skip to content

Latest News

Optusnet email issues - update

In a victory of sorts, Optust have acknowledged that the reason for emails from our websites and mail server not being delivered...

Email deliverability – GMX

There appears to be a problem recently with deliverability of website emails to mailboxes at GMX: * gmx.com * gmx.at * gmx.net...

New email hosting package available

Through our new Dreamscape portal you can now subscribe to a hosted email package for your domain, at very reasonable prices....

New Dreamscape Domain Portal

For those of you with domain names registered through Chirp's Dreamscape account, the new portal can be accessed at domains.chirpinternet.eu...

Setting up domain-based email hosting

The process involves setting up mailboxes that your people can access to read and send emails using your domain. Step 1...

Optusnet maili delivery issues

Our recent upgrade to Debian 12 (bookworm) included a tightening of security around TLS connections used for logging in and...

News RSS Feed

more news

Optusnet maili delivery issues

18 July 2023

Our recent upgrade to Debian 12 (bookworm) included a tightening of security around TLS connections used for logging in and for sending and receiving emails.

In technical terms, this means that RSA and DHE keys need to be at least 2048 bit long, SHA-1 is no longer supported for signatures in certificates and you need at least SHA-256.

Since the upgrade we have started to see errors communicating with the Optusnet mail servers as follows:

Jul 18 00:00:45 mail sm-mta[3359398]: STARTTLS=client, start=ok
Jul 18 00:00:45 mail sm-mta[3359398]: STARTTLS=client, error: connect failed=-1, reason=dh key too small, SSL_error=1, errno=0, retry=-1
Jul 18 00:00:45 mail sm-mta[3359398]: STARTTLS=client: error:0A00018A:SSL routines::dh key too small:../ssl/statem/statem_clnt.c:2092:
Jul 18 00:00:45 mail sm-mta[3359398]: ruleset=tls_server, arg1=SOFTWARE, relay=extmail.optusnet.com.au, reject=454 4.7.0 TLS handshake failed.

We anticipate that Optusnet, and any other ISPs who have not yet upgraded to the new security standards, will be forced to do so in order to remain operational.

More information on the vulnerabilities involved can be found at the link below.

Related link

Chirp office offline today »

« Server upgrades - Debian 12


< latest news