I recently started running a sendmail with TLS. In order to do
that, I generated an installed a self-signed certificate. This is working
fine, in that I can send and receive emails all right. Email clients that
use my instance of sendmail as their MTA do detect that they are dealing
with a self-signed certificate, but after enabling the corresponding
exception, everything proceeds smoothly afterwards.
Now I keep getting entries in my mail.log file from a remote MTA
that does not seem to be playing well with mine:
Aug 29 12:39:20 mybox sm-mta[26195]: STARTTLS=server, error: accept
failed=0, SSL_error=5, errno=0, retry=-1, relay=
xxx.com [xx.xx.xx.xx]
Is this a tell-tale sign of a problem in my sendmail (my ecertificate?),
or is something wrong with the remote MTA?
It's always from the same IP address, and I have noticed that,
after a while, emails from that IP address are delivered to my MTA all
right. That is, it does not seem to be somebody just pinging my MTA - I
have entries from other IP addresses to that effect, but this is
different.
Finally, log entries corresponding to successful connections look
like the following:
Aug 31 11:11:39 mybox sm-mta[11977]: STARTTLS=server, relay=
xxx.com
[xx.xx.xx.xx], version=TLSv1/SSLv3, verify=NOT, cipher=AES128-SHA,
bits=128/128
I am guessing that 'verify=NOT' means that my self-signed
certificate could not be verified, but that is not a problem for me.