On Tue, Apr 29, 2025 at 02:34:00AM +0000, Otto Retter wrote:
Hello,
action "tanoutbound" relay host smtp://mail.airstreamcomm.net auth <ratable>
action "axreiosoutbound" relay host smtp://mail.airstreamcomm.net auth <ratable>
As far as I am aware, this would attempt relay over port 25, and
without TLS, which is usually not used for authenticated SMTP. Do you
know what port your ISP's MTA is using for authenticated SMTP? Usually
it would be 465 for implicit TLS or 587 for STARTTLS.
I think you should also include the aliases table key in the host
value. Here is a possible example line for implicit TLS:
'''
action "tanoutbound" relay host smtps://[email protected]:465
auth <ratable>
'''
Also, if you actually ran the previous configuration live you may want
to consisder rotating credentials. If TLS was not used an on-path
attacker might have read your credentials in the plain.
- Otto
Thank you Otto for your response and advice. But my problem remains.
Let me approach it this way: in mutt, when I configure it to be its own
smtp server, I set ssl_force_tls=no, ssl_starttls=yes, and
smtp_authenticators=login. What would be the equivalent action line in
smtp.conf? And one further question: can authentication in opensmtpd
handle an isp username in the form of
[email protected]@mail.airstreamcomm.net? Please advise. And thanks
for reading.
axreios