What version of qmail do you have?

And, what about the email coming from the qmailtoaster-list? Can you send that header along?

It can depend on the remote host as well. If you have a gmail account send yourself an email from it and send the header along. Here's a header from  a gmail account.

Received: from unknown (HELO mail-qk1-f177.google.com) (209.85.222.177)
  by myhost.whitehorsetc.com with ESMTPS (ECDHE-RSA-AES128-GCM-SHA256 encrypted)


On 8/7/2020 7:12 PM, Chris wrote:
When I disabled TLS in spamdyke, I sent myself a message from one of the problematic systems that was known to trigger repeats.  That message's headers indicate qmail did not pick up the TLS encryption:

Content-Type: ⁨text/html; charset=UTF-8⁩
Mime-Version: ⁨1.0⁩
X-Ses-Outgoing: ⁨2020.08.07-54.240.37.249⁩
Dkim-Signature: ⁨v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=2ybsbk45dtwlgerewyfzx5qt442lak5j; d=reddit.com <http://reddit.com>; t=1596830148; h=From:To:Subject:MIME-Version:Content-Type:Content-Transfer-Encoding:Message-ID:Date; bh=hrVase2qeFHtu0bLhsrYTx2n7ISeji9Uin83vE7Xdh4=; b=QrrO2K0wMkJ8uIgTRE1XSNq892ay6s7FXgEnkwZY0KaDDViiUV4h5y5HVYIoZjcv wqZ97y/QgJEKnC98NPGJ9bJJnGbdoHUdaxY+VOx52u6nm8ofu3cS3BQELBuid+PMf2Y E+QOoLacnNtusPmpc1+PVwJKNuIGRsk2pCUmk7os=⁩ Dkim-Signature: ⁨v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=224i4yxa5dv7c2xz3womw6peuasteono; d=amazonses.com <http://amazonses.com>; t=1596830148; h=From:To:Subject:MIME-Version:Content-Type:Content-Transfer-Encoding:Message-ID:Date:Feedback-ID; bh=hrVase2qeFHtu0bLhsrYTx2n7ISeji9Uin83vE7Xdh4=; b=V18r7xu5iTXqr9kSFDcX/StzbVKQX9nSXcJ/Q4JoHpVRoK5u2sCNikDVVBghOzeT vInG1XcJaOMYMofcCKv0F8TwYAc253AdkK+b5PRn/eE1C2BucNO73/zCggwTSTI6lZG IMPzOiBk77HYMfSH4YEKQWY7dWSqdQGPX0Glf7Wg=⁩ Return-Path: ⁨<01000173ca7e6738-e1b4d416-58b8-47ad-8a02-3c9e2696d0c8-000...@amazonses.com <mailto:01000173ca7e6738-e1b4d416-58b8-47ad-8a02-3c9e2696d0c8-000...@amazonses.com>>⁩ Feedback-Id: ⁨1.us-east-1.UqlFplRllIQtiw+Kq2b87y7uRSu9p66fMici2AQNsMU=:AmazonSES⁩
Content-Transfer-Encoding: ⁨7bit⁩
Received: ⁨(qmail 8880 invoked by uid 89); 7 Aug 2020 19:56:04 -0000⁩
Received: ⁨by simscan 1.4.0 ppid: 8871, pid: 8873, t: 2.0387s scanners: attach: 1.4.0 clamav: 0.101.4/m:59/d:25897 spam: 3.4.2⁩ *Received: ⁨from unknown (HELO a37-249.smtp-out.amazonses.com <http://a37-249.smtp-out.amazonses.com>) (54.240.37.249) by mail.bayhosting.net <http://mail.bayhosting.net> with SMTP; 7 Aug 2020 19:56:02 -0000⁩* ⁨<01000173ca7e6738-e1b4d416-58b8-47ad-8a02-3c9e2696d0c8-000...@email.amazonses.com <mailto:01000173ca7e6738-e1b4d416-58b8-47ad-8a02-3c9e2696d0c8-000...@email.amazonses.com>>⁩
Delivered-To: ⁨ckni...@ghostwheel.com <mailto:ckni...@ghostwheel.com>⁩
Received-Spf: ⁨pass (mail.bayhosting.net <http://mail.bayhosting.net>: SPF record at amazonses.com <http://amazonses.com> designates 54.240.37.249 as permitted sender)



On Sat, Aug 8, 2020 at 12:59 PM Eric Broch <ebr...@whitehorsetc.com <mailto:ebr...@whitehorsetc.com>> wrote:

    That's the nature of spamdyke. See the documentation. I understand
    why it was programmed the way it was, with TLS, so that it could,
    after decrypting the email, operate spam blocking techniques. With
    qmail doing decryption everything that passes through spamdyke is
    encrypted so examining the email is not possible.

    |tls-level|                 |none|,|smtp||smtp-no-passthrough|or|smtps|     
|none|:
    Do not offer or allow SSL/TLS, even if qmail supports it.

    |smtp|: If|tls-certificate-file|is given, offer TLS during the
    SMTP conversation and decrypt the traffic.
    If|tls-certificate-file|is not given, allow qmail to offer TLS (if
    it has been patched to provide TLS) and pass the encrypted traffic
    to qmail.

    |smtp-no-passthrough|: If|tls-certificate-file|is given, offer TLS
    during the SMTP conversation and decrypt the traffic.
    If|tls-certificate-file|is not given, prevent TLS from starting.

    |smtps|: Initiate a SSL session at the beginning of the
    connection, before SMTP begins.

    If|tls-level|is given multiple times, spamdyke will use the last
    value it finds.

    If|tls-level|is not given, spamdyke will use a value of|smtp|.

    |tls-level|is not valid within configuration directories.

    SeeTLS <https://www.spamdyke.org/documentation/README.html#TLS>for
    details.



    Qmail will pick up TLS negotiation if spamdyke is disabled. You
    can check the headers of incoming email to confirm.

    Received: from unknown (HELOmail.qmailtoaster.com  
<http://mail.qmailtoaster.com>) (162.213.42.64)
       bymyhost.whitehorsetc.com  <http://myhost.whitehorsetc.com>  with ESMTPS 
(DHE-RSA-AES256-SHA encrypted);

    or in older TLS patches

    Received: from unknown (HELOmail.qmailtoaster.com  
<http://mail.qmailtoaster.com>) (162.213.42.64)
       bymyhost.whitehorsetc.com  <http://myhost.whitehorsetc.com>  with SMTP 
(DHE-RSA-AES256-SHA encrypted);



    On 8/7/2020 6:36 PM, Chris wrote:
    Why does 'Setting tls-level=none turns of ALL TLS even in qmail's
    offering' when it's a spamdyke config file, not qmail?

    What if I think spamdyke is part of my multi-delivery problem? 
    If I take spamdyke out of the equation in smtp/run how do I get
    qmail to pick up the TLS negotiation?

    On Sat, Aug 8, 2020 at 12:28 PM Eric Broch
    <ebr...@whitehorsetc.com <mailto:ebr...@whitehorsetc.com>> wrote:

        I'm not sure I like how spamdyke handles tls, though I don't
        know another way one would do it.

        Setting tls-level=none turns of ALL TLS even in qmail's offering.

        If you want qmail to handle TLS comment the certificate file:

        #tls-certificate-file=/var/qmail/control/servercert.pem

        However, if you do this, spamdyke (I think) will not work
        anymore because all traffic through it is now encrypted (you
        could check if I'm correct on the spamdyke mailing list).

        On 8/7/2020 6:13 PM, Chris wrote:
        I know I'm responding to a really old thread here, but I
        stumbled upon this trying to solve another issue.

        When I set tls-level=none in /opt/spamdyke/etc/spamdyke.conf
        and reboot, I now completely fail the SMTP TLS checker at
        https://luxsci.com/smtp-tls-checker
        It would appear that qmail isn't doing the tls at all.

        Where are the settings to telling qmail to handle the tls?
        Is it in the run file, or elsewhere?

        On Wed, Jun 19, 2019 at 3:14 AM Eric Broch
        <ebr...@whitehorsetc.com <mailto:ebr...@whitehorsetc.com>>
        wrote:

            In /etc/spamdyke/spamdyke.conf set 'tls-level' to 'none'.

            tls-level=none

            allow qmail to do the tls and see if it works.


            On 6/18/2019 9:07 AM, Rajesh M wrote:
            eric

            in the spamdyke.conf i can see this
            tls-certificate-file=/var/qmail/control/servercert.pem

            also i am using the
            /var/qmail/control/servercert.pem
            for domain key signing of outgoing emails.

            rajesh

            ----- Original Message -----
            From: Eric Broch [mailto:ebr...@whitehorsetc.com]
            To:qmailtoaster-list@qmailtoaster.com  
<mailto:qmailtoaster-list@qmailtoaster.com>
            Sent: Tue, 18 Jun 2019 08:52:13 -0600
            Subject:

            So you have spamdyke doing the TLS?

            On 6/18/2019 8:38 AM, Rajesh M wrote:
            Hi

            ISSUE 1
            all of a sudden we are receiving error on one of our servers for 
one specific sender domain (sending from microsoft server)

            the sender domain is not able to send emails to the recepient 
domain on our server. The email bounces with the following error
            encryption: TLS reason: 503_MAIL_first_(#5.5.1)

            06/18/2019 19:33:16 LOG OUTPUT TLS
            DENIED_OTHER from:rethish.n...@sender.com  <mailto:rethish.n...@sender.com>  
to:nominati...@dxb.recepient.com  <mailto:nominati...@dxb.recepient.com>  origin_ip: 
40.107.69.126 origin_rdns:mail-eopbgr690126.outbound.protection.outlook.com  
<http://mail-eopbgr690126.outbound.protection.outlook.com>  auth: (unknown) encryption: TLS 
reason: 503_MAIL_first_(#5.5.1)
            06/18/2019 19:33:16 FROM REMOTE TO CHILD: 6 bytes TLS
            QUIT
            06/18/2019 19:33:16 LOG OUTPUT TLS
            ERROR(tls_write()@tls.c:678): unable to write to SSL/TLS stream: 
The operation failed due to an I/O error, Connection reset by peer
            ERROR(output_writeln()@log.c:104): unable to write 27 bytes to file 
descriptor 1: Connection reset by peer
            06/18/2019 19:33:16 FROM CHILD TO REMOTE: 27 bytes TLS
            221ns1.HOSTNAME.com  <http://ns1.HOSTNAME.com>
            06/18/2019 19:33:16 LOG OUTPUT TLS
            ERROR(tls_read()@tls.c:620): unable to read from SSL/TLS stream: 
The operation failed due to an I/O error, Unexpected EOF found

            06/18/2019 19:33:16 - TLS ended and closed


            the error log of spamdyke  full-log-dir is give below follows


            ISSUE 2
            also i noted that spamdyke log mentions as such
            reset address space soft limit to infinity: please stop using the 
softlimit program

            What exactly does this mean. What is the alternative to prevent 
large files should i disable softlimit program in
            /usr/bin/softlimit -m 64000000 \
            in the smtp run file

            require your kind help in resolving the above 2 issues

            thanks
            rajesh

            06/18/2019 19:32:54 STARTED: VERSION = 5.0.1+TLS+CONFIGTEST+DEBUG, 
PID = 19829

            06/18/2019 19:32:54 CURRENT ENVIRONMENT
            PATH=/var/qmail/bin:/usr/local/bin:/usr/bin:/bin
            PWD=/var/qmail/supervise/smtp
            SHLVL=0
            PROTO=TCP
            TCPLOCALIP=103.241.181.154
            TCPLOCALPORT=25
            TCPLOCALHOST=ns1.HOSTNAME.com  <http://ns1.HOSTNAME.com>
            TCPREMOTEIP=40.107.69.126
            TCPREMOTEPORT=42264
            BADMIMETYPE=
            BADLOADERTYPE=M
            QMAILQUEUE=/var/qmail/bin/simscan
            CHKUSER_START=ALWAYS
            CHKUSER_RCPTLIMIT=50
            CHKUSER_WRONGRCPTLIMIT=10
            NOP0FCHECK=1
            DKQUEUE=/var/qmail/bin/qmail-queue.orig
            DKVERIFY=DEGIJKfh
            DKSIGN=/var/qmail/control/domainkeys/%/private

            06/18/2019 19:32:54 CURRENT CONFIG
            config-file=/etc/spamdyke/spamdyke.conf
            dns-blacklist-entry=zen.spamhaus.org  <http://zen.spamhaus.org>
            full-log-dir=/var/log/spamdyke
            graylist-dir=/var/spamdyke/graylist
            graylist-max-secs=2678400
            graylist-min-secs=180
            header-blacklist-entry=From:*>,*<*
            idle-timeout-secs=600
            ip-blacklist-file=/etc/spamdyke/blacklist_ip
            ip-in-rdns-keyword-blacklist-file=/etc/spamdyke/blacklist_keywords
            ip-in-rdns-keyword-whitelist-file=/etc/spamdyke/whitelist_keywords
            ip-whitelist-file=/etc/spamdyke/whitelist_ip
            log-level=info
            max-recipients=100
            rdns-blacklist-file=/etc/spamdyke/blacklist_rdns
            rdns-whitelist-file=/etc/spamdyke/whitelist_rdns
            recipient-blacklist-file=/etc/spamdyke/blacklist_recipients
            recipient-whitelist-file=/etc/spamdyke/whitelist_recipients
            reject-empty-rdns=1
            reject-sender=no-mx
            reject-sender=authentication-domain-mismatch
            reject-unresolvable-rdns=1
            relay-level=normal
            sender-blacklist-file=/etc/spamdyke/blacklist_senders
            sender-whitelist-file=/etc/spamdyke/whitelist_senders
            tls-certificate-file=/var/qmail/control/servercert.pem

            06/18/2019 19:32:54 - Remote IP = 40.107.69.126

            06/18/2019 19:32:54 CURRENT CONFIG
            config-file=/etc/spamdyke/spamdyke.conf
            dns-blacklist-entry=zen.spamhaus.org  <http://zen.spamhaus.org>
            dns-server-ip-primary=8.8.8.8
            full-log-dir=/var/log/spamdyke
            graylist-dir=/var/spamdyke/graylist
            graylist-max-secs=2678400
            graylist-min-secs=180
            header-blacklist-entry=From:*>,*<*
            idle-timeout-secs=600
            ip-blacklist-file=/etc/spamdyke/blacklist_ip
            ip-in-rdns-keyword-blacklist-file=/etc/spamdyke/blacklist_keywords
            ip-in-rdns-keyword-whitelist-file=/etc/spamdyke/whitelist_keywords
            ip-whitelist-file=/etc/spamdyke/whitelist_ip
            log-level=info
            max-recipients=100
            rdns-blacklist-file=/etc/spamdyke/blacklist_rdns
            rdns-whitelist-file=/etc/spamdyke/whitelist_rdns
            recipient-blacklist-file=/etc/spamdyke/blacklist_recipients
            recipient-whitelist-file=/etc/spamdyke/whitelist_recipients
            reject-empty-rdns=1
            reject-sender=no-mx
            reject-sender=authentication-domain-mismatch
            reject-unresolvable-rdns=1
            relay-level=normal
            sender-blacklist-file=/etc/spamdyke/blacklist_senders
            sender-whitelist-file=/etc/spamdyke/whitelist_senders
            tls-certificate-file=/var/qmail/control/servercert.pem

            06/18/2019 19:32:54 - Remote rDNS 
=mail-eopbgr690126.outbound.protection.outlook.com  
<http://mail-eopbgr690126.outbound.protection.outlook.com>

            06/18/2019 19:32:54 LOG OUTPUT
            DEBUG(filter_rdns_missing()@filter.c:947): checking for missing rDNS; 
rdns:mail-eopbgr690126.outbound.protection.outlook.com  
<http://mail-eopbgr690126.outbound.protection.outlook.com>
            DEBUG(filter_rdns_whitelist_file()@filter.c:1055): searching rDNS 
whitelist file(s); rdns:mail-eopbgr690126.outbound.protection.outlook.com  
<http://mail-eopbgr690126.outbound.protection.outlook.com>
            DEBUG(filter_rdns_blacklist_file()@filter.c:1159): searching rDNS 
blacklist file(s); rdns:mail-eopbgr690126.outbound.protection.outlook.com  
<http://mail-eopbgr690126.outbound.protection.outlook.com>
            DEBUG(filter_ip_whitelist()@filter.c:1228): searching IP whitelist 
file(s); ip: 40.107.69.126
            DEBUG(filter_ip_blacklist()@filter.c:1279): searching IP blacklist 
file(s); ip: 40.107.69.126
            DEBUG(filter_ip_in_rdns_whitelist()@filter.c:1380): checking for IP in 
rDNS +keyword(s) in whitelist file; ip: 40.107.69.126 
rdns:mail-eopbgr690126.outbound.protection.outlook.com  
<http://mail-eopbgr690126.outbound.protection.outlook.com>
            DEBUG(filter_ip_in_rdns_blacklist()@filter.c:1333): checking for IP in 
rDNS +keyword(s) in blacklist file; ip: 40.107.69.126 
rdns:mail-eopbgr690126.outbound.protection.outlook.com  
<http://mail-eopbgr690126.outbound.protection.outlook.com>
            DEBUG(filter_rdns_resolve()@filter.c:1426): checking rDNS resolution; 
rdns:mail-eopbgr690126.outbound.protection.outlook.com  
<http://mail-eopbgr690126.outbound.protection.outlook.com>
            DEBUG(filter_dns_rbl()@filter.c:1645): checking DNS RBL(s); ip: 
40.107.69.126
            DEBUG(undo_softlimit()@spamdyke.c:3203): reset address space soft 
limit to infinity: please stop using the softlimit program
            DEBUG(undo_softlimit()@spamdyke.c:3223): reset data segment soft 
limit to infinity: please stop using the softlimit program
            DEBUG(undo_softlimit()@spamdyke.c:3241): reset stack size soft 
limit to infinity: please stop using the softlimit program

            06/18/2019 19:32:54 FROM CHILD TO REMOTE: 33 bytes
            220ns1.HOSTNAME.com  <http://ns1.HOSTNAME.com>  ESMTP

            06/18/2019 19:32:54 FROM REMOTE TO CHILD: 52 bytes
            EHLONAM04-CO1-obe.outbound.protection.outlook.com  
<http://NAM04-CO1-obe.outbound.protection.outlook.com>

            06/18/2019 19:32:54 FROM CHILD TO REMOTE: 27 bytes
            250-ns1.HOSTNAME.com  <http://250-ns1.HOSTNAME.com>

            06/18/2019 19:32:54 FROM CHILD TO REMOTE: 14 bytes
            250-STARTTLS

            06/18/2019 19:32:54 FROM CHILD TO REMOTE: 16 bytes
            250-PIPELINING

            06/18/2019 19:32:54 FROM CHILD TO REMOTE: 14 bytes
            250-8BITMIME

            06/18/2019 19:32:54 FROM CHILD TO REMOTE: 19 bytes
            250-SIZE 31457280

            06/18/2019 19:32:54 FROM CHILD TO REMOTE: 31 bytes
            250 AUTH LOGIN PLAIN CRAM-MD5

            06/18/2019 19:32:55 FROM REMOTE TO CHILD: 10 bytes
            STARTTLS

            06/18/2019 19:32:55 FROM SPAMDYKE TO REMOTE: 14 bytes
            220 Proceed.

            06/18/2019 19:32:56 LOG OUTPUT TLS
            DEBUG(tls_start()@tls.c:417): TLS/SSL connection established, using 
cipher AES256-GCM-SHA384, 256 bits

            06/18/2019 19:32:56 - TLS negotiated and started

            06/18/2019 19:32:56 FROM REMOTE TO CHILD: 52 bytes TLS
            EHLONAM04-CO1-obe.outbound.protection.outlook.com  
<http://NAM04-CO1-obe.outbound.protection.outlook.com>

            06/18/2019 19:32:56 FROM CHILD TO REMOTE: 27 bytes TLS
            250-ns1.HOSTNAME.com  <http://250-ns1.HOSTNAME.com>

            06/18/2019 19:32:56 FROM CHILD, FILTERED: 14 bytes TLS
            250-STARTTLS

            06/18/2019 19:32:56 FROM CHILD TO REMOTE: 16 bytes TLS
            250-PIPELINING

            06/18/2019 19:32:56 FROM CHILD TO REMOTE: 14 bytes TLS
            250-8BITMIME

            06/18/2019 19:32:56 FROM CHILD TO REMOTE: 19 bytes TLS
            250-SIZE 31457280

            06/18/2019 19:32:56 FROM CHILD TO REMOTE: 31 bytes TLS
            250 AUTH LOGIN PLAIN CRAM-MD5

            06/18/2019 19:32:57 FROM REMOTE TO CHILD: 48 bytes TLS
            MAIL FROM:<rethish.n...@sender.com>  
<mailto:rethish.n...@sender.com>  SIZE=68640

            06/18/2019 19:32:57 LOG OUTPUT TLS
            DEBUG(find_username()@spamdyke.c:127): searching for username between positions 
11 and 33: MAIL FROM:<rethish.n...@sender.com>  
<mailto:rethish.n...@sender.com>  SIZE=68640
            RCPT TO:<ranj...@dxb.recepient.com>  
<mailto:ranj...@dxb.recepient.com>
            RCPT TO:<nominati...@dxb.recepient.com>  
<mailto:nominati...@dxb.recepient.com>
            DEBUG(find_domain()@spamdyke.c:361): searching for domain between positions 23 
and 33: MAIL FROM:<rethish.n...@sender.com>  <mailto:rethish.n...@sender.com>  
SIZE=68640
            RCPT TO:<ranj...@dxb.recepient.com>  
<mailto:ranj...@dxb.recepient.com>
            RCPT TO:<nominati...@dxb.recepient.com>  
<mailto:nominati...@dxb.recepient.com>
            DEBUG(find_address()@spamdyke.c:726): found username: Rethish.Nair
            DEBUG(find_address()@spamdyke.c:743): found domain: SENDER.com
            DEBUG(filter_sender_whitelist()@filter.c:1871): searching sender 
whitelist(s); sender:rethish.n...@sender.com  <mailto:rethish.n...@sender.com>
            FILTER_SENDER_WHITELIST sender:rethish.n...@sender.com  
<mailto:rethish.n...@sender.com>  file: /etc/spamdyke/whitelist_senders(781)

            06/18/2019 19:33:16 FROM CHILD TO REMOTE: 33 bytes TLS
            451 SPF lookup failure (#4.3.0)

            06/18/2019 19:33:16 FROM REMOTE TO CHILD: 40 bytes TLS
            RCPT TO:<ranj...@dxb.recepient.com>  
<mailto:ranj...@dxb.recepient.com>

            06/18/2019 19:33:16 LOG OUTPUT TLS
            DEBUG(find_username()@spamdyke.c:127): searching for username between positions 
9 and 36: RCPT TO:<ranj...@dxb.recepient.com>  
<mailto:ranj...@dxb.recepient.com>
            RCPT TO:<nominati...@dxb.recepient.com>  
<mailto:nominati...@dxb.recepient.com>
            DEBUG(find_domain()@spamdyke.c:361): searching for domain between positions 16 
and 36: RCPT TO:<ranj...@dxb.recepient.com>  <mailto:ranj...@dxb.recepient.com>
            RCPT TO:<nominati...@dxb.recepient.com>  
<mailto:nominati...@dxb.recepient.com>
            DEBUG(find_address()@spamdyke.c:726): found username: ranjini
            DEBUG(find_address()@spamdyke.c:743): found domain:dxb.RECEPIENT.com  
<http://dxb.RECEPIENT.com>
            DEBUG(find_cdb_record()@cdb.c:138): searching CDB file 
/var/qmail/control/morercpthosts.cdb for 20 byte key =dxb.RECEPIENT.com  
<http://dxb.RECEPIENT.com>, hash = 3655419700, main index = 52, num_slots = 2, 
slot_num = 1

            06/18/2019 19:33:16 LOG OUTPUT TLS
            FILTER_OTHER response: "503 MAIL first (#5.5.1)"

            06/18/2019 19:33:16 FROM CHILD TO REMOTE: 25 bytes TLS
            503 MAIL first (#5.5.1)

            06/18/2019 19:33:16 LOG OUTPUT TLS
            DENIED_OTHER from:rethish.n...@sender.com  <mailto:rethish.n...@sender.com>  
to:ranj...@dxb.recepient.com  <mailto:ranj...@dxb.recepient.com>  origin_ip: 40.107.69.126 
origin_rdns:mail-eopbgr690126.outbound.protection.outlook.com  
<http://mail-eopbgr690126.outbound.protection.outlook.com>  auth: (unknown) encryption: TLS 
reason: 503_MAIL_first_(#5.5.1)

            06/18/2019 19:33:16 FROM REMOTE TO CHILD: 44 bytes TLS
            RCPT TO:<nominati...@dxb.recepient.com>  
<mailto:nominati...@dxb.recepient.com>

            06/18/2019 19:33:16 LOG OUTPUT TLS
            DEBUG(find_username()@spamdyke.c:127): searching for username between positions 
9 and 40: RCPT TO:<nominati...@dxb.recepient.com>  
<mailto:nominati...@dxb.recepient.com>
            DEBUG(find_domain()@spamdyke.c:361): searching for domain between positions 20 
and 40: RCPT TO:<nominati...@dxb.recepient.com>  
<mailto:nominati...@dxb.recepient.com>
            DEBUG(find_address()@spamdyke.c:726): found username: nominations
            DEBUG(find_address()@spamdyke.c:743): found domain:dxb.RECEPIENT.com  
<http://dxb.RECEPIENT.com>
            DEBUG(find_cdb_record()@cdb.c:138): searching CDB file 
/var/qmail/control/morercpthosts.cdb for 20 byte key =dxb.RECEPIENT.com  
<http://dxb.RECEPIENT.com>, hash = 3655419700, main index = 52, num_slots = 2, 
slot_num = 1

            06/18/2019 19:33:16 LOG OUTPUT TLS
            FILTER_OTHER response: "503 MAIL first (#5.5.1)"

            06/18/2019 19:33:16 FROM CHILD TO REMOTE: 25 bytes TLS
            503 MAIL first (#5.5.1)

            06/18/2019 19:33:16 LOG OUTPUT TLS
            DENIED_OTHER from:rethish.n...@sender.com  <mailto:rethish.n...@sender.com>  
to:nominati...@dxb.recepient.com  <mailto:nominati...@dxb.recepient.com>  origin_ip: 
40.107.69.126 origin_rdns:mail-eopbgr690126.outbound.protection.outlook.com  
<http://mail-eopbgr690126.outbound.protection.outlook.com>  auth: (unknown) encryption: TLS 
reason: 503_MAIL_first_(#5.5.1)

            06/18/2019 19:33:16 FROM REMOTE TO CHILD: 6 bytes TLS
            QUIT

            06/18/2019 19:33:16 LOG OUTPUT TLS
            ERROR(tls_write()@tls.c:678): unable to write to SSL/TLS stream: 
The operation failed due to an I/O error, Connection reset by peer
            ERROR(output_writeln()@log.c:104): unable to write 27 bytes to file 
descriptor 1: Connection reset by peer

            06/18/2019 19:33:16 FROM CHILD TO REMOTE: 27 bytes TLS
            221ns1.HOSTNAME.com  <http://ns1.HOSTNAME.com>

            06/18/2019 19:33:16 LOG OUTPUT TLS
            ERROR(tls_read()@tls.c:620): unable to read from SSL/TLS stream: 
The operation failed due to an I/O error, Unexpected EOF found

            06/18/2019 19:33:16 - TLS ended and closed

            06/18/2019 19:33:16 CLOSED



            
---------------------------------------------------------------------
            To unsubscribe, e-mail:qmailtoaster-list-unsubscr...@qmailtoaster.com  
<mailto:qmailtoaster-list-unsubscr...@qmailtoaster.com>
            For additional commands, e-mail:qmailtoaster-list-h...@qmailtoaster.com  
<mailto:qmailtoaster-list-h...@qmailtoaster.com>

            
---------------------------------------------------------------------
            To unsubscribe, e-mail:qmailtoaster-list-unsubscr...@qmailtoaster.com  
<mailto:qmailtoaster-list-unsubscr...@qmailtoaster.com>
            For additional commands, e-mail:qmailtoaster-list-h...@qmailtoaster.com  
<mailto:qmailtoaster-list-h...@qmailtoaster.com>

Reply via email to