On Wed, Nov 05, 2014 at 01:27:49PM +0100, Tobias Reckhard wrote:
> Nov 5 12:36:45 pxmail1 postfix/smtp[8378]:
> Trusted TLS connection established to
> mail01.i-sec.tuv.com[193.24.224.9]:25:
> TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)
> Nov 5 12:36:45 pxmail1 postfix/smtp[8378]: >
> mail01.i-sec.tuv.com[193.24.224.9]:25: EHLO mail.customer
> Nov 5 12:36:45 pxmail1 postfix/smtp[8378]: smtp_get: EOF
>
> It looks as though mail01.i-sec.tuv.com dropped the connection, though I
> see no indication of the reason. Strangely, though, in a tcpdump I
> recorded it appears that our customer's system is sending a [RST, ACK]
> packet directly after sending "TLSv1 Application Data", which very
> probably is its EHLO.
You may have read the wrong direction for the Application Data.
The SMTP client speaks first after EHLO.
$ posttls-finger -dsha256 "[mail01.i-sec.tuv.com]"
posttls-finger: Connected to mail01.i-sec.tuv.com[193.24.224.9]:25
posttls-finger: < 220 mail01.i-sec.tuv.com ESMTP
posttls-finger: > EHLO amnesiac.local
posttls-finger: < 250-mail01.i-sec.tuv.com
posttls-finger: < 250-8BITMIME
posttls-finger: < 250-SIZE 104857600
posttls-finger: < 250 STARTTLS
posttls-finger: > STARTTLS
posttls-finger: < 220 Go ahead with TLS
...
posttls-finger: Untrusted TLS connection established to
mail01.i-sec.tuv.com[193.24.224.9]:25: unknown with cipher DHE-RSA-AES256-SHA
(256/256 bits)
posttls-finger: > EHLO amnesiac.local
posttls-finger: < 250-mail01.i-sec.tuv.com
posttls-finger: < 250-8BITMIME
posttls-finger: < 250-SIZE 104857600
posttls-finger: < 250-AUTH PLAIN LOGIN
posttls-finger: < 250 AUTH=PLAIN LOGIN
posttls-finger: > QUIT
posttls-finger: < 221 mail01.i-sec.tuv.com
If the direction is correct, and the server was sending application
data, it would be logged as the response to the post-handshake
EHLO.
If building posttls-finger from Postfix 2.11 source is a pain, you
might find "swaks" handy (swaks does a lot more, but does not
support DANE, and does not exercise Postfix TLS library client
features).
--
Viktor.