[180559] in North American Network Operators' Group
RE: Verizon FiOS outbound mail TLS problem - Superpages people here?
daemon@ATHENA.MIT.EDU (Ray)
Sat Jun 6 19:20:23 2015
X-Original-To: nanog@nanog.org
From: Ray <sixsigma44@hotmail.com>
To: Blake Hudson <blake@ispn.net>, "nanog@nanog.org" <nanog@nanog.org>
Date: Sat, 6 Jun 2015 19:20:20 -0400
In-Reply-To: <BAY181-W60A88A10D3F8FCCD09120BDCB10@phx.gbl>
Errors-To: nanog-bounces@nanog.org
Oh=2C and the way we narrowed it down was somewhat oblique. Because their l=
ogs said a TLS connection was established we had a hard time convincing the=
m it wasn't. They were convinced it was us who was broke.
We had to send them a PCAP and then they ran one and got the same results. =
We were communicating via their IronPort "secure email" system and I notice=
d that the Cisco copyright notice on their messages was from 2012. That put=
me on the path to look at the Cisco release notes. Once I pointed out that=
they seemed to be a bit behind and there were fixes in later versions=2C t=
he conversation went in a different direction. :-)
> From: sixsigma44@hotmail.com
> To: blake@ispn.net=3B nanog@nanog.org
> Subject: RE: Verizon FiOS outbound mail TLS problem - Superpages people h=
ere?
> Date: Sat=2C 6 Jun 2015 19:13:38 -0400
>=20
> We had a similar issue around November last year where an upgrade on our
> PostFix MTA to a current version of OpenSSL=2C which has Mandatory TLS=20
> enabled for certain recipient domains=2C suddenly started generating the=
=20
> same errors with just one recipient domain.
>=20
> We eventually figured
> out that the problem was they were running an outdated version of the=20
> AsyncOS on their Cisco IronPorts. Firmware versions prior to 8.02 had=20
> several problems with TLS and one of them was an inability to=20
> interoperate with senders who used a newer version of OpenSSL. Their=20
> IronPort logs in fact showed a TLS connection was established when it=20
> wasn't. (We had switched them to Opportunistic TLS to be able to send=20
> emails but their logs still showed TLS while a PCAP showed clear text=20
> SMTP.)
>=20
> As soon as that company updated their IronPorts to a v8.5=20
> variant the problem went away. They would not tell us what version they=20
> used to run but did confirm it was prior to v8.02.
>=20
> Interestingly=2C www.checktls.com
> said they were OK. The admins at Check TLS confirmed that=2C at that tim=
e
> (the end of 2014)=2C they were running a version of OpenSSL on their=20
> website that was still compatible with the older AsyncOS version.=20
>=20
> FWIW=2C
>=20
> Ray
> > Date: Thu=2C 4 Jun 2015 11:46:35 -0500
> > From: blake@ispn.net
> > To: nanog@nanog.org
> > Subject: Re: Verizon FiOS outbound mail TLS problem - Superpages people=
here?
> >=20
> > I have no relation=2C but as a mail server operator I can say that I=20
> > wouldn't be surprised if this is actually a TLS version mismatch or=20
> > intolerance problem. I would suggest ensuring that both ends support TL=
S=20
> > 1.0=2C 1.1=2C and 1.2 and use version tolerant TLS implementations. Nex=
t on=20
> > the short list would be not having compatible cyphers between the two=20
> > servers.
> >=20
> > Either way=2C since the error was a 403 error=2C the expected behavior =
would=20
> > be to queue and retry in plain text=3B Sounds like a broken MTA=20
> > implementation or misconfiguration if the sending servers do not revert=
=20
> > to plain text.
> >=20
> > --Blake
> >=20
> > Jay Ashworth wrote on 6/4/2015 11:15 AM:
> > > Anyone on the list who does outbound delivery for Verizon (which I th=
ink
> > > is actually Superpages)? A client has smart-hosted outbounds to *one=
*
> > > of his customers bouncing suddenly with
> > >
> > > Deferred: 403 4.7.0 TLS handshake failed.
> > >
> > > *My* inclination is to think that a cert expired somewhere=2C but his=
non-tech
> > > contact there tells him that the tech people think things are ok.
> > >
> > > I'm trying to get a mailer log fragment from them.
> > >
> > > Cheers=2C
> > > -- jra
> > >
> >=20
> =20
=