Hello Chad,
please look at my initial Posting. This already is debug output from debug_ssl_handshake=2
I give you an Example for a "good" handshake:
[0150:000F-15E4] 26.03.2015 11:07:30,45 int_MapSSLError> Mapping SSL error 0 to 0 [SSLNoErr] This is the Start of the negotiation
[0150:000F-15E4] 26.03.2015 11:07:30,45 SSL_Handshake> Enter
[0150:000F-15E4] 26.03.2015 11:07:30,45 SSL_Handshake> Current Cipher 0x0000 (Unknown Cipher)
[0150:000F-15E4] 26.03.2015 11:07:30,45 SSLEncodeClientHello> We offered SSL/TLS version TLS1.0 (0x0301) The Client (our Server) offers his highest available Version
[0150:000F-15E4] 26.03.2015 11:07:30,61 SSLProcessServerHello> Server chose SSL/TLS version TLS1.0 (0x0301) The Server chooses
[0150:000F-15E4] 26.03.2015 11:07:30,61 SSL_Handshake> After handshake state= 8 Status= -5000
After that, they negotiate the Cipher, exchange Certs and so on.
But from Time Time, without any visible reason, our Server starts different:
[0150:000F-15E4] 26.03.2015 11:53:48,44 int_MapSSLError> Mapping SSL error 0 to 0 [SSLNoErr]
[0150:000F-15E4] 26.03.2015 11:53:48,44 SSL_Handshake> Enter
[0150:000F-15E4] 26.03.2015 11:53:48,46 SSL_Handshake> Current Cipher 0x0000 (Unknown Cipher)
[0150:000F-15E4] 26.03.2015 11:53:48,46 SSLEncodeClientHello> We offered SSL/TLS version SSLV3.0 (0x0300) Here our Server offers SSLV3 instead of TLS1.0 as highest available Version, why?
[0150:000F-15E4] 26.03.2015 11:53:48,46 SSLProcessServerHello> Server chose SSL/TLS version SSLV3.0 (0x0300) In this case the receiving server says "ok, let's do SSL"
[0150:000F-15E4] 26.03.2015 11:53:48,46 SSL_Handshake> After handshake state= 8 Status= -5000
[0150:000F-15E4] 26.03.2015 11:53:48,47 SSL_Handshake> Exit Status = -5000
[0150:000F-15E4] 26.03.2015 11:53:48,47 int_MapSSLError> Mapping SSL error -5000 to 4176 [SSLHandshakeNoDone]
[0150:000F-15E4] 26.03.2015 11:53:48,47 SSL_Handshake> Enter
Or another one:
[0150:000F-15E4] 26.03.2015 11:56:27,03 int_MapSSLError> Mapping SSL error 0 to 0 [SSLNoErr]
[0150:000F-15E4] 26.03.2015 11:56:27,03 SSL_Handshake> Enter
[0150:000F-15E4] 26.03.2015 11:56:27,03 SSL_Handshake> Current Cipher 0x0000 (Unknown Cipher)
[0150:000F-15E4] 26.03.2015 11:56:27,03 SSLEncodeClientHello> We offered SSL/TLS version SSLV3.0 (0x0300) Again our Server offers SSLV3 instead of TLS1.0 as highest available Version
[0150:000F-15E4] 26.03.2015 11:56:27,06 SSLProcessAlert> Got an alert of 0x28 (handshake_failure) level 0x2 (fatal) Receiving Server rejects Connection because SSL is disabled on his side
[0150:000F-15E4] 26.03.2015 11:56:27,06 SSL_Handshake> After handshake state= 5 Status= -6991
[0150:000F-15E4] 26.03.2015 11:56:27,06 SSL_Handshake> Exit Status = -6991
[0150:000F-15E4] 26.03.2015 11:56:27,06 int_MapSSLError> Mapping SSL error -6991 to 4161 [SSLSessionNotFoundErr]
[0150:000F-15E4] 26.03.2015 11:56:27 [0150:000F-15E4] SMTPClient: SSL handshake error: 1C7Bh
The Questions are: Why does the Domino Server sometimes offer SSLV3 as highest available Version? Is this a known bug? Has someone heard about this behaviour before?
Are there undocumented notes.ini parameter to deactivate SSLV3 only for outgoing Connections? Similar to
O ServerSSLOptions=+SSL_OP_NO_SSLv3
O ClientSSLOptions=+SSL_OP_NO_SSLv3
In Sendmail Configuration.
Best Regards
Ron