<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://community.sophos.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/"><channel><title>UTM SMTP TLS1.2 enabled - SSL routines:SSL23_GET_CLIENT_HELLO:unknown protocol - No NDR to sender</title><link>https://community.sophos.com/utm-firewall/f/mail-protection-smtp-pop3-antispam-and-antivirus/126804/utm-smtp-tls1-2-enabled---ssl-routines-ssl23_get_client_hello-unknown-protocol---no-ndr-to-sender</link><description>Hi all, 
 as i can&amp;#39;t barely find any information on this: 
 We have set TLS v1.2 as the minimum requirement for SMTP communications (Email Protection -&amp;gt; SMTP - Advanced - TLS Settings). After having a look at the logfiles, there are many connections that</description><dc:language>en-US</dc:language><generator>Telligent Community 12</generator><item><title>RE: UTM SMTP TLS1.2 enabled - SSL routines:SSL23_GET_CLIENT_HELLO:unknown protocol - No NDR to sender</title><link>https://community.sophos.com/thread/465050?ContentTypeID=1</link><pubDate>Fri, 02 Apr 2021 16:54:12 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:0df5996b-701b-4999-a020-35b8e3307d29</guid><dc:creator>BAlfson</dc:creator><description>&lt;p&gt;Doug and I are in the USA, Dennis, so TLS v1.2 is not a requirement for us.&lt;/p&gt;
&lt;p&gt;I asked the question I did because I thought you were experiencing random rejections of mail from a domain and might see different sending IPs on different days.&lt;/p&gt;
&lt;p&gt;In the sample you showed us, it appears that the server at&amp;nbsp;80.147.160.223&amp;nbsp; Isn&amp;#39;t configured to use only TLS v1.2.&amp;nbsp; The postmaster for&amp;nbsp;&lt;span&gt;UNIVERSA Hausverwaltungsgesellschaft might not be aware of that.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Cheers - Bob&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: UTM SMTP TLS1.2 enabled - SSL routines:SSL23_GET_CLIENT_HELLO:unknown protocol - No NDR to sender</title><link>https://community.sophos.com/thread/465012?ContentTypeID=1</link><pubDate>Fri, 02 Apr 2021 00:48:39 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:675596c8-5feb-4207-9f73-e47d24fdc2ed</guid><dc:creator>DouglasFoster</dc:creator><description>&lt;p&gt;For incoming mail, recovery from this event is the responsibility of the remote server.&amp;nbsp; &amp;nbsp;If it chooses to fall back to unencrypted and you have that allowed, the message will be accepted.&amp;nbsp; If they simply retry with another STARTTLS session, the message will fail repeatedly until the sending server gives up.&lt;/p&gt;
&lt;p&gt;The U.S. still has a lot of sloppy senders, so running with either mandatory encryption, or encryption optional with TLS1.0 disabled, caused lost traffic that my users want.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: UTM SMTP TLS1.2 enabled - SSL routines:SSL23_GET_CLIENT_HELLO:unknown protocol - No NDR to sender</title><link>https://community.sophos.com/thread/464412?ContentTypeID=1</link><pubDate>Thu, 25 Mar 2021 21:18:14 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:322274f9-33a0-48b2-90e6-29664518aef3</guid><dc:creator>DPotenberg</dc:creator><description>&lt;p&gt;Hi Harsh,&lt;/p&gt;
&lt;p&gt;which policy do you mean and where can it be configured to drop legacy TLS? I just had a look at the configuration in general and i only found IPS and advanced thread protection where i can configure &amp;quot;drop&amp;quot;. All of them are activated.&lt;/p&gt;
&lt;p&gt;Dennis&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: UTM SMTP TLS1.2 enabled - SSL routines:SSL23_GET_CLIENT_HELLO:unknown protocol - No NDR to sender</title><link>https://community.sophos.com/thread/464410?ContentTypeID=1</link><pubDate>Thu, 25 Mar 2021 21:01:09 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:6a89f12b-ebbf-4431-a696-7b03dfa2959d</guid><dc:creator>DPotenberg</dc:creator><description>&lt;p&gt;Hi Bob,&lt;/p&gt;
&lt;p&gt;i have picked the following mail domain mail.universa-hh.de as a sample (without checking all the others).&amp;nbsp;My understanding is, that the first connection is dropped as Harsh said, but then the connection is established using TLS1.2 without falling back to plaintext.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;img height="336" src="/resized-image/__size/640x480/__key/communityserver-discussions-components-files/56/pastedimage1616705307213v1.png" width="685" alt=" " /&gt;&lt;/p&gt;
&lt;p&gt;There are a lot more samples for this domain. The first connection is always dropped, then the connection&amp;nbsp;is established right after and the email is passed.&lt;/p&gt;
&lt;p&gt;Dennis&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: UTM SMTP TLS1.2 enabled - SSL routines:SSL23_GET_CLIENT_HELLO:unknown protocol - No NDR to sender</title><link>https://community.sophos.com/thread/464400?ContentTypeID=1</link><pubDate>Thu, 25 Mar 2021 17:56:09 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:6e6c01b7-595d-45cd-bf45-0021fbd32c39</guid><dc:creator>BAlfson</dc:creator><description>&lt;p&gt;Domains will often use multiple servers.&amp;nbsp; It&amp;#39;s not unusual for one or two to be missed for a TLS upgrade.&amp;nbsp; Were the delivered emails from the same IPs as ones that were rejected?&lt;/p&gt;
&lt;p&gt;Cheers - Bob&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: UTM SMTP TLS1.2 enabled - SSL routines:SSL23_GET_CLIENT_HELLO:unknown protocol - No NDR to sender</title><link>https://community.sophos.com/thread/464298?ContentTypeID=1</link><pubDate>Wed, 24 Mar 2021 20:27:07 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:27c90e58-b55f-400d-8393-146fa75fcc26</guid><dc:creator>DPotenberg</dc:creator><description>&lt;p&gt;Hi Bob,&lt;/p&gt;
&lt;p&gt;thanks for hint using zgrep. I did it old school and downloaded the archived log files for march and worked through it with notepad++.&lt;/p&gt;
&lt;p&gt;Anyway, i would just described what i did and what further questions came up with this:&lt;/p&gt;
&lt;p&gt;I have searched for&amp;nbsp; SSL routines:SSL23_GET_CLIENT_HELLO:unknown protocol through march and got about 54.000 results. After removing plain IP&amp;#39;s Blacklisted Domains and other stuff i could reduce this to about 40 domains (so i had 40 external sender and 40 internal receivers). So my understanding up to this point was, that everyone of this domains is dropped because they are using older protocols. Then i took every of the 40 domains (senders) and&amp;nbsp;then run again a search&amp;nbsp;against&amp;nbsp;march. The result was that for every domain there were at least 1 or more successful email deliveries (email passed) between sender and receiver using TLS1.2 (accept for the Customer domain we initially started). So the question would be, why are some connections are dropped where others are being successfully established from one email domain? &amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;One thing i&amp;nbsp;didn&amp;#39;t think&amp;nbsp;of: &amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;My colleague was the one in contact with the said customer. After some troubleshooting my colleague created an SMTP exception (EMail Protection - SMTP - Exceptions) for the customer domain and skipped every check. After doing this, the customer was able to send mails. I didn&amp;#39;t think of this in the beginning but skipping checks shouldn&amp;#39;t solve TLS Protocols errors. So why did this happens or do i misinterpret&amp;nbsp; the errors&amp;nbsp; mentioned above?&lt;/p&gt;
&lt;p&gt;Dennis&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: UTM SMTP TLS1.2 enabled - SSL routines:SSL23_GET_CLIENT_HELLO:unknown protocol - No NDR to sender</title><link>https://community.sophos.com/thread/464296?ContentTypeID=1</link><pubDate>Wed, 24 Mar 2021 19:59:44 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:f7c42a41-84ed-4ed8-92d0-9085f5baa599</guid><dc:creator>FormerMember</dc:creator><description>&lt;p&gt;Hi &lt;a href="/members/dpotenberg"&gt;DPotenberg&lt;/a&gt;,&lt;/p&gt;
&lt;p&gt;Did you configure any policy to drop the connection with legacy TLS? By selecting TLS version v1.2 from the SMTP &amp;gt; Advanced &amp;gt; TLS settings will drop the first connection from the sender server if it&amp;#39;s using legacy TLS, but then it&amp;rsquo;ll fallback to plaintext, and you should see the second connection with no TLS in the logs.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;However, if there&amp;#39;s a policy to drop the connection with legacy TLS or not, UTM won&amp;#39;t send NDR. Normally the connecting server sends the NDR for the connection level drops.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Thanks,&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: UTM SMTP TLS1.2 enabled - SSL routines:SSL23_GET_CLIENT_HELLO:unknown protocol - No NDR to sender</title><link>https://community.sophos.com/thread/464294?ContentTypeID=1</link><pubDate>Wed, 24 Mar 2021 19:34:28 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:6c91fb93-0e72-4e81-a809-e2f0cbbcd366</guid><dc:creator>DPotenberg</dc:creator><description>&lt;p&gt;Hi Harsh,&lt;/p&gt;
&lt;p&gt;thanks for that.&lt;/p&gt;
&lt;p&gt;Dennis&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: UTM SMTP TLS1.2 enabled - SSL routines:SSL23_GET_CLIENT_HELLO:unknown protocol - No NDR to sender</title><link>https://community.sophos.com/thread/464288?ContentTypeID=1</link><pubDate>Wed, 24 Mar 2021 17:44:47 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:aadf4edb-9805-4ccf-ba16-67bfe3047f5f</guid><dc:creator>BAlfson</dc:creator><description>&lt;p&gt;Hallo Dennis and welcome to the UTM Community!&lt;/p&gt;
&lt;p&gt;You don&amp;#39;t have to dig through the logs manually.&amp;nbsp; To get an ordered list of the rejections in March 2021, execute the following at the command line:&lt;/p&gt;
&lt;p&gt;zgrep &amp;#39;SSL23_GET_CLIENT_HELLO&amp;#39; /var/log/smtp/2021/03/*|grep -oP &amp;#39;from .*? \[&amp;#39;|sort -n|uniq -c&lt;/p&gt;
&lt;p&gt;Or to just see the ones from 16 March through 22 March:&lt;/p&gt;
&lt;p&gt;zgrep &amp;#39;SSL23_GET_CLIENT_HELLO&amp;#39; /var/log/smtp/2021/03/smtp-2021-03-{16,22}.log.gz|grep -oP &amp;#39;from .*? \[&amp;#39;|sort -n|uniq -c&lt;/p&gt;
&lt;p&gt;That&amp;#39;s what I recommend doing every week or two after enabling a minimum of TLS v1.2.&amp;nbsp; I just tried that on our SMTP Proxy and see that mails from almost 200 entities have been rejected so far in March - every one likely would have been stopped by anti-spam.&amp;nbsp; When you see a customer/supplier in the list, email them about their exposure so that they know they need to upgrade.&amp;nbsp; You&amp;#39;ll be doing them a favor since TLS v1.2 has been required in Germany and all of the EU for years as a part of GDPR.&lt;/p&gt;
&lt;p&gt;Cheers - Bob&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: UTM SMTP TLS1.2 enabled - SSL routines:SSL23_GET_CLIENT_HELLO:unknown protocol - No NDR to sender</title><link>https://community.sophos.com/thread/464152?ContentTypeID=1</link><pubDate>Tue, 23 Mar 2021 15:54:31 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:68e102bc-5fd8-41d3-9846-52a0398e732b</guid><dc:creator>FormerMember</dc:creator><description>&lt;p&gt;Hi &lt;a href="/members/dpotenberg"&gt;DPotenberg&lt;/a&gt;,&lt;/p&gt;
&lt;p&gt;Thanks for reaching out to the Community!&amp;nbsp;&lt;/p&gt;
&lt;p&gt;I don&amp;#39;t think there will be NDR sent out to the sender for connection-level drops. However, I will confirm with the internal team and update you.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Thanks,&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>