eric

in the spamdyke.conf i can see this
tls-certificate-file=/var/qmail/control/servercert.pem

also i am using the
/var/qmail/control/servercert.pem
for domain key signing of outgoing emails.

rajesh

----- Original Message -----
From: Eric Broch [mailto:ebr...@whitehorsetc.com]
To: qmailtoaster-list@qmailtoaster.com
Sent: Tue, 18 Jun 2019 08:52:13 -0600
Subject:

So you have spamdyke doing the TLS?

On 6/18/2019 8:38 AM, Rajesh M wrote:
> Hi
>
> ISSUE 1
> all of a sudden we are receiving error on one of our servers for one specific 
> sender domain (sending from microsoft server)
>
> the sender domain is not able to send emails to the recepient domain on our 
> server. The email bounces with the following error
> encryption: TLS reason: 503_MAIL_first_(#5.5.1)
>
> 06/18/2019 19:33:16 LOG OUTPUT TLS
> DENIED_OTHER from: rethish.n...@sender.com to: nominati...@dxb.recepient.com 
> origin_ip: 40.107.69.126 origin_rdns: 
> mail-eopbgr690126.outbound.protection.outlook.com auth: (unknown) encryption: 
> TLS reason: 503_MAIL_first_(#5.5.1)
> 06/18/2019 19:33:16 FROM REMOTE TO CHILD: 6 bytes TLS
> QUIT
> 06/18/2019 19:33:16 LOG OUTPUT TLS
> ERROR(tls_write()@tls.c:678): unable to write to SSL/TLS stream: The 
> operation failed due to an I/O error, Connection reset by peer
> ERROR(output_writeln()@log.c:104): unable to write 27 bytes to file 
> descriptor 1: Connection reset by peer
> 06/18/2019 19:33:16 FROM CHILD TO REMOTE: 27 bytes TLS
> 221 ns1.HOSTNAME.com
> 06/18/2019 19:33:16 LOG OUTPUT TLS
> ERROR(tls_read()@tls.c:620): unable to read from SSL/TLS stream: The 
> operation failed due to an I/O error, Unexpected EOF found
>
> 06/18/2019 19:33:16 - TLS ended and closed
>
>
> the error log of spamdyke  full-log-dir is give below follows
>
>
> ISSUE 2
> also i noted that spamdyke log mentions as such
> reset address space soft limit to infinity: please stop using the softlimit 
> program
>
> What exactly does this mean. What is the alternative to prevent large files 
> should i disable softlimit program in
> /usr/bin/softlimit -m 64000000 \
> in the smtp run file
>
> require your kind help in resolving the above 2 issues
>
> thanks
> rajesh
>
> 06/18/2019 19:32:54 STARTED: VERSION = 5.0.1+TLS+CONFIGTEST+DEBUG, PID = 19829
>
> 06/18/2019 19:32:54 CURRENT ENVIRONMENT
> PATH=/var/qmail/bin:/usr/local/bin:/usr/bin:/bin
> PWD=/var/qmail/supervise/smtp
> SHLVL=0
> PROTO=TCP
> TCPLOCALIP=103.241.181.154
> TCPLOCALPORT=25
> TCPLOCALHOST=ns1.HOSTNAME.com
> TCPREMOTEIP=40.107.69.126
> TCPREMOTEPORT=42264
> BADMIMETYPE=
> BADLOADERTYPE=M
> QMAILQUEUE=/var/qmail/bin/simscan
> CHKUSER_START=ALWAYS
> CHKUSER_RCPTLIMIT=50
> CHKUSER_WRONGRCPTLIMIT=10
> NOP0FCHECK=1
> DKQUEUE=/var/qmail/bin/qmail-queue.orig
> DKVERIFY=DEGIJKfh
> DKSIGN=/var/qmail/control/domainkeys/%/private
>
> 06/18/2019 19:32:54 CURRENT CONFIG
> config-file=/etc/spamdyke/spamdyke.conf
> dns-blacklist-entry=zen.spamhaus.org
> full-log-dir=/var/log/spamdyke
> graylist-dir=/var/spamdyke/graylist
> graylist-max-secs=2678400
> graylist-min-secs=180
> header-blacklist-entry=From:*>,*<*
> idle-timeout-secs=600
> ip-blacklist-file=/etc/spamdyke/blacklist_ip
> ip-in-rdns-keyword-blacklist-file=/etc/spamdyke/blacklist_keywords
> ip-in-rdns-keyword-whitelist-file=/etc/spamdyke/whitelist_keywords
> ip-whitelist-file=/etc/spamdyke/whitelist_ip
> log-level=info
> max-recipients=100
> rdns-blacklist-file=/etc/spamdyke/blacklist_rdns
> rdns-whitelist-file=/etc/spamdyke/whitelist_rdns
> recipient-blacklist-file=/etc/spamdyke/blacklist_recipients
> recipient-whitelist-file=/etc/spamdyke/whitelist_recipients
> reject-empty-rdns=1
> reject-sender=no-mx
> reject-sender=authentication-domain-mismatch
> reject-unresolvable-rdns=1
> relay-level=normal
> sender-blacklist-file=/etc/spamdyke/blacklist_senders
> sender-whitelist-file=/etc/spamdyke/whitelist_senders
> tls-certificate-file=/var/qmail/control/servercert.pem
>
> 06/18/2019 19:32:54 - Remote IP = 40.107.69.126
>
> 06/18/2019 19:32:54 CURRENT CONFIG
> config-file=/etc/spamdyke/spamdyke.conf
> dns-blacklist-entry=zen.spamhaus.org
> dns-server-ip-primary=8.8.8.8
> full-log-dir=/var/log/spamdyke
> graylist-dir=/var/spamdyke/graylist
> graylist-max-secs=2678400
> graylist-min-secs=180
> header-blacklist-entry=From:*>,*<*
> idle-timeout-secs=600
> ip-blacklist-file=/etc/spamdyke/blacklist_ip
> ip-in-rdns-keyword-blacklist-file=/etc/spamdyke/blacklist_keywords
> ip-in-rdns-keyword-whitelist-file=/etc/spamdyke/whitelist_keywords
> ip-whitelist-file=/etc/spamdyke/whitelist_ip
> log-level=info
> max-recipients=100
> rdns-blacklist-file=/etc/spamdyke/blacklist_rdns
> rdns-whitelist-file=/etc/spamdyke/whitelist_rdns
> recipient-blacklist-file=/etc/spamdyke/blacklist_recipients
> recipient-whitelist-file=/etc/spamdyke/whitelist_recipients
> reject-empty-rdns=1
> reject-sender=no-mx
> reject-sender=authentication-domain-mismatch
> reject-unresolvable-rdns=1
> relay-level=normal
> sender-blacklist-file=/etc/spamdyke/blacklist_senders
> sender-whitelist-file=/etc/spamdyke/whitelist_senders
> tls-certificate-file=/var/qmail/control/servercert.pem
>
> 06/18/2019 19:32:54 - Remote rDNS = 
> mail-eopbgr690126.outbound.protection.outlook.com
>
> 06/18/2019 19:32:54 LOG OUTPUT
> DEBUG(filter_rdns_missing()@filter.c:947): checking for missing rDNS; rdns: 
> mail-eopbgr690126.outbound.protection.outlook.com
> DEBUG(filter_rdns_whitelist_file()@filter.c:1055): searching rDNS whitelist 
> file(s); rdns: mail-eopbgr690126.outbound.protection.outlook.com
> DEBUG(filter_rdns_blacklist_file()@filter.c:1159): searching rDNS blacklist 
> file(s); rdns: mail-eopbgr690126.outbound.protection.outlook.com
> DEBUG(filter_ip_whitelist()@filter.c:1228): searching IP whitelist file(s); 
> ip: 40.107.69.126
> DEBUG(filter_ip_blacklist()@filter.c:1279): searching IP blacklist file(s); 
> ip: 40.107.69.126
> DEBUG(filter_ip_in_rdns_whitelist()@filter.c:1380): checking for IP in rDNS 
> +keyword(s) in whitelist file; ip: 40.107.69.126 rdns: 
> mail-eopbgr690126.outbound.protection.outlook.com
> DEBUG(filter_ip_in_rdns_blacklist()@filter.c:1333): checking for IP in rDNS 
> +keyword(s) in blacklist file; ip: 40.107.69.126 rdns: 
> mail-eopbgr690126.outbound.protection.outlook.com
> DEBUG(filter_rdns_resolve()@filter.c:1426): checking rDNS resolution; rdns: 
> mail-eopbgr690126.outbound.protection.outlook.com
> DEBUG(filter_dns_rbl()@filter.c:1645): checking DNS RBL(s); ip: 40.107.69.126
> DEBUG(undo_softlimit()@spamdyke.c:3203): reset address space soft limit to 
> infinity: please stop using the softlimit program
> DEBUG(undo_softlimit()@spamdyke.c:3223): reset data segment soft limit to 
> infinity: please stop using the softlimit program
> DEBUG(undo_softlimit()@spamdyke.c:3241): reset stack size soft limit to 
> infinity: please stop using the softlimit program
>
> 06/18/2019 19:32:54 FROM CHILD TO REMOTE: 33 bytes
> 220 ns1.HOSTNAME.com ESMTP
>
> 06/18/2019 19:32:54 FROM REMOTE TO CHILD: 52 bytes
> EHLO NAM04-CO1-obe.outbound.protection.outlook.com
>
> 06/18/2019 19:32:54 FROM CHILD TO REMOTE: 27 bytes
> 250-ns1.HOSTNAME.com
>
> 06/18/2019 19:32:54 FROM CHILD TO REMOTE: 14 bytes
> 250-STARTTLS
>
> 06/18/2019 19:32:54 FROM CHILD TO REMOTE: 16 bytes
> 250-PIPELINING
>
> 06/18/2019 19:32:54 FROM CHILD TO REMOTE: 14 bytes
> 250-8BITMIME
>
> 06/18/2019 19:32:54 FROM CHILD TO REMOTE: 19 bytes
> 250-SIZE 31457280
>
> 06/18/2019 19:32:54 FROM CHILD TO REMOTE: 31 bytes
> 250 AUTH LOGIN PLAIN CRAM-MD5
>
> 06/18/2019 19:32:55 FROM REMOTE TO CHILD: 10 bytes
> STARTTLS
>
> 06/18/2019 19:32:55 FROM SPAMDYKE TO REMOTE: 14 bytes
> 220 Proceed.
>
> 06/18/2019 19:32:56 LOG OUTPUT TLS
> DEBUG(tls_start()@tls.c:417): TLS/SSL connection established, using cipher 
> AES256-GCM-SHA384, 256 bits
>
> 06/18/2019 19:32:56 - TLS negotiated and started
>
> 06/18/2019 19:32:56 FROM REMOTE TO CHILD: 52 bytes TLS
> EHLO NAM04-CO1-obe.outbound.protection.outlook.com
>
> 06/18/2019 19:32:56 FROM CHILD TO REMOTE: 27 bytes TLS
> 250-ns1.HOSTNAME.com
>
> 06/18/2019 19:32:56 FROM CHILD, FILTERED: 14 bytes TLS
> 250-STARTTLS
>
> 06/18/2019 19:32:56 FROM CHILD TO REMOTE: 16 bytes TLS
> 250-PIPELINING
>
> 06/18/2019 19:32:56 FROM CHILD TO REMOTE: 14 bytes TLS
> 250-8BITMIME
>
> 06/18/2019 19:32:56 FROM CHILD TO REMOTE: 19 bytes TLS
> 250-SIZE 31457280
>
> 06/18/2019 19:32:56 FROM CHILD TO REMOTE: 31 bytes TLS
> 250 AUTH LOGIN PLAIN CRAM-MD5
>
> 06/18/2019 19:32:57 FROM REMOTE TO CHILD: 48 bytes TLS
> MAIL FROM:<rethish.n...@sender.com> SIZE=68640
>
> 06/18/2019 19:32:57 LOG OUTPUT TLS
> DEBUG(find_username()@spamdyke.c:127): searching for username between 
> positions 11 and 33: MAIL FROM:<rethish.n...@sender.com> SIZE=68640
> RCPT TO:<ranj...@dxb.recepient.com>
> RCPT TO:<nominati...@dxb.recepient.com>
> DEBUG(find_domain()@spamdyke.c:361): searching for domain between positions 
> 23 and 33: MAIL FROM:<rethish.n...@sender.com> SIZE=68640
> RCPT TO:<ranj...@dxb.recepient.com>
> RCPT TO:<nominati...@dxb.recepient.com>
> DEBUG(find_address()@spamdyke.c:726): found username: Rethish.Nair
> DEBUG(find_address()@spamdyke.c:743): found domain: SENDER.com
> DEBUG(filter_sender_whitelist()@filter.c:1871): searching sender 
> whitelist(s); sender: rethish.n...@sender.com
> FILTER_SENDER_WHITELIST sender: rethish.n...@sender.com file: 
> /etc/spamdyke/whitelist_senders(781)
>
> 06/18/2019 19:33:16 FROM CHILD TO REMOTE: 33 bytes TLS
> 451 SPF lookup failure (#4.3.0)
>
> 06/18/2019 19:33:16 FROM REMOTE TO CHILD: 40 bytes TLS
> RCPT TO:<ranj...@dxb.recepient.com>
>
> 06/18/2019 19:33:16 LOG OUTPUT TLS
> DEBUG(find_username()@spamdyke.c:127): searching for username between 
> positions 9 and 36: RCPT TO:<ranj...@dxb.recepient.com>
> RCPT TO:<nominati...@dxb.recepient.com>
> DEBUG(find_domain()@spamdyke.c:361): searching for domain between positions 
> 16 and 36: RCPT TO:<ranj...@dxb.recepient.com>
> RCPT TO:<nominati...@dxb.recepient.com>
> DEBUG(find_address()@spamdyke.c:726): found username: ranjini
> DEBUG(find_address()@spamdyke.c:743): found domain: dxb.RECEPIENT.com
> DEBUG(find_cdb_record()@cdb.c:138): searching CDB file 
> /var/qmail/control/morercpthosts.cdb for 20 byte key = dxb.RECEPIENT.com, 
> hash = 3655419700, main index = 52, num_slots = 2, slot_num = 1
>
> 06/18/2019 19:33:16 LOG OUTPUT TLS
> FILTER_OTHER response: "503 MAIL first (#5.5.1)"
>
> 06/18/2019 19:33:16 FROM CHILD TO REMOTE: 25 bytes TLS
> 503 MAIL first (#5.5.1)
>
> 06/18/2019 19:33:16 LOG OUTPUT TLS
> DENIED_OTHER from: rethish.n...@sender.com to: ranj...@dxb.recepient.com 
> origin_ip: 40.107.69.126 origin_rdns: 
> mail-eopbgr690126.outbound.protection.outlook.com auth: (unknown) encryption: 
> TLS reason: 503_MAIL_first_(#5.5.1)
>
> 06/18/2019 19:33:16 FROM REMOTE TO CHILD: 44 bytes TLS
> RCPT TO:<nominati...@dxb.recepient.com>
>
> 06/18/2019 19:33:16 LOG OUTPUT TLS
> DEBUG(find_username()@spamdyke.c:127): searching for username between 
> positions 9 and 40: RCPT TO:<nominati...@dxb.recepient.com>
> DEBUG(find_domain()@spamdyke.c:361): searching for domain between positions 
> 20 and 40: RCPT TO:<nominati...@dxb.recepient.com>
> DEBUG(find_address()@spamdyke.c:726): found username: nominations
> DEBUG(find_address()@spamdyke.c:743): found domain: dxb.RECEPIENT.com
> DEBUG(find_cdb_record()@cdb.c:138): searching CDB file 
> /var/qmail/control/morercpthosts.cdb for 20 byte key = dxb.RECEPIENT.com, 
> hash = 3655419700, main index = 52, num_slots = 2, slot_num = 1
>
> 06/18/2019 19:33:16 LOG OUTPUT TLS
> FILTER_OTHER response: "503 MAIL first (#5.5.1)"
>
> 06/18/2019 19:33:16 FROM CHILD TO REMOTE: 25 bytes TLS
> 503 MAIL first (#5.5.1)
>
> 06/18/2019 19:33:16 LOG OUTPUT TLS
> DENIED_OTHER from: rethish.n...@sender.com to: nominati...@dxb.recepient.com 
> origin_ip: 40.107.69.126 origin_rdns: 
> mail-eopbgr690126.outbound.protection.outlook.com auth: (unknown) encryption: 
> TLS reason: 503_MAIL_first_(#5.5.1)
>
> 06/18/2019 19:33:16 FROM REMOTE TO CHILD: 6 bytes TLS
> QUIT
>
> 06/18/2019 19:33:16 LOG OUTPUT TLS
> ERROR(tls_write()@tls.c:678): unable to write to SSL/TLS stream: The 
> operation failed due to an I/O error, Connection reset by peer
> ERROR(output_writeln()@log.c:104): unable to write 27 bytes to file 
> descriptor 1: Connection reset by peer
>
> 06/18/2019 19:33:16 FROM CHILD TO REMOTE: 27 bytes TLS
> 221 ns1.HOSTNAME.com
>
> 06/18/2019 19:33:16 LOG OUTPUT TLS
> ERROR(tls_read()@tls.c:620): unable to read from SSL/TLS stream: The 
> operation failed due to an I/O error, Unexpected EOF found
>
> 06/18/2019 19:33:16 - TLS ended and closed
>
> 06/18/2019 19:33:16 CLOSED
>
>
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: qmailtoaster-list-unsubscr...@qmailtoaster.com
> For additional commands, e-mail: qmailtoaster-list-h...@qmailtoaster.com


---------------------------------------------------------------------
To unsubscribe, e-mail: qmailtoaster-list-unsubscr...@qmailtoaster.com
For additional commands, e-mail: qmailtoaster-list-h...@qmailtoaster.com

Reply via email to