Got this for port 587-
openssl s_client -connect effezascience.com:587
CONNECTED(00000003)
40A78ACA4F7F0000:error:0A00010B:SSL routines:ssl3_get_record:wrong version number:../ssl/record/ssl3_record.c:354:
---
no peer certificate available
---
No client certificate CA names sent
---
SSL handshake has read 5 bytes and written 323 bytes
Verification: OK
---
New, (NONE), Cipher is (NONE)
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
Early data was not sent
Verify return code: 0 (ok)
---
This, for port 465 -
penssl s_client -connect effezascience.com:465
CONNECTED(00000003)
depth=2 C = US, O = Internet Security Research Group, CN = ISRG Root X1
verify return:1
depth=1 C = US, O = Let's Encrypt, CN = R13
verify return:1
depth=0 CN = effezascience.com
verify return:1
---
Certificate chain
0 s:CN = effezascience.com
i:C = US, O = Let's Encrypt, CN = R13
a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256
v:NotBefore: Oct 15 05:50:07 2025 GMT; NotAfter: Jan 13 05:50:06 2026 GMT
1 s:C = US, O = Let's Encrypt, CN = R13
i:C = US, O = Internet Security Research Group, CN = ISRG Root X1
a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256
v:NotBefore: Mar 13 00:00:00 2024 GMT; NotAfter: Mar 12 23:59:59 2027 GMT
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=CN = effezascience.com
issuer=C = US, O = Let's Encrypt, CN = R13
---
No client certificate CA names sent
Peer signing digest: SHA256
Peer signature type: RSA-PSS
Server Temp Key: X25519, 253 bits
---
SSL handshake has read 3156 bytes and written 403 bytes
Verification: OK
---
New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384
Server public key is 2048 bit
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
Early data was not sent
Verify return code: 0 (ok)
---
---
Post-Handshake New Session Ticket arrived:
SSL-Session:
Protocol : TLSv1.3
Cipher : TLS_AES_256_GCM_SHA384
Session-ID: 7C0EBCDEB7204D63F53CB1D2E9CD5D17214F0218EE6621FE134949F9250EC964
Session-ID-ctx:
Resumption PSK: 37198BAE2570CF3B85D9A55DC50BC0BF0FC62C1E3B368B5E522794F41368942D8FBEC6043A3B4B9BC5918F258F8D6A28
PSK identity: None
PSK identity hint: None
SRP username: None
TLS session ticket lifetime hint: 7200 (seconds)
TLS session ticket:
0000 - 87 9c fd 6a 9b b7 a5 b5-16 0a 7c 0e ff 3b 60 7c ...j......|..;`|
0010 - 92 1b 8e 3e ab 1e 3a 74-60 a7 cd 71 7e 5b 42 c6 ...>..:t`..q~[B.
0020 - 0e cf 49 40 64 59 7c 0f-54 8e 59 d1 72 f0 3c 54 ..I@dY|.T.Y.r.<T
0030 - 37 46 a0 32 de a2 2b d0-6c 30 5e 2f c4 b5 3b 80 7F.2..+.l0^/..;.
0040 - e3 14 34 27 4b 34 52 05-ac 0e 85 c7 48 cb ff f0 ..4'K4R.....H...
0050 - 84 0b a2 18 99 a4 66 14-86 45 93 08 1d e1 fe 47 ......f..E.....G
0060 - 6e 01 22 8f b4 51 8c dd-c0 7e c4 6d 2a 81 e2 88 n."..Q...~.m*...
0070 - cb 72 cb 5f a8 40 f3 fa-ca ff 8c d9 77 0a 90 16 .r._.@......w...
0080 - 61 ad e0 36 5a cc dd 4c-27 e6 c4 ed c0 5e cb fe a..6Z..L'....^..
0090 - 27 cc 8e 94 42 76 94 f4-1a 6d 51 b6 89 e7 89 e6 '...Bv...mQ.....
00a0 - 64 c7 da af 36 6e 5f 40-3d 99 5e ea 85 c2 05 09 d...6n_@=.^.....
00b0 - a7 77 79 a9 84 b9 02 8e-74 e9 5e 54 9a b5 23 18 .wy.....t.^T..#.
00c0 - c9 ff b6 5b df 78 96 eb-a6 c7 04 16 b8 12 e6 69 ...[.x.........i
00d0 - e2 69 04 e1 8f 5a fe 3d-e4 2c 96 1c e7 96 44 bc .i...Z.=.,....D.
00e0 - dc 7f bb 26 2d dc 15 ed-75 89 97 92 95 40 f1 6c ...&-...u....@.l
Start Time: 1760636264
Timeout : 7200 (sec)
Verify return code: 0 (ok)
Extended master secret: no
Max Early Data: 0
---
read R BLOCK
220 server.securemailserver.in ESMTP Postfix (Debian/GNU)
The following for port 995 -
openssl s_client -connect effezascience.com:995
CONNECTED(00000003)
depth=2 C = US, O = Internet Security Research Group, CN = ISRG Root X1
verify return:1
depth=1 C = US, O = Let's Encrypt, CN = R12
verify return:1
depth=0 CN = effezascience.com
verify return:1
---
Certificate chain
0 s:CN = effezascience.com
i:C = US, O = Let's Encrypt, CN = R12
a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256
v:NotBefore: Oct 16 10:14:27 2025 GMT; NotAfter: Jan 14 10:14:26 2026 GMT
1 s:C = US, O = Let's Encrypt, CN = R12
i:C = US, O = Internet Security Research Group, CN = ISRG Root X1
a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256
v:NotBefore: Mar 13 00:00:00 2024 GMT; NotAfter: Mar 12 23:59:59 2027 GMT
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=CN = effezascience.com
issuer=C = US, O = Let's Encrypt, CN = R12
---
No client certificate CA names sent
Peer signing digest: SHA256
Peer signature type: RSA-PSS
Server Temp Key: X25519, 253 bits
---
SSL handshake has read 3302 bytes and written 403 bytes
Verification: OK
---
New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384
Server public key is 2048 bit
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
Early data was not sent
Verify return code: 0 (ok)
---
---
Post-Handshake New Session Ticket arrived:
SSL-Session:
Protocol : TLSv1.3
Cipher : TLS_AES_256_GCM_SHA384
Session-ID: 392E1E81DE0085D90A6978EE61506980C5E3C36D39065D70E72812CEC485DC49
Session-ID-ctx:
Resumption PSK: 0C7F476664690A021848F12FD604D7923660307E77E6A19A4AFB7399CA5A8CF0CC5DE348C904461E9490CEEF12C49B22
PSK identity: None
PSK identity hint: None
SRP username: None
TLS session ticket lifetime hint: 7200 (seconds)
TLS session ticket:
0000 - 7f 8e 3d 43 15 ae e5 11-08 a7 ea 6e b7 d2 20 d0 ..=C.......n.. .
0010 - 7d 4a 17 34 b0 31 0a a1-7c 0a a2 b5 1f 19 b5 4d }J.4.1..|......M
0020 - 9a b3 bf dd c9 74 f9 79-a5 2d d2 81 95 69 7d ef .....t.y.-...i}.
0030 - fc 12 7e d3 9f 80 64 f4-94 f8 d7 24 b3 21 38 18 ..~...d....$.!8.
0040 - fd 70 c4 c0 df 70 8c 06-c7 f3 f1 b4 45 4e f1 a9 .p...p......EN..
0050 - ca b9 50 a3 56 84 64 ab-fa 6d e9 02 ec 2e ae 38 ..P.V.d..m.....8
0060 - 35 02 ba 13 7d a2 71 be-7b ef e1 3d 43 9d 67 e8 5...}.q.{..=C.g.
0070 - 9e 78 46 dd 5b de e5 23-50 96 47 11 86 aa 70 ab .xF.[..#P.G...p.
0080 - ef 02 d5 b4 eb 06 54 ea-52 b2 a3 6d 6f a5 c3 6d ......T.R..mo..m
0090 - b8 2e d9 44 63 25 85 14-30 98 3e e6 85 7a bf 2b ...Dc%..0.>..z.+
00a0 - 9d 3e 68 70 e8 e1 80 23-ab 28 8b fa 39 c2 c8 7a .>hp...#.(..9..z
00b0 - f7 c0 5c 05 e4 98 b7 62-5c 31 93 68 4c b0 fd 76 ..\....b\1.hL..v
00c0 - 5d e6 6c 2c 53 45 56 d6-58 71 c3 74 ef a1 8a 18 ].l,SEV.Xq.t....
00d0 - a1 3a d6 27 c5 c5 45 9a-fe cb 8f 1d 01 8b 6b 99 .:.'..E.......k.
Start Time: 1760636382
Timeout : 7200 (sec)
Verify return code: 0 (ok)
Extended master secret: no
Max Early Data: 0
---
read R BLOCK
---
Post-Handshake New Session Ticket arrived:
SSL-Session:
Protocol : TLSv1.3
Cipher : TLS_AES_256_GCM_SHA384
Session-ID: CE607BCC863F6CE32C46776DD0F088C78098E89CA05DA65DE7048B4B848C622B
Session-ID-ctx:
Resumption PSK: 4302D2621CBD28E71FAC51C0258D73168D19BCB0E21DF515E3CA398847EA495F46163C759A94467DF586766CBEB527FA
PSK identity: None
PSK identity hint: None
SRP username: None
TLS session ticket lifetime hint: 7200 (seconds)
TLS session ticket:
0000 - 7f 8e 3d 43 15 ae e5 11-08 a7 ea 6e b7 d2 20 d0 ..=C.......n.. .
0010 - 77 f7 60 08 3c d2 82 35-c1 b9 10 68 75 39 15 4c w.`.<..5...hu9.L
0020 - 6d a1 de 77 f4 2b 44 bd-da f3 3b 7a 54 37 25 9f m..w.+D...;zT7%.
0030 - d5 ea 11 06 ac a1 35 2c-a5 80 99 cb 81 d7 6b bb ......5,......k.
0040 - da 6c 15 c1 7d 1c 0b 8c-9c 48 1d da 4e 6e 4a 73 .l..}....H..NnJs
0050 - bd d1 2c ac 54 a8 a2 6b-4b 94 3b b9 3e 37 b4 01 ..,.T..kK.;.>7..
0060 - 71 cb a9 52 c7 d3 d8 36-84 de 9c 33 83 72 5f de q..R...6...3.r_.
0070 - 99 97 8d 4d 37 59 08 19-64 3f 96 96 84 ea 34 c9 ...M7Y..d?....4.
0080 - d5 7f fe ec b8 9f 97 4f-89 94 e2 c4 91 a6 ed c3 .......O........
0090 - 7d 5f 34 6a b5 39 11 e2-3f 63 10 d4 d8 cb 95 d9 }_4j.9..?c......
00a0 - 9c c2 df a3 c6 40 a0 72-f6 0d bb 05 c2 cb 71 8e .....@.r......q.
00b0 - 58 a9 0c c5 03 ee 46 ae-58 b1 08 84 cb c1 1b 35 X.....F.X......5
00c0 - 48 78 d0 ee ba 5d 3d a4-bb 55 c0 d4 7d 40 eb 67 Hx...]=..U..}@.g
00d0 - 1a 51 07 fd 1d bf 80 f1-84 2c e4 43 1f 19 5a 37 .Q.......,.C..Z7
Start Time: 1760636382
Timeout : 7200 (sec)
Verify return code: 0 (ok)
Extended master secret: no
Max Early Data: 0
---
read R BLOCK
+OK Dovecot (Debian) ready.
Do the above help?