>>>> This server does not support TLS 1.3 yet and TLS 1.2 is the only
>>>> version currently allowed for submission.
> 
> That sounds like a rather old (EOL) version of OpenSSL.  TLS 1.3
> support was added in OpenSSL 1.1.1 [11 Sep 2018].  Are you using
> OpenSSL 1.1.0 or the even older 1.0.2?

It's CentOS 7 - RedHat sometimes does backports but version numbers
usually don't change.

Name        : openssl
Version     : 1.0.2k
Release     : 25.el7_9
Architecture: x86_64
Source RPM  : openssl-1.0.2k-25.el7_9.src.rpm
Build Date  : Mon 28 Mar 2022 05:43:15 PM CEST
Build Host  : x86-01.bsys.centos.org

This seems to be the latest version. CentOS 7 is supported until 2024-06-30.

Migration to CentOS 8 was planned but with RedHat withdrawing support
(turning CentOS 8 into CentOS stream, a rolling release distribution
for testing), I'm planning for Alma/Rocky 9.

>>> Do you have "tls_preempt_cipherlist = yes"?  I wonder why AES128 is used
>>> as opposed to AES256.
>> 
>> Yes, sorry, I've tried different options while troubleshooting.
>> 
>> With tls_preempt_cipherlist unset it logs:
>> 
>> Anonymous TLS connection established from <redacted>: TLSv1.2 with cipher 
>> ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)
> 
> Though I'll see it if you provide a PCAP file, what is the lifetime of

I've already sent it, greylisting interfered.

> your certificate?
> 
>    # cert=$(postconf -xh smtpd_tls_cert_file) # or just explicit path
>    # openssl x509 -noout -dates -in $cert

It's a letsencrypt certificate and it had about 50 days left.

I forcefully renewed it for testing (including a new key), but it didn't help.

            Not Before: Oct 13 18:28:47 2022 GMT
            Not After : Jan 11 18:28:46 2023 GMT

Best regards
Gerald

Reply via email to