From the screenshot above, I see two MX records.
I believe to make it “pass” for DKIM, you should keep the one that is MX joeyzo.nl
and content is mail.joeyzo.nl
and remove the MX 185.182.56.111
with content fallback.axc.eu
.
Or do you use that one fallback?
Next one is about mail.joeyzo.nl, for which I got returnet Cloudflare Origin CA certificate:
Using this command openssl s_client -connect mail.joeyzo.nl:465 -crlf
I also got the same result:
depth=0 O = "CloudFlare, Inc.", OU = CloudFlare Origin CA, CN = CloudFlare Origin Certificate
verify error:num=20:unable to get local issuer certificate
verify return:1
depth=0 O = "CloudFlare, Inc.", OU = CloudFlare Origin CA, CN = CloudFlare Origin Certificate
verify error:num=21:unable to verify the first certificate
verify return:1
---
Certificate chain
0 s:O = "CloudFlare, Inc.", OU = CloudFlare Origin CA, CN = CloudFlare Origin Certificate
i:C = US, O = "CloudFlare, Inc.", OU = CloudFlare Origin SSL Certificate Authority, L = San Francisco, ST = California
1 s:O = "CloudFlare, Inc.", OU = CloudFlare Origin CA, CN = CloudFlare Origin Certificate
i:C = US, O = "CloudFlare, Inc.", OU = CloudFlare Origin SSL Certificate Authority, L = San Francisco, ST = California
---
---
No client certificate CA names sent
Peer signing digest: SHA256
Peer signature type: RSA
Server Temp Key: ECDH, P-256, 256 bits
---
SSL handshake has read 2886 bytes and written 432 bytes
Verification error: unable to verify the first certificate
---
New, TLSv1.2, Cipher is ECDHE-RSA-AES256-GCM-SHA384
Server public key is 2048 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
Protocol : TLSv1.2
Cipher : ECDHE-RSA-AES256-GCM-SHA384
Session-ID: 71F4DA24BA83A8CD0F90A961BF0FEF5FC4084FC3D8F95C5DD808C9E41FAF7CF5
Session-ID-ctx:
Master-Key: 30A8BFF73CA39FDF59230A471875680609835CBB86642D66DE915C95948B7E5AA26F7AC232AF6FE6AC8555D849CC7A38
PSK identity: None
PSK identity hint: None
SRP username: None
Start Time: 1616276684
Timeout : 7200 (sec)
Verify return code: 21 (unable to verify the first certificate)
Extended master secret: no
---
220 vserver265.axc.nl ESMTP Exim 4.94 Sat, 20 Mar 2021 22:44:44 +0100
quit
221 vserver265.axc.nl closing connection
closed
I am afraid the current situation is that this is only for sites behind the orange cloud.
It is self-signed (by Cloudflare). Meaning only for a web server proxied via Cloudflare and it is not going to work for a mail server.
SSL for e-mail
If you want to use an SSL for your e-mail, you would need to either purchase one or generate free Let’s Encrypt SSL certificate for your mail.joeyzo.nl
hostname.
As you are already using Cloudflare Origin CA certificate for your domain joeyzo.nl
and www.joeyzo.nl
, but this one cannot cover the mail.joeyzo.nl
(either if you added it).
The Reverse DNS lookup of 185.182.57.60
returns : vserver265.axc.nl
The “A” DNS lookup of vserver265.axc.nl
returns : 185.182.57.60
No SSL for e-mail
Then you would need to configre your email server at your host/origin to not use an SSL certificate, just plain text (which really is not a recommendation) - you would achieve this by removing the ssl variables that point to Cloudflare CA origin certificate (for e-mail only, but keep it for your web server).
Moreover, as far as I got what you have, due to having a VPS server at axc.nl, that free Let’s Encrypt SSL certificate which you would generate, should contain both your VPS servers name (hostname) and your mail.joeyzo.nl hostname to make it work (it is possible to add up to 100 hostnames per an SSL certificate for Let’s Encrypt SSL certificate).
Next is going to be, you would need to configure your e-mail server at your host/origin. Do not know if you use Postfix and Dovecot combination or some other, but that one is related to your server, not Cloudflare.
Also to consider, for testing purpose, would be good to add an TXT record for SPF like:
TXT joeyzo.nl
with content v=spf1 mx a ip4:185.182.57.60 a:mail.joeyzo.nl ?all
Good articles about how to properly setup your e-mail server can be found here:
You can manage to solve your issue by generating the Let’s Encrypt SSL certificate only for your mail.joeyzo.nl hostname and then link to it at your e-mail configuration file.
After it, test with SSL Checker).
If correctly generated and added to configuration file, you should be able to send and receive e-mails with SSL normally.