On Mon, Oct 17, 2022 at 04:09:25PM +0200, GCore GmbH - Gerald Galster wrote:
> > If possible, please ask the other user whether the alternative > > certificate again sports a mismatched hostname. It is somewhat > > plausible that the Microsoft bug doesn't fire when certificate > > chain validation bails out early due to the mismatched hostname. > > Attached is the pcap of another server where Outlook is able to > send emails with session tickets enabled. > > This server (<redacted1>) and the other (<redacted2>) > are running the same software stack: > > - CentOS 7 > - postfix-3.4.16 (self compiled) > - openssl-1.0.2k-25.el7_9.x86_64 > - certbot-1.11.0-1.el7.noarch > > (no hostname mismatch anywhere) > > Letsencrypt chain cerfiticates are identical on both servers. Only > difference is that <redacted1> cert has three SANs (active/active with > dovecot replication). But this does not matter from a ssl perspective. Yes, indeed session ticket ACKed by server. Assuming the Windows client was indeed patched, the only visible difference is minor cert defailts (3 SANs). > I think it's Microsoft's turn to check what's going on. This bug feels like uninitialised data, which is influenced by whatever random thing lands in memory as a result of previous computations. -- Viktor.