On Mon, Oct 17, 2022 at 04:09:25PM +0200, GCore GmbH - Gerald Galster wrote:

> > If possible, please ask the other user whether the alternative
> > certificate again sports a mismatched hostname.  It is somewhat
> > plausible that the Microsoft bug doesn't fire when certificate
> > chain validation bails out early due to the mismatched hostname.
> 
> Attached is the pcap of another server where Outlook is able to
> send emails with session tickets enabled.
> 
> This server (<redacted1>) and the other (<redacted2>)
> are running the same software stack:
> 
> - CentOS 7
> - postfix-3.4.16 (self compiled)
> - openssl-1.0.2k-25.el7_9.x86_64
> - certbot-1.11.0-1.el7.noarch
> 
>   (no hostname mismatch anywhere)
> 
> Letsencrypt chain cerfiticates are identical on both servers.  Only
> difference is that <redacted1> cert has three SANs (active/active with
> dovecot replication). But this does not matter from a ssl perspective.

Yes, indeed session ticket ACKed by server.  Assuming the Windows client
was indeed patched, the only visible difference is minor cert defailts
(3 SANs).

> I think it's Microsoft's turn to check what's going on. 

This bug feels like uninitialised data, which is influenced by whatever
random thing lands in memory as a result of previous computations.

-- 
    Viktor.

Reply via email to