Please fill out the fields below so we can help you better. Note: you must provide your domain name to get help. Domain names for issued certificates are all made public in Certificate Transparency logs (e.g. crt.sh | example.com), so withholding your domain name here does not increase secrecy, but only makes it harder for us to provide help.
My domain is: mail.servicemouse.com
I ran this command:
tail -f /var/log/mail.log
It produced this output:
TLS handshaking: SSL_accept() failed: error:0A000412:SSL routines::sslv3 alert bad certificate: SSL alert number 42,
My web server is (include version):
The operating system my web server runs on is (include version):
My hosting provider, if applicable, is:
linode/akamai
I can login to a root shell on my machine (yes or no, or I don't know):
yes
I'm using a control panel to manage my site (no, or provide the name and version of the control panel):
No
The version of my client is (e.g. output of certbot --version or certbot-auto --version if you're using Certbot):
1.21.0
You need to provide more info. Specifically, what client is being used and what port is it connecting to when the failure happens?
But, I agree with Bruce ... I don't see this related to Let's Encrypt (yet). I tried connecting to all of your mail ports and they were either disabled or using a self-signed cert. I see you got a Let's Encrypt cert for your mail subdomain. You may just need to configure postfix to use it. A postfix forum is a better place for help with that.
Based on openssl s_client -connect mail.servicemouse.com:587 -starttls smtp -crlf
It looks like you are currently using an self signed certificate, so you need to reconfigure your service to use your current certificate from Let's Encrypt. Just acquiring a certificate doesn't apply it to all relevant services, you still need to do that (either manually or using a script).
The log snippet might even be from an outgoing SMTP client connection instead of an incoming one. I'm not sure such an "sslv3 alert bad certificate" error would show for incoming connections. IMO we lack information/details.
postfx only wants to know where fullchain.pem and privkey.pem are, the files are present in the same directory specified in main.cf under /etc/letsencrypt/live/...
cert.pem chain.pem fullchain.pem privkey.pem README
If so, then it may only need to be restarted/reloaded to use the newly renewed certificate.
If not, then it needs to be told where the new certificate is located.
I assume an operating system command (that i don't know yet) would default to reloading certificates under /etc/ssl/certs where there's a postfix.pem (I don't know why) and a lot of other strange pem files How do I reload certs sourced from /etc/letsencrypt/live ?