0

I have setup Apache James server at xxx.xom domain and i am able to receiver message from outer domains like ###@yahoo.com .

bit when trying to send email from xx.com to ##@yahoo.com i am getting :

on thunder bird client :
550 5.1.1 Unknown user

on server --

**javax.net.ssl.SSLHandshakeException: Client requested protocol SSLv3 not enabled**
INFO  08:19:43,676 | org.apache.james.protocols.netty.BasicChannelUpstreamHandler | Connection established from 18.204.244.186
INFO  08:19:46,127 | org.apache.james.protocols.netty.BasicChannelUpstreamHandler | Connection closed for 18.204.244.186
INFO  08:19:46,736 | org.apache.james.protocols.netty.BasicChannelUpstreamHandler | Connection established from 18.204.244.186
ERROR 08:19:48,357 | org.apache.james.protocols.netty.BasicChannelUpstreamHandler | Unable to process request
javax.net.ssl.SSLHandshakeException: Client requested protocol SSLv3 not enabled or not supported
        at sun.security.ssl.Handshaker.checkThrown(Handshaker.java:1521)
        at sun.security.ssl.SSLEngineImpl.checkTaskThrown(SSLEngineImpl.java:528)
        at sun.security.ssl.SSLEngineImpl.readNetRecord(SSLEngineImpl.java:802)
        at sun.security.ssl.SSLEngineImpl.unwrap(SSLEngineImpl.java:766)
        at javax.net.ssl.SSLEngine.unwrap(SSLEngine.java:624)
        at org.jboss.netty.handler.ssl.SslHandler.unwrap(SslHandler.java:1219)
        at org.jboss.netty.handler.ssl.SslHandler.decode(SslHandler.java:852)
        at org.jboss.netty.handler.codec.frame.FrameDecoder.callDecode(FrameDecoder.java:425)
        at org.jboss.netty.handler.codec.frame.FrameDecoder.messageReceived(FrameDecoder.java:303)
        at 

1 Answers1

0

Most likely you need to configure James to use TLS instead of SSL.

The error message is pretty obvious. Yahoo does not support SSLv3 . Most new websites do not support SSL and have migrated to TLS, because of security flaws in SSL.

You can get a good overview about this on the wikipedia page https://en.wikipedia.org/wiki/Transport_Layer_Security#Websites and in other articles and pages on the internet regarding TLS migration.

  • SSL-Session: Protocol : TLSv1.2 Cipher : ECDHE-RSA-AES256-GCM-SHA384 Session-ID: 5ED07AED138E69EAF70AB41AB239E227EBFF92B6107BC2645D171621E37DA6BC Session-ID-ctx: Master-Key: 19F4B9941FC7E33C0AC1A79D70A311D1EB24AD5D0B2D06726CA37D0CE5236B83BFDA4E67BFDC59CF00ECE70B07A3D8C3 Key-Arg : None Krb5 Principal: None PSK identity: None PSK identity hint: None Start Time: 1590721261 Timeout : 300 (sec) Verify return code: 18 (self signed certificate) – Raj Dugar May 29 '20 at 03:20