Hello, I'm getting the "no certificate presented" error on
/var/log/maillog while trying to send mail with msmtp(1)
from my local machine for my remote server to deliver.
This is what /var/log/maillog says:
Oct 7 01:40:47 seninha smtpd[71794]: ... smtp connected address=...
host=...
Oct 7 01:40:48 seninha smtpd[71794]: ... smtp tls
ciphers=TLSv1.3:AEAD-AES256-GCM-SHA384:256
Oct 7 01:40:48 seninha smtpd[71794]: ... smtp cert-check result="no
certificate presented"
Oct 7 01:40:49 seninha smtpd[71794]: ... smtp authentication
user=seninha result=permfail
Oct 7 01:40:49 seninha smtpd[71794]: ... smtp failed-command
command="AUTH PLAIN (...)" result="535 Authentication failed"
Oct 7 01:40:49 seninha smtpd[71794]: ... smtp disconnected
reason=disconnect
This is what msmtp says:
msmtp: authentication failed (method PLAIN)
msmtp: server message: 535 Authentication failed
msmtp: could not send message (account seninha of
/home/seninha/.msmtprc)
Here's my smtpd.conf:
# $OpenBSD: smtpd.conf,v 1.14 2019/11/26 20:14:38 gilles Exp $
# This is the smtpd server system-wide configuration file.
# See smtpd.conf(5) for more information.
pki "mail" cert "/etc/ssl/seninha.org.fullchain.pem"
pki "mail" key "/etc/ssl/private/seninha.org.key"
filter "dkimsign" proc-exec "filter-dkimsign -d seninha.org -s 20211006
-k /etc/mail/dkim/seninha.org.key" user _dkimsign group _dkimsign
table aliases file:/etc/mail/aliases
table credentials file:/etc/mail/credentials
table virtuals file:/etc/mail/virtuals
listen on lo0
listen on egress tls pki "mail" filter "dkimsign"
listen on egress port submission tls-require pki "mail" hostname
"mail.seninha.org" auth <credentials> filter "dkimsign"
action "local_mail" mbox alias <aliases>
action "domain_mail" maildir
"/var/vmail/seninha.org/%{dest.user:lowercase}" junk virtual <virtuals>
action "outbound" relay
# match from any for domain "example.org" action "local_mail"
match from local for local action "local_mail"
match from any for domain "seninha.org" action "domain_mail"
match from local for any action "outbound"
match auth from any for any action "outbound"