Ok, thanks for the help! So far no luck. At the bottom are my estmp related
config files, I hope they might shed some light.
The DNS resolves correctly for the domain I tried to send to from the broken
box so that remains a mystery to me.
The broken box runs on cable so it get's some bogus hostname, but that's never
been an issue with UW imap and sendmail, I have it set up as
hashpipe.sweetjimmy.net. Also a total of 3 domains are hosted on this machine,
the MX all point to hashpipe.sweetjimmy.net.
Does any of this make sense?
Thanks,
Dave Rogers
> --David Rogers wrote on 05.04.2002 09:07 -0600:
>
>>>> I'm still having trouble sending and receiving mail. When I send to the
>>>> machine, after 4 hours I get this message:
>>>>
>>>> 451 <[EMAIL PROTECTED]>... reply: read error from hashpipe.sweetjimmy.net.
>>>> <[EMAIL PROTECTED]>... Deferred: Connection reset by
>>>> hashpipe.sweetjimmy.net.
>>>> Warning: message still undelivered after 4 hours
> You included the logs from the sending server and they do not
> indicate and problems on your side, the receiver simply never
> answered for 4 hours.
>
> Head over to the other (broken) box, run `telnet 127.0.0.1 25`,
> grep the logs for messages and make shure you started couriertcpd
> (aka esmtpd) with the correct arguments and no other application
> plays around on port 25.
>
> And you would have to provide some details from your configuration
> and logs if you still cant connect to esmtpd.
>
>>>> And when trying to send out from the server I get a delayed mail message
>>>> citing DNS lookup errors.
>
> check the resolver on and from this box, look up those domains
> manually with dig and testmxlookup. The usual procedure as above.
>
>>>> Does anyone have any tips?
>>>
>>> Use fax - if the phone works.
>>>
>> WTF?
>
> Roland
etc/estmpd
##VERSION: $Id: esmtpd.dist.in,v 1.14 2001/10/14 19:45:37 mrsam Exp $
#
#
# esmtpd created from esmtpd.dist by sysconftool
#
# Do not alter lines that begin with ##, they are used when upgrading
# this configuration.
#
# Copyright 1998 - 2001 Double Precision, Inc. See COPYING for
# distribution information.
#
# This configuration file sets various options for Courier's esmtpd server.
# It is started by couriertcpd, Courier's TCP server.
# A lot of the stuff here is documented in the manual page for couriertcpd.
##NAME: PATH:0
#
# Specify the default PATH that everything inherits.
PATH=/usr/lib/courier/bin:/bin:/usr/bin:/usr/local/bin
##NAME: SHELL:0
#
# The default shell
SHELL=/bin/sh
##NAME: ULIMIT:0
#
# Sets the maximum size of courieresmtpd's data segment
#
ULIMIT=4096
##NAME: BOFHCHECKDNS:0
#
# Comment out the following line in order to accept mail with a bad
# return address.
BOFHCHECKDNS=1
##NAME: BOFHNOEXPN:1
#
# Set BOFHNOEXP to 1 to disable EXPN
BOFHNOEXPN=0
##NAME: BOFHNOVRFY:1
#
# Set BOFHNOVERIFY to disable VRFY
BOFHNOVRFY=0
##NAME: NOADDMSGID:0
#
# The following environment variables keep Courier from adding
# default Date: and Message-ID: header to messages which do not have them.
# If you would like to add default headers only for mail from certain
# IP address ranges, you can override them in couriertcpd access file,
# see couriertcpd(8).
NOADDMSGID=1
##NAME: NOADDDATE:0
#
NOADDDATE=1
##NAME: AUTH_REQUIRED:0
#
# Set AUTH_REQUIRED to 1 in order to force the client to use ESMTP
# authentication. You can override AUTH_REQUIRED on a per-IP address basis
# using smtpaccess. See makesmtpaccess(8).
AUTH_REQUIRED=0
#########################################################################
#
##NAME: COURIERTLS:0
#
# The following variables configure ESMTP STARTTLS. If OpenSSL is available
# during configuration, the couriertls helper gets compiled, and upon
# installation a dummy TLS_CERTFILE gets generated. courieresmtpd will
# automatically advertise the ESMTP STARTTLS extension if both TLS_CERTFILE
# and COURIERTLS exist.
#
# WARNING: Peer certificate verification has NOT yet been tested. Proceed
# at your own risk. Only the basic SSL/TLS functionality is known to be
# working. Keep this in mind as you play with the following variables.
COURIERTLS=/usr/lib/courier/bin/couriertls
##NAME: ESMTP_TLS_REQUIRED:0
#
# Set ESMTP_TLS_REQUIRED to 1 if you REQUIRE SSL/TLS to be used for receiving
# mail. Setting it here will require it for every connection. You can also
# set ESMTP_TLS_REQUIRED in the smtpaccess file, see makesmtpaccess(8) for
# more information
#
# ESMTP_TLS_REQUIRED=1
##NAME: TLS_PROTOCOL:0
#
#
# TLS_PROTOCOL sets the protocol version. The possible versions are:
#
# SSL2 - SSLv2
# SSL3 - SSLv3
# TLS1 - TLS1
TLS_PROTOCOL=SSL3
##NAME: TLS_CIPHER_LIST:0
#
# TLS_CIPHER_LIST optionally sets the list of ciphers to be used by the
# OpenSSL library. In most situations you can leave TLS_CIPHER_LIST
# undefined
#
# TLS_CIPHER_LIST="ALL:!ADH:RC4+RSA:+SSLv2:@STRENGTH"
# TLS_TIMEOUT is currently not implemented, and reserved for future use.
# This is supposed to be an inactivity timeout, but its not yet implemented.
##NAME: TLS_DHCERTFILE:0
#
# TLS_DHCERTFILE - PEM file that stores our Diffie-Hellman cipher pair.
# When OpenSSL is compiled to use Diffie-Hellman ciphers instead of RSA
# you must generate a DH pair that will be used. In most situations the
# DH pair is to be treated as confidential, and the file specified by
# TLS_DHCERTFILE must not be world-readable.
#
# TLS_DHCERTFILE=
##NAME: TLS_CERTFILE:0
#
# TLS_CERTFILE - certificate to use. TLS_CERTFILE is required for SSL/TLS
# servers, and is optional for SSL/TLS clients. TLS_CERTFILE is usually
# treated as confidential, and must not be world-readable.
#
TLS_CERTFILE=/usr/lib/courier/share/esmtpd.pem
##NAME: TLS_CERTINFO:0
#
# TLS_PEERCERTDIR, TLS_OURCACERT - when it is required that all peer
# certificates are signed by specific certificate authorities, set
# TLS_OURCACERT to the name of the file containing the certificate root keys,
# or set TLS_PEERCERTDIR to the name of the directory containing
# the certificate root keys.
#
# For convenience's sake, Courier installs a default set of root certificates
# (which has been swiped from Mozilla's CVS tree :-) ). Before enabling
# certificate verification, you should examine all the certificates in the
# following directory. ANY certificate signed by ANY root cert in
# TLS_PEERCERTDIR will be accepted
#
# TLS_PEERCERTDIR=/usr/lib/courier/share/rootcerts
# TLS_OURCACERT=
##NAME: TLS_VERIFYPEER:0
#
# TLS_VERIFYPEER - how to verify peer certificates. The possible values of
# this setting are:
#
# NONE - do not verify anything
#
# PEER - verify the peer certificate, if one's presented
#
# REQUIREPEER - require a peer certificate, fail if one's not presented
#
# SSL/TLS servers will usually set TLS_VERIFYPEER to NONE. SSL/TLS clients
# will usually set TLS_VERIFYPEER to REQUIREPEER.
#
TLS_VERIFYPEER=NONE
##NAME: MAILUSERGROUP:0
#
# Mail user and group
MAILUSER=daemon
MAILGROUP=daemon
##NAME: ADDRESS:0
#
# Address to listen on, can be set to a single IP address.
#
# ADDRESS=127.0.0.1
ADDRESS=65.29.54.64
##NAME: PORT:1
#
# PORT specified the port number to listen on. The standard "smtp" port
# is port 25.
#
# Multiple port numbers can be separated by commas. When multiple port
# numbers are used it is possibly to select a specific IP address for a
# given port as "ip.port". For example, "127.0.0.1.900,192.68.0.1.900"
# accepts connections on port 900 on IP addresses 127.0.0.1 and 192.68.0.1
# The ADDRESS setting, if given, is a default for ports that do not have
# a specified IP address.
PORT=smtp
##NAME: BLACKLISTS:1
#
# Blacklists we query.
#
# The BLOCK environment variable is automatically enforced by submit.
# Nobody really does anything about BLOCK2, this is mainly for use by
# plug-in mail filters. If you want Courier to unilaterally block
# mail from IP addresses listed on the RBL and RSS, and you have a separate
# filter that keys off BLOCK2, uncomment the following. If you want
# to unilaterally block everything on the RBL and RSS, just replaced BLOCK2
# with BLOCK. DUL can be added too...
#
# BLACKLISTS='-block=blackholes.mail-abuse.org,BLOCK -block=relays.mail-
abuse.org,BLOCK2'
BLACKLISTS=""
##NAME: ACCESSFILE:1
#
# Access file: $ACCESSFILE - plain text file/dir, $ACCESSFILE.dat - compiled
# database.
#
ACCESSFILE=${sysconfdir}/smtpaccess
##NAME: MAXDAEMONS:0
#
# Maximum number of daemons started
#
MAXDAEMONS=20
##NAME: MAXPERC:0
#
# Maximum number of connections accepted from the same C address block
#
MAXPERC=5
##NAME: MAXPERID:0
#
#
# Maximum number of connections accepted from the same IP address
MAXPERIP=5
##NAME: PIDFILE:0
#
# File where couriertcpd will save its process ID
#
PIDFILE=/usr/lib/courier/var/tmp/esmtpd.pid
##NAME: TCPDOPTS:1
#
# TCPDOPTS can contain other couriertcpd options, such as
# -nodnslookup and -noidentlookup.
#
TCPDOPTS="-stderrlogger=/usr/lib/courier/sbin/logger"
##NAME: AUTHMODULES:4
#
# To enable authenticated SMTP relaying, uncomment AUTHMODULES,
# and set ESMTPAUTH to ESMTP authentication mechanisms we support. Currently
# LOGIN and CRAM-MD5 are available:
#
# AUTHMODULES="authdaemon"
# ESMTPAUTH="LOGIN CRAM-MD5"
#
# AUTHMODULES_WEBADMIN and ESMTPAUTH_WEBADMIN is used by the webadmin module
AUTHMODULES=""
##NAME: ESMTPAUTH:4
ESMTPAUTH=""
##NAME: AUTHMODULESWEBADMIN: 4
AUTHMODULES_WEBADMIN="authdaemon"
##NAME: ESMTPAUTH_WEBADMIN:4
ESMTPAUTH_WEBADMIN="LOGIN CRAM-MD5"
##NAME: ESMTPAUTHINFOTLS:3
#
# To enable SASL PLAIN authentication when using TLS, uncomment the following.
# To enable SASL PLAIN with or without TLS, just add PLAIN to ESMTPAUTH,
# above:
#
# ESMTPAUTH_TLS="PLAIN LOGIN CRAM-MD5"
#
# ESMTPAUTH_TLS_WEBADMIN is used by the webadmin module
ESMTPAUTH_TLS=""
##NAME: ESMTPAUTH_TLS_WEBADMIN:4
ESMTPAUTH_TLS_WEBADMIN="PLAIN LOGIN CRAM-MD5"
##NAME: ESMTPDSTART:0
#
# ESMTPDSTART is not referenced anywhere in the standard Courier programs
# or scripts. Rather, this is a convenient flag to be read by your system
# startup script in /etc/rc.d, like this:
#
# prefix=/usr/lib/courier
# exec_prefix=/usr/lib/courier
# . ${sysconfdir}/esmtpd
# case x$ESMTPDSTART in
# x[yY]*)
# /usr/lib/courier/sbin/esmtpd start
# ;;
# esac
#
# The default setting is going to be NO, until Courier is shipped by default
# with enough platforms so that people get annoyed with having to flip it to
# YES every time.
ESMTPDSTART=YES
etc/estmpd-msa
##VERSION: $Id: esmtpd-msa.dist.in,v 1.4 2001/07/01 04:07:56 mrsam Exp $
#
#
# esmtpd-msa created from esmtpd-msa.dist by sysconftool
#
# Do not alter lines that begin with ##, they are used when upgrading
# this configuration.
#
# Copyright 2001 Double Precision, Inc. See COPYING for
# distribution information.
#
# This configuration file sets various options for Courier's mail submission
# ESMTP server (RFC 2476). Basically, this is the plain old port 25
# ESMTP server, with a couple of difference.
#
# This configuration file is read after esmtpd, therefore it only needs
# to override some options that would differ from port 25. The first
# section of this configuration file sets options that are likely to be
# different than the esmtpd options.
##NAME: BOFHCHECKDNS:0
#
# ESMTP MSA is likely to want to verify return domain addresses.
BOFHCHECKDNS=1
##NAME: NOADDMSGID:0
#
# Add the Message-ID: header, if missing. The default value for esmtp
# is 1, but we want it 0 here:
NOADDMSGID=0
##NAME: NOADDDATE:0
#
# Ditto for the Date: header.
NOADDDATE=0
##NAME: AUTH_REQUIRED:0
#
# Set AUTH_REQUIRED to 1 in order to force the client to use ESMTP
# authentication. You can override AUTH_REQUIRED on a per-IP address basis
# using smtpaccess. See makesmtpaccess(8).
AUTH_REQUIRED=0
##NAME: BLACKLISTS: 0
#
# You probably want to turn off any blacklist checking, if you have it
# enabled in esmtpd
BLACKLISTS=""
##NAME: ADDRESS:1
#
# Address to listen on, can be set to a single IP address.
ADDRESS=65.29.54.64
##NAME: PORT:1
#
# PORT specified the port number to listen on. The standard msa port
# is port 587.
#
# Multiple port numbers can be separated by commas. When multiple port
# numbers are used it is possibly to select a specific IP address for a
# given port as "ip.port". For example, "127.0.0.1.900,192.68.0.1.900"
# accepts connections on port 900 on IP addresses 127.0.0.1 and 192.68.0.1
# The ADDRESS setting, if given, is a default for ports that do not have
# a specified IP address.
PORT=587
##NAME: PIDFILE:0
#
# We *MUST* use a different PID file than esmtpd!!!
#
PIDFILE=/usr/lib/courier/var/tmp/esmtpd-msa.pid
##NAME: ACCESSFILE:1
#
# You can use a different access file for esmtp-msa than for esmtp.
# To do that, create it yourself, and use makesmtpaccess-msa instead of
# makesmtpaccess.
ACCESSFILE=${sysconfdir}/smtpaccess
##NAME: ESMTPDSTART:0
#
# ESMTPDSTART is not referenced anywhere in the standard Courier programs
# or scripts. Rather, this is a convenient flag to be read by your system
# startup script in /etc/rc.d, like this:
#
# prefix=/usr/lib/courier
# exec_prefix=/usr/lib/courier
# . ${sysconfdir}/esmtpd
# . ${sysconfdir}/esmtpd-msa
# case x$ESMTPDSTART in
# x[yY]*)
# /usr/lib/courier/sbin/esmtpd-msa start
# ;;
# esac
#
# The default setting is going to be NO, until Courier is shipped by default
# with enough platforms so that people get annoyed with having to flip it to
# YES every time.
ESMTPDSTART=YES
##NAME: CUSTOM:1
#
# Here, you can stick it any additional esmtpd settings that you want to
# override. Some of the ones you are likely to want overriden may include
# MAXDAEMONS, MAXPERC, MAXPERIP, AUTHMODULES, ESMTPAUTH, and ESMTPAUTH_TLS.
# If you want to override them, do it here:
#
##NAME: MAXDAEMONS:1
MAXDAEMONS=20
##NAME: MAXPERC:1
MAXPERC=5
##NAME: MAXPERIP:1
MAXPERIP=5
etc/courierd
##VERSION: $Id: courierd.dist.in,v 1.12 2002/03/15 19:17:18 mrsam Exp $
#
# courierd created from courierd.dist by sysconftool
#
# Do not alter lines that begin with ##, they are used when upgrading
# this configuration.
#
# Copyright 1998 - 2001 Double Precision, Inc. See COPYING for
# distribution information.
#
# This configuration file sets various global options for Courier.
# The contents of this file is turned into courierd's environment by
# the courierctl.start script.
##NAME: prefixes:0
#
prefix="/usr/lib/courier"
exec_prefix="/usr/lib/courier"
##NAME: PATH:0
#
#
# Specify the default PATH that everything inherits -- including commands
# executed from individual .courier files
PATH=/usr/lib/courier/bin:/bin:/usr/bin:/usr/local/bin
##NAME: SHELL:0
#
# The default shell
SHELL=/bin/sh
##NAME: DSNNOTIFY:0
#
# If you would like to suppress all bounces for mail forwarded via an
# individual .courier file, uncomment the following:
#
# DSNNOTIFY=N
##NAME: DYNAMICDELIVERIES:0
#
# If you would like to disable the ability to generate dynamic delivery
# instructions, set the following variable to 0. See dot-courier(5)
# for more information.
DYNAMICDELIVERIES=1
########################################################################
#
##NAME: DEFAULTDELIVERY:0
#
# Specify default delivery instructions by setting DEFAULTDELIVERY
# One of the following definitions of DEFAULTDELIVERY should be
# uncommented.
#
# Default deliveries to $HOME/Maildir
#
# DEFAULTDELIVERY=./Maildir
#
# Alternatively, use procmail to deliver mail to local mailboxes.
#
# DEFAULTDELIVERY="| /usr/lib/courier/bin/preline /usr/bin/procmail"
#
# Here's how to have maildrop handle local deliveries.
#
# DEFAULTDELIVERY="| /usr/lib/courier/bin/maildrop"
#
# If you want to automatically enable .forward support globally,
# use something like this:
#
# DEFAULTDELIVERY="|| dotforward
# ./Maildir"
#
# Yes, it's two lines long, with an embedded newline. Of course, you can use
# any default local mail delivery instruction in place of ./Maildir.
DEFAULTDELIVERY=./Maildir
##NAME: MAILDROPDEFAULT:0
#
# The following setting initializes the DEFAULT variable in maildrop,
# the location of the default mailbox. You should not change this setting
# unless you REALLY know what you're doing.
MAILDROPDEFAULT=./Maildir
##NAME: ESMTP_CORK:0
#
# ESMTP_CORK=1 is an extension used with Linux kernel >2.2 that avoids sending
# partial frames when sending a message via ESMTP. Set ESMTP_CORK to 0 to
# disable it (diagnostic option). In certain situations this option has no
# effect. For example, when using SSL the entire channel has an encryption
# layer around, so courieresmtp is actually talking to a pipe.
ESMTP_CORK=1
##NAME: UUXFLAGS:0
#
# Specify additional flags to uux. Allowed flags are -g [grade], -j, and
# -r ONLY. This environment variable is parsed in a rather simplistic
# fashion -- it is broken up into space-separate words, and each one is
# passed to uux together with the mandatory uux flags (namely -p).
UUXFLAGS="-j -g C"
##NAME: ARCHIVEDIR:0
#
# This is the big-brother option that saves a copy of EACH and EVERY
# message passing through the system. Uncomment ARCHIVEDIR, and after
# a message is delivered, its queue and data file is moved to ARCHIVEDIR
# instead of being deleted. You must create the ARCHIVEDIR directory
# yourself, and it must be owned by the "daemon" userid.
#
# Also, ARCHIVEDIR *MUST* be on the same partition/volume as Courier's
# mail queue directory.
#
# All messages will be saved into a flat directory, with one subdirectory
# created each calendar day. Therefore, you will need to make sure that
# your filesystem can handle it. Each message consists of two files,
# the control file, and the message data file. The Linux ext2 filesystem,
# for example, will start to have problems once there are more than
# 32,000 files in the same directory, so if your system carries a higher
# daily volume, you'll need to purge out the archive subdirectory several
# times a day.
#
# If you fill up an archive directory, mail will continue to move, but
# not archived. Caveat emptor.
#
# ARCHIVEDIR="/usr/lib/courier/bigbrother"
##NAME: ESMTP_USE_STARTTLS:0
#
# The following variables specify whether or not the ESMTP *client* will use
# SSL when talking to a remote ESMTP server that supports SSL.
ESMTP_USE_STARTTLS=1
##NAME: LC_ALL:0
#
# Reset the locale to make sure there are no unexpected surprises
LC_ALL=C
##NAME: COURIERTLS:0
#
# For SSL to work, OpenSSL must be available when Courier is compiled, and
# couriertls must be installed here:
#
# If couriertls is not installed, ESMTP_USE_TLS is quietly ignored.
COURIERTLS=/usr/lib/courier/bin/couriertls
##NAME: ESMTP_TLS_VERIFY_DOMAIN:0
#
# The following variables specify SSL/TLS properties for the ESMTP SSL client.
#
# Set ESMTP_TLS_VERIFY_DOMAIN to 1 if we must verify the domain in the remote
# server's certificate. For this to actually work as intended, you must
# install root authority certificates in the locations specified by CERTINFO
# setting, and set TLS_VERIFYPEER to PEER. Otherwise, this is meaningless.
ESMTP_TLS_VERIFY_DOMAIN=0
##NAME: TLS_PROTOCOL:0
#
# TLS_PROTOCOL sets the protocol version. The possible versions are:
#
# SSL2 - SSLv2
# SSL3 - SSLv3
# TLS1 - TLS1
TLS_PROTOCOL=SSL3
##NAME: TLS_CIPHER_LIST:0
#
# TLS_CIPHER_LIST optionally sets the list of ciphers to be used by the
# OpenSSL library. In most situations you can leave TLS_CIPHER_LIST
# undefined
#
# TLS_CIPHER_LIST="ALL:!ADH:RC4+RSA:+SSLv2:@STRENGTH"
# TLS_TIMEOUT is currently not implemented, and reserved for future use.
# This is supposed to be an inactivity timeout, but its not yet implemented.
##NAME: TLS_DHCERTFILE:0
#
# TLS_DHCERTFILE - PEM file that stores our Diffie-Hellman cipher pair.
# When OpenSSL is compiled to use Diffie-Hellman ciphers instead of RSA
# you must generate a DH pair that will be used. In most situations the
# DH pair is to be treated as confidential, and the file specified by
# TLS_DHCERTFILE must not be world-readable.
#
# TLS_DHCERTFILE=
##NAME: TLS_CERTFILE:0
#
# TLS_CERTFILE - certificate to use. TLS_CERTFILE is required for SSL/TLS
# servers, and is optional for SSL/TLS clients. TLS_CERTFILE is usually
# treated as confidential, and must not be world-readable.
#
# TLS_CERTFILE=
##NAME: TLS_TRUSTCERTS:0
#
# TLS_TRUSTCERTS=pathname - load trusted certificates from pathname.
# pathname can be a file or a directory. If a file, the file should
# contain a list of trusted certificates, in PEM format. If a
# directory, the directory should contain the trusted certificates,
# in PEM format, one per file and hashed using OpenSSL's c_rehash
# script. TLS_TRUSTCERTS is used by SSL/TLS clients (by specifying
# the -domain option) and by SSL/TLS servers (TLS_VERIFYPEER is set
# to PEER or REQUIREPEER).
#
# We install a default set of root certificates in /usr/lib/courier/share/
rootcerts
TLS_TRUSTCERTS=/usr/lib/courier/share/rootcerts
##NAME: TLS_TRUSTSECURITYCERTS:0
#
# TLS_TRUSTSECURITYCERTS=pathname - same as TLS_TRUSTCERTS, except that
# these certs are used when the Courier-specific SECURITY extension is
# specified for a given message. ESMTP_USE_STARTTLS must be set to 1,
# above, and this option implies ESMTP_TLS_VERIFY_DOMAIN.
#
# This setting, of course, can be same as TLS_TRUSTCERTS, however it is
# often desirable to use a separate, private, root CA cert in order to
# create private, organization-internal, secure mail delivery channel
# over an untrusted network, that's validated by X.509 certs signed
# by a private root CA.
#
# !!!NOTE!!! this is an experimental, not heavily tested, extension
#
# TLS_TRUSTSECURITYCERTS=
##NAME: TLS_VERIFYPEER:1
#
# TLS_VERIFYPEER - how to verify server certificates. This value should
# be kept at its default value of NONE unless you want to enable peer
# certificate verification.
#
# NONE - do not verify anything
#
# PEER - verify the client certificate, if one's presented
#
# REQUIREPEER - require a client certificate, fail if one's not presented
TLS_VERIFYPEER=NONE
etc/module.esmtpd
NAME=esmtp
PRIORITY=50
PROG=./courieresmtp
MAXDELS=40
MAXHOST=4
MAXRCPT=100
LIBRARY=librewrite.la
etc/esmtpacceptmailfor
halo7.net
.halo7.net
hmsa.net
.hmsa.net
sweetjimmy.net
.sweetjimmy.net
_______________________________________________
courier-users mailing list
[EMAIL PROTECTED]
Unsubscribe: https://lists.sourceforge.net/lists/listinfo/courier-users