Hi, I just upgraded various system packages on Fedora 37 and restarted and
now I'm getting "550 Invalid recipient" errors in OpenSMTPD to valid email
addresses. This might be an interaction with Fedora somehow but I'm a bit
stuck and need help understanding what's causing the problem! I can receive
email fine but can't send email. Here is a reproduction with
/usr/sbin/smtpd -dv:

debug: init ssl-tree
info: loading pki information for REDACTED
debug: init ca-tree
debug: init ssl-tree
info: loading pki keys for REDACTED
debug: using "fs" queue backend
debug: using "ramqueue" scheduler backend
debug: using "ram" stat backend
info: OpenSMTPD 6.8.0p2 starting
debug: init ssl-tree
debug: init ssl-tree
info: loading pki information for REDACTED
debug: init ca-tree
debug: init ssl-tree
info: loading pki keys for REDACTED
debug: using "fs" queue backend
debug: init ssl-tree
debug: init ssl-tree
info: loading pki information for REDACTED
debug: init ca-tree
debug: init ssl-tree
info: loading pki keys for REDACTED
debug: using "fs" queue backend
info: loading pki information for REDACTED
debug: init ca-tree
debug: init ssl-tree
info: loading pki keys for REDACTED
debug: using "fs" queue backend
debug: using "ramqueue" scheduler backend
debug: using "ram" stat backend
setup_peer: scheduler -> control[1149] fd=4
debug: init ssl-tree
info: loading pki information for REDACTED
debug: init ca-tree
debug: init ssl-tree
info: loading pki keys for REDACTED
debug: using "fs" queue backend
debug: using "ramqueue" scheduler backend
debug: using "ram" stat backend
setup_peer: lookup -> control[1149] fd=4
debug: init ssl-tree
debug: using "ramqueue" scheduler backend
debug: using "ram" stat backend
info: loading pki information for REDACTED
debug: init ca-tree
debug: init ssl-tree
info: loading pki keys for REDACTED
debug: using "ramqueue" scheduler backend
debug: using "fs" queue backend
setup_peer: queue -> control[1149] fd=4
debug: using "ram" stat backend
setup_peer: pony express -> control[1149] fd=4
setup_peer: lookup -> pony express[1151] fd=5
info: loading pki information for REDACTED
debug: init ca-tree
debug: init ssl-tree
info: loading pki keys for REDACTED
setup_peer: queue -> pony express[1151] fd=5
debug: using "ramqueue" scheduler backend
debug: using "ram" stat backend
setup_peer: klondike -> control[1149] fd=4
setup_peer: lookup -> queue[1152] fd=6
setup_peer: klondike -> pony express[1151] fd=5
debug: using "fs" queue backend
setup_peer: queue -> lookup[1150] fd=6
setup_peer: queue -> scheduler[1153] fd=7
setup_peer: pony express -> klondike[1148] fd=5
setup_peer: pony express -> lookup[1150] fd=6
debug: using "ramqueue" scheduler backend
debug: using "ram" stat backend
setup_peer: control -> klondike[1148] fd=4
setup_peer: pony express -> queue[1152] fd=7
setup_done: ca[1148] done
setup_proc: klondike done
setup_peer: control -> lookup[1150] fd=5
setup_peer: control -> pony express[1151] fd=6
setup_peer: scheduler -> queue[1152] fd=5
setup_peer: control -> queue[1152] fd=7
setup_peer: control -> scheduler[1153] fd=8
setup_done: control[1149] done
setup_done: lka[1150] done
setup_proc: lookup done
setup_done: pony[1151] done
setup_done: queue[1152] done
setup_proc: queue done
setup_proc: pony express done
setup_done: scheduler[1153] done
smtpd: setup done
debug: parent_send_config_ruleset: reloading
debug: parent_send_config: configuring pony process
debug: parent_send_config: configuring ca process
debug: init private ssl-tree
setup_proc: scheduler done
debug: bounce warning after 4h
setup_proc: control done
debug: rsa_engine_init: using RSA privsep engine
debug: ecdsa_engine_init: using ECDSA privsep engine
debug: smtp: listen on 127.0.0.1 port 25 flags 0x409 pki "REDACTED" ca ""
debug: smtp: listen on [::1] port 25 flags 0x409 pki "REDACTED" ca ""
debug: smtp: listen on 164.92.78.241 port 25 flags 0x409 pki "REDACTED" ca
""
debug: smtp: listen on 10.48.0.7 port 25 flags 0x409 pki "REDACTED" ca ""
debug: smtp: listen on [2604:a880:4:1d0::69c:8000] port 25 flags 0x409 pki
"REDACTED" ca ""
debug: smtp: listen on [fe80::3b10:2bab:9fcb:c98f] port 25 flags 0x409 pki
"REDACTED" ca ""
debug: smtp: listen on 127.0.0.1 port 587 flags 0x469 pki "REDACTED" ca ""
debug: smtp: listen on [::1] port 587 flags 0x469 pki "REDACTED" ca ""
debug: smtp: listen on 164.92.78.241 port 587 flags 0x469 pki "REDACTED" ca
""
debug: smtp: listen on 10.48.0.7 port 587 flags 0x469 pki "REDACTED" ca ""
debug: smtp: listen on [2604:a880:4:1d0::69c:8000] port 587 flags 0x469 pki
"REDACTED" ca ""
debug: smtp: listen on [fe80::3b10:2bab:9fcb:c98f] port 587 flags 0x469 pki
"REDACTED" ca ""
debug: smtp: listen on 127.0.0.1 port 10028 flags 0x400 pki "" ca ""
debug: smtp: listen on [::1] port 10028 flags 0x400 pki "" ca ""
debug: smtp: listen on 127.0.0.1 port 10030 flags 0x400 pki "" ca ""
debug: smtp: listen on [::1] port 10030 flags 0x400 pki "" ca ""
debug: pony: rsae_init
debug: pony: rsae_init
debug: smtp: will accept at most 262139 clients
debug: queue: done loading queue into scheduler
debug: smtpd: scanning offline queue...
debug: smtpd: offline scanning done
2b526199c1e7d336 smtp connected address=REDACTED host=
REDACTED.lightspeed.austtx.sbcglobal.net
<http://redacted.lightspeed.austtx.sbcglobal.net/>
debug: looking up pki "REDACTED"
debug: session_start_ssl: switching to SSL
debug: pony: ecdsae_sign
debug: pony: ecdsae_do_sign
2b526199c1e7d336 smtp tls ciphers=TLSv1.3:TLS_AES_256_GCM_SHA384:256
smtp: 0x563d69488c00: smtp_cert_verify_cb: no-client-cert
debug: lka: authenticating for passwd:REDACTED
2b526199c1e7d336 smtp authentication user=REDACTED result=ok
debug: smtp: SIZE in MAIL FROM command
2b526199c1e7d336 smtp failed-command command="RCPT TO:<redac...@redacted.org>"
result="550 Invalid recipient: <redac...@redacted.org>"
2b526199c1e7d336 smtp disconnected reason=disconnect

Here's my smtpd.conf:

table aliases file:/etc/mail/aliases
table domains file:/etc/mail/domains
table passwd passwd:/etc/mail/passwd
table users file:/etc/mail/users
table secrets file:/etc/mail/secrets

pki REDACTED cert "/etc/letsencrypt/live/REDACTED/fullchain.pem"
pki REDACTED key "/etc/letsencrypt/live/REDACTED/privkey.pem"

listen on lo   port  25 tls pki REDACTED auth-optional <passwd>
listen on eth0 port  25 tls pki REDACTED auth-optional <passwd>

listen on lo   port 587 tls-require pki REDACTED auth <passwd>
listen on eth0 port 587 tls-require pki REDACTED auth <passwd>

# DKIM
listen on lo   port 10028 tag DKIM

# spampd/spamassassin will relay back and we'll tag it with SPAMPD to note
it has been processed by SPAMPD
listen on lo   port 10030 tag SPAMPD

# Accept incoming mail to local users from the local machine:
action "process_local_mail" lmtp "/run/dovecot/lmtp" rcpt-to alias <aliases>
match from local for local action "process_local_mail"

# Accept external mail tagged after processing by SPAMPD and put in
Dovecot. We don't bother with checking spam of
# authenticated users relaying mail, so we only worry about incoming spam
into Dovecot, so we only configure anti-spam
# in Dovecot.
action "process_spampd" lmtp "/run/dovecot/lmtp" rcpt-to virtual <users>
match tag SPAMPD for domain <domains> action "process_spampd"

# Accept external mail and forward to spampd on port 10029 which will relay
it back into us on port 10030
action "process_relay" relay host smtp://127.0.0.1:10029
match from any for domain <domains> action "process_relay"

# Accept DKIM-processed mails for final relay:
action "process_outbound" relay host tls+auth://label@REDACTED auth
<secrets>
match tag DKIM for any action "process_outbound"

# Accept incoming mail from authenticated users who want to send email to
domains we don't manage, and send it to DKIM:
action "process_dkim" relay host smtp://127.0.0.1:10027
match from local for any action "process_dkim"

Reply via email to