On 04/12/2023 19:44, Carsten Strotmann (sys4) via Postfix-users wrote:
Hi Dulux-Oz,

On 4 Dec 2023, at 9:20, duluxoz via Postfix-users wrote:

Hi All,

This issue is definitely SELinux related, because it only crops up when SELinux 
is enabled.

I'm getting a `TLS handshake failed for service=smtp peer=[104.199.96.85]:587` 
error when attempting to rely via mailjet (that's who's IP that is) and also 
brevo/sendinblue.

Any one have any ideas (apart from disabling SELinux - that is *NOT* an option) 
 :-)

disabling SElinux is never a good option :)

On which Linux-Distro is this issue happening?

Can you send the SELinux messages from the Linux Audit Subsystem (where SELinux 
send information about policy violations) from around the time the issue is 
reported in the mail log? This would be the command:

ausearch -m avc -i --start <start-time> --end <end-time>

(see "man ausearch" for the syntax of the start- and end-times -- there might 
be a large number of log entries -- try to limit the time to a few minutes before/after 
the error occurred)

I suspect some files have the wrong SElinux security context label, but which 
files that are will be told by the audit log messages.

Greetings

Carsten
_______________________________________________
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org
Hi Carsten

Its Rocky v9.1

That's the funny thing: I've done an `audit2allow -a` and all of the 'errors' are accounted for by update policys, and the suggested `ausearch` produces nothing - zip, narda, nil  :-(

_______________________________________________
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org

Reply via email to