>>>> This server does not support TLS 1.3 yet and TLS 1.2 is the only >>>> version currently allowed for submission. > > That sounds like a rather old (EOL) version of OpenSSL. TLS 1.3 > support was added in OpenSSL 1.1.1 [11 Sep 2018]. Are you using > OpenSSL 1.1.0 or the even older 1.0.2?
It's CentOS 7 - RedHat sometimes does backports but version numbers usually don't change. Name : openssl Version : 1.0.2k Release : 25.el7_9 Architecture: x86_64 Source RPM : openssl-1.0.2k-25.el7_9.src.rpm Build Date : Mon 28 Mar 2022 05:43:15 PM CEST Build Host : x86-01.bsys.centos.org This seems to be the latest version. CentOS 7 is supported until 2024-06-30. Migration to CentOS 8 was planned but with RedHat withdrawing support (turning CentOS 8 into CentOS stream, a rolling release distribution for testing), I'm planning for Alma/Rocky 9. >>> Do you have "tls_preempt_cipherlist = yes"? I wonder why AES128 is used >>> as opposed to AES256. >> >> Yes, sorry, I've tried different options while troubleshooting. >> >> With tls_preempt_cipherlist unset it logs: >> >> Anonymous TLS connection established from <redacted>: TLSv1.2 with cipher >> ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits) > > Though I'll see it if you provide a PCAP file, what is the lifetime of I've already sent it, greylisting interfered. > your certificate? > > # cert=$(postconf -xh smtpd_tls_cert_file) # or just explicit path > # openssl x509 -noout -dates -in $cert It's a letsencrypt certificate and it had about 50 days left. I forcefully renewed it for testing (including a new key), but it didn't help. Not Before: Oct 13 18:28:47 2022 GMT Not After : Jan 11 18:28:46 2023 GMT Best regards Gerald