On Wed, Sep 28, 2022 at 07:22:37PM +0200, Lists Nethead wrote: > > Your server defaults to an ECDSA P-384 certificate, the client may not > > support ECDSA at all, or may not support P-384 (P-256 is a more broadly > > supported choice): > > > > $ posttls-finger -c -lmay -Lsummary "[nh1.nethead.se]" > > posttls-finger: Untrusted TLS connection established > > to nh1.nethead.se[5.150.237.137]:25: > > TLSv1.3 with > > cipher TLS_AES_256_GCM_SHA384 (256/256 bits) > > key-exchange X25519 > > server-signature ECDSA (P-384) > > server-digest SHA384 > > > > There appears to be no additional RSA certificate configured: > > > > $ posttls-finger -p TLSv1.2 -o tls_medium_cipherlist="aRSA" -c > > -lmay -Lsummary "[nh1.nethead.se]" > > posttls-finger: SSL_connect error to nh1.nethead.se[5.150.237.137]:25: > > -1 > > posttls-finger: warning: TLS library problem: error:14094410:SSL > > routines:ssl3_read_bytes:sslv3 alert handshake > > failure:ssl/record/rec_layer_s3.c:1544:SSL alert number 40: > > > > $ posttls-finger -p TLSv1.2 -o tls_medium_cipherlist="aECDSA" -c > > -lmay -Lsummary "[nh1.nethead.se]" > > posttls-finger: Untrusted TLS connection established to > > nh1.nethead.se[5.150.237.137]:25: TLSv1.2 with cipher > > ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits) > > > > Your choice of private key (ECDSA P-384) is likely the problem. > > Thanks Viktor, that is exactly where my suspicions laid. Now on to fix it.
You should have at least an RSA certificate (2048-bit key, not more), and only if you're feeling particularly expert also an ECDSA certificate (P-256 is plenty strong, not P-384 or P-521). -- Viktor.