On February 12, 2022 9:58:50 PM PST, Ranjan Maitra <mai...@email.com> wrote:
>Hi,
>
>I am using the browser (sorry) to send this e-mail because I am no
>longer able to send email from mutt from anything other than my office
>account (which uses smtp and is delivered via postfix). 
>
>So, here is what I have in my .muttrc at the very end.
>
>
>folder-hook .      'unset smtp_url'
>folder-hook '(mutt|R|fedora|postfix|fetchmail|openbox|sylpheed)' 'set
>from = t...@email.com; set
>smtp_url="smtps://t...@email.com@smtp.mail.com:465/"; set
>smtp_pass="xxxxxxxxxxx"; set envelope_from_address="t...@email.com";
>set use_envelope_from=yes; set from = "t...@email.com"; set
>forward_format = "[FW frm %a:%s]"; set realname = ""; my_hdr Bcc: "";
>set ssl_force_tls = yes; set ssl_starttls = yes'
>
> 
>
>The password is correctly entered (and this configuration worked fine,
>in the sense that it delivered email from this account a few weeks ago.
>This has not worked for a few weeks and I finally decided to try and
>see if anyone had suggestions. 
>
> 
>
>I am on Mutt 2.1.5 and on a full up to date Fedora 35.
>
> 
>
>I tried debugging and get.....
>
> 
>
>2022-02-12 23:18:26] External SSF: 256
>[2022-02-12 23:18:26] External authentication name: t...@email.com
>[2022-02-12 23:18:26] mutt_sasl_cb_authname: getting authname for
>smtp.mail.com:465
>[2022-02-12 23:18:26] mutt_sasl_cb_authname: getting user for
>smtp.mail.com:465
>[2022-02-12 23:18:26] mutt_sasl_cb_pass: getting password for
>mai...@email.com@smtp.mail.com:465
>[2022-02-12 23:18:26] Authenticating (PLAIN)...
>[2022-02-12 23:18:26] 5> AUTH PLAIN ....(removed)
>[2022-02-12 23:18:27] 5< 535 Authentication credentials invalid
>[2022-02-12 23:18:27] 5< 535 Authentication credentials invalid

One possibility is that your email provider may have disabled normal password 
auth. I know that both Office365 and GSuite offer a setting to enable or 
disable using your account password for authentication, with the desired 
alternative being oauth. I don't remember offhand if there is a way to use 
oauth with mutt, but these providers will often provide an "app-specific 
password" mechanism as an alternative.

Another thought is to switch to the submission port 587 if the provider offers 
it. Based on your error messages I doubt it's the issue, but it does provide a 
small security boost by removing the possibility of STARTTLS stripping attacks.

--Sean


Reply via email to