Carlos E. R. wrote: > Apr 10 12:06:32 nimrodel postfix/smtp[21659]: maps_find: smtp_sasl_passwd: > hash:/etc/postfix/sasl_passwd(0,lock|fold_fix): smtp.my.isp = > mylogin:mypassword > Apr 10 12:06:32 nimrodel postfix/smtp[21659]: smtp_sasl_passwd_lookup: host > `smtp.my.isp' user `mylogin' pass `mypassword' > Apr 10 12:06:32 nimrodel postfix/smtp[21659]: starting new SASL client > Apr 10 12:06:32 nimrodel postfix/smtp[21659]: starting new SASL client > Apr 10 12:06:32 nimrodel postfix/smtp[21659]: smtp_sasl_authenticate: > smtp.my.isp[213.4.149.66]: SASL mechanisms LOGIN LOGIN CRAM-MD5 DIGEST-MD5 > Apr 10 12:06:32 nimrodel postfix/smtp[21659]: > smtp.my.isp[213.4.149.66]: > AUTH DIGEST-MD5 > Apr 10 12:06:32 nimrodel postfix/smtp[21659]: < smtp.my.isp[213.4.149.66]: > 334 cmVhbG09ImN0c210cG91... > Apr 10 12:06:32 nimrodel postfix/smtp[21659]: xsasl_cyrus_client_next: > decoded challenge: > realm="ctsmtpout1.frontal.correo",nonce="3947F000ECF7BB....",algorithm=md5-sess,qop="auth" > Apr 10 12:06:32 nimrodel postfix/smtp[21659]: SASL authentication debug: > DIGEST-MD5 client step 2 > Apr 10 12:06:32 nimrodel postfix/smtp[21659]: xsasl_cyrus_get_user: mylogin > Apr 10 12:06:32 nimrodel postfix/smtp[21659]: xsasl_cyrus_get_user: mylogin > Apr 10 12:06:32 nimrodel postfix/smtp[21659]: xsasl_cyrus_get_passwd: > mypassword > Apr 10 12:06:32 nimrodel postfix/smtp[21659]: xsasl_cyrus_client_next: > uncoded client response > username="mylogin",realm="ctsmtpout1.frontal.correo",nonce="3947F000ECF7BBDB5FA...",cnonce="ooSxxt9m...=",nc=00000001,qop=auth,digest-uri="smtp/smtp.my.isp",response=5dd... > Apr 10 12:06:32 nimrodel postfix/smtp[21659]: > smtp.my.isp[213.4.149.66]: > dXNlcm5hbWU9ImNlcm9iaW4uam9icyIscmVhbG09ImN0... > Apr 10 12:06:37 nimrodel postfix/smtp[21659]: < smtp.my.isp[213.4.149.66]: > 535 invalid user ID or password
Your Postfix obviously tries to authenticate using your user:pass in /etc/postfix/sasl_passwd, but the password OR user is not accepted. If you are sure that user:pass is correct, you could try to force Postfix to use another auth mech. Usually Postfix will use the most secure auth mech available, in this case Digest-md5. If there is some problem, you might try the other mechs. smtp_discard_ehlo_keyword_address_maps = hash:/etc/postfix/ehlo_discard_words /etc/postfix/ehlo_discard_words: 213.4.149.66 digest-md5 That should disable digest-md5 for the isp server. -- Sandy List replies only please! Please address PMs to: news-reply2 (@) japantest (.) homelinux (.) com -- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED]