Please enable JavaScript to view this site.

This submenu is called up from Mail System TLS Settings.

 

Sections on this page:

Domain info

TLS Settings

Explanatory notes

 

anchor link Section Domain info

 

Parameters

Description

anchor link Domain name

The name of the email domain of the communication partner is usually entered here.

This setting is only editable when creating a new TLS connection, i.e. when the menu was opened via the Add TLS Domain button.

anchor link Optional

forwarding server

address

If no entry is made here, the name indicated under Domain name is resolved via MX.

 

The following is accepted as input:

 

IP address

Single IP address

 

Hostname

If a hostname is used, it must be placed in square brackets []. Names without brackets are treated as MX records

 

MX-Name

MX-lookup is executed (if applicable, please also refer to System DNS add local zone)

 

When specifying an IP address or a hostname, there is the option to additionally enter an individual port. The port is entered directly afterwards, separated by a colon ":", i.e. "[IP address]:port" or "hostname:port".

If no port is specified, the standard SMTP port TCP25 is used.

 

empty

anchor link Note:

The server optionally entered here overrides the set default routing (see Mail System Outgoing server) to the target domain entered under Domain name.

This means that all emails to the email domain indicated under Domain name are directly routed to the address entered here!

 

 

anchor link Section TLS Settings

 

The TLS settings are used to set the level of checks for a TLS connection to the target server on the Internet, to the Outgoing server (see Mail System) and/or the corresponding groupware, i.e. Forwarding server (see table under Mail System Managed Domains Column Server IP Address).

 

empty

anchor link Note:

With this setting, only TLS to the the target domain and/or to TargetServer is configured.

Receiving an incoming connection cannot be set. For this reason, TLS often creates a "false" sense of security.

The certificate integrated under SSL will be used to accept TLS connections.

 

empty

anchor link Note:
If no configuration is made here, the setting "may" applies (see following table). This means that, if the downstream email system supports TLS, the SEPPmail Secure E-Mail Gateway will establish a TLS-encrypted connection with it.

 

TLS setting

Description

anchor link RadioButtonInactive None

No TLS encryption.

anchor link RadioButtonActive May

Emails are sent over a TLS-encrypted channel, provided that the receiving email server supports TLS encryption.

anchor link RadioButtonInactive Encrypt

Emails are only sent if a transmission using TLS encryption is possible.

anchor link RadioButtonInactive Verify

Emails are only sent if a transmission via TLS encryption is possible and the SSL certificate of the receiving email server is valid (issued by a trustworthy CA and not expired/revoked).

anchor link RadioButtonInactive Secure

Emails are only sent if a transmission via TLS encryption is possible, the SSL certificate of the receiving email server is valid, the FQDN of the email server is identical to the name (CN) entered in the certificate (applicant) and the name of the email domain is the same as the domain name of the email server.

This prevents MX spoofing.

The use of wildcard certificates is not possible at this point.

 

Example:

1.Sending an email to max.mustermann@partner.tld

a.MX lookup results in
partner.tld MX preference=10, mail exchanger=mail1.partner.tld
partner.tld MX preference=20, mail exchanger=mail2.partner.tld

b.Each of these servers has its FQDN entered as CN in its certificate used for TLS.

c.The domain name of all hosts (mail1, mail 2) is partner.ltd and thus corresponds to the domain name of the email domain.
=> The check with the setting "secure" is successful

 

2.Assumption:
The company with the email domain kommunikationspartner.tld also operates this domain with another country domain (com).
Sending an email to erika.mustermann@kommunikationspartner.com

a.MX lookup results in
partner.com MX preference=10, mail exchanger=mail2.partner.tld
partner.com MX preference=20, mail exchanger=mail4.partner.tld

a.The domain name of the email domain partner.com does not correspond to the mail server – partner.tld –
=> The check fails

 

Conclusion:

For the email domain partner.tld, the TLS security level can remain on "secure".

If the security level "verify" is insufficient of the mail domain partner.com, the "Fingerprint" level is to be used. For this purpose, the fingerprints of all mail servers (mail1 and mail2.kommunikationspartner.com) are to be entered.

 

empty

anchor link Note:

If, instead of an MX lookup, a host is addressed directly, the check of the compliance of the hostname from the domain part of the email address with the mail exchanger is omitted.

This means that if, in "2nd assumption", instead of "kommunikationspartner.com" e.g. "[mail2.partner.tld]” were entered as forwarding server, the check would be successful with the setting "secure".

This is particularly important for Office 365 connections.

anchor link RadioButtonInactive Fingerprint

Emails are only sent if the counterpart supports TLS and the presented certificate has the fingerprint entered in the input field.

If multiple email servers are available for the target domain, their fingerprints can be separated by entering a pipe "|",

 

The changes made are saved via the Save changes button.

 

 

anchor link Explanatory notes:

 

Check the receiving email server for the use of a wildcard SSL certificate

 

Whether an email server uses a wildcard SSL certificate can be determined very easily with the command line tool OpenSSL.

 

Example:

 

# openssl s_client -starttls smtp -crlf -connect xxx.xxx.xxx.xxx:25

 

 

In the example, xxx.xxx.xxx.xxx is the actual IP address of the target server. Alternatively, the hostname of the target server can be used.

 

# openssl s_client -starttls smtp -crlf -connect postini.com.s8a1.psmtp.com:25

 

 

The result of the query will look as shown below. Based on the certificate subject in the parameter (CN), it can be determined whether the certificate is a wildcard SSL certificate. In the example, the value CN=*.psmtp.com was returned in the response. Thus, this is a wildcard certificate "*", which can be used for all hosts of the psmtp.com domain. The Parameter X509v3 Subject Alternative Name:is also interesting. Here, DNS:*.psmtp.com was returned in the response. This field can contain more domains.

 

 

# openssl s_client -starttls smtp -crlf -connect postini.com.s8a1.psmtp.com:25 | openssl x509 -text -noout
 
 depth=1 C = US, O = Google Inc, CN = Google Internet Authority
 .
 .
 Certificate:
         .
         .
  Subject: C=US, ST=California, L=Mountain View, O=Google Inc, CN=*.psmtp.com
         .
         .
         .
     X509v3 Subject Alternative Name:
    DNS:*.psmtp.com

 

 

The presentation of the output was reduced to the essential information.

 

anchor link Reading the SHA1 fingerprint from the SSL certificate of the receiving email server

 

Above, it was described how the SSL certificate used by the receiving email server can be read. Here, it is irrelevant whether this is a wildcard certificate or not.

 

The fingerprint of an SSL certificate can be read out relatively easily with the command line tool OpenSSL.

 

Example:

 

# openssl s_client -starttls smtp -crlf -connect xxx.xxx.xxx.xxx:25 | openssl x509 -noout -fingerprint

 

 

In this example, xxx.xxx.xxx.xxx again represents the actual IP address of the target server, which can alternatively be replaced by the hostname of the target server.

 

# openssl s_client -starttls smtp -crlf -connect postini.com.s8a1.psmtp.com:25 | openssl x509 -noout -fingerprint

 

 

The resulting output should look as follows:

 

# openssl s_client -starttls smtp -crlf -connect postini.com.s8a1.psmtp.com:25 | openssl x509 -noout -fingerprint
 
depth=1 C = US, O = Google Inc, CN = Google Internet Authority
verify error:num=20:unable to get local issuer certificate
verify return:0
250 HELP
SHA1 Fingerprint=DD:9A:EC:66:E2:43:81:B9:20:2B:75:DB:30:C8:67:CC:9B:B0:D1:99
read:errno=0

 

 

The required SHA1 Fingerprint is displayed in the output. This value can now be transferred to the configuration.

  

Keyboard Navigation

F7 for caret browsing
Hold ALT and press letter

This Info: ALT+q
Topic Header: ALT+t
Topic Body: ALT+b
Contents: ALT+c
Search: ALT+s
Exit Menu/Up: ESC