On Sat, 4 Oct 2014 00:18:27 +0200 (CEST), you wrote:

>A new opensmtpd snapshot is available at:
>
>        http://www.opensmtpd.org/archives/opensmtpd-201410040015.tar.gz
>
>Checksum:
>
>  SHA256 (opensmtpd-201410040015.tar.gz) =
>  6802f24d70bada0287c212816b717941c0e6ad94e92e159f66010cdf16e5a6da
>
>A summary of the content of this snapshot is available below.
>
>Please test and let us know if it breaks something!
>
>If this snapshot doesn't work, please also test with a previous one,
>to help us spot where the issue is coming from. You can access all
>previous snapshots here:
>
>        http://www.opensmtpd.org/archives/
>
>The OpenSMTPD team ;-)
>
>
>Summary of changes since last snapshot (opensmtpd-201410012007):
>---------------------------------------------------------------
>
>    - introduce "limit session" keywors do replace hardcoded rcpt and mail 
> limits in smtp [1]
>    - DSA keys are currently unsupported, still not a reason to crash in the 
> error path...
>    - when no domain is specified on mail from or rcpt to, assume local user
>    - fix support for tls+backup://  (accept ... relay backup tls)
>
>[1] Author: Renaud Allard <ren...@allard.it>

I'm not quite sure what goes wrong but this fails for me:


# smtpd -v -d
debug: init ssl-tree
info: loading pki information for yidhra.outer.uphall.net
info: OpenSMTPD 201410040015 starting
debug: bounce warning after 4h
debug: using "fs" queue backend
debug: using "ramqueue" scheduler backend
debug: using "ram" stat backend
info: startup [debug mode]
debug: parent_send_config_ruleset: reloading
filter: building simple chains...
debug: init ssl-tree
debug: parent_send_config: configuring pony process
filter: building complex chains...
info: loading pki keys for yidhra.outer.uphall.net
debug: parent_send_config: configuring ca process
filter: done building complex chains
debug: ca_engine_init: using RSAX engine support
debug: init private ssl-tree
debug: smtp: listen on 127.0.0.1 port 25 flags 0x401 pki
"yidhra.outer.uphall.net"
debug: smtp: listen on IPv6:fe80::1%lo0 port 25 flags 0x401 pki
"yidhra.outer.uphall.net"
debug: smtp: listen on IPv6:::1 port 25 flags 0x401 pki
"yidhra.outer.uphall.net"
debug: smtp: listen on IPv6:fe80::6a05:caff:fe08:e7b1%em2 port 25
flags 0x401 pki "yidhra.outer.uphall.net"
debug: smtp: listen on 10.44.0.3 port 25 flags 0x401 pki
"yidhra.outer.uphall.net"
debug: pony: rsae_init
debug: pony: rsae_init
debug: smtp: will accept at most 3503 clients
debug: queue: done loading queue into scheduler
debug: smtpd: scanning offline queue...
debug: smtpd: offline scanning done
debug: smtp: new client on listener: 0xe9edc7ef000
smtp-in: New session 07bcbbe39c23052f from host azathoth.uphall.net
[46.235.226.138]
debug: lka: looking up pki "yidhra.outer.uphall.net"
debug: session_start_ssl: switching to SSL
debug: pony: rsae_priv_enc
debug: pony: rsae_init
debug: pony: rsae_init
debug: pony: rsae_pub_dec
debug: pony: rsae_bn_mod_exp
debug: pony: rsae_init
debug: pony: rsae_pub_dec
debug: pony: rsae_bn_mod_exp
debug: pony: rsae_pub_dec
debug: pony: rsae_bn_mod_exp
smtp-in: Started TLS on session 07bcbbe39c23052f: version=TLSv1/SSLv3,
cipher=ECDHE-RSA-AES256-GCM-SHA384, bits=256
smtp-in: Client certificate verification succeeded on session
07bcbbe39c23052f
debug: smtp: SIZE in MAIL FROM command
warn: parent -> lka: pipe closed
warn: queue -> lka: pipe closed
warn: control -> lka: pipe closed
warn: scheduler -> queue: pipe closed
warn: ca -> control: pipe closed
warn: pony -> lka: pipe closed
#

Is there any other info that would be useful? I think I can make this
happen quite reliably.

Regards

John Cox

-- 
You received this mail because you are subscribed to misc@opensmtpd.org
To unsubscribe, send a mail to: misc+unsubscr...@opensmtpd.org

Reply via email to