Hello, I have managed to get a score of 10/10 on my mail server.
But why can’t I connext to mail server with port 587 ? even though my server has opened the port…
ERROR: A connection attempt failed because the connected party did not properly respond after a period of time, or established connection failed because connected host has failed to respond hidenmyip:587
bunga@mylinux:~$ nmap hidenmymailserver
Starting Nmap 7.80 ( https://nmap.org ) at 2022-07-26 06:32 WIB
Nmap scan report for hidenmyip
Host is up (0.024s latency).
Not shown: 984 closed ports
PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
25/tcp filtered smtp
53/tcp open domain
80/tcp open http
110/tcp open pop3
111/tcp open rpcbind
143/tcp open imap
443/tcp open https
465/tcp open smtps
587/tcp open submission
993/tcp open imaps
995/tcp open pop3s
1723/tcp open pptp
5678/tcp filtered rrac
8090/tcp open opsmessaging
Nmap done: 1 IP address (1 host up) scanned in 4.62 seconds
bunga@mylinux:~$
you literally sent nothing interesting, the part that matters is something like :
Server certificate
subject=/CN=myhiddenserver
issuer=/C=US/O=Let's Encrypt/CN=R3
The server isn’t timing out because of connectivity issue, it’s because of certificate handshake issues. So you have to make sure the certificate is actually valid. I can already almost tell you need to reissue them in cyberpanel UI.
No client certificate CA names sent
Peer signing digest: SHA256
Peer signature type: ECDSA
Server Temp Key: X25519, 253 bits
SSL handshake has read 4435 bytes and written 424 bytes
Verification: OK
New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384
Server public key is 256 bit
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
Early data was not sent
Verify return code: 0 (ok)
I can’t guess, is it valid? I don’t know your server domain and what the certificate claim it is protecting. So if it’s valid, maybe the email program don’t support TLS 1.3.
Not sure what’s the point of all the secrecy, is it a NSA mail server or something? It’s simple, the command show the certificate, and you, and only you, know if the domain you used to connect is the one that match the certificate the server put out. If it doesn’t, then stuff like outlook ain’t going to connect to it, if there’s protocol mismatch ( TLS 1.1 to TLS 1.3 ) then timeout and stuff.