher Suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (0xc028) Cipher Suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (0xc014) Cipher Suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (0xc02f) Cipher Suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (0xc027) Cipher Suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (0xc013) Cipher Suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (0xc012) Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (0xc02c) Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (0xc024) Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (0xc00a) Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (0xc02b) Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (0xc023) Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (0xc009) Cipher Suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (0xc008) Cipher Suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 (0x00a3) Cipher Suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 (0x006a) Cipher Suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA (0x0038) Cipher Suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 (0x00a2) Cipher Suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 (0x0040) Cipher Suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA (0x0032) Cipher Suite: TLS_DH_DSS_WITH_AES_128_GCM_SHA256 (0x00a4) Cipher Suite: TLS_DH_RSA_WITH_AES_128_GCM_SHA256 (0x00a0) Cipher Suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (0x0067) Cipher Suite: TLS_DH_RSA_WITH_AES_128_CBC_SHA256 (0x003f) Cipher Suite: TLS_DH_DSS_WITH_AES_128_CBC_SHA256 (0x003e) Cipher Suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA (0x0033) Cipher Suite: TLS_DH_RSA_WITH_AES_128_CBC_SHA (0x0031) Cipher Suite: TLS_DH_DSS_WITH_AES_128_CBC_SHA (0x0030) Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA256 (0x003c) Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA (0x002f) Cipher Suite: TLS_DH_DSS_WITH_AES_256_GCM_SHA384 (0x00a5) Cipher Suite: TLS_DH_RSA_WITH_AES_256_GCM_SHA384 (0x00a1) Cipher Suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (0x006b) Cipher Suite: TLS_DH_RSA_WITH_AES_256_CBC_SHA256 (0x0069) Cipher Suite: TLS_DH_DSS_WITH_AES_256_CBC_SHA256 (0x0068) Cipher Suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA (0x0039) Cipher Suite: TLS_DH_RSA_WITH_AES_256_CBC_SHA (0x0037) Cipher Suite: TLS_DH_DSS_WITH_AES_256_CBC_SHA (0x0036) Cipher Suite: TLS_RSA_WITH_AES_256_CBC_SHA256 (0x003d) Cipher Suite: TLS_RSA_WITH_AES_256_CBC_SHA (0x0035) Cipher Suite: TLS_EMPTY_RENEGOTIATION_INFO_SCSV (0x00ff) Compression Methods Length: 1 Compression Methods (1 method) Compression Method: null (0) Extensions Length: 67 Extension: ec_point_formats (len=4) Type: ec_point_formats (11) Length: 4 EC point formats Length: 3 Elliptic curves point formats (3) EC point format: uncompressed (0) EC point format: ansiX962_compressed_prime (1) EC point format: ansiX962_compressed_char2 (2) Extension: supported_groups (len=10) Type: supported_groups (10) Length: 10 Supported Groups List Length: 8 Supported Groups (4 groups) Supported Group: secp521r1 (0x0019) Supported Group: secp384r1 (0x0018) Supported Group: secp256r1 (0x0017) Supported Group: secp192r1 (0x0013) Extension: session_ticket (len=0) Type: session_ticket (35) Length: 0 Data (0 bytes) Extension: signature_algorithms (len=32) Type: signature_algorithms (13) Length: 32 Signature Hash Algorithms Length: 30 Signature Hash Algorithms (15 algorithms) Signature Algorithm: rsa_pkcs1_sha512 (0x0601) Signature Hash Algorithm Hash: SHA512 (6) Signature Hash Algorithm Signature: RSA (1) Signature Algorithm: SHA512 DSA (0x0602) Signature Hash Algorithm Hash: SHA512 (6) Signature Hash Algorithm Signature: DSA (2) Signature Algorithm: ecdsa_secp521r1_sha512 (0x0603) Signature Hash Algorithm Hash: SHA512 (6) Signature Hash Algorithm Signature: ECDSA (3) Signature Algorithm: rsa_pkcs1_sha384 (0x0501) Signature Hash Algorithm Hash: SHA384 (5) Signature Hash Algorithm Signature: RSA (1) Signature Algorithm: SHA384 DSA (0x0502) Signature Hash Algorithm Hash: SHA384 (5) Signature Hash Algorithm Signature: DSA (2) Signature Algorithm: ecdsa_secp384r1_sha384 (0x0503) Signature Hash Algorithm Hash: SHA384 (5) Signature Hash Algorithm Signature: ECDSA (3) Signature Algorithm: rsa_pkcs1_sha256 (0x0401) Signature Hash Algorithm Hash: SHA256 (4) Signature Hash Algorithm Signature: RSA (1) Signature Algorithm: SHA256 DSA (0x0402) Signature Hash Algorithm Hash: SHA256 (4) Signature Hash Algorithm Signature: DSA (2) Signature Algorithm: ecdsa_secp256r1_sha256 (0x0403) Signature Hash Algorithm Hash: SHA256 (4) Signature Hash Algorithm Signature: ECDSA (3) Signature Algorithm: SHA224 RSA (0x0301) Signature Hash Algorithm Hash: SHA224 (3) Signature Hash Algorithm Signature: RSA (1) Signature Algorithm: SHA224 DSA (0x0302) Signature Hash Algorithm Hash: SHA224 (3) Signature Hash Algorithm Signature: DSA (2) Signature Algorithm: SHA224 ECDSA (0x0303) Signature Hash Algorithm Hash: SHA224 (3) Signature Hash Algorithm Signature: ECDSA (3) Signature Algorithm: rsa_pkcs1_sha1 (0x0201) Signature Hash Algorithm Hash: SHA1 (2) Signature Hash Algorithm Signature: RSA (1) Signature Algorithm: SHA1 DSA (0x0202) Signature Hash Algorithm Hash: SHA1 (2) Signature Hash Algorithm Signature: DSA (2) Signature Algorithm: ecdsa_sha1 (0x0203) Signature Hash Algorithm Hash: SHA1 (2) Signature Hash Algorithm Signature: ECDSA (3) Extension: heartbeat (len=1) Type: heartbeat (15) Length: 1 Mode: Peer allowed to send requests (1) Transmission Control Protocol, Src Port: 25, Dst Port: 1711, Seq: 224, Ack: 233, Len: 1448 Source Port: 25 Destination Port: 1711 [TCP Segment Len: 1448] Sequence Number: 224 (relative sequence number) [Next Sequence Number: 1672 (relative sequence number)] Acknowledgment Number: 233 (relative ack number) 1000 .... = Header Length: 32 bytes (8) Flags: 0x010 (ACK) TCP payload (1448 bytes) TCP segment data (1382 bytes) Transport Layer Security TLSv1.2 Record Layer: Handshake Protocol: Server Hello Content Type: Handshake (22) Version: TLS 1.2 (0x0303) Length: 61 Handshake Protocol: Server Hello Handshake Type: Server Hello (2) Length: 57 Version: TLS 1.2 (0x0303) Random: ... Session ID Length: 0 Cipher Suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (0xc030) Compression Method: null (0) Extensions Length: 17 Extension: renegotiation_info (len=1) Type: renegotiation_info (65281) Length: 1 Renegotiation Info extension Renegotiation info extension length: 0 Extension: ec_point_formats (len=4) Type: ec_point_formats (11) Length: 4 EC point formats Length: 3 Elliptic curves point formats (3) EC point format: uncompressed (0) EC point format: ansiX962_compressed_prime (1) EC point format: ansiX962_compressed_char2 (2) Extension: session_ticket (len=0) Type: session_ticket (35) Length: 0 Data (0 bytes) Transmission Control Protocol, Src Port: 25, Dst Port: 1711, Seq: 1672, Ack: 233, Len: 1448 Source Port: 25 Destination Port: 1711 [TCP Segment Len: 1448] Sequence Number: 1672 (relative sequence number) [Next Sequence Number: 3120 (relative sequence number)] Acknowledgment Number: 233 (relative ack number) 1000 .... = Header Length: 32 bytes (8) Flags: 0x010 (ACK) [2 Reassembled TCP Segments (2650 bytes): #14(1382), #15(1268)] [Frame: 14, payload: 0-1381 (1382 bytes)] [Frame: 15, payload: 1382-2649 (1268 bytes)] [Segment count: 2] [Reassembled TCP length: 2650] Transport Layer Security TLSv1.2 Record Layer: Handshake Protocol: Certificate Content Type: Handshake (22) Version: TLS 1.2 (0x0303) Length: 2645 Handshake Protocol: Certificate Handshake Type: Certificate (11) Length: 2641 Certificates Length: 2638 Certificates (2638 bytes) Certificate Length: 1326 Certificate: ... (id-at-commonName=mail.ittech.com.sg) signedCertificate version: v3 (2) serialNumber: ... signature (sha256WithRSAEncryption) Algorithm Id: 1.2.840.113549.1.1.11 (sha256WithRSAEncryption) issuer: rdnSequence (0) rdnSequence: 3 items (id-at-commonName=R3,id-at-organizationName=Let's Encrypt,id-at-countryName=US) RDNSequence item: 1 item (id-at-countryName=US) RelativeDistinguishedName item (id-at-countryName=US) Id: 2.5.4.6 (id-at-countryName) CountryName: US RDNSequence item: 1 item (id-at-organizationName=Let's Encrypt) RelativeDistinguishedName item (id-at-organizationName=Let's Encrypt) Id: 2.5.4.10 (id-at-organizationName) DirectoryString: printableString (1) printableString: Let's Encrypt RDNSequence item: 1 item (id-at-commonName=R3) RelativeDistinguishedName item (id-at-commonName=R3) Id: 2.5.4.3 (id-at-commonName) DirectoryString: printableString (1) printableString: R3 validity notBefore: utcTime (0) utcTime: 2022-06-15 16:55:26 (UTC) notAfter: utcTime (0) utcTime: 2022-09-13 16:55:25 (UTC) subject: rdnSequence (0) rdnSequence: 1 item (id-at-commonName=mail.ittech.com.sg) RDNSequence item: 1 item (id-at-commonName=mail.ittech.com.sg) RelativeDistinguishedName item (id-at-commonName=mail.ittech.com.sg) Id: 2.5.4.3 (id-at-commonName) DirectoryString: printableString (1) printableString: mail.ittech.com.sg subjectPublicKeyInfo algorithm (rsaEncryption) Algorithm Id: 1.2.840.113549.1.1.1 (rsaEncryption) subjectPublicKey: 3082010a0282010100c5421505cb9e836e0dd36d08bc1dd8a6e84435bf237f6875b685af… extensions: 9 items Extension (id-ce-keyUsage) Extension Id: 2.5.29.15 (id-ce-keyUsage) critical: True Padding: 5 KeyUsage: a0 1... .... = digitalSignature: True .0.. .... = contentCommitment: False ..1. .... = keyEncipherment: True ...0 .... = dataEncipherment: False .... 0... = keyAgreement: False .... .0.. = keyCertSign: False .... ..0. = cRLSign: False .... ...0 = encipherOnly: False 0... .... = decipherOnly: False Extension (id-ce-extKeyUsage) Extension Id: 2.5.29.37 (id-ce-extKeyUsage) KeyPurposeIDs: 2 items KeyPurposeId: 1.3.6.1.5.5.7.3.1 (id-kp-serverAuth) KeyPurposeId: 1.3.6.1.5.5.7.3.2 (id-kp-clientAuth) Extension (id-ce-basicConstraints) Extension Id: 2.5.29.19 (id-ce-basicConstraints) critical: True BasicConstraintsSyntax [0 length] Extension (id-ce-subjectKeyIdentifier) Extension Id: 2.5.29.14 (id-ce-subjectKeyIdentifier) SubjectKeyIdentifier: ... Extension (id-ce-authorityKeyIdentifier) Extension Id: 2.5.29.35 (id-ce-authorityKeyIdentifier) AuthorityKeyIdentifier keyIdentifier: ... Extension (id-pe-authorityInfoAccess) Extension Id: 1.3.6.1.5.5.7.1.1 (id-pe-authorityInfoAccess) AuthorityInfoAccessSyntax: 2 items AccessDescription accessMethod: 1.3.6.1.5.5.7.48.1 (id-ad-ocsp) accessLocation: 6 uniformResourceIdentifier: http://r3.o.lencr.org AccessDescription accessMethod: 1.3.6.1.5.5.7.48.2 (id-ad-caIssuers) accessLocation: 6 uniformResourceIdentifier: http://r3.i.lencr.org/ Extension (id-ce-subjectAltName) Extension Id: 2.5.29.17 (id-ce-subjectAltName) GeneralNames: 1 item GeneralName: dNSName (2) dNSName: mail.ittech.com.sg Extension (id-ce-certificatePolicies) Extension Id: 2.5.29.32 (id-ce-certificatePolicies) CertificatePoliciesSyntax: 2 items PolicyInformation policyIdentifier: 2.23.140.1.2.1 (joint-iso-itu-t.23.140.1.2.1) PolicyInformation policyIdentifier: 1.3.6.1.4.1.44947.1.1.1 (iso.3.6.1.4.1.44947.1.1.1) policyQualifiers: 1 item PolicyQualifierInfo Id: 1.3.6.1.5.5.7.2.1 (id-qt-cps) DirectoryString: http://cps.letsencrypt.org Extension (SignedCertificateTimestampList) Extension Id: 1.3.6.1.4.1.11129.2.4.2 (SignedCertificateTimestampList) Serialized SCT List Length: 240 Signed Certificate Timestamp (Let's Encrypt 'Oak2022' log) ... Signed Certificate Timestamp (Google 'Argon2022' log) ... algorithmIdentifier (sha256WithRSAEncryption) Algorithm Id: 1.2.840.113549.1.1.11 (sha256WithRSAEncryption) Padding: 0 encrypted: ... Certificate Length: 1306 Certificate: ... (id-at-commonName=R3,id-at-organizationName=Let's Encrypt,id-at-countryName=US) signedCertificate version: v3 (2) serialNumber: ... signature (sha256WithRSAEncryption) Algorithm Id: 1.2.840.113549.1.1.11 (sha256WithRSAEncryption) issuer: rdnSequence (0) rdnSequence: 3 items (id-at-commonName=ISRG Root X1,id-at-organizationName=Internet Security Research Group,id-at-countryName=US) RDNSequence item: 1 item (id-at-countryName=US) RelativeDistinguishedName item (id-at-countryName=US) Id: 2.5.4.6 (id-at-countryName) CountryName: US RDNSequence item: 1 item (id-at-organizationName=Internet Security Research Group) RelativeDistinguishedName item (id-at-organizationName=Internet Security Research Group) Id: 2.5.4.10 (id-at-organizationName) DirectoryString: printableString (1) printableString: Internet Security Research Group RDNSequence item: 1 item (id-at-commonName=ISRG Root X1) RelativeDistinguishedName item (id-at-commonName=ISRG Root X1) Id: 2.5.4.3 (id-at-commonName) DirectoryString: printableString (1) printableString: ISRG Root X1 validity notBefore: utcTime (0) utcTime: 2020-09-04 00:00:00 (UTC) notAfter: utcTime (0) utcTime: 2025-09-15 16:00:00 (UTC) subject: rdnSequence (0) rdnSequence: 3 items (id-at-commonName=R3,id-at-organizationName=Let's Encrypt,id-at-countryName=US) RDNSequence item: 1 item (id-at-countryName=US) RelativeDistinguishedName item (id-at-countryName=US) Id: 2.5.4.6 (id-at-countryName) CountryName: US RDNSequence item: 1 item (id-at-organizationName=Let's Encrypt) RelativeDistinguishedName item (id-at-organizationName=Let's Encrypt) Id: 2.5.4.10 (id-at-organizationName) DirectoryString: printableString (1) printableString: Let's Encrypt RDNSequence item: 1 item (id-at-commonName=R3) RelativeDistinguishedName item (id-at-commonName=R3) Id: 2.5.4.3 (id-at-commonName) DirectoryString: printableString (1) printableString: R3 subjectPublicKeyInfo algorithm (rsaEncryption) Algorithm Id: 1.2.840.113549.1.1.1 (rsaEncryption) subjectPublicKey: 3082010a0282010100bb021528ccf6a094d30f12ec8d5592c3f882f199a67a4288a75d26… extensions: 8 items Extension (id-ce-keyUsage) Extension Id: 2.5.29.15 (id-ce-keyUsage) critical: True Padding: 1 KeyUsage: 86 1... .... = digitalSignature: True .0.. .... = contentCommitment: False ..0. .... = keyEncipherment: False ...0 .... = dataEncipherment: False .... 0... = keyAgreement: False .... .1.. = keyCertSign: True .... ..1. = cRLSign: True .... ...0 = encipherOnly: False 0... .... = decipherOnly: False Extension (id-ce-extKeyUsage) Extension Id: 2.5.29.37 (id-ce-extKeyUsage) KeyPurposeIDs: 2 items KeyPurposeId: 1.3.6.1.5.5.7.3.2 (id-kp-clientAuth) KeyPurposeId: 1.3.6.1.5.5.7.3.1 (id-kp-serverAuth) Extension (id-ce-basicConstraints) Extension Id: 2.5.29.19 (id-ce-basicConstraints) critical: True BasicConstraintsSyntax cA: True pathLenConstraint: 0 Extension (id-ce-subjectKeyIdentifier) Extension Id: 2.5.29.14 (id-ce-subjectKeyIdentifier) SubjectKeyIdentifier: ... Extension (id-ce-authorityKeyIdentifier) Extension Id: 2.5.29.35 (id-ce-authorityKeyIdentifier) AuthorityKeyIdentifier keyIdentifier: ... Extension (id-pe-authorityInfoAccess) Extension Id: 1.3.6.1.5.5.7.1.1 (id-pe-authorityInfoAccess) AuthorityInfoAccessSyntax: 1 item AccessDescription accessMethod: 1.3.6.1.5.5.7.48.2 (id-ad-caIssuers) accessLocation: 6 uniformResourceIdentifier: http://x1.i.lencr.org/ Extension (id-ce-cRLDistributionPoints) Extension Id: 2.5.29.31 (id-ce-cRLDistributionPoints) CRLDistPointsSyntax: 1 item DistributionPoint distributionPoint: fullName (0) fullName: 1 item GeneralName: uniformResourceIdentifier (6) uniformResourceIdentifier: http://x1.c.lencr.org/ Extension (id-ce-certificatePolicies) Extension Id: 2.5.29.32 (id-ce-certificatePolicies) CertificatePoliciesSyntax: 2 items PolicyInformation policyIdentifier: 2.23.140.1.2.1 (joint-iso-itu-t.23.140.1.2.1) PolicyInformation policyIdentifier: 1.3.6.1.4.1.44947.1.1.1 (iso.3.6.1.4.1.44947.1.1.1) algorithmIdentifier (sha256WithRSAEncryption) Algorithm Id: 1.2.840.113549.1.1.11 (sha256WithRSAEncryption) Padding: 0 encrypted: ... Transmission Control Protocol, Src Port: 25, Dst Port: 1711, Seq: 3120, Ack: 233, Len: 235 Source Port: 25 Destination Port: 1711 [TCP Segment Len: 235] Sequence Number: 3120 (relative sequence number) [Next Sequence Number: 3355 (relative sequence number)] Acknowledgment Number: 233 (relative ack number) 1000 .... = Header Length: 32 bytes (8) Flags: 0x018 (PSH, ACK) [2 Reassembled TCP Segments (406 bytes): #15(180), #16(226)] [Frame: 15, payload: 0-179 (180 bytes)] [Frame: 16, payload: 180-405 (226 bytes)] [Segment count: 2] [Reassembled TCP length: 406] Transport Layer Security TLSv1.2 Record Layer: Handshake Protocol: Server Key Exchange Content Type: Handshake (22) Version: TLS 1.2 (0x0303) Length: 401 Handshake Protocol: Server Key Exchange Handshake Type: Server Key Exchange (12) Length: 397 EC Diffie-Hellman Server Params Curve Type: named_curve (0x03) Named Curve: secp521r1 (0x0019) Pubkey Length: 133 Pubkey: ... Signature Algorithm: rsa_pkcs1_sha512 (0x0601) Signature Hash Algorithm Hash: SHA512 (6) Signature Hash Algorithm Signature: RSA (1) Signature Length: 256 Signature: ... Transport Layer Security TLSv1.2 Record Layer: Handshake Protocol: Server Hello Done Content Type: Handshake (22) Version: TLS 1.2 (0x0303) Length: 4 Handshake Protocol: Server Hello Done Handshake Type: Server Hello Done (14) Length: 0 Transmission Control Protocol, Src Port: 1711, Dst Port: 25, Seq: 233, Ack: 1672, Len: 0 Source Port: 1711 Destination Port: 25 [TCP Segment Len: 0] Sequence Number: 233 (relative sequence number) [Next Sequence Number: 233 (relative sequence number)] Acknowledgment Number: 1672 (relative ack number) 0101 .... = Header Length: 20 bytes (5) Flags: 0x014 (RST, ACK)