Re: sendmail Broken Pipe Error

2014-03-31 Thread Kevin Oberman
On Sun, Mar 30, 2014 at 12:44 PM, Allan Jude  wrote:

> On 2014-03-30 15:31, Willy Offermans wrote:
> > Hello Rick and FreeBSD friends,
> >
> > How can I save this setting in the rc.conf file to disable TSO at
> startup?
> >
>
> add -tso to the ifconfig line:
>
> ifconfig_bge0="inet  netmask  -tso"
> --
> Allan Jude
>
>
I'd recommend that people stop using the long obsolete netmask form of
ifconfig, especially when making suggestions to others. CIDR notation is
about two decades old now.

ifconfig_bge0="inet  -tso"

-- 
R. Kevin Oberman, Network Engineer, Retired
E-mail: rkober...@gmail.com
___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: sendmail Broken Pipe Error

2014-03-30 Thread Allan Jude
On 2014-03-30 15:31, Willy Offermans wrote:
> Hello Rick and FreeBSD friends,
> 
> On Fri, Mar 28, 2014 at 06:25:23PM -0400, Rick Macklem wrote:
>> John-Mark Gurney wrote:
>>> Willy Offermans wrote this message on Thu, Mar 27, 2014 at 15:46
>>> +0100:
 Hello John-Mark and FreeBSD friends,

 On Wed, Mar 26, 2014 at 04:04:27PM -0700, John-Mark Gurney wrote:
> Willy Offermans wrote this message on Wed, Mar 26, 2014 at 18:22
> +0100:
>> Hello John-Mark and FreeBSD friends,
>>
>> On Wed, Mar 26, 2014 at 09:20:35AM -0700, John-Mark Gurney
>> wrote:
>>> Willy Offermans wrote this message on Wed, Mar 26, 2014 at
>>> 12:17 +0100:
 On Tue, Mar 25, 2014 at 09:43:16AM -0700, John-Mark Gurney
 wrote:
> Willy Offermans wrote this message on Tue, Mar 25, 2014
> at 11:39 +0100:
>> I'm not an expert in tcpdump. Can anyone make sense out
>> of the messages?
>
> If you dumped the contents, using -s 0 -X, and look at
> that last packet
> you should see 0d 0a 2e 0d 0a at the end..  which is
> CR/LF/./CR/LF.. If
> you don't see that, then for some reason sendmail/FreeBSD
> isn't telling
> the server that it's done sending which would prevent the
> receiving
> side from ack'ing the email causing the timeout...

 I followed your suggestions. However I'm not able to
 distinguish the last
 packet. Is there a way to find this with help of the Flags?
 The following
 is the output of tcpdump -r /root/tmp/tcpdump -X | grep
 Flags

 11:57:56.539788 IP MyServer.com.41115 > Smarthost.com.smtp:
 Flags [S], seq 1001452351, win 65535, options [mss
 1448,nop,wscale 6,sackOK,TS val 407239960 ecr 0], length 0
 11:57:56.555262 IP Smarthost.com.smtp > MyServer.com.41115:
 Flags [S.], seq 1277075046, ack 1001452352, win 8192,
 options [mss 1452], length 0
>>>
>>> It should look something like:
>>> 09:18:34.723280 IP jmgmac.funkthat.com.64724 >
>>> h2.funkthat.com.ssh: Flags [.], ack 177, win 33280, options
>>> [nop,nop,TS val 1854905469 ecr 3482476972], length 0
>>> 0x:  4510 0034 d7ac 4000 4006 e1af c0a8 0003
>>>  E..4..@.@...
>>> 0x0010:  c0a8 0004 fcd4 0016 7e48 238e d872 43dc
>>>  ~H#..rC.
>>> 0x0020:  8010 8200 7c08  0101 080a 6e8f 9c7d
>>>  |...n..}
>>> 0x0030:  cf92 61ac
>>>..a.
>>>
>>> Notice the hex output...  I didn't see any of that in your
>>> output...
>>> The last packet I was talking about is the last one that had
>>> length
>>> 1448 that your server sent...
>>
>> I sent two e-mails consecutively: the first without an
>> attachment, the
>> second with attachment. I dumped tcp of the NIC for port smtp.
>> I got the
>> following:
>>
>>
>> 12:20:55.988622 IP MyServer.com.37191 > Smarthost.com.smtp:
>> Flags [P.], seq 18943:19104, ack 412, win 65535, length 161
>> 0x:  4500 00c9 eebd 4000 4006  c0a8 0004
>>  E.@.@...
>> 0x0010:  d54b 3f0d 9147 0019 4ea0 36dd 15a7 38a0
>>  .K?..G..N.6...8.
>> 0x0020:  5018  4481  2020 2020 2020 2020
>>  P...D...
>> 0x0030:  2020 2020 2020 2020 2020 2020 2020 2020
>>  
>> 0x0040:  2020 2020 2020 2020 2020 2020 2020 205c
>>  ...\
>> 0x0050:  2f20 205c 205e 0d0a 2020 2020 2020 2020
>>  /..\.^..
>> 0x0060:  2020 2020 2020 2020 2020 2020 2020 2020
>>  
>> 0x0070:  2020 2020 2020 2020 2020 2020 2020 2020
>>  
>> 0x0080:  2020 202e 5c2e 5f2f 5f29 0d0a 0d0a 2020
>>  \._/_)..
>> 0x0090:  2020 2020 2020 2020 2020 2020 2020 2020
>>  
>> 0x00a0:  2020 2020 2020 2020 2020 2020 2020 2020
>>  
>> 0x00b0:  2020 2020 2077  2e46 7265 6542 5344
>>  .www.FreeBSD
>> 0x00c0:  2e6f 7267 0d0a 2e0d 0a
>>   .org.
>>
>> As predicted by John-Mark, the first ended with "0d0a 2e0d 0a".
>> However it
>> was not the last packet with length 1448. I hope that this will
>> not spoil
>> the party. Is the Flag [P.] more indicative? It looks like to
>> me, but I'm
>> just learning.
>>
>> Anyway the second mail ended with:
>>
>> 12:22:17.960896 IP MyServer.com.37191 > Smarthost.com.smtp:
>> Flags [.], seq 35127:36575, ack 638, win 65535, length 1448
>> 0x:  4500 05d0 fe9d 4000 4006  c0a8

Re: sendmail Broken Pipe Error

2014-03-30 Thread Willy Offermans
Hello Rick and FreeBSD friends,

On Fri, Mar 28, 2014 at 06:25:23PM -0400, Rick Macklem wrote:
> John-Mark Gurney wrote:
> > Willy Offermans wrote this message on Thu, Mar 27, 2014 at 15:46
> > +0100:
> > > Hello John-Mark and FreeBSD friends,
> > > 
> > > On Wed, Mar 26, 2014 at 04:04:27PM -0700, John-Mark Gurney wrote:
> > > > Willy Offermans wrote this message on Wed, Mar 26, 2014 at 18:22
> > > > +0100:
> > > > > Hello John-Mark and FreeBSD friends,
> > > > > 
> > > > > On Wed, Mar 26, 2014 at 09:20:35AM -0700, John-Mark Gurney
> > > > > wrote:
> > > > > > Willy Offermans wrote this message on Wed, Mar 26, 2014 at
> > > > > > 12:17 +0100:
> > > > > > > On Tue, Mar 25, 2014 at 09:43:16AM -0700, John-Mark Gurney
> > > > > > > wrote:
> > > > > > > > Willy Offermans wrote this message on Tue, Mar 25, 2014
> > > > > > > > at 11:39 +0100:
> > > > > > > > > I'm not an expert in tcpdump. Can anyone make sense out
> > > > > > > > > of the messages?
> > > > > > > > 
> > > > > > > > If you dumped the contents, using -s 0 -X, and look at
> > > > > > > > that last packet
> > > > > > > > you should see 0d 0a 2e 0d 0a at the end..  which is
> > > > > > > > CR/LF/./CR/LF.. If
> > > > > > > > you don't see that, then for some reason sendmail/FreeBSD
> > > > > > > > isn't telling
> > > > > > > > the server that it's done sending which would prevent the
> > > > > > > > receiving
> > > > > > > > side from ack'ing the email causing the timeout...
> > > > > > > 
> > > > > > > I followed your suggestions. However I'm not able to
> > > > > > > distinguish the last
> > > > > > > packet. Is there a way to find this with help of the Flags?
> > > > > > > The following
> > > > > > > is the output of tcpdump -r /root/tmp/tcpdump -X | grep
> > > > > > > Flags
> > > > > > > 
> > > > > > > 11:57:56.539788 IP MyServer.com.41115 > Smarthost.com.smtp:
> > > > > > > Flags [S], seq 1001452351, win 65535, options [mss
> > > > > > > 1448,nop,wscale 6,sackOK,TS val 407239960 ecr 0], length 0
> > > > > > > 11:57:56.555262 IP Smarthost.com.smtp > MyServer.com.41115:
> > > > > > > Flags [S.], seq 1277075046, ack 1001452352, win 8192,
> > > > > > > options [mss 1452], length 0
> > > > > > 
> > > > > > It should look something like:
> > > > > > 09:18:34.723280 IP jmgmac.funkthat.com.64724 >
> > > > > > h2.funkthat.com.ssh: Flags [.], ack 177, win 33280, options
> > > > > > [nop,nop,TS val 1854905469 ecr 3482476972], length 0
> > > > > > 0x:  4510 0034 d7ac 4000 4006 e1af c0a8 0003
> > > > > >  E..4..@.@...
> > > > > > 0x0010:  c0a8 0004 fcd4 0016 7e48 238e d872 43dc
> > > > > >  ~H#..rC.
> > > > > > 0x0020:  8010 8200 7c08  0101 080a 6e8f 9c7d
> > > > > >  |...n..}
> > > > > > 0x0030:  cf92 61ac
> > > > > >..a.
> > > > > > 
> > > > > > Notice the hex output...  I didn't see any of that in your
> > > > > > output...
> > > > > > The last packet I was talking about is the last one that had
> > > > > > length
> > > > > > 1448 that your server sent...
> > > > > 
> > > > > I sent two e-mails consecutively: the first without an
> > > > > attachment, the
> > > > > second with attachment. I dumped tcp of the NIC for port smtp.
> > > > > I got the
> > > > > following:
> > > > > 
> > > > > 
> > > > > 12:20:55.988622 IP MyServer.com.37191 > Smarthost.com.smtp:
> > > > > Flags [P.], seq 18943:19104, ack 412, win 65535, length 161
> > > > > 0x:  4500 00c9 eebd 4000 4006  c0a8 0004
> > > > >  E.@.@...
> > > > > 0x0010:  d54b 3f0d 9147 0019 4ea0 36dd 15a7 38a0
> > > > >  .K?..G..N.6...8.
> > > > > 0x0020:  5018  4481  2020 2020 2020 2020
> > > > >  P...D...
> > > > > 0x0030:  2020 2020 2020 2020 2020 2020 2020 2020
> > > > >  
> > > > > 0x0040:  2020 2020 2020 2020 2020 2020 2020 205c
> > > > >  ...\
> > > > > 0x0050:  2f20 205c 205e 0d0a 2020 2020 2020 2020
> > > > >  /..\.^..
> > > > > 0x0060:  2020 2020 2020 2020 2020 2020 2020 2020
> > > > >  
> > > > > 0x0070:  2020 2020 2020 2020 2020 2020 2020 2020
> > > > >  
> > > > > 0x0080:  2020 202e 5c2e 5f2f 5f29 0d0a 0d0a 2020
> > > > >  \._/_)..
> > > > > 0x0090:  2020 2020 2020 2020 2020 2020 2020 2020
> > > > >  
> > > > > 0x00a0:  2020 2020 2020 2020 2020 2020 2020 2020
> > > > >  
> > > > > 0x00b0:  2020 2020 2077  2e46 7265 6542 5344
> > > > >  .www.FreeBSD
> > > > > 0x00c0:  2e6f 7267 0d0a 2e0d 0a
> > > > >   .org.
> > > > > 
> > > > > As predicted by John-Mark, the first ended with "0d0a 2e0d 0a".
> > > > > However it
> > > > > was not the last packet with length 1448. I hope that this will
> > > > > not spoil
> > > 

Re: sendmail Broken Pipe Error

2014-03-29 Thread Lucius Rizzo
* Willy Offermans  [2014-03-24 14:36]:
> Dear FreeBSD friends,
> 
> Lately I have setup a new FreeBSD server with 10.0-STABLE. Most of it went
> smoothly. However I have an issue with sendmail. Some of the mails can be
> sent out correctly, some of them stay in /var/spool/mqueue/. The provided
> error messages are in the latter case:
> 
> Mar 24 14:16:01 MyServer sm-mta[11725]: s2ODCWT4011717: SYSERR(root): timeout
> writing message to MyProvider.com: Broken pipe Mar 24 14:16:01 MyServer
> sm-mta[11725]: s2ODCWT4011717: to=, delay=00:03:29,
> xdelay=00:03:26, mailer=relay, pri=1284849, relay=MyProvider.com
> [XXX.XXX.XXX.XXX], dsn=4.0.0, stat=Deferred
> 
> I'm using Version 8.14.7 All was fine when I was using Version 8.14.5.

Could be a number of things -- maybe even TLS? I am currently on 8.14.8 which
is the latest. I have a pretty complex setup including milters galore with zero
problems. Have you considered updating to the latest release? That might
help.

You can also try sending an email via debug in sendmail to MyProvider.com and
see if there is something going on or perhaps provide us with a few more
details..

-- 

| _o_ |_)o_ _  _  
|_|_|(_||_|_> | \|/_/_(_) - Lucius.Tel
--
++ What the hell is it good for? ++
++  -- Robert Lloyd (engineer of the Advanced Computing Systems ++
++ Division of IBM), to colleagues who insisted that the ++
++ microprocessor was the wave of the future, c. 1968 ++
___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: sendmail Broken Pipe Error

2014-03-28 Thread Rick Macklem
John-Mark Gurney wrote:
> Willy Offermans wrote this message on Thu, Mar 27, 2014 at 15:46
> +0100:
> > Hello John-Mark and FreeBSD friends,
> > 
> > On Wed, Mar 26, 2014 at 04:04:27PM -0700, John-Mark Gurney wrote:
> > > Willy Offermans wrote this message on Wed, Mar 26, 2014 at 18:22
> > > +0100:
> > > > Hello John-Mark and FreeBSD friends,
> > > > 
> > > > On Wed, Mar 26, 2014 at 09:20:35AM -0700, John-Mark Gurney
> > > > wrote:
> > > > > Willy Offermans wrote this message on Wed, Mar 26, 2014 at
> > > > > 12:17 +0100:
> > > > > > On Tue, Mar 25, 2014 at 09:43:16AM -0700, John-Mark Gurney
> > > > > > wrote:
> > > > > > > Willy Offermans wrote this message on Tue, Mar 25, 2014
> > > > > > > at 11:39 +0100:
> > > > > > > > I'm not an expert in tcpdump. Can anyone make sense out
> > > > > > > > of the messages?
> > > > > > > 
> > > > > > > If you dumped the contents, using -s 0 -X, and look at
> > > > > > > that last packet
> > > > > > > you should see 0d 0a 2e 0d 0a at the end..  which is
> > > > > > > CR/LF/./CR/LF.. If
> > > > > > > you don't see that, then for some reason sendmail/FreeBSD
> > > > > > > isn't telling
> > > > > > > the server that it's done sending which would prevent the
> > > > > > > receiving
> > > > > > > side from ack'ing the email causing the timeout...
> > > > > > 
> > > > > > I followed your suggestions. However I'm not able to
> > > > > > distinguish the last
> > > > > > packet. Is there a way to find this with help of the Flags?
> > > > > > The following
> > > > > > is the output of tcpdump -r /root/tmp/tcpdump -X | grep
> > > > > > Flags
> > > > > > 
> > > > > > 11:57:56.539788 IP MyServer.com.41115 > Smarthost.com.smtp:
> > > > > > Flags [S], seq 1001452351, win 65535, options [mss
> > > > > > 1448,nop,wscale 6,sackOK,TS val 407239960 ecr 0], length 0
> > > > > > 11:57:56.555262 IP Smarthost.com.smtp > MyServer.com.41115:
> > > > > > Flags [S.], seq 1277075046, ack 1001452352, win 8192,
> > > > > > options [mss 1452], length 0
> > > > > 
> > > > > It should look something like:
> > > > > 09:18:34.723280 IP jmgmac.funkthat.com.64724 >
> > > > > h2.funkthat.com.ssh: Flags [.], ack 177, win 33280, options
> > > > > [nop,nop,TS val 1854905469 ecr 3482476972], length 0
> > > > > 0x:  4510 0034 d7ac 4000 4006 e1af c0a8 0003
> > > > >  E..4..@.@...
> > > > > 0x0010:  c0a8 0004 fcd4 0016 7e48 238e d872 43dc
> > > > >  ~H#..rC.
> > > > > 0x0020:  8010 8200 7c08  0101 080a 6e8f 9c7d
> > > > >  |...n..}
> > > > > 0x0030:  cf92 61ac
> > > > >..a.
> > > > > 
> > > > > Notice the hex output...  I didn't see any of that in your
> > > > > output...
> > > > > The last packet I was talking about is the last one that had
> > > > > length
> > > > > 1448 that your server sent...
> > > > 
> > > > I sent two e-mails consecutively: the first without an
> > > > attachment, the
> > > > second with attachment. I dumped tcp of the NIC for port smtp.
> > > > I got the
> > > > following:
> > > > 
> > > > 
> > > > 12:20:55.988622 IP MyServer.com.37191 > Smarthost.com.smtp:
> > > > Flags [P.], seq 18943:19104, ack 412, win 65535, length 161
> > > > 0x:  4500 00c9 eebd 4000 4006  c0a8 0004
> > > >  E.@.@...
> > > > 0x0010:  d54b 3f0d 9147 0019 4ea0 36dd 15a7 38a0
> > > >  .K?..G..N.6...8.
> > > > 0x0020:  5018  4481  2020 2020 2020 2020
> > > >  P...D...
> > > > 0x0030:  2020 2020 2020 2020 2020 2020 2020 2020
> > > >  
> > > > 0x0040:  2020 2020 2020 2020 2020 2020 2020 205c
> > > >  ...\
> > > > 0x0050:  2f20 205c 205e 0d0a 2020 2020 2020 2020
> > > >  /..\.^..
> > > > 0x0060:  2020 2020 2020 2020 2020 2020 2020 2020
> > > >  
> > > > 0x0070:  2020 2020 2020 2020 2020 2020 2020 2020
> > > >  
> > > > 0x0080:  2020 202e 5c2e 5f2f 5f29 0d0a 0d0a 2020
> > > >  \._/_)..
> > > > 0x0090:  2020 2020 2020 2020 2020 2020 2020 2020
> > > >  
> > > > 0x00a0:  2020 2020 2020 2020 2020 2020 2020 2020
> > > >  
> > > > 0x00b0:  2020 2020 2077  2e46 7265 6542 5344
> > > >  .www.FreeBSD
> > > > 0x00c0:  2e6f 7267 0d0a 2e0d 0a
> > > >   .org.
> > > > 
> > > > As predicted by John-Mark, the first ended with "0d0a 2e0d 0a".
> > > > However it
> > > > was not the last packet with length 1448. I hope that this will
> > > > not spoil
> > > > the party. Is the Flag [P.] more indicative? It looks like to
> > > > me, but I'm
> > > > just learning.
> > > > 
> > > > Anyway the second mail ended with:
> > > > 
> > > > 12:22:17.960896 IP MyServer.com.37191 > Smarthost.com.smtp:
> > > > Flags [.], seq 35127:36575, ack 638, win 65535, length 1448

Re: sendmail Broken Pipe Error

2014-03-28 Thread Willy Offermans
Hello John-Mark and FreeBSD friends,

On Thu, Mar 27, 2014 at 08:27:01PM -0700, John-Mark Gurney wrote:
> Willy Offermans wrote this message on Thu, Mar 27, 2014 at 15:46 +0100:
> > Hello John-Mark and FreeBSD friends,
> > 
> > On Wed, Mar 26, 2014 at 04:04:27PM -0700, John-Mark Gurney wrote:
> > > Willy Offermans wrote this message on Wed, Mar 26, 2014 at 18:22 +0100:
> > > > Hello John-Mark and FreeBSD friends,
> > > > 
> > > > On Wed, Mar 26, 2014 at 09:20:35AM -0700, John-Mark Gurney wrote:
> > > > > Willy Offermans wrote this message on Wed, Mar 26, 2014 at 12:17 
> > > > > +0100:
> > > > > > On Tue, Mar 25, 2014 at 09:43:16AM -0700, John-Mark Gurney wrote:
> > > > > > > Willy Offermans wrote this message on Tue, Mar 25, 2014 at 11:39 
> > > > > > > +0100:
> > > > > > > > I'm not an expert in tcpdump. Can anyone make sense out of the 
> > > > > > > > messages?
> > > > > > > 
> > > > > > > If you dumped the contents, using -s 0 -X, and look at that last 
> > > > > > > packet
> > > > > > > you should see 0d 0a 2e 0d 0a at the end..  which is 
> > > > > > > CR/LF/./CR/LF.. If
> > > > > > > you don't see that, then for some reason sendmail/FreeBSD isn't 
> > > > > > > telling
> > > > > > > the server that it's done sending which would prevent the 
> > > > > > > receiving
> > > > > > > side from ack'ing the email causing the timeout...
> > > > > > 
> > > > > > I followed your suggestions. However I'm not able to distinguish 
> > > > > > the last
> > > > > > packet. Is there a way to find this with help of the Flags? The 
> > > > > > following
> > > > > > is the output of tcpdump -r /root/tmp/tcpdump -X | grep Flags
> > > > > > 
> > > > > > 11:57:56.539788 IP MyServer.com.41115 > Smarthost.com.smtp: Flags 
> > > > > > [S], seq 1001452351, win 65535, options [mss 1448,nop,wscale 
> > > > > > 6,sackOK,TS val 407239960 ecr 0], length 0
> > > > > > 11:57:56.555262 IP Smarthost.com.smtp > MyServer.com.41115: Flags 
> > > > > > [S.], seq 1277075046, ack 1001452352, win 8192, options [mss 1452], 
> > > > > > length 0
> > > > > 
> > > > > It should look something like:
> > > > > 09:18:34.723280 IP jmgmac.funkthat.com.64724 > h2.funkthat.com.ssh: 
> > > > > Flags [.], ack 177, win 33280, options [nop,nop,TS val 1854905469 ecr 
> > > > > 3482476972], length 0
> > > > > 0x:  4510 0034 d7ac 4000 4006 e1af c0a8 0003  
> > > > > E..4..@.@...
> > > > > 0x0010:  c0a8 0004 fcd4 0016 7e48 238e d872 43dc  
> > > > > ~H#..rC.
> > > > > 0x0020:  8010 8200 7c08  0101 080a 6e8f 9c7d  
> > > > > |...n..}
> > > > > 0x0030:  cf92 61ac..a.
> > > > > 
> > > > > Notice the hex output...  I didn't see any of that in your output...
> > > > > The last packet I was talking about is the last one that had length
> > > > > 1448 that your server sent...
> > > > 
> > > > I sent two e-mails consecutively: the first without an attachment, the
> > > > second with attachment. I dumped tcp of the NIC for port smtp. I got the
> > > > following:
> > > > 
> > > > 
> > > > 12:20:55.988622 IP MyServer.com.37191 > Smarthost.com.smtp: Flags [P.], 
> > > > seq 18943:19104, ack 412, win 65535, length 161
> > > > 0x:  4500 00c9 eebd 4000 4006  c0a8 0004  
> > > > E.@.@...
> > > > 0x0010:  d54b 3f0d 9147 0019 4ea0 36dd 15a7 38a0  
> > > > .K?..G..N.6...8.
> > > > 0x0020:  5018  4481  2020 2020 2020 2020  
> > > > P...D...
> > > > 0x0030:  2020 2020 2020 2020 2020 2020 2020 2020  
> > > > 
> > > > 0x0040:  2020 2020 2020 2020 2020 2020 2020 205c  
> > > > ...\
> > > > 0x0050:  2f20 205c 205e 0d0a 2020 2020 2020 2020  
> > > > /..\.^..
> > > > 0x0060:  2020 2020 2020 2020 2020 2020 2020 2020  
> > > > 
> > > > 0x0070:  2020 2020 2020 2020 2020 2020 2020 2020  
> > > > 
> > > > 0x0080:  2020 202e 5c2e 5f2f 5f29 0d0a 0d0a 2020  
> > > > \._/_)..
> > > > 0x0090:  2020 2020 2020 2020 2020 2020 2020 2020  
> > > > 
> > > > 0x00a0:  2020 2020 2020 2020 2020 2020 2020 2020  
> > > > 
> > > > 0x00b0:  2020 2020 2077  2e46 7265 6542 5344  
> > > > .www.FreeBSD
> > > > 0x00c0:  2e6f 7267 0d0a 2e0d 0a   .org.
> > > > 
> > > > As predicted by John-Mark, the first ended with "0d0a 2e0d 0a". However 
> > > > it
> > > > was not the last packet with length 1448. I hope that this will not 
> > > > spoil
> > > > the party. Is the Flag [P.] more indicative? It looks like to me, but 
> > > > I'm
> > > > just learning.
> > > > 
> > > > Anyway the second mail ended with:
> > > > 
> > > > 12:22:17.960896 IP MyServer.com.37191 > Smarthost.com.smtp: Flags [.], 
> > > > seq 35127:36575, ack 638, win 65535, length 1448
> > > > 0x:  4500 05d0 fe9d 4000 4006  c0a8 0004  
> > > > E.@.@...
> > > > 
> > > > 
> > 

Re: sendmail Broken Pipe Error

2014-03-27 Thread John-Mark Gurney
Willy Offermans wrote this message on Thu, Mar 27, 2014 at 15:46 +0100:
> Hello John-Mark and FreeBSD friends,
> 
> On Wed, Mar 26, 2014 at 04:04:27PM -0700, John-Mark Gurney wrote:
> > Willy Offermans wrote this message on Wed, Mar 26, 2014 at 18:22 +0100:
> > > Hello John-Mark and FreeBSD friends,
> > > 
> > > On Wed, Mar 26, 2014 at 09:20:35AM -0700, John-Mark Gurney wrote:
> > > > Willy Offermans wrote this message on Wed, Mar 26, 2014 at 12:17 +0100:
> > > > > On Tue, Mar 25, 2014 at 09:43:16AM -0700, John-Mark Gurney wrote:
> > > > > > Willy Offermans wrote this message on Tue, Mar 25, 2014 at 11:39 
> > > > > > +0100:
> > > > > > > I'm not an expert in tcpdump. Can anyone make sense out of the 
> > > > > > > messages?
> > > > > > 
> > > > > > If you dumped the contents, using -s 0 -X, and look at that last 
> > > > > > packet
> > > > > > you should see 0d 0a 2e 0d 0a at the end..  which is 
> > > > > > CR/LF/./CR/LF.. If
> > > > > > you don't see that, then for some reason sendmail/FreeBSD isn't 
> > > > > > telling
> > > > > > the server that it's done sending which would prevent the receiving
> > > > > > side from ack'ing the email causing the timeout...
> > > > > 
> > > > > I followed your suggestions. However I'm not able to distinguish the 
> > > > > last
> > > > > packet. Is there a way to find this with help of the Flags? The 
> > > > > following
> > > > > is the output of tcpdump -r /root/tmp/tcpdump -X | grep Flags
> > > > > 
> > > > > 11:57:56.539788 IP MyServer.com.41115 > Smarthost.com.smtp: Flags 
> > > > > [S], seq 1001452351, win 65535, options [mss 1448,nop,wscale 
> > > > > 6,sackOK,TS val 407239960 ecr 0], length 0
> > > > > 11:57:56.555262 IP Smarthost.com.smtp > MyServer.com.41115: Flags 
> > > > > [S.], seq 1277075046, ack 1001452352, win 8192, options [mss 1452], 
> > > > > length 0
> > > > 
> > > > It should look something like:
> > > > 09:18:34.723280 IP jmgmac.funkthat.com.64724 > h2.funkthat.com.ssh: 
> > > > Flags [.], ack 177, win 33280, options [nop,nop,TS val 1854905469 ecr 
> > > > 3482476972], length 0
> > > > 0x:  4510 0034 d7ac 4000 4006 e1af c0a8 0003  
> > > > E..4..@.@...
> > > > 0x0010:  c0a8 0004 fcd4 0016 7e48 238e d872 43dc  
> > > > ~H#..rC.
> > > > 0x0020:  8010 8200 7c08  0101 080a 6e8f 9c7d  
> > > > |...n..}
> > > > 0x0030:  cf92 61ac..a.
> > > > 
> > > > Notice the hex output...  I didn't see any of that in your output...
> > > > The last packet I was talking about is the last one that had length
> > > > 1448 that your server sent...
> > > 
> > > I sent two e-mails consecutively: the first without an attachment, the
> > > second with attachment. I dumped tcp of the NIC for port smtp. I got the
> > > following:
> > > 
> > > 
> > > 12:20:55.988622 IP MyServer.com.37191 > Smarthost.com.smtp: Flags [P.], 
> > > seq 18943:19104, ack 412, win 65535, length 161
> > > 0x:  4500 00c9 eebd 4000 4006  c0a8 0004  E.@.@...
> > > 0x0010:  d54b 3f0d 9147 0019 4ea0 36dd 15a7 38a0  .K?..G..N.6...8.
> > > 0x0020:  5018  4481  2020 2020 2020 2020  P...D...
> > > 0x0030:  2020 2020 2020 2020 2020 2020 2020 2020  
> > > 0x0040:  2020 2020 2020 2020 2020 2020 2020 205c  ...\
> > > 0x0050:  2f20 205c 205e 0d0a 2020 2020 2020 2020  /..\.^..
> > > 0x0060:  2020 2020 2020 2020 2020 2020 2020 2020  
> > > 0x0070:  2020 2020 2020 2020 2020 2020 2020 2020  
> > > 0x0080:  2020 202e 5c2e 5f2f 5f29 0d0a 0d0a 2020  \._/_)..
> > > 0x0090:  2020 2020 2020 2020 2020 2020 2020 2020  
> > > 0x00a0:  2020 2020 2020 2020 2020 2020 2020 2020  
> > > 0x00b0:  2020 2020 2077  2e46 7265 6542 5344  .www.FreeBSD
> > > 0x00c0:  2e6f 7267 0d0a 2e0d 0a   .org.
> > > 
> > > As predicted by John-Mark, the first ended with "0d0a 2e0d 0a". However it
> > > was not the last packet with length 1448. I hope that this will not spoil
> > > the party. Is the Flag [P.] more indicative? It looks like to me, but I'm
> > > just learning.
> > > 
> > > Anyway the second mail ended with:
> > > 
> > > 12:22:17.960896 IP MyServer.com.37191 > Smarthost.com.smtp: Flags [.], 
> > > seq 35127:36575, ack 638, win 65535, length 1448
> > > 0x:  4500 05d0 fe9d 4000 4006  c0a8 0004  E.@.@...
> > > 
> > > 
> > > 0x0560:  5670 6876 4a67 5a5a 5a50 4b2f 4b78 3774  VphvJgZZZPK/Kx7t
> > > 0x0570:  382f 4230 594f 6b78 3449 0d0a 4a76 6551  8/B0YOkx4I..JveQ
> > > 0x0580:  2b6e 7765 5647 2f33 6e79 6231 6133 496f  +nweVG/3nyb1a3Io
> > > 0x0590:  5474 554f 4d61 4374 696b 714b 436b 4959  TtUOMaCtikqKCkIY
> > > 0x05a0:  704a 7668 3055 416d 6c33 4754 4f4c 6455  pJvh0UAml3GTOLdU
> > > 0x05b0:  774b 4145 7151 5741 78

Re: sendmail Broken Pipe Error

2014-03-27 Thread Willy Offermans
Hello John-Mark and FreeBSD friends,

On Wed, Mar 26, 2014 at 04:04:27PM -0700, John-Mark Gurney wrote:
> Willy Offermans wrote this message on Wed, Mar 26, 2014 at 18:22 +0100:
> > Hello John-Mark and FreeBSD friends,
> > 
> > On Wed, Mar 26, 2014 at 09:20:35AM -0700, John-Mark Gurney wrote:
> > > Willy Offermans wrote this message on Wed, Mar 26, 2014 at 12:17 +0100:
> > > > On Tue, Mar 25, 2014 at 09:43:16AM -0700, John-Mark Gurney wrote:
> > > > > Willy Offermans wrote this message on Tue, Mar 25, 2014 at 11:39 
> > > > > +0100:
> > > > > > I'm not an expert in tcpdump. Can anyone make sense out of the 
> > > > > > messages?
> > > > > 
> > > > > If you dumped the contents, using -s 0 -X, and look at that last 
> > > > > packet
> > > > > you should see 0d 0a 2e 0d 0a at the end..  which is CR/LF/./CR/LF.. 
> > > > > If
> > > > > you don't see that, then for some reason sendmail/FreeBSD isn't 
> > > > > telling
> > > > > the server that it's done sending which would prevent the receiving
> > > > > side from ack'ing the email causing the timeout...
> > > > 
> > > > I followed your suggestions. However I'm not able to distinguish the 
> > > > last
> > > > packet. Is there a way to find this with help of the Flags? The 
> > > > following
> > > > is the output of tcpdump -r /root/tmp/tcpdump -X | grep Flags
> > > > 
> > > > 11:57:56.539788 IP MyServer.com.41115 > Smarthost.com.smtp: Flags [S], 
> > > > seq 1001452351, win 65535, options [mss 1448,nop,wscale 6,sackOK,TS val 
> > > > 407239960 ecr 0], length 0
> > > > 11:57:56.555262 IP Smarthost.com.smtp > MyServer.com.41115: Flags [S.], 
> > > > seq 1277075046, ack 1001452352, win 8192, options [mss 1452], length 0
> > > 
> > > It should look something like:
> > > 09:18:34.723280 IP jmgmac.funkthat.com.64724 > h2.funkthat.com.ssh: Flags 
> > > [.], ack 177, win 33280, options [nop,nop,TS val 1854905469 ecr 
> > > 3482476972], length 0
> > > 0x:  4510 0034 d7ac 4000 4006 e1af c0a8 0003  E..4..@.@...
> > > 0x0010:  c0a8 0004 fcd4 0016 7e48 238e d872 43dc  ~H#..rC.
> > > 0x0020:  8010 8200 7c08  0101 080a 6e8f 9c7d  |...n..}
> > > 0x0030:  cf92 61ac..a.
> > > 
> > > Notice the hex output...  I didn't see any of that in your output...
> > > The last packet I was talking about is the last one that had length
> > > 1448 that your server sent...
> > 
> > I sent two e-mails consecutively: the first without an attachment, the
> > second with attachment. I dumped tcp of the NIC for port smtp. I got the
> > following:
> > 
> > 
> > 12:20:55.988622 IP MyServer.com.37191 > Smarthost.com.smtp: Flags [P.], seq 
> > 18943:19104, ack 412, win 65535, length 161
> > 0x:  4500 00c9 eebd 4000 4006  c0a8 0004  E.@.@...
> > 0x0010:  d54b 3f0d 9147 0019 4ea0 36dd 15a7 38a0  .K?..G..N.6...8.
> > 0x0020:  5018  4481  2020 2020 2020 2020  P...D...
> > 0x0030:  2020 2020 2020 2020 2020 2020 2020 2020  
> > 0x0040:  2020 2020 2020 2020 2020 2020 2020 205c  ...\
> > 0x0050:  2f20 205c 205e 0d0a 2020 2020 2020 2020  /..\.^..
> > 0x0060:  2020 2020 2020 2020 2020 2020 2020 2020  
> > 0x0070:  2020 2020 2020 2020 2020 2020 2020 2020  
> > 0x0080:  2020 202e 5c2e 5f2f 5f29 0d0a 0d0a 2020  \._/_)..
> > 0x0090:  2020 2020 2020 2020 2020 2020 2020 2020  
> > 0x00a0:  2020 2020 2020 2020 2020 2020 2020 2020  
> > 0x00b0:  2020 2020 2077  2e46 7265 6542 5344  .www.FreeBSD
> > 0x00c0:  2e6f 7267 0d0a 2e0d 0a   .org.
> > 
> > As predicted by John-Mark, the first ended with "0d0a 2e0d 0a". However it
> > was not the last packet with length 1448. I hope that this will not spoil
> > the party. Is the Flag [P.] more indicative? It looks like to me, but I'm
> > just learning.
> > 
> > Anyway the second mail ended with:
> > 
> > 12:22:17.960896 IP MyServer.com.37191 > Smarthost.com.smtp: Flags [.], seq 
> > 35127:36575, ack 638, win 65535, length 1448
> > 0x:  4500 05d0 fe9d 4000 4006  c0a8 0004  E.@.@...
> > 
> > 
> > 0x0560:  5670 6876 4a67 5a5a 5a50 4b2f 4b78 3774  VphvJgZZZPK/Kx7t
> > 0x0570:  382f 4230 594f 6b78 3449 0d0a 4a76 6551  8/B0YOkx4I..JveQ
> > 0x0580:  2b6e 7765 5647 2f33 6e79 6231 6133 496f  +nweVG/3nyb1a3Io
> > 0x0590:  5474 554f 4d61 4374 696b 714b 436b 4959  TtUOMaCtikqKCkIY
> > 0x05a0:  704a 7668 3055 416d 6c33 4754 4f4c 6455  pJvh0UAml3GTOLdU
> > 0x05b0:  774b 4145 7151 5741 7841 4141 5a66 7647  wKAEqQWAxAAAZfvG
> > 0x05c0:  706b 6c36 0d0a 7a4e 6234 745a 6633 5a6c  pkl6..zNb4tZf3Zl
> > 
> > Being packet with length 1448 and sent from my side. The code "0d0a 2e0d
> > 0a" is missing. Immediately thereafter the following packets:
> 
> We clearly haven

Re: sendmail Broken Pipe Error

2014-03-26 Thread John-Mark Gurney
Willy Offermans wrote this message on Wed, Mar 26, 2014 at 18:22 +0100:
> Hello John-Mark and FreeBSD friends,
> 
> On Wed, Mar 26, 2014 at 09:20:35AM -0700, John-Mark Gurney wrote:
> > Willy Offermans wrote this message on Wed, Mar 26, 2014 at 12:17 +0100:
> > > On Tue, Mar 25, 2014 at 09:43:16AM -0700, John-Mark Gurney wrote:
> > > > Willy Offermans wrote this message on Tue, Mar 25, 2014 at 11:39 +0100:
> > > > > I'm not an expert in tcpdump. Can anyone make sense out of the 
> > > > > messages?
> > > > 
> > > > If you dumped the contents, using -s 0 -X, and look at that last packet
> > > > you should see 0d 0a 2e 0d 0a at the end..  which is CR/LF/./CR/LF.. If
> > > > you don't see that, then for some reason sendmail/FreeBSD isn't telling
> > > > the server that it's done sending which would prevent the receiving
> > > > side from ack'ing the email causing the timeout...
> > > 
> > > I followed your suggestions. However I'm not able to distinguish the last
> > > packet. Is there a way to find this with help of the Flags? The following
> > > is the output of tcpdump -r /root/tmp/tcpdump -X | grep Flags
> > > 
> > > 11:57:56.539788 IP MyServer.com.41115 > Smarthost.com.smtp: Flags [S], 
> > > seq 1001452351, win 65535, options [mss 1448,nop,wscale 6,sackOK,TS val 
> > > 407239960 ecr 0], length 0
> > > 11:57:56.555262 IP Smarthost.com.smtp > MyServer.com.41115: Flags [S.], 
> > > seq 1277075046, ack 1001452352, win 8192, options [mss 1452], length 0
> > 
> > It should look something like:
> > 09:18:34.723280 IP jmgmac.funkthat.com.64724 > h2.funkthat.com.ssh: Flags 
> > [.], ack 177, win 33280, options [nop,nop,TS val 1854905469 ecr 
> > 3482476972], length 0
> > 0x:  4510 0034 d7ac 4000 4006 e1af c0a8 0003  E..4..@.@...
> > 0x0010:  c0a8 0004 fcd4 0016 7e48 238e d872 43dc  ~H#..rC.
> > 0x0020:  8010 8200 7c08  0101 080a 6e8f 9c7d  |...n..}
> > 0x0030:  cf92 61ac..a.
> > 
> > Notice the hex output...  I didn't see any of that in your output...
> > The last packet I was talking about is the last one that had length
> > 1448 that your server sent...
> 
> I sent two e-mails consecutively: the first without an attachment, the
> second with attachment. I dumped tcp of the NIC for port smtp. I got the
> following:
> 
> 
> 12:20:55.988622 IP MyServer.com.37191 > Smarthost.com.smtp: Flags [P.], seq 
> 18943:19104, ack 412, win 65535, length 161
> 0x:  4500 00c9 eebd 4000 4006  c0a8 0004  E.@.@...
> 0x0010:  d54b 3f0d 9147 0019 4ea0 36dd 15a7 38a0  .K?..G..N.6...8.
> 0x0020:  5018  4481  2020 2020 2020 2020  P...D...
> 0x0030:  2020 2020 2020 2020 2020 2020 2020 2020  
> 0x0040:  2020 2020 2020 2020 2020 2020 2020 205c  ...\
> 0x0050:  2f20 205c 205e 0d0a 2020 2020 2020 2020  /..\.^..
> 0x0060:  2020 2020 2020 2020 2020 2020 2020 2020  
> 0x0070:  2020 2020 2020 2020 2020 2020 2020 2020  
> 0x0080:  2020 202e 5c2e 5f2f 5f29 0d0a 0d0a 2020  \._/_)..
> 0x0090:  2020 2020 2020 2020 2020 2020 2020 2020  
> 0x00a0:  2020 2020 2020 2020 2020 2020 2020 2020  
> 0x00b0:  2020 2020 2077  2e46 7265 6542 5344  .www.FreeBSD
> 0x00c0:  2e6f 7267 0d0a 2e0d 0a   .org.
> 
> As predicted by John-Mark, the first ended with "0d0a 2e0d 0a". However it
> was not the last packet with length 1448. I hope that this will not spoil
> the party. Is the Flag [P.] more indicative? It looks like to me, but I'm
> just learning.
> 
> Anyway the second mail ended with:
> 
> 12:22:17.960896 IP MyServer.com.37191 > Smarthost.com.smtp: Flags [.], seq 
> 35127:36575, ack 638, win 65535, length 1448
> 0x:  4500 05d0 fe9d 4000 4006  c0a8 0004  E.@.@...
> 
> 
> 0x0560:  5670 6876 4a67 5a5a 5a50 4b2f 4b78 3774  VphvJgZZZPK/Kx7t
> 0x0570:  382f 4230 594f 6b78 3449 0d0a 4a76 6551  8/B0YOkx4I..JveQ
> 0x0580:  2b6e 7765 5647 2f33 6e79 6231 6133 496f  +nweVG/3nyb1a3Io
> 0x0590:  5474 554f 4d61 4374 696b 714b 436b 4959  TtUOMaCtikqKCkIY
> 0x05a0:  704a 7668 3055 416d 6c33 4754 4f4c 6455  pJvh0UAml3GTOLdU
> 0x05b0:  774b 4145 7151 5741 7841 4141 5a66 7647  wKAEqQWAxAAAZfvG
> 0x05c0:  706b 6c36 0d0a 7a4e 6234 745a 6633 5a6c  pkl6..zNb4tZf3Zl
> 
> Being packet with length 1448 and sent from my side. The code "0d0a 2e0d
> 0a" is missing. Immediately thereafter the following packets:

We clearly haven't gotten the last mime-boundary, we are still in the
base64 encoded data of the attachment...

> 12:22:18.003557 IP Smarthost.com.smtp > MyServer.com.37191: Flags [.], ack 
> 36575, win 65160, length 0
> 0x:  4500 0028 11fb 4000 7a06 19d0 d54b 3f0d  E..(..@.zK?.
> 0x0010:  c0a8 0004 0019 9147 15a7 3982 4ea0 

Re: sendmail Broken Pipe Error

2014-03-26 Thread Willy Offermans
Hello John-Mark and FreeBSD friends,

On Wed, Mar 26, 2014 at 09:20:35AM -0700, John-Mark Gurney wrote:
> Willy Offermans wrote this message on Wed, Mar 26, 2014 at 12:17 +0100:
> > On Tue, Mar 25, 2014 at 09:43:16AM -0700, John-Mark Gurney wrote:
> > > Willy Offermans wrote this message on Tue, Mar 25, 2014 at 11:39 +0100:
> > > > I'm not an expert in tcpdump. Can anyone make sense out of the messages?
> > > 
> > > If you dumped the contents, using -s 0 -X, and look at that last packet
> > > you should see 0d 0a 2e 0d 0a at the end..  which is CR/LF/./CR/LF.. If
> > > you don't see that, then for some reason sendmail/FreeBSD isn't telling
> > > the server that it's done sending which would prevent the receiving
> > > side from ack'ing the email causing the timeout...
> > 
> > I followed your suggestions. However I'm not able to distinguish the last
> > packet. Is there a way to find this with help of the Flags? The following
> > is the output of tcpdump -r /root/tmp/tcpdump -X | grep Flags
> > 
> > 11:57:56.539788 IP MyServer.com.41115 > Smarthost.com.smtp: Flags [S], seq 
> > 1001452351, win 65535, options [mss 1448,nop,wscale 6,sackOK,TS val 
> > 407239960 ecr 0], length 0
> > 11:57:56.555262 IP Smarthost.com.smtp > MyServer.com.41115: Flags [S.], seq 
> > 1277075046, ack 1001452352, win 8192, options [mss 1452], length 0
> 
> It should look something like:
> 09:18:34.723280 IP jmgmac.funkthat.com.64724 > h2.funkthat.com.ssh: Flags 
> [.], ack 177, win 33280, options [nop,nop,TS val 1854905469 ecr 3482476972], 
> length 0
> 0x:  4510 0034 d7ac 4000 4006 e1af c0a8 0003  E..4..@.@...
> 0x0010:  c0a8 0004 fcd4 0016 7e48 238e d872 43dc  ~H#..rC.
> 0x0020:  8010 8200 7c08  0101 080a 6e8f 9c7d  |...n..}
> 0x0030:  cf92 61ac..a.
> 
> Notice the hex output...  I didn't see any of that in your output...
> The last packet I was talking about is the last one that had length
> 1448 that your server sent...
> 
> -- 
>   John-Mark GurneyVoice: +1 415 225 5579
> 
>  "All that I will do, has been done, All that I have, has not."
> ___
> freebsd-current@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-current
> To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


I sent two e-mails consecutively: the first without an attachment, the
second with attachment. I dumped tcp of the NIC for port smtp. I got the
following:


12:20:55.988622 IP MyServer.com.37191 > Smarthost.com.smtp: Flags [P.], seq 
18943:19104, ack 412, win 65535, length 161
0x:  4500 00c9 eebd 4000 4006  c0a8 0004  E.@.@...
0x0010:  d54b 3f0d 9147 0019 4ea0 36dd 15a7 38a0  .K?..G..N.6...8.
0x0020:  5018  4481  2020 2020 2020 2020  P...D...
0x0030:  2020 2020 2020 2020 2020 2020 2020 2020  
0x0040:  2020 2020 2020 2020 2020 2020 2020 205c  ...\
0x0050:  2f20 205c 205e 0d0a 2020 2020 2020 2020  /..\.^..
0x0060:  2020 2020 2020 2020 2020 2020 2020 2020  
0x0070:  2020 2020 2020 2020 2020 2020 2020 2020  
0x0080:  2020 202e 5c2e 5f2f 5f29 0d0a 0d0a 2020  \._/_)..
0x0090:  2020 2020 2020 2020 2020 2020 2020 2020  
0x00a0:  2020 2020 2020 2020 2020 2020 2020 2020  
0x00b0:  2020 2020 2077  2e46 7265 6542 5344  .www.FreeBSD
0x00c0:  2e6f 7267 0d0a 2e0d 0a   .org.

As predicted by John-Mark, the first ended with "0d0a 2e0d 0a". However it
was not the last packet with length 1448. I hope that this will not spoil
the party. Is the Flag [P.] more indicative? It looks like to me, but I'm
just learning.

Anyway the second mail ended with:

12:22:17.960896 IP MyServer.com.37191 > Smarthost.com.smtp: Flags [.], seq 
35127:36575, ack 638, win 65535, length 1448
0x:  4500 05d0 fe9d 4000 4006  c0a8 0004  E.@.@...


0x0560:  5670 6876 4a67 5a5a 5a50 4b2f 4b78 3774  VphvJgZZZPK/Kx7t
0x0570:  382f 4230 594f 6b78 3449 0d0a 4a76 6551  8/B0YOkx4I..JveQ
0x0580:  2b6e 7765 5647 2f33 6e79 6231 6133 496f  +nweVG/3nyb1a3Io
0x0590:  5474 554f 4d61 4374 696b 714b 436b 4959  TtUOMaCtikqKCkIY
0x05a0:  704a 7668 3055 416d 6c33 4754 4f4c 6455  pJvh0UAml3GTOLdU
0x05b0:  774b 4145 7151 5741 7841 4141 5a66 7647  wKAEqQWAxAAAZfvG
0x05c0:  706b 6c36 0d0a 7a4e 6234 745a 6633 5a6c  pkl6..zNb4tZf3Zl

Being packet with length 1448 and sent from my side. The code "0d0a 2e0d
0a" is missing. Immediately thereafter the following packets:

12:22:18.003557 IP Smarthost.com.smtp > MyServer.com.37191: Flags [.], ack 
36575, win 65160, length 0
0x:  4500 0028 11fb 4000 7a06 19d0 d54b 3f0d  E..(..@.zK?.
0x0010:  c0a8 0004 0019

Re: sendmail Broken Pipe Error

2014-03-26 Thread John-Mark Gurney
Gregory Shapiro wrote this message on Wed, Mar 26, 2014 at 09:23 -0700:
> > > 11:57:56.539788 IP MyServer.com.41115 > Smarthost.com.smtp: Flags [S], 
> > > seq 1001452351, win 65535, options [mss 1448,nop,wscale 6,sackOK,TS val 
> > > 407239960 ecr 0], length 0
> > > 11:57:56.555262 IP Smarthost.com.smtp > MyServer.com.41115: Flags [S.], 
> > > seq 1277075046, ack 1001452352, win 8192, options [mss 1452], length 0
> > 
> > It should look something like:
> > 09:18:34.723280 IP jmgmac.funkthat.com.64724 > h2.funkthat.com.ssh: Flags 
> > [.], ack 177, win 33280, options [nop,nop,TS val 1854905469 ecr 
> > 3482476972], length 0
> > 0x:  4510 0034 d7ac 4000 4006 e1af c0a8 0003  E..4..@.@...
> > 0x0010:  c0a8 0004 fcd4 0016 7e48 238e d872 43dc  ~H#..rC.
> > 0x0020:  8010 8200 7c08  0101 080a 6e8f 9c7d  |...n..}
> > 0x0030:  cf92 61ac..a.
> > 
> > Notice the hex output...  I didn't see any of that in your output...
> > The last packet I was talking about is the last one that had length
> > 1448 that your server sent...
> 
> Willy mentioned that this only happened on mail with attachments.  Could it 
> be an MTU issue?  Specifically, see:
> 
> http://www.sendmail.com/sm/open_source/tips/path_mtu/

I don't see how it could be...  If it is litterally only mail with
attachments and not large emails w/o attachments, then it's definately
not that issue..He could just disable path_mtu on the server:
sysctl net.inet.tcp.path_mtu_discovery=0

to test this, but I'd be surprised if it allows email through, since
he's already getting 1448 byte packets through and acked before the
hang up occurs...

-- 
  John-Mark Gurney  Voice: +1 415 225 5579

 "All that I will do, has been done, All that I have, has not."
___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: sendmail Broken Pipe Error

2014-03-26 Thread Gregory Shapiro
> > 11:57:56.539788 IP MyServer.com.41115 > Smarthost.com.smtp: Flags [S], seq 
> > 1001452351, win 65535, options [mss 1448,nop,wscale 6,sackOK,TS val 
> > 407239960 ecr 0], length 0
> > 11:57:56.555262 IP Smarthost.com.smtp > MyServer.com.41115: Flags [S.], seq 
> > 1277075046, ack 1001452352, win 8192, options [mss 1452], length 0
> 
> It should look something like:
> 09:18:34.723280 IP jmgmac.funkthat.com.64724 > h2.funkthat.com.ssh: Flags 
> [.], ack 177, win 33280, options [nop,nop,TS val 1854905469 ecr 3482476972], 
> length 0
> 0x:  4510 0034 d7ac 4000 4006 e1af c0a8 0003  E..4..@.@...
> 0x0010:  c0a8 0004 fcd4 0016 7e48 238e d872 43dc  ~H#..rC.
> 0x0020:  8010 8200 7c08  0101 080a 6e8f 9c7d  |...n..}
> 0x0030:  cf92 61ac..a.
> 
> Notice the hex output...  I didn't see any of that in your output...
> The last packet I was talking about is the last one that had length
> 1448 that your server sent...

Willy mentioned that this only happened on mail with attachments.  Could it be 
an MTU issue?  Specifically, see:

http://www.sendmail.com/sm/open_source/tips/path_mtu/

___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: sendmail Broken Pipe Error

2014-03-26 Thread John-Mark Gurney
Willy Offermans wrote this message on Wed, Mar 26, 2014 at 12:17 +0100:
> On Tue, Mar 25, 2014 at 09:43:16AM -0700, John-Mark Gurney wrote:
> > Willy Offermans wrote this message on Tue, Mar 25, 2014 at 11:39 +0100:
> > > I'm not an expert in tcpdump. Can anyone make sense out of the messages?
> > 
> > If you dumped the contents, using -s 0 -X, and look at that last packet
> > you should see 0d 0a 2e 0d 0a at the end..  which is CR/LF/./CR/LF.. If
> > you don't see that, then for some reason sendmail/FreeBSD isn't telling
> > the server that it's done sending which would prevent the receiving
> > side from ack'ing the email causing the timeout...
> 
> I followed your suggestions. However I'm not able to distinguish the last
> packet. Is there a way to find this with help of the Flags? The following
> is the output of tcpdump -r /root/tmp/tcpdump -X | grep Flags
> 
> 11:57:56.539788 IP MyServer.com.41115 > Smarthost.com.smtp: Flags [S], seq 
> 1001452351, win 65535, options [mss 1448,nop,wscale 6,sackOK,TS val 407239960 
> ecr 0], length 0
> 11:57:56.555262 IP Smarthost.com.smtp > MyServer.com.41115: Flags [S.], seq 
> 1277075046, ack 1001452352, win 8192, options [mss 1452], length 0

It should look something like:
09:18:34.723280 IP jmgmac.funkthat.com.64724 > h2.funkthat.com.ssh: Flags [.], 
ack 177, win 33280, options [nop,nop,TS val 1854905469 ecr 3482476972], length 0
0x:  4510 0034 d7ac 4000 4006 e1af c0a8 0003  E..4..@.@...
0x0010:  c0a8 0004 fcd4 0016 7e48 238e d872 43dc  ~H#..rC.
0x0020:  8010 8200 7c08  0101 080a 6e8f 9c7d  |...n..}
0x0030:  cf92 61ac..a.

Notice the hex output...  I didn't see any of that in your output...
The last packet I was talking about is the last one that had length
1448 that your server sent...

-- 
  John-Mark Gurney  Voice: +1 415 225 5579

 "All that I will do, has been done, All that I have, has not."
___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: sendmail Broken Pipe Error

2014-03-26 Thread Willy Offermans
Hello John-Mark Gurney,

On Tue, Mar 25, 2014 at 09:43:16AM -0700, John-Mark Gurney wrote:
> Willy Offermans wrote this message on Tue, Mar 25, 2014 at 11:39 +0100:
> > I found the following command, that generates some more informative output,
> > I hope.
> > 
> > root@MyServer:/home/MyName # sendmail -q -v
> > 
> > Running /var/spool/mqueue/s2ODs1hH016114 (sequence 1 of 2)
> > ... Connecting to Smarhost.com via relay...
> > 220 CPSMTPM-CMT109.MyProvider.com MyProvider.com Tue, 25 Mar 2014 10:45:21
> > +0100 
> > >>> EHLO MyServer.MyDomain.com
> > 250-CPSMTPM-CMT109.MyProvider.com Hello [77.170.60.162]
> > 250-TURN
> > 250-SIZE 15744000
> > 250-ETRN
> > 250-PIPELINING
> > 250-DSN
> > 250-ENHANCEDSTATUSCODES
> > 250-8bitmime
> > 250-CHUNKING
> > 250-VRFY
> > 250 OK
> > >>> MAIL From: SIZE=1254972
> > 250 2.1.0 MyName@MyRewrittenDomainNameSender OK
> > >>> RCPT To:
> > >>> DATA
> > 250 2.1.5 MyFriend@MyFriendsDomainName 
> > 354 Start mail input; end with .
> > timeout writing message to Smarhost.com: Broken pipe
> > ... Deferred
> > 
> > If I copy the *s2ODs1hH016114 files to MySecondServer and run 
> > sendmail -q -v once more, I got the following:
> > 
> > Running /var/spool/mqueue/s2ODs1hH016114 (sequence 1 of 1)
> > ... Connecting to Smarhost.com via relay...
> > 220 CPSMTPM-cmt107.MyProvider.com MyProvider.com Tue, 25 Mar 2014 10:57:56
> > +0100 
> > >>> EHLO MySecondServer.MyRewrittenDomainName
> > 250-CPSMTPM-cmt107.MyProvider.com Hello [77.170.60.162]
> > 250-TURN
> > 250-SIZE 15744000
> > 250-ETRN
> > 250-PIPELINING
> > 250-DSN
> > 250-ENHANCEDSTATUSCODES
> > 250-8bitmime
> > 250-CHUNKING
> > 250-VRFY
> > 250 OK
> > >>> MAIL From: SIZE=1254972
> > 250 2.1.0 MyName@MyRewrittenDomainNameSender OK
> > >>> RCPT To:
> > >>> DATA
> > 250 2.1.5 MyFriend@MyFriendsDomainName 
> > 354 Start mail input; end with .
> > >>> .
> > 250 2.6.0  <20140324135355.gc6...@vpn.mydomain.com> Queued mail for delivery
> > ... Sent ( 
> > <20140324135355.gc6...@vpn.mydomain.com>
> > Queued mail for delivery)
> > Closing connection to Smarhost.com
> > >>> QUIT
> > 221 2.0.0 CPSMTPM-cmt107.MyProvider.com Service closing transmission
> > channel
> > 
> > The test shows me that the problem is not on the MyProvider side.
> > 
> > The sendmail.cf files on the two server are identical, except the names of 
> > the 
> > servers and some comments.
> > 
> > The sendmail versions are different and the FreeBSD versions are different:
> > MyServer:
> > Sendmail Version 8.14.7
> > FreeBSD 10.0-STABLE
> > 
> > MySecondServer:
> > Sendmail Version 8.14.5
> > FreeBSD 9.0-RELEASE-p4
> > 
> > It is also important to note that above can only be observed for some
> > e-mails, not all. Thus some mails will be sent from MyServer, some are not!
> > 
> > If I make a tcpdump during the connection between sendmail and smarthost
> > concerning s2ODs1hH016114, I got the following:
> > 
> > 11:24:23.301300 IP MyServer.MyDomain.com.49165 > DNSMyProvider.domain: 
> > 32794+ [1au] MX? Smarhost.com. (43)
> > 11:24:23.320078 IP DNSMyProvider.domain > MyServer.MyDomain.com.49165: 
> > 32794 1/1/1 CNAME CNameMyProvider. (125)
> > 11:24:23.321592 IP MyServer.MyDomain.com.51274 > ActualSmarthost.com.smtp: 
> > Flags [S], seq 2245424203, win 65535, options [mss 1448,nop,wscale 
> > 6,sackOK,TS val 318826742 ecr 0], length 0
> > 11:24:23.339171 IP ActualSmarthost.com.smtp > MyServer.MyDomain.com.51274: 
> > Flags [S.], seq 2238169153, ack 2245424204, win 8192, options [mss 1452], 
> > length 0
> > 11:24:23.339221 IP MyServer.MyDomain.com.51274 > ActualSmarthost.com.smtp: 
> > Flags [.], ack 1, win 65535, length 0
> > 11:24:23.355143 IP ActualSmarthost.com.smtp > MyServer.MyDomain.com.51274: 
> > Flags [P.], seq 1:84, ack 1, win 65160, length 83
> > 11:24:23.355254 IP MyServer.MyDomain.com.51274 > ActualSmarthost.com.smtp: 
> > Flags [P.], seq 1:24, ack 84, win 65535, length 23
> > 11:24:23.370795 IP ActualSmarthost.com.smtp > MyServer.MyDomain.com.51274: 
> > Flags [P.], seq 84:276, ack 24, win 65137, length 192
> > 11:24:23.371025 IP MyServer.MyDomain.com.51274 > ActualSmarthost.com.smtp: 
> > Flags [P.], seq 24:76, ack 276, win 65535, length 52
> > 11:24:23.392751 IP ActualSmarthost.com.smtp > MyServer.MyDomain.com.51274: 
> > Flags [P.], seq 276:326, ack 76, win 65085, length 50
> > 11:24:23.393010 IP MyServer.MyDomain.com.51274 > ActualSmarthost.com.smtp: 
> > Flags [P.], seq 76:119, ack 326, win 65535, length 43
> > 11:24:23.414297 IP ActualSmarthost.com.smtp > MyServer.MyDomain.com.51274: 
> > Flags [P.], seq 326:364, ack 119, win 65042, length 38
> > 11:24:23.520345 IP MyServer.MyDomain.com.51274 > ActualSmarthost.com.smtp: 
> > Flags [.], ack 364, win 65535, length 0
> > 11:24:23.535218 IP ActualSmarthost.com.smtp > MyServer.MyDomain.com.51274: 
> > Flags [P.], seq 364:410, ack 119, win 65042, length 46
> > 11:24:23.769098 IP MyServer.MyDomain.com.51274 > ActualSmarthost.com.smtp: 
> > Flags [.], seq 119:1567, ack 410, win 65535, length 1448
> > 11

Re: sendmail Broken Pipe Error

2014-03-26 Thread Willy Offermans
Hallo FreeBSD friends,

On Tue, Mar 25, 2014 at 09:43:16AM -0700, John-Mark Gurney wrote:
> Willy Offermans wrote this message on Tue, Mar 25, 2014 at 11:39 +0100:
> > I found the following command, that generates some more informative output,
> > I hope.
> > 
> > root@MyServer:/home/MyName # sendmail -q -v
> > 
> > Running /var/spool/mqueue/s2ODs1hH016114 (sequence 1 of 2)
> > ... Connecting to Smarhost.com via relay...
> > 220 CPSMTPM-CMT109.MyProvider.com MyProvider.com Tue, 25 Mar 2014 10:45:21
> > +0100 
> > >>> EHLO MyServer.MyDomain.com
> > 250-CPSMTPM-CMT109.MyProvider.com Hello [77.170.60.162]
> > 250-TURN
> > 250-SIZE 15744000
> > 250-ETRN
> > 250-PIPELINING
> > 250-DSN
> > 250-ENHANCEDSTATUSCODES
> > 250-8bitmime
> > 250-CHUNKING
> > 250-VRFY
> > 250 OK
> > >>> MAIL From: SIZE=1254972
> > 250 2.1.0 MyName@MyRewrittenDomainNameSender OK
> > >>> RCPT To:
> > >>> DATA
> > 250 2.1.5 MyFriend@MyFriendsDomainName 
> > 354 Start mail input; end with .
> > timeout writing message to Smarhost.com: Broken pipe
> > ... Deferred
> > 
> > If I copy the *s2ODs1hH016114 files to MySecondServer and run 
> > sendmail -q -v once more, I got the following:
> > 
> > Running /var/spool/mqueue/s2ODs1hH016114 (sequence 1 of 1)
> > ... Connecting to Smarhost.com via relay...
> > 220 CPSMTPM-cmt107.MyProvider.com MyProvider.com Tue, 25 Mar 2014 10:57:56
> > +0100 
> > >>> EHLO MySecondServer.MyRewrittenDomainName
> > 250-CPSMTPM-cmt107.MyProvider.com Hello [77.170.60.162]
> > 250-TURN
> > 250-SIZE 15744000
> > 250-ETRN
> > 250-PIPELINING
> > 250-DSN
> > 250-ENHANCEDSTATUSCODES
> > 250-8bitmime
> > 250-CHUNKING
> > 250-VRFY
> > 250 OK
> > >>> MAIL From: SIZE=1254972
> > 250 2.1.0 MyName@MyRewrittenDomainNameSender OK
> > >>> RCPT To:
> > >>> DATA
> > 250 2.1.5 MyFriend@MyFriendsDomainName 
> > 354 Start mail input; end with .
> > >>> .
> > 250 2.6.0  <20140324135355.gc6...@vpn.mydomain.com> Queued mail for delivery
> > ... Sent ( 
> > <20140324135355.gc6...@vpn.mydomain.com>
> > Queued mail for delivery)
> > Closing connection to Smarhost.com
> > >>> QUIT
> > 221 2.0.0 CPSMTPM-cmt107.MyProvider.com Service closing transmission
> > channel
> > 
> > The test shows me that the problem is not on the MyProvider side.
> > 
> > The sendmail.cf files on the two server are identical, except the names of 
> > the 
> > servers and some comments.
> > 
> > The sendmail versions are different and the FreeBSD versions are different:
> > MyServer:
> > Sendmail Version 8.14.7
> > FreeBSD 10.0-STABLE
> > 
> > MySecondServer:
> > Sendmail Version 8.14.5
> > FreeBSD 9.0-RELEASE-p4
> > 
> > It is also important to note that above can only be observed for some
> > e-mails, not all. Thus some mails will be sent from MyServer, some are not!
> > 
> > If I make a tcpdump during the connection between sendmail and smarthost
> > concerning s2ODs1hH016114, I got the following:
> > 
> > 11:24:23.301300 IP MyServer.MyDomain.com.49165 > DNSMyProvider.domain: 
> > 32794+ [1au] MX? Smarhost.com. (43)
> > 11:24:23.320078 IP DNSMyProvider.domain > MyServer.MyDomain.com.49165: 
> > 32794 1/1/1 CNAME CNameMyProvider. (125)
> > 11:24:23.321592 IP MyServer.MyDomain.com.51274 > ActualSmarthost.com.smtp: 
> > Flags [S], seq 2245424203, win 65535, options [mss 1448,nop,wscale 
> > 6,sackOK,TS val 318826742 ecr 0], length 0
> > 11:24:23.339171 IP ActualSmarthost.com.smtp > MyServer.MyDomain.com.51274: 
> > Flags [S.], seq 2238169153, ack 2245424204, win 8192, options [mss 1452], 
> > length 0
> > 11:24:23.339221 IP MyServer.MyDomain.com.51274 > ActualSmarthost.com.smtp: 
> > Flags [.], ack 1, win 65535, length 0
> > 11:24:23.355143 IP ActualSmarthost.com.smtp > MyServer.MyDomain.com.51274: 
> > Flags [P.], seq 1:84, ack 1, win 65160, length 83
> > 11:24:23.355254 IP MyServer.MyDomain.com.51274 > ActualSmarthost.com.smtp: 
> > Flags [P.], seq 1:24, ack 84, win 65535, length 23
> > 11:24:23.370795 IP ActualSmarthost.com.smtp > MyServer.MyDomain.com.51274: 
> > Flags [P.], seq 84:276, ack 24, win 65137, length 192
> > 11:24:23.371025 IP MyServer.MyDomain.com.51274 > ActualSmarthost.com.smtp: 
> > Flags [P.], seq 24:76, ack 276, win 65535, length 52
> > 11:24:23.392751 IP ActualSmarthost.com.smtp > MyServer.MyDomain.com.51274: 
> > Flags [P.], seq 276:326, ack 76, win 65085, length 50
> > 11:24:23.393010 IP MyServer.MyDomain.com.51274 > ActualSmarthost.com.smtp: 
> > Flags [P.], seq 76:119, ack 326, win 65535, length 43
> > 11:24:23.414297 IP ActualSmarthost.com.smtp > MyServer.MyDomain.com.51274: 
> > Flags [P.], seq 326:364, ack 119, win 65042, length 38
> > 11:24:23.520345 IP MyServer.MyDomain.com.51274 > ActualSmarthost.com.smtp: 
> > Flags [.], ack 364, win 65535, length 0
> > 11:24:23.535218 IP ActualSmarthost.com.smtp > MyServer.MyDomain.com.51274: 
> > Flags [P.], seq 364:410, ack 119, win 65042, length 46
> > 11:24:23.769098 IP MyServer.MyDomain.com.51274 > ActualSmarthost.com.smtp: 
> > Flags [.], seq 119:1567, ack 410, win 65535, length 1448
> > 11:

Re: sendmail Broken Pipe Error

2014-03-25 Thread John-Mark Gurney
Willy Offermans wrote this message on Tue, Mar 25, 2014 at 11:39 +0100:
> I found the following command, that generates some more informative output,
> I hope.
> 
> root@MyServer:/home/MyName # sendmail -q -v
> 
> Running /var/spool/mqueue/s2ODs1hH016114 (sequence 1 of 2)
> ... Connecting to Smarhost.com via relay...
> 220 CPSMTPM-CMT109.MyProvider.com MyProvider.com Tue, 25 Mar 2014 10:45:21
> +0100 
> >>> EHLO MyServer.MyDomain.com
> 250-CPSMTPM-CMT109.MyProvider.com Hello [77.170.60.162]
> 250-TURN
> 250-SIZE 15744000
> 250-ETRN
> 250-PIPELINING
> 250-DSN
> 250-ENHANCEDSTATUSCODES
> 250-8bitmime
> 250-CHUNKING
> 250-VRFY
> 250 OK
> >>> MAIL From: SIZE=1254972
> 250 2.1.0 MyName@MyRewrittenDomainNameSender OK
> >>> RCPT To:
> >>> DATA
> 250 2.1.5 MyFriend@MyFriendsDomainName 
> 354 Start mail input; end with .
> timeout writing message to Smarhost.com: Broken pipe
> ... Deferred
> 
> If I copy the *s2ODs1hH016114 files to MySecondServer and run 
> sendmail -q -v once more, I got the following:
> 
> Running /var/spool/mqueue/s2ODs1hH016114 (sequence 1 of 1)
> ... Connecting to Smarhost.com via relay...
> 220 CPSMTPM-cmt107.MyProvider.com MyProvider.com Tue, 25 Mar 2014 10:57:56
> +0100 
> >>> EHLO MySecondServer.MyRewrittenDomainName
> 250-CPSMTPM-cmt107.MyProvider.com Hello [77.170.60.162]
> 250-TURN
> 250-SIZE 15744000
> 250-ETRN
> 250-PIPELINING
> 250-DSN
> 250-ENHANCEDSTATUSCODES
> 250-8bitmime
> 250-CHUNKING
> 250-VRFY
> 250 OK
> >>> MAIL From: SIZE=1254972
> 250 2.1.0 MyName@MyRewrittenDomainNameSender OK
> >>> RCPT To:
> >>> DATA
> 250 2.1.5 MyFriend@MyFriendsDomainName 
> 354 Start mail input; end with .
> >>> .
> 250 2.6.0  <20140324135355.gc6...@vpn.mydomain.com> Queued mail for delivery
> ... Sent ( 
> <20140324135355.gc6...@vpn.mydomain.com>
> Queued mail for delivery)
> Closing connection to Smarhost.com
> >>> QUIT
> 221 2.0.0 CPSMTPM-cmt107.MyProvider.com Service closing transmission
> channel
> 
> The test shows me that the problem is not on the MyProvider side.
> 
> The sendmail.cf files on the two server are identical, except the names of 
> the 
> servers and some comments.
> 
> The sendmail versions are different and the FreeBSD versions are different:
> MyServer:
> Sendmail Version 8.14.7
> FreeBSD 10.0-STABLE
> 
> MySecondServer:
> Sendmail Version 8.14.5
> FreeBSD 9.0-RELEASE-p4
> 
> It is also important to note that above can only be observed for some
> e-mails, not all. Thus some mails will be sent from MyServer, some are not!
> 
> If I make a tcpdump during the connection between sendmail and smarthost
> concerning s2ODs1hH016114, I got the following:
> 
> 11:24:23.301300 IP MyServer.MyDomain.com.49165 > DNSMyProvider.domain: 32794+ 
> [1au] MX? Smarhost.com. (43)
> 11:24:23.320078 IP DNSMyProvider.domain > MyServer.MyDomain.com.49165: 32794 
> 1/1/1 CNAME CNameMyProvider. (125)
> 11:24:23.321592 IP MyServer.MyDomain.com.51274 > ActualSmarthost.com.smtp: 
> Flags [S], seq 2245424203, win 65535, options [mss 1448,nop,wscale 
> 6,sackOK,TS val 318826742 ecr 0], length 0
> 11:24:23.339171 IP ActualSmarthost.com.smtp > MyServer.MyDomain.com.51274: 
> Flags [S.], seq 2238169153, ack 2245424204, win 8192, options [mss 1452], 
> length 0
> 11:24:23.339221 IP MyServer.MyDomain.com.51274 > ActualSmarthost.com.smtp: 
> Flags [.], ack 1, win 65535, length 0
> 11:24:23.355143 IP ActualSmarthost.com.smtp > MyServer.MyDomain.com.51274: 
> Flags [P.], seq 1:84, ack 1, win 65160, length 83
> 11:24:23.355254 IP MyServer.MyDomain.com.51274 > ActualSmarthost.com.smtp: 
> Flags [P.], seq 1:24, ack 84, win 65535, length 23
> 11:24:23.370795 IP ActualSmarthost.com.smtp > MyServer.MyDomain.com.51274: 
> Flags [P.], seq 84:276, ack 24, win 65137, length 192
> 11:24:23.371025 IP MyServer.MyDomain.com.51274 > ActualSmarthost.com.smtp: 
> Flags [P.], seq 24:76, ack 276, win 65535, length 52
> 11:24:23.392751 IP ActualSmarthost.com.smtp > MyServer.MyDomain.com.51274: 
> Flags [P.], seq 276:326, ack 76, win 65085, length 50
> 11:24:23.393010 IP MyServer.MyDomain.com.51274 > ActualSmarthost.com.smtp: 
> Flags [P.], seq 76:119, ack 326, win 65535, length 43
> 11:24:23.414297 IP ActualSmarthost.com.smtp > MyServer.MyDomain.com.51274: 
> Flags [P.], seq 326:364, ack 119, win 65042, length 38
> 11:24:23.520345 IP MyServer.MyDomain.com.51274 > ActualSmarthost.com.smtp: 
> Flags [.], ack 364, win 65535, length 0
> 11:24:23.535218 IP ActualSmarthost.com.smtp > MyServer.MyDomain.com.51274: 
> Flags [P.], seq 364:410, ack 119, win 65042, length 46
> 11:24:23.769098 IP MyServer.MyDomain.com.51274 > ActualSmarthost.com.smtp: 
> Flags [.], seq 119:1567, ack 410, win 65535, length 1448
> 11:24:23.769108 IP MyServer.MyDomain.com.51274 > ActualSmarthost.com.smtp: 
> Flags [.], seq 119:1567, ack 410, win 65535, length 1448
> 11:24:23.811918 IP ActualSmarthost.com.smtp > MyServer.MyDomain.com.51274: 
> Flags [.], ack 1567, win 65160, length 0
> 11:24:24.077092 IP MyServer.MyDomain.com.51274 > ActualSmarthost.com.smtp: 

Re: sendmail Broken Pipe Error

2014-03-25 Thread Willy Offermans
Dear Claus and FreeBSD friends,

On Mon, Mar 24, 2014 at 12:22:30PM -0700, Claus Assmann wrote:
> On Mon, Mar 24, 2014, Willy Offermans wrote:
> 
> > Mar 24 14:16:01 MyServer sm-mta[11725]: s2ODCWT4011717: SYSERR(root): 
> > timeout writing message to MyProvider.com: Broken pipe
> > Mar 24 14:16:01 MyServer sm-mta[11725]: s2ODCWT4011717: 
> > to=, delay=00:03:29, xdelay=00:03:26, 
> > mailer=relay, pri=1284849, relay=MyProvider.com [XXX.XXX.XXX.XXX], 
> > dsn=4.0.0, stat=Deferred
> 
> > Since there is a timeout error, I like to know what sendmail is writing to
> > MyProvider.com
> 
> The mail message (DATA) -- as the log entry states.
> 
> > Is there a way to debug sendmail to disclose the message written to
> > MyProvider.com and the response from MyProvider.com. I'm pretty sure that 
> 
> There's no response...
> check out s2ODCWT4011717 in your mail queue.
> ___
> freebsd-current@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-current
> To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"

This sounds very reasonable, but for your better understanding the
following: My old FreeBSD server is still running as well. This server runs
sendmail 8.14.5 and does not show these errors. So I'm puzzled what the
problem might be.

-- 
Met vriendelijke groeten,
With kind regards,
Mit freundlichen Gruessen,

Willy

*
W.K. Offermans
___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: sendmail Broken Pipe Error

2014-03-24 Thread David Wolfskill
On Mon, Mar 24, 2014 at 02:36:34PM +0100, Willy Offermans wrote:
> ...
> Since there is a timeout error, I like to know what sendmail is writing to
> MyProvider.com
> 
> Is there a way to debug sendmail to disclose the message written to
> MyProvider.com and the response from MyProvider.com. I'm pretty sure that 
> there lays the solution to my problem.
> 
> Any help is highly appreciated.
> ...

When acting as an (E)SMTP client, sendmail queues outbound messages --
by default, in /var/spool/mqueue/ (ref. "QUEUE_DIR" in the
configuration).

When I look there, I see files with names like "df..." and "qf..."
(where "..." represents a string of numeric & mixed-case alphabetic
charcaters).  These are in pairs:  the "df*" files contain the data to
be transmitted via (E)SMTP, while the "qf*" files contain meta-data
about the message (including reasons the message didn't get sent yet).

The Sendmail Installation and Operation Guide (a copy of which may be
found in src/contrib/sendmail/doc/op/op.me) has considerable detail on
these files -- search for "qf" (as a suggestion).

Peace,
david
-- 
David H. Wolfskill  da...@catwhisker.org
Taliban: Evil cowards with guns afraid of truth from a 14-year old girl.

See http://www.catwhisker.org/~david/publickey.gpg for my public key.


pgpoWstL062GY.pgp
Description: PGP signature


Re: sendmail Broken Pipe Error

2014-03-24 Thread John-Mark Gurney
Willy Offermans wrote this message on Mon, Mar 24, 2014 at 14:36 +0100:
> Dear FreeBSD friends,
> 
> Lately I have setup a new FreeBSD server with 10.0-STABLE. Most of it went
> smoothly. However I have an issue with sendmail. Some of the mails can be
> sent out correctly, some of them stay in /var/spool/mqueue/. The provided
> error messages are in the latter case:
> 
> Mar 24 14:16:01 MyServer sm-mta[11725]: s2ODCWT4011717: SYSERR(root): timeout 
> writing message to MyProvider.com: Broken pipe
> Mar 24 14:16:01 MyServer sm-mta[11725]: s2ODCWT4011717: 
> to=, delay=00:03:29, xdelay=00:03:26, mailer=relay, 
> pri=1284849, relay=MyProvider.com [XXX.XXX.XXX.XXX], dsn=4.0.0, stat=Deferred
> 
> I'm using Version 8.14.7
> All was fine when I was using Version 8.14.5.
> 
> Since there is a timeout error, I like to know what sendmail is writing to
> MyProvider.com
> 
> Is there a way to debug sendmail to disclose the message written to
> MyProvider.com and the response from MyProvider.com. I'm pretty sure that 
> there lays the solution to my problem.
> 
> Any help is highly appreciated.

You could use tcpflow to capture the flows for myprovider.com and look
at them...

Though you are seeing a timeout, so it sounds like myprovider.com isn't
reading your message in a timely fasion..

-- 
  John-Mark Gurney  Voice: +1 415 225 5579

 "All that I will do, has been done, All that I have, has not."
___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: sendmail Broken Pipe Error

2014-03-24 Thread Claus Assmann
On Mon, Mar 24, 2014, Willy Offermans wrote:

> Mar 24 14:16:01 MyServer sm-mta[11725]: s2ODCWT4011717: SYSERR(root): timeout 
> writing message to MyProvider.com: Broken pipe
> Mar 24 14:16:01 MyServer sm-mta[11725]: s2ODCWT4011717: 
> to=, delay=00:03:29, xdelay=00:03:26, mailer=relay, 
> pri=1284849, relay=MyProvider.com [XXX.XXX.XXX.XXX], dsn=4.0.0, stat=Deferred

> Since there is a timeout error, I like to know what sendmail is writing to
> MyProvider.com

The mail message (DATA) -- as the log entry states.

> Is there a way to debug sendmail to disclose the message written to
> MyProvider.com and the response from MyProvider.com. I'm pretty sure that 

There's no response...
check out s2ODCWT4011717 in your mail queue.
___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"