Actions
Bug #1232
closeddma(8): Always send EHLO after TLS negotiation
Start date:
Due date:
% Done:
0%
Estimated time:
Description
The attached patch fixes dma(8) to issue EHLO again after
STARTTLS. Some MTAs require EHLO to be issued after STARTTLS and
will refuse RCPT TO directly following STARTTLS.
dma(8) currently only issues EHLO after negotiating TLS if
port-465-style SMTPS (no STARTTLS) was configured. However,
since the server is required to discard any knowledge obtained
from the client previously, EHLO should be issued again after
STARTTLS. The relevant passage from RFC 3207:
4.2 Result of the STARTTLS Command
Upon completion of the TLS handshake, the SMTP protocol is reset to
the initial state (the state in SMTP after a server issues a 220
service ready greeting). The server MUST discard any knowledge
obtained from the client, such as the argument to the EHLO command,
which was not obtained from the TLS negotiation itself. The client
MUST discard any knowledge obtained from the server, such as the list
of SMTP service extensions, which was not obtained from the TLS
negotiation itself. The client SHOULD send an EHLO command as the
first command after a successful TLS negotiation.
[...]
Files
Actions