Marco Moock
2024-12-27 16:26:22 UTC
Hello!
I am using 8.18.1-6~bpo12+1, openssl 3.0.15-1~deb12u1 and
postfix-mta-sts-resolver 1.1.2-1.1
I see that some mail is being deferred to MS and Gmail. If I disable
sts, the mail goes out.
Running /var/spool/mqueue/4BQ7S9xS386605 (sequence 2 of 2)
<itex-***@microsoft.com>... Connecting to
microsoft-com.mail.protection.outlook.com. via esmtp... 220
BL6PEPF0002256F.mail.protection.outlook.com Microsoft ESMTP MAIL
Service ready at Thu, 26 Dec 2024 20:37:06 +0000 [08DD2281F2EBE627]
[2a01:170:118f:3::22] 250-SIZE 157286400
250-PIPELINING
250-DSN
250-ENHANCEDSTATUSCODES
250-STARTTLS
250-8BITMIME
250-BINARYMIME
250-CHUNKING
250 SMTPUTF8
<itex-***@microsoft.com>... Deferred: 403 4.7.0 authentication failed
Closing connection to microsoft-com.mail.protection.outlook.com.
I would now like to diagnose that further and find out where the
problem is.
I assume the problem is related to the TLS validation. MS has an STS
policy and the check failed according to sendmail.
STARTTLS=client, relay=microsoft-com.mail.protection.outlook.com.,
version=TLSv1.3, verify=FAIL, cipher=TLS_AES_256_GCM_SHA384,
bits=256/256
openssl verify looks ok:
openssl s_client -connect microsoft-com.mail.protection.outlook.com:25
-starttls smtp | openssl x509 -in /dev/stdin -text
depth=2 C = US, O = DigiCert Inc, OU
= www.digicert.com, CN = DigiCert Global Root CA verify return:1
depth=1 C = US, O = DigiCert Inc, CN = DigiCert Cloud Services CA-1
verify return:1
depth=0 C = US, ST = Washington, L = Redmond, O = Microsoft
Corporation, CN = mail.protection.outlook.com verify return:1
[Other output omitted]
I now did further tests with MS:
Dec 27 17:19:09 srv1 sm-mta[405139]: tls_clt_features=sts=secure;servername=hostname, relay=microsoft-com.mail.protection.outlook.com [IPv6:2a01:111:f403:f804:0:0:0:0]
Dec 27 17:19:10 srv1 sm-mta[405139]: STARTTLS=client, relay=microsoft-com.mail.protection.outlook.com., version=TLSv1.3, verify=FAIL, cipher=TLS_AES_256_GCM_SHA384, bits=256/256
Dec 27 17:19:10 srv1 sm-mta[405139]: ruleset=tls_server, arg1=FAIL, relay=microsoft-com.mail.protection.outlook.com, reject=403 4.7.0 authentication failed
Dec 27 17:19:10 srv1 sm-mta[405139]: STARTTLS=read: error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:322:
Dec 27 17:19:10 srv1 sm-mta[405139]: STARTTLS: read error=generic SSL error (-1), errno=9, get_error=error:00000000:lib(0)::reason(0), retry=99, ssl_err=1
Dec 27 17:19:10 srv1 sm-mta[405139]: 4BRGJ8lb405137:
to=<***@microsoft.com>, delay=00:00:02, xdelay=00:00:01,
mailer=esmtp, pri=30354, relay=microsoft-com.mail...ction.outlook.com.
[IPv6:2a01:111:f403:f804:0:0:0:0], dsn=4.7.0, stat=Deferred: 403 4.7.0
authentication failed
Is that an issue with sendmail, openssl, the certificate or at MS?
I am aware of <vfr1qk$vd4$***@news.misty.com>, but according to Bjørn,
this may be a different issue.
I haven't applied the patch to my system yet.
I am using 8.18.1-6~bpo12+1, openssl 3.0.15-1~deb12u1 and
postfix-mta-sts-resolver 1.1.2-1.1
I see that some mail is being deferred to MS and Gmail. If I disable
sts, the mail goes out.
Running /var/spool/mqueue/4BQ7S9xS386605 (sequence 2 of 2)
<itex-***@microsoft.com>... Connecting to
microsoft-com.mail.protection.outlook.com. via esmtp... 220
BL6PEPF0002256F.mail.protection.outlook.com Microsoft ESMTP MAIL
Service ready at Thu, 26 Dec 2024 20:37:06 +0000 [08DD2281F2EBE627]
EHLO srv1.dorfdsl.de
250-BL6PEPF0002256F.mail.protection.outlook.com Hello[2a01:170:118f:3::22] 250-SIZE 157286400
250-PIPELINING
250-DSN
250-ENHANCEDSTATUSCODES
250-STARTTLS
250-8BITMIME
250-BINARYMIME
250-CHUNKING
250 SMTPUTF8
STARTTLS
220 2.0.0 SMTP server readyQUIT
221 2.0.0 Service closing transmission channel<itex-***@microsoft.com>... Deferred: 403 4.7.0 authentication failed
Closing connection to microsoft-com.mail.protection.outlook.com.
I would now like to diagnose that further and find out where the
problem is.
I assume the problem is related to the TLS validation. MS has an STS
policy and the check failed according to sendmail.
STARTTLS=client, relay=microsoft-com.mail.protection.outlook.com.,
version=TLSv1.3, verify=FAIL, cipher=TLS_AES_256_GCM_SHA384,
bits=256/256
openssl verify looks ok:
openssl s_client -connect microsoft-com.mail.protection.outlook.com:25
-starttls smtp | openssl x509 -in /dev/stdin -text
depth=2 C = US, O = DigiCert Inc, OU
= www.digicert.com, CN = DigiCert Global Root CA verify return:1
depth=1 C = US, O = DigiCert Inc, CN = DigiCert Cloud Services CA-1
verify return:1
depth=0 C = US, ST = Washington, L = Redmond, O = Microsoft
Corporation, CN = mail.protection.outlook.com verify return:1
[Other output omitted]
I now did further tests with MS:
Dec 27 17:19:09 srv1 sm-mta[405139]: tls_clt_features=sts=secure;servername=hostname, relay=microsoft-com.mail.protection.outlook.com [IPv6:2a01:111:f403:f804:0:0:0:0]
Dec 27 17:19:10 srv1 sm-mta[405139]: STARTTLS=client, relay=microsoft-com.mail.protection.outlook.com., version=TLSv1.3, verify=FAIL, cipher=TLS_AES_256_GCM_SHA384, bits=256/256
Dec 27 17:19:10 srv1 sm-mta[405139]: ruleset=tls_server, arg1=FAIL, relay=microsoft-com.mail.protection.outlook.com, reject=403 4.7.0 authentication failed
Dec 27 17:19:10 srv1 sm-mta[405139]: STARTTLS=read: error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:322:
Dec 27 17:19:10 srv1 sm-mta[405139]: STARTTLS: read error=generic SSL error (-1), errno=9, get_error=error:00000000:lib(0)::reason(0), retry=99, ssl_err=1
Dec 27 17:19:10 srv1 sm-mta[405139]: 4BRGJ8lb405137:
to=<***@microsoft.com>, delay=00:00:02, xdelay=00:00:01,
mailer=esmtp, pri=30354, relay=microsoft-com.mail...ction.outlook.com.
[IPv6:2a01:111:f403:f804:0:0:0:0], dsn=4.7.0, stat=Deferred: 403 4.7.0
authentication failed
Is that an issue with sendmail, openssl, the certificate or at MS?
I am aware of <vfr1qk$vd4$***@news.misty.com>, but according to Bjørn,
this may be a different issue.
I haven't applied the patch to my system yet.
--
kind regards
Marco
Send spam to ***@stinkedores.dorfdsl.de
kind regards
Marco
Send spam to ***@stinkedores.dorfdsl.de