[pfx] Re: SSL cert authority, letsencrypt error

2025-05-08 Thread Carl Brewer via Postfix-users
smtpd_tls_key_file = /usr/local/etc/letsencrypt/live/rollcage13.aboc.net.au/privkey.pem You've arrived at the correct setting before I had a chance to suggest it. It seems to be working, but the test on https://ssl-tools.net/mailservers/rollcage13.aboc.net.au Is still moaning about an auth

[pfx] Re: SSL cert authority, letsencrypt error

2025-05-08 Thread Viktor Dukhovni via Postfix-users
/etc/letsencrypt/live/rollcage13.aboc.net.au/privkey.pem You've arrived at the correct setting before I had a chance to suggest it. > It seems to be working, but the test on > https://ssl-tools.net/mailservers/rollcage13.aboc.net.au > Is still moaning about an authority. If the test

[pfx] Re: SSL cert authority, letsencrypt error

2025-05-08 Thread Carl Brewer via Postfix-users
thing as long as the certs are in the correct order. -Dan On May 8, 2025, at 15:34, Carl Brewer via Postfix-users wrote: Hi, I've been running postscript on a FreeBSD 13.x server with Letsencrypt running as a cron job to keep SSL certs up to date automagically : in main.cf : smt

[pfx] Re: SSL cert authority, letsencrypt error

2025-05-08 Thread Carl Brewer via Postfix-users
vkey.pem It seems to be working, but the test on https://ssl-tools.net/mailservers/rollcage13.aboc.net.au Is still moaning about an authority. ___ Postfix-users mailing list -- postfix-users@postfix.org To unsubscribe send an email to postfix-users-le...@postfix.org

[pfx] Re: SSL cert authority, letsencrypt error

2025-05-08 Thread Dan Mahoney via Postfix-users
your cert chain, it will do the right thing as long as the certs are in the correct order. -Dan > On May 8, 2025, at 15:34, Carl Brewer via Postfix-users > wrote: > > > Hi, > > I've been running postscript on a FreeBSD 13.x server with Letsencrypt > runnin

[pfx] Re: SSL cert authority, letsencrypt error

2025-05-08 Thread Ken Biggs via Postfix-users
will do the right > thing as long as the certs are in the correct order. > > -Dan > >> On May 8, 2025, at 15:34, Carl Brewer via Postfix-users >> wrote: >> >> >> Hi, >> >> I've been running postscript on a FreeBSD 13.x server with Letse

[pfx] SSL cert authority, letsencrypt error

2025-05-08 Thread Carl Brewer via Postfix-users
Hi, I've been running postscript on a FreeBSD 13.x server with Letsencrypt running as a cron job to keep SSL certs up to date automagically : in main.cf : smtpd_tls_security_level = may smtpd_tls_cert_file = /usr/local/etc/letsencrypt/live/rollcage13.aboc.net.au/cer

[pfx] Re: outlook ssl failure

2024-12-26 Thread Bill Cole via Postfix-users
On 2024-12-24 at 19:27:29 UTC-0500 (Tue, 24 Dec 2024 19:27:29 -0500 (EST)) Wietse Venema via Postfix-users is rumored to have said: Bill Cole via Postfix-users: [...] There's nothing technically wrong here, at least not that is diagnosable from your end. MS just does strange things. They

[pfx] Re: outlook ssl failure

2024-12-25 Thread Randy Bush via Postfix-users
>> early here and not enough coffee. why would i see different results >> for the server's v4 address than its v6 address? > > You (as others have) might some day deploy separate actual servers > behind a single logical host with multiple IP addresses sure. makes sense for some deployments. ju

[pfx] Re: outlook ssl failure

2024-12-25 Thread Viktor Dukhovni via Postfix-users
On Wed, Dec 25, 2024 at 08:42:51AM -0800, Randy Bush via Postfix-users wrote: > >>> Randy, I'm disappointed > >> And I embarrassed. clearly I blew it when creating the new mx > >> target. > > I am glad you took the friendly jibe in stride. > > stride? i blew it badly, a real stoopid. > > > http

[pfx] Re: outlook ssl failure

2024-12-25 Thread Randy Bush via Postfix-users
>>> Randy, I'm disappointed >> And I embarrassed. clearly I blew it when creating the new mx >> target. > I am glad you took the friendly jibe in stride. stride? i blew it badly, a real stoopid. > https://list.sys4.de/hyperkitty/list/dane-us...@list.sys4.de/thread/NKDBQABSTAAWLTHSZKC7P3HALF7VE5

[pfx] Re: outlook ssl failure

2024-12-24 Thread Viktor Dukhovni via Postfix-users
On Tue, Dec 24, 2024 at 09:08:41PM -0800, Randy Bush via Postfix-users wrote: > > Randy, I'm disappointed > > And I embarrassed. clearly I blew it when creating the new mx target. I am glad you took the friendly jibe in stride. > > I' like to suggest some serious attention to monitoring > > b

[pfx] Re: outlook ssl failure

2024-12-24 Thread Randy Bush via Postfix-users
> Randy, I'm disappointed and i embarrassed. clearly i blew it when creating the new mx target. i just regenerated it with m0.rg.net:/home/randy# openssl x509 -in /etc/letsencrypt/live/m0.rg.net/fullchain.pem -noout -pubkey | openssl pkey -pubin -outform DER | openssl sha256 SHA2-256(stdin)=

[pfx] Re: outlook ssl failure

2024-12-24 Thread Viktor Dukhovni via Postfix-users
ound.protection.outlook.com[40.107.44.102]: > TLS cipher list "aNULL:-aNULL:HIGH:MEDIUM:+RC4:@STRENGTH" > 2024-12-24T20:27:05.483096+00:00 m0 postfix/smtpd[188336]: SSL_accept:before > SSL initialization > 2024-12-24T20:27:05.692962+00:00 m0 postfix/smtpd[188336]: SSL_accep

[pfx] Re: outlook ssl failure

2024-12-24 Thread Randy Bush via Postfix-users
] 2024-12-25T00:41:26.771423+00:00 m0 postfix/smtpd[2063]: mailout1.joker.csl.de[194.245.148.146]: TLS cipher list "aNULL:-aNULL:HIGH:MEDIUM:+RC4:@STRENGTH" 2024-12-25T00:41:26.771863+00:00 m0 postfix/smtpd[2063]: SSL_accept:before SSL initialization 2024-12-25T00:41:26.888519+00:00

[pfx] Re: outlook ssl failure

2024-12-24 Thread Wietse Venema via Postfix-users
Bill Cole via Postfix-users: > On 2024-12-24 at 18:10:24 UTC-0500 (Tue, 24 Dec 2024 15:10:24 -0800) > Randy Bush via Postfix-users > is rumored to have said: > > > and without 1.3 > > > [...] > > 2024-12-24T23:09:18.525130+00:00 m0 postfix/smtpd[1379]: Anonymous TLS > > connection established fr

[pfx] Re: outlook ssl failure

2024-12-24 Thread Wietse Venema via Postfix-users
Randy Bush via Postfix-users: > fwiw, i tried > smtpd_tls_session_cache_timeout = 0 > and > smtpd_tls_session_cache_timeout = ridiculous > > both with and without `!TLSv1.3` > > no mail transfer This will have to wait until Viktor reads this thread. This is a failure that happens after t

[pfx] Re: outlook ssl failure

2024-12-24 Thread Bill Cole via Postfix-users
On 2024-12-24 at 18:10:24 UTC-0500 (Tue, 24 Dec 2024 15:10:24 -0800) Randy Bush via Postfix-users is rumored to have said: and without 1.3 [...] 2024-12-24T23:09:18.525130+00:00 m0 postfix/smtpd[1379]: Anonymous TLS connection established from mail-eastasiaazrln102210001.outbound.protection

[pfx] Re: outlook ssl failure

2024-12-24 Thread Randy Bush via Postfix-users
fwiw, i tried smtpd_tls_session_cache_timeout = 0 and smtpd_tls_session_cache_timeout = ridiculous both with and without `!TLSv1.3` no mail transfer randy ___ Postfix-users mailing list -- postfix-users@postfix.org To unsubscribe send an email

[pfx] Re: outlook ssl failure

2024-12-24 Thread Randy Bush via Postfix-users
] 2024-12-24T23:19:14.101248+00:00 m0 postfix/smtpd[1414]: mdpmta-as-1p-177349-txn.sys.comcast.net[96.103.94.54]: TLS cipher list "aNULL:-aNULL:HIGH:MEDIUM:+RC4:@STRENGTH" 2024-12-24T23:19:14.101669+00:00 m0 postfix/smtpd[1414]: SSL_accept:before SSL initialization 2024-12-24T23:19:14.13

[pfx] Re: outlook ssl failure

2024-12-24 Thread Randy Bush via Postfix-users
tfix/smtpd[1379]: SSL_accept:before SSL initialization 2024-12-24T23:09:18.342294+00:00 m0 postfix/smtpd[1379]: SSL_accept:before SSL initialization 2024-12-24T23:09:18.342369+00:00 m0 postfix/smtpd[1379]: SSL_accept:SSLv3/TLS read client hello 2024-12-24T23:09:18.342428+00:00 m0 postfix/

[pfx] Re: outlook ssl failure

2024-12-24 Thread Randy Bush via Postfix-users
: SSL_accept:before SSL initialization 2024-12-24T23:07:06.761254+00:00 m0 postfix/smtpd[1343]: SSL_accept:before SSL initialization 2024-12-24T23:07:06.761654+00:00 m0 postfix/smtpd[1343]: SSL_accept:SSLv3/TLS read client hello 2024-12-24T23:07:06.765267+00:00 m0 postfix/smtpd[1343]: SSL_acce

[pfx] Re: outlook ssl failure

2024-12-24 Thread Wietse Venema via Postfix-users
Randy Bush via Postfix-users: > > Maybe this will work around the problem: > > smtpd_tls_protocols = >=TLSv1 !TLSv1.3 > > because of all the warnings, i `systemctl restart`ed postfix. still whined. > > 2024-12-24T21:55:54.219911+00:00 m0 postfix/master[189212]: warning: > /etc/postfix/main.

[pfx] Re: outlook ssl failure

2024-12-24 Thread Randy Bush via Postfix-users
rotection.outlook.com[40.107.215.121]: TLS cipher list "aNULL:-aNULL:HIGH:MEDIUM:+RC4:@STRENGTH" 2024-12-24T21:56:21.768605+00:00 m0 postfix/smtpd[189229]: SSL_accept:before SSL initialization 2024-12-24T21:56:21.985225+00:00 m0 postfix/smtpd[189229]: SSL_accept:before SSL initialization 2024

[pfx] Re: outlook ssl failure

2024-12-24 Thread Wietse Venema via Postfix-users
2] > 2024-12-24T20:27:05.482713+00:00 m0 postfix/smtpd[188336]: > mail-koreacentralazon11023102.outbound.protection.outlook.com[40.107.44.102]: > TLS cipher list "aNULL:-aNULL:HIGH:MEDIUM:+RC4:@STRENGTH" > 2024-12-24T20:27:05.483096+00:00 m0 postfix/smtpd[188336]: SSL_accept:befo

[pfx] outlook ssl failure

2024-12-24 Thread Randy Bush via Postfix-users
:05.483096+00:00 m0 postfix/smtpd[188336]: SSL_accept:before SSL initialization 2024-12-24T20:27:05.692962+00:00 m0 postfix/smtpd[188336]: SSL_accept:before SSL initialization 2024-12-24T20:27:05.693067+00:00 m0 postfix/smtpd[188336]: SSL_accept:SSLv3/TLS read client hello 2024-12-24T20:27:05.69

[pfx] Re: SSL Log Errors. Should worry?

2024-12-16 Thread Geert Hendrickx via Postfix-users
On Mon, Dec 16, 2024 at 16:32:27 +0100, Matus UHLAR - fantomas via Postfix-users wrote: > RH does not usually upgrade major versions of libraries, what's happened? RHEL 9.4 actually rebased OpenSSL 3.0.7 => 3.2.2. (which is not unusual in dot releases) But Postfix was rebuilt as well, at least

[pfx] Re: SSL Log Errors. Should worry?

2024-12-16 Thread postfix--- via Postfix-users
What about openssl, which is current version in RHEL9? It's Oracle's repo for RHEL9. Name : openssl Epoch: 1 Version : 3.2.2 Release : 6.0.1.el9_5 Architecture : x86_64 Size : 1.5 M Source : openssl-3.2.2-6.0.1.el9_5.src.rpm Repository :

[pfx] Re: SSL Log Errors. Should worry?

2024-12-16 Thread Viktor Dukhovni via Postfix-users
On Mon, Dec 16, 2024 at 07:32:15AM -0500, postfix--- via Postfix-users wrote: > This is what the packages were built with. Is this right/wrong? Do I have > options that don't involve building from source? Do I need to wait until the > package maintainers build against a newer SSL?

[pfx] Re: SSL Log Errors. Should worry?

2024-12-16 Thread Matus UHLAR - fantomas via Postfix-users
involve building from source? Do I need to wait until the package maintainers build against a newer SSL? RH does not usually upgrade major versions of libraries, what's happened? The rebuild should not be needed, unless you encounter any incompatibility problems. I believe RH does check t

[pfx] Re: SSL Log Errors. Should worry?

2024-12-16 Thread postfix--- via Postfix-users
007fe45531) libcrypt.so.2 => /lib64/libcrypt.so.2 (0x7fe454f28000) libk5crypto.so.3 => /lib64/libk5crypto.so.3 (0x7fe454ddd000) This is what the packages were built with. Is this right/wrong? Do I have options that don't involve building from source? Do I need to wait un

[pfx] Re: SSL Log Errors. Should worry?

2024-12-16 Thread Viktor Dukhovni via Postfix-users
On Mon, Dec 16, 2024 at 04:06:10AM -0500, postfix--- via Postfix-users wrote: > Just to double check this isn't a configuration library issue on my end? > Someone is messing around? I have dozens of these repeated in the logs. You've recently installed an updated OpenSSL package on your system.

[pfx] SSL Log Errors. Should worry?

2024-12-16 Thread postfix--- via Postfix-users
Just to double check this isn't a configuration library issue on my end? Someone is messing around? I have dozens of these repeated in the logs. Dec 15 23:07:50 host postfix/smtpd[3181]: warning: run-time library vs. compile-time header version mismatch: OpenSSL 3.2.0 may not be compatible w

[pfx] Re: Parsing of failed SSL connections in the maillog

2024-11-15 Thread Kevin Pratt via Postfix-users
That is what I thought. Just wanted to be sure. Thank you. > On Nov 15, 2024, at 4:00 PM, postfix--- via Postfix-users > wrote: > >  >> >> I was wondering if there is anyway to use the maillog with the SSL >> messages to determine who was trying to send

[pfx] Re: Parsing of failed SSL connections in the maillog

2024-11-15 Thread postfix--- via Postfix-users
I was wondering if there is anyway to use the maillog with the SSL messages to determine who was trying to send messages during that window. You have the IP/Hostname of the servers connecting to your server. If you are asking who as in the person, as in what the From: email address was going

[pfx] Parsing of failed SSL connections in the maillog

2024-11-15 Thread Kevin Pratt via Postfix-users
Hello all, I am unsure if this is possible as it would probably be a security risk, but I wanted to ask anyway. A few days ago I made a mistake when configuring a new SSL cerfiticate for my Postfix install. This resulted in about 10 days of downtime while we sorted out what the actual problem

[pfx] Re: TLS handshaking: SSL_accept() failed: error:0A000412:SSL routines::sslv3 alert bad certificate: SSL alert number 42

2024-11-10 Thread Wietse Venema via Postfix-users
Scott K via Postfix-users: > My mail server stopped working with this error: > > TLS handshaking: SSL_accept() failed: error:0A000412:SSL routines::sslv3 > alert bad certificate: SSL alert number 42 I have some questions: A complete logfile record that shows the name of the Postfix

[pfx] Re: TLS handshaking: SSL_accept() failed: error:0A000412:SSL routines::sslv3 alert bad certificate: SSL alert number 42

2024-11-10 Thread Viktor Dukhovni via Postfix-users
On Sun, Nov 10, 2024 at 07:16:12AM -0500, Scott K via Postfix-users wrote: > My mail server stopped working with this error: > > TLS handshaking: SSL_accept() failed: error:0A000412:SSL routines::sslv3 > alert bad certificate: SSL alert number 42 Far too little context, bu

[pfx] TLS handshaking: SSL_accept() failed: error:0A000412:SSL routines::sslv3 alert bad certificate: SSL alert number 42

2024-11-10 Thread Scott K via Postfix-users
My mail server stopped working with this error: TLS handshaking: SSL_accept() failed: error:0A000412:SSL routines::sslv3 alert bad certificate: SSL alert number 42 ___ Postfix-users mailing list -- postfix-users@postfix.org To unsubscribe send an email

[pfx] Re: ssl/tls error in mail.log

2024-11-08 Thread Viktor Dukhovni via Postfix-users
On Wed, Sep 25, 2024 at 10:40:30AM +1000, raf via Postfix-users wrote: > > Sep 24 21:49:18 mxback postfix/smtps/smtpd[24711]: warning: TLS library > > problem: error:0A6C:SSL routines::bad key > > share:../ssl/statem/extensions_srvr.c:646: > > But I'm

[pfx] Re: ssl/tls error in mail.log

2024-09-24 Thread raf via Postfix-users
tps/smtpd[24711]: SSL_accept error from > unknown[165.154.138.57]: -1 > Sep 24 21:49:18 mxback postfix/smtps/smtpd[24711]: warning: TLS library > problem: error:0A6C:SSL routines::bad key > share:../ssl/statem/extensions_srvr.c:646: > Sep 24 21:49:18 mxback postfix/smtps/smtpd[24711]: l

[pfx] Re: ssl/tls error in mail.log

2024-09-24 Thread Viktor Dukhovni via Postfix-users
tps/smtpd[24711]: SSL_accept error from > unknown[165.154.138.57]: -1 > Sep 24 21:49:18 mxback postfix/smtps/smtpd[24711]: warning: TLS library > problem: error:0A6C:SSL routines::bad key > share:../ssl/statem/extensions_srvr.c:646: > Sep 24 21:49:18 mxback postfix/smtps/smtpd[24711]: lost c

[pfx] Re: Fwd: Re: ssl update needs rebuilds

2024-06-08 Thread Steffen Nurpmeso via Postfix-users
Viktor Dukhovni via Postfix-users wrote in : |On Sat, Jun 08, 2024 at 07:12:01PM -0400, Wietse Venema via Postfix-users \ |wrote: |>>|> Jun 7 23:41:16 outwall/smtpd[19222]: warning: run-time library \ |>>|> vs. compile-time header version mismatch: OpenSSL 3.3.0 may not \ |>>|> be comp

[pfx] Re: Fwd: Re: ssl update needs rebuilds

2024-06-08 Thread Steffen Nurpmeso via Postfix-users
(my logs rotate after 200 kilobytes). |> This is postfix. I must say, out of my head i have no idea |> whether it has always been like that for minor releases for one, |> and whether that is also true for LibreSSL, and the other SSL |> libraries that postfix possibly works with. An

[pfx] Re: Fwd: Re: ssl update needs rebuilds

2024-06-08 Thread Viktor Dukhovni via Postfix-users
On Sat, Jun 08, 2024 at 07:12:01PM -0400, Wietse Venema via Postfix-users wrote: > > |> Jun 7 23:41:16 outwall/smtpd[19222]: warning: run-time library \ > > |> vs. compile-time header version mismatch: OpenSSL 3.3.0 may not \ > > |> be compatible with OpenSSL 3.2.0 > > ... > > |[.] Ope

[pfx] Re: Fwd: Re: ssl update needs rebuilds

2024-06-08 Thread Wietse Venema via Postfix-users
the API and ABI will remain compatible". Based on that, Postfix will not complain when the build-time and run-time versions differ only in the Patch release number. > This is postfix. I must say, out of my head i have no idea > whether it has always been like that for minor releases for

[pfx] Fwd: Re: ssl update needs rebuilds

2024-06-08 Thread Steffen Nurpmeso via Postfix-users
Jeffrey Walton (who is noloader at gmail) pointed out an interesting point regarding some postfix log message that can be seen on AlpineLinux edge (again). --- Forwarded from Steffen Nurpmeso --- Date: Sat, 08 Jun 2024 02:44:46 +0200 Author: Steffen Nurpmeso ... Subject: Re: ssl update needs

[pfx] Re: error:0A0000C1:SSL routines::no shared cipher:ssl/st atem/statem_srvr.c:2220:

2023-09-11 Thread Viktor Dukhovni via Postfix-users
On Mon, Sep 11, 2023 at 09:30:27PM -0400, Alex via Postfix-users wrote: > I have a postfix-3.7.4 server with openssl-3.0.9 on fedora38 and > receiving the following errors in my logs: > > Sep 11 14:19:51 cipher postfix/smtps/smtpd[3992923]: warning: TLS library > problem: err

[pfx] error:0A0000C1:SSL routines::no shared cipher:ssl/st atem/statem_srvr.c:2220:

2023-09-11 Thread Alex via Postfix-users
Hi, I have a postfix-3.7.4 server with openssl-3.0.9 on fedora38 and receiving the following errors in my logs: Sep 11 14:19:51 cipher postfix/smtps/smtpd[3992923]: warning: TLS library problem: error:0AC1:SSL routines::no shared cipher:ssl/statem/statem_srvr.c:2220: What kind of clients is

[pfx] Re: identifying sender failing ssl/tls cipher (ECDSA server certificate???)

2023-08-14 Thread Viktor Dukhovni via Postfix-users
On Sat, Aug 12, 2023 at 12:53:35PM -0400, Viktor Dukhovni wrote: > > Length: 00 00 9c (156) > > ... > > 0x01,0x88 7 ??? > > ... > > 0xC0,0x12 14 ECDHE-RSA-DES-CBC3-SHA Au=RSA > > ... > > 0x00,0x40 22 DHE-DSS-AES128-SHA256 Au=DSS > > ... > > All the ciphersuites offered except one (DSS) are RSA

[pfx] Re: identifying sender failing ssl/tls cipher (ECDSA server certificate???)

2023-08-12 Thread pgnd via Postfix-users
Consider (after carefully reading over the docs explaining the required ordering of the content) switching to consolidated preferred syntax: smtpd_tls_chain_files = >> This feature is available in Postfix 3.4 and later. that one snuck by me :-/ convenient, tho, thx! No tool. J

[pfx] Re: identifying sender failing ssl/tls cipher (ECDSA server certificate???)

2023-08-12 Thread Viktor Dukhovni via Postfix-users
On Sat, Aug 12, 2023 at 02:03:56PM -0400, Viktor Dukhovni via Postfix-users wrote: > > checking further > > > > grep smtpd_tls main.cf | grep file > > smtpd_tls_dh1024_param_file=${config_directory}/dh4096.pem > > smtpd_tls_eckey_file

[pfx] Re: identifying sender failing ssl/tls cipher (ECDSA server certificate???)

2023-08-12 Thread Viktor Dukhovni via Postfix-users
On Sat, Aug 12, 2023 at 02:27:14PM -0400, pgnd wrote: > >> Handshake type: 01 (Client Hello) > >> Length: 00 00 9c (156) > > > One thing I failed to mention is that length of 156 is rather unexpected > > ... > > And there's also that mysterious 0x01,0x88 cipher, which is not listed > > in the IAN

[pfx] Re: identifying sender failing ssl/tls cipher (ECDSA server certificate???)

2023-08-12 Thread pgnd via Postfix-users
That'd then be the file to analyse: # tshark -nr /tmp/tls.pcap -V ssl thx for the ez tutorial after the key file cleanup, ... Untrusted TLS connection established from esa.hc2802-61.iphmx.com[68.232.155.227]: TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 ...

[pfx] Re: identifying sender failing ssl/tls cipher (ECDSA server certificate???)

2023-08-12 Thread Viktor Dukhovni via Postfix-users
On Sat, Aug 12, 2023 at 12:53:35PM -0400, Viktor Dukhovni via Postfix-users wrote: > > Handshake type: 01 (Client Hello) > > Length: 00 00 9c (156) One thing I failed to mention is that length of 156 is rather unexpected here, because the containing TLS record layer header promised a length of 1

[pfx] Re: identifying sender failing ssl/tls cipher (ECDSA server certificate???)

2023-08-12 Thread Viktor Dukhovni via Postfix-users
and host 192.0.2.1 Then identify a session (client source port) of interest and extract just that one connection: # tcpdump -r /tmp/smtp.pcap -s0 -w /tmp/tls.pcap tcp port 12345 That'd then be the file to analyse: # tshark -nr /tmp/tls.pcap -V ssl > > My money is on an ECDS

[pfx] Re: identifying sender failing ssl/tls cipher (ECDSA server certificate???)

2023-08-12 Thread Viktor Dukhovni via Postfix-users
On Sat, Aug 12, 2023 at 01:42:04PM -0400, pgnd wrote: > after the key file cleanup, > > ... > Untrusted TLS connection established from > esa.hc2802-61.iphmx.com[68.232.155.227]: TLSv1.2 with cipher > ECDHE-RSA-AES128-GCM-SHA256 > ... > > seems, in fact, EC-ready That's ECDHE key exchan

[pfx] Re: identifying sender failing ssl/tls cipher (ECDSA server certificate???)

2023-08-12 Thread pgnd via Postfix-users
one'd hope that banks and hospitals might be a bit more up-to-date on their end. after the key file cleanup, ... Untrusted TLS connection established from esa.hc2802-61.iphmx.com[68.232.155.227]: TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 ... seems, in fact, EC-ready

[pfx] Re: identifying sender failing ssl/tls cipher (ECDSA server certificate???)

2023-08-12 Thread pgnd via Postfix-users
t, tcpdump -i eth0 "tcp port 25 and (tcp[((tcp[12] & 0xf0) >> 2)] = 0x16)" is still unhelpful. My money is on an ECDSA server certificate on the receiving server's end, right? which is still a bit too "exotic" for some older SMTP clients. here, checkin

[pfx] Re: identifying sender failing ssl/tls cipher (ECDSA server certificate???)

2023-08-12 Thread Viktor Dukhovni via Postfix-users
On Sat, Aug 12, 2023 at 09:47:57AM -0400, pgnd via Postfix-users wrote: > postconf mail_version > mail_version = 3.8.1 As background, the RELEASE_NOTES for 3.8 mention: - Postfix default settings now exclude the following deprecated or unused ciphers (SEED, IDEA, 3D

[pfx] Re: identifying sender failing ssl/tls cipher ?

2023-08-12 Thread pgnd via Postfix-users
why? not my own server/config Can you explain how each of these is better than the Postfix defaults? all but two _are_ at defaults postconf -n | grep -i tls | grep -i cipher | sort @D smtpd_tls_ciphers = medium @D smtpd_tls_exclude_ciphers = @D

[pfx] Re: identifying sender failing ssl/tls cipher ?

2023-08-12 Thread Bastian Blank via Postfix-users
On Sat, Aug 12, 2023 at 09:47:57AM -0400, pgnd via Postfix-users wrote: > postconf -n | grep -i tls | grep -i cipher > smtp_tls_ciphers = medium > smtp_tls_exclude_ciphers = EXP, LOW, MEDIUM, aNULL, eNULL, SRP, > PSK, kDH, DH, kRSA, DHE, DSS, RC4, DES, IDEA, SEED,

[pfx] Re: identifying sender failing ssl/tls cipher ?

2023-08-12 Thread Bill Cole via Postfix-users
aNULL" 2023-08-10T19:13:17.457948-04:00 cmx0024 postfix/psint/smtpd[27820]: SSL_accept:before SSL initialization 2023-08-10T19:13:17.457997-04:00 cmx0024 postfix/psint/smtpd[27820]: read from 5568B971BE70 [5568B9729063] (5 bytes => -1) 2023-08-10T19:13:17.524878-04:00 cmx0024 postfix/psin

[pfx] identifying sender failing ssl/tls cipher ?

2023-08-12 Thread pgnd via Postfix-users
24 postfix/psint/smtpd[27820]: SSL_accept:before SSL initialization 2023-08-10T19:13:17.457997-04:00 cmx0024 postfix/psint/smtpd[27820]: read from 5568B971BE70 [5568B9729063] (5 bytes => -1) 2023-08-10T19:13:17.524878-04:00 cmx0024 postfix/psint/smtpd[27820]: read from

[pfx] Re: postfix and ssl provlem

2023-05-08 Thread natan via Postfix-users
smtps/smtpd[6901]: warning: TLS library problem: error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca: ../ssl/record/rec_layer_s3.c:1544:SSL alert number 48: Cert is new (renew) and  openssl x509 -in ... and key is ok server and client not connect via ssl3 The client cannot validate

[pfx] Re: postfix and ssl provlem

2023-05-08 Thread Viktor Dukhovni via Postfix-users
On Mon, May 08, 2023 at 01:29:55PM +0200, natan via Postfix-users wrote: > I have some problem with cert - user who connect via 465 > > postfix/smtps/smtpd[6901]: warning: TLS library problem: > error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca: > ../ssl/record

[pfx] Re: postfix and ssl provlem

2023-05-08 Thread natan via Postfix-users
Hi Problem is only via web aplications (php) W dniu 8.05.2023 o 13:29, natan via Postfix-users pisze: Hi I have some problem with cert - user who connect via 465 postfix/smtps/smtpd[6901]: warning: TLS library problem: error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:../ssl

[pfx] postfix and ssl provlem

2023-05-08 Thread natan via Postfix-users
Hi I have some problem with cert - user who connect via 465 postfix/smtps/smtpd[6901]: warning: TLS library problem: error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:../ssl/record/rec_layer_s3.c:1544:SSL alert number 48: Debian10 Cert is new (renew) and  openssl x509 -in

Re: mysql/mariadb authentication over ssl

2023-02-13 Thread David Koski
g system with Postfix 3.5.17+debian11u1 and MariaDB 10.5. After adding ssl certificates and configurations it stopped authenticating.  I don't know if it is Postfix or MariaDB.  Using ngrep to monitor the stream, I can see initial encrypted traffic followed by clear text.  It appears to be a

mysql/mariadb authentication over ssl

2023-02-13 Thread David Koski
I have a working system with Postfix 3.5.17+debian11u1 and MariaDB 10.5.  After adding ssl certificates and configurations it stopped authenticating.  I don't know if it is Postfix or MariaDB.  Using ngrep to monitor the stream, I can see initial encrypted traffic followed by clear text

Re: Postfix with opendkim generates "ssl error"

2023-02-11 Thread Nicholas Jacobs
A sáb, 11-02-2023 às 14:37 -0500, Viktor Dukhovni escreveu: > On Sat, Feb 11, 2023 at 06:46:14PM +, Nicholas Jacobs wrote: > > > > > opendkim[3223]: F29AA21C4C: SSL error:0D07207B:asn1 encoding > > > > routines:ASN1_get_object:header too long > > >

Re: Postfix with opendkim generates "ssl error"

2023-02-11 Thread Viktor Dukhovni
On Sat, Feb 11, 2023 at 07:47:43PM +0100, Benny Pedersen wrote: > > No, I checked that too. > > opendkim-testkey -d complete-web-solutions.com -k > > /etc/dkimkeys/202302081.private -s 202302081 -v -x /etc/opendkim.conf > > gives: > > opendkim-testkey: key secure > > is only dnssec ?, not if dki

Re: Postfix with opendkim generates "ssl error"

2023-02-11 Thread Viktor Dukhovni
On Sat, Feb 11, 2023 at 06:46:14PM +, Nicholas Jacobs wrote: > > > opendkim[3223]: F29AA21C4C: SSL error:0D07207B:asn1 encoding > > > routines:ASN1_get_object:header too long > > > opendkim[3223]: F29AA21C4C: dkim_eom(): resource unavailable: > > > d2i_Priv

Re: Postfix with opendkim generates "ssl error"

2023-02-11 Thread Benny Pedersen
Nicholas Jacobs skrev den 2023-02-11 18:24: No, I checked that too. opendkim-testkey -d complete-web-solutions.com -k /etc/dkimkeys/202302081.private -s 202302081 -v -x /etc/opendkim.conf gives: opendkim-testkey: key secure is only dnssec ?, not if dkim pass ?, or both ?

Re: Postfix with opendkim generates "ssl error"

2023-02-11 Thread Nicholas Jacobs
A sáb, 11-02-2023 às 13:33 -0500, Viktor Dukhovni escreveu: > On Sat, Feb 11, 2023 at 03:41:06PM +, nj140...@yahoo.com wrote: > > > opendkim[3223]: F29AA21C4C: SSL error:0D07207B:asn1 encoding > > routines:ASN1_get_object:header too long > > opendkim[3223]: F29AA21C

Re: Postfix with opendkim generates "ssl error"

2023-02-11 Thread Viktor Dukhovni
On Sat, Feb 11, 2023 at 03:41:06PM +, nj140...@yahoo.com wrote: > opendkim[3223]: F29AA21C4C: SSL error:0D07207B:asn1 encoding > routines:ASN1_get_object:header too long > opendkim[3223]: F29AA21C4C: dkim_eom(): resource unavailable: > d2i_PrivateKey_bio() failed The ASN.1 enc

Re: Postfix with opendkim generates "ssl error"

2023-02-11 Thread Nicholas Jacobs
A sáb, 11-02-2023 às 10:36 -0700, Shawn Heisey escreveu: > On 2/11/23 08:41, nj140...@yahoo.com wrote: > > opendkim[3223]: F29AA21C4C: SSL error:0D07207B:asn1 encoding > > routines:ASN1_get_object:header too long > > Others running into something similar found that the

Re: Postfix with opendkim generates "ssl error"

2023-02-11 Thread Nicholas Jacobs
A sáb, 11-02-2023 às 18:33 +0100, Matus UHLAR - fantomas escreveu: > > > On February 11, 2023 3:41:06 PM UTC, nj140...@yahoo.com wrote: > > > > Trying to send an email from n...@complete-web-solutions.com on > > > > the > > > > host sv9.complete-web-solutions.com results in the following > > > > me

Re: Postfix with opendkim generates "ssl error"

2023-02-11 Thread Shawn Heisey
On 2/11/23 08:41, nj140...@yahoo.com wrote: opendkim[3223]: F29AA21C4C: SSL error:0D07207B:asn1 encoding routines:ASN1_get_object:header too long Others running into something similar found that the file either was in DOS format or had a BOM at the beginning -- characters were present that

Re: Postfix with opendkim generates "ssl error"

2023-02-11 Thread Matus UHLAR - fantomas
On February 11, 2023 3:41:06 PM UTC, nj140...@yahoo.com wrote: > Trying to send an email from n...@complete-web-solutions.com on the > host sv9.complete-web-solutions.com results in the following > messages > in mail.log: > ... > But opendkim seems correctly configured because the command: > open

Re: Postfix with opendkim generates "ssl error"

2023-02-11 Thread Nicholas Jacobs
A sáb, 11-02-2023 às 16:37 +, Scott Kitterman escreveu: > > > On February 11, 2023 3:41:06 PM UTC, nj140...@yahoo.com wrote: > > Trying to send an email from n...@complete-web-solutions.com on the > > host sv9.complete-web-solutions.com results in the following > > messages > > in mail.log: >

Re: Postfix with opendkim generates "ssl error"

2023-02-11 Thread Scott Kitterman
On February 11, 2023 3:41:06 PM UTC, nj140...@yahoo.com wrote: >Trying to send an email from n...@complete-web-solutions.com on the >host sv9.complete-web-solutions.com results in the following messages >in mail.log: >... >But opendkim seems correctly configured because the command: >opendkim-t

Postfix with opendkim generates "ssl error"

2023-02-11 Thread nj140824
Trying to send an email from n...@complete-web-solutions.com on the host sv9.complete-web-solutions.com results in the following messages in mail.log: postfix/cleanup[40982]: F29AA21C4C: message- id=<20230211151120.f29aa21...@sv9.complete-web-solutions.com> opendkim[3223]: F29AA21C4C: SSL

[REVISIONS] How to install SSL Certificate on Dovecot and Postfix

2023-01-26 Thread Turritopsis Dohrnii Teo En Ming
Subject: [REVISIONS] How to install SSL Certificate on Dovecot and Postfix Good day from Singapore, Author: Mr. Turritopsis Dohrnii Teo En Ming (TARGETED INDIVIDUAL) Country: Singapore Date of Implementation: 6 Jan 2023 Friday SECTION ON DOVECOT === # cd /etc/dovecot/conf.d

Re: Connecting postfix to mysql with ssl

2022-12-27 Thread Phil Stracchino
On 12/27/22 13:12, Aaron Axelsen wrote: Output from a command line connection: mysql -h secure-mysql-db.example.com -p -u mysqluser mail --ssl Enter password: Reading table information for completion of table and column names You can turn off this feature to get a quicker startup with -A

Re: Connecting postfix to mysql with ssl

2022-12-27 Thread Aaron Axelsen
On 12/27/2022 11:58 AM, Phil Stracchino wrote: On 12/27/22 12:49, Aaron Axelsen wrote: I've been trying to get the correct recipe of settings to allow postfix to connect to mysql where ssl is required. So far I have the following that is not working: user = mysqluser password = XXX

Re: Connecting postfix to mysql with ssl

2022-12-27 Thread Phil Stracchino
On 12/27/22 12:49, Aaron Axelsen wrote: I've been trying to get the correct recipe of settings to allow postfix to connect to mysql where ssl is required. So far I have the following that is not working: user = mysqluser password = XXX hosts = secure-mysql-db.example.com dbname = mail

Connecting postfix to mysql with ssl

2022-12-27 Thread Aaron Axelsen
I've been trying to get the correct recipe of settings to allow postfix to connect to mysql where ssl is required. So far I have the following that is not working: user = mysqluser password = XXX hosts = secure-mysql-db.example.com dbname = mail query = SELECT 1 FROM users WHERE emai

Re: letsencrypt and SSL alert number 80

2022-12-12 Thread Viktor Dukhovni
On Mon, Dec 12, 2022 at 01:27:59PM -0500, Alex wrote: > Dec 12 13:12:47 xavier postfix-116/smtpd[1683671]: warning: TLS library > problem: error:0A000438:SSL routines::tlsv1 alert internal > error:ssl/record/rec_layer_s3.c:1584:SSL alert number 80: Some remote client encountered an int

Re: letsencrypt and SSL alert number 80

2022-12-12 Thread Gerald Galster
> I'm seeing periodic entries like this in my maillog: > > Dec 12 13:12:47 xavier postfix-116/smtpd[1683671]: warning: TLS library > problem: error:0A000438:SSL routines::tlsv1 alert internal > error:ssl/record/rec_layer_s3.c:1584:SSL alert number 80: [...] >

letsencrypt and SSL alert number 80

2022-12-12 Thread Alex
Hi, I'm seeing periodic entries like this in my maillog: Dec 12 13:12:47 xavier postfix-116/smtpd[1683671]: warning: TLS library problem: error:0A000438:SSL routines::tlsv1 alert internal error:ssl/record/rec_layer_s3.c:1584:SSL alert number 80: I've searched quite a bit for more in

Re: Is pure SSL/TLS termination viable with postfix?

2022-12-08 Thread Jaroslaw Rafa
Dnia 8.12.2022 o godz. 11:29:35 Sam pisze: > My plan is to pass port 465 > straight to haproxy, then haproxy does the encryption in and out. > Ports 587 and 25 won't even be exposed. I only need one port. What > kind of scenario are we trying to prevent? Is your Postfix instance for sending mail

Re: Is pure SSL/TLS termination viable with postfix?

2022-12-08 Thread Viktor Dukhovni
On Thu, Dec 08, 2022 at 11:29:35AM +0400, Sam wrote: > Thank you very much for your quick reply and insight. I went ahead and > disabled wrapper mode in master.cf (and there's no wrapper mode in > main.cf), and I still can't telnet to port 465, even though it's in use > in the container. When I

Re: Is pure SSL/TLS termination viable with postfix?

2022-12-07 Thread Sam
am I missing in this plan? Thank you again. Best regards, Sam On 08/12/2022 1:30 AM, Viktor Dukhovni wrote: On Wed, Dec 07, 2022 at 11:51:32PM +0400, Sam wrote: I would like to run postfix in a docker container, and receive emails through HaProxy with SSL termination. So the setup I wo

Re: Is pure SSL/TLS termination viable with postfix?

2022-12-07 Thread Viktor Dukhovni
On Wed, Dec 07, 2022 at 11:51:32PM +0400, Sam wrote: > I would like to run postfix in a docker container, and receive emails > through HaProxy with SSL termination. So the setup I would like to > achieve is: It is generally preferrable to let Postfix do TLS-termination, so that Postf

Is pure SSL/TLS termination viable with postfix?

2022-12-07 Thread Sam
Hello everyone I would like to run postfix in a docker container, and receive emails through HaProxy with SSL termination. So the setup I would like to achieve is: Web -> My Server -> HaProxy (SSL/TLS decryption) -> Into my server (as localhost with zero encryption) -> dock

Re: Fwd: Re: Postfix 3.5 and outbound TLS/SSL

2022-08-23 Thread raf
On Tue, Aug 23, 2022 at 09:21:33AM -0700, nate wrote: > On 2022-08-22 14:46, Viktor Dukhovni wrote: > > [..] > > > You don't need to sign your own domain in order to secure outbound > > traffic > > to domains that others have signed. You just need a local validating > > resolver such as "unbou

Re: Fwd: Re: Postfix 3.5 and outbound TLS/SSL

2022-08-23 Thread nate
On 2022-08-22 14:46, Viktor Dukhovni wrote: [..] You don't need to sign your own domain in order to secure outbound traffic to domains that others have signed. You just need a local validating resolver such as "unbound", with DNSSEC validation turned on. Ok, yeah I was thinking more of DANE

Re: Fwd: Re: Postfix 3.5 and outbound TLS/SSL

2022-08-22 Thread Viktor Dukhovni
On Tue, Aug 23, 2022 at 01:13:56AM -0400, Demi Marie Obenour wrote: > You should definitely deploy DNSSEC, but only after you are able to > deploy it properly. That means having procedures to avoid nasty DNSSEC- > related downtime. That's needlessly scary and non-specific. Rather, it means, tha

Re: Fwd: Re: Postfix 3.5 and outbound TLS/SSL

2022-08-22 Thread Demi Marie Obenour
On 8/22/22 17:38, nate wrote: > On 2022-08-22 14:30, Viktor Dukhovni wrote: > >> Correct, because there's no point. Mail would be sent whether the >> certificate is trusted or not, and whether or not the DNS-ID matches >> expectations. >> >> Setting up a TLS policy for each domain that's hosted b

  1   2   3   4   5   6   7   8   9   10   >