You can also tell in the mail log (/var/log/maillog) if messages have
been encrypted, spamdyke will let you know if messages from a certain
host are using TLS. See this entry:
Aug 8 09:59:45 myhost spamdyke[10388]: TLS_ENCRYPTED from: (unknown)
to: (unknown) origin_ip: 66.163.185.72 origin_rdns:
sonic329-10.consmr.mail.ne1.yahoo.com auth: (unknown) encryption:
TLS_PASSTHROUGH reason: (empty)
On 8/7/2020 8:51 PM, Chris wrote:
On Sat, Aug 8, 2020 at 1:26 PM Eric Broch <[email protected]
<mailto:[email protected]>> wrote:
What version of qmail do you have?
qmail-1.03-3.2.qt.el7.x86_64
And, what about the email coming from the qmailtoaster-list? Can
you send that header along?
I send most mailing list emails to my gmail account, so I can
communicate with the list even if my mail server is down. :)
-Chris
It can depend on the remote host as well. If you have a gmail
account send yourself an email from it and send the header along.
Here's a header from a gmail account.
Received: from unknown (HELOmail-qk1-f177.google.com
<http://mail-qk1-f177.google.com>) (209.85.222.177)
bymyhost.whitehorsetc.com <http://myhost.whitehorsetc.com> with ESMTPS
(ECDHE-RSA-AES128-GCM-SHA256 encrypted)
On 8/7/2020 7:12 PM, Chris wrote:
When I disabled TLS in spamdyke, I sent myself a message from one
of the problematic systems that was known to trigger repeats.
That message's headers indicate qmail did not pick up the TLS
encryption:
Content-Type: text/html; charset=UTF-8
Mime-Version: 1.0
X-Ses-Outgoing: 2020.08.07-54.240.37.249
Dkim-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple;
s=2ybsbk45dtwlgerewyfzx5qt442lak5j; d=reddit.com
<http://reddit.com>; t=1596830148;
h=From:To:Subject:MIME-Version:Content-Type:Content-Transfer-Encoding:Message-ID:Date;
bh=hrVase2qeFHtu0bLhsrYTx2n7ISeji9Uin83vE7Xdh4=;
b=QrrO2K0wMkJ8uIgTRE1XSNq892ay6s7FXgEnkwZY0KaDDViiUV4h5y5HVYIoZjcv
wqZ97y/QgJEKnC98NPGJ9bJJnGbdoHUdaxY+VOx52u6nm8ofu3cS3BQELBuid+PMf2Y
E+QOoLacnNtusPmpc1+PVwJKNuIGRsk2pCUmk7os=
Dkim-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple;
s=224i4yxa5dv7c2xz3womw6peuasteono; d=amazonses.com
<http://amazonses.com>; t=1596830148;
h=From:To:Subject:MIME-Version:Content-Type:Content-Transfer-Encoding:Message-ID:Date:Feedback-ID;
bh=hrVase2qeFHtu0bLhsrYTx2n7ISeji9Uin83vE7Xdh4=;
b=V18r7xu5iTXqr9kSFDcX/StzbVKQX9nSXcJ/Q4JoHpVRoK5u2sCNikDVVBghOzeT
vInG1XcJaOMYMofcCKv0F8TwYAc253AdkK+b5PRn/eE1C2BucNO73/zCggwTSTI6lZG
IMPzOiBk77HYMfSH4YEKQWY7dWSqdQGPX0Glf7Wg=
Return-Path:
<01000173ca7e6738-e1b4d416-58b8-47ad-8a02-3c9e2696d0c8-000...@amazonses.com
<mailto:01000173ca7e6738-e1b4d416-58b8-47ad-8a02-3c9e2696d0c8-000...@amazonses.com>>
Feedback-Id:
1.us-east-1.UqlFplRllIQtiw+Kq2b87y7uRSu9p66fMici2AQNsMU=:AmazonSES
Content-Transfer-Encoding: 7bit
Received: (qmail 8880 invoked by uid 89); 7 Aug 2020 19:56:04 -0000
Received: by simscan 1.4.0 ppid: 8871, pid: 8873, t: 2.0387s
scanners: attach: 1.4.0 clamav: 0.101.4/m:59/d:25897 spam: 3.4.2
*Received: from unknown (HELO a37-249.smtp-out.amazonses.com
<http://a37-249.smtp-out.amazonses.com>) (54.240.37.249) by
mail.bayhosting.net <http://mail.bayhosting.net> with SMTP; 7 Aug
2020 19:56:02 -0000*
<01000173ca7e6738-e1b4d416-58b8-47ad-8a02-3c9e2696d0c8-000...@email.amazonses.com
<mailto:01000173ca7e6738-e1b4d416-58b8-47ad-8a02-3c9e2696d0c8-000...@email.amazonses.com>>
Delivered-To: [email protected]
<mailto:[email protected]>
Received-Spf: pass (mail.bayhosting.net
<http://mail.bayhosting.net>: SPF record at amazonses.com
<http://amazonses.com> designates 54.240.37.249 as permitted sender)
On Sat, Aug 8, 2020 at 12:59 PM Eric Broch
<[email protected] <mailto:[email protected]>> wrote:
That's the nature of spamdyke. See the documentation. I
understand why it was programmed the way it was, with TLS, so
that it could, after decrypting the email, operate spam
blocking techniques. With qmail doing decryption everything
that passes through spamdyke is encrypted so examining the
email is not possible.
|tls-level| |none|,|smtp||smtp-no-passthrough|or|smtps|
|none|: Do not offer or allow SSL/TLS, even if qmail supports it.
|smtp|: If|tls-certificate-file|is given, offer TLS during
the SMTP conversation and decrypt the traffic.
If|tls-certificate-file|is not given, allow qmail to offer
TLS (if it has been patched to provide TLS) and pass the
encrypted traffic to qmail.
|smtp-no-passthrough|: If|tls-certificate-file|is given,
offer TLS during the SMTP conversation and decrypt the
traffic. If|tls-certificate-file|is not given, prevent TLS
from starting.
|smtps|: Initiate a SSL session at the beginning of the
connection, before SMTP begins.
If|tls-level|is given multiple times, spamdyke will use the
last value it finds.
If|tls-level|is not given, spamdyke will use a value of|smtp|.
|tls-level|is not valid within configuration directories.
SeeTLS
<https://www.spamdyke.org/documentation/README.html#TLS>for
details.
Qmail will pick up TLS negotiation if spamdyke is disabled.
You can check the headers of incoming email to confirm.
Received: from unknown (HELOmail.qmailtoaster.com
<http://mail.qmailtoaster.com>) (162.213.42.64)
bymyhost.whitehorsetc.com <http://myhost.whitehorsetc.com> with
ESMTPS (DHE-RSA-AES256-SHA encrypted);
or in older TLS patches
Received: from unknown (HELOmail.qmailtoaster.com
<http://mail.qmailtoaster.com>) (162.213.42.64)
bymyhost.whitehorsetc.com <http://myhost.whitehorsetc.com> with
SMTP (DHE-RSA-AES256-SHA encrypted);
On 8/7/2020 6:36 PM, Chris wrote:
Why does 'Setting tls-level=none turns of ALL TLS even in
qmail's offering' when it's a spamdyke config file, not qmail?
What if I think spamdyke is part of my multi-delivery
problem? If I take spamdyke out of the equation in smtp/run
how do I get qmail to pick up the TLS negotiation?
On Sat, Aug 8, 2020 at 12:28 PM Eric Broch
<[email protected] <mailto:[email protected]>>
wrote:
I'm not sure I like how spamdyke handles tls, though I
don't know another way one would do it.
Setting tls-level=none turns of ALL TLS even in qmail's
offering.
If you want qmail to handle TLS comment the certificate
file:
#tls-certificate-file=/var/qmail/control/servercert.pem
However, if you do this, spamdyke (I think) will not
work anymore because all traffic through it is now
encrypted (you could check if I'm correct on the
spamdyke mailing list).
On 8/7/2020 6:13 PM, Chris wrote:
I know I'm responding to a really old thread here, but
I stumbled upon this trying to solve another issue.
When I set tls-level=none in
/opt/spamdyke/etc/spamdyke.conf and reboot, I now
completely fail the SMTP TLS checker at
https://luxsci.com/smtp-tls-checker
It would appear that qmail isn't doing the tls at all.
Where are the settings to telling qmail to handle the
tls? Is it in the run file, or elsewhere?
On Wed, Jun 19, 2019 at 3:14 AM Eric Broch
<[email protected]
<mailto:[email protected]>> wrote:
In /etc/spamdyke/spamdyke.conf set 'tls-level' to
'none'.
tls-level=none
allow qmail to do the tls and see if it works.
On 6/18/2019 9:07 AM, Rajesh M wrote:
eric
in the spamdyke.conf i can see this
tls-certificate-file=/var/qmail/control/servercert.pem
also i am using the
/var/qmail/control/servercert.pem
for domain key signing of outgoing emails.
rajesh
----- Original Message -----
From: Eric Broch [mailto:[email protected]]
To:[email protected]
<mailto:[email protected]>
Sent: Tue, 18 Jun 2019 08:52:13 -0600
Subject:
So you have spamdyke doing the TLS?
On 6/18/2019 8:38 AM, Rajesh M wrote:
Hi
ISSUE 1
all of a sudden we are receiving error on one of our servers
for one specific sender domain (sending from microsoft server)
the sender domain is not able to send emails to the recepient
domain on our server. The email bounces with the following error
encryption: TLS reason: 503_MAIL_first_(#5.5.1)
06/18/2019 19:33:16 LOG OUTPUT TLS
DENIED_OTHER from:[email protected] <mailto:[email protected]>
to:[email protected] <mailto:[email protected]> origin_ip:
40.107.69.126 origin_rdns:mail-eopbgr690126.outbound.protection.outlook.com
<http://mail-eopbgr690126.outbound.protection.outlook.com> auth: (unknown) encryption: TLS
reason: 503_MAIL_first_(#5.5.1)
06/18/2019 19:33:16 FROM REMOTE TO CHILD: 6 bytes TLS
QUIT
06/18/2019 19:33:16 LOG OUTPUT TLS
ERROR(tls_write()@tls.c:678): unable to write to SSL/TLS
stream: The operation failed due to an I/O error, Connection reset by peer
ERROR(output_writeln()@log.c:104): unable to write 27 bytes to
file descriptor 1: Connection reset by peer
06/18/2019 19:33:16 FROM CHILD TO REMOTE: 27 bytes TLS
221ns1.HOSTNAME.com <http://ns1.HOSTNAME.com>
06/18/2019 19:33:16 LOG OUTPUT TLS
ERROR(tls_read()@tls.c:620): unable to read from SSL/TLS
stream: The operation failed due to an I/O error, Unexpected EOF found
06/18/2019 19:33:16 - TLS ended and closed
the error log of spamdyke full-log-dir is give below follows
ISSUE 2
also i noted that spamdyke log mentions as such
reset address space soft limit to infinity: please stop using
the softlimit program
What exactly does this mean. What is the alternative to prevent
large files should i disable softlimit program in
/usr/bin/softlimit -m 64000000 \
in the smtp run file
require your kind help in resolving the above 2 issues
thanks
rajesh
06/18/2019 19:32:54 STARTED: VERSION =
5.0.1+TLS+CONFIGTEST+DEBUG, PID = 19829
06/18/2019 19:32:54 CURRENT ENVIRONMENT
PATH=/var/qmail/bin:/usr/local/bin:/usr/bin:/bin
PWD=/var/qmail/supervise/smtp
SHLVL=0
PROTO=TCP
TCPLOCALIP=103.241.181.154
TCPLOCALPORT=25
TCPLOCALHOST=ns1.HOSTNAME.com <http://ns1.HOSTNAME.com>
TCPREMOTEIP=40.107.69.126
TCPREMOTEPORT=42264
BADMIMETYPE=
BADLOADERTYPE=M
QMAILQUEUE=/var/qmail/bin/simscan
CHKUSER_START=ALWAYS
CHKUSER_RCPTLIMIT=50
CHKUSER_WRONGRCPTLIMIT=10
NOP0FCHECK=1
DKQUEUE=/var/qmail/bin/qmail-queue.orig
DKVERIFY=DEGIJKfh
DKSIGN=/var/qmail/control/domainkeys/%/private
06/18/2019 19:32:54 CURRENT CONFIG
config-file=/etc/spamdyke/spamdyke.conf
dns-blacklist-entry=zen.spamhaus.org <http://zen.spamhaus.org>
full-log-dir=/var/log/spamdyke
graylist-dir=/var/spamdyke/graylist
graylist-max-secs=2678400
graylist-min-secs=180
header-blacklist-entry=From:*>,*<*
idle-timeout-secs=600
ip-blacklist-file=/etc/spamdyke/blacklist_ip
ip-in-rdns-keyword-blacklist-file=/etc/spamdyke/blacklist_keywords
ip-in-rdns-keyword-whitelist-file=/etc/spamdyke/whitelist_keywords
ip-whitelist-file=/etc/spamdyke/whitelist_ip
log-level=info
max-recipients=100
rdns-blacklist-file=/etc/spamdyke/blacklist_rdns
rdns-whitelist-file=/etc/spamdyke/whitelist_rdns
recipient-blacklist-file=/etc/spamdyke/blacklist_recipients
recipient-whitelist-file=/etc/spamdyke/whitelist_recipients
reject-empty-rdns=1
reject-sender=no-mx
reject-sender=authentication-domain-mismatch
reject-unresolvable-rdns=1
relay-level=normal
sender-blacklist-file=/etc/spamdyke/blacklist_senders
sender-whitelist-file=/etc/spamdyke/whitelist_senders
tls-certificate-file=/var/qmail/control/servercert.pem
06/18/2019 19:32:54 - Remote IP = 40.107.69.126
06/18/2019 19:32:54 CURRENT CONFIG
config-file=/etc/spamdyke/spamdyke.conf
dns-blacklist-entry=zen.spamhaus.org <http://zen.spamhaus.org>
dns-server-ip-primary=8.8.8.8
full-log-dir=/var/log/spamdyke
graylist-dir=/var/spamdyke/graylist
graylist-max-secs=2678400
graylist-min-secs=180
header-blacklist-entry=From:*>,*<*
idle-timeout-secs=600
ip-blacklist-file=/etc/spamdyke/blacklist_ip
ip-in-rdns-keyword-blacklist-file=/etc/spamdyke/blacklist_keywords
ip-in-rdns-keyword-whitelist-file=/etc/spamdyke/whitelist_keywords
ip-whitelist-file=/etc/spamdyke/whitelist_ip
log-level=info
max-recipients=100
rdns-blacklist-file=/etc/spamdyke/blacklist_rdns
rdns-whitelist-file=/etc/spamdyke/whitelist_rdns
recipient-blacklist-file=/etc/spamdyke/blacklist_recipients
recipient-whitelist-file=/etc/spamdyke/whitelist_recipients
reject-empty-rdns=1
reject-sender=no-mx
reject-sender=authentication-domain-mismatch
reject-unresolvable-rdns=1
relay-level=normal
sender-blacklist-file=/etc/spamdyke/blacklist_senders
sender-whitelist-file=/etc/spamdyke/whitelist_senders
tls-certificate-file=/var/qmail/control/servercert.pem
06/18/2019 19:32:54 - Remote rDNS
=mail-eopbgr690126.outbound.protection.outlook.com
<http://mail-eopbgr690126.outbound.protection.outlook.com>
06/18/2019 19:32:54 LOG OUTPUT
DEBUG(filter_rdns_missing()@filter.c:947): checking for missing rDNS;
rdns:mail-eopbgr690126.outbound.protection.outlook.com
<http://mail-eopbgr690126.outbound.protection.outlook.com>
DEBUG(filter_rdns_whitelist_file()@filter.c:1055): searching rDNS
whitelist file(s); rdns:mail-eopbgr690126.outbound.protection.outlook.com
<http://mail-eopbgr690126.outbound.protection.outlook.com>
DEBUG(filter_rdns_blacklist_file()@filter.c:1159): searching rDNS
blacklist file(s); rdns:mail-eopbgr690126.outbound.protection.outlook.com
<http://mail-eopbgr690126.outbound.protection.outlook.com>
DEBUG(filter_ip_whitelist()@filter.c:1228): searching IP
whitelist file(s); ip: 40.107.69.126
DEBUG(filter_ip_blacklist()@filter.c:1279): searching IP
blacklist file(s); ip: 40.107.69.126
DEBUG(filter_ip_in_rdns_whitelist()@filter.c:1380): checking for IP
in rDNS +keyword(s) in whitelist file; ip: 40.107.69.126
rdns:mail-eopbgr690126.outbound.protection.outlook.com
<http://mail-eopbgr690126.outbound.protection.outlook.com>
DEBUG(filter_ip_in_rdns_blacklist()@filter.c:1333): checking for IP
in rDNS +keyword(s) in blacklist file; ip: 40.107.69.126
rdns:mail-eopbgr690126.outbound.protection.outlook.com
<http://mail-eopbgr690126.outbound.protection.outlook.com>
DEBUG(filter_rdns_resolve()@filter.c:1426): checking rDNS resolution;
rdns:mail-eopbgr690126.outbound.protection.outlook.com
<http://mail-eopbgr690126.outbound.protection.outlook.com>
DEBUG(filter_dns_rbl()@filter.c:1645): checking DNS RBL(s); ip:
40.107.69.126
DEBUG(undo_softlimit()@spamdyke.c:3203): reset address space
soft limit to infinity: please stop using the softlimit program
DEBUG(undo_softlimit()@spamdyke.c:3223): reset data segment
soft limit to infinity: please stop using the softlimit program
DEBUG(undo_softlimit()@spamdyke.c:3241): reset stack size soft
limit to infinity: please stop using the softlimit program
06/18/2019 19:32:54 FROM CHILD TO REMOTE: 33 bytes
220ns1.HOSTNAME.com <http://ns1.HOSTNAME.com> ESMTP
06/18/2019 19:32:54 FROM REMOTE TO CHILD: 52 bytes
EHLONAM04-CO1-obe.outbound.protection.outlook.com
<http://NAM04-CO1-obe.outbound.protection.outlook.com>
06/18/2019 19:32:54 FROM CHILD TO REMOTE: 27 bytes
250-ns1.HOSTNAME.com <http://250-ns1.HOSTNAME.com>
06/18/2019 19:32:54 FROM CHILD TO REMOTE: 14 bytes
250-STARTTLS
06/18/2019 19:32:54 FROM CHILD TO REMOTE: 16 bytes
250-PIPELINING
06/18/2019 19:32:54 FROM CHILD TO REMOTE: 14 bytes
250-8BITMIME
06/18/2019 19:32:54 FROM CHILD TO REMOTE: 19 bytes
250-SIZE 31457280
06/18/2019 19:32:54 FROM CHILD TO REMOTE: 31 bytes
250 AUTH LOGIN PLAIN CRAM-MD5
06/18/2019 19:32:55 FROM REMOTE TO CHILD: 10 bytes
STARTTLS
06/18/2019 19:32:55 FROM SPAMDYKE TO REMOTE: 14 bytes
220 Proceed.
06/18/2019 19:32:56 LOG OUTPUT TLS
DEBUG(tls_start()@tls.c:417): TLS/SSL connection established,
using cipher AES256-GCM-SHA384, 256 bits
06/18/2019 19:32:56 - TLS negotiated and started
06/18/2019 19:32:56 FROM REMOTE TO CHILD: 52 bytes TLS
EHLONAM04-CO1-obe.outbound.protection.outlook.com
<http://NAM04-CO1-obe.outbound.protection.outlook.com>
06/18/2019 19:32:56 FROM CHILD TO REMOTE: 27 bytes TLS
250-ns1.HOSTNAME.com <http://250-ns1.HOSTNAME.com>
06/18/2019 19:32:56 FROM CHILD, FILTERED: 14 bytes TLS
250-STARTTLS
06/18/2019 19:32:56 FROM CHILD TO REMOTE: 16 bytes TLS
250-PIPELINING
06/18/2019 19:32:56 FROM CHILD TO REMOTE: 14 bytes TLS
250-8BITMIME
06/18/2019 19:32:56 FROM CHILD TO REMOTE: 19 bytes TLS
250-SIZE 31457280
06/18/2019 19:32:56 FROM CHILD TO REMOTE: 31 bytes TLS
250 AUTH LOGIN PLAIN CRAM-MD5
06/18/2019 19:32:57 FROM REMOTE TO CHILD: 48 bytes TLS
MAIL FROM:<[email protected]>
<mailto:[email protected]> SIZE=68640
06/18/2019 19:32:57 LOG OUTPUT TLS
DEBUG(find_username()@spamdyke.c:127): searching for username between
positions 11 and 33: MAIL FROM:<[email protected]>
<mailto:[email protected]> SIZE=68640
RCPT TO:<[email protected]>
<mailto:[email protected]>
RCPT TO:<[email protected]>
<mailto:[email protected]>
DEBUG(find_domain()@spamdyke.c:361): searching for domain between positions
23 and 33: MAIL FROM:<[email protected]>
<mailto:[email protected]> SIZE=68640
RCPT TO:<[email protected]>
<mailto:[email protected]>
RCPT TO:<[email protected]>
<mailto:[email protected]>
DEBUG(find_address()@spamdyke.c:726): found username:
Rethish.Nair
DEBUG(find_address()@spamdyke.c:743): found domain: SENDER.com
DEBUG(filter_sender_whitelist()@filter.c:1871): searching sender
whitelist(s); sender:[email protected] <mailto:[email protected]>
FILTER_SENDER_WHITELIST sender:[email protected]
<mailto:[email protected]> file: /etc/spamdyke/whitelist_senders(781)
06/18/2019 19:33:16 FROM CHILD TO REMOTE: 33 bytes TLS
451 SPF lookup failure (#4.3.0)
06/18/2019 19:33:16 FROM REMOTE TO CHILD: 40 bytes TLS
RCPT TO:<[email protected]>
<mailto:[email protected]>
06/18/2019 19:33:16 LOG OUTPUT TLS
DEBUG(find_username()@spamdyke.c:127): searching for username between
positions 9 and 36: RCPT TO:<[email protected]>
<mailto:[email protected]>
RCPT TO:<[email protected]>
<mailto:[email protected]>
DEBUG(find_domain()@spamdyke.c:361): searching for domain between positions
16 and 36: RCPT TO:<[email protected]>
<mailto:[email protected]>
RCPT TO:<[email protected]>
<mailto:[email protected]>
DEBUG(find_address()@spamdyke.c:726): found username: ranjini
DEBUG(find_address()@spamdyke.c:743): found domain:dxb.RECEPIENT.com
<http://dxb.RECEPIENT.com>
DEBUG(find_cdb_record()@cdb.c:138): searching CDB file
/var/qmail/control/morercpthosts.cdb for 20 byte key =dxb.RECEPIENT.com
<http://dxb.RECEPIENT.com>, hash = 3655419700, main index = 52, num_slots = 2,
slot_num = 1
06/18/2019 19:33:16 LOG OUTPUT TLS
FILTER_OTHER response: "503 MAIL first (#5.5.1)"
06/18/2019 19:33:16 FROM CHILD TO REMOTE: 25 bytes TLS
503 MAIL first (#5.5.1)
06/18/2019 19:33:16 LOG OUTPUT TLS
DENIED_OTHER from:[email protected] <mailto:[email protected]>
to:[email protected] <mailto:[email protected]> origin_ip: 40.107.69.126
origin_rdns:mail-eopbgr690126.outbound.protection.outlook.com
<http://mail-eopbgr690126.outbound.protection.outlook.com> auth: (unknown) encryption: TLS
reason: 503_MAIL_first_(#5.5.1)
06/18/2019 19:33:16 FROM REMOTE TO CHILD: 44 bytes TLS
RCPT TO:<[email protected]>
<mailto:[email protected]>
06/18/2019 19:33:16 LOG OUTPUT TLS
DEBUG(find_username()@spamdyke.c:127): searching for username between
positions 9 and 40: RCPT TO:<[email protected]>
<mailto:[email protected]>
DEBUG(find_domain()@spamdyke.c:361): searching for domain between positions
20 and 40: RCPT TO:<[email protected]>
<mailto:[email protected]>
DEBUG(find_address()@spamdyke.c:726): found username:
nominations
DEBUG(find_address()@spamdyke.c:743): found domain:dxb.RECEPIENT.com
<http://dxb.RECEPIENT.com>
DEBUG(find_cdb_record()@cdb.c:138): searching CDB file
/var/qmail/control/morercpthosts.cdb for 20 byte key =dxb.RECEPIENT.com
<http://dxb.RECEPIENT.com>, hash = 3655419700, main index = 52, num_slots = 2,
slot_num = 1
06/18/2019 19:33:16 LOG OUTPUT TLS
FILTER_OTHER response: "503 MAIL first (#5.5.1)"
06/18/2019 19:33:16 FROM CHILD TO REMOTE: 25 bytes TLS
503 MAIL first (#5.5.1)
06/18/2019 19:33:16 LOG OUTPUT TLS
DENIED_OTHER from:[email protected] <mailto:[email protected]>
to:[email protected] <mailto:[email protected]> origin_ip:
40.107.69.126 origin_rdns:mail-eopbgr690126.outbound.protection.outlook.com
<http://mail-eopbgr690126.outbound.protection.outlook.com> auth: (unknown) encryption: TLS
reason: 503_MAIL_first_(#5.5.1)
06/18/2019 19:33:16 FROM REMOTE TO CHILD: 6 bytes TLS
QUIT
06/18/2019 19:33:16 LOG OUTPUT TLS
ERROR(tls_write()@tls.c:678): unable to write to SSL/TLS
stream: The operation failed due to an I/O error, Connection reset by peer
ERROR(output_writeln()@log.c:104): unable to write 27 bytes to
file descriptor 1: Connection reset by peer
06/18/2019 19:33:16 FROM CHILD TO REMOTE: 27 bytes TLS
221ns1.HOSTNAME.com <http://ns1.HOSTNAME.com>
06/18/2019 19:33:16 LOG OUTPUT TLS
ERROR(tls_read()@tls.c:620): unable to read from SSL/TLS
stream: The operation failed due to an I/O error, Unexpected EOF found
06/18/2019 19:33:16 - TLS ended and closed
06/18/2019 19:33:16 CLOSED
---------------------------------------------------------------------
To unsubscribe, e-mail:[email protected]
<mailto:[email protected]>
For additional commands,
e-mail:[email protected]
<mailto:[email protected]>
---------------------------------------------------------------------
To unsubscribe, e-mail:[email protected]
<mailto:[email protected]>
For additional commands,
e-mail:[email protected]
<mailto:[email protected]>