I am desperate:
I moved two domains from one server to another which was running smooth.
I secured both domains (web & mail) with Letsencrypt certificates. Now the owner of these domains complained about a not working mailserver. But this could not be, because other domains could send and receive e-mails.
While troubleshooting, I noticed that no web pages could be retrieved from my server on macOS or iOS. (Connection refused - No secure connection can be established). Under Windows/Linux/Android, all this is no problem and the mail traffic also works flawlessly. So, wtf is going on? It looks like Apple can't work with the created Letsencrypt certificates. What I can't imagine.
Does anyone have any ideas about this?
Thanks for your help.
Server: Ubuntu 20.04, Plesk managed
Client: macOS Catalina, Apple Mail
---[EDIT]---
I ran
openssl s_client -connect maildomain.com:465
on a Windows machine AND a Mac, to check out, whats going on at connection with my mailserver. The result on a PC:
CONNECTED(00000003)
depth=2 C = US, O = Internet Security Research Group, CN = ISRG Root X1
verify return:1
depth=1 C = US, O = Let's Encrypt, CN = R3
verify return:1
depth=0 CN = maildomain.com
verify return:1
---
Certificate chain
0 s:CN = maildomain.com
i:C = US, O = Let's Encrypt, CN = R3
1 s:C = US, O = Let's Encrypt, CN = R3
i:C = US, O = Internet Security Research Group, CN = ISRG Root X1
2 s:C = US, O = Internet Security Research Group, CN = ISRG Root X1
i:O = Digital Signature Trust Co., CN = DST Root CA X3
---
Server certificate
-----BEGIN CERTIFICATE-----
MIIFJzCCBA+gAwIBAgISBBHHETtaspqio7t1ZKYQ36xHMA0GCSqGSIb3DQEBCwUA
MDIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQD
EwJSMzAeFw0yMTEwMDUwNzQyMjVaFw0yMjAx ... etc.
-----END CERTIFICATE-----
subject=CN = maildomain.com
issuer=C = US, O = Let's Encrypt, CN = R3
---
No client certificate CA names sent
Peer signing digest: SHA256
Peer signature type: RSA-PSS
Server Temp Key: X25519, 253 bits
---
SSL handshake has read 4676 bytes and written 395 bytes
Verification: OK
---
New, TLSv1.2, Cipher is ECDHE-RSA-AES256-GCM-SHA384
Server public key is 2048 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
Protocol : TLSv1.2
Cipher : ECDHE-RSA-AES256-GCM-SHA384
Session-ID: DDE8ED4DBF7BD8E8F2D411EDE00C7522C0A15927E3D0C75F58F174B7464270D3
Session-ID-ctx:
Master-Key: 6D3167E0283ED9BA1F6427841212C8BAF37FF75998B369DE4184618EF9BFBE9F8860809CC9B7xxxxxxxxxxxxxxxxxxxx
PSK identity: None
PSK identity hint: None
SRP username: None
TLS session ticket lifetime hint: 7200 (seconds)
TLS session ticket:
0000 - 21 be ab 05 b8 95 30 14-cf c1 ff 7d 98 aa 3c 82 !.....0....}..<. ... etc...
Start Time: 1633683311
Timeout : 7200 (sec)
Verify return code: 0 (ok)
Extended master secret: yes
---
220 my.server.com ESMTP Postfix (Debian/GNU)
quit
221 2.0.0 Bye
closed
And here comes the response on a Mac:
CONNECTED(00000003)
341:error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version:S23_clnt.c:596:
So, it looks like the Mac can't handle TLS1.2/TLS1.3...
Any suggestions what to do?