Hi Luke,
Here is the output (attachment not working, obfuscation needed). Verify return code: 0 (ok) near the end let me think that it's working as expected.
If yo it could be a client software or configuration issue.
$ openssl.exe s_client -connect <obfuscated>:5671 -cert clcert.pem -key clkey.pem -CAfile cacerts.pem -verify 8 -verify_hostname <obfuscated>.com
verify depth is 8
CONNECTED(00000004)
Can't use SSL_get_servername
depth=2 C = DE, L = <obfuscated>, O = <obfuscated>, CN = <obfuscated> Inhouse Root CA 2
verify return:1
depth=1 C = DE, L = <obfuscated>, O = <obfuscated>, CN = <obfuscated> Inhouse Sub CA 11
verify return:1
depth=0 C = DE, ST = <obfuscated>, L = <obfuscated>, O = <obfuscated>, OU = GS-DC, CN = <obfuscated>.com, emailAddress = <obfuscated>.com
verify return:1
---
Certificate chain
0 s:C = DE, ST = <obfuscated>, L = <obfuscated>, O = <obfuscated>, OU = <obfuscated>, CN = <obfuscated>.com, emailAddress = <obfuscated>.com
i:C = DE, L = <obfuscated>, O = <obfuscated>, CN = <obfuscated> Inhouse Sub CA 11
1 s:C = DE, L = <obfuscated>, O = <obfuscated>, CN = <obfuscated> Inhouse Sub CA 11
i:C = DE, L = <obfuscated>, O = <obfuscated>, CN = <obfuscated> Inhouse Root CA 2
2 s:C = DE, L = <obfuscated>, O = <obfuscated>, CN = <obfuscated> Inhouse Root CA 2
i:C = DE, L = <obfuscated>, O = <obfuscated>, CN = <obfuscated> Inhouse Root CA 2
---
Server certificate
-----BEGIN CERTIFICATE-----
<obfuscated>
-----END CERTIFICATE-----
subject=C = DE, ST = <obfuscated>, L = <obfuscated>, O = <obfuscated>, OU = GS-DC, CN = <obfuscated>.com, emailAddress = <obfuscated>.com
issuer=C = DE, L = <obfuscated>, O = <obfuscated>, CN = <obfuscated> Inhouse Sub CA 11
---
No client certificate CA names sent
Requested Signature Algorithms: RSA+SHA1:ECDSA+SHA1:RSA+SHA256:RSA+SHA384:RSA+SHA512:Ed448:Ed25519:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512
Shared Requested Signature Algorithms: RSA+SHA256:RSA+SHA384:RSA+SHA512:Ed448:Ed25519:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512
Peer signing digest: SHA256
Peer signature type: RSA-PSS
Server Temp Key: X25519, 253 bits
---
SSL handshake has read 6002 bytes and written 6505 bytes
Verification: OK
Verified peername: <obfuscated>.com
---
New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384
Server public key is 2048 bit
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
Early data was not sent
Verify return code: 0 (ok)
---
read:errno=104