Am 14.08.2013 21:25, schrieb Robert Schetterer via postfix-users:
hast du dich schonmal selbst getestet zb mit
openssl s_client -CAfile /etc/ssl/certs/ca-certificates.crt -starttls smtp -connect dein.server.com:25
da muesste sowas hier rauskommen
New, TLSv1/SSLv3, Cipher is DHE-RSA-AES256-SHA Server public key is 2048 bit Secure Renegotiation IS supported Compression: NONE Expansion: NONE SSL-Session: Protocol : TLSv1 Cipher : DHE-RSA-AES256-SHA
Ja, tut es:
New, TLSv1/SSLv3, Cipher is DHE-RSA-AES256-SHA Server public key is 2048 bit Secure Renegotiation IS supported Compression: NONE Expansion: NONE SSL-Session: Protocol : TLSv1 Cipher : DHE-RSA-AES256-SHA Session-ID: 6EC94F3CA64ADA85F4A8D20D050F6FBEC4722641E57E979C8129DDA3E950CCB0 Session-ID-ctx: Master-Key: F94381AE6383791AC9AA46853B2B495C2845C7A4C24E2DAD0680949FD5920D50FFB046253A6757F27D3D2098E28BE554 Key-Arg : None Start Time: 1376508549 Timeout : 300 (sec) Verify return code: 0 (ok)