> [ Bcc'd to a contact Microsoft, who should be able to help get the > issue addressed on that end at some point. The problem is a TLS > stack at outlook.com that is poorly suited to opportunistic TLS. > However, it is possible to work around this in Postfix, mostly > by sticking to default settings, plus some care in one's own > certificate chain configuration. ]
I gather the MD5 issue will not be fixed. Ever. > On Fri, Jul 24, 2015 at 10:20:49AM +0200, Moritz Schmitt wrote: > >> My server serving.schmi.tt is experiencing problems with mails coming in >> from outlook.com. This is what I found in my logs (many times actually): >> >> ----- >> Jul 24 09:28:16 serving postfix/smtpd[4577]: initializing the >> server-side TLS engine >> Jul 24 09:28:16 serving postfix/smtpd[4577]: connect from >> mail-am1on0067.outbound.protection.outlook.com[157.56.112.67] >> Jul 24 09:28:16 serving postfix/smtpd[4577]: setting up TLS connection >> from mail-am1on0067.outbound.protection.outlook.com[157.56.112.67] >> Jul 24 09:28:16 serving postfix/smtpd[4577]: >> mail-am1on0067.outbound.protection.outlook.com[157.56.112.67]: TLS >> cipher list "aNULL:-aNULL:ALL:+RC4:@STRENGTH" >> Jul 24 09:28:16 serving postfix/smtpd[4577]: SSL_accept:before/accept >> initialization >> Jul 24 09:28:16 serving postfix/smtpd[4577]: SSL_accept:SSLv3 read >> client hello A >> Jul 24 09:28:16 serving postfix/smtpd[4577]: SSL_accept:SSLv3 write >> server hello A >> Jul 24 09:28:16 serving postfix/smtpd[4577]: SSL_accept:SSLv3 write >> certificate A >> Jul 24 09:28:16 serving postfix/smtpd[4577]: SSL_accept:SSLv3 write key >> exchange A >> Jul 24 09:28:16 serving postfix/smtpd[4577]: SSL_accept:SSLv3 write >> server done A >> Jul 24 09:28:16 serving postfix/smtpd[4577]: SSL_accept:SSLv3 flush data >> Jul 24 09:28:16 serving postfix/smtpd[4577]: SSL_accept:failed in SSLv3 >> read client certificate A >> Jul 24 09:28:16 serving postfix/smtpd[4577]: SSL_accept error from >> mail-am1on0067.outbound.protection.outlook.com[157.56.112.67]: lost >> connection > > This is closely related to: > > http://thread.gmane.org/gmane.mail.postfix.user/250484/focus=250556 > > your server certificate chain is: > > $ (sleep 2; printf "quit\r\n") | > openssl s_client -showcerts -starttls smtp -connect serving.schmi.tt:25 > 2>&1 | > openssl crl2pkcs7 -nocrl -certfile /dev/stdin | > openssl pkcs7 -print_certs -noout > subject=/CN=serving.schmi.tt > issuer=/O=Root CA/OU=http://www.cacert.org/CN=CA Cert Signing > Authority/emailAddress=supp...@cacert.org > > subject=/O=Root CA/OU=http://www.cacert.org/CN=CA Cert Signing > Authority/emailAddress=supp...@cacert.org > issuer=/O=Root CA/OU=http://www.cacert.org/CN=CA Cert Signing > Authority/emailAddress=supp...@cacert.org > > The root CA in question is using MD5 (this SHOULD be harmless) for > its self-signature, but the outlook.com SMTP servers are allergic > to MD5, even in self-signed root certificates. To avoid the > interoperability problem: > > 1. Set: > > # Don't let OpenSSL augment your server certificate chain > # with "missing" certificates. Instead, place just the required > # certificates in smtpd_tls_cert_file. > # > smtpd_tls_CAfile = > smtpd_tls_CApath = > smtpd_tls_ask_ccert = no > > # With the problem solved, a less verbose log level is saner! > smtpd_tls_loglevel = 1 > > 2. The certificate chain file configured via smtpd_tls_cert_file > MUST NOT contain the "CA Cert" root certificate, delete > that certificate from the file it if is present. The > file should have only the content below my signature > (the leaf certificate, and not the issuing root > certificate). > > Once that's done, Microsoft will be able to send you email. > > -- > Viktor. > > subject: /CN=serving.schmi.tt > issuer: /O=Root CA/OU=http://www.cacert.org/CN=CA Cert Signing > Authority/emailAddress=supp...@cacert.org > -----BEGIN CERTIFICATE----- > MIIGDjCCA/agAwIBAgIDEMoeMA0GCSqGSIb3DQEBCwUAMHkxEDAOBgNVBAoTB1Jv > b3QgQ0ExHjAcBgNVBAsTFWh0dHA6Ly93d3cuY2FjZXJ0Lm9yZzEiMCAGA1UEAxMZ > Q0EgQ2VydCBTaWduaW5nIEF1dGhvcml0eTEhMB8GCSqGSIb3DQEJARYSc3VwcG9y > dEBjYWNlcnQub3JnMB4XDTE1MDYxNTIyNTEyNloXDTE1MTIxMjIyNTEyNlowGzEZ > MBcGA1UEAxMQc2VydmluZy5zY2htaS50dDCCAiIwDQYJKoZIhvcNAQEBBQADggIP > ADCCAgoCggIBANCPqzOryaou6zRD4ZyT5sNLnxG+h/1FH9N9oXpWYu2k3rig17X1 > +CWJzOJf15Cc1/xKF6ebzPxHj6Hvfbj7eqWGsyG/uk3V00y8+PSrOXXj7bwoGsji > NZWuZ2fmRpVaZYJdXV8NyQMCBQN7s2R1rZXsEGk7eRvnB7gpq8O+Ds4CwYKqae46 > kdjS1MtBVYgTneSyWiUFCU3eedr3A6qROM5DgoYFLE1iy1XSRO6GQiSeDRUWB+Ue > J3U+gLY5y162GPlXB0Fz9XZ/Fdwz0/ffQiXCXLxuscEWVhsNDa9ZUx0SEZM58aOb > 7ofaMtUh4VoCBhImBfExl+VPU6VdSYs1ZAaz+OkgzlNjv6Nin2WzSA75+1VSjAX8 > iM6fNNi061nnRZqfR1FN0Ke7FEQ9GNpYDTdtjXsTg1Ln26XKvU0H7PH/IMCgm/xZ > rU92ZyHY0kiS0iWzx90fWlUEopJ1X5DvUHQRXqNk1fU6WZq9riacKESXFhvpDe7V > WvD7grPwXF3RE5DysFRCD4q2r3RQju+qusekUADioYBPZdROhZAXwYcGrCmwLtiB > 6ASrS7AVOOP20VB+x+OEhSihsi9gNcQ28uGWtuVywfVLnI83A52m/EoJuJ7Gr5fh > u76GMWFkTCkqEk+l3ggJ530lNVvEv1sPTERqPU5ehB5S3lzPbQ8HVKVFAgMBAAGj > gfwwgfkwDAYDVR0TAQH/BAIwADAOBgNVHQ8BAf8EBAMCA6gwNAYDVR0lBC0wKwYI > KwYBBQUHAwIGCCsGAQUFBwMBBglghkgBhvhCBAEGCisGAQQBgjcKAwMwMwYIKwYB > BQUHAQEEJzAlMCMGCCsGAQUFBzABhhdodHRwOi8vb2NzcC5jYWNlcnQub3JnLzAx > BgNVHR8EKjAoMCagJKAihiBodHRwOi8vY3JsLmNhY2VydC5vcmcvcmV2b2tlLmNy > bDA7BgNVHREENDAyghBzZXJ2aW5nLnNjaG1pLnR0oB4GCCsGAQUFBwgFoBIMEHNl > cnZpbmcuc2NobWkudHQwDQYJKoZIhvcNAQELBQADggIBAH4pPAsKGGQqvzx0A4Wq > 3g0AgAL/Ee5/sa3lKvsS1c6FRZz6da/W2FVN03hVqF8yaTG2aGCDPyMcIllhCVE7 > 7JdJ3gwpcHVgykbPD2UPdFbnI3STYxEOzk7d20TR3Fb1mYaHHi8M0E1KcfrOiJVo > J0Brpz+J2Q8vz1Ctcf/jSA4p0jPZyiugihHozEzba7tbFUwd6XwUxNX2t/oRzyke > nNKYAe3TzreNBCqWg80dyyAn56cKRX4YVVg12RjN0Jy0PBB0qLJr7dxcKdZlaFJM > 4NWbXevE6+NZCz758M06hICQCAOpZcY9RypNc8Pvm6ZpetgdbLervS1dehLv1U5V > nXZInyjt3Yd5rLOKqL5NbOq9kJNxvdv7KRwrfjjUSXx7UBpbhKrW4c8wRjVEKDXR > 2PBZ8rnuF/RakURsty5xdJNW9DR3TWOqa5lz93MFXrwoJYRO7EPsYt85kLbnz4OS > gC37//VXY5HCaIyxhGFWXhVJxFMWxGWAyPE1mssXUQvhap3K2zom45IisISqvny4 > sH1qHOd4jPqTG4JXERosvG8GJbFwjoqPwQSkis1epuCJTvUdikN1GoxCD8Q97De9 > k6dGy9+CMebRXjEvVoUeKS2N20aOq++ZJnID1iuuSCcjSoflv12Eu6jlAk2OV5d1 > J9UmCJxk4ehqFwS84x+/gD+e > -----END CERTIFICATE----- > Aloha mai Nai`a. -- " So this is how Liberty dies ... http://kapu.net/~mjwise/ " To Thunderous Applause.